Abstract is missing.
- Passive Geolocation with Unmanned Aerial Vehicles using AOA Measurement ProcessingGrigoriy Fokin. 1-5 [doi]
- Comparison between DSRC and other Short Range Wireless Communication TechnologiesMohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon Jae Lee. 1-5 [doi]
- Security in VANETs: Lightweight Protocol for Group-of-Vehicles Masters (LPGVM)Hamaciré El Hadj Kalil, Ahmed Dooguy KORA, Selma Boumerdassi. 6-11 [doi]
- Low Complexity Equalization Method for ZP-OFDM under Highly Mobile EnvironmentsSaha Tanangsanakool, Pongsathorn Reangsuntea, Kazuo Mori, Pisit Boonsrimuang. 12-17 [doi]
- Primary User Transmit Mode Classification Based Spectrum Sensing in Cognitive Radio NetworkXin Wang, Tingqiu Yan, Narayan Nath, Bin Shen. 18-23 [doi]
- Connectivity of Wireless Multi-hop Stochastic Networks under the Security Constraints in Rayleigh Fading EnvironmentLe The Dung, Hoa T. K. Tran, Seong Gon Choi. 24-28 [doi]
- Dynamic ACK skipping in TCP with Network Coding for Power Line Communication NetworksNguyen Viet Ha 0002, Le Van Hau, Masato Tsuru. 29-34 [doi]
- Precision variable anonymization method supporting transprecision computingKeiya Harada, Henri-Pierre Charles, Hiroaki Nishi. 35-42 [doi]
- A Set Notation Configuration CoAP Scheme for Internet of ThingsJinsuk Baek, Munene W. Kanampiu, Byeong Hyun Ko. 43-47 [doi]
- Efficient Network Administration for Smart Grid Data CenterSeonyong Jeong, Seungwon Shin. 48-51 [doi]
- A Design of IoT Device Configuration Translator for Intent-Based IoT-Cloud ServicesChaehong Chung, Jaehoon Paul Jeong. 52-56 [doi]
- Diseases Detection from Electroencephalogram Signals Using Support Vector MachineMd. Masud Rana 0001, Md Walid Hasan, Ahmed Abdelhadi. 57-61 [doi]
- Medical Image Sharing System using Hyperledger Fabric BlockchainJinbeom Seo, Youngbok Cho. 62-64 [doi]
- A Secure Four-factor Attendance System for Smartphone DeviceTinthid Jaikla, Sasakorn Pichetjamroen, Chalee Vorakulpipat, Achara Pichetjamroen. 65-68 [doi]
- Image Color Watermarking within Past Seven YearsAlireza Ghobadi, Hamidreza Alvandi. 69-75 [doi]
- Low Temperature Fluidity and Performance Evaluation for Sensor Unified Fuel HeaterZhao Xiang, Rafat Hamood Othman Saweed, Ayaz Muhammad, Dal-Hwan Yoon. 76-80 [doi]
- A Study on Analytical Visualization of Deep WebWoohyun Park. 81-83 [doi]
- EyeNet: An Improved Eye States Classification System using Convolutional Neural NetworkMd. Moklesur Rahman, Md Shafiqul Islam, Mir Kanon Ara Jannat, Md. Hafizur Rahman, Md. Arifuzzaman, Roberto Sassi, Md. Aktaruzzaman. 84-90 [doi]
- Learning Believable Player Movement Patterns from Human Data in a Soccer GameVictor Khaustov, Maxim Mozgovoy. 91-93 [doi]
- User Mobility Synthesis based on Generative Adversarial Networks: A SurveySeungJae Shin, Hongseok Jeon, Chunglae Cho, Seunghyun Yoon 0003, Taeyeon Kim. 94-103 [doi]
- BER Reduction for PSK-Based MM-OFDM-BIM with Two-Level Symbol PowerLi Cho, Meng-Fan Chuang, Sheng-Hsiang Fu, Chau-Yun Hsu. 104-108 [doi]
- Power Allocation for Multi-Relay AF Cooperative System with Maximum System CapacityGeng Zhang, Yanan Wang, Yang Wang, Huixia Ding, Weidong Wang, Zhiquan Bai. 109-113 [doi]
- Spatial Modulation Based Color-Intensity Shift Keying in VLC SystemXiang Gao, Xiaopeng Yan, Zhiquan Bai. 114-118 [doi]
- A Collaborative Simulation Architecture for Influence Evaluation of Communication Network Faults on Power Grid SystemYanan Wang, Geng Zhang, Yang Wang, Huixia Ding, Weidong Wang, Siqi Li. 119-124 [doi]
