Justyna Żywiołek, Achyuth Sarkar, Muhammad Safdar Sial
{"title":"Biometrics as a method of employee control","authors":"Justyna Żywiołek, Achyuth Sarkar, Muhammad Safdar Sial","doi":"10.1109/IMCOM53663.2022.9721809","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721809","url":null,"abstract":"Biometric technology is used for various purposes. One of these is the identification of individuals. It has been widely used in the field of life for various applications. Despite the various advantages of the Biometric System [1], many organizations still face the issue of how to implement the right technology for their specific environment. In this paper, we will discuss how to determine the right biometric identifier for their attendance system.Today, attendance systems are being widely used by companies to improve the efficiency of their workforce management systems [2], [3]. Aside from paper attendance, many of them also utilize electronic attendance systems to avoid manual entry. Many companies often have manual attendance systems that are not powerful enough to effectively manage the attendance of their employees.The results of empirical research show that the security, privacy and control of the used biometric solutions have a significant impact on the perceived quality, which in turn has a positive impact on the company's reputation. The authors proposed a methodology based on the Kano and satisfaction model to examine the declared needs and undefined desires and divide them into different groups with different impacts on employee and employer satisfaction. Correctly completed 2,893 questionnaires were analyzed, and the results obtained after their presentation in the surveyed companies will be included in the management plans for further actions.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125154509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning for Multi-Classification of Botnets Attacks","authors":"Thanh Cong Tran, T. K. Dang","doi":"10.1109/IMCOM53663.2022.9721811","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721811","url":null,"abstract":"The number of Internet of Things (IoT) devices connected to the network enlarges dramatically these days. This leads to rising cyberattacks, such as botnets. These attacks result in disrupting the transition of networks and services for IoT devices. Recently, various approaches of Machine Learning (ML) and Deep Learning (DL) have been proposed to detect botnet attacks in the IoT environment. However, the ML/DL methods used in the research are just binary classification between normal and attack classes. In this study, we propose an approach using ML algorithms to develop multi-classification botnet detection systems for IoT devices. The proposed approach is based on not only multi-classification metrics but also the time complexity of the training and testing processes. The multi-classification metrics, particularly multi- classification confusion matrix, Accuracy, Macro F1-score, Micro F1-score, Weighted F1-score, Mathews Correlation Coefficient (MCC), and Cohen Kappa score are used in the entire study. Through the extensive experiments with the N-BaIoT dataset, the Artificial Neural Network classifier has proven its robust performance in terms of both multi-classification metrics and time complexity.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Counting Red Blood Cells in the Microscopic Images by EndPoints Method and Circular Hough Transform","authors":"Amir Aslan Aslani, Mohammad Zolfaghari, H. Sajedi","doi":"10.1109/imcom53663.2022.9721754","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721754","url":null,"abstract":"Many diseases such as anemia and leukemia are detected by counting Red Blood Cells (RBCs or erythrocytes). Generally, there are manual and automatic method for RBCs counting. In the manual method, RBCs counting is performed by a hematologist with the help of special medical equipment. The manual method is tedious, time-consuming and dependent on equipment and hematologist’s expert and accuracy. The automatic method is fast, high accuracy and independent of equipment and hematologist. It is performed with the assistance of a microscopic image of the person’s blood and a computer system. In this paper, a new method is presented for counting incomplete or cropped RBCs by Circular Hough Transform (CHT) and another method called EndPoints method which will be described in the following. Two parallel tasks are performed on the input image. In the first work, the input image is segmented using thresholding and erosion on the green channel. In the second work, the input image is converted to a grayscale image and edged by the Canny method. Then, the segmented image is subtracted from the edged image and remove White Blood Cells (WBCs or leucocytes) from it. After margin is added, by defining EndPoints set estimated continuation of RBCs will be added to the image. Finally, CHT is applied to the image and it will calculate the number of RBCs. Also, new counting error and counting accuracy metrics are defined for counting problem. The method is evaluated on the fifteen images of the ALL-IDB1 database and achieved 97.14 overall accuracy.