Abstract is missing.
- Analysis of Radio Communication Networks in Underground Mining for EmergenciesBatzorig Bazargur, Otgonbayar Bataa, Uuganbayar Budjav, Gantuya Gantumur. 1-5 [doi]
- SvgAI - Training Methods Analysis of Artificial Intelligent Agent to use SVG EditorAnh H. Dang, Wataru Kameyama. 1-8 [doi]
- Cognitive Workload Detection from Raw EEG-Signals of Vehicle Driver using Deep LearningMohammad A. Almogbel, Anh H. Dang, Wataru Kameyama. 1-6 [doi]
- A PDSI-based Online Fault Configuration Approach for Communication Network in Power Grid SimulationHaowei Yang, Jianlu Wang, Xiang Gao, Huibo Li, Duk Kyung Kim, Peng Gong. 6-10 [doi]
- A Novel Ranging Code based on improved Logistic Map Chaotic SequencesRui Xue, Yang Xiong, Qinglin Cheng. 11-15 [doi]
- A Novel Ultra-Wideband Antenna Operating in the frequency band of 2.5-40GHzShuai Deng, Shuhui Yang, Minqiao Liu, Ziyuan Zhang, Li Lei. 16-20 [doi]
- End to End Latency incurred in Cooperative Communication SystemSyed Asad Ali, Gul Shahzad, Fahim Aziz Umrani. 21-25 [doi]
- Street Parked Vehicles Based Vehicular Fog Computing: TCP Throughput Evaluation and Future Research DirectionFatin Hamadah Rahman, Awangku Muhammad Iqbal Yura, S. H. Shah Newaz, Au Thien Wan, Md. Shamim Ahsan. 26-31 [doi]
- An External Data Integrity Tracking and Verification System for Universal Stream Computing System FrameworkHongyuan Wang. 32-37 [doi]
- PUE or GPUE: A Carbon-Aware Metric for Data CentersFawaz Al Hazemi, Alaelddin Fuad Yousif Mohammed, Lemi Isaac Yoseke Laku, Rayan Alanazi. 38-41 [doi]
- DBN Based Cloud Service Response Time Prediction MethodYan Gao 0001, Bin Zhang 0001, Si Wang, Anxiang Ma. 42-46 [doi]
- Game Based SBCA Cloud Resource Adjustment MethodYan Gao, Bin Zhang, Mengzhu Lu, Anxiang Ma. 47-51 [doi]
- A High-Performance Parallel Computation Hardware Architecture in ASIC of SHA-256 HashXiaoyong Zhang, Ruizhen Wu, Mingming Wang, Lin Wang. 52-55 [doi]
- A Blockchain based Credit Analysis Framework for Efficient Financial SystemsSabyasachi Chakraborty, Satyabrata Aich, Jong-Seong Sim, Hee-Cheol Kim 0001. 56-60 [doi]
- The Governance of Digital Forensic Investigation in Law Enforcement AgenciesDa-Yu Kao, Ni-Chen Wu, Fuching Tsai. 61-65 [doi]
- Analysis of Bitcoin Exchange Using Relationship of Transactions and AddressesSeongho Hong, Heeyoul Kim. 67-70 [doi]
- An Efficiency Evaluation Model for Designing Optimal Scheduling Mechanisms in N+X Hybrid BlockchainPeipei Wang, Kun Meng, Shuqin Li. 71-76 [doi]
- Effect of AI Recommendation System on the Consumer Preference Structure in e-Commerce: Based on Two types of PreferenceNamjun Cha, Hosoo Cho, Sangman Lee, Junseok Hwang. 77-80 [doi]
- Video Diffusion in User-generated Content Website: An empirical analysis of BilibiliLi Yan, Namjun Cha, Hosoo Cho, Junseok Hwang. 81-84 [doi]
- Technologies for Super Micro Websites: Itty.bitty vs. Docs365 Itty BittyYuta Nemoto, Vitaly Klyuev. 85-90 [doi]
- A Deep Learning Based Social-aware D2D Peer Discovery MechanismYu Long, Ryo Yamamoto, Taku Yamazaki, Yoshiaki Tanaka. 91-97 [doi]
- Channel Estimation and Equalization Methods for ZP-OFDM under Highly Mobile EnvironmentsSaha Tanangsanakool, Pongsathorn Reangsuntea, Kazuo Mori, Pisit Boonsrimuang. 102-106 [doi]
