Abstract is missing.
- A Deep Learning Based Geosteering Method Assembled with "Wide-angle Eye"Yi Liu, Dandan Zhu, Hao Liu, Aimin Du, Dong Chen, Zhihui Ye. 1-5 [doi]
- Performance Analysis of Machine Learning Techniques in Intrusion DetectionPraiya Tungjaturasopon, Krerk Piromsopa. 6-10 [doi]
- A Framework for User Characterization based on Tweets Using Machine Learning AlgorithmsKinza Zahra, Farooque Azam, Wasi Haider Butt, Fauqia Ilyas. 11-16 [doi]
- Evaluating Machine Learning Models for Android Malware Detection: A Comparison StudyMd. Shohel Rana, Charan Gudla, Andrew H. Sung. 17-21 [doi]
- Communication Usage Optimization of Gradient Sparsification with Aggregation in Deep LearningSheng-Ping Wang, Pangfeng Liu, Jan-Jan Wu. 22-26 [doi]
- Predict the Best Graph Partitioning Strategy by Using Machine Learning TechnologyJiayi Shen, Fabrice Huet. 27-33 [doi]
- Comprehensive Control System for Gathering Pipe Network Operation Based on Reinforcement LearningQianlin Wu, Dandan Zhu, Yi Liu, Aimin Du, Dong Chen, Zhihui Ye. 34-39 [doi]
- Performance Evaluation of Edge Computing-Based Deep Learning Object DetectionChuan-Wen Chen, Shanq-Jang Ruan, Chang Hong Lin, Chun-Chi Hung. 40-43 [doi]
- A Reinforcement Learning Based 3D Guided Drilling Method: Beyond Ground ControlHao Liu, Dandan Zhu, Yi Liu, Aimin Du, Dong Chen, Zhihui Ye. 44-48 [doi]
- Integration of Speech Recognition into Virtual Classroom to Enhance Learning AchievementApichaya Nimkoompai, Chan Jaruvongrangsee, Puwadol Sirikongtham. 49-52 [doi]
- An Instruction Blocking Methods for Disk Data ProtectionDi Xue, Jingmei Li, Weifei Wu, Jiaxiang Wang, Xiaoyun Wang. 53-57 [doi]
- NOV-CFI: A Novel Algorithm for Closed Frequent Itemsets Mining in Transactional DatabasesHuan Phan. 58-63 [doi]
- The Design and Implementation of a Latency-Aware Packet Classification for OpenFlow Protocol based on FPGAYu-Kai Chiu, Shanq-Jang Ruan, Chung-An Shen, Chun-Chi Hung. 64-69 [doi]
- Finding Impact Factors for Rejection of Pull Requests on GitHubPanthip Pooput, Pornsiri Muenchaisri. 70-76 [doi]
- Biometric Recognition Databases: A SurveyXinman Zhang, Weiyong Gong, Xuebin Xu, Yuchen Zhang. 77-81 [doi]
- Exploring Efficiency of Character-level Convolution Neuron Network and Long Short Term Memory on Malicious URL DetectionThuy Thi Thanh Pham, Van-Nam Hoang, Thanh Ngoc Ha. 82-86 [doi]
- DRDLC: Discovering Relevant Documents Using Latent Dirichlet Allocation and Cosine SimilarityR. S. Ramya, Ganesh Singh T., D. Sejal, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik. 87-91 [doi]
- Genetic Algorithm for Generating Counterexample in Stochastic Model CheckingTingting Zheng, Yang Liu. 92-96 [doi]
- Enhancing Inverse Ant Algorithm using Path Elimination RulesJaymer M. Jayoma, Bobby D. Gerardo, Ruji P. Medina. 97-101 [doi]
- Investigating the Influence of CPU Load, Memory Usage and Environmental Conditions on the Jittering of Android DevicesMaik Benndorf, Marika Kaden, Frederic Ringsleben, Christian Roschke, Rico Thomanek, Martin Gaedke, Thomas Haenselmann. 102-106 [doi]