- Uplink Performance Analysis of Cell-Free MIMO with Low-Resolution ADCs and ZF ReceiverXuebing Bai, Meng Zhou, Xu Qiao, Yao Zhang, Longxiang Yang. 125-129 [doi]
- ESS SoC Optimization System Using EV ControlYong Hee Park, Su Ho Lee, Seong Gon Choi. 130-134 [doi]
- Automated smart box to alleviate unfair means in public examination in the context of BangladeshNawsheen Promy, Tashfiq Rahman, Sadman Islam, Saqlain Mahmud Khan. 135-138 [doi]
- Study on Service model of the Agriculture Information based Convergence ServiceHeechang Chung, Dongil Kim, Kyoung-Sook Jung, Byeong-Beom Kang, Sokpal Cho, Soonghee Lee. 139-141 [doi]
- Day-Ahead Electricity Market State-Space Model and Its Power Production, Demand and Price Forecasting Algorithm Using H-infinity FilterMd. Masud Rana 0001, Ahmed Abdelhadi. 142-146 [doi]
- Highway Traffic Flow Status Recognition Method Based on Deep Neural NetworkJun Guo, Xiaoyu Zhang, Zhiyuan Gao, Ligeng Wang, Wenyu Li, Hangmin Chi. 147-154 [doi]
- Blockchain as a Platform for Secure Cloud Computing ServicesWang-You Tsai, Tzu-Chuan Chou, Jiann-Liang Chen, Yi-Wei Ma, Chen-Jui Huang. 155-158 [doi]
- Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and SecurityDana Yang, Sol Jeon, Inshil Doh, Kijoon Chae. 159-165 [doi]
- Hybrid Blockchain-based Unification ID in Smart EnvironmentNakhoon Choi, Heeyoul Kim. 166-170 [doi]
- Analysis of software weakness detection of CBMC based on CWEMinjae Byun, Yongjun Lee, Jin-Young Choi. 171-175 [doi]
- Design and Implementation of the Digital Education Transaction Subject Two-factor Identity Authentication System Based on BlockchainGang Zhao 0004, Bingbing Di, Hui He. 176-180 [doi]
- Evasion Attack in Show and Tell ModelDongseop Lee, Hyunjin Kim, Jaecheol Ryou 0001. 181-184 [doi]
- NMT Enhancement based on Knowledge Graph Mining with Pre-trained Language ModelHao Yang, Ying Qin, Yao Deng, Minghan Wang. 185-189 [doi]
- Selection and Optimization Model of Key Performance IndicatorsNyamsuren Purevsuren, Zolzaya Dashdorj, Tamir Khujuu, Erdenekhuu Norinpel. 190-196 [doi]
- Detection of cancerous tissue in histopathological images using Dual-Channel Residual Convolutional Neural Networks (DCRCNN)Sabyasachi Chakraborty, Satyabrata Aich, Avinash Kumar, Sobhangi Sarkar, Jong-Seong Sim, Hee-Cheol Kim 0001. 197-202 [doi]
- A Study on the Composition of Image-Based Ship-type/class Identification SystemJi Won Lee, Do-Won Nam, Jungsoo Lee, Sung-Won Moon, Arum Oh, Wonyoung Yoo. 203-206 [doi]
- Parametric Analysis of FBMC/OQAM under SUI Fading Channel ModelsAmna Javed Tiwana, Muhammad Zeeshan 0001. 207-211 [doi]
- Multiband Multi-rate Narrowband Software Defined Radio waveform based on CPMAzka Zaheer, Muhammad Zeeshan, Muhammad Waqas. 212-216 [doi]
- Efficient Scheduling for VANET Considering Renewable EnergyAtef H. Bondok, Wonseok Lee, Taejoon Kim. 217-221 [doi]
- Improvement of Special Drive Test Route (SDTR) Reliability for Indoor Radio Frequency Coverage Assessment in 3G/4G Mobile NetworksBrice A. Elono Ongbwa, Ahmed D. Kora, Thierry J. Fotso Wabo. 222-227 [doi]
- Estimation of Convolutional Interleaver in a Non-cooperative ContextYoonji Kim, Geunbae Kim, Dongweon Yoon. 228-230 [doi]
- Orthogonal Polynomials Based Complex Gaussian Processes of Nonlinear Power Amplifier for 5G Wireless Communication SystemsDitthawat Songratthaset, Suwat Pattaramalai. 231-236 [doi]
