Abstract is missing.
- A Study of Wireless Communication Technologies for Vehicular CommunicationAfizan Azman, Sumendra Yogarayan, Samuel Leong Wei Jian, Siti Fatimah Abdul Razak, Kirbana Jai Raman, Mohd Fikri Azli Abdullah, Siti Zainab Ibrahim, Anang Hudaya Muhamad Amin, Kalaiarasi Sonai Muthu. 3-13 [doi]
- A New Fractional Binary-to-Decimal Number Conversion for Errorless CalculationJinhyuck Kim, Hyun-Jin Kim. 15-21 [doi]
- Development of Distraction Limit Estimation Index Using Posture Change Monitoring SystemYun-Hong Noh, Ji-Yun Seo, Do-Un Jeong. 23-29 [doi]
- Implementation of Rehabilitation Assistant System Based on Movement and Muscle Activity InformationJi-Yun Seo, Yun-Hong Noh, Do-Un Jeong. 31-37 [doi]
- NUPT ST-Data Miner: An Spatio-Temporal Data Analysis and Visualization SystemZhiqiang Zou, Junjie Xiong, Xu He, Haihong Dai. 41-51 [doi]
- Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based ApproachFeng-Hsiag Hsiao, Po-Han Lin. 53-66 [doi]
- A Framework for Performance Analysis of Various Load Balancing Techniques in a Software-Defined Networking EnvironmentPatrick Von Angelo V. Atienza, William Emmanuel S. Yu. 67-74 [doi]
- Inferring Social Relationships Through Network: A Systematic Literature ReviewFauqia Ilyas, Farooque Azam, Wasi Haider Butt, Kinza Zahra. 75-87 [doi]
- Extended Flow Detection Scheme Using Simple Processor Trace (PT)Hyuncheol Kim. 89-95 [doi]
- The Effect of Wearing the Customized Insole on the Coordination of the Right and Left Wrists Measured by Wearables During Golf SwingKyungOck Yi, Hyeonjung Oh. 97-108 [doi]
- A Study on Development of Application for Management of Obesity in Children with Intellectual DisabilitiesSeungae Kang. 109-114 [doi]
- A New Paradigm for Spectator Sports in Application of MediaMinkyu Kim, Soojung Park, Byoungkwon Park. 115-121 [doi]
- Physical Activity Intervention Platform for the Elderly with Mild Cognitive ImpairmentSunyoung Kang, Seungae Kang. 123-128 [doi]
- A Simplified Emulation Scheme for OpenGL SC 2.0 Rendering over OpenGL Embedded Systems 2.0Nakhoon Baek. 131-135 [doi]
- Robust Sound Localization Algorithm for Intelligent Acoustic Surveillance SystemKyusik Park. 137-147 [doi]
- A Multiple Optical Vision System of Virtual DisplayYongseok Chi. 149-155 [doi]
- Real Time Driver Anger DetectionAfizan Azman, Kirbana Jai Raman, Imran Artwel Junior Mhlanga, Siti Zainab Ibrahim, Sumendra Yogarayan, Mohd Fikri Azli Abdullah, Siti Fatimah Abdul Razak, Anang Hudaya Muhamad Amin, Kalaiarasi Sonai Muthu. 157-167 [doi]
- Debug Output Features for OpenGL SC 2.0 Safety Critical ProfileWoo Suk Shin, Nakhoon Baek. 169-173 [doi]
- Eigennose: Assessing Nose-Based Principal Component Analysis for Achieving Access Control with Occluded FacesZibusiso Bhango, Dustin van der Haar. 175-183 [doi]
- Implementation of a Monitoring System for the Measurement of Temperature, Flow Rate, and Fluid Pressure of Cooling SystemsCheol-Hong Moon. 187-197 [doi]
- A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection SystemsKudzaishe Mhou, Dustin van der Haar. 201-209 [doi]
- Performance Comparison of Some Addition Chain Methods Based on Integer FamilyM. F. A. Kadir, M. A. Mohamed, R. Mohamad, M. Mamat, A. Muhammed. 211-218 [doi]
