Abstract is missing.
- A Jaccard base similarity measure to improve performance of CF based recommender systemsMubbashir Ayub, Mustansar Ali Ghazanfar, Muazzam Maqsood, Asjad Saleem. 1-6 [doi]
- Document level polarity classification with attention gated recurrent unitHoon-Keng Poon, Wun-She Yap, Yee-Kai Tee, Bok-Min Goi, Wai-Kong Lee. 7-12 [doi]
- Improved UGRNN for short-term traffic flow prediction with multi-feature sequence inputsJiabin Qu, Xinyu Gu, Lin Zhang. 13-17 [doi]
- Multi-finger motion inference using M1 neural decodingHwayoung Choi, Kyung-Jin You, Hyun-Chool Shin. 18-20 [doi]
- Proactive detection of algorithmically generated malicious domainsJeffrey Spaulding, Jeman Park 0001, Joongheon Kim, Aziz Mohaisen. 21-24 [doi]
- A comparative study of failover schemes for IaaS recoveryWasiq Noor Ahmad Qasmi, Taimur Siddiqui, Muhammad Karam Shehzad, Adnan Iqbal, Muhammad Saqib Ilyas. 25-30 [doi]
- Secured outsourcing towards a cloud computing environment based on DNA cryptographyHamza Hammami, Hanen Brahmi, Sadok Ben Yahia. 31-36 [doi]
- Towards a new security approach based on heartbeat authentication to ensure security of cloud data accessHamza Hammami, Hanen Brahmi, Sadok Ben Yahia. 37-43 [doi]
- Unified logging system for monitoring multiple cloud storage providers in cloud storage brokerMuhammad I. H. Sukmana, Kennedy A. Torkura, Feng Cheng 0002, Christoph Meinel, Hendrik Graupner. 44-49 [doi]
- PRESENCE: Toward a novel approach for performance evaluation of mobile cloud SaaS Web ServicesAbdallah Ali Zainelabden Abdallah Ibrahim, Sébastien Varrette, Pascal Bouvry. 50-55 [doi]
- Downlink sum-rate optimization leveraging hungarian method in fog radio access networksDuc-Nghia Vu, Nhu-Ngoc Dao, Sungrae Cho. 56-60 [doi]
- User scenario based video contents creation systemMinho Han, Sun-Joong Kim. 61-63 [doi]
- A transformation analysis of 3D virtual object for projection mappingSanghoon Lee, Ilhong Shin, Eunjun Rhee, Sunghee Lee, Namkyung Lee. 64-66 [doi]
- A study on trust factors in a multimedia service environmentSeunghyeon Moon, Sungkwan Jung, Seungyong Jung. 67-69 [doi]
- A study on near-real-time geometric correction system of drones imageChoi Myung Jin, Kim Tae Young, Lee Min Seob, Kim Min Jae. 70-72 [doi]
- Trustworthiness management in sharing CDN infrastructureTai-Won Um, Gyu Myoung Lee, Hyun-Woo Lee. 73-75 [doi]
- A study on smart IoT hub for intelligent signage services using trust informationJun Wook Lee, Yong Woo Kim. 76-79 [doi]
- History-enhanced focused website segment crawlerTanaphol Suebchua, Bundit Manaskasemsak, Arnon Rungsawang, Hayato Yamana. 80-85 [doi]
- Individualized electric power management system using BLE tag at a shared houseHideki Kondo, Kazumasa Takami. 86-91 [doi]
- DTNDocs: A delay tolerant peer-to-peer collaborative editing systemCharles Edward A. Robin, Victor M. Romero. 92-97 [doi]
- Number ofpeople grasp system of neighboring terminals using Bluetooth low energyKazuki Uemura, Hiroki Murotsu, Koki Matsumoto, Shingo Nakajima, Tomotaka Wada, Kazuhiro Ohtsuki. 98-103 [doi]
- On similarities of string and query sequence for DGA botnet detectionChun-De Chang, Hui-Tang Lin. 104-109 [doi]
- Fireplug: Flexible and robust N-version geo-replication of graph databasesRay Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, Luis Rodrigues, Miguel Correia 0001. 110-115 [doi]
- REST web service composition: A survey of automation and techniquesKrisada Sangsanit, Werasak Kurutach, Suronapee Phoomvuthisarn. 116-121 [doi]
- Proposal of a personal agent for human centric information networking: Collaboration of human profile and human contextMasafumi Katoh, Masahiko Murakami, Akiko Yamada, Masaaki Kawai, Motoyoshi Sekiya, Sumie Morita, Makoto Murakami. 122-127 [doi]
