Abstract is missing.
- Papilledema Detection in Fundus Images Using Hybrid Feature SetKhush Naseeb Fatima, M. Usman Akram, Shafaat A. Bazaz. 1-4 [doi]
- A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart DevicesThong-Yun Teh, Yik-Shu Lee, Zi-Yik Cheah, Ji-Jian Chin. 1-5 [doi]
- ISEK: An Information Security Knowledge Graph for CISP Knowledge SystemYuangang Yao, Xing Wang, Xiangjie Meng, Xiaofei Zhang, Bin Li. 1-4 [doi]
- Adding Advanced Debug Output Features to an Existing OpenGL ES 1.1 ImplementationNakhoon Baek. 1-3 [doi]
- Software Implementation of a Pairing Function for Public Key CryptosystemsYusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, Eiji Okamoto. 1-5 [doi]
- Controlled Queue Management in Software-Defined NetworksSeunghoe Gu, Jong-Hwan Kim, Younghoon Kim, Cheoleun Moon, Ikjun Yeom. 1-3 [doi]
- Ranging Estimation Using Dual-Frequency Doppler TechniqueNor Awani Che Hassan, Kamaludin Mohamad Yusof, Sharifah Kamilah Syed Yusof. 1-5 [doi]
- A Framework of Device Authentication Management in IoT EnvironmentsAHyeon-Ju Park, Hye-Young Kim, Jong In Lim. 1-3 [doi]
- Extending a Standard Tablet into an Ocarina Playing Gaming Platform with Projected Parallax LayersPisal Setthawong, Nattaworn Tancharoen. 1-5 [doi]
- Fast Rule-Based Prediction of Data Streams Using Associative Classification MiningK. Prasanna Lakshmi, C. R. K. Reddy. 1-5 [doi]
- New MP3 Steganography Data SetMohammed Salem Atoum. 1-7 [doi]
- Diagnosis of Alzheimer's Disease Employing Neuropsychological and Classification TechniquesH. S. Sheshadri, S. R. Bhagya Shree, Murali Krishna. 1-6 [doi]
- Organisations Capability and Aptitude towards IT Security GovernanceTanveer A. Zia. 1-4 [doi]
- On the Security of Two Pairing-Based Signature SchemesRouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng. 1-4 [doi]
- A Feature Selection Algorithm to Find Optimal Feature Subsets for Detecting DoS AttacksSeung-Ho Kang. 1-3 [doi]
- Optimization Model of Information Flow in Power Grid Engineering Construction Projects Based on Improved DSMA.-yong Li, Li-rong Wei. 1-4 [doi]
- Text Detection and Recognition for Semantic Mapping in Indoor NavigationMuhammad Sami, Yasar Ayaz, Mohsin Jamil, Syed Omer Gilani, Muhammad Naveed. 1-4 [doi]
- An Effective Load Balancing Scheme Maximizes the Lifetime in Wireless Sensor NetworksHye-Young Kim. 1-3 [doi]
- Research Domains for Cognitive Radio: A SurveyPreeja Pradeep. 1-5 [doi]
- Design and Implementation of Display Module for Feature Symbol Verification Based on S-100Seungwook Oh, Dae-Won Park, Youngjin Kim, Suhyun Park. 1-4 [doi]
- User Satisfaction and Website Usability: Exploring the Linkages in B2C E-Commerce ContextGeetanjali Sahi. 1-4 [doi]
- A Forwarding Strategy for DWSIGF Routing ProtocolIdris Abubakar Umar, Zurina Mohd Hanapi, Aduwati Sali, Zuriati A. Zulkarnain. 1-4 [doi]
- A Phase of Deleted File Recovery for Digital Forensics Research in TizenSoowoong Eo, Wooyeon Jo, Seokjun Lee, Taeshik Shon. 1-3 [doi]
- Cache Side-Channel Attack to Recover Plaintext against Datagram TLSYe Tang, Huiyun Li, Guoqing Xu. 1-6 [doi]
