Abstract is missing.
- Tutorial: Smart cities activities in Vietnam and review of ICT enabling technologiesDinh Van Dzung. [doi]
- Metric of vulnerability at the base of the life cycle of software representationsMikhail Buinevich, Konstantin E. Izrailov, Andrei Vladyko. 1-8 [doi]
- Achieving fair cell-edge performance: Low-complexity interference coordination in OFDMA networksSunghyun Kim, Hye-Kyung Jwa, Jung-Mo Moon, Jee-hyeon Na. 6-11 [doi]
- Size-miniaturized half-mode substrate integrated waveguide bandpass filter incorporating E-shaped defected ground structure for wideband communication and radar applicationsChencong Wang, Zijun Wang, Yong-mao Huang. 12-16 [doi]
- Obstacles effects on signal attenuation in line of sight for different environments in V2V communicationMohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Young-Jin Kang, Hoon Jae Lee. 17-20 [doi]
- A study on the fabrication and evaluation of the MEMS based FBAR filter for wireless systemsEun-Kyu Lee, Chae-Soo Kim, Jae-Joong Kim, Hyung Rim Choi. 21-24 [doi]
- Global optimization of neural networkChae-Young Lee, Yeon Jun Lim, Taeseon Yoon. 25-28 [doi]
- Non-invasive blood pressure estimation from photoplethysmography signals using artificial neural networksNicolas Bersano, Horacio Sanson. 29-35 [doi]
- Shot category detection based on object detection using convolutional neural networksDeokkyu Jung, Jeong Woo Son, Sun-Joong Kim. 36-39 [doi]
- Classifying malware using convolutional gated neural networkChang Hoon Kim, Espoir K. Kabanga, Sin-Jae Kang. 40-44 [doi]
- Detection of rail surface defects based on CNN image recognition and classificationLidan Shang, Qiushi Yang, Jianing Wang, Shubin Li, Weimin Lei. 45-51 [doi]
- Multiple main user recognitionHye-Jin S. Kim, Il-Kwon Jeong. 59-62 [doi]
- Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPSNishat I. Mowla, Inshil Doh, Kijoon Chae. 63-67 [doi]
- A systematic review of features identification and extraction for behavioral biometrie authentication in touchscreen mobile devicesSami Abduljalil Abdulhak, Ala Abdulhakeem Abdulaziz. 68-73 [doi]
- Accelerate the paillier cryptosystem in CryptDB by Chinese Remainder TheoremLiu Yao, Shuai Xue. 74-77 [doi]
- A productivity improvement of distributed software testing using checkpointBhuridech Sudsee, Chanwit Kaewkasi Kaewkasi. 78-84 [doi]
- Accelerating a radio astronomy correlator on FPGAShuaizhi Guo, Linlin Zheng, Xi Jin. 85-89 [doi]
- Load distribution method using multicore based NIC for high-performance computing systemJae-Woo Ahn, Jong-Beom Kim, Won-Suk Choi, Jong-Oh Kim, Seong Gon Choi. 90-93 [doi]
- Design of multicore-based high performance load distribution systemJoon Yeol Yoon, Won-Seok Choi, Jong-Oh Kim, Jae-Woo Ahn, Jong-Beom Kim, Seong Gon Choi. 94-97 [doi]
- Design of a 2.4 GHz high-performance mixer with current bleeding topologyWah Ching Lee, Kim Fung Tsang. 98-103 [doi]
- An approach to evaluating the number of potential cycles in an all-one base matrixSheng Jiang, Francis C. M. Lau 0002. 104-108 [doi]
- Duality of I/Q imbalance in RF mixer: Application to the L1-norm based estimation and generalization to the SVD based modelEalwan Lee. 109-112 [doi]
- Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sinkPhan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam. 113-119 [doi]
- An algorithm to calculate phase and amplitude of tag on RFID protocol conformance test systemNa Wang, Ying Xu, Yajun Zhang, Meng Liu, Daxue Shen, Hongjun Wang. 120-126 [doi]
- General labelled data generator framework for network machine learningKwihoon Kim, Yong-Geun Hong, Youn-Hee Han. 127-131 [doi]
- SvgAI - Training artificial intelligent agent to use SVG editorAnh H. Dang, Wataru Kameyama. 132-138 [doi]