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying Counterfeit Products using Blockchain Technology in Supply Chain System","authors":"Nafisa Anjum, Pramit Dutta","doi":"10.1109/IMCOM53663.2022.9721789","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721789","url":null,"abstract":"With the advent of globalization and the evergrowing rate of technology, the volume of production as well as ease of procuring counterfeit goods has become unprecedented. Be it food, drug or luxury items, all kinds of industrial manufacturers and distributors are now seeking greater transparency in supply chain operations with a view to deter counterfeiting. This paper introduces a decentralized Blockchain based application system (DApp) with a view to identifying counterfeit products in the supply chain system. With the rapid rise of Blockchain technology, it has become known that data recorded within Blockchain is immutable and secure. Hence, the proposed project here uses this concept to handle the transfer of ownership of products. A consumer can verify the product distribution and ownership information scanning a Quick Response (QR) code generated by the DApp for each product linked to the Blockchain.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123337937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asim Abbas, Jamil Hussain, Muhammad Afzal, H. M. Bilal, Sungyoung Lee, Seokhee Jeon
{"title":"Explicit and Implicit Section Identification from Clinical Discharge Summaries","authors":"Asim Abbas, Jamil Hussain, Muhammad Afzal, H. M. Bilal, Sungyoung Lee, Seokhee Jeon","doi":"10.1109/IMCOM53663.2022.9721771","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721771","url":null,"abstract":"In the clinical domain, mostly data is generated in natural language and unstructured format in clinical notes, containing meaningful and hidden information. Various algorithms have been proposed to recognize and identify different sections within those clinical notes for easy conversion into a structured data format for further processing in terms of data storage and retrieval. The algorithm has proposed recognizing and identifying the explicit and implicit defined section heading and the start and end of boundaries for identified sections to enhance clinical notes’ information extraction (IE). A section dictionary is constructed contain explicit define section name. An exact term matching approach is used to identify explicit define section and term partially matching procedure is followed utilizing Levenshtein Distance algorithm. We evaluated our discharge summaries provided by Beth Israel Deaconess Medical Center 2010 I2b2 Challenge. The experiments showed that the proposed algorithm achieved a satisfactory score of precision 100%, recall 94.5%, and f-score 97.17% overall. We also perform experiments for the explicit section with a result score of 100% precision, 93.53% recall, and 96.66% f-score, and for the implicitly identified section, we gain precision of 100%, recall 95.46%, and 97.68%. The main goal of proposing this algorithm is to automatically prepare data for data-driven approaches like machine learning and deep learning and enhance the meaningful use of EHR’s and CDSS systems, clinical outcomes, and events.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Performance Analysis of Code-Domain NOMA and Power-Domain NOMA","authors":"Ayesha Jehan, Muhammad Zeeshan","doi":"10.1109/IMCOM53663.2022.9721725","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721725","url":null,"abstract":"Orthogonal Multiple Access (OMA) schemes provide limit on the number of users and do not meet 5th generation requirements. Non-Orthogonal Multiple Access (NOMA) improves spectral efficiency and user capacity without sacrificing system performance. In order to develop link adaptation mechanism for 5G communication technology based on NOMA, detailed parametric analysis and computation of bit error rate (BER) bounds is an essential requirement. Major focus of this paper to evaluate performance analysis, based on the BER curve of CD-NOMA and PD NOMA using different parameters. The chosen schemes for Code Domain NOMA are LDS-CDMA, LDS-OFDM and SCMA. Power Domain NOMA is implemented for two user model. CD NOMA schemes are compared with PD NOMA and their fair comparison is evaluated. All schemes are run in MATLAB under AWGN Channel. There system model, key performance parameters and achieved results are discussed. From analysis, we obtained better results for LDS-OFDM amongst LDS-CDMA and SCMA for six users. LDS-OFDM model results, which is run for six users is closed to Power Domain NOMA run for two users.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"20 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamalanathan Shanmugam, Muhammad Ehsan Rana, Grace Ong
