Abstract is missing.
- Classification and Discretization of Shadowing Toward Low Storage Radio MapKeita Katagiri, Takeo Fujii. 1-6 [doi]
- Anomaly Detection for Alzheimer's Disease in Brain MRIs via Unsupervised Generative Adversarial LearningJean Nathan Cabreza, Geoffrey A. Solano, Sun Arthur A. Ojeda, Vincent Munar. 1-5 [doi]
- Countering DNS Vulnerability to Attacks Using Ensemble LearningLove Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Simeon Okechukwu Ajakwe, Jae-Min Lee, Dong-Seong Kim 0003. 7-10 [doi]
- NetMD- Network Traffic Analysis and Malware DetectionSampath Kumar Katherasala, Vaddeboyina Sri Manvith, Ajay Therala, Manjari Murala. 11-16 [doi]
- Defect Information Synthesis via Latent Mapping Adversarial NetworksSeunghwan Song, Jun-Geol Baek. 17-22 [doi]
- FFDNet Based Channel Estimation for Multiuser Massive MIMO System with One-Bit ADCsMd. Habibur Rahman, Md. Shahjalal, Md. Osman Ali, Byung-Deok Chung, Yeong Min Jang. 23-26 [doi]
- iVoiding: A Thermal-Image based Artificial Intelligence Dynamic Voiding Detection SystemYu-Chen Chen, Jian-Ping Su, Cheng-Han Tsai, Ming-Che Chen, Wan-Jung Chang, Wen-Jeng Wu. 27-29 [doi]
- Determining Jigsaw Puzzle State from an Image based on Deep LearningIjaz Ahmad, Suk-seung Hwang, Seokjoo Shin. 30-32 [doi]
- Growth Estimation Sensor Network System for Aquaponics using Multiple Types of Depth CamerasRyota Murakami, Hiroshi Yamamoto. 33-38 [doi]
- Image Synthesis with Single-type Patterns for Mixed-type Pattern Recognition on Wafer Bin MapsYunseon Byun, Jun-Geol Baek. 39-43 [doi]
- Evaluating Opcodes for Detection of Obfuscated Android MalwareSaneeha Khalid, Faisal-Bashir Hussain. 44-49 [doi]
- Procedural Generation of Game Levels and Maps: A ReviewTianhan Gao, Jin Zhang, Qingwei Mi. 50-55 [doi]
- Similarity-based Local Feature Extraction for Wafer Bin Map Pattern RecognitionJieun Kim, Jun-Geol Baek. 56-59 [doi]
- Body Segmentation Using Multi-task LearningJulijan Jug, Ajda Lampe, Vitomir Struc, Peter Peer. 60-68 [doi]
- Aerial Supervision of Drones and Other Flying Objects Using Convolutional Neural NetworksVivian Ukamaka Ihekoronye, Simeon Okechukwu Ajakwe, Dong-Seong Kim 0003, Jae-Min Lee. 69-74 [doi]
- Performance Analysis of UAV-based Array Antenna Arrangement for Target DetectionJi-Hyeon Kim, Soon-young Kwon, Hyoung-Nam Kim. 75-77 [doi]
- Image Prediction for Lane Following Assist using Convolutional Neural Network-based U-NetByung Chan Choi, Jaerock Kwon, Haewoon Nam. 78-81 [doi]
- Forward and Backward Warping for Optical Flow-Based Frame InterpolationJoi Shimizu, Heming Sun, Jiro Katto. 82-86 [doi]
- Performance Improvement Method of the Video Visual Relation Detection with Multi-modal Feature FusionKwang-Ju Kim, Pyong-Kun Kim, Kil-Taek Lim, Jong Taek Lee. 87-91 [doi]
- A high-speed driver behavior detection deep learning system using the amount of change in contrast between framesMin Woo Yoo, Jihun Kim, Daewoong Cha, Woo-Sung Son, Donggyu Lee, Dong-Seog Han. 92-95 [doi]
- Intelligent Receiver for Optical Camera CommunicationIda Bagus Krishna Yoga Utama, Md. Habibur Rahman, Byungdeok Chung, Yeong Min Jang. 96-100 [doi]
- Interference analysis study for coexistence between C-V2X and Wi-Fi 6E in the 6GHz bandHan Sol Kim, Young-Woon Kim, Won-Seok Yoo, Won-Cheol Lee. 101-103 [doi]
- Neural Architecture Search for Real-Time Driver Behavior RecognitionJaeho Seong, Chaehyun Lee, Dong-Seog Han. 104-108 [doi]
- Smart Anomaly Detection: Deep Learning modeling Approach and System Utilization AnalysisMourad Bouache, Benaoumeur Senouci. 109-114 [doi]