- A classification approach with different feature sets to predict the quality of different types of wine using machine learning techniquesSatyabrata Aich, Ahmed Abdulhakim Al-Absi, Kueh Lee Hui, John-Tark Lee, Mangal Sain. 139-143 [doi]
- Bitcoin price prediction using machine learningSiddhi Velankar, Sakshi Valecha, Shreya Maji. 144-147 [doi]
- Grading image retrieval based on CNN deep featuresY. W. Luo, Y. Li, F. J. Han, S. B. Huang. 148-152 [doi]
- The static analysis of WannaCry ransomwareShou-Ching Hsiao, Da-Yu Kao. 153-158 [doi]
- The dynamic analysis of WannaCry ransomwareDa-Yu Kao, Shou-Ching Hsiao. 159-166 [doi]
- Protecting end-device from replay attack on LoRaWANWoo-Jin Sung, Hyeong-Geun Ahn, Jong-Beom Kim, Seong Gon Choi. 167-171 [doi]
- IoT security vulnerability: A case study of a Web cameraYogeesh Seralathan, Tae Tom Oh, Suyash Jadhav, Jonathan Myers, Jaehoon Paul Jeong, Young-Ho Kim, Jeong Neyo Kim. 172-177 [doi]
- A deep auto-encoder based approach for intrusion detection systemFahimeh Farahnakian, Jukka Heikkonen. 178-183 [doi]
- TSSA: A two step scheduling algorithm for the event-driven clustersYu Chen, Mingming Sun. 184-189 [doi]
- Hybrid cloud computing for user location-aware augmented reality constructionMing-Shen Jian, Yi-Chang Wang, Bo-Han Wu, Yu-En Cheng. 190-194 [doi]
- Outage performance analysis of IHDAF cooperative based communication systemJianghao Li, Zhiquan Bai, Haixia Zhang 0001, Yingchao Yang, Shangqian Sun, Tao Han 0001, Kyungsup Kwak. 195-200 [doi]
- Cloud based agriculture safety inspection with multiple standard sourcesMing-Shen Jian, Hao-Yi Xu, Jenn-Feng Sheen, Yi-Ling Ye. 201-206 [doi]
- Efficient partitioner for distributed OLTP DBMSWenkang Chen. 207-210 [doi]
- User-side evil twin attack detection using time-delay statistics of TCP connection terminationEn-Chun Kuo, Ming-Sang Chang, Da-Yu Kao. 211-216 [doi]
- Android based advanced attendance vigilance system using wireless network with fusion of bio-metric fingerprint authenticationHamim Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman. 217-222 [doi]
- Experimental assessment of battery lifetime for commercial off-the-shelf NB-IoT moduleChun Yeow Yeoh, Abdullah bin Man, Qazi Mamoon Ashraf, Ahmad Kamsani Samingan. 223-228 [doi]
- Customized embedded system design for lower limb rehabilitation patientsChae-Eun Lee, Inn-chae Yeo, Inshil Doh. 229-233 [doi]
- Channel measurements and characterizations for automobile factory environmentsLiu Liu 0001, Ke Zhang, Cheng Tao 0001, Kun Zhang, Ze Yuan, Jianhua Zhang. 234-238 [doi]
- Associating risks of getting strokes with data from health checkup records using Dempster-Shafer TheorySergio Peñafiel, Nelson Baloian, José A. Pino, Jorge Quinteros, Alvaro Riquelme, Horacio Sanson, Douglas Teoh. 239-246 [doi]
- Statistical traffic generation methods for urban traffic simulationHyewon Song, Okgee Min. 247-250 [doi]
- ECPS: An application-specific VM scheduler basing on CPU pool mechanism for big data environmentXiaodong Liu, Jian Li. 251-255 [doi]
- EEG-signals based cognitive workload detection of vehicle driver using deep learningMohammad A. Almogbel, Anh H. Dang, Wataru Kameyama. 256-259 [doi]
- String Vector based KNN for text categorizationTaeho Jo 0001. 260-265 [doi]
- Combine method of forecasting VANET cybersecurity for application of high priority wayMikhail Buinevich, Konstantin E. Izrailov, Ekaterina Stolyarova, Andrei Vladyko. 266-271 [doi]
- The real-time session inspection method using heartbeat signalJong-Beom Kim, Hyeon Yang, Kyeong Ho Park, Si-Young Lee, Seong Gon Choi. 272-276 [doi]
- QAT: Evaluation of a dedicated hardware accelerator for high performance web serviceXue Shuai, Liu Yao, Zhang Wang. 277-280 [doi]
- A quantum secure direct communication protocol based on six-qubit cluster stateDanJie Song, Chun Long, Wei Wan, Jing Zhao, Shaojie Wang. 281-287 [doi]