- Designing Packetc Programming Language for Reliable Network AppsRalph Duncan. 107-114 [doi]
- Deep Multi-view Sparse Subspace ClusteringXiaoliang Tang, Xuan Tang, Wanli Wang, Li Fang, Xian Wei. 115-119 [doi]
- Detection and Localization of the Copy-paste in Digital CartoonWenjia Ding, Yi Xie, Yulin Wang. 120-122 [doi]
- Efficient Copy-Move Forgery Detection using Blur and Rotation Invariant TechniqueAnkita Verma, Vivek Kapoor, Sangita Roy. 123-127 [doi]
- Research on the Application Cluster Architecture for the New Computing EnvironmentYang Xie, Xiaolu Zhou, Gongliang Li, Yizheng Tao. 128-132 [doi]
- A Method for Estimating Task Granularity for Automating GPU Cycle SharingKeishi Tsukada, Fumihiko Ino. 133-139 [doi]
- A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle AlgorithmReynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina. 140-145 [doi]
- On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation FunctionsWen Wen Koh, Chuah Chai Wen. 146-151 [doi]
- Implementation of IPsec VPN with SIP Softphones using GNS3Amirisetti Sushma, Teerapat Sanguankotchakorn. 152-156 [doi]
- Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoTTakuo Hayakawa, RyƓichi Sasaki, Hiroshi Hayashi, Yuji Takahashi, Tomoko Kaneko, Takao Okubo. 157-164 [doi]
- Integrating Bluetooth-Low Energy to Support Visitor Recommendation and Space ManagementGridaphat Sriharee, Niti Boonyakaite, Wachiraphan Charoeanwet, Pattarakorn Summat, Pimphaka Saikhow. 165-170 [doi]
- Modeling and Analysis of the Anti-Jamming (AJ) Spread Spectrum System Using Quantized Chaotic Sequence with LDPC for Reliable Data LinkWei Wei, Junghwan Kim. 171-176 [doi]
- MCAR: Multi-Path-Based Collusion Avoidance Routing for Wireless Ad-Hoc NetworksZhengping Zhang, Jian Wang. 177-181 [doi]
- Elicitation Techniques for Internet of Things Applications Requirements: A Systematic ReviewTek Yong Lim, Fang-Fang Chua, Bushra Binti Tajuddin. 182-188 [doi]
- Performance Analysis of Full Duplex Network Based on Non-orthogonal Multiple AccessKaikai Wang, Kaixin Zhang. 189-193 [doi]
- An Enhanced technique of Self-Correcting Localization Algorithm for Vehicular Node Position Accuracy in the Distributed VANETHanan H. Al Malki, Abdellatif I. Moustafa. 194-199 [doi]
- A Novel Method for Inferring Person-to-person Relationship Using Wi-FiFauqia Ilyas, Farooque Azam, Wasi Haider Butt, Kinza Zahra. 200-205 [doi]
- A Compact Wideband Bandpass Filter Implemented with Triple-mode Stepped Impedance Stubs Resonator and Substrate Integrated Coaxial Line TechnologyTingru Zhu, Zhiguo Ren, Yan Zhang. 206-210 [doi]
- Automatic Mango Detection using Image Processing and HOG-SVMMaria Jeseca C. Baculo, Nelson Marcos. 211-215 [doi]
- Method for Measuring Rotational Eye Movement by Tracking Eye Vascular Images Using luminance Gradient InformationNayuta Ono, Kiyoshi Hoshino. 216-220 [doi]
- Real-Time Tracking IDs and Joints of UsersSeongmin Baek, Myunggyu Kim. 221-226 [doi]
- End-to-end Multiplayer Violence Detection based on Deep 3D CNNChengyang Li, Liping Zhu, Dandan Zhu, Jiale Chen, Zhanghui Pan, Xue Li, Bing Wang. 227-230 [doi]