- A Moving Direction Proposal to Save Energy Consumption for Mobile Sink in Wireless Sensor NetworkTran Cong Hung, Dang Thi Ngoc, Phan Thi The, Le Ngoc Hieu, Luan N. T. Huynh, Le Dien Tam. 107-110 [doi]
- Cross-correlation index and multiple-access performance of even-degree Gold codesOlanrewaju Bola Wojuola. 111-114 [doi]
- A PAPR Reduction for FBMC-OQAM Signals using ABC-OPTS SchemePitchaya Boontra, Tanairat Mata, Arif Dataesatu, Kazuo Mori, Pisit Boonsrimuang. 115-119 [doi]
- 1.8V-to-1.0V CMOS 65 nm MIPI RFFE Interface Circuit for Millimeter-wave Beamforming ArraySeunghyun Jang, Sunwoo Kong, Hui Dong Lee, Jeehoon Park, Kwang-Seon Kim, Kwang Chun Lee. 120-123 [doi]
- A Smart Android Based Parking System to Reduce the Traffic Congestion of Dhaka CityNawsheen Promy, Sadman Islam. 124-128 [doi]
- Exploiting Heterogeneous Networks model for Cluster Formation and Power Allocation in Uplink NOMAArbab Waheed Ahmad, Nasir Mehmood Bahadar. 129-133 [doi]
- New Function and Configuration of Future Network for Blockchain Platform OperationSuyeon Kim, Chang-Su Lee, Hyun-Kook Kahng. 134-137 [doi]
- A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case StudySatyabrata Aich, Sabyasachi Chakraborty, Mangal Sain, Hye-in Lee, Hee-Cheol Kim 0001. 138-141 [doi]
- Blockchain-based secure firmware management system in IoT environmentMinsung Son, Heeyoul Kim. 142-146 [doi]
- Ethereum-based Emergency Service for Smart Home System: Smart Contract ImplementationYu Nandar Aung, Thitinan Tantidham. 147-152 [doi]
- BlockSubPay - A Blockchain Framework for Subscription-Based Payment in Cloud ServiceYustus Eko Oktian, Elizabeth Nathania Witanto, Sandra Kumi, Sang-Gon Lee. 153-158 [doi]
- Design of a routing scheme for bulk data transfers in multi-domain SnF OCS networksQian Liu, Xiao Lin, Shengnan Yue, Weiqiang Sun, Weisheng Hu. 159-163 [doi]
- Autonomous network traffic control system based on intelligent edge computingKwihoon Kim, Yong-Geun Hong. 164-167 [doi]
- Discovery of Suitable Node Number for Wireless Sensor Networks Based on Energy Consumption using CoojaMarija Tutunovic, Pongpisit Wuttidittachotti. 168-172 [doi]
- Fabrication of 53 Gb/s Optical Transceiver over 40-km transmission with PAM4 modulationSang-Moon Shin, Hong-Beom Kim, Jae-Woo Kim. 173-175 [doi]
- Internet Of Things (IOT) Cybersecurity based on the Hybrid CryptosystemMing-Shen Jian, Yu-En Cheng, Chen-Han Shen. 176-181 [doi]
- An Improved Binary Grey Wolf Optimizer for Dependent Task Scheduling in Edge ComputingKaihua Jiang, Hong Ni, Peng Sun, Rui Han. 182-186 [doi]
- Risk and avoidance strategy for blocking mechanism of SDN-based security serviceMinjae Byun, Yongjun Lee, Jin-Young Choi. 187-190 [doi]
- Smart Flying Umbrella Drone on Internet of Things: AVUSAhmadhon Kamolov, Mohammed Abdulhakim Al-Absi, Hoon Jae Lee, Suhyun Park. 191-195 [doi]
- A Resource Saving MAC/IP Handling Method for Low-Power Wireless TCP Packet NetworkJong-Beom Kim, Jae-Woo Ahn, Jong-Oh Kim, Seong Gon Choi. 196-200 [doi]
- Software-Defined Dynamic Bandwidth ManagementYao-Chung Chang, Yung-Chiao Chen, Tsung-Hau Chen, Jiann-Liang Chen, Shih-Ping Chiu, Wei-Hsiu Chang. 201-205 [doi]