- Joint optimal channel allocation, interface assignment and routing in multi-hop wireless networksJie Wu 0025, Hongchun Li, Yi Xu, Jun Tian. 288-293 [doi]
- Energy efficient IoT based on wireless sensor networksYoungbok Cho, Minkang Kim, Sunghee Woo. 294-299 [doi]
- Driving information logger with in-vehicle communication for autonomous vehicle researchKyungbok Sung, KyoungWook Min, JeongDan Choi. 300-302 [doi]
- Opportunistic computational offloading system for clusters of dronesRico Valentino, Woo-Sung Jung, Young-Bae Ko. 303-306 [doi]
- Driver-adaptive vehicle interaction system for the advanced digital cockpitJin-Kyu Choi, Kyongho Kim, Dohyun Kim, HyunKyun Choi, Byungtae Jang. 307-310 [doi]
- End to end performance analysis of relay cooperative communication based on parked carsYingying Sun, Lijun Wang, Zhiquan Bai, Kyung Sup Kwak, Xuming Yao, Tao Han. 311-317 [doi]
- Cosine similarity based bit to symbol-and-antenna mapping in spatial modulation systemNa Zhang, Zhiquan Bai, Qi Zhang, Anyang Liu, Shangqian Sun, Kyungsup Kwak. 318-322 [doi]
- Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropperTran Dinh Hieu, Tran Trung Duy, Seong Gon Choi. 323-328 [doi]
- Practical incremental network coding for multimedia content deliveryPhuc Chau, Toan Duc Bui, Yongwoo Lee, Jitae Shin. 329-332 [doi]
- Protocols and use cases for media independent management in SDN-based wireless access networksHyeong Ho Lee, Yun Chul Choi, Byung Jun Ahn, Jin Seek Choi. 333-339 [doi]
- Diagnostic test suggestion via Bayesian network of non-expert assisted knowledge baseJorge Quinteros, Nelson Baloian, José A. Pino, Alvaro Riquelme, Sergio Peñafiel, Horacio Sanson, Douglas Teoh. 340-346 [doi]
- Rank selection of CP-decomposed convolutional layers with variational Bayesian matrix factorizationMarcella Astrid, Seung-Ik Lee, Beom-Su Seo. 347-350 [doi]
- A case study on scene recognition using an ensemble convolution neural networkBongJin Oh, Junhyeok Lee. 351-353 [doi]
- 3D convolutional neural networks for soccer object motion recognitionJi Won Lee, Yoonhyung Kim, Minki Jeong, Changick Kim, Do-Won Nam, Jungsoo Lee, Sung-Won Moon, Wonyoung Yoo. 354-358 [doi]
- Self-learning mechanism for prediction of energy consumption and generationTai-Yeon Ku, Wan-Ki Park, Hoon Choi. 359-362 [doi]
- Forensic analysis of network packets from penetration test toolkitsDa-Yu Kao, Yu-Siang Wang, Fu-Ching Tsai, Chien-Hung Chen. 363-368 [doi]
- The flow-reduced malware detection system by controlling inactive/active timeoutJae Kyu Lee, Hyeon Yang, Kyeong Ho Park, Si-Young Lee, Seong Gon Choi. 369-372 [doi]
- Development trend of insider anomaly detection systemMinkyu Kim, Kihwan Kim, Hoonjae Lee. 373-376 [doi]
- A study on detection of anomaly behavior in automation industrySuMi Ryu, Young-Jin Kang, Hoonjae Lee 0001. 377-380 [doi]
- A PCA-based method for IoT network traffic anomaly detectionDang-Hai Hoang, Ha Duong Nguyen. 381-386 [doi]
- Trust management for SOA based social WoT systemSabeen Javaid, Hammad Afzal, Fahim Arif, Naima Iltaf. 387-392 [doi]
- Smart traffic management system using Internet of ThingsSabeen Javaid, Ali Sufian, Saima Pervaiz, Mehak Tanveer. 393-398 [doi]
- IoT-based medical control systemJames K. Tamgno, Ndeye Rokhaya Diallo, Claude Lishou. 399-404 [doi]
- Recent challenges, trends, and concerns related to IoT security: An evolutionary studyChalee Vorakulpipat, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, Dang-Hai Hoang. 405-410 [doi]
- Channel modeling and analysis of ULA massive MIMO systemsXudong Cheng, Yejun He. 411-416 [doi]
- A physical layer security-based routing protocol in mobile ad-hoc wireless networksKyusung Shim, Tri Nhu Do, Beongku An. 417-422 [doi]