- A Novel Robust Multispectral Palmprint Recognition Algorithm Based on P-Norm RegularizationXinman Zhang, Dongxu Cheng, Xuebin Xu. 231-235 [doi]
- Enhanced Approach for Finger-Vein ExtractionByung-Hoon Lee, Tea-Yeong Hah, Won Ho Jeong, Kyung-Seok Kim. 236-241 [doi]
- Research of Palmprint Authentication Arithmetic Based on SmartphoneXinman Zhang, Kunlei Jing, Guoqi Yan, Xuebin Xu, Weiyong Gong. 242-246 [doi]
- Speaker Recognition Based on Lip-reading: An OverviewDongpeng Shang, Xinman Zhang, Xuebin Xu, Xiangyang Peng. 247-251 [doi]
- Using QFD as an Information Tool for Artistic Style Creation: A Case Study of Naturalism to Otaku Style WorksJay Tzu-Chieh Lee, Shuo-Fang Liu. 252-260 [doi]
- Localized Temporal Representation in Human Action RecognitionPang Ying Han, Khor Ean Yee, Shih Yin Ooi. 261-266 [doi]
- Spatial Semantic Images with Relationship Contents by Using Convolutional Neural Network and Support Vector MachineNutchanun Chinpanthana, Tejtasin Phiasai. 267-272 [doi]
- Applying QFD Method to Develop Ceramic Products by Two Artists: A Case of Art TilesJay Tzu-Chieh Lee, Shuo-Fang Liu. 273-277 [doi]
- Research on Subjective Quality Assessment of Light Field ImagesLiang Shan, Deyang Liu, Ping An, Xinpeng Huang. 278-282 [doi]
- An Efficient Image-ELM-Based Chip Classification AlgorithmXinman Zhang, Jiayu Zhang, Xuebin Xu. 283-287 [doi]
- Robust Regression for Image Alignment via Subspace Recovery TechniquesHabte Tadesse Likassa, Wen-Hsien Fang. 288-293 [doi]
- An Efficient Dynamic Load-Balancing Large Scale Graph-Processing SystemMing-Chia Kuo, Pangfeng Liu, Jan-Jan Wu. 294-298 [doi]
- A Campus-Level View of Outlook Email TrafficZhengping Zhang, Carey Williamson. 299-306 [doi]
- Application of Kinect-based Motion Recognition Algorithm in Cultural TourismJinghua Yu, Qing Wang, Hong Chen. 307-311 [doi]
- Using QFD Method to Integrate Artworks and Product A Case Study of Tea SetJay Tzu-Chieh Lee, Shuo-Fang Liu. 312-317 [doi]
- A New Design Review Method for Functional Safety of Automotive Electrical SystemsChih-Chung Chiu, Kuo-Sui Lin. 318-326 [doi]
- A Study on Classification of Traffic Accident Injury Grade Using CNN and NASS-CDS DataHyu-Seop Song, Yongbeom Lee, Seongkeun Park, Hyeonseok Kim, Eungi Cho, Mingyu Park, Seung-Woo Kim. 327-331 [doi]
- Lightweight Deep Neural Network Approach for Parking Violation DetectionChin-Kit Ng, Soon Nyean Cheong, Yee-Loo Foo. 332-337 [doi]
- Application of Insole Pressure Sensor to Assess Lower Extremity ComplianceChi-Heng Lu, Jhih-Jhong Jhuang, Chiu-Ching Tuan. 338-342 [doi]
- Application Research of Workflow Technology in Printing and Publishing IndustryShaopeng Wang, Shulin Yang, Hongwei Cai. 343-346 [doi]
- Using 3D Carbon Dioxide Slab Laser Printing Processing for Craft Teaching in Elementary SchoolJay Tzu-Chieh Lee, Shuo-Fang Liu. 347-351 [doi]
- Multiobjective Trajectory Planning of a 6D Robot based on Multiobjective Meta Heuristic SearchNantiwat Pholdee, Sujin Bureerat. 352-356 [doi]
- A Random Number Generator Based on Electronic Noise and the Xorshift AlgorithmMandana Ewert. 357-362 [doi]