Abstract is missing.
- A Survey on the Security in Cyber Physical System with Multi-Factor AuthenticationMangal Sain, Oloviddin Normurodov, Chen Hong, Kueh Lee Hui. 1-8 [doi]
- Blockchain Traceability in Healthcare: Blood Donation Supply ChainSamin Sadri, Aamir Shahzad, Kaiwen Zhang 0001. 1-8 [doi]
- Performance Analysis of DSSS-PDMA with SIC in GEO Satellite-Terrestrial Uplink NetworksYosuke Higasa, Kazutoshi Yoshii, Megumi Saito, Jiang Liu 0005, Shigeru Shimamoto, Takuya Okura, Naoko Yoshimura, Amane Miura, Hiroyuki Tsuji, Morio Toyoshima. 1-6 [doi]
- Fixed-Point Arithmetic for Implementing Massive MIMO SystemsMi Tian 0006, Mihai Sima, Michael McGuire. 1-11 [doi]
- A RSSI-Based Mesh Routing Protocol based IEEE 802.11p/WAVE for Smart Pole NetworksJong-Young Choi, Jiwoong Park, Sung-Hwa Lim, Young-Bae Ko. 1-5 [doi]
- Estimation of Network Type Based on The Response Delay PropertyRui Teng, Kazuto Yano, Yoshinori Suzuki. 1-6 [doi]
- Performance Evaluation of Polarization Effects on 5G Clustered Delay Line ChannelsMykola Servetnyk, Wei-Han Hsiao, Alisher Mukashev. 1-6 [doi]
- Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific LanguageMing-Shen Jian, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Wen-Hsiang Hsieh. 1-8 [doi]
- Feasibility of interconnecting the University of Bangui and peripheral areas via the TVWS for e-learning in the context of COVID-19Edgard Ndassimba, Nadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya. 7-13 [doi]
- Performance Analysis of Intelligent Reflecting Surface-Assisted Orbital Angular Momentum-Based Communication SystemsKosei Ono, Kazutoshi Yoshii, Megumi Saito, Zhenni Pan, Jiang Liu 0005, Shigeru Shimamoto. 7-12 [doi]
- Relay Selection in NOMA-Based Diamond Relaying NetworksNoha H. Khattab, Samy S. Soliman, M. Saeed Darweesh, Amr A. El-Sherif. 13-19 [doi]
- Performance Analysis of Mixed MIMO RF/FSO DF Relaying Based on Globally Coupled Low Density Parity Check (GC-LDPC) CodesIbrahima Gueye, Idy Diop, Ibra Dioum, Khadidiatou Wane Keita, Papis Ndiaye, Moussa Diallo, Sidi Mohamed Farssi. 14-22 [doi]
- On the Stability of Load Adaptive Routing Over Wireless Community Mesh and Sensor NetworksNemesio A. Macabale. 21-26 [doi]
- Adaptive Millimeter-Wave Channel Estimation and TrackingMohammadreza Robaei, Robert Akl, Robin Chataut, Utpal Kumar Dey. 23-28 [doi]
- Explainable Malware Detection Using Predefined Network FlowBoryau Hsupeng, Kun-Wei Lee, Te-En Wei, Shih-Hao Wang. 27-33 [doi]
- A High Throughput and Flexible Rate 5G NR LDPC Encoder on a Single GPUShixin Liao, Yueying Zhan, Ziyuan Shi, Lei Yang. 29-34 [doi]
- Attack Tactic Labeling for Cyber Threat HuntingSheng-Xiang Lin, Zong-Jyun Li, Tzu-Yang Chen, Dong-Jie Wu. 34-39 [doi]
- The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow NetworkShan-Wen Chen, Kuan-Po Liu, Fu-Ching Tsai. 35-41 [doi]
- Collusion Resistant Watermarking for Deep Learning Models ProtectionSayoko Kakikura, Hyunho Kang, Keiichi Iwamura. 40-43 [doi]
- Incentive and Playful Strategy for a Participative Model of Learning and Experimenting BlockchainFatou Ndiaye Mbodji, Gervais Mendy, Ahmath Bamba Mbacke, Samuel Ouya. 42-47 [doi]
- PID Control Aided Thermal Comfortable of the User's Temperature Tracing Movable Electrical Heating RadiatorHaolin Zou, Zhongyong Wang, Pao-An Lin, Weilong Zhan, Peixin Chen, Yuxin Li, Yuyang Chen, Zide She, Juhui He, Bing-Yuh Lu. 44-48 [doi]
- Formal Modeling of Smart Contract-based Trading SystemWoong-Sub Park, Hyuk Lee, Jin-Young Choi. 48-52 [doi]
- Performance Evaluation of Partial Offloading under Various Scenarios in Mobile Edge ComputingSeokbeom Oh, Soojeong Lee, Yong-Geun Hong, Gyuyeol Kong, Hyun-Kook Kahng. 49-52 [doi]
- A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational ModelJinsuk Baek, Munene W. Kanampiu. 53-57 [doi]
- IoTivity Packet Parser for Encrypted Messages in Internet of ThingsHyeonah Jung, Hyungjoon Koo, Jaehoon Paul Jeong. 53-57 [doi]