- Compressed QR code-based mobile voice guidance service for the visually disabledJung Hoon Kim, Minseo Kim, Taejun Yang, Insu Kim, Jun Seo, Summoo Kang. 423-425 [doi]
- Performance enhancement for co-channel interference cancellation with smart antenna and power adaptive in cooperative communicationWuttipan Duangsri, Mongkol Somrobru, Nikorn Sutthisangiam. 426-431 [doi]
- Accurate radio coverage assessment methods: Investigation of mobile networks based on subscribers mobile phonesYendoutie Nakorgou, Antoine Gnansounou, Ahmed Dooguy KORA, Mbemba Hydara. 432-437 [doi]
- String vector based KNN for text categorizationTaeho Jo 0001. 438-443 [doi]
- Story creation and design algorithm in unityWoohyun Park, Kinam Park. 444-447 [doi]
- Applying business intelligence technology for equipment maintenance and repair plan of telecommunications services providerSasiwimon Tanphet, Paweena Wanchai. 448-453 [doi]
- Making learning fun: Educational concepts & logics through gameAbdulaziz Alsubaie, Mohammed Alaithan, Muath Boubaid, Noor Zaman. 454-459 [doi]
- A comparative study on preprocessing methods for object tracking in sports eventsSung-Won Moon, Ji Won Lee, Do-Won Nam, Wonyoung Yoo, Wonjun Kim 0001. 460-462 [doi]
- Secure medical image-sharing mechanism based on visual cryptography in EHR systemDana Yang, Inshil Doh, Kijoon Chae. 463-467 [doi]
- Classification of Exploit-Kit behaviors via machine learning approachSukritta Harnmetta, Sudsanguan Ngamsuriyaroj. 468-473 [doi]
- Cyber crime trend in Bangladesh, an analysis and ways out to combat the threatShusmoy Kundu, Khandaker Annatoma Islam, Tania Tahmina Jui, Suzzana Rail, Md. Afzal Hossain, Ishraq Haider Chowdhury. 474-480 [doi]
- Proposing secure and lightweight authentication scheme for IoT based E-health applicationsMaria Almulhim, Noor Zaman. 481-487 [doi]
- Method of reliable MPTCPJongkuk Lee, HeaSook Park. 488-491 [doi]
- Dynamic equilibrium capacity across multiple regions in NFV environmentHai Nguyen Dinh, Sang-Il Kim, Hwa-sung Kim. 492-498 [doi]
- LDA based classification of video surveillance sequences using motion informationAbdou Khadre Diop, Serban Meza, Mihaela Gordan, Aurel Vlaicu. 499-502 [doi]
- HPSRouter: A high performance software router based on DPDKZongyao Li. 503-506 [doi]
- 5G framework based on multi-level edge computing with D2D enabled communicationAbdelhamied A. Ateya, Ammar Muthanna, Andrey Koucheryavy. 507-512 [doi]
- Study on energy consumption and coverage of hierarchical cooperative of small cell base stations in heterogeneous networksXuming Yao, Yingying Sun, Tao Han. 513-518 [doi]
- Global ranking of heterogeneous mobile network coverageMbemba Hydara, AhmedDooguy Kora, Antoine Gnansounou. 519-526 [doi]
- Analysis of path loss about radio duct phenomenon with atmospheric refractive index informationJinhyung Oh, Jong-Ho Kim, Young-Jun Chong. 527-530 [doi]
- Advanced LTE network deployment methodology: A case study for Dakar regionAntoine Gnansounou, Samuel Ouya, Raimy Abd. Toure. 531-536 [doi]
- Theme-related keyword extraction from free text descriptions of image contents for taggingJoonmyun Cho, Yoon-Seop Chang, Sung-Ho Lee. 537-541 [doi]
- Automated vehicle parking system and unauthorized parking detectorIshraq Haider Chowdhury, Afsana Abida, Md. Mehedi Hasan Muaz. 542-545 [doi]
- The gesture recognition technology based on IMU sensor for personal active spinningMi-Seon Kang, Hyun Woo Kang, Cheolhyo Lee, Kiyoung Moon. 546-552 [doi]
- An assessment framework for smart manufacturingSangkeun Yoo, Yong-Woon Kim, Hoon Choi. 553-555 [doi]
- Implementation and performance evaluation of 256-QAM in vienna system level simulatorIgor Kim, Jung-Sun Um, Seungkeun Park. 556-559 [doi]
- Web services for mobile devices from one serverMirsat Yesiltepe. 560-566 [doi]