- An Evaluation Framework for Machine Learning Methods in Detection of DoS and DDoS IntrusionTemechu Girma Zewdie, Anteneh Girma. 115-121 [doi]
- A study on the application of mission-based cybersecurity testing and evalulation of weapon systemsIkjae Kim, Hansung Kim, Dongkyoo Shin. 122-127 [doi]
- Grey Wolf Optimizer-Based Automatic Focusing for High Magnification SystemsIslam Helmy, Wooyeol Choi 0002. 128-132 [doi]
- Research and examination on implementation of super-resolution models using deep learning with INT8 precisionShota Hirose, Naoki Wada, Jiro Katto, Heming Sun. 133-137 [doi]
- Mitigating Overflow of Object Detection Tasks Based on Masking Semantic Difference Region of Vision Snapshot for High EfficiencyHeuijee Yun, Daejin Park. 138-140 [doi]
- Calibration-Net: LiDAR and Camera Auto-Calibration using Cost Volume and Convolutional Neural NetworkAn Nguyen Duy, Myungsik Yoo. 141-144 [doi]
- Granular Analysis of Pretrained Object DetectorsEric Xue, Tae-Soo Kim. 145-149 [doi]
- Irregular Repetition Slotted ALOHA Scheme with Multi-Packet Reception in Packet Erasure ChannelChundie Feng, Xuhong Chen, Zhengchuan Chen, Zhong Tian, Yunjian Jia, Min Wang 0028. 150-155 [doi]
- Two-Policy Cooperative Transfer for Alleviation of Sim-to-Real GapLiangdong Wu, Fangzhou Xiong, Zhiyong Liu 0001. 156-161 [doi]
- Graph Neural Network-based Clustering Enhancement in VANET for Cooperative DrivingHang Hu 0008, Myung J. Lee. 162-167 [doi]
- Machine Learning-Based Power Loading for Massive Parallel Gaussian ChannelsMin Jeong Kang, Jung Hoon Lee. 168-170 [doi]
- Enhanced Semi-persistent scheduling (e-SPS) for Aperiodic Traffic in NR-V2XMalik Muhammad Saad 0001, Muhammad Ashar Tariq, Md. Mahmudul Islam, Muhammad Toaha Raza Khan, Junho Seo, Dongkyun Kim. 171-175 [doi]
- Target Detection using U-Net for a DTV-based Passive Bistatic Radar SystemJi Hun Park, Do Hyun Park, Hyoung-Nam Kim. 176-178 [doi]
- Privacy-preserving collaborative machine learning in biomedical applicationsWonsuk Kim, Junhee Seok. 179-183 [doi]
- Computer Code Representation through Natural Language Processing for fMRI Data AnalysisJaeyoon Kim, Una-May O'Reilly, Junhee Seok. 184-187 [doi]
- A Machine Learning Approach in Evaluating Symptom Screening in Predicting COVID-19John Althom A. Mendoza, Geoffrey A. Solano, Marc Jermaine Pontiveros, Jaime Caro, Peter Martin D. Gomez, Conner G. Manuel, Paulyn Jean Buenaflor Rosell-Ubial, Michael L. Tee. 188-193 [doi]
- A Study on the Clinical Effectiveness of Deep Learning CAD TechnologyJu-Hyuck Han, Hyun Woo Oh, Woong-Sik Kim. 194-196 [doi]
- Fake Data Generation for Medical Image Augmentation using GANsDonghwan Kim, Jaehan Joo, Suk Chan Kim. 197-199 [doi]
- Vision Anomaly Detection Using Self-Gated Rectified Linear UnitIsrat Jahan, Md. Osman Ali, Md. Habibur Rahman, Byungdeok Chung, Yeong Min Jang. 200-203 [doi]
- A Comparison of YOLO and Mask-RCNN for Detecting Cells from Microfluidic ImagesMehran Ghafari, Daniel Mailman, Parisa Hatami, Trevor Peyton, Li Yang, Weiwei Dang, Hong Qin. 204-209 [doi]
- Multiview Attention for 3D Object Detection in Lidar Point CloudKevin Tirta Wijaya, Dong-Hee Paek, Seung-Hyun Kong. 210-215 [doi]
- Multi-scale synergy approach for real-time semantic segmentationQuyen Van Toan, Min-Young Kim. 216-220 [doi]
- CIAFill: Lightweight and Fast Image Inpainting with Channel Independent AttentionChung-Il Kim, Saim Shin, Han-Mu Park. 221-229 [doi]
- Heart Disease Prediction Using Adaptive Infinite Feature Selection and Deep Neural NetworksSudipta Modak, Esam Abdel-Raheem, Luis Rueda. 235-240 [doi]