- Forward Secure Non-Interactive Key Exchange from Indistinguishability ObfuscationYoung Kyung Lee, Dong-Hoon Lee. 1-4 [doi]
- Software Implementation of Ciphertext-Policy Functional Encryption with Simple UsabilityKeisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto. 1-4 [doi]
- Learning Outcome Enhancement via Serious Game: Implementing Game-Based Learning Framework in Blended Learning EnvironmentTee Wee Jing, Wong Seng Yue, R. K. Murugesan. 1-3 [doi]
- A Network Clustering Based Software Attribute Selection for Identifying Fault-Prone ModulesSo-yeon Kim, Sungdo Gu, Hyun-hwan Jeong, Kyung-Ah Sohn. 1-5 [doi]
- Methods of GML-Based Representation of S-101 ENC Vector DataDaseul Oh, Dae-Won Park, Yongmin Lim, Suhyun Park. 1-3 [doi]
- Prospects of Development of Technologies in the Field of Robotics and the Stages of Design of Mobile Robotic ComplexTamara Zhukabayeva, Zhanar O. Oralbekova, Makpal Zhartybayeva, Ainur Zhumadillayeva, Aigul Adamova. 1-4 [doi]
- Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11Norzaidi Baharudin, Fakariah Hani Mohd Ali, Mohamad Yusof Darus, Norkhushaini Awang. 1-5 [doi]
- An Energy Aware Schedule Based Remote Triggered Wireless Sensor Network LaboratoryPreeja Pradeep, P. L. Divya, R. D. Arya Devi, P. Rekha, K. Sangeeth, Tinu Vinod, Maneesha Vinodini Ramesh. 1-5 [doi]
- Providing Preliminary Profiling Information for OpenGL ES 1.1 Application ProgramsNakhoon Baek, Byeonguk Im. 1-3 [doi]
- Information Fusion (Ensemble System) in Data Warehousing & Data MiningAmit P. Ganatra. 1-6 [doi]
- Generation of Data Warehouse Design Test CasesPiyaporn Samsuwan, Yachai Limpiyakorn. 1-4 [doi]
- Software Development Practices and Problems in Malaysian Small and Medium Software Enterprises: A Pilot StudyMalek Ahmad Theeb Almomani, Shuib Basri, Ahmad Kamil B. Mahmood, Amos Orenyi Bajeh. 1-5 [doi]
- Available Bandwidth Estimation Method Adaptive to Network Traffic Load Considering Fairness with UDT FlowsJong-seon Park, Do-Sik An, Gi Hwan Cho. 1-4 [doi]
- An SSD-Based Accelerator Using Partitioned Bloom Filter for Directory ParsingJihyeon Choi, Byung Jun Lee, Dongyoung Jung, Hee Yong Youn. 1-5 [doi]
- Survey on MANET Based Communication Scenarios for Search and Rescue OperationsShaik Shabana Anjum, Rafidah Md Noor, Mohammad Hossein Anisi. 1-5 [doi]
- Towards Improving Web Attack Detection: Highlighting the Significant FactorsMajda A. Wazzan, Mohammad H. Awadh. 1-5 [doi]
- Low-Rate Denial-of-Service Attacks against HTTP/2 ServicesErwin Adi, Zubair Baig, Chiou Peng Lam, Philip Hingston. 1-5 [doi]
- On the Public Key-Based Auditing MethodsThu N. A. Nguyen, Van H. Dang, Thuc D. Nguyen. 1-6 [doi]
- Dynamic Toll Pricing Model for an Intelligent Transportation System with Individual High Occupancy Toll LanesKi-sung Hong, Chulung Lee, Kyungchul Lee. 1-6 [doi]
- HR Challenges & Issues in Insurance Industry: An Empirical StudyHardeep Singh, Bikram Pal Singh. 1-5 [doi]
- Arbitrary Petri Nets Controlled Grammars Under Parallel Firing StrategyLaula Zhumabayeva, Tamara Zhukabayeva, Gairatzhan Mavlankulov, Mohamed Othman. 1-3 [doi]
