Abstract is missing.
- Improving Performance and Energy Efficiency for OFDMA Systems Using Adaptive Antennas and CoMPYapeng Wang, Xu Yang, Laurie G. Cuthbert, Tiankui Zhang, Lin Xiao. 3-11 [doi]
- Privacy in Location Based Services: Protection Strategies, Attack Models and Open ChallengesPriti Jagwani, Saroj Kaushik. 12-21 [doi]
- An Efficient and Low-Signaling Opportunistic Routing for Underwater Acoustic Sensor NetworksZhengyu Ma, Quansheng Guan, Fei Ji, Hua Yu, Fangjiong Chen. 22-29 [doi]
- A Novel Mobile Online Vehicle Status Awareness Method Using Smartphone SensorsDang-Nhac Lu, Thi-Thu-Trang Ngo, Duc-Nhan Nguyen, Thi Hau Nguyen, Ha-Nam Nguyen. 30-37 [doi]
- A Study on OPNET State Machine Model Based IoT Network Layer TestYoung-hwan Ham, Hyo Taeg Jung, Hyun-Cheol Kim, Jin-Wook Chung. 38-45 [doi]
- A Secure Localization Algorithm Based on Confidence Constraint for Underwater Wireless Sensor NetworksXiaofeng Xu, Guangyuan Wang, Yongji Ren, Xiaolei Liu. 46-49 [doi]
- Generating Time Series Simulation Dataset Derived from Dynamic Time-Varying Bayesian NetworkGaram Lee, Hyunjin Lee, Kyung-Ah Sohn. 53-60 [doi]
- AMI-SIM: An NS-2 Based Simulator for Advanced Metering Infrastructure NetworkNam-Uk Kim, Tai-Myoung Chung. 61-68 [doi]
- Beyond Map-Reduce: LATNODE - A New Programming Paradigm for Big Data SystemsChai Yit Sheng, Phang Keat Keong. 69-75 [doi]
- Indoor Positioning Solely Based on User's SightMatthias Becker. 76-83 [doi]
- Naming Convention Scheme for Role Based Access Control in Cloud Based ERP PlatformsAbed Alshreef, Lin Li, Wahid Rajeh. 84-93 [doi]
- Korean/Chinese Web-Based Font Editor Based on METAFONT for User InteractionMinju Son, Gyeongjae Gwon, Jaeyeong Choi. 97-104 [doi]
- A Highly Robust and Secure Digital Image Encryption TechniqueMd. Anwar Hussain, Popi Bora, Joyatri Bora. 105-113 [doi]
- Saliency Based Object Detection and Enhancements in Static ImagesRehan Mehmood Yousaf, Saad Rehman, Hassan Dawood, Guo Ping, Zahid Mehmood, Shoaib Azam, Abdullah Aman Khan. 114-123 [doi]
- A Center Symmetric Padding Method for Image FilteringMengqin Li, Xiaopin Zhong. 124-130 [doi]
- Implementing a Stereo Image Processing for Medical 3D Microscopes with Wireless HMDCheolhwan Kim, Jiyoung Yoon, Yun-Jung Lee, Shihyun Ahn, Yongtaek Park. 131-138 [doi]
- Design of OpenGL SC 2.0 Rendering PipelineNakhoon Baek. 139-144 [doi]
- Saliency Detection via Foreground and Background SeedsXiao Lin, Zhixun Yan, Linhua Jiang. 145-154 [doi]
- Identification and Annotation of Hidden Object in Human Terahertz ImageGuiyang Yue, Zhihao Yu, Cong Liu 0011, Hui Huang, Yiming Zhu, Linhua Jiang. 155-163 [doi]
- Information Visualization for Mobile-Based Disability Test ApplicationsJongmun Jeong, Seungho Kim, Changsoon Kang, Mintae Hwang. 164-170 [doi]
- Deep Convolutional Neural Networks for All-Day Pedestrian DetectionXingguo Zhang, Guoyue Chen, Kazuki Saruta, Yuki Terata. 171-178 [doi]
- An Augmented Reality Learning System for Programming ConceptsKelwin Seen Tiong Tan, Yunli Lee. 179-187 [doi]
- Efficient vCore Based Container Deployment Algorithm for Improving Heterogeneous Hadoop YARN PerformanceSooKyung Lee, Minho Bae, Junho Eum, Sangyoon Oh. 191-201 [doi]
- A Real-Time Operating System Supporting Distributed Shared Memory for Embedded Control SystemsYuji Tamura, Doan Truong Thi, Takahiro Chiba, Myungryun Yoo, Takanori Yokoyama. 202-210 [doi]