- An Evaluation Model of Traffic Abnormal Probability of Adjacent Freeway Nodes Based on Space-time ConstraintsJun Guo, Xinwei Liu, Chen Liu, Zixuan Zhao, Bin Zhang. 58-62 [doi]
- A Framework of Large-Scale Virtual City Simulation with Land-Use ModelBumho Kim, Chang-Gyu Lim, Seong Ho Lee, Yung-Joon Jung. 58-61 [doi]
- A Study on the Service model of risk mitigation on livestock pandemic based on NetworksHeechang Chung, Dongil Kim, Sokpal Cho. 62-65 [doi]
- Development of Centimeter Level Positioning Mobile Based ApplicationCharnon Poolsin, Nattakit Sa-Ngiam, Nikorn Sutthisangiam. 63-67 [doi]
- A Recommender System for the Upselling of Telecommunications ProductsNavin Dookeram, Zahira Hosein, Patrick Hosein. 66-72 [doi]
- A Study on the Population Distribution Prediction in Large City using Agent-Based SimulationBumho Kim, Chang-Gyu Lim, Seong Ho Lee, Yung-Joon Jung. 68-71 [doi]
- Research on Evaluation Method of Virtual Machine Quantity in Cold and Hot Operation Mode Based on Reliability GuaranteeJun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang. 72-76 [doi]
- The Method of Learning Personal Preference with Reinforcement LearningYong Hee Park, Won-Seok Choi, Seong Gon Choi. 73-77 [doi]
- Research on a Virtual Machine Mode Transfer Method Supporting Energy Consumption OptimizationJun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang. 77-80 [doi]
- Preliminary Study of Cloud Aided Monitoring of Basic Physiological SignalsMei Liu, Ankang Lin, Rushan Wu, Sen Liu, Gaowei Lei, Junzhi Lu, Man Xie, Pao-An Lin, Junbai Wu, Bing-Yuh Lu. 78-82 [doi]
- OS noise Analysis on Azalea-unikernelSeung-Jun Cha, Seung-Hyub Jeon, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung. 81-84 [doi]
- A Proposed Load Balancer Using Naïve Bayes to Enhance Response Time on Cloud ComputingTran Cong Hung, Tran Duy Tien, Le Ngoc Hieu. 82-90 [doi]
- Reservoir Computing Based Equalization for Radio over Fiber SystemJingwei Li, Yibo Lyu, Xu Li, Tianxiang Wang, Xiaowen Dong. 85-90 [doi]
- Massive MIMO in Fixed-Point ArithmeticMi Tian 0006, Mihai Sima, Michael McGuire. 91-95 [doi]
- DDoS attacks detection in the cloud using K-medoids algorithmSeongho Yoon, Miyoung Kang. 91-94 [doi]
- Low-Latency Computation Offloading based on 5G Edge Computing SystemsZhen-Yuan Pan, Jiann-Liang Chen, Yao-Chung Chang. 95-100 [doi]
- A 28 GHz Beamforming Technique for 5G Advanced Communication SystemsYoshimi Fujii, Tetsuya Iye, Kensuke Tsuda, Akihiro Tanibayashi. 96-99 [doi]
- An Experimental Study of 28 GHz Analog Beamforming with a Uniform Linear ArrayTetsuya Iye, Kensuke Tsuda, Yoshimi Fujii. 100-103 [doi]
- A Novel Gateway Deployment Solution for MANETs Interconnecting with InternetDan Meng, Yonghang Yan, Lun Xia, Zhijia Li, Xuewen Xia, Chen Chen. 101-105 [doi]
- z Suitable for PPM-OCDMA SystemYasuaki Ohira, Takahiro Matsumoto, Hideyuki Torii, Yuta Ida. 106-111 [doi]
- Protecting Personal Healthcare Record Using Blockchain & Federated Learning TechnologiesSatyabrata Aich, Nday Kabulo Sinai, Saurabh Kumar, Mohammed Ali, Yu Ran Choi, Moon-Il Joo, Hee-Cheol Kim 0001. 109-112 [doi]
- Dynamic spectrum access based on double deep Q-network and convolution neural networkGuangjin Fang, Bin Shen, Hong Zhang, Taiping Cui. 112-116 [doi]
- Blockchain-based Lightweight Transaction Process Modeling and DevelopmentTae-Shin Kang, Moon-Il Joo, Beom-Soo Kim, Tae-Gyu Lee. 113-118 [doi]
- Cloud Blockchain Based Multiple Inspection Information Exchanging for Agriculture and Food SafetyMing-Shen Jian, Jian-Ting Guo, Hung-Jen Chen, Yu-Zhi Luo, Yu-Chen Lai. 117-124 [doi]
- Secured Land Title Transfer System in Australia using VPN based Blockchain NetworkMohamad Arsalan Sheikh, Faryal Khattak, Gul Zameen Khan, Farookh Khadeer Hussain. 125-131 [doi]
- IoT based Construction Site Monitoring System for Highway EngineeringXiaojun Hou, Heng Wu, Ting Peng, Xiaoling Wang, Taoyan Zhou, Kesheng Yang. 127-131 [doi]