- A study on the establishment of open source website for open smart broadcast platformSang Kwon Kim, Deokkyu Jung, Sang-Yun Lee, Sun-Joong Kim. 567-570 [doi]
- Video scene title generation based on explicit and implicit relations among caption wordsJeong Woo Son, Wonjoo Park, Sang-Yun Lee, Sun-Joong Kim. 571-573 [doi]
- Force-directed Voronoi-based method for graph drawing in constrained boundariesFernando Wong, Horacio Sanson. 574-581 [doi]
- Proposal of value-added service based on real-time automatic content recognitionDonghwan Shin 0002, Jonguk Choi. 582-584 [doi]
- Using standardization for fair data evaluationKyongho Cho, Taeseon Yoon, Sunghee Park, Dohyeon Park. 585-589 [doi]
- Ultimate performance of Wi-Fi access points with multiple interfaces: An application of software defined networkYu-Ju Lee, Wen-Wei Liao. 590-594 [doi]
- The architecture of multi media multi path systemByung-Yun Lee, Hea-Sook Park. 595-599 [doi]
- An SDN framework for video conference in inter-domain networkTeerawut Banchuen, Kiattikun Kawila, Kultida Rojviboonchai. 600-605 [doi]
- ICT enabling technologies for smart citiesDzung Van Dinh, Byeong-Nam Yoon, Hung Ngoc Le, Uy Quoc Nguyen, Khoa Dang Phan, Lam Dinh Pham. 606-611 [doi]
- UL coverage enhancement for massive machine type communication in 5GDongyang Wang, Qingping Shi. 612-617 [doi]
- Design and implementation of optical transport network models with path computationChang-Gyu Lim, Moonsub Song. 618-621 [doi]
- Demonstration of digital optical D flip flop based on photonic micro-ring resonatorLaw Foo Kui, M. Rakib Uddin. 622-624 [doi]
- Data alignment for multi-channel high-speed interfaces using PRBS patternsSeung Woo Lee, In Ki Hwang, Hun-sik Kang. 625-627 [doi]
- Analysis of coupling coefficient and crosstalk in a homogenous multicore optical fiberAzruph Islam Badhon, Homira Asima Prapty, Khairul Bin Amin, Md. Afzal Hossain. 628-633 [doi]
- A pipelined division for fixed operation using user-defined floating pointPengfei Yang, Daolu Zha, Xi Jin. 634-637 [doi]
- A nonlinear decision tree based classification approach to predict the Parkinson's disease using different feature sets of voice dataSatyabrata Aich, Kim Younga, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain. 638-642 [doi]
- Proposal for a universal access solution to care in rural areas: Case of SenegalKéba Gueye, Ngartabe Kag-Teube, Samuel Ouya, Davy Edgard Moussavou. 643-646 [doi]
- Factors affecting the successful implementation of hospital information system: A preliminary pilot study of Iranian nursesShahab Rezaian, Harhodin Bin Salamat, Reza Malekzadeh, Rasimah Chemohd Yusoff, Najaf Zare. 647-651 [doi]
- Sensing system and sensing method of passive patch interface for gathering bioinformationTae-Gyu Lee. 652-655 [doi]
- Augmented reality services of photos and videos from filming sites using their shooting locations and attitudesYoon-Seop Chang, Seong Ho Lee, Joonmyun Cho. 656-660 [doi]
- Clip recommendation based on topic similarityWonjoo Park, Jeong Woo Son, Sang-Yun Lee, Sun-Joong Kim. 661-663 [doi]
- Scene-based metadata generation and open API provisioning method for smart broadcast serviceSeung Hee Kim, Deokkyu Jung, Sang-Yun Lee, Sun-Joong Kim. 664-668 [doi]
- Shareable camera framework for multiple computer vision applicationsHayun Lee, Gyeonghwan Hong, Dongkun Shin. 669-674 [doi]
- Basketball event recognition technique using Deterministic Finite Automata(DFA)Jungsoo Lee, Ji Won Lee, Sung-Won Moon, Do-Won Nam, Wonyoung Yoo. 675-678 [doi]
- WhatsApp network forensics: Discovering the communication payloads behind cybercriminalsFu-Ching Tsai, En-Cih Chang, Da-Yu Kao. 679-684 [doi]