- MBR Image Automation Analysis Techniques Utilizing EmulabGibeom Song, Manhee Lee. 213-220 [doi]
- Detection of DNS Tunneling in Mobile Networks Using Machine LearningVan Thuan Do, Paal Engelstad, Boning Feng, Thanh Van Do. 221-230 [doi]
- On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation FunctionChai Wen Chuah, Mustafa Mat Deris, Edward Dawson. 231-240 [doi]
- On the Security of a Privacy Authentication Scheme Based on Cloud for Medical EnvironmentChun-Ta Li, Dong-Her Shih, Chun-Cheng Wang. 241-248 [doi]
- Physical Layer Security with Energy Harvesting in Single Hop Wireless Relaying SystemPoonam Jindal, Rupali Sinha. 249-256 [doi]
- A System Design for the Measurement and Evaluation of the Communications Security Domain in ISO 27001: 2013 Using an OntologyPongsak Sirisom, Janjira Payakpate, Winai Wongthai. 257-265 [doi]
- Timing Side Channel Attack on Key Derivation FunctionsChai Wen Chuah, Wen Wen Koh. 266-273 [doi]
- A Security Aware Fuzzy Embedded ACO Based Routing Protocol (SAFACO) in VANETsHang Zhang 0002, Xi Wang, Dieter Hogrefe. 274-281 [doi]
- Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System"Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Tsu-Yang Wu, Chien-Ming Chen. 282-289 [doi]
- eDSDroid: A Hybrid Approach for Information Leak Detection in AndroidHoang Tuan Ly, Cam Nguyen Tan, Van-Hau Pham. 290-297 [doi]
- Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic AnalysisNguyen Tan Cam, Van-Hau Pham, Tuan Nguyen. 298-305 [doi]
- Known Bid Attack on an Electronic Sealed-Bid Auction SchemeKin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan. 306-314 [doi]
- Perceptual 3D Watermarking Using Mesh SaliencyJeongho Son, Dongkyu Kim, Hak-Yeol Choi, Han-Ul Jang, Sunghee Choi. 315-322 [doi]
- Perceptual Watermarking for Stereoscopic 3D Image Based on Visual DiscomfortSang-Keun Ji, Ji-Hyeon Kang, Heung-Kyu Lee. 323-330 [doi]
- Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural NetworksHan-Ul Jang, Hak-Yeol Choi, Dongkyu Kim, Jeongho Son, Heung-Kyu Lee. 331-338 [doi]
- Content Recapture Detection Based on Convolutional Neural NetworksHak-Yeol Choi, Han-Ul Jang, Jeongho Son, Dongkyu Kim, Heung-Kyu Lee. 339-346 [doi]
- Secret Sharing Deniable Encryption TechniqueMohsen Mohamad Hata, Fakariah Hani Mohd Ali, Syed Ahmad Aljunid. 347-357 [doi]
- Improved 3D Mesh Steganalysis Using Homogeneous Kernel MapDongkyu Kim, Han-Ul Jang, Hak-Yeol Choi, Jeongho Son, In-Jae Yu, Heung-Kyu Lee. 358-365 [doi]
- From Sealed-Bid Electronic Auction to Electronic ChequeKin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan. 366-376 [doi]
- Enhanced Database Security Using Homomorphic EncryptionConnor Røset, Van Warren, Chia-Chu Chiang. 377-387 [doi]
- k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF FilesJaewoo Park, Hyoungshick Kim. 388-395 [doi]
- Reconstruction of Task Lists from Android ApplicationsXingmin Cui, Ruiyi He, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Eric Ke Wang. 396-403 [doi]
- Design and Evaluation of Chaotic Iterations Based Keyed Hash FunctionZhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang. 404-414 [doi]
- Intellectual Overall Evaluation of Power Quality Including System CostBuhm Lee, Dohee Sohn, Kyoung Min Kim. 417-425 [doi]
- A Data-Driven Decision Making with Big Data Analysis on DNS LogEuihyun Jung. 426-432 [doi]