- Accuracy Evaluation of Indoor Positioning by Received Signal Strength using Deep LearningYuma Narita, Shan Lu 0003, Hiroshi Kamabe. 132-136 [doi]
- Systematic Analysis of DDoS Attacks in BlockchainMohamad Arsalan Sheikh, Gul Zameen Khan, Farookh Khadeer Hussain. 132-137 [doi]
- Energy Loss Minimization Modelling for Given Energy Path in Vehicular Energy NetworkLae Yeop Lee, Seong Gon Choi. 137-140 [doi]
- SWC-based Smart Contract Development Guide ResearchJong-Hoon Lee, Seongho Yoon, Hyuk Lee. 138-141 [doi]
- On Mitigation of Ranging Errors for Through-the-Body NLOS Conditions using Convolutional Neural NetworksSung-Chan Nam, Hong-Beom Choi, Young-Bae Ko. 141-144 [doi]
- Prediction of Compression Ratio for Transform-based Lossy Compression in Time-series DatasetsAekyung Moon, Juyoung Park, Yun-Jeong Song. 142-146 [doi]
- Is a False Positive really False Positive?Hong Jun Choi, Hyuk Lee, Jin-Young Choi. 145-149 [doi]
- A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTTTaku Noguchi, Masato Nakagawa, Masami Yoshida, Alberto Gallegos Ramonet. 147-153 [doi]
- A Study on Multi-media Disaster Information Contents to provide Disaster Alert Service to the PublicBeom-Jun Cho, Ki Bong Kwon, Hyun-Chul Kim, Sungboo Kang. 150-154 [doi]
- Real-Time Path Planning for Trajectory Control in Autonomous DrivingHye Young An, Won-Seok Choi, Seong Gon Choi. 154-159 [doi]
- Disaster Warning and Alerting Integrated Systems Based on CAP profileSeung-Hee Oh, Woo-Sug Jung, Yong-Tae Lee, Kyung-Seok Kim. 155-159 [doi]
- Reinforcement Learning base DR Method for ESS SoC Optimization and Users SatisfactionYong Hee Park, Seong Gon Choi. 160-166 [doi]
- A Study on Estimation of Retransmission Rate of Background Traffic for Various Scan Rates with Scan Response DelayKenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki. 160-165 [doi]
- Mobile Communication Signal Selection Algorithm for Signal of Opportunity NavigationHuijie Zhu, Wei Xu, Yalou Sang, Zhiqiang Yao, Limei Liu, Moses Chukwuka Okonkw. 166-171 [doi]
- Implementation of Dynamic HSV Adjusting Method for Lane DetectionYong Hee Park, Won-Seok Choi, Ji-Yong Oh, Cheol-Jin Park, Seong Gon Choi. 167-171 [doi]
- Investment Cost Minimization of Autonomous-Electric Vehicles based on Queueing ModelLae Yeop Lee, Won-Seok Choi, Seong Gon Choi. 172-178 [doi]
- SRAD: A Novel Approach to Seamless Routing for Wireless Ad Hoc NetworksSaad Allawi Nsaif, Sang Yoon Park, Jong-myung Rhee. 172-175 [doi]
- Cooperative MIMO Applied Null Beamforming to Self in Full-Duplex Wireless Communication System and Its ImplementationMasahiro Kawano, Yuhei Nagao, Leonardo Lanante, Masayuki Kurosaki, Hiroshi Ochi. 176-181 [doi]
- Shadowing-Fading-based Intersection Geographic Opportunistic Routing Protocol for Urban VANETsShuto Takahashi, Masami Yoshida, Alberto Gallegos Ramonet, Taku Noguchi. 179-184 [doi]
- Tamper Detection Based on Webpage Change FeaturesHanji Shen, Jun Li, Wei Wan, Chun Long, Jingdeng Zhou, Yuhao Fu, Xiaofan Song. 182-186 [doi]
- A Survey of Coverage Issues in UAV networksZhijia Li, Yonghang Yan, Xuewen Xia, Lun Xia, Dan Meng, Chen Chen. 185-190 [doi]
- SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection)Hannah A. S. Adjei, Tan Shunhua, George Kofi Agordzo, Yangyang Li, Gregory Peprah, Emmanuel S. A. Gyarteng. 187-193 [doi]
- A Survey of UAV Clustering AlgorithmXuewen Xia, Yonghang Yan, Zhijia Li, Dan Meng, Lun Xia, Chen Chen. 191-196 [doi]
- Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM MethodZengguang Liu, Xiaochun Yin, Ruiping Yang, Anming Dong. 194-199 [doi]
- Beamforming Design of the Wireless Power Transfer System into Multiple IoT SensorsChangyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu. 197-200 [doi]
- Zero-Day Attack Packet Highlighting SystemJang-Hyeon Jeong, Jong-Beom Kim, Seong Gon Choi. 200-204 [doi]
- An analytical model of MANET single-path and multi-path load balancing routing protocol based on Markov modelLun Xia, Yonghang Yan, Dan Meng, Zhijia Li, Xuewen Xia, Chen Chen. 201-206 [doi]