- Proposed solution for improving the reliability of HSS data by integrating a queue managerNgartabe Kag-Teube, Yvan Paillard Kalia-Sya Dodoagnen, Samuel Ouya, Kéba Gueye. 685-693 [doi]
- QoS impact on multimedia traffic load (IPTV, RoIP, VoIP) in best effort modeMamadou Alpha Barry, James K. Tamgno, Claude Lishou, Modou Bamba Cisse. 694-700 [doi]
- Buffermap adaptation method for MP2P multimedia streaming protocolWook Hyun, Chang-Kyu Lee, Shingak Kang, Juyoung Park. 701-704 [doi]
- Method of managed content distribution for time-constrained distributionChangKyu Lee, Wook Hyun, Shin-Gak Kang. 705-708 [doi]
- Dynamic bandwidth allocation for switching FCAE-1553 network in avionics systemYueying Zhan, Liqian Wang, Shaojun Wu, Suzhi Cao, Jianhua He. 709-713 [doi]
- Optimization of HPSA+ capacity of mobile networksJames K. Tamgno, Imane S. O.-T. A. Alidou, Claude Lishou. 714-719 [doi]
- Study on multi-network traffic modeling in distribution communication network access serviceWeidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang. 720-723 [doi]
- A process-aware IoT application execution environment designMinjae Park, Hyunah Kim, Hyun Ahn, Kwanghoon Pio Kim. 724-727 [doi]
- An IoT-aware workflow model designer for smart alarm service about companion animal health checkMinjae Park, Hyunah Kim, Hyun Ahn, Kwanghoon Pio Kim. 728-731 [doi]
- Impact of MSRP protocol integration in e-learning platforms of universitiesKhalifa Sylla, Massamba Seck, Samuel Ouya, Gervais Mendy. 732-737 [doi]
- Proposal for an online practical work platform for improving the teaching of STEMKokou Gaglo, Massamba Seck, Samuel Ouya, Gervais Mendy. 738-743 [doi]
- Study of p-ICN defined performance measurement Enterprise ArchitectureByeongnam Yoon, Kwanghoon Kim, Dinh-Lam Pham, Pham Thanh Dat, Viet-Vu Vu, Hong-Quan Do, Nang-Toan Do. 744-748 [doi]
- Implement smart farm with IoT technologyChiyurl Yoon, Miyoung Huh, Shin-Gak Kang, Juyoung Park, Chang-Kyu Lee. 749-752 [doi]
- Wireless identifying system based on nano-tagsMikhail Blinnikov, Rustam Pirmagomedov. 753-757 [doi]
- A cooperative trilateration technique for object localizationMalathi Balaji, Shafique Ahmad Chaudhry. 758-763 [doi]
- Cross-correlation index and multiple-access performance of Gold codes in a spread-spectrum systemOlanrewaju Bola Wojuola. 764-768 [doi]
- A low-complexity practical energy saving algorithm for real dense wireless scenarioFei Ding, Ye Wang, En Tong, Zhiwen Pan, Xiaohu You. 985-991 [doi]
- NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architectureShi Li 0003, Inshil Doh, Kijoon Chae. 992-998 [doi]
- Capacity-aware key partitioning scheme for heterogeneous big data analytic enginesMuhammad Hanif 0003, Choonhwa Lee. 999-1007 [doi]
- Radio access and transmission models for universal serviceIdriss Saleh Bachar, Ahmed Dooguy KORA, Roger Marcelin Faye, Christelle Aupetit-Berthelemot. 1018-1024 [doi]
- What are the optimum quasi-identifiers to re-identify medical records?Yong-Ju Lee, Kyung Ho Lee. 1025-1033 [doi]
- A cooperative spectrum sensing algorithm using leading eigenvector matchingYuhui Song. 1034-1039 [doi]
- Evolving neural network intrusion detection system for MCPSNishat I. Mowla, Inshil Doh, Kijoon Chae. 1040-1045 [doi]
- Detection and recognition of hand gesture for wearable applications in IoMTAnna Yang, Sung-Moon Chun, Jae-Gon Kim. 1046-1053 [doi]
- Design of aging-resistant Wi-Fi fingerprint-based localization system with continuous active learningYoungsam Kim, Soohyung Kim. 1054-1059 [doi]
- A detailed large-scale radio propagation characteristics: Approaches with time and spatial ratioJinhyung Oh, Young-Jun Chong. 1060-1066 [doi]
- A process-aware drone-equipped 3D engine and wireless control measurement platform for integrated management of SOC facilitiesYoun-Geol Lee, Yoonlae Lee, Yeonyi Jang, Minjae Park. 1067-1072 [doi]