- A Case-Based Approach to Colorectal Cancer DetectionPedro Morgado, Henrique Vicente, António Abelha, José Machado 0001, João Neves, José Neves 0001. 433-442 [doi]
- Multi-Modes Cascade SVMs: Fast Support Vector Machines in Distributed SystemLijuan Cui, Changjian Wang, Wanli Li, Ludan Tan, Yuxing Peng. 443-450 [doi]
- Deep Learning Based Recommendation: A SurveyJuntao Liu, Caihua Wu. 451-458 [doi]
- Towards Collaborative Data Analytics for Smart BuildingsSanja Lazarova-Molnar, Nader Mohamed. 459-466 [doi]
- English and Malay Cross-lingual Sentiment Lexicon Acquisition and AnalysisNurul Amelina Nasharuddin, Muhamad Taufik Abdullah, Azreen Azman, Rabiah Abdul Kadir. 467-475 [doi]
- A Novel Natural Language Processing (NLP) Approach to Automatically Generate Conceptual Class Model from Initial Software RequirementsMudassar Adeel Ahmed, Wasi Haider Butt, Imran Ahsan, Muhammad Waseem Anwar, Muhammad Latif, Farooque Azam. 476-484 [doi]
- The Applications of Natural Language Processing (NLP) for Software Requirement Engineering - A Systematic Literature ReviewFarhana Nazir, Wasi Haider Butt, Muhammad Waseem Anwar, Muazzam A. Khan Khattak. 485-493 [doi]
- Smart Fetal MonitoringJane You, Qin Li 0001, Zhenhua Guo 0001, Ruohan Zhao. 494-503 [doi]
- A Network-Based Approach on Big Data for the Comorbidities of UrticariaYi-Horng Lai, Chih-Chiang Ho, Piao-Yi Chiou. 504-511 [doi]
- Application of Automated Theorem-Proving to Philosophical Thought: Spinoza's EthicsMaciej Janowicz, Luiza Ochnio, Leszek J. Chmielewski, Arkadiusz Orlowski. 512-518 [doi]
- Improving the B+-Tree Construction for Transaction Log Data in Bank System Using HadoopCong Viet-Ngu Huynh, Jongmin Kim, Jun Ho Huh. 519-525 [doi]
- Calculate Deep Convolution NeurAl Network on Cell UnitHaofang Lu, Ying Zhou, Zi-Ke Zhang. 526-532 [doi]
- Stepwise Structure Learning Using Probabilistic Pruning for Bayesian Networks: Improving Efficiency and Comparing CharacteristicsGodai Azuma, Daisuke Kitakoshi, Masato Suzuki. 533-543 [doi]
- Differential-Weighted Global Optimum of BP Neural Network on Image ClassificationLin Ma, Xiao Lin, Linhua Jiang. 544-552 [doi]
- Classification Model for Skin Lesion ImageNontachai Danpakdee, Wararat Songpan. 553-561 [doi]
- Generation of Use Cases for Requirements Elicitation by StakeholdersJunko Shirogane. 565-576 [doi]
- Smart Learner-Centric Learning SystemsNaseem Ibrahim, Ismail I. K. Al Ani. 577-584 [doi]
- Prioritized Process Test: More Efficiency in Testing of Business Processes and WorkflowsMiroslav Bures, Tomás Cerný, Matej Klima. 585-593 [doi]
- Static Testing Using Different Types of CRUD MatricesMiroslav Bures, Tomás Cerný. 594-602 [doi]
- Extracting Test Cases with Message-Sequence Diagram for Validating the Photovoltaic Energy Integrated Monitoring SystemWoo Sung Jang, Bo Kyung Park, Hyun Seung Son, Byung Kook Jeon, Robert Young Chul Kim. 603-608 [doi]
- Automatic Test Case Generation with State Diagram for Validating the Solar Integrated SystemBo Kyung Park, Woo Sung Jang, Hyun Seung Son, Keunsang Yi, Robert Young Chul Kim. 609-614 [doi]
- Comparison of Software Complexity Metrics in Measuring the Complexity of Event SequencesJohanna Ahmad, Salmi Baharom. 615-624 [doi]
- Implementation of Ceph Storage with Big Data for Performance ComparisonChao-Tung Yang, Cai-Jin Chen, Tzu-Yang Chen. 625-633 [doi]
- Predicting Engaging Content for Increasing Organic Reach on FacebookNatthaphong Phuntusil, Yachai Limpiyakorn. 637-644 [doi]