- Implementation of Smart Farm Devices using Open Source SoftwareSunghyun Yoon, Mun-Hwan Choi, Juyoung Park. 205-209 [doi]
- BiLSTM-Ridge Regression Meta Learning Model for Few-Shot Logs ClassificationHanji Shen, Jun Li, Xiang Fu. 207-211 [doi]
- Proposing Encryption Selection Model for IoT Devices Based on IoT Device DesignMatasem Saleh, N. Z. Jhanjhi, Azween Abdullah, Raazia Saher. 210-219 [doi]
- A Dynamic Cyber-attack Approach for Real-time Hardware-in-the-loop Simulation of Power GridZijiao Zhou, Haowei Yang, Huibo Li, Jihao Zhang, Siqi Li, Xiang Gao, Peng Gong. 212-217 [doi]
- An IoT Device-trusted Remote Attestation FrameworkKyeong Tae Kim, Jae-Deok Lim, Jeong-Nyeo Kim. 218-223 [doi]
- Resilience Analysis of Multichord Peer to Peer IoT Satellite NetworksAhmed Ismail Abdel Ghafar, Ángeles Vazquez Castro, Mohamed Essam Khedr. 220-225 [doi]
- A Survey of Secure Boot Schemes for Embedded DevicesRui Wang, Yonghang Yan. 224-227 [doi]
- A Study on the Cultivation Plan Service at the Preliminary production phase based on bigdata analysisHeechang Chung, Dongil Kim, Sokpal Cho. 226-229 [doi]
- A Novel Trusted Boot Model for Embedded Smart Device without TPMRui Wang, Yonghang Yan. 228-233 [doi]
- Cooperative Motion Planning for Multiple UAVs via the Bézier Curve Guided Line of Sight TechniquesWarunyu Hematulin, Patcharin Kamsing, Peerapong Torteeka, Thanaporn Somjit, Thaweerath Phisannupawong, Tanatthep Jarawan. 230-236 [doi]
- A Conceptual Architecture for Deep-learning-based Video-Objects Retrieving SystemDinh-Lam Pham, Viet-Vu Vu, Byeongnam Yoon, Kyoungsook Kim, Kwanghoon Pio Kim. 234-238 [doi]
- Bayesian Network and Semidefinite Programming Based Wireless Power Transfer Manufacturing System State Estimation and RegulationMd. Masud Rana 0006, Narendra Dahotre. 237-241 [doi]
- IoTES (A Machine learning model) Design dependent encryption selection for IoT devicesMatasem Saleh, NZ Jhanjhi, Azween Abdullah, Raazia Saher. 239-246 [doi]
- Wi-Fi Received Signal Strength-based Indoor Localization System Using K-Nearest Neighbors fingerprint integrated D*algorithmTanatthep Jarawan, Patcharin Kamsing, Peerapong Torteeka, Shariff Manuthasna, Warunyu Hematulin, Tachodom Chooraks, Thaweerath Phisannupawong, Sitthirak Sangkarak, Sookaseam Mungkhud, Thanaporn Somjit. 242-247 [doi]
- A Defect Detection Model for Casting Product using Wavelet Transform Denoise and XceptionJuyong Park, Seokju Oh, Jongpil Jeong. 247-251 [doi]
- An efficient & Cost-Effective EPON-Based Next Generation 5G Mobile Backhaul RAN ArchitectureSyed Rashid Zaidi, Ajaz Sana, Shahab Hussain. 248-253 [doi]
- A Time-Series Process Event Log Preprocessing Approach for Data-Intensive and Predictive Operationalization of Smart FactoriesMinjae Park, Sohyang Park, Thanh Hai Nguyen, Dinh-Lam Pham, Dongkeun Oh, Kyoung-Sook Kim, In-Kyoo Chun, Kwanghoon Pio Kim. 252-255 [doi]
- Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled DatasetGyeoul Lee, Jonghoon Lee, Youngsoo Kim, Jong Geun Park. 254-258 [doi]
- Overview: Technology Roadmap of the Future Trend of Metaverse based on IoT, Blockchain, AI Technique, and Medical Domain Metaverse ActivityMd Ariful Islam Mozumder, Muhammad Mohsan Sheeraz, Ali Athar, Satyabrata Aich, Hee-Cheol Kim 0001. 256-261 [doi]
- Busy/Idle Duration Prediction for Video and Audio WLAN Traffics Using Autoregressive Predictor with Data CategorizationYafei Hou, Shun Kawasaki, Satoshi Denno. 259-264 [doi]
- Analyzing Disinformation with the Active Propagation StrategyChih Hung Chen, Yiwei Ma, Ying Hsun Lai, Wen-Tsung Chang, Shun-Ching Yang. 262-266 [doi]
- Timestamp Synchronization of Received Frames among Multiple Wireless LAN Nodes for Robust Access Point CoordinationKazuto Yano, Eiji Nii, Kenta Suzuki, Koji Yamamoto. 265-270 [doi]
- An Efficient Topology-based Optimization Method of Broadband Absorbing MaterialYiran Li, Gentaro Konishi, Megumi Saito, Shigeru Shimamoto. 267-271 [doi]
