


default search action
9th BESC 2022: Matsuyama, Japan
- 9th International Conference on Behavioural and Social Computing, BESC 2022, Matsuyama, Japan, October 29-31, 2022. IEEE 2022, ISBN 979-8-3503-9814-4

- Xin Yao

, Xiangguo Zhao, Rui He, Hulin Nie, Haojie Nie, Shichao Sun:
A Medical Device Management System Using Smart Contract on Blockchain. 1-5 - Xieling Chen, Ruofei Zhang

, Di Zou
, Gary Cheng, Haoran Xie
, Fu Lee Wang:
Online learning research in the era of COVID-19: Bibliometric analysis and topic modeling. 1-8 - Takumi Kato, Ryuji Yokote:

Improvement in Driving Performance Evaluation Using Driving Sound of Electric Vehicles. 1-4 - Yoshito Noritake, Takanobu Mizuta

, Ryuta Hemmi, Shota Nagumo, Kiyoshi Izumi:
Investigation on effect of excess buy orders using agent-based model. 1-5 - Xin Bi, Guoliang Zhang, Mingxu Yuan, Xuechun Huang, Xiangguo Zhao:

Long-Term Time Series Prediction with Extreme Peak and Interval Calibration. 1-6 - Leping Zhang, Hao Chen:

An Integrative Analysis: What Cultural Factors Protect Us Against the COVID-19 Indeed? 1-6 - Lei Yang, Yao Xie, Md. Rafiqul Islam, Guandong Xu:

Big Data and Artificial Intelligence (AI) to Detect Glaucoma. 1-6 - Kui Xiao, Yuming Fu, Jian Zhang, W. Tianji:

A Hybrid Approach for Discovering Concept Prerequisite Relations in Wikipedia. 1-5 - Yulu Qi, Zhaoquan Gu, Yangyang Mei, Kaihan Lin, Aiping Li:

A General Construction Method of Cyber Security Knowledge Graph. 1-7 - Xin Zheng, Huan Huo

:
Enhancing group polarity of temporal patterns for rumour detection on Twitter. 1-4 - Fan Su

, Di Zou
:
Applying Shimo-supported concept maps, mind maps, and argument maps to assist students' argumentative writing. 1-5 - Yue Chen:

An Empirical Study of the Effects of Social Related Stress on User's Unfollow Intentions of Social Network Service. 1-4 - Kaixi Hu

, Lin Li:
Modeling Sequential Representation with Interaction Dynamics for Social Prediction. 1-4 - Abdullah Al Taawab, Mahfuzzur Rahman, Zawadul Islam, Nafisa Mustari, Shaily Roy, Md. Golam Rabiul Alam:

Detecting Self-Esteem Level and Depressive Indication Due to Different Parenting Style Using Supervised Learning Techniques. 1-6 - Jiyan Cai, Libing Wu, Dan Wu, Jianxin Li, Xianfeng Wu

:
Multi-dimensional alignment via Variational Autoencoders for Generalized Zero-Shot and Few-Shot Learning. 1-4 - Jin Yang, Yi Liu, Weidong Fang, Gentuan Jia, Yunzhou Qiu:

Real-Time Fire Detection Model Based on Attention Mechanism and Multi-scale Features Map. 1-6 - Ira Puspitasari, Farida Utami, Indra Kharisma Raharjana:

Determinants of Continuance Intention to Use Mutual Fund Investment Apps: The Changing of User Behavior During the Pandemic Crisis. 1-5 - Osama A. Moussa, Sameha Alshakhsi

, Dena Al-Thani, Raian Ali
:
Can Operational Transparency Enhance the Perception of Waiting Time? A Case Study from the Healthcare Sector. 1-7 - Zahrah Ayub

, Asif Ali Banka
, Anees Fatima, Asiya Nazir:
Using Social Interactions to Redefine Vaccination Strategy. 1-6 - Linlin Ding, Lujie Cao, Gang Zhang, Yishan Pan:

Improved mine microseismic event recognition method combining neural network and transfer learning. 1-7 - Reem S. Al-Mansoori, Dena Al-Thani, Raian Ali

:
Digital Wellbeing: Designers' Perspectives on Where the Responsibility Lies. 1-6 - Mohamad Hassan Hijab

, Dena Al-Thani:
En Route to Co-designing Inclusive Play With and For Autistic Children. 1-4 - Tamara Abdulmunim Abduljabbar, Xiaohui Tao, Ji Zhang, Jianming Yong

, Xujuan Zhou:
A Secured Movie Recommendation System using Decentralized Blockchain Network. 1-6 - Daniil Buryakov

, Airo Hino
, Máté Kovács, Uwe Serdült
:
Text Mining from Party Manifestos to Support the Design of Online Voting Advice Applications. 1-7 - Pengjin Wang, Gaowei Chen:

Enhancing teacher's dialogic teaching skills in the post-COVID era: From using lesson videos to their corpora as cognitive tools. 1-6 - Honglei Zhang, Yidong Li:

Digital Watermarking via Inverse Gradient Attention. 1-3 - Kengo Zenitani

:
A formal approach for secured risk analysis in information security management. 1-7 - Elena Hamidy:

"Krymnash" on YouTube: Formation of Singularities. 1-5 - Yao Dong, Jin Shi, Yahan Deng, Yongfeng Dong, Ziqiu Wang:

DASCDC: Dual Attention-based Sparse Common Deep Clustering Method. 1-9 - Bo Li, Hao Chen:

Unpacking the CNN's Algorithmic "Glass Ceiling" of Inferring Psychological Traits from Facial Images. 1-6 - Masanori Hirano

, Kiyoshi Izumi:
Parameter Tuning Method for Multi-agent Simulation using Reinforcement Learning. 1-7 - Aijuan Zhou, Yi Zhao, Xiaopeng Ren

:
SARS-CoV-2 outbreak uplifted collectivistic expression in the Hubei Daily. 1-7 - Ida Toivanen

, Jari Lindroos
, Venla Räsänen, Sakari Taipale
:
Dealing with a small amount of data - developing Finnish sentiment analysis. 1-7 - Wilson Kurnia Lukmanjaya, Md. Rafiqul Islam, Guandong Xu:

Evidence-Based Process in Research Involving Machine Learning Algorithms. 1-7 - Avery Tzeng Chiet Ngiam, Md. Rafiqul Islam, Guandong Xu:

ECTRS: A Personalised Early Career Trajectory Recommender System for Youths. 1-7 - Zongxi Li

, Haoran Xie
, Fu Lee Wang, Weiming Wang
, Man-Kong Chow:
Identify Students at Risk Based on Behavioural Patterns in Continuous Assessment. 1-6 - Qiqi Cai, Jian Cao, Shiyou Qian, Yirong Chen:

DTFPRS: A Distributed Traffic Flow Prediction Framework Based on Road Segmentation. 1-7 - Seiichiro Fujii, Keishi Matsuda, Shiro Uesugi:

Improving the Efficiency of Waste Collection by Utilizing Digital Transformation. 1-7 - Najla A. Al-Thani:

Adolescents' and social engineering: The role of psychometrics factors in determining vulnerability and designing interventions. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