- Learning Performance Evaluation in eLearning with the Web-Based AssessmentCheng-Ying Yang, Tsai-Yuan Chung, Min-Shiang Hwang, Cheng-Yi Li, Jenq-Foung JF Yao. 645-651 [doi]
- Improving Teaching and Learning in Southeast Asian Secondary Schools with the Use of Culturally Motivated Web and Mobile TechnologySithira Vadivel, Insu Song, Abhishek Singh Bhati. 652-659 [doi]
- Game-Based Learning to Teach Assertive Communication ClickTalk for Enhancing Team PlayBah Tee Eng. 660-667 [doi]
- Cloud Storage Federation as a Service Reference ArchitectureRene Ivan Heinsen, Cindy Pamela Lopez, Tri D. T. Nguyen, Eui-nam Huh. 668-675 [doi]
- A Study on the IoT Framework Design for Ginseng CultivationKyung-Gyun Lim, Chang Geun Kim. 679-687 [doi]
- An IPS Evaluation Framework for Measuring the Effectiveness and Efficiency of Indoor Positioning SolutionsJacqueline Lee-Fang Ang, Wai-Kong Lee, Boon-Yaik Ooi, Thomas Wei-Min Ooi. 688-697 [doi]
- An IoT-Based Virtual Addressing Framework for Intelligent Delivery LogisticsOmar Hiari, Dhiah el Diehn I. Abou-Tair, Ismail Abushaikha. 698-705 [doi]
- Context-Aware Security Using Internet of Things DevicesMichal Trnka, Martin Tomásek, Tomás Cerný. 706-713 [doi]
- An Energy-Efficient Transmission Framework for IoT Monitoring Systems in Precision AgriculturePeerapak Lerdsuwan, Phond Phunchongharn. 714-721 [doi]
- Piezoelectric Voltage Monitoring System Using SmartphoneNazatul Shiema Moh Nazar, Suresh Thanakodi, Azizi Miskon, Siti Nooraya Mohd Tawil, Muhammad Syafiq Najmi Mazlan. 722-731 [doi]
- A System for Classroom Environment Monitoring Using the Internet of Things and Cloud ComputingWuttipong Ruanthong, Winai Wongthai, Sutthiwat Panithansuwan. 732-742 [doi]
- Research on Design of End Site Architecture to Connect LHCONE in KREONETChanjin Park, Wonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim. 745-750 [doi]
- A Study of Children Play Educational Environment Based on u-Healthcare SystemMinkyu Kim, Soojung Park, Byungkwon Park. 751-756 [doi]
- Virtual Resources Allocation Scheme in ICT Converged NetworksHyuncheol Kim. 757-762 [doi]
- Enhanced Metadata Creation and Utilization for Personalized IPTV ServiceHyo-Jin Park, Kireem Han, Jinhong Yang, Jun Kyun Choi. 763-769 [doi]
- A Study of Teaching Plan for the Physical Activity Using ICTSeung Ae Kang. 770-776 [doi]
- Design and Implementation of Headend Servers for Downloadable CASSoonchoul Kim, Hyuncheol Kim, JinWook Chung. 777-783 [doi]
- A Method of Modeling of Basic Big Data Analysis for Korean Medical Tourism: A Machine Learning Approach Using Apriori AlgorithmJun Ho Huh, Han-Byul Kim, Jin-Mo Kim. 784-790 [doi]
- The Study of Application Development on Elderly Customized Exercise for Active AgingYoungHee Cho, Seungae Kang, Soohyun Kim, Sunyoung Kang. 791-798 [doi]
- Improving Jaccard Index for Measuring Similarity in Collaborative FilteringSoojung Lee. 799-806 [doi]
- Temperature Recorder SystemSuresh Thanakodi, Nazatul Shiema Moh Nazar, Azizi Miskon, Ahmad Mujahid Ahmad Zaidi, Muhammad Syafiq Najmi Mazlan. 807-814 [doi]
- The Emergence of ICTs for Knowledge Sharing Based on Research in IndonesiaSiti Rohajawati, Boy Iskandar Pasaribu, Gun Gun Gumilar, Hilda Rizanti Putri. 817-826 [doi]
- Quality of Transformation of Knowledge as Part of Knowledge Management System - (Research in Private University in Jakarta)Dyah Budihastuti, Harjanto Prabowo. 827-833 [doi]