- Analyzing darknet TCP traffic stability at different timescalesNapaphat Vichaidis, Hiroshi Tsunoda, Glenn Mansfield Keeni. 128-133 [doi]
- Wake-up schedule modification for shorter-delay intermittent wireless sensor networksShin Horie, Hiroaki Higaki. 134-139 [doi]
- A study for improvement of throughput in high-density wireless networks using transmitting opportunity controlTakahiro Kawasaki, Yumi Takaki, Tomio Kamada, Chikara Ohta. 140-145 [doi]
- Depth perception prediction of 3D video QoE for future internet servicesGokce Nur Yilmaz. 146-149 [doi]
- Quality control scheme based on VBR characteristics for improving QoE of UHD streaming serviceMinsu Kim, Kwangsue Chung. 150-155 [doi]
- Strategic defense and attack in deception based network securityDaniel Fraunholz, Hans Dieter Schotten. 156-161 [doi]
- A new multi classifier system using entropy-based features in DDoS attack detectionAbigail Koay, Aaron Chen, Ian Welch, Winston K. G. Seah. 162-167 [doi]
- Cryptanalysis and improvement of a mutual user authentication scheme for the Internet of ThingsTrupil Limbasiya, Arijit Karati. 168-173 [doi]
- Security insurance of cloud computing services through cross roads of human-immune and intrusion-detection systemsHamza Hammami, Hanen Brahmi, Sadok Ben Yahia. 174-181 [doi]
- A secure WebRTC/WoT-based health-care architecture enhanced with access controlSaad El Jaouhari, Ahmed Bouabdallah, Jean-Marie Bonnin. 182-187 [doi]
- Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progressGaurav Varshney, Sumant Bagade, Shreya Sinha. 188-193 [doi]
- Bypassing DRM protection in e-book applications on AndroidSangmin Lee, Kuyju Kim, Jina Kang, Hyoungshick Kim. 194-198 [doi]
- Analyzing information availability in ICN under link failuresEline Rietberg, Lucia D'Acunto, Robert E. Kooij, Hans van den Berg. 199-204 [doi]
- Virtual network embedding in multi-domain environments with energy efficiency conceptsSamuel M. A. Araujo, Fernanda S. H. Souza, Geraldo R. Mateus. 205-210 [doi]
- A DTN routing algorithm adopting the "Community" and "Centrality" parameters used in social networksYusuke Igarashi, Toshiaki Miyazaki. 211-216 [doi]
- System of econometric equations of the world market of natural gasN. I. Didenko, D. F. Skripnuk, O. V. Mirolyubova, Viktor Merkulov, V. Sevashkin, Ekaterina Samylovskaya. 217-222 [doi]
- Effect of channel bonding and parallel data transmission with IEEE802.11n wireless LAN in a small sewer pipeYuki Takei, Zhi Liu 0006, Susumu Ishihara. 223-228 [doi]
- Modified rendezvous scheme with inferring access channel probability of slave by masterHayato Soya, Osamu Takyu, Keiichiro Shirai, Fumihito Sasamori, Shiro Handa, Mai Ohta, Takeo Fujii. 229-234 [doi]
- Analysis of message delivery delay in large-scale geographic DTN routingSumika Nishikawa, Daiki Matsui, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 235-240 [doi]
- Cognition for enhanced biometrie authenticationNatasa Zivic, Christoph Ruland. 241-244 [doi]
- MAEC-X: DDoS prevention leveraging multi-access edge computingNhu-Ngoc Dao, Duc-Nghia Vu, Yunseong Lee, Minho Park, Sungrae Cho. 245-248 [doi]
- Self-organizing map-based approaches in DDoS flooding detection using SDNTran Manh Nam, Phan Hai Phong, Tran Dinh Khoa, Thu-Huong Truong, Pham Ngoc Nam, Nguyen Huu Thanh, Luong Xuan Thang, Pham Anh Tuan, Le Quang Dung, Vu Duy Loi. 249-254 [doi]
- A method for estimating process maliciousness with Seq2Seq modelShun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi. 255-260 [doi]
- Implementation and optimization of image acquisition with smartphones in computer visionLingyan Xiu, Bojiao Ma, Konglin Zhu, Lin Zhang. 261-266 [doi]
- Information security problems in educational institutions in conditions of network interactionOleg A. Kozlov, Dmitriy G. Rodionov, Liudmilaa A. Guzikova. 267-269 [doi]