- Fairness based Power Allocation Optimization in Dense Full Duplex D2D NetworksZhenwei Zhang, Hua Qu, Jihong Zhao 0001, Zhirong Luan. 206-211 [doi]
- High-Speed Data Transmission with Beam-Steering using Silicon Optical Phased ArrayHyun-Woo Rhee, Minchul Kim, Jong-Bum You, Hyo-Hoon Park. 212-216 [doi]
- Determining ICT indicators using entropy theoryNarantuya Erkhembaatar, Otgonbayar Bataa. 217-221 [doi]
- High Precision Industrial Wireless LAN System with Asynchronous CommunicationTran Thi Thao Nguyen, Makoto Tsurita, Kyoshiro Sakamoto, Yuhei Nagao, Masayuki Kurosaki, Hiroshi Ochi. 222-227 [doi]
- Design of an UWB Microstrip Antenna With DGS Based on Genetic AlgorithmZiyuan Zhang, Shuhui Yang, Minqiao Liu, Shuai Deng, Lei Li. 228-232 [doi]
- Comparative analysis of radio propagation models for LTE network on the sky trainArif Dataesatu, Pornpawit Boonsrimuang, Kazuo Mori, Pisit Boonsrimuang. 233-238 [doi]
- Performance Evaluation: Two Flood-Cancellation Methods of the Blocking Expanding Ring Searches on the AODV/WiFi MANET EnvironmentKwi-Yil Gwak, Sangwoo Park, JooSeok Song. 239-248 [doi]
- Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art SurveyAzamjon Abdullaev, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Mangal Sain, Young Sil Lee, Hoon Jae Lee. 249-255 [doi]
- Performance Evaluation of Physical Random Access Channel in 5G New RadioGweon-Do Jo, Young Ha Lee. 256-259 [doi]
- A Secure Healthcare System Design Framework using Blockchain TechnologySabyasachi Chakraborty, Satyabrata Aich, Hee-Cheol Kim 0001. 260-264 [doi]
- Security Assured Vehicle Data Collection Platform by Blockchain: Service Provider's PerspectiveSang-Oun Lee, Hyunseok Jung, Bosuk Han. 265-268 [doi]
- Online test and management system using blockchain networkSeung Jae Pee, Eung Seon Kang, Jae Geun Song, Ju-wook Jang. 269-272 [doi]
- Towards the Application of Blockchain technology for Smart Grids in KazakhstanDinar Orazgaliyev, Yerbolat Lukpanov, Ikechi A. Ukaegbu, H. S. V. Sivanand Kumar Nunna. 273-278 [doi]
- Multi-Factor Authentication in Cyber Physical System: A State of Art SurveySanjar Ibrokhimov, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Hoon Jae Lee, Mangal Sain. 279-284 [doi]
- The Service Scenario of Road Environment Improvement Based on Crowd Sourcing for Smart CitySeung Han Choi, Seok Bong Yoo, Deockgu Jee, Mikyong Han. 292-294 [doi]
- Network Virtualization System for Smart Grid Data Acquisition SystemSeonyong Jeong, Yongjae Lee, Seungwon Shin. 295-298 [doi]
- Integration Agricultural Knowledge and Internet of Things for Multi-Agent Deficit Irrigation ControlYi-Wei Ma, Jin-Qiu Shi, Jiann-Liang Chen, Chia-Chi Hsu, Chen-Hao Chuang. 299-304 [doi]
- Design and Implementation of Autonomous Collaboration System of Smart Things using accumulated Experience knowledgeChang-Su Lee, Sweung-Won Cheung, Seong-Soon Joo, Hyun-Kook Kahng. 305-313 [doi]
- The SPI Synchronization Method for Data Efficiency and Integrity between MCUsJae Kyu Lee, Jae-Woo Ahn, Jong-Oh Kim, Seong Gon Choi. 314-319 [doi]
- An Interactive Interface for Information Exchanging between QualNet and Virtual Machine for IP Based NetworkQi Meng, Peng Gong, Yu Liu, Huibo Li, Cheying Li, Dan Shan. 320-324 [doi]