{"title":"IoT based Indoor Senior Citizen Monitoring and Alerting System","authors":"Kamalanathan Shanmugam, Muhammad Ehsan Rana, Grace Ong","doi":"10.1109/IMCOM53663.2022.9721797","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721797","url":null,"abstract":"An Indoor Senior Citizen Monitoring and Alerting System with IoT Sensors should he implemented as it helps facilitate the monitoring process of senior citizens, especially in the rapidly ageing era where most senior citizens live alone in their houses. With increasing maturity in Internet of Things (IoT) technologies and cloud computing, IoT hardware is easier to be obtained, and cloud services are expanding into edge computing, reducing the development cost of IoT systems. Besides that, with the arising of 5G technology, network bandwidth is significantly increased, allowing more IoT devices to be connected in an area. Therefore, this research attempts to solve the human-based monitoring issue of senior citizen monitoring with the use of IoT technologies.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparisons of Reconstruction Capabilities for Lossy Transmission with Block-Based Compressed Sensing","authors":"Yuh-Yih Lu, Feng-Cheng Chang, Hsiang-Cheh Huang, Po-Liang Chen","doi":"10.1109/imcom53663.2022.9721769","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721769","url":null,"abstract":"Robust transmission of compressed signals is much required in multimedia communications. Compression of multimedia is inevitable, and we choose block-based compressed sensing to play the role for compression. Compressed coefficients are transmitted over lossy channels. Channel errors or losses may cause degradation to reconstructed image qualities after reception. We consider making use of different reconstruction methods at the decoder and make comparisons. In addition, error resilient techniques may also help to enhance reconstruction quality. Multiple description coding can be applied to work with different reconstruction schemes, and enhanced reconstructed image quality may be expected with the integration of error resilient techniques. Simulation results have shown the capability of reconstruction schemes, and the advantages for error resilience to obtain enhanced quality.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125985956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Nguyen, The-Tien Nguyen, Xuan-Phuc Nguyen, Cong Tran, Q. Nguyen
{"title":"Multiple Frame Integration for Essential Matrix-based Visual Odometry","authors":"H. Nguyen, The-Tien Nguyen, Xuan-Phuc Nguyen, Cong Tran, Q. Nguyen","doi":"10.1109/imcom53663.2022.9721757","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721757","url":null,"abstract":"Visual odometry (VO) is known as an essential part of visual SLAM, it serves as a driving engine of various autonomous navigation systems. Traditional visual odometry recovers the camera motion from a pair of consecutive images, known as the frame-to-frame approach. This paper introduces a multiple frame integration for stereo visual odometry with the aim of reducing drifts by refining transformation and feature location consecutively. Firstly, the rotation is accurately estimated from frame-to-frame VO based on an essential matrix and then refined by utilizing a loop closure constraint of three consecutive camera frames. Secondly, 2D feature locations gradually are updated from their corresponding points in the previous frame through epipolar constraints. An experimental comparison is conducted using a publicly available benchmark dataset, KITTI dataset, which reinforces the accuracy improvement of the proposed approach for both rotation and translation compared to the traditional approaches by around 20% in the same experimental conditions.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Photo-Sketch Recognition Using Bidirectional Collaborative Synthesis Network","authors":"Seho Bae, N. Din, H. Park, Juneho Yi","doi":"10.1109/IMCOM53663.2022.9721719","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721719","url":null,"abstract":"This research features a deep learning based framework to address the problem of matching a given face sketch image against a face photo database. The photo-sketch matching problem is challenging because 1) modality gap between photo and sketch is very large, and 2) the number of paired photo/ sketch data is insufficient to train deep network. To circumvent the problem of large modality gap, our approach is to use an intermediate latent space between the two modalities. We effectively align the distributions of the two modalities in this latent space by employing a bidirectional (photo → sketch and sketch → photo) collaborative synthesis network. A StyleGAN-like architecture is utilized to make the intermediate latent space be equipped with rich representation power. To resolve the problem of insufficient training samples, we introduce a three-step training scheme. Extensive evaluation on public composite face sketch database confirms superior performance of our method compared to existing state-of-the-art methods. The proposed methodology can be employed in matching other modality pairs.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125640427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}