- A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source ApplicationsSyh-Yuan Tan, Ji-Jian Chin, Geong Sen Poh, Yvonne H. S. Kam, Wei-Chuen Yau. 1-5 [doi]
- Internet of Things (IoT) Expanding the Horizons of MainframesRobin Tommy, Ullas Ravi, Deen Mohan, Jobin Luke, Aswathy S. Krishna, Girija Subramaniam. 1-4 [doi]
- A Double-Private epsilon-Fuzzy Matching ProtocolYuta Urushiyama, Yoshifumi Manabe. 1-4 [doi]
- Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege CheckingRu Ko, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei. 1-7 [doi]
- An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider AttackSong Yi Kim, Hyoseung Kim, Dong-Hoon Lee. 1-4 [doi]
- Mobile Identity as a Tool to Develop SocietyDo Van Thanh, Boning Feng, Clark Swafford, Do van Thuan, Loc H. Khuong. 1-6 [doi]
- Assuring Security through Attribute GSNShuichiro Yamamoto. 1-5 [doi]
- An Efficient Multimedia Transmission Control Methodology Based on NFVJisu Kim, Gemoh T., Sanghyun Park, Jinsul Kim, Sunghyun Yoon, Hoyong Ryu. 1-4 [doi]
- Detecting an Abnormal Traffic on Healthcare NetworkWonhyuk Lee, Seunghae Kim, Hongseok Jeon, Hyuncheol Kim. 1-4 [doi]
- Understanding Game Play Domain: An Interpretive Approach towards Modelling Educational Games with Multi-Domain FrameworkMifrah Ahmad, Lukman Ab. Rahim, Noreen Izza Arshad. 1-5 [doi]
- Block Replacement Based on Access Locality with Solid State DriveSang Hyun Yoo, Yonjoong Ryou, Kyung Tae Kim, Hee Yong Youn. 1-5 [doi]
- Anonymous Author Similarity IdentificationAlemu Molla Kebede, Kaleab Getaneh Tefrie, Kyung-Ah Sohn. 1-5 [doi]
- Traffic-Aware Energy Efficient Routing (TEER) Using Multi-Criteria Decision Making for Wireless Sensor NetworkYoungho Suh, Kyung Tae Kim, Dong Ryeol Shin, Hee Yong Youn. 1-5 [doi]
- Trend of the Sports Convergence Technology for Health PromotionSeungae Kang. 1-3 [doi]
- A Remote Code Editing Framework for AMRITA Remote Triggered WSN LaboratoryK. Sangeeth, Preeja Pradeep, P. L. Divya, P. Rekha, R. D. Arya Devi, Sheeja L., Maneesha Vinodini Ramesh. 1-5 [doi]
- Covert Channels Parameters Evaluation Using the Information Theory StatementsAnna Epishkina, Konstantin Kogos. 1-5 [doi]
- Applications of u-Fitness in Sports FieldSeungae Kang, KyungOck Yi, Soojung Park, Bonsup Park. 1-3 [doi]
- Occlusion Handling Based on Projective Depth in Object TrackingHwa-Jin Park. 1-2 [doi]
- Fast Implementation of Block Ciphers and PRNGs for Kepler GPU ArchitectureHon-Sang Cheong, Wai-Kong Lee. 1-5 [doi]
- Automating Documentation of HTML PrototypeEkarat Prompila, Yachai Limpiyakorn. 1-5 [doi]
- A Privacy Preserving Message Authentication CodeDang Hai Van, Nguyen Dinh Thuc. 1-4 [doi]
- Intelligent Preloading of Websites Resources Based on Clustering Web User SessionsLukas Cegan. 1-4 [doi]
- Development of Functional Reactive Programming Using an Incrementally Modular Abstraction HierarchyKenji Ohmori. 1-5 [doi]
- Dynamic Queue Management Approach for Data Integrity and Delay Differentiated Service in WSNSeung-Wan Kim, Young Gyo Jung, Dong Ryeol Shin, Hee Yong Youn. 1-5 [doi]