- Design and implementation of real-time information sharing system of IoT using distributed social networkChang-Su Lee, Dong-Hee Jung. 237-244 [doi]
- Positioning Methods Based on Flying Network for EmergenciesRuslan Kirichek, Truong Duy Dinh, Van-Dai Pham, Maxim Zakharov, Duc Tran Le, Andrey Koucheryavy. 245-250 [doi]
- Analytic Model of a Mesh Topology based on LoRa TechnologyRuslan Kirichek, Vladimir M. Vishnevsky, Van-Dai Pham, Andrey Koucheryavy. 251-255 [doi]
- Hacking Tool Identification in Penetration TestingDa-Yu Kao, Yun-Ya Chen, Fuching Tsai. 256-261 [doi]
- Forensic Artifacts of Network Traffic on WeChat CallsDa-Yu Kao, Ting-Chi Wang, Fu-Ching Tsai. 262-267 [doi]
- Performance of Packet Analysis between Observer and WireSharkHyunho Kim, Hoonjae Lee, Hyotaek Lim. 268-271 [doi]
- Variable Step Size-Least Mean Squared Algorithm for ECG Signal Denoising Considering Baseline Wander Noise and Cyber AttacksMd. Masud Rana 0001, Tamanna Akter, Ahmed Abdelhadi. 272-275 [doi]
- Blockchain based Removable Storage Device Log Management SystemGyuseong Lee, Minsung Son, Nakhoon Choi, Seongho Hong, Heeyoul Kim. 276-279 [doi]
- Vision-based attitude estimation for spacecraft docking operation through deep learning algorithmThaweerath Phisannupawong, Patcharin Kamsing, Peerapong Tortceka, Soemsak Yooyen. 280-284 [doi]
- Aesthetic Evaluation of Food Plate Images using Deep LearningVeranika Mikhailava, Evgeny Pyshkin, Vitaly Klyuev. 285-289 [doi]
- Aircraft trajectory recognition via statistical analysis clustering for Suvarnabhumi International AirportPatcharin Kamsing, Peerapong Torteeka, Soemsak Yooyen, Siriporn Yenpiem, Daniel Delahaye, Philippe Notry, Thaweerath Phisannupawong, Sittiporn Channumsin. 290-297 [doi]
- Parkinson's Disease Detection from Spiral and Wave Drawings using Convolutional Neural Networks: A Multistage Classifier ApproachSabyasachi Chakraborty, Satyabrata Aich, Jong-Seong Sim, Eunyoung Han, Jinse Park, Hee-Cheol Kim 0006. 298-303 [doi]
- Traffic Prediction on Communication Network based on Spatial-Temporal InformationYue Ma 0007, Bo Peng, Mingjun Ma, Yifei Wang, Ding Xiao. 304-309 [doi]
- Mobile Traffic Assessment for 4G Network: Virtual Sample Region ApproachKyung-Yul Cheon, Hyeyeon Kwon, Igor Kim, Seungkeun Park, Jun Kyun Choi. 310-313 [doi]
- Optimization of Healthcare Network for improved service deliveryAseer Ahmad Ansari, Sabyasachi Chakraborty, Satyabrata Aich, Beom Su Kim, Hee-Cheol Kim 0001. 314-318 [doi]
- Identification of IoT Network Type Based on The Response Delay PropertyRui Teng, Kazuto Yano, Yoshinori Suzuki. 319-324 [doi]
- The Research of Scheduling Algorithm Based on Time-Triggered EthernetLili Zhao, Ming Ni, Xiaodan Cui, Weidong Wang, Jinfeng Zhang. 325-329 [doi]
- Researches on Software Requirements Elicitation Approach of the Aviation Electronics Systems based on Multi-ontologyXuan Hu, Jie Liu, Yichen Wang. 330-335 [doi]
- The Orthogonal Defect Classification-based Software Error Pattern Ontology Construction ResearchesXuan Hu, Jie Liu, Bo Wu. 336-341 [doi]
- Optimal Image Watermark Technique Using Singular Value Decomposition with PCAMd. Masud Rana 0001, Al Mohaiminul Alam Mehedie, Ahmed Abdelhadi. 342-347 [doi]
- A Underwater Image Enhanced Algorithm combined MSR and Channel EnergyYanying Yang, Xianwei Xu. 348-349 [doi]
- Implementation of SDR-based 5G NR Cell Search EquipmentIgor Kim, Jung-Sun Um, Seungkeun Park. 350-353 [doi]