- Integration of Iris Biometrics in Automated Teller Machines for Enhanced User AuthenticationKennedy Okokpujie, Etinosa Noma-Osaghae, Olatunji Okesola, Osemwegie Omoruyi, Chinonso Okereke, Samuel John, Imhade P. Okokpujie. 219-228 [doi]
- Fingerprint Biometric Authentication Based Point of Sale TerminalKennedy Okokpujie, Etinosa Noma-Osaghae, Olatunji Okesola, Osemwegie Omoruyi, Chinonso Okereke, Samuel John, Imhade P. Okokpujie. 229-237 [doi]
- A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack PatternsImano Williams, Xiaohong Yuan. 239-249 [doi]
- An Efficient and Anonymous KP-ABE Scheme with Keyword SearchTao Feng, Xiaoyu Yin, Chunyan Liu. 251-258 [doi]
- A DNS RPZ Firewall and Current American DNS PracticeNorman Wilde, Lauren Jones, Robert Lopez, Travis Vaughn. 259-265 [doi]
- SNMP-Based Detection of VLAN Hopping Attack RiskKwangjun Kim, Manhee Lee. 267-272 [doi]
- Improving Hidden Message Extraction Using LSB Steganalysis TechniquesNikhil Mewalal, Wai Sze Leung. 273-284 [doi]
- Secrecy Analysis in the AF Mode Cooperative Communication SystemHsin-Ying Liang, Cheng-Ying Yang, Min-Shiang Hwang. 285-293 [doi]
- An Improved Hou-Wang's User Authentication SchemeMin-Shiang Hwang, Hung-Wei Yang, Cheng-Ying Yang. 295-301 [doi]
- Developing a Testing Framework for Intrusion Detection Algorithms Using Software Defined NetworkingAnton Miguel Suba, Kurt Vincent Bautista, Julio Carlos Tomas Ledesma, William Emmanuel Yu. 303-313 [doi]
- Ballet Pose Recognition: A Bag-of-Words Support Vector Machine Model for the Dance Training EnvironmentMargaux Fourie, Dustin van der Haar. 317-325 [doi]
- Pronunciation Detection for Foreign Language Learning Using MFCC and SVMJihyun Byun, Dustin van der Haar. 327-335 [doi]
- OpinionSeer: Text Visualization on Hotel Customer Reviews of Services and Physical EnvironmentAngela Siew-Hoong Lee, Ka Leong Daniel Chong, Nicholas Chan Khin Whai. 337-349 [doi]
- Comparisons in Drinking Water Systems Using K-Means and A-Priori to Find Pathogenic Bacteria GeneraTevin Moodley, Dustin van der Haar. 351-359 [doi]
- Optimal Lightweight Cryptography Algorithm for Environmental Monitoring Service Based on IoTJongmun Jeong, Larsson Bajracharya, Mintae Hwang. 361-367 [doi]
- Improving an Evolutionary Approach to Sudoku Puzzles by Intermediate Optimization of the PopulationMatthias Becker 0002, Sinan Balci. 369-375 [doi]
- Saturated Flow Method for Traffic Optimization in Ostrava CityMartin Kotyrba, Eva Volná, Jakub Gaj. 377-387 [doi]
- Adaptive Control of EV3 Robot Using Mobile Devices and Fuzzy LogicJan Konvicka, Martin Kotyrba, Eva Volná, Hashim Habiballa, Vladimír Bradác. 389-399 [doi]
- Improving Medical Short Text Classification with Semantic Expansion Using Word-Cluster EmbeddingYing Shen, Qiang Zhang 0015, Jin Zhang, Jiyue Huang, Yuming Lu, Kai Lei. 401-411 [doi]
- A Deep Learning Approach to Mining the Relationship of Depression Symptoms and Treatments for Prediction and RecommendationJuntian Lin, Guan Luo, Zhu Zhan, Xiaoyao Guan. 413-422 [doi]
- A Bayesian Network Approach for Discovering Variables Affecting Youth DepressionEuihyun Jung. 423-430 [doi]
- Forecasting Macao GDP Using Different Artificial Neural NetworksXu Yang, Zheqi Zhang, Laurie G. Cuthbert, Yapeng Wang. 431-442 [doi]