- A New Colour Image Watermarking Technique Using Special DomainAbdulmawla M. A. Najih, Syed Abdul Rahman Al-Haddad, Abd. Rahman Ramli, Shaiful Jahari Hashim. 1-5 [doi]
- An Exploratory Study on Users' Intention to Purchase Items from Mobile Applications in ThailandKanokwan Atchariyachanvanich, Rungsiman Nararatwong, Nagul Cooharojananone. 1-5 [doi]
- Adaptive Multichannel Approach for Congestion Control in Vehicular Safety CommunicationsKomchan Chaitien, Chayaphon Tanwongvarl, Soamsiri Chantaraskul. 1-5 [doi]
- Estimation of Water Demand in Residential Building Using Machine Learning ApproachDongjun Suh, Hyunyoung Kim, Jinsul Kim. 1-2 [doi]
- Analysis of Broadcast Packet Loss for Unequal Loss Protection in Wi-Fi Broadcasting SystemDong-hyun Kim, Jun Hwan Huh, Jong-Deok Kim. 1-4 [doi]
- A Preliminary Study on Deep-Learning Based Screaming Sound DetectionMd. Zaigham Zaheer, Jin Young Kim, Hyoung-Gook Kim, Seung You Na. 1-4 [doi]
- Facial Expression Recognition Using Multiple Feature SetsArslan Shaukat, Mansoor Aziz, M. Usman Akram. 1-5 [doi]
- Using Cloud Computing Systems to Create Virtual Classroom Model for Thai-Nichi's StudentsNarungsun Wilaisakoolyong. 1-4 [doi]
- Domain Expert Maintainable Inference Knowledge of Assessment TaskShamimi A. Halim, Muthukkaruppan Annamalai, Mohd Sharifuddin Ahmad, Rashidi Ahmad. 1-5 [doi]
- A Modified K-Nearest Neighbor Algorithm to Handle Uncertain DataRashmi Agrawal, Babu Ram. 1-4 [doi]
- Software Reverse Engineering to Requirement Engineering for Evolution of Legacy SystemShoaib Hassan, Usman Qamar, Taimoor Hassan, Muhammad Waqas. 1-4 [doi]
- Parallel Strategies for Harmony Search on CUDA to Solve Traveling Salesman ProblemKang Chian Le, Rosni Abdullah. 1-7 [doi]
- Developing a Web Dictionary System Using the SOFL Three-Step Specification ApproachFumiko Nagoya, Shaoying Liu, Kyousuke Hamada. 1-5 [doi]
- An Improved Fuzzy Attribute-Based AuthenticationJong Pil Yun, Hyoseung Kim, Dong-Hoon Lee. 1-5 [doi]
- The Use of Spectral Shaping to Extend the Capacity for DWT-Based Blind Audio WatermarkingHwai-Tsu Hu, Ling-Yuan Hsu, Sheng-Yu Lai, Yu-Jung Chang. 1-5 [doi]
- ARINC661 Graphics Rendering Based on OpenVGJiyoung Yoon, Nakhoon Baek, Hwanyong Lee. 1-4 [doi]
- A Consensus Based Network Intrusion Detection SystemMichel Toulouse, Bui Quang Minh, Philip Curtis. 1-6 [doi]
- A Reputation-Based Routing Protocol for Wireless Sensor NetworksAli I. Adnan, Zurina Mohd Hanapi, Mohamed Othman, Zuriati Ahmad Zukarnain, Abubakar Sadiq. 1-4 [doi]
- Linearity Test Framework for S-Box in Block CipherKamsiah Mohamed, Mohd Nazran Mohammed Pauzi, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin. 1-5 [doi]
- ECG Based Biometric Identification for Population with Normal and Cardiac Anomalies Using Hybrid HRV and DWT FeaturesMuhammad Najam Dar, M. Usman Akram, Arslan Shaukat, Muazzam A. Khan. 1-5 [doi]
- Designing of Healthcare Information Network Using IPv6 Cloud NetworksWonhyuk Lee, Minki Noh, Buseung Cho, Taeyeon Kim, Hyuncheol Kim. 1-3 [doi]
