Abstract is missing.
- Automatic Detection of Cervical Region from VIA and VILI Images using Machine LearningAshutosh Kanitkar, Rutwik Kulkarni, Varun Joshi, Yash Karwa, Sanjyot Gindi, Geetanjali Vinayak Kale. 1-6 [doi]
- Lexi-Augmenter: Lexicon-Based Model for Tweets Sentiment AnalysisSaud Alashri, Sultan Alzahrani, Muneera Alhoshan, Imaan Alkhanen, Sara Alghunaim, Manal Alhassoun. 7-10 [doi]
- Ubiquitous RESTful Smart Home Energy Management SystemBhagya Nathali Silva, Murad Khan, Kyuchang Lee, Yongtak Yoon, Diyan Muhammad, Jihun Han, Kijun Han. 11-15 [doi]
- Test4Deep: an Effective White-Box Testing for Deep Neural NetworksJing Yu, Yao Fu, Yanan Zheng, Zheng Wang, Xiaojun Ye. 16-23 [doi]
- Evolutionary Computation for Optimal LQR Weighting Matrices for Lower Limb Exoskeleton Feedback ControlJatin Gupta, Rituparna Datta, Arun Kumar Sharma, Aviv Segev, Bishakh Bhattacharya. 24-29 [doi]
- Identification of Electric Power Consumption Patterns in Relation to Standard Load ProfilesKseniia Sinitsyna, Anton Petrochenkov, Bernd Krause. 30-35 [doi]
- Opinion Mining Using Live Twitter DataAndleeb Aslam, Usman Qamar, Reda Ayesha Khan, Pakizah Saqib, Aleena Ahmad, Aiman Qadeer. 36-39 [doi]
- The Effect of High Performance Computer on Deep Learning: A Face Expression Recognition CaseXin Zhang, Francisco Reveriano, Jiang Lu, Xingang Fu, Ting Zhang. 40-42 [doi]
- ISI Mitigation Using Three Taps FIR Zero-Forcing Technique for Diffusion-Based Molecular CommunicationsMohammed S. Alzaidi, Walid K. M. Ahmed, Victor B. Lawrence. 43-47 [doi]
- Efficient Co-Channel Interference Suppression by Hybrid of a Binomial Array and Uniform Linear ArraySolomon Teshome Girma, Dominic B. O. Konditi, Ciira Maina. 48-56 [doi]
- Infrared Uplink Design for Visible Light Communication (VLC) Systems with Beam SteeringOsama Zwaid Alsulami, Mohammed T. Alresheedi, Jaafar M. H. Elmirghani. 57-60 [doi]
- An Open Source Map Optimization Platform for Efficient NavigationLiangming Cai, Rituparna Datta, Yurong Li, Jingshan Huang, Chunqiang Chen, Xiaoling Wang, Shurui Lin, Kai Cheng, Jiefeng Huang, Jinping Jiang, Minchen Zhu, Min Du. 61-65 [doi]
- Design and Implementation of Shipping Video Surveillance Equipment Based on Raspberry PiXiao Zeng, Hong Guo, Wei Hu. 66-70 [doi]
- An Automatic Remote Monitoring System for Large NetworksDaiana Tomescu, Adelaida Heiman, Alina Badescu. 71-73 [doi]
- Driver Dangerous State Detection Based on OpenCV & Dlib Libraries Using Mobile Video ProcessingIgor Lashkov, Alexey M. Kashevnik, Nikolay Shilov, Vladimir Parfenov, Anton I. Shabaev. 74-79 [doi]
- The Effect of Contents and Available Viewpoints on QoE of Multi-view Video and Audio over WebRTCToshiro Nunome, Ryota Miyazaki. 80-85 [doi]
- V-PSC: A Perturbation-Based Causative Attack Against DL Classifiers' Supply Chain in VANETYi Zeng, Meikang Qiu, Jingqi Niu, Yanxin Long, Jian-xiong, Meiqin Liu. 86-91 [doi]
- Using Current Draw Analysis to Identify Suspicious Firmware Behavior in Solid State DrivesRyan McDowell, Ryan N. Rakvic, Hau T. Ngo, T. Owens Walker, Robert W. Ives, Dane Brown. 92-97 [doi]
- Using Software Metrics for Predicting Vulnerable Code-Components: A Study on Java and Python Open Source ProjectsTai-Yin Chong, Vaibhav Anu, Kazi Zakia Sultana. 98-103 [doi]
- A Sequential Study of Emotions through EEG using HMMRahul Kumar Chaurasiya, Shourya Shukla, Tirath Prasad Sahu. 104-109 [doi]
- Multi-tasks Biometric System for Personal IdentificationOmneya Attallah. 110-114 [doi]