- A federated binarized neural network model for constrained devices in IoT healthcare servicesHyeontaek Oh, Jongmin Yu, Nakyoung Kim, Dongyeong Kim, Jangwon Lee, Jinhong Yang. 241-245 [doi]
- Hierarchical User Status Classification for Imbalanced Biometric Data ClassNakyoung Kim, Hyunseo Park, Gyeong Ho Lee, Jaeseob Han, Hyeontaek Oh, Jun Kyun Choi. 246-250 [doi]
- Increasing Accuracy of Hand Gesture Recognition using Convolutional Neural NetworkGyutae Park, V. K. Chandrasegar, JoongGun Park, Jinhwan Koh. 251-255 [doi]
- Impacts of Behavioral Biases on Active Learning StrategiesDeepesh Agarwal, Obdulia Covarrubias-Zambrano, Stefan H. Bossmann, Balasubramaniam Natarajan. 256-261 [doi]
- Effect of the Period of the Fourier Series Approximation for Binarized Neural NetworkSeonyong Lee, Heeyoul Kwak, Jong-Seon No. 262-265 [doi]
- CMCL: Clustering-based Memory Management for Continual LearningJiae Yoon, Hyuk Lim. 266-268 [doi]
- TinyML: A Systematic Review and Synthesis of Existing ResearchHui Han, Julien Siebert. 269-274 [doi]
- A Survey of Procedural Content Generation of Natural Objects in GamesTianhan Gao, Jiahui Zhu. 275-279 [doi]
- Reinforcement Learning for Neural Collaborative FilteringAlexandros I. Metsai, Konstantinos Karamitsios, Konstantinos Kotrotsios, Periklis Chatzimisios, George Stalidis, Kostas Goulianas. 280-283 [doi]
- A Survey of Markov Model in Reinforcement LearningTianhan Gao, Baicheng Chen, Qingwei Mi. 284-287 [doi]
- Fairness Enhancement of TCP Congestion Control Using Reinforcement LearningSang-Jin Seo, You Ze Cho. 288-291 [doi]
- Merging Reinforcement Learning and Inverse Reinforcement Learning via Auxiliary Reward SystemWadhah Zeyad Tareq, Mehmet Fatih Amasyali. 292-297 [doi]
- Pothole Detection Using Optical Camera CommunicationMd. Osman Ali, Israt Jahan, Raihan Bin Mofidul, Byungdeok Chung, Yeong Min Jang. 298-301 [doi]
- Sensor Network System for Condition Detection of Harmful Animals by Step-by-step Interlocking of Various SensorsKeigo Uchiyama, Hiroshi Yamamoto, Eiji Utsunomiya, Kiyohito Yoshihara. 302-307 [doi]
- WiFi Positioning by Optimal k-NN in 3GPP Indoor Office EnvironmentSung Hyun Oh, Jeong Gon Kim. 308-312 [doi]
- A Study on the improvement of chinese automatic speech recognition accuracy using a lexiconMin-Jeong Gu, Shin-Gak Kang. 313-317 [doi]
- Addressing Data Sparsity with GANs for Multi-fault Diagnosing in Emerging Cellular NetworksA. Rizwan, A. Abu-Dayya, F. Filali, A. Imran. 318-323 [doi]
- Edge-Computing based Secure E-learning PlatformsSameer Ahmad Bhat, Dalia Alyahya, Muneer Ahmad Dar, Saadiya Shah. 324-328 [doi]
- Efficient classification of human activity using PCA and deep learning LSTM with WiFi CSISang-Chul Kim, Yong Hwan Kim. 329-332 [doi]
- MARL-based Optimal Route Control in Multi-AGV WarehousesHo-bin Choi, Ju-Bong Kim, Chang-Hoon Ji, Ullah Ihsan 0001, Youn-Hee Han, Se-Won Oh, Kwihoon Kim, Cheol-Sig Pyo. 333-338 [doi]
- DDPG-Edge-Cloud: A Deep-Deterministic Policy Gradient based Multi-Resource Allocation in Edge-Cloud SystemArslan Qadeer, Myung J. Lee. 339-344 [doi]
- A Study on Update Frequency of Q-Learning-based Transmission Datarate Adaptation using Redundant Check Information for IEEE 802.11ax Wireless LANKazuto Yano, Kenta Suzuki, Babatunde Segun Ojetunde, Koji Yamamoto. 345-350 [doi]
- User Coverage Maximization for a UAV-mounted Base Station Using Reinforcement Learning and Greedy MethodsAdhitya Bantwal Bhandarkar, Sudharman K. Jayaweera, Steven A. Lane. 351-356 [doi]