- Proposal of an IVR Solution and Granting of Credit With Asterisk's AGI and a Flask RESTFul Framework in an IMS Network: Case of an AdvertisementLatyr Ndiaye, Kéba Gueye, Bessan Melckior Dégboé, Samuel Ouya. 354-360 [doi]
- Tool Mark Identification of Skype TrafficDa-Yu Kao, Fang-Yu Lu, Fu-Ching Tsai. 361-366 [doi]
- A Proposed Audiovisual Quality Assessment Model Associated with Multiplayer Online Battle Arena Game: A Pilot Study with ROVTherdpong Daengsi, Phisit Pornpongtechavanich, Pongpisit Wuttidittachotti. 367-371 [doi]
- Based on Automatic Correlation Keyword Grouping and Combination Based Deep Information Search Corresponding to Specific Language Big Data - Case of Leisure RecreationMing-Shen Jian, Wei-Cheng Hong, Sheng-Che Tsai, Yu-Wei Chen, Chih-Ling Fan. 372-377 [doi]
- Influence of quality service in IP/MPLS network load with IPTV and VoD servicesMamadou Alpha Barry, James K. Tamgno, Claude Lishou. 378-385 [doi]
- Modeling and Simulation of Multicast IPTV and VoD Streams for a Multiservice IP NetworkMamadou Alpha Barry, James K. Tamgno, Claude Lishou, Ismaël Habou Dere. 386-395 [doi]
- The Adoption of Artificial Intelligence for Financial Investment ServiceWasinee Noonpakdee. 396-400 [doi]
- Electricity Theft Detection Using Deep Bidirectional Recurrent Neural NetworkZhongtao Chen, De Meng, Yufan Zhang, Tinglin Xin, Ding Xiao. 401-406 [doi]
- IoT and Modern Marketing: Its Social ImplicationsAnooksha Yogesh Rathod, Shubham Pandya, Nishant Doshi. 407-413 [doi]
- Industrial General Reinforcement Learning Control Framework System based on Intelligent EdgeKwihoon Kim, Yong-Geun Hong. 414-418 [doi]
- TB-DNN: A Thin Binarized Deep Neural Network with High AccuracyJie Wang, Xi Jin, Wei Wu. 419-424 [doi]
- 2 to 4 Digital Optical Line Decoder based on Photonic Micro-Ring ResonatorsM. Rakib Uddin, Law Foo Kui, Rafidah Petra, Zainidi Hamid, Nazri Ahmad, Nurazmina Lingas. 425-429 [doi]
- Radio Signal Generation over Fiber by Optical Injection LockingSaïdou Conombo, Mamadou Diallo DIOUF, Samuel Ouya, Ahmed D. Kora. 430-436 [doi]
- Dimension Dependent Silicon Photonics Rib Waveguide CharacterisationA. T. C. Chen, M. Rakib Uddin, Law Foo Kui, Nurazmina Lingas. 437-441 [doi]
- An enhanced DWBA algorithm in WDM-TDM PON networksTserenlkham Batdorj, Ganbold Shagdar, Buyankhishig Zundui. 442-447 [doi]
- Inspecting Distortion in the Power Amplifiers with the aid of Neural NetworksSercan Aygun, Lida Kouhalvandi, Ece Olcay Günes, Serdar Özoguz. 448-453 [doi]
- A Study for Image Expression of Emergency AlertYoonkwan Byun, Hyunji Lee, Sek-Jin Jang, Seong Jong Choi, Seung-Hee Oh, Yong-Tae Lee. 454-456 [doi]
- Preliminary Study of the Voice-controlled Electric Heat RadiatorRuihong Xu, Zide She, Jinpeng Chen, Bing-Yuh Lu, RuiLong Huang, XiWu Li. 457-460 [doi]
- Preliminary Study on Production of Coarse and Fine Crackles in Respiration Using a Model of Communication TheoryBing-Yuh Lu, Mei Liu, Meng-Lun Hsueh, Pao-An Lin, XiWu Li, Huey-Dong Wu. 461-464 [doi]
- Evaluating the Effectiveness of Notations for Designing Security AspectsSiraj Un Muneer, Muhammad Nadeem, Bakhtiar Kasi, Mir Hamayoun Yousaf. 465-471 [doi]
- Research on A Reliable Method of Receiving Data Based on Zero-Copy Non-Drop Packet Network CardYujian Gong, Wei Xi, Hui Han, Jiawei Yan. 472-477 [doi]