- APT attack response system through AM-HIDSSeoung-Pyo Hong, Chae-Ho Lim, Hoon Jae Lee. 271-274 [doi]
- Metadata Management and Harvesting System in Smart Open Data As a ServiceMinh Chau Nguyen, Hee-Sun Won, Siwoon Son, Yerin Woo, Hyeonjae Jeong. 272-275 [doi]
- Malware Developing Guide: Encryption and DecryptionJutiphat Chatsomsanga, Chawalit Benjangkaprasert. 275-278 [doi]
- Threat Modeling Analysis on FireStormcx's Webcam SystemJong Jin Cho, Miyoung Kang. 276-281 [doi]
- Intrusion Representation and Classification using Learning AlgorithmBabu Kaji Baniya. 279-284 [doi]
- An Initial Usability Testing for Improving Acceptance Criteria in A Scrum Project: An Angkasa LMS case studyDana Sulistiyo Kusumo, Nungki Selviandro, Kusuma Ayu Laksitowening, Veronikha Effendy, Monterico Adrian. 282-287 [doi]
- Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA)Abdul Fuad Abdul Rahman, Azni Ab Halim, Shazwani Salleh, Nur Farahin Jamaludin, Nurul Syazwani Kamarulzaman, Madihah Zulfa Mohamad. 285-291 [doi]
- Optical Sideband Modulation in Silicon Photonics Platform Using Mach-Zehnder InterferometersMuhammad Fasih, Hyeonho Yoon, Namhyun Kwan, Junhyeong Kim, Jinhyeong Yoon, Rabiul Islam Sikder, Hamza Kurt, Hyo-Hoon Park. 288-292 [doi]
- Drone Forensics: A Case Study on DJI Mavic Air 2James Kin Wah Lan, Frankie Kin Wah Lee. 291-296 [doi]
- Different Multi-layer Photonic Configurations for Light Filtering in Optical CommunicationsRabiul Islam Sikder, Muhammad Fasih, Zunnoor Fayyaz Awan, Hyeonho Yoon, Hyo-Hoon Park, Hamza Kurt. 293-296 [doi]
- Study on Systematic Ransomware Detection TechniquesSun-Jin Lee, Hye-Yeon Shim, Yu Rim Lee, Tae Rim Park, So-Hyun Park 0001, Il-Gu Lee. 297-301 [doi]
- Performance Analysis of Relay-Aided NOMA in Underwater Optical Wireless Communication System under Ocean TurbulenceYanjun Liang, Hongxi Yin, Lianyou Jing, Xiuyang Ji, Jianying Wang. 297-302 [doi]
- Wireless Voice-controlled Movable Electrical Heating RadiatorYuxin Li, Jinpeng Chen, Bing-Yuh Lu, Xin Li, CanJie Yao, LinShu Zheng, Xin Bai, WanQin Jiang. 302-305 [doi]
- 8K Video Data Transmission through Optical Phased Array Packaged by Direct Optical Wire BondingHyun-Woo Rhee, Jong-Bum You, Jae-Yong Kim, Hyeonho Yoon, Hyo-Hoon Park. 303-306 [doi]
- TCP Congestion Avoidance in Data Centres using Reinforcement LearningAli Hassan, Shahram Shah-Heydari. 306-311 [doi]
- Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine LearningYoshi Michael Cho, Hiroyuki Imada, Naoto Kawamura, Hyunho Kang, Keiichi Iwamura. 307-312 [doi]
- An Extensible Parsing Pipeline for Unstructured Data ProcessingShubham Jain, Amy de Buitléir, Enda Fallon. 312-318 [doi]
- The Impact of the Practical Security Test during the Software Development LifecycleShiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang. 313-316 [doi]
- OWASP IoT Top 10 based Attack Dataset for Machine LearningNay Myat Min, Vasaka Visoottiviseth, Songpon Teerakanok, Nariyoshi Yamai. 317-322 [doi]
- Vehicle Detection Counting Algorithm Based on Background Subtraction Algorithm and SORTJun Guo, Heyan Gao, Zeyu Yan, Jiahui Cao, Zhenbo Fu. 319-325 [doi]
- Autoencoder ensembles for network intrusion detectionChun Long, Jianping Xiao, Jinxia Wei, Jing Zhao, Wei Wan, Guanyao Du. 323-333 [doi]
- A Conversion System Based on Acoustic Communication for Using Bluetooth Low Energy Sensors UnderwaterYoshiaki Taniguchi, Hiroto Masuda. 326-329 [doi]
- A Review of Gateway Load Balancing Methods in Connecting MANET into InternetZhang Hui, Lingli Zhang, Yonghang Yan, Linlin Ci. 330-335 [doi]
- A Survey of Security AggregationSufang Zhou, Mingzhe Liao, Baojun Qiao, Xiaobo Yang. 334-340 [doi]
- A Survey of Multipath Load Balancing Based on Network Stochastic Model in MANETHui Zhang, Lingli Zhang, Yonghang Yan, Linlin Ci. 336-341 [doi]
- A Heuristic Approach to Dynamically Update Approximations of Dominance Based Rough Set TheoryFaryal Nosheen, Usman Qamar, Muhammad Summair Raza. 341-346 [doi]