- Edge Detection and Symmetry Method for Cleft Lip and Palate Children Using Image ProcessingNutthisara Choolikhit, Wararat Songpan, Monlica Wattana, Ngamnij Arch-int. 443-455 [doi]
- An Effective Envelope Analysis Using Gaussian Windows for Evaluation of Fault Severity in BearingHung Nguyen Ngoc, Jaeyoung Kim, Jong Myon Kim. 457-464 [doi]
- Event Extraction from Streaming System LogsShuting Guo, Zheng Liu, Wenyan Chen, Tao Li 0001. 465-474 [doi]
- Anomaly Detection Using Agglomerative Hierarchical Clustering AlgorithmFokrul Alom Mazarbhuiya, Mohammed Y. Alzahrani, Lilia Georgieva. 475-484 [doi]
- User Identification on Social Networks Through Text Mining Techniques: A Systematic Literature ReviewKinza Zahra, Farooque Azam, Wasi Haider Butt, Fauqia Ilyas. 485-498 [doi]
- Automated Analysis of Eye-Tracker-Based Human-Human Interaction StudiesTimothy Callemein, Kristof Van Beeck, Geert Brône, Toon Goedemé. 499-509 [doi]
- Survey on Compromise-Defensive System DesignTomás Cerný, Michael Jeff Donahoo. 513-521 [doi]
- A Study on Cost-Effective and Eco-friendly Bicycle Sharing System for Developing CountriesLarsson Bajracharya, Tirta Mulya, Ayi Purbasari, Mintae Hwang. 523-531 [doi]
- An Approach to Modeling Microservice SolutionsZhiyi Ma, Jinyang Liu, Xiao He. 533-542 [doi]
- A Comprehensive Investigation of BPMN Models Generation from Textual Requirements - Techniques, Tools and TrendsBilal Maqbool, Farooque Azam, Muhammad Waseem Anwar, Wasi Haider Butt, Jahan Zeb, Iqra Zafar, Aiman Khan Nazir, Zuneera Umair. 543-557 [doi]
- A Culture-Based Profile Model of Software EvaluatorsKhaled Hamdan, Boumediene Belkhouche, Peter Smith. 559-570 [doi]
- Transforming JavaScript-Based Web Application to Cross-Platform Desktop with ElectronKitti Kredpattanakul, Yachai Limpiyakorn. 571-579 [doi]
- Degree of Similarity of Root TreesJirí Sebek, Petr Vondrus, Tomás Cerný. 581-591 [doi]
- Nash Equilibrium Solution for Communication in Strategic Competition Adopted by Zigbee Network for Micro GridSeung-Mo Je, Jun Ho Huh. 595-606 [doi]
- Affordances for the Sharing of Domain-Specific Knowledge on Enterprise Social MediaL. G. Pee. 607-613 [doi]
- Development of an IoT-Based Construction Site Safety Management SystemSeung Ho Kim, Han Guk Ryu, Chang Soon Kang. 617-624 [doi]
- Internet of Things: Current Challenges in the Quality Assurance and Testing MethodsMiroslav Bures, Tomás Cerný, Bestoun S. Ahmed. 625-634 [doi]
- Using Wi-Fi Enabled Internet of Things Devices for Context-Aware AuthenticationMichal Trnka, Filip Rysavy, Tomás Cerný, Nathaniel Stickney. 635-642 [doi]
- A Hybrid Deep Q-Network for the SVM LagrangianChaYoung Kim, Hye-Young Kim. 643-651 [doi]
- An Actor-Critic Algorithm for SVM HyperparametersChaYoung Kim, Jung Min Park, Hye-Young Kim. 653-661 [doi]
- Design of the Manufacturing Facility Maintenance Systems Based on Internet of ThingsJin-uk Jung, A. M. Ilham, Mintae Hwang, Kyo-Hong Jin. 663-673 [doi]
- Implementation of an Edge Computing Architecture Using OpenStack and KubernetesEndah Kristiani, Chao-Tung Yang, Yuan-Ting Wang, Chin-Yin Huang. 675-685 [doi]
- Enabling Cross-Domain IoT Interoperability Based on Open FrameworkLei Hang, Do-Hyeun Kim. 687-691 [doi]