- Interface Design between Mobile Communication Service Provider and National Alert Originator in KoreaYoonkwan Byun, Hyunji Lee, Sek-Jin Jang, Seong Jong Choi, Seung-Hee Oh, Yong-Tae Lee. 478-480 [doi]
- Implementation of web application based on Augmentative and Alternative Communication (AAC) method for People with Hearing and Speech ImpairmentKhasanboy Kodirov, Khusanboy Kodirov, Young Sil Lee. 481-484 [doi]
- Intercontinental Disk-to-Disk Data Transfer Experiment with a Lightweight DTN Software StackPurit Phan-udom, Vasaka Visoottiviseth, Ryousei Takano. 485-490 [doi]
- Adapting distributed stream processing technologies for the automation of modern health care systemsRhaed Khiati, Muhammed Hanif, Choonhwa Lee. 491-496 [doi]
- A Dynamical Network Fault Setting approach for Joint Power Grid SimulationJihao Zhang, Huibo Li, Dan Shan, Duk Kyung Kim, Xiaopeng Yan, Peng Gong. 497-502 [doi]
- A Study of Applying a 3D Instructional Software of Popular Science (Science On a Sphere Explorer) in Earth Science Education of an Elementary SchoolWenwei Liao, Eric J. Hackathorn, Suefen Wang. 503-506 [doi]
- Development of Automated Processing for High-Definition Mapping SystemPrachaya Daruthep, Nikorn Sutthisangiam. 507-510 [doi]
- Exponential Random Graph Modeling of Co-Offender Drug CrimesFu-Ching Tsai, Ming-Chun Hsu, Da-Yu Kao. 511-516 [doi]
- MF-GARF: Hybridizing Multiple Filters and GA Wrapper for Feature Selection of Microarray Cancer DatasetsPakizah Saqib, Usman Qamar, Reda Ayesha Khan, Andleeb Aslam. 517-524 [doi]
- A Novel Framework For Sentiment Analysis Using Deep LearningAndleeb Aslam, Usman Qamar, Pakizah Saqib, Reda Ayesha Khan, Aiman Qadeer. 525-529 [doi]
- An Efficient hole Recovery Method in Wireless Sensor NetworksMary Wu. 530-535 [doi]
- Disconnected operation method for recovering bioinformation in a digital patch systemMoon-Il Joo, Jong-Seong Sim, Tae-Gyu Lee. 536-540 [doi]
- Position and Velocity Estimations of 2D-Moving Object Using Kalman Filter: Literature ReviewMd. Masud Rana 0001, Nazia Halim, Md Mostafizur Rahamna, Ahmed Abdelhadi. 541-544 [doi]
- Design and Analysis of Effective Vivaldi Antennas for Brain Tumor Detections: Ku Frequency BandMd. Masud Rana 0001, Reshma Khanom, Md Mostafizur Rahman, Ahmed Abdelhadi. 545-548 [doi]
- Energy Efficiency Enhancement in 5G Heterogeneous Cellular Networks Using System Throughput Based Sleep Control SchemeArif Dataesatu, Pornpawit Boonsrimuang, Kazuo Mori, Pisit Boonsrimuang. 549-553 [doi]
- Cyber security in Research and Academics due to Social MediaDeepanjali Mishra, Chen Hong, Kueh Lee Hui, Ahmed Al-Absi, Mangal Sain. 554-558 [doi]
- SDN-based heterogeneous network architecture with Multi-ControllersJunhyuk Park, Wonyong Yoon. 559-561 [doi]
- Service-aware Based Virtual Network Functions Deployment Scheme in Edge ComputingShujun Han, Jun Li, Qian Dong, Yuxiang Ma, Liujing Song. 562-565 [doi]
- Proposal for a solution to improve access to mathematics and philosophy education in Senegal thanks to SDN and IPTVSamba Diouf, Kéba Gueye, Samuel Ouya, Gervais Mendy. 566-570 [doi]
- Computationally Efficient Approximation Algorithm of Dominance Based Rough Set ApproachAleena Ahmad, Usman Qamar, Muhammad Summair Raza. 571-576 [doi]
- Analysis and Protection of Computer Network Security IssuesJu Jinquan, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon Jae Lee. 577-580 [doi]
- Rule conversion mechanism between NIDPS enginesJang-Hyeon Jeong, Si-Young Lee, Gyung Ho Park, Seong Gon Choi. 581-584 [doi]