- Sea Surface Temperature Prediction Approach Based on 3D CNN and LSTM with Attention MechanismBaiyou Qiao, Zhongqiang Wu, Zhong Tang, Gang Wu 0007. 342-347 [doi]
- A Novel Defect Classification Scheme Based on Convolutional Autoencoder with Skip Connection in Semiconductor ManufacturingJaegyeong Cha, Juyong Park, Jongpil Jeong. 347-352 [doi]
- Vision Detection System Based on Mixed Recognition of Gesture and SpeechJun Guo, Jingjing Hu, Yuhua Lai, Kaikai An, Zhengxiao Zhang. 348-353 [doi]
- A Fast Clustering-based Recommender System for Big DataHong-Quan Do, T. H.-An Nguyen, Quoc-Anh Nguyen, Trung Hieu Nguyen, Viet-Vu Vu, Cuong Le. 353-359 [doi]
- Proposal of conversational chatbots for educational remediation in the context of covid-19Kokou Gaglo, Bessan Melckior Dégboé, Ghislain Mervyl S. J. Kossingou, Samuel Ouya. 354-358 [doi]
- Facial Expression Recognition: A Survey and its ApplicationsVu-Tuan Dang, Hong-Quan Do, Viet-Vu Vu, Byeongnam Yoon. 359-367 [doi]
- A feature extraction method for automatic identification of flying targets from radar dataM. T. Nguyen, A.-T. Nguyen, V. D. Hoang, D. D. Lam. 360-364 [doi]
- An empirical study for density peak clusteringViet-Vu Vu, Byeongnam Yoon, Hong-Quan Do, Hai-Minh Nguyen, Tran-Chung Dao, Cong-Mau Tran, Doan-Vinh Tran. 365-369 [doi]
- Detection of Different stages of COPD Patients Using Machine Learning TechniquesAli Hussain, Ikromjanov Kobiljon Komil Ugli, Beom Su Kim, Minji Kim, Harin Ryu, Satyabrata Aich, Hee-Cheol Kim 0001. 368-372 [doi]
- Optimization Of Eigrp Dynamic Routing Protocol Based On Artificial Intelligence AlgorithmJames Kouawa Tamgno, Emile Kone Araba, Zacharia Damoue, Claude Lishou. 370-379 [doi]
- DNN-based Human Activity Recognition by Learning Initial Motion Data for Virtual Multi-SportsJong-Sung Kim. 373-375 [doi]
- Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific LanguageMing-Shen Jian, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Mu-Xuan Yu. 376-381 [doi]
- Premium Rate Services Fraud DetectionMariella Rivas, Richard Roach, Patrick Hosein. 380-386 [doi]
- Digital elementary school solution with moodlebox in a conflict zone: the case of the Central African RepublicNadege Gladys Ndassimba, Edgard Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya. 382-386 [doi]
- Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service ResolversYong Jin, Kazuya Iguchi, Nariyoshi Yamai, Masahiko Tomoishi. 387-392 [doi]
- Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in ThailandRattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti. 387-391 [doi]
- Cloud Security Issues and Log-based Proactive StrategyOumayma Mejri, Dana Yang, Inshil Doh. 392-397 [doi]
- Quick Blocking Operation of Firewall System Cooperating with IDS and SDNYusei Katsura, Pranpariya Sakarin, Nariyoshi Yamai, Hiroyuki Kimiyama, Vasaka Visoottiviseth. 393-398 [doi]
- SOI Rib Waveguide Physical Dimension Dependent Micro Ring Resonator CharacterizationA. T. C. Chen, M. Rakib Uddin. 398-401 [doi]
- Ergodic Capacity Analysis of OFDM-based NB-PLC SystemsJavier Hernandez Fernandez, Luis Lacasa, Aymen Omri, Alfredo Sanz, Munther E. Koborsi. 399-405 [doi]
- Transverse Electric (TE) and Transverse Magnetic (TM) Modes Dependent Effective Index Analysis for a Nano-scale Silicon WaveguideA. T. C. Chen, M. Rakib Uddin. 402-406 [doi]
- Dynamic Voting based Explainable Intrusion Detection System for In-vehicle NetworkNishat I Mowla, Joakim Rosell, Arash Vahidi. 406-411 [doi]
- Sleep Mode on Delay Sensitive Traffic on Optical Network UnitNurazmina Lingas, M. Rakib Uddin. 407-410 [doi]
- Demonstration of Hybrid Probabilistic Geometric Shaping 64QAM Optical Fiber Transmission Using Optimized Constellation for MAP Detection with Hard Decision DecodingRachata Maneekut, Daniel J. Elson, Yuta Wakayama, Shohei Beppu, Hidenori Takahashi, Noboru Yoshikane, Takehiro Tsuritani. 411-414 [doi]