- OVS-DPDK with TSO feature running under dockerMuhui Yang, Yihua Huang. 270-273 [doi]
- SDN-based V2V offloading for cellular network using the LifeTime-based network state routing (LT-NSR)Chung-Ming Huang, Meng-Shu Chiang, Wei-Long Su, Duy-Tuan Dao. 274-279 [doi]
- Realization of flexible and scalable VANETs through SDN and virtualizationAshutosh Bhatia, K. Haribabu, Kartikeya Gupta, Aakash Sahu. 280-282 [doi]
- Software defined status aware routing in content-centric networkingYueping Cai, Jun Liu, Xinwei Fan, Ya Qiu, Bing Tan. 283-288 [doi]
- Analysis of deployment approaches for virtual customer premises equipmentTri-Hai Nguyen, Trinh Nguyen, Myungsik Yoo. 289-291 [doi]
- Link failure aware capacitated controller placement in software defined networksBala Prakasa Rao Killi, Seela Veerabhadreswara Rao. 292-297 [doi]
- A method of ECU software updatingYutaka Onuma, Yoshiaki Terashima, Sumika Nakamura, Ryozo Kiyohara. 298-303 [doi]
- Vehicle approaching model for T-junction during transition to autonomous vehiclesTatsuro Hara, Ryozo Kiyohara. 304-309 [doi]
- Reliable vehicle-to-vehicle communication using spectrum environment mapShunsuke Tsurumi, Takeo Fujii. 310-315 [doi]
- A trust based secure communication for software defined VANETsHarsha Vasudev, Debasis Das. 316-321 [doi]
- The deployment of mobile edges in vehicular environmentsHesham El-Sayed, Moumena Chaqfeh. 322-324 [doi]
- A distributed cooperative MAC protocol with relay collision avoidance for wireless ad hoc networksShan Wu, Kai Liu, Wenzhu Zhang, Zhen Xu, Feng Liu, Xiling Luo. 325-330 [doi]
- Proposal of CQI table switching control method corresponding to 256-QAM for CRE in HetNetNorihiro Naganuma, Kai Osawa, Jun Mashino, Satoshi Suyama, Hiroyuki Otsuka. 331-335 [doi]
- Throughput analysis of multi-antenna based SWIPT relay networkDanish Mehmood Mughal, Syed Tariq Shah, Daniyal Munir, Kwang-Hyun Park, Min Young Chung. 336-340 [doi]
- Outage probability analysis of device-to-device communications with frequency reuse-2 in fractional frequency reuse methodDevarani Devarani Devim, Seokjoo Shin. 341-345 [doi]
- Exploring LTE-V link level performance by geometry enhanced winner II channel modelYi Gong, Shengchu Wang, Yupeng Zhang, Feng Luo, Lin Zhang. 346-351 [doi]
- Influence of phase error on OFDM-based 4096-QAM with turbo codingRuxiao Tian, Tomoki Ota, Hiroyuki Otsuka. 352-355 [doi]
- FTN-based MIMO transmission for efficient coexistence of broadband and sporadic trafficsAmeha T. Abebe, Chung Gu Kang. 356-358 [doi]
- SINR-ordered cross link interference control scheme for dynamic TDD in 5G systemJae-Won Lee, Chung G. Kang, Minjoong Rim. 359-361 [doi]
- Cell selection scheme for handover reduction based on moving direction and velocity of UEs for 5G multi-layered radio access networksAkira Kishida, Yoshifumi Morihiro, Takahiro Asai, Yukihiko Okumura. 362-367 [doi]
- Joint clustering and routing protocol for static 3D wireless sensor networksAbhishek Joshi, Sarang Dhongdi, Ankit, K. R. Anupama. 368-373 [doi]
- Optimization of LTE uplink performance in multivendor heterogeneous networksJussi Turkka, Olivia, Myleen Dosado Villaluz, Simon Foo. 374-379 [doi]
- A multi-game approach for effective co-existence in unlicensed spectrum between LTE-U system and Wi-Fi access pointAnupam Kumar Bairagi, Nguyen H. Tran, Choong Seon Hong. 380-385 [doi]
- Fair slot assignment in elastic optical networks under dynamic trafficNasim Ravi, Aysegul Yayimli. 386-390 [doi]
- Secure cloud computing algorithm using homomorphic encryption and multi-party computationDebasis Das. 391-396 [doi]
- The effect of datagram size and susceptible population on the epidemiology of fast self-propagating malwareLuc Tidy, Steve Woodhead. 397-401 [doi]