- Brain Signal Authentication for Human-Computer Interaction in Virtual RealitySukun Li, Sonal Savaliya, Leonard Marino, Avery Leider, Charles C. Tappert. 115-120 [doi]
- A Comparative Performance Study of Electrocardiogram-Based Human Identity RecognitionMeng Chen, Ye-Feng Li, Shu-Di Bao, Ye-Jiao Zhang. 121-126 [doi]
- Fully CNN-Based Pixel Level Classification Model for Urban Land Image Acquired by Unmanned Aerial VehicleYanqi Li, Jianzhou Liu, Shaoming Zhi. 127-132 [doi]
- Depth-Wise Based Convolutional Neural Network for Street Imagery Digit Number ClassificationOkeke Stephen, Young Jick Jang, Tae Soo Yun, Mangal Sain. 133-137 [doi]
- Generative Pseudorehearsal Strategy for Fault Classification Under an Incremental LearningSubin Lee, Jun-Geol Baek. 138-140 [doi]
- Deinterleaving Radar Pulse Train Using Neural NetworksAlex Erdogan, Kiran George. 141-147 [doi]
- LYRA: an Interactive and Interactive StorytellerDa Hyeon Choi. 148-153 [doi]
- Participatory AI: Reducing AI Bias and Developing Socially Responsible AI in Smart CitiesGregory Falco. 154-158 [doi]
- Reliable Component Instance for Multi-tenant Software as a Service ApplicationM. D. Samrajesh, K. K. Viswanathan. 159-164 [doi]
- A Protocol Independent Approach in Network Covert Channel DetectionMd. Ahsan Ayub, Steven Smith, Ambareen Siraj. 165-170 [doi]
- An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret SharingMangal Sain, Ki Hwan Kim, Young-Jin Kang, Hoon Jae Lee. 171-175 [doi]
- A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and MetricsKazi Zakia Sultana, Tai-Yin Chong. 176-181 [doi]
- A Privacy-Aware Framework for Friend Recommendations in Online Social NetworksMona Alkanhal, Bharath K. Samanthula. 182-187 [doi]
- Anomaly Detection for Power Grid Based on Time Series ModelLizong Zhang, Xiang Shen, Fengming Zhang, Minghui Ren, Binbin Ge, Bo Li. 188-192 [doi]
- Anomaly Detection Using Dynamic Time WarpingDiab M. Diab, Basil AsSadhan, Hamad Binsalleeh, Sangarapillai Lambotharan, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir. 193-198 [doi]
- Modeling the Parallel Efficiency of Density Functional Theory Based Jobs on Sunway TaihuLightYurui Wang, Zhihui Du, Jun Jiang, Baokun Lu, Chongyu Wang. 199-204 [doi]
- Embedded Partitioning Real-Time Operating System Based on MicrokernelTanhong Chen, Huiyong Li, Jianwei Niu 0002, Tao Ren, Guizhou Xu. 205-210 [doi]
- iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS DevicesJunqiu Liu, Fei Wang, Shuang Zhao, Xin Wang, Shuhui Chen. 211-218 [doi]
- Search Prevention with Captcha Against Web Indexing: A Proof of ConceptDonghoon Kim, Luke Sample. 219-224 [doi]
- Intelligent In-Vehicle Safety and Security Monitoring System with Face RecognitionXiaodi Fu, Jiang Lu, Xin Zhang, Xiaokun Yang, Ishaq Unwala. 225-229 [doi]
- Univiariate Signal Preprocessing Methodology for Fault Detection in Semiconductor Manufacturing ProcessKyuchang Chang, Jun-Geol Baek. 230-232 [doi]
- Estimation of the Spouting Time by the Mathematical Model That Describes the Periodic Spouting of a Geyser Induced by BoilingHiroyuki Kagami. 233-236 [doi]
- A Method of Educational Quality Administration Based on Hyper Meta OntologySungEn Kim, KeeHong Ahn, Sukyoung Kim. 237-242 [doi]
- Quality Framework for Ontologies Evaluation Based on Structural CharacteristicsReda Ayesha Khan, Usman Qamar, Andleeb Aslam, Pakizah Saqib, Aleena Ahmad. 243-248 [doi]
