Abstract is missing.
- Weight Measurement of Holothuria Scabra Jaeger, 1833 Utilizing the Surface Area of Digitized Image Captured under WaterMary Jane Magno-Tan, Armin S. Coronado, Rustom R. Garcia, May D. Maulani. 1-5 [doi]
- Feature Fusion Methods for Robust Speech Emotion Recognition Based on Deep Belief NetworksAo Wu, Yongming Huang, Guobao Zhang. 6-10 [doi]
- Security Assessment of Information System in Hospital EnvironmentSuratose Tritilanunt, Surapol Ruaysungnoen. 11-16 [doi]
- EaaS: Available yet Hidden Infrastructure inside MSEP. S. Joseph Ng, C. M. Kang, Ahmad Kamil Mahmood, S. W. Wong, K. Y. Phan, Seow Hui Saw, J.-T. Lim. 17-21 [doi]
- A Forgery Video Detection Algorithm for Resolution Promotion Manipulations Using Frequency Spectrum AnalysisSaihua Song, Heng Yao, Chuan Qin 0001, Ying Tian. 22-26 [doi]
- Motion Image De-blurring System Based on the Effectiveness Parameters of Point Spread FunctionChu-Hui Lee, Zhi-Yong Qiu. 27-31 [doi]
- Sea-Land Segmentation Based on Template MatchingShanlan Nie, Haopeng Zhang 0001, Zhiguo Jiang. 32-36 [doi]
- Graph Clustering-Based Emerging Event Detection from Twitter Data StreamBundit Manaskasemsak, Bodin Chinthanet, Arnon Rungsawang. 37-41 [doi]
- Quality Monitoring, Analysis and Evaluation of BDS B1I SignalXiaoling Wang, Yao Wang, Xue Wang. 42-46 [doi]
- Feature Selection and Reduction for Batik Image RetrievalHisyam Fahmi, Remmy A. M. Zen, Hadaiq Rolis Sanabila, Ida Nurhaida, Aniati Murni Arymurthy. 47-52 [doi]
- An Efficient Approach for Automatic Number Plate Recognition for Low Resolution ImagesTarun Kumar, Suraj Gupta, Dharmender Singh Kushwaha. 53-57 [doi]
- Bidirectional Diffusion Algorithm for Image Enhancement with Local FeatureZhonghua Wang, Faliang Huang, Shijie Hu. 58-62 [doi]
- Length-bounded Hybrid CPU/GPU Pattern Matching Algorithm for Deep Packet InspectionYi-Shan Lin, Chun-Liang Lee, Yaw-Chung Chen. 63-67 [doi]
- A Kind of De-noising and Segmentation Method for Hollow CAPTCHAs with Noise ArcsZhao Wang, Yuan Xi. 68-72 [doi]
- The Real Time Endoscopic Image Analysis AlgorithmKadushnikov Radi, Studenok Sergey, Mizgulin Vyacheslav. 73-77 [doi]
- Analysis on the Effect of Term-Document's Matrix to the Accuracy of Latent-Semantic-Analysis-Based Cross-Language Plagiarism DetectionAnak Agung Putri Ratna, F. Astha Ekadiyanto, Mardiyah, Prima Dewi Purnamasari, Muhammad Salman. 78-82 [doi]
- TCAM-Based Packet Classification Using Multi-stage SchemeHsin-Tsung Lin, Pi-Chung Wang. 83-87 [doi]
- A Topic of Interest-based Approach on Online Social Network Services for Information SharingClief Hendro Sengkey, Hsien-Tsung Chang. 88-92 [doi]
- Fractional Difference based Hybrid Model for Resource Prediction in Cloud NetworkShaifu Gupta, Aroor Dinesh Dileep, Timothy A. Gonsalves. 93-97 [doi]
- Research of Recognition System of Web Intrusion Detection Based on StormBo Li, Jinzhen Wang, Ping Zhao, Zhongjiang Yan, Mao Yang. 98-102 [doi]
- Fault Tolerance for Web Service Based on Component Importance in Service NetworksLu Chen, Lianchen Liu, Jiaxing Shang. 103-109 [doi]
