


default search action
16th IHCI 2024: Twente, The Netherlands - Part I
- Dhananjay Singh
, Jan-Willem van't Klooster
, Uma Shanker Tiwary
:
Intelligent Human Computer Interaction - 16th International Conference, IHCI 2024, Twente, The Netherlands, November 13-16, 2024, Revised Selected Papers, Part I. Lecture Notes in Computer Science 15557, Springer 2025, ISBN 978-3-031-88704-8
Learning in Healthcare and Wellbeing
- Krista Hoek
, Monique van Velzen
, Jos Alexander van der Hage, Elise Sarton
:
A VR Experience Exposing the Hidden Curriculum of the Operating Room: A Case Study. 3-17 - Claudio Pighini
, Ambra Cesareo
, Andrea Migliavacca, Enrico Gianluca Caiani
:
LifeCharger SynCare Mobile App: A Preliminary Usability Study. 18-28 - Krista Hoek
, Chris Martini
, Monique van Velzen
, Elise Sarton
:
From Theory to Practice: Simulation in Anesthesiology Through Active Learning Experiences. 29-40 - Hakimjon Zaynidinov
, Nandan Hirpara, Dhananjay Singh
, Sarvar Makhmudjanov
, Akmal Aliqulov
:
Methods for Optimizing Diagnostic Data for Patients with a Given Condition. 41-53 - Ágnes Karolina Bakk
:
An Exploration of Phantom Touch as a Design Aspect to Enhance Wellbeing and Safety in Social VR. 54-59 - Ritu Chauhan, Dhananjay Singh
:
Predictive Analytics for Stress Management in Nursing: A Machine Learning Approach Using Wearable IoT Devices. 60-75
Robots and Conversation Agents
- Nafiul Alam, M. I. R. Shuvo, Jong-Hoon Kim:
Robot-to-Robot Collaborative Knowledge Sharing with Human Operators Under Constraint Resources Through Connotative 2.5D Mapping. 79-91 - Snehal Walunj, Parsha Pahlevannejad, Michael Sintek
, Juan Carlos Saborío, Prerna Garg, Hooman Tavakoli, Christiane Plociennik, Nicolas Großmann, Ansgar Bernardi, Martin Ruskowski, Joachim Hertzberg, Andreas Dengel:
Context-Aware Robotic Assistance for Workers Using Intention Recognition and Semantic Digital Twin. 92-104 - Nese Baz Aktas
, Adem Akbiyik
:
Conversational Agent Design: A Comprehensive Analysis of Research from Leading Conferences. 105-121 - Ovishek Pal, Arpita Das, Saifuddin Mahmud, Awal Ahmed Fime:
Enhancing Firefighting Robot's Capability: A Comprehensive Implementation for Enhancing Firefighting Robot's Operations. 122-133 - M. I. R. Shuvo, Nafiul Alam, Awal Ahmed Fime, Ahmed Aziz Jaidane, Saifuddin Mahmud, Jong-Hoon Kim:
A Novel Framework for Collaborative Knowledge Sharing and Learning for Disaster Response Robots. 134-146 - Natalia Amat-Lefort
, Christiaan van Driel:
More Human, Less Bot: How Anthropomorphism Impacts User Experience in Customer Support Chatbots. 147-158 - Alicja Wróbel, Paulina Zguda
, Karolina Zróbek, Marie-Monique Schaper
, Pawel Gajewski
, Bipin Indurkhya
:
'I Prefer Robot Cats!' Reflections on Robot Animal-Like Morphology from an in-the-Wild Child-Robot Interaction Workshop. 159-170
Human Factors
- Muhammad Farooq Siddique
, Wasim Zaman, Niamat Ullah, Saif Ullah, Jong-Myon Kim:
Pipeline Leak Detection: Leveraging Acoustic Emission Signal Processing and Machine Learning. 173-184 - Adalberto Gámez-De-León, Javier Jiménez-Cabas
, Luis David Díaz-Charris
, Jorge Herrera Cuartas
:
Application of Machine Learning Techniques for Leak Detection in a Horizontal Pipeline Transporting a Water-Glycerol Mixture. 185-192 - M. Anees, Madhavi Ravikumar:
Connected Lives: Revolutionizing Health and Social Interaction with Wearable Technology in India. 193-202 - Islambek Saymanov, Sherzod Boltaev, Nodirbek Urinov
:
Online Monitoring System of Groundwater in the Aral Region Based on the Internet of Things. 203-217 - Aleksandr Kim, Sang-Joong Jung:
Enhancing Meal Search Engine for Fitness Applications Using Semantic Search with Sentence Transformers. 218-222 - Vikas Kumar Patel
, Anshul Verma, Pradeepika Verma:
Addressing Graphviz File Generation Issue in CPN Tools: A Java-Based Solution. 223-240 - Ysanne Yeo, Federico Trucchia:
What Does "Remote Driving" Mean for People: A Futurespective Design Approach. 241-253 - Laurie Marsman, Shiva Nischal Lingam
, Bart Klein Obbink, Jeanine Vlasblom, Rolf Zon
, Maykel van Miltenburg
:
Controller Adaptive Digital Assistant (CODA): Interim Conclusions on the Development of a New ATC System. 254-260 - Subi Hahn, Eui-Chul Jung
:
Reimagining the Utility of Dash Cam Data in Autonomous Travel Contexts: A Service Design Proposal. 261-266
Algorithms and Computer Vision
- Huynh Anh Khoa, Huynh Anh Duy, Phan Duy Hung
:
Keyframe Extraction Based on Large Vision Transformer Model and kNN-DBSCAN Clustering. 269-280 - Huynh Anh Duy, Huynh Anh Khoa, Phan Duy Hung
:
Improving Polyps Segmentation in Colonoscopy Images Using Modified UNet3 + Network. 281-292 - Vu Thanh Lam, Nguyen Duc Minh, Nguyen Ngoc Lan, Phan Duy Hung
:
Scheduling for Lecturers Using Genetic Algorithm with Fuzzy Constraints. 293-305 - Phan Nguyen Duc Hieu, Phan Duy Hung
:
No Code Computer Vision. 306-315 - Samyak Jain, Anshul Bhardwaj, Mohit Somani, Alka Kumari, Disha Goyal, Pritish Kumar Varadwaj:
Transfer Learning to Identify Multilingual Machine Genenrated Text. 316-324 - Nafiul Alam, Hannah Cho, M. I. R. Shuvo, Jong-Hoon Kim:
A Novel Preprocessing Method for Transforming Federal Sentencing Data to Ensure Unbiased AI Adjudication Research Using Large Language Models. 325-337
Human Factors in Cybersecurity
- Migle Abromaityte, Elise Dubero, Quintan Kruger, Benne Lucassen, Tessa Vos, Niek Jan van den Hout, Debby Bouma, Jan Treur
, Peter H. M. P. Roelofsma:
Computational Analysis of User Experience of Password-Based Authentication Systems. 341-352 - Ana Maria Briana Capra, Emil Dekker, Lielie Hoffman, Charlotte Hoffmans, Tristan Mueller, Niek Jan van den Hout, Jan Treur
, Peter H. M. P. Roelofsma:
Computational Analysis of Human Factors in Spear-Phishing Attacks: An Adaptive Network Model. 353-366 - Charlotte C. A. Hoffmans, Lisa van der Does, Merel van der Kolk, Timo van Rooyen, Nick Barelds, Jan Treur
, Peter H. M. P. Roelofsma:
Analysing the Rise of Biohacking in a Tech-Driven City: Assessing Risks Through Adaptive Network Modeling. 367-379 - Wissal Mestour, Niek Jan van den Hout, Jan Treur
, Peter H. M. P. Roelofsma:
An Adaptive Network Model to Analyse Cyber Security: Understanding Cyber Threats in Financial Institutions. 380-395 - Maria Ioana Andreea Ivan, Niek Jan van den Hout, Jan Treur
, Sophie C. F. Hendrikse
, Peter Roelofsma:
Understanding Insider Threats Behaviour: An Adaptive Network Model of the Evolution of an Insider Threat. 396-410 - Daneel Akers, Tanner Blomquist, Jan Niedziela, Samuel Sebok, Niek Jan van den Hout, Debby Bouma, Jan Treur
, Peter H. M. P. Roelofsma:
Organizational Response to APT Attacks: Computational Analysis by Behavioral Network Modelling. 411-425 - Sanjeev Kumar, Saurabh Bharti, Rajiv Singh, Kapil Kumar, Manju Khari:
Adversarial Attack Detection in Intrusion Detection System Using Machine Learning. 426-434 - Rohit Meda, Intekhab Alam
, Priyank Pandey, Renu Dalal, Manju Khari:
Enhancing Data Privacy with Lattice-Based Encryption Technique. 435-443 - Archana Singh, Dhiraj:
Improving Threat Recognition in X-ray Security Inspection Using Transformers. 444-455

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.