- PDSI-based Static Route Online Configuration Method for QualNet SimulatorHuibo Li, Peng Gong, Yu Liu, Guolin Li, Dan Shan. 325-329 [doi]
- An Interactive Interface of QualNet for DigSilent in Power Grid SimulationXiang Gao, Peng Gong, Yu Liu, Qi Meng, Cheying Li, Dan Shan. 330-333 [doi]
- Analysis of Task Success Rate for Classifying 2D-Touch and 3D-Touch through ThresholdJinHyuck Park, ChoonSung Nam, JangYeol Lee, Dong Ryeol Shin. 334-338 [doi]
- Chinese Spam Data Filter Model in Mobile InternetYitao Yang, Runqiu Hu, Guozi Sun, Chengyan Qiu. 339-343 [doi]
- Optimal Threshold Analysis for Triggering Fail-Safe Mechanism in Vehicular Ad Hoc NetworksKumar Sharshembiev, Seong-Moo Yoo, Yong-Kab Kim, Geun-Ho Jeong. 344-350 [doi]
- IEEE 802.15.4 Historical Evolution and TrendsAlberto Gallegos Ramonet, Taku Noguchi. 351-359 [doi]
- Passive Geolocation with Unmanned Aerial Vehicles using TDOA-AOA Measurement ProcessingGrigoriy Fokin. 360-365 [doi]
- Power Optimization for Energy Efficiency in Cell-Free Massive MIMO with ZF ReceiverYao Zhang, Haotong Cao, Meng Zhou, Longxiang Yang. 366-371 [doi]
- A New Statistical Received Signal Strength (RSS) Model Based Fingerprint Approach for WLAN Indoor Localization ApplicationMai A. Abd El-Halim, Adel M. Said, Hadia El Hennawy. 372-384 [doi]
- Interactive AI for Linguistic Education Built on VR Environment Using User Generated ContentsWoohyun Park, Dojin Park, ByungJune Ahn, SeokHun Kang, HaengYeong Kim, RaeHyeon Kim, JaeHeum Na. 385-389 [doi]
- A Comparative Study of Face Recognition Algorithms under Facial Expression and IlluminationAli Rehman Shinwari, Asadullah Jalali Balooch, Ala Abdulhakim Alariki, Sami Abduljalil Abdulhak Naji. 390-394 [doi]
- A YOLO-based Separation of Touching-Pigs for Smart Pig Farm ApplicationsJihyun Seo, Jaewon Sa, Younchang Choi, Yongwha Chung, Daihee Park, Hakjae Kim. 395-401 [doi]
- Application of Big Data in Smart Grids: Energy AnalyticsAzamat Marlen, Askar Maxim, Ikechi A. Ukaegbu, H. S. V. S. Kumar Nunna. 402-407 [doi]
- A Multiple-Loss Dual-Output Convolutional Neural Network for Fashion Class ClassificationOkeke Stephen, Uchenna Joseph Maduh, Sanjar Ibrokhimov, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain. 408-412 [doi]
- Cybercrime Countermeasure of Insider Threat InvestigationDa-Yu Kao. 413-418 [doi]
- A Learning Kit on IPv6 Deployment and its Security Challenges for NeophytesAbidah Mat Taib, Nor Arzami Othman, Ros Syamsul Hamid, Iman Hazwam Abd Halim. 419-424 [doi]
- Aggregated Risk Modelling of Personal Data Privacy in Internet of ThingsJinhong Yang, Chul Soo Kim, Md Mehedi Hassan Onik. 425-430 [doi]
- Proposal of PingPong-128 Countermeasure against Power Analysis AttackYoung-Jin Kang, Ki Hwan Kim, Hoon Jae Lee. 431-434 [doi]
- An efficient MSD protection and authentication scheme for automotive ICT based emergency call systemNam-Uk Kim, Tai-Myoung Chung. 435-439 [doi]
- Implementation of greenhouse service control protocol using Python on Raspberry PIWook Hyun, Mi-Young Huh, Juyoung Park. 440-442 [doi]
- Implementation of Packet Queue with Two Dimensional Array on Embedded SystemJae-Woo Ahn, Jong-Oh Kim, Seong Gon Choi. 443-446 [doi]
- Development of a General Reporting Program for Measurement UncertaintySun Hwang, Jin-Chun Woo, Thomas Byeongnam Yoon. 447-452 [doi]