- Strongly Secure Network Coding via Reed-Solomon CodesGe Luo, Ying Gao, Changchun Zheng. 110-114 [doi]
- Innovation Oriented Hyper Model and Evolution of Knowledge NetworkJian Xie, Lin Gong, Zijian Zhang, Yan Yan 0008, Sheng Tang. 115-119 [doi]
- Exploit Kit Website Detection Using HTTP Proxy LogsIvan Nikolaev, Martin Grill, Veronica Valeros. 120-125 [doi]
- Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social NetworksJing Deng 0001, Xiaoli Gao, Chunyue Wang. 126-130 [doi]
- An MCMC Based Course to Teaching Assistant AllocationSaurabh Kumar, Shana Moothedath, Prasanna Chaporkar, Madhu N. Belur. 131-134 [doi]
- Artificial Neural Networks Based Emotion Classification System through Relative Wavelet Energy of EEG SignalPrima Dewi Purnamasari, Anak Agung Putri Ratna, Benyamin Kusumoputro. 135-139 [doi]
- Prototype Selection for k-Nearest Neighbors Classification Using Geometric MedianChatchai Kasemtaweechok, Worasait Suwannik. 140-144 [doi]
- A Federated GIS Data Service System for Tabular Data Integration Using Ontology ApproachGridaphat Sriharee. 145-149 [doi]
- A Text Mining Based on Refined Feature Selection to Predict Sentimental ReviewChing-Hsue Cheng 0001. 150-154 [doi]
- Generating Test Cases from UML Activity Diagram Based on Business Flow ConstraintsWalaithip Thanakorncharuwit, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn. 155-160 [doi]
- An Architecture of an Academic Search Engine with Personalized Search Result Ranking MechanismWorasit Choochaiwattana. 161-165 [doi]
- Method for Assessing Software Quality Using Source Code AnalysisSepehr Forouzani, Yin Kia Chiam, Soroush Forouzani. 166-170 [doi]
- Query-Directed Probing LSH for Cosine SimilarityShengyingjie Liu, Jianwen Sun, Zhi Liu, Xian Peng, Sanya Liu. 171-177 [doi]
- Research of a Double Temporal Object-oriented Data ModelYang Xie, Xiaolu Zhou, Zepeng Wen, Hui Xie. 178-181 [doi]
- A New Approach: Predicting Height of a Person from Joint Ratio of FingersMerve Güllü, Eyüp Burak Ceyhan, Ceren Ulucan. 182-187 [doi]
- Acoustic Modeling for Lhasa Tibetan Speech Synthesis Based on DAEM AlgorithmShipeng Xu, Hongzhi Yu, Guanyu Li, Hanbin Zhang, Jun Ma 0013. 188-192 [doi]
- Data-Space Relocation to Improve Data Cache Performance for Embedded Multi-threaded Processor SystemsMahanama Wickramasinghe, Hui Guo 0001. 193-197 [doi]
- Ontology-Based Knowledge Management System Model for R3ST Software Maintenance EnvironmentEko Kuswardono Budiardjo, Elviawaty Muisa Zamzami, Ganjar Ramadhan, Muh. Nur Musa. 198-202 [doi]
- An Asynchronous Message-passing Distributed Algorithm for the Generalized Local Critical Section ProblemSayaka Kamei, Hirotsugu Kakugawa. 203-207 [doi]
- Construct Parity-check Matrix H of QC LDPC Codes via Arithmetic ProgressionXue Zhang, Lu Peng, Chenyan Li, Qing Li. 208-212 [doi]
- Two Step Clustering Model for K-Means AlgorithmNarongsak Chayangkoon, Anongnart Srivihok. 213-217 [doi]
- Architecture of LVC Systems based on Real-Time Simulation ProxyJianguo Hao, Zhijia Wang, Yibin Tu, Heng Zhang. 218-223 [doi]
- Feasibility Analysis of SCMA in Logging Cable Telemetry Systems with an Optimal 16-point CodebookQian Cui, Kai Shuang. 224-228 [doi]