- Cloud Based Algorithm for Task ManagementParvizsho Aminov, Navjot Bola, Dipti Shiralkar, Meghana Yoganarasimha. 249-253 [doi]
- A Novel Memetic Algorithm Incorporating Greedy Stochastic Local Search Mutation for Course SchedulingSeba Susan, Aparna Bhutani. 254-259 [doi]
- Integrated Genetic Algorithm and Artificial Neural NetworkNasim Nezamoddini, Amirhosein Gholami. 260-262 [doi]
- Segmented Dynamic Time Warping Based Signal Pattern ClassificationJae Yeol Hong, Seung Hwan Park, Jun-Geol Baek. 263-265 [doi]
- Possibility of HPC Application on Cloud Infrastructure by Container ClusterKyunam Cho, Hyunseok Lee, Kideuk Bang, Sungsoo Kim. 266-271 [doi]
- Low-Latency Trading in the Cloud EnvironmentAndrew Addison, Ari Krish, Ryan Prins, Larry Ryan, Nicole Villette, Charles Andrews, Newas Azad, Daniel Bardsley, John Bauman, Jeffrey Diaz, Tatiana Didik, Komoliddin Fazliddin, Maria Gromoa. 272-282 [doi]
- A Hybrid Cloud for Data Analytics in Electrical Substation Condition Monitoring SystemsJack Slater, Alan Nesbitt, Gordon Morison, Philip Boreham. 283-288 [doi]
- Comparative Analysis of Hadoop Security Ad-OnsKhushbu Khalid Butt, Guo-hui Li, Muhammad Obaid Ur Rehman. 289-293 [doi]
- A Case Study of Anomaly Detection in Industrial EnvironmentsJianfeng Zou, Xueqi Jin, Lei Zhang, Yueqiang Wang, Bo Li. 294-298 [doi]
- Design and Implementation of Campus Service System Platform Based on Big DataHonglei Zheng, Hong Guo. 299-302 [doi]
- Financial Quantitative Big Data Platform Based on High Performance ComputingYongze Sun, Zhonghua Lu. 303-307 [doi]
- Secure Staging System for Highly Confidential Data Built on Reconfigurable Computing PlatformTakashi Yoshikawa, Susumu Date, Yasuhiro Watashiba, Yuki Matsui, Kazunori Nozaki, Shinya Murakami, Chonho Lee, Masami Hida, Shinji Shimojo. 308-313 [doi]
- A Synthesis of Big Data Definition and CharacteristicsMonerah Al-Mekhlal, Amir A. Khwaja. 314-322 [doi]
- Forensic Analysis of Cloud Virtual EnvironmentsArt Sedighi, Doug Jacobson. 323-329 [doi]
- The Security Risks of Cloud ComputingMyeonggil Choi. 330 [doi]
- Human-AI Symbiosis: Decode Climate Change to Prevent Heat-Related Mortalities and to Protect Our Most Vulnerable PopulationAnitha Ilapakurti, Sharat Kedari, Rajasekar Vuppalapati, Santosh Kedari, Jaya Shankar Vuppalapati, Chandrasekar Vuppalapati. 331-338 [doi]
- Emotional Health: A Data Driven Approach to Understand our Emotions and Improve our HealthChandrasekar Vuppalapati, Sharat Kedari, Anitha Ilapakurti, Santosh Kedari, Jaya Shankar Vuppalapati. 339-347 [doi]
- (Poster) Parallel and Distributed Operation of Smart Grid with Pulsed Power TransmissionHisayoshi Sugiyama. 348 [doi]
- Identification of Expectancy, Proximity, and Compatibility of the Bengali LanguageNusrat Jahan, Rakib Ul Haquey, Aloke Kumar Saha, Muhammad F. Mridha, Md. Abdul Hamid. 349-354 [doi]
- UltraGroup: Towards Deploying MobileNet to Ultra-Resource-Bounded Edge DevicesJihe Wang, Huang Shu, Jiaxiang Zhao, Danghui Wang. 355-360 [doi]
- A Geographic Routing Strategy with DTN Support for Vehicular Named Data NetworkingBassma Aldahlan, Zongming Fei. 361-366 [doi]
- Reducing Cost and Time-to-Market on Supporting Driver Assistance Systems to Avoid Rear-end Collisions in Vehicles TrafficRodrigo Da Rosa Righi, Alexandre Lima Santana, Cristiano André da Costa, Rafael Kunst, Guilherme Goldschmidt, Dhananjay Kim, Madhusudan Singh. 367-372 [doi]
- A Subjectivity-Aware Algorithm for Label Aggregation in CrowdsourcingMing Wu, Qianmu Li, Shuo Wang, Jun Hou. 373-378 [doi]