- Using Federated Learning on Malware ClassificationKuang-Yao Lin, Wei-Ren Huang. 585-589 [doi]
- Malware Family Classification using Active Learning by LearningChin-Wei Chen, Ching-Hung Su, Kun-Wei Lee, Ping-Hao Bair. 590-595 [doi]
- Proposing a Privacy Protection Model in Case of Civilian DroneMatasem Saleh, N. Z. Jhanjhi, Azween Abdullah, Fatima-tuz-Zahra. 596-602 [doi]
- Towards the use of a contact center for the socialization and capacity reinforcement of learners of African digital universitiesKhalifa Sylla, Ndeye Massata Ndiaye, Samuel Ouya, Gervais Mendy. 603-607 [doi]
- The Impact of Using TVWS in the Field of Health in Countries in Conflict: The Case of Central African RepublicEdgard Ndassimba, Ghislain Mervyl S. J. Kossingou, Nadege Gladys Ndassimba, Kéba Gueye, Samuel Ouya. 608-613 [doi]
- The Impact of Zeroconf on the Education System of the Countries in Conflict: The Case of the Central African RepublicNadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Edgard Ndassimba, Kéba Gueye, Samuel Ouya. 614-619 [doi]
- Real-time Molecular Analysis Methods Based on Cloud ComputingMaxim Zakharov, Ammar Muthanna, Ruslan Kirichek, Andrey Koucheryavy. 620-623 [doi]
- Improving K-Mean Method by Finding Initial Centroid PointsAndleeb Aslam, Usman Qamar, Reda Ayesha Khan, Pakizah Saqib. 624-627 [doi]
- Automating Public Administration in the Digital AgeEun Sun Chae, Dong-Seok Kang, Jong Yik Si, Sangoh Yun, Pilwoon Jung, Soyoung Park, Haewon Lee, Kyoungjin Choi. 628-631 [doi]
- Digital Transformation through e-Government Innovation in UzbekistanSang-Chul Shin, Jin-Won Ho, Vyacheslav Yuryevich Pak. 632-639 [doi]
- Represent The Discovered Proportional Information Control Net Using Extended XPDL FormatDinh-Lam Pham, Hyun Ahn, Kyoung-Sook Kim, Kwanghoon Pio Kim. 640-643 [doi]
- Dynamic Weighted Hybrid Recommender SystemsHong-Quan Do, Tuan-Hiep Le, Byeongnam Yoon. 644-650 [doi]
- Process-aware Event Log Datacubes for Workflow Process and Knowledge Mining, Predicting and Analyzing FrameworksSeong-Hun Ham, Dinh-Lam Pham, Kyoung-Sook Kim, Kwanghoon Pio Kim. 651-657 [doi]
- A Triage Triangle Strategy for Law Enforcement to Reduce Digital Forensic BacklogsDa-Yu Kao, Ni-Chen Wu, Fuching Tsai. 1173-1179 [doi]
- ICT Enabling Technologies for Smart CitiesDzung Van Dinh, Byeong-Nam Yoon, Hung Ngoc Le, Uy Quoc Nguyen, Khoa Dang Phan, Lam Dinh Pham. 1180-1192 [doi]
- IEEE 802.15.4 Now and Then: Evolution of the LR-WPAN StandardAlberto Gallegos Ramonet, Taku Noguchi. 1198-1210 [doi]
- Classify and Analyze the Security Issues and Challenges in Mobile banking in UzbekistanAzamjon Abdullaev, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Mangal Sain, Hoon Jae Lee. 1211-1217 [doi]
- Using the Actionable Intelligence Approach for the DPI of Cybercrime Insider InvestigationDa-Yu Kao. 1218-1224 [doi]
- Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization ProblemRui Fu, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon Jae Lee. 1225-1231 [doi]
- Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation ProcessesDa-Yu Kao. 1232-1241 [doi]
- A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASICRuizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang. 1242-1247 [doi]
- Robust Semantic Segmentation for Street Fashion PhotosAnh H. Dang, Wataru Kameyama. 1248-1257 [doi]
- Wearable Passive biosensing interface method for gathering bioinformationTae-Gyu Lee. 1258-1264 [doi]