skip to main content
10.1145/3022227acmconferencesBook PagePublication PagesicuimcConference Proceedingsconference-collections
IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IMCOM '17: The 11th International Conference on Ubiquitous Information Management and Communication Beppu Japan January 5 - 7, 2017
ISBN:
978-1-4503-4888-1
Published:
05 January 2017
Sponsors:

Bibliometrics
Abstract

No abstract available.

research-article
Performance analysis of black hole attack in MANET

The underlying element that supports the device communication in the MANET is the wireless connection capability. Each node has the ability to communicate with other nodes via the creation of routing path. However, due to the fact that nodes in MANET ...

research-article
Frag-shells cube based on hierarchical dimension encoding tree

Pre-computation of data cube can greatly improve the performance of OLAP (online analytical processing). There are a lot of effective pre-computation methods of data cube. But in practice, appropriate pre-computation method for the characteristics of ...

research-article
DNS amplification attack detection and mitigation via sFlow with security-centric SDN

Following the rise of modern networking, DDoS attacks are undeniably becoming more abusive. DNS amplification attack is a type of reflected DDoS attack that exploits DNS servers to distribute amplified responses. Detection-wise, related studies have ...

research-article
The effects of ambient scent on hedonic experience on online shopping

This study examines the effects of scent on hedonic experience in online shopping and then, which investigates olfactory cues such as citrus-mint and citrus-vanilla that improve the buyer's emotional state by creating an atmospherics. We selected a ...

research-article
Big data analysis on secure VoIP services

VoIP users increase each day. However, the documentation on the behavior of VoIP applications is still lacking. The needs to understand and generalize the behavior of applications like Skype, GoogleTalk and SIP based applications grow each day. There ...

research-article
Toward accessibility with usability: understanding the requirements of impaired uses in the mobile context

When applications intend to support accessibility, aspects of usability must be reviewed to adapt or extend common functional requirements that are implemented to ensure an easy use of applications. However, initiatives to develop guidelines for ...

research-article
Architectural framework in next learning support environment

Information technology has given successive and successful evolutions to different types of methods, means, tools, systems, environments and so on in learning/teaching activities, as well as the effectiveness of various kinds of human activities such as ...

research-article
Design & development of digital learning resource (BMT): blended learning approach

The evolution of technologies and the development of new media design for educational purposes are expanding. This work aims to look at the use of blended learning and how it affects students' score in examination. BMT (Basic Movement Therapy) Digital ...

research-article
Web-based application for learning Malaysian sign language

Malaysian Sign Language is the native language for the deaf people in Malaysia. However, there is still a lack of web resources available to the public to facilitate the learning of the language. To overcome this problem, a research initiative has been ...

short-paper
Discovering users navigation of online newspaper using Markov model

Online newspaper readership is gradually increasing as users are actively spending more time on the Internet to read news. Understanding how users navigate the site is important so we can improve their Web experience. In this study, we collect Web ...

research-article
Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care

Connected health care is a remotely healthcare system and it provides several services including telecare medicine, personally controlled health record, patient monitoring and so on. Recently, Xu et al. have shown that Xie et al.'s remote user ...

research-article
Experiments on images displayed for praising and scolding in e-learning systems

Currently, in addition to cloud computing and broadband communication, e-learning is being provided through various devices such as smart phones and tablets. While e-learning has many advantages such as users being able to study everywhere and at any ...

research-article
An intention-based approach to the updatability of views in relational databases

Views are essential for relational databases in that they could provide a high degree of logical data independence. However, although views are a useful tool for queries, they present significant problems if insertions, deletions, or rewrites are ...

research-article
A proposal of event study methodology with Twitter sentimental analysis for risk management

Once organizations have the security incident and breaches, they have to pay tremendous costs. Although visible cost, such as the incident response cost, customer follow-up care, and legal cost are predictable and calculable, it is tough to evaluate and ...

research-article
Lecturers' perception on social media networks uses in education

Reputation of higher education institutes are significantly affected by the degree of the students' satisfactions. Therefore, considering students opinions about the quality of education is very important in order to maintain the academic institutes' ...