- Development of a Smart Seat Cushion for Heart Rate Monitoring Using BallistocardiographyAhmed Raza Malik, Laurel Pilon, Jennifer Boger. 379-383 [doi]
- Enhancements in Anomaly Detection in Body Sensor NetworksRuth Sandra Harry, Raymond Joseph. 384-389 [doi]
- KLog-Home: A Holistic Approach of In-Situ Monitoring in Elderly-Care HomeByounghyun Yoo, Shapna Muralidharan, Chanwoong Lee, Jia Lee, Heedong Ko. 390-396 [doi]
- Disruptive IoT-Based Healthcare Insurance Business ModelMariam Al Nuaimi, Farag Sallabi, Mamoun Awad, Khaled Shuaib. 397-403 [doi]
- Troubleshooting Test Method Based on Industrial Control Grammar ModelJunhui Cai, Qianmu Li, Yini Chen, Yaozong Liu, Yi Xia, Sajjad Rahmany. 404-409 [doi]
- A Comprehensive Study on Knowledge Management Applied to Embedded System Testing ProcessesGabriel Habib Medeiros Oliveira, Renan Fonteles Albuquerque, Adriano Bessa Albuquerque. 410-418 [doi]
- Internet Advertising Investment Analysis Based on Beijing and Jinhua Signaling DataSong Xia, Hao Jiang, Yi Zhang, Duo Peng. 419-426 [doi]
- An Innovative Queue Management System Based on Bluetooth Beacon TechnologyChi-Yi Lin, Guan-Ying Jhu, Siang Siao. 427-430 [doi]
- Fusion Learning Model for Embedded Face Safe Detection and Facial Gesture AnalysisTian Qiu, Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long, Yaozong Liu. 431-435 [doi]
- An Adaptive Abnormal Behavior Detection using Online Sequential LearningRei Ito, Mineto Tsukada, Masaaki Kondo, Hiroki Matsutani. 436-440 [doi]
- Safe Facial Multi-Attribute Feature Fusion Analysis Based on Embedded Multi-Task LearningHaibo Liu, Qianmu Li, Shunmei Meng, Zhenbang Rong. 441-446 [doi]
- Activity Forecasting in Routine Tasks by Combining Local Motion Trajectories and High-Level Temporal ModelsYanxia Zhang, Andreas Girgensohn, Yulius Tjahjadi. 447-452 [doi]
- Scheduling of Two-Phase Mixed-Criticality Systems on Memory Shared Multi-Core PlatformsZheng Li. 453-458 [doi]
- Evaluating the Soft Error Resilience of Instructions for GPU ApplicationsXiaohui Wei, Ruyu Zhang, Yuanyuan Liu, Hengshan Yue, Jingweijia Tan. 459-464 [doi]
- Side-Channel Analysis for Searchable Encryption System and its Security EvaluationMasaya Yoshikawa, Yusuke Nozaki. 465-469 [doi]
- A Differential Privacy Random Forest Method of Privacy Protection in CloudChaoxian Lv, Qianmu Li, Huaqiu Long, Yumei Ren, Fei Ling. 470-475 [doi]
- CANDY CREAM - Hacking Infotainment Android Systems to Command Instrument Cluster via Can Data FrameGianpiero Costantino, Ilaria Matteucci. 476-481 [doi]
- Secured Cyber-Attack Signatures Distribution using Blockchain TechnologyOluwaseyi Ajayi, Melvin Cherian, Tarek N. Saadawi. 482-488 [doi]
- A Stable Task Assignment Scheme in CrowdsourcingXiao Chen. 489-494 [doi]
- Quantitative Evaluation of TUG Test with IMU and sEMG Sensors in Wearable Device (Poster)Min-Kyu Kim, Dong-Jun Park, Jun-Woo Lee, Se Jin Ahn, Myung Jun Shin. 495 [doi]
- Quantification of Hand Motor Disturbance in Parkinson's Patients using sEMG Sensor (Poster)Dong-hyun Lee, Dong-Jun Park, Myung-Jun Lee, Se Jin Ahn, Weui-Bong Jeong. 496 [doi]
- Wearable IMU Sensor for Monitoring Hand Motion Disorder in Parkinson's Patients (Poster)Dong-Jun Park, Jun-Woo Lee, Myung-Jun Lee, Se Jin Ahn, Weui-Bong Jeong. 497 [doi]
- Experimental Verification of Security Measures in Industrial EnvironmentsZhijun Zhao, Zhengwei Jiang, Yueqiang Wang, Guoen Chen, Bo Li. 498-502 [doi]