- Implementation of PV Monitoring System Using PythonShinyuk Kang, Ilwoo Lee. 453-455 [doi]
- Fine Dust Forecast Based on Recurrent Neural NetworksSunwon Kang, Namgi Kim, Byoung-Dai Lee. 456-459 [doi]
- Churn Resilience of Distributed Content Service System on Smart Terminals NetworkHanxing Xue, Jiali You, Jinlin Wang. 460-466 [doi]
- Multisensory Capture System for the Preservation of Traditional PaintingSoonchul Jung, TaeWon Choi, Yoon-Seok Choi, In-Su Jang, Jae-Woo Kim, Jin-Seo Kim. 467-470 [doi]
- Smart Farming Education Service based on u-learning environmentHeechang Chung, Dongil Kim, Soonghee Lee, Sokpal Cho. 471-474 [doi]
- Synchronization and Cell Search Procedure in 3GPP 5G NR SystemsYoungil Jeon, Hyeongsook Park, Eunyoung Choi. 475-478 [doi]
- Sensitive Network Architecture Algorithm based on LED Optical Wireless CommunicationTae-Gyu Lee. 479-482 [doi]
- Throughput Analysis in Cooperative Spectrum Sensing Network using an Improved Energy DetectorM. Ranjeeth 0001, S. Anuradha. 483-487 [doi]
- Signal Assemblage Based Wideband Spectrum Sensing for OFDM Cognitive RadiosHan-qing, Siji Chen, Md Liton Ali, Bin Shen 0003. 488-491 [doi]
- SVM and Decision Stumps Based Hybrid AdaBoost Classification Algorithm for Cognitive RadiosSiji Chen, Bin Shen, Xin Wang, Hebiao Wu. 492-497 [doi]
- Mathematical Model for Bit-error-rate of a Spread-Spectrum SystemOlanrewaju Bola Wojuola. 498-502 [doi]
- Artificial Intelligence Hybrid Learning Architecture for Malware Families ClassificationYan-Ju Chen, Wen-Han Kuo, Sung-Yun Tsai, Jiann-Liang Chen, Yu-Hung Chen, Wei-Zhao Xu. 503-510 [doi]
- Improving Credit Risk Prediction in Online Peer-to-Peer (P2P) Lending Using Feature selection with Deep learningVan-Sang Ha, Dang-Nhac Lu, Gyoo Seok Choi, Ha-Nam Nguyen, Byeongnam Yoon. 511-515 [doi]
- Domain Specific NMT based on Knowledge Graph Embedding and AttentionHao Yang, Gengui Xie, Ying Qin, Song Peng. 516-521 [doi]
- Dynamic Container-based Resource Management Framework of Spark EcosystemNawab Muhammad Faseeh Qureshi, Isma Farah Siddiqui, Asad Abbas, Ali Kashif Bashir, Kee-Hyun Choi, Jaehyoun Kim, Dong Ryeol Shin. 522-526 [doi]
- The Fourth Industrial Revolution: Towards Energy 4.0 in KazakhstanAisultan Alimkhan, Adilkhan Makhambayev, Ikechi A. Ukaegbu. 527-532 [doi]
- Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural NetworkChi-Kuan Chiu, Te-En Wei, Hsiao-Hsien Chang, Ching-Hao Mao. 533-538 [doi]
- Automated IT Audit of Windows Server Access ControlSutthinee Pongsrisomchai, Sudsanguan Ngamsuriyaroj. 539-544 [doi]
- RECSRF: Novel Technique to Evaluate Program Security using Dynamic Disassembly of Machine InstructionsAsanga Wanniarachchi, Chandana Gamage. 545-551 [doi]
- Event Observation of Date-time Stamps for ADS ReconstructionDa-Yu Kao, Yuanpei Chen, En-Cih Chang. 552-557 [doi]
- A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution PathRui Fu, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon Jae Lee. 558-562 [doi]
- An Online Web-based Adaptive Tutoring System for University Exit Exam on IT LiteracyCharoenchai Wongwatkit. 563-568 [doi]