- Trustworthy Software Development - practical view of security processes through MVP methodologyShiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang, Chi-Chin Tsai. 412-416 [doi]
- Edge Computing System applying Integrated Object Recognition based on Deep LearningKwihoon Kim, Se-Won Oh. 415-419 [doi]
- Security Threat Analysis and Treatment Strategy for ORANC. T. Shen, Y. Y. Xiao, Y.-W. Ma, J.-L. Chen, Cheng-Mou Chiang, S. J. Chen, Y. C. Pan. 417-422 [doi]
- A Transfer Learning Approach for Identification of Distracted DrivingIkromjanov Kobiljon Komil Ugli, Ali Hussain, Beom Su Kim, Satyabrata Aich, Hee-Cheol Kim 0001. 420-423 [doi]
- An Automated Vulnerability Assessment Approach for WebAPI that Considers Requests and ResponsesToru Taya, Masaki Hanada, Yoichi Murakami, Atsushi Waseda, Yuki Ishida, Takao Mimura, Moo Wan Kim, Eiji Nunohiro. 423-430 [doi]
- Relocation Framework to Improve the Usage Efficiency of Bicycle-sharing SystemsChun-Hee Lee, Jeong-Woo Lee, Yung-Joon Jung, Il-Yeon Cho. 424-428 [doi]
- A Study of Throughput Prediction using Convolutional Neural Network over Factory EnvironmentYafei Hou, Kazuto Yano, Norisato Suga, Julian Webber, Eiji Nii, Toshihide Higashimori, Satoshi Denno, Yoshinori Suzuki. 429-434 [doi]
- Performance Evaluation of Fully Homomorphic Encryption for End-to-End Cryptographic Communication in Multihop NetworksHye-Yeon Shim, Tae Rim Park, Il-Gu Lee. 431-434 [doi]
- Robot for Ball Fetch-and-Carry with Computer Vision in Deep LearningLimin Su, Chao-Jen Huang, Mei Liu, Bing-Yuh Lu, Jidong Che, Ximiao Wang, Jiqi Feng, Changyong Li, Youhong Feng, Yueliu Mo. 435-438 [doi]
- Android malware detection: Investigating the impact of imbalanced data-sets on the performance of machine learning modelsZakaria Sawadogo, Gervais Mendy, Jean Marie Dembele, Samuel Ouya. 435-441 [doi]
- Oilonomics: Making sense of the impact of hydrocarbon production on socio-economicsFarrukh Hamza, Qian Sun, Abdunnaser Erwemi, Jin Haeng Lee, Ashfak Ahmed Chowdhury, Quyen Vu Nguyen. 439-445 [doi]
- Active learning for density peak clusteringViet-Vu Vu, Byeongnam Yoon, Cuong Le, Hong-Quan Do, Hai-Minh Nguyen, Chung Tran, Viet-Thang Vu, Cong-Mau Tran, Doan-Vinh Tran, Tien-Dung Duong. 442-446 [doi]
- The Comparison For Epidemiological Investigation Of Corona Virus-19 PandemicWoohyun Park. 446-448 [doi]
- Active constraints selection based on density peakViet-Vu Vu, Byeongnam Yoon, Hong-Quan Do, Hai-Minh Nguyen, Tran-Chung Dao, Cong-Mau Tran, Doan-Vinh Tran, Thi-Nhuong Phi, Viet-Thang Vu, Tien-Dung Duong. 447-452 [doi]
- Sexual Offenses against Children: Social Learning Theory and Dark Web ReinforcementChi-Cheng Yang, En-Tien Ma, Da-Yu Kao. 449-454 [doi]
- Applying PSO to improve the pedestrian fall detection rate using wearable sensor dataHong-Lam Le, Duc-Nhan Nguyen, Thi-Thu-Trang Ngo, Ha-Nam Nguyen. 453-458 [doi]
- Locating High-loss Links for OpenFlow Networks by Multiple Hosts to Probe PacketsNguyen Minh Tri, Masahiro Shibata, Masato Tsuru, Akira Kawaguchi. 455-460 [doi]
- Recognition of Transformer High Frequency Partial Discharge Based on Time Domain FeatureMeng Liu, Ying Lin, Qingdong Zhu, Junxin Wang, Yi Yang, Chao Gu, Wenbing Zhu, Wenjie Zheng, Demeng Bai, Jiafeng Qin, Jian Wang, Fengda Zhang, Zhuangzhuang Li. 459-463 [doi]
- End-to-End Routing in SDN Controllers Using Max-Flow Min-Cut Route Selection AlgorithmNada Alzaben, Daniel W. Engels. 461-467 [doi]
- Domain Recognition By Border Observation In Dimension 1 & 2James Kouawa Tamgno, Zacharia Damoue, Samuel Ouya, Ahmed D. Kora. 464-468 [doi]
- Intelligent ATM replenishment optimization based on hybrid genetic algorithmJiecong Tang, Shipeng Wang, Tao Bai, Songfeng Lu, Jing Xiong. 469-475 [doi]
- Process Mining on Learning Activities in a Learning Management SystemGede Agung Ary Wisudiawan, Angelina Prima Kurniati. 476-482 [doi]