research-article
Top-k frequent induced subgraph mining on a sliding window using sampling

Finding Frequent Induced Subgraph in a stream of graph data is critical for many application such as frequent substructures in biological networks, chemical compounds, or community detection in social networks. Some approaches have been proposed for ...

research-article
Study on proactive auto scaling for instance through the prediction of network traffic on the container environment

In this paper, we propose container traffic analyzer (COTA) structure to improve accommodating more network traffic to VMs and to reduce the scale-out time. COTA consists of two functions. The one is reporting the amount of network traffic on real-time. ...

research-article
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems

Telecare Medicine Information System holds up health-care delivery service between patients and doctor. Send the user or TMIS server's information through the public channel. To protect patients' personal information such has telephone number, home ...

research-article
Dynamic weighted sequential pattern mining for USN system

Sequential pattern mining is a technique which finds out frequent patterns from the data set with a time attribute. Dynamic weighted sequential pattern mining can be applied to a computing environment that is constantly changed according to time period ...

research-article
A proposed model of online information grounds

This paper presents findings from a study of IT professionals on Twitter. Our study aimed to understand the way IT Professionals' use of Twitter for professional purposes. The data for this study was collected using online observations and interviews to ...

research-article
Fusion of face recognition and facial expression detection for authentication: a proposed model

The paper presents a novel model of hybrid biometric-based authentication. Currently, the recognition accuracy of a single biometric verification system is often much reduced due to many factors such as the environment, user mode and physiological ...

short-paper
Effects of quizzes in marking supported e-learning

Marking on a textbook when studying is a natural and subjective learning activity conducted by a learner. Such activity can be positively utilized in the learning process. If we could extract marked phrases or sentences, it will be possible to develop ...

research-article
Feature expression of frequency transform regarding daily power demand information

Owing to the introduction of an energy-monitoring device called the "smart meter," a large amount of power-demand information regarding private houses is being stored around the world through the development of smart grids. Such electric consumption ...

research-article
Salt hero: an interactive application for learning salt in chemistry

We introduce Salt Hero, an interactive learning application designed to support students in learning about salt. Salt is an ionic compound that results from the neutralisation reaction of an acid and a base, and is one of the fundamental topics when ...

research-article
Identifying major contents among web pages with search engine suggests by modeling topics

This paper addresses the problem of identifying irrelevant items from a small set of similar documents using Web search engine suggests. Specifically, we collected volumes of Web pages through Web search engines and inspected the page contents using ...

short-paper
Immersive browsing in an image sphere

In this paper, we present an immersive image database navigation system. Images are visualised in a spherical visualisation space and arranged, on a grid, by colour so that images of similar colour are located close to each other, while access to large ...

research-article
TopicWave: visual exploration for topics with hierarchical time-varying data

Opinion leaders have great influence in social networks. When influential events occur, experts may be concerned with the opinion flow of the event from social networks. Therefore, the trend of events during a time interval should be explored using a ...

research-article
Study on user customized data service model for improving data service reliability

New value was extracted through managing and analyzing huge volume of data in Big Data paradigm. With the paradigm, data environment such as Public Data and Data Market was built to collect and provide data for data users. Some issues to realize data-...

research-article
Efficient query processing on distributed stream processing engine

Distributed stream processing engines, such as Storm and Samza, have been developed to process large scale stream data. The engines are scale out horizontally with shared nothing architecture, but they do not provide high-level query language like SQL. ...

research-article
WARP: an web-based adaptive remote display protocol for improvement of user experience

Virtual Desktop Infrastructure (VDI) is growing on account of virtualization and network technology's development. VDI user utilizes virtual desktop from remote place through network by using diverse device. Providing user experiment such as local ...

Recommendations

Acceptance Rates

IMCOM '17 Paper Acceptance Rate113of366submissions,31%Overall Acceptance Rate213of621submissions,34%
YearSubmittedAcceptedRate
IMCOM '1825510039%
IMCOM '1736611331%
Overall62121334%