- Consideration on the variation of financial data of institutions for canonical correlation analysisMasaaki Ida. 569-572 [doi]
- Digital Story-Telling: A Methodology of Web Based Learning of Teaching of Folklore StudiesPapiya Chatterjee, Deepanjali Mishra, Lili Kumari Padhi, Jyotirmayee Ojha, Ahmed Abdulhakim Al-Absi, Mangal Sain. 573-578 [doi]
- Complex Control-Flow Constructs Detection from Process Related DataHind R'bigui, Chiwoon Cho. 579-582 [doi]
- The Evaluation System for the Computer Simulation of the Crackles in RespirationsMeng-Lun Hsueh, Huey-Dong Wu, Bing-Yuh Lu. 583-588 [doi]
- Comparative Analysis of Electricity Consumption at Home through a Silhouette-score prospectiveHyun Wong Choi, Nawab Muhammad Faseeh Qureshi, Dong Ryeol Shin. 589-591 [doi]
- A Comparison of the Effects of Data Imputation Methods on Model PerformanceWooYoung Kim, Wonwoong Cho, Jangho Choi, Jiyong Kim, Cheonbok Park, Jaegul Choo. 592-599 [doi]
- Virtual Power Plant in Industry 4.0: The Strategic Planning of Emerging Virtual Power Plant in KazakhstanMadina Kenzhina, Ileskhan Kalysh, Ikechi A. Ukaegbu, Sivanand K. Nunna. 600-605 [doi]
- Industry 4.0: Redefining Manufacturing in KazakhstanSabit Shaiholla, Asset Bekov, Ikechi A. Ukaegbu. 606-609 [doi]
- ATM Heist Threats: A Proposed ICT Governance StrategyDa-Yu Kao. 610-615 [doi]
- How to Create a Network Slice? - A 5G Core Network PerspectiveWangbong Lee, Taeheum Na, Jeongyun Kim. 616-619 [doi]
- Study on the Efficiency Evaluation System of Distribution Communication Collaboration NetworkWeidong Feng, Yong Sun, Zheng Zhou, Peng Zhan, YaoYi Jiao. 620-623 [doi]
- The Method of Health Management on Satellite Constellation NetworkLi Jing, Shi Jin Xia, Li Shuai, Liao QiuYue. 624-630 [doi]
- Modelling Chlorophyll-a Concentration using Deep Neural Networks considering Extreme Data Imbalance and SkewnessJang-Ho Choi, Jiyong Kim, Jongho Won, Ok-Gee Min. 631-634 [doi]
- Personal Data Privacy Challenges of the Fourth Industrial RevolutionMd Mehedi Hassan Onik, Chul Soo Kim, Jinhong Yang. 635-638 [doi]
- Analysis of Electricity Consumption at Home Using K-means Clustering AlgorithmHyun Wong Choi, Nawab Muhammad Faseeh Qureshi, Dong Ryeol Shin. 639-643 [doi]
- TED: A Tetrominoes based edge descriptorYun-Xia Liu, Yang Yang 0023, Peng Jigang, Haowei Liu, Haipeng Ping, Zhang Heng. 644-647 [doi]
- Intelligent monitoring of indoor surveillance video based on deep learningYun-Xia Liu, Yang Yang 0023, Aijun Shi, Jigang Peng, Haowei Liu. 648-653 [doi]
- Intrusion Detection by Deep Learning with TensorFlowNavaporn Chockwanich, Vasaka Visoottiviseth. 654-659 [doi]
- Log Layering Based on Natural Language ProcessingHanji Shen, Chun Long, Wei Wan, Jun Li 0002, Yakui Qin, Yuhao Fu, Xiaofan Song. 660-663 [doi]
- TRAPDROID: Bare-Metal Android Malware Behavior Analysis FrameworkHalit Alptekin, Can Yildizli, Erkay Savas, Albert Levi. 664-671 [doi]
- Conceptualizing the cyber incident & event statistics reporting standardsSang-Oun Lee, H. J. Seo. 672-675 [doi]
- Proposition of Health Care System Driven by IoT and KMS for Remote Monitoring of Patients in Rural Areas: Pediatric CaseKéba Gueye, Bessan Melckior Dégboé, Samuel Ouya, Ngartabe Kag-Teube. 676-680 [doi]