- Cryptanalysis of Dimitriou's Key Evolving RFID SystemsCheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li. 229-233 [doi]
- A New Modeling Approach using Genetic Algorithm for Transmission Performance Estimation in Complex EnvironmentQian Cui, Kai Shuang. 234-238 [doi]
- Application of OQAM/OFDM Modulation in Troposcatter CommunicationXiaopeng Liu, Xihong Chen, Zedong Xie. 239-245 [doi]
- Effect of Doppler Shift on the MIMO-OFDM Systems in Troposcatter Fading ChannelsZedong Xie, Xihong Chen, Xiaopeng Liu. 246-251 [doi]
- OFDM Channel Estimation Based on Fast Approximated Power Iteration Subspace TrackingQingyun Fang, YuBing Han, Xuan Chen, Kai Qi, Mengyao Qi, Yi Zhang. 252-256 [doi]
- Energy-Efficient Resource Allocation for Cooperative Cognitive Radio Networks with Imperfect Spectrum SensingWanming Hao, Osamu Muta, Haris Gacanin, Hiroshi Furukawa. 257-261 [doi]
- Target Discovery: Using MUSIC with Optimized Angle-of-Arrival and Signal-Time-of-FlightAhsan Jamal Akbar, Zhuchuang Shao, Wang Dong. 262-266 [doi]
- Throughput Performance Evaluation on Wired and Wireless Network Cooperation Quick Recovery System Employing IEEE 802.11 DCFKazuki Maruta, Yu Nakayama, Takuya Tsutsumi. 267-271 [doi]
- Visible Light Communication using Two Different Polarized DMD Projectors for Seamless Location ServicesMotoi Kodama, Shinichiro Haruyama. 272-276 [doi]
- Service-Oriented Virtual Resource Management Framework for Satellite NetworkZhiguo Liu, Lingyu Qin, Li Yao. 277-281 [doi]
- Cryptanalysis of Several Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor NetworksSang Guun Yoo. 282-286 [doi]
- A Dynamic Energy Balance Method for Wireless Sensor Networks with Small World CharacteristicsPeng Geng, Yan Liu, Jie Yang 0002. 287-291 [doi]
- Modeling the Impact of Clustering with Random Event Arrival on the Lifetime of WSNMirza Ferdous Rahman, Farhad Mehdipour, Hiroshi Furukawa. 292-296 [doi]
- A Receiver-Initiated Big Slot Scheduling MAC Protocol for Reducing Collision in Wireless Sensor NetworksZhenqiang Wei, Hoon Oh. 297-301 [doi]
- Secured Wireless Sensor Network Using Improved Key ManagementIbtisam Joda Habeeb, Ra'ad A. Muhajjar. 302-305 [doi]
- Quadcopter Based Localization with Archimedian TrajectoryNadea Nabilla Putri, Arsla Khan, Soo Young Shin. 306-309 [doi]
- Comparison of Neural Networks Based Direct Inverse Control Systems for a Double Propeller Boat ModelKarlisa Priandana, Wahidin Wahab, Benyamin Kusumoputro. 310-315 [doi]
- Monitoring and Controlling Method of the Environment Condition in the Animal Breeding Farm by Using Smart PhoneMyung Jin Chung, Chong-Seong Hong. 316-320 [doi]
- Design of Cameras Gateway for Remote Monitoring and Human TrackingKuei-Chung Chang, Po-Kai Liu, Hung-Hsiang Lin. 321-325 [doi]
- Spatial-Temporal Based Traffic Speed Imputation for GPS Probe VehiclesJun-Dong Chang. 326-330 [doi]
- Proposing a Sensor Fusion Technique Utilizing Depth and Ranging Sensors for Combined Human Following and Indoor Robot NavigationMark Tee Kit Tsun, Lau Bee Theng, Hudyjaya Siswoyo Jo, Sian Lun Lau. 331-335 [doi]