- Usability Evaluation and Recommendation of User Interface Design for e-HAC Application by Using User-Centered Design MethodSalsabilla Rinaldi, Arfive Gandhi, Nungki Selviandro. 483-490 [doi]
- Usability Evaluation of an Interactive Educational Mobile ApplicationA. A. Gede Yudhi Paramartha, Ketut Agus Seputra, Fauzan Azima, Dio Pramudia Putra, Eva Dwi, Kadek Yota Ernanda Aryanto. 491-495 [doi]
- The effects of constructing robot-based storytelling system on college students' computational thinking skill and technology comprehensionChih-Chien Hu, Ming-Hsien Chen, Imam Yuadi, Nian-Shing Chen. 496-500 [doi]
- Enhancing CNF performance for 5G core network using SR-IOV in KubernetesDinh Tam Nguyen, Ngoc Lam Dao, Van Thuyet Tran, Khac Thuan Lang, Thanh-Tu Pham, Phi Hung Nguyen, Cong Dan Pham, Tuan Anh Pham, Duc Hai Nguyen, Huu-Thanh Nguyen. 501-506 [doi]
- A technique to improve the displaying quality of skin deformation caused by external forceNguyen Duc Hoang, Do Nang Toan, Nguyen Tuan Minh. 507-512 [doi]
- SNS Influencer Marketing Platform for Market Advertisement of Small-Sized Business RunnersMose Gu, Jinyong Kim, Yunbo Shim, Jaehoon Paul Jeong. 513-517 [doi]
- Verification Framework for Software-Defined NetworkingMiyoung Kang, Jong Jin Cho. 518-523 [doi]
- Multi-Objective Optimization Based on Adaptive Evolution Algorithm for Disassembly Line Network ProblemsMing-Shen Jian, Wei-Sin Wu, Yi-Hsuan Lin, Xin-Mei Wu, Peng-Wen Wang. 524-533 [doi]
- An Eye Blink detection technique in video surveillance based on Eye Aspect RatioTran Thanh Phuong, Lam Thanh Hien, Do Nang Toan, Ngo Duc Vinh. 534-538 [doi]
- Design and Implementation of a Real-time Target Detection and Tracking SystemXinyan Cao, Guang Chen, Yaxin Zhao, Wei Ren, Jian Cao. 539-543 [doi]
- Android Malware Classification: Updating Features Through Incremental Learning Approach(UFILA)Zakaria Sawadogo, Gervais Mendy, Jean Marie Dembelle, Samuel Ouya. 544-550 [doi]
- Domain Identification By Frontier Observation In Cylindrical And Spherical Reference FrameJames Kouawa Tamgno, Boudal Niang, Mamadou Alpha Barry, Samuel Ouya. 551-556 [doi]
- Requirements Knowledge Model Construction and Requirements Elicitation Method of Avionics Systems Software based on Multi-ontologyXuan Hu, Jie Liu. 1265-1279 [doi]
- Evaluation of A Mesh Network based on LoRa TechnologyVan-Dai Pham, Victor Kisel, Ruslan Kirichek, Andrey Koucheryavy, Alexander Shestakov. 1280-1285 [doi]
- Orthogonal Defect Classification-based Ontology Construction and Application of Software-hardware Integrated Error Pattern of Software-intensive SystemsXuan Hu, Jie Liu. 1286-1298 [doi]
- Determination of Subscribers Coordinates using Flying Network for EmergenciesTruong Duy Dinh, Vladimir M. Vishnevsky, Van-Dai Pham, Duc Tran Le, Ruslan Kirichek, Andrey Koucheryavy. 1309-1318 [doi]
- Role of Teachers in Developing Learning PedagogyDeepanjali Mishra, Mangal Sain. 1315-1321 [doi]
- Web based Learning: A Methodology to Teach Literature in a ClassroomDeepanjali Mishra, Mangal Sain. 1329-1335 [doi]
- Early Detection of LDDoS Attacks in IoT Utilizing Locality Sensitive Incremental TSVM MethodXiaochun Yin, Zengguang Liu, Deyong Liu, Zhenge Liu. 1336-1344 [doi]
- A Novel Fully Distributed EPON-Based 5G RAN Architecture Modeling with Handover AnalysisSyed Rashid Zaidi, Ajaz Sana, Shahab Hussain. 1364-1373 [doi]
- A Method for Controlling Scan Rate Based on Estimated Retransmission Rate of Background TrafficKenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki. 1374-1384 [doi]
- Ransomware Detection Using Open-source ToolsSun-Jin Lee, Hye-Yeon Shim, Yu Rim Lee, Tae Rim Park, Il-Gu Lee. 1385-1391 [doi]
- Dimension Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide in Transverse ModeA. T. C. Chen, R. Petra, K. S. K. Yeo, M. Rakib Uddin. 1392-1398 [doi]
- An Efficient hole Recovery Method in Wireless Sensor NetworksMary Wu. 1399-1404 [doi]
- End-to-End Routing Algorithm Based on Max-Flow Min-Cut in SDN ControllersNada Alzaben, Daniel W. Engels. 1405-1413 [doi]