- Classifying User Reviews at Sentence and Review Levels Utilizing Naïve BayesYoichi Saito, Vitaly Klyuev. 681-685 [doi]
- A Study on EA based IT GovernanceByeongnam Yoon, Dinh-Lam Pham, Pham Hai Son, Pham Thanh Dat, Do Van Thien, Viet-Vu Vu, Hong-Quan Do, Nang-Toan Do. 686-691 [doi]
- A Temporal Work Transference Event Log Trace Classification Algorithm and Its Experimental AnalysisDinh-Lam Pham, Hyun Ahn, Kwanghoon Pio Kim. 692-696 [doi]
- Strategies of Learning: A Methodology of Teaching Language Through DigitalisationLili Kumari Padhi, Deepanjali Mishra, Papiya Chatterjee, Jyotirmayee Ojha, Mangal Sain. 697-702 [doi]
- Digital Transformation of the Public Service Delivery System in UzbekistanSang-Chul Shin, Zafar Makhamadjanovich Rakhmatullayev. 703-709 [doi]
- Space Sharing Effects on Manycore SystemsSeung-Jun Cha, Seung Hyup Jeon, Ramneek, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung. 710-713 [doi]
- A Study on Feature Extraction Methods Used to Estimate a Driver's Level of DrowsinessKyong-Hee Lee, Whui Kim, Hyun Kyun Choi, Byung-Tae Jang. 710-713 [doi]
- Design of 3D Animation Builder with HLA Based Distributed SimulationsSangha Choi, Wooshik Kim, Sugjoon Yoon. 718-721 [doi]
- Nirob: A Next Generation Green Earth Technology Based Innovative System for Metropolitan Sound Pollution ManagementJafrul Islam Sojol, Md. Hashmi Shihab, Tanvir Ahamed, Md. Abu Sayed Siam, Shahnewaz Siddique. 722-727 [doi]
- Performance Evaluation of Apache Storm With Writing ScriptsLemi Isaac Yoseke Laku, Alaelddin Fuad Yousif Mohammed, Fawaz Al Hazemi, Chan-Hyun Youn. 728-733 [doi]
- Smart School Bus: Ensuring Safety On The Road For School Going ChildrenJafrul Islam Sojol, Md. Sakib Alam, Nazmul Hossain, Tamanna Motahar. 734-739 [doi]
- An Improvement of a Checkpoint-based Distributed Testing Technique on a Big Data EnvironmentBhuridech Sudsee, Chanwit Kaewkasi. 1081-1090 [doi]
- Improving K Nearest Neighbor into String Vector Version for Text CategorizationTaeho Jo 0001. 1091-1097 [doi]
- Analyzing WannaCry Ransomware Considering the Weapons and ExploitsDa-Yu Kao, Shou-Ching Hsiao, Raylin Tso. 1098-1107 [doi]
- Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime InvestigationsDa-Yu Kao, En-Cih Chang, Fu-Ching Tsai. 1108-1115 [doi]
- A Supervised Machine Learning Approach using Different Feature Selection Techniques on Voice Datasets for Prediction of Parkinson's DiseaseSatyabrata Aich, Hee-Cheol Kim 0001, Kim Younga, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain. 1116-1121 [doi]
- Prediction of Quality for Different Type of Wine based on Different Feature Sets Using Supervised Machine Learning TechniquesSatyabrata Aich, Ahmed Abdulhakim Al-Absi, Kueh Lee Hui, Mangal Sain. 1122-1127 [doi]
- A solar power generation facility state monitoring system using drone aerial photographingYoonlae Lee, Youn-Geol Lee, Hyunah Kim, Minjae Park. 1128-1134 [doi]
- Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor NetworkMangal Sain, Amlan Jyoti Chaudhray, Satyabrata Aich, Hoon Jae Lee. 1135-1142 [doi]
- Detecting Anomalous Network Traffic in IoT NetworksDang-Hai Hoang, Ha Duong Nguyen. 1143-1152 [doi]
- SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPSNishat I. Mowla, Inshil Doh, Kijoon Chae. 1153-1158 [doi]