- A Statistical Rule Learning Approach to Network Intrusion DetectionSamaneh Rastegari, Chiou Peng Lam, Philip Hingston. 1-5 [doi]
- Comparative Analysis of Processors Performance Using ANNVijay Maurya, Suresh C. Gupta. 1-5 [doi]
- Bidirectional Constructive Crossover for Evolutionary Approach to Travelling Salesman ProblemSemin Kang, Sung-Soo Kim, Jongho Won, Young-Min Kang. 1-4 [doi]
- Packet Level TCP Performance of NAT44, NAT64 and IPv6 Using Iperf in the Context of IPv6 MigrationVitruvius John D. Barayuga, William Emmanuel S. Yu. 1-3 [doi]
- Smart Wearable Band for Stress DetectionMuhammad Zubair, Changwoo Yoon, Hyunyoung Kim, Jisu Kim, Jinsul Kim. 1-4 [doi]
- Path Planning Algorithm for Manipulators Based on an Improved Backtracking Search AlgorithmMd. Nazrul Islam, Jaime Gallardo-Alvardo, Othman bin Hj Ahmad, Mazlina Binti Mamat, B. K. Ghosh. 1-5 [doi]
- Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory StandardHyunjin Kim, Seokcheol Lee, Sungjin Kim, Taeshik Shon. 1-4 [doi]
- Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution TechniqueMustapha Yusuf Abubakar, Low Tang Jung, Oi Mean Foong. 1-5 [doi]
- Constructing and Exploiting Software Metrics Networks for Software Quality AssessmentSungdo Gu, So-yeon Kim, Hyun-hwan Jeong, Kyung-Ah Sohn. 1-5 [doi]
- A Development of Image Enhancement for CCTV ImagesMaleerat Sodanil, Chalermpong Intarat. 1-4 [doi]
- Model-Based Approach to Generating Web PortalsKriengkri Pongpanjanthra, Yachai Limpiyakorn. 1-5 [doi]
- Background Subtraction from Auto-Exposure Surveillance Camera in RestaurantBoonyakorn Jantaranuson, Nagul Cooharojananone. 1-5 [doi]
- The Application of Healthcare Device for Exercise PrescriptionSunyoung Kang. 1-4 [doi]
- Confidentiality Based File Attributes and Data Classification Using TsF-KNNMunwar Ali, Low Tang Jung. 1-5 [doi]
- Robust Speaker Verification Using Low-Rank Recovery under Total Variability SpaceTan Dat Trinh, Jin Young Kim, Hyoung-Gook Kim, Kyong-Rok Lee. 1-4 [doi]
- Towards an Effective Modelling and Development of Educational Games with Subject-Matter: A Multi-Domain FrameworkMifrah Ahmad, Lukman Ab. Rahim, Noreen Izza Arshad. 1-5 [doi]
- Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol InvestigationFiras Najjar, Mohammad M. Kadhum. 1-5 [doi]
- A Generic Ontology Methodology and Factors to Address Design ConsistencyKwang Hooi Yew, M. Fadzil Hassan, Ahmad Izuddin B. Zainal Abidin, Noreen Izza Bt. Arshad, Azmi M. Shariff. 1-5 [doi]
- A PSO-Based Buffer Management Scheme for Improving Hit Ratio of Solid State DriveYili Wang, Byungjun Lee, JungJune Lee, HeeYong Youn. 1-5 [doi]
- A Privacy Enhanced Security Framework for Android UsersShirish Kumar Singh, Bharavi Mishra, Poonam Gera. 1-6 [doi]
- TV Advertisement Search Based on Audio Peak-Pair Hashing in Real EnvironmentsHyoung-Gook Kim, Hye-Seung Cho, Jin Young Kim. 1-4 [doi]
- Survey Analysis: The Effectiveness of Game-Based Learning (GBL) in Tertiary Education EnvironmentWong Seng Yue, Tee Wee Jing. 1-4 [doi]
- An Efficient Zero-Laxity Based Real-Time Multiprocessor Scheduling AlgorithmHitham Alhussian, Nordin Zakaria. 1-4 [doi]