- SVR-based Blind Equalization on HF Channels with a Doppler SpreadSoon-young Kwon, Ji-Hyeon Kim, Hyoung-Nam Kim. 357-359 [doi]
- Resolving Camera Position for a Practical Application of Gaze Estimation on Edge DevicesLinh Van Ma, Tran Trung Tin, Moongu Jeon. 360-365 [doi]
- Throughput Prediction by Radio Environment Correlation Recognition Using Crowd Sensing and Federated LearningSatoshi Nakaniida, Takeo Fujii. 366-371 [doi]
- Thermal Array Sensor Resolution-Aware Activity Recognition using Convolutional Neural NetworkGoodness Oluchi Anyanwu, Cosmas Ifeanyi Nwakanma, Adinda Riztia Putri, Jae-Min Lee, Dong-Seong Kim 0003, Jeonghan Kim, Gihwan Hwang. 372-376 [doi]
- An Investigation on Deep Learning-Based Activity Recognition Using IMUs and Stretch SensorsNguyen Thi Hoai Thu, Dong-Seog Han. 377-382 [doi]
- Comparative analysis of solar power generation prediction system using deep learningSo-Yeong Kim, Eun-Ji Lee, Uttam Khatri, Seokjoo Shin, Ji In Kim, Goo-Rak Kwon. 383-386 [doi]
- Multi-head CNN and LSTM with Attention for User Status Estimation from Biometric InformationHyunseo Park, Nakyoung Kim, Gyeong Ho Lee, Jaeseob Han, Hyeontaek Oh, Jun Kyun Choi. 387-391 [doi]
- An Explainable Computer Vision in Histopathology: Techniques for Interpreting Black Box ModelSubrata Bhattacharjee, Yeong-Byn Hwang, Kobiljon Ikromjanov, Rashadul Islam Sumon, Hee-Cheol Kim 0001, Heung-Kook Choi. 392-398 [doi]
- Whole Slide Image Analysis and Detection of Prostate Cancer using Vision TransformersKobiljon Ikromjanov, Subrata Bhattacharjee, Yeong-Byn Hwang, Rashadul Islam Sumon, Hee-Cheol Kim 0001, Heung-Kook Choi. 399-402 [doi]
- A Generative Adversarial Network Approach to Metastatic Cancer Cell ImagesSeohyun Lee, Hyuno Kim, Hideo Higuchi, Masatoshi Ishikawa, Ryuichiro Natato. 403-406 [doi]
- UIRNet: Facial Landmarks Detection Model with Symmetric Encoder-DecoderSavina Jassica Colaco, Young-Jin Yoon, Dong-Seog Han. 407-410 [doi]
- Design and Analysis of an Efficient Energy Sharing System among Electric Vehicles using Evolutionary Game TheoryM. D. Rizwanul Kabir, Muhammad Mutiul Muhaimin, Md. Abrar Mahir, K. Habibul Kabir. 411-416 [doi]
- GAN-based Data Augmentation for UWB NLOS Identification Using Machine LearningDuc Hoang Tran, Byungdeok Chung, Yeong Min Jang. 417-420 [doi]
- BER Minimization by User Pairing in Downlink NOMA Using Laser Chaos-Based MAB AlgorithmMasaki Sugiyama, Aohan Li, Zengchao Duan, Makoto Naruse, Mikio Hasegawa. 421-426 [doi]
- Hybrid Energy Management Systems based on Edge Processing for Electric Transportation ApplicationsHenar Mike O. Canilang, Danielle Jaye S. Agron, Wansu Lim. 427-430 [doi]
- Studies on Intelligent Curation for the Korean Traditional Cultural HeritageJae-Ho Lee, Hee-Kwon Kim, Chan-Woo Park. 431-436 [doi]
- Community Detection with Graph Neural Network using Markov StabilityShunjie Yuan, Chao Wang, Qi Jiang, Jianfeng Ma. 437-442 [doi]
- Exploiting Heterogeneous Monitoring Data for Spatiotemporal Algal Bloom PredictionTaewhi Lee, Miyoung Jang, Jang-Ho Choi, Jongho Won, Jiyong Kim. 443-445 [doi]
- Three-dimensional Data Outlier Detected by Angle AnalysisZhongyang Shen. 446-450 [doi]
- Identification and Analysis of COVID-19-related Misinformation Tweets via Kullback-Leibler Divergence for Informativeness and Phraseness and Biterm Topic ModelingThomas Daniel S. Clamor, Geoffrey A. Solano, Nathaniel Oco, Jasper Kyle Catapang, Jerome V. Cleofas, Iris Thiele Isip-Tan. 451-456 [doi]
- Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart CitiesMuneer Ahmad Dar, Aadil Askar, Sameer Ahmad Bhat. 457-460 [doi]