- Identity based security for authentication and mobility in future ID oriented networksRongfei Wan, Bin Da, Richard Li, Chuang Wang, Hongpei Li. 402-407 [doi]
- Intelligent sensor network for fence protectionBalazs Voneki. 408-413 [doi]
- Data trustworthiness in IoTSabah Suhail, Choong Seon Hong, M. Ali Lodhi, Faheem Zafar, Abid Khan, Faisal-Bashir Hussain. 414-419 [doi]
- 3TAAV: A three-tier architecture for pseudonym-based anonymous authentication in VANETsGanesh Bellikar, Ashutosh Bhatia, R. C. Hansdah, Sudhanshu Singh. 420-425 [doi]
- An airborne communication relay scheme for IEEE 802.11 WLAN based networkDongjune Lee, JaeSung Lim, Hoki Baek. 426-431 [doi]
- Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things securityJongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won. 432-437 [doi]
- Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication schemeChunyi Quan, Jaewook Jung, Hakjun Lee, Dongwoo Kang, Dongho Won. 438-441 [doi]
- Response driven efficient task load assignment in mobile crowdsourcingShashi Raj Pandey, Choong Seon Hong. 442-446 [doi]
- Cloud of things based on linked dataYun-Hee Son, Kyu-Chul Lee. 447-449 [doi]
- Beam Division Multiple Access (BDMA) and modulation formats for 5G: Heir of OFDM?Pankaj Kumar Dalela, Pramod Bhave, Pushpender Yadav, Anshul Yadav, Vipin Tyagi. 450-455 [doi]
- Reservation-based cooperative traffic management at an intersection of multi-lane roadsMyungwhan Choi, Areeya Rubenecia, Hyo Hyun Choi. 456-460 [doi]
- An efficient improvement potential-based virtual network function selection scheme for reliability/availability improvementThanh Dinh, Younghan Kim. 461-463 [doi]
- Video streaming service and CD salesKenichi Yoshida, Tomonori Manabe. 464-469 [doi]
- Broadcast MAC protocol using relative distance for periodic safety messages in vehicular networksYafeng Deng, Young-June Choi. 470-472 [doi]
- Blockchain: Challenges and applicationsPinyaphat Tasatanattakool, Chian Techapanupreeda. 473-475 [doi]
- Weighted frequency hopping control in TDL for coexistence of satellite spectrumSeonjoo Choi, JaeSung Lim, Hoki Baek. 476-481 [doi]
- Mobile augmented reality on web-based for the tourism using HTML5Piyapong Dangkham. 482-485 [doi]
- An efficient rate adaptation algorithm for streaming over HTTPWaqas ur Rahman, Kwangsue Chung. 486-491 [doi]
- Design of marine environment monitoring system based on open source softwaresSun Park, JongWon Kim, ByungRae Cha. 492-494 [doi]
- Distributed detection and response for the mitigation of distributed denial of service attacksD. C. Grant. 495-497 [doi]
- An interest-driven peer-to-peer micro-blogging system over delay tolerant networksPaul Alvin V. Sacedor, Victor M. Romero. 498-503 [doi]
- Intelligent accident detection classification using mobile phonesImran A. Zualkernan, Fadi A. Aloul, Fayiz Basheer, Gurdit Khera, Shruthi Srinivasan. 504-509 [doi]
- A software defined radio based power saving strategy for next generation mobile systemsHaitham Khaled, Md Munjure Mowla, Iftekhar Ahmad, Daryoush Habibi. 510-515 [doi]
- Intelligent service fulfillment for software defined networks in smart cityMd. Shirajum Munir, Sarder Fakhrul Abedin, Md. Golam Rabiul Alam, Nguyen H. Tran, Choong Seon Hong. 516-521 [doi]
- Top-down parsing for Neural Network Exchange Format (NNEF) in TensorFlow-based deep learning computationBokyung Seo, Myungjae Shin, Yeong Jong Mo, Joongheon Kim. 522-524 [doi]
- An efficient processing of range spatial keyword queries over moving objectsSujin Oh, HaRim Jung, Ung-Mo Kim. 525-530 [doi]
- CSSS: Cyber security simulation service for software defined tactical networksFerdinando Battiati, Girolamo Catania, Lucio Ganga, Giacomo Morabito, Agatino Mursia, Andrea Viola. 531-533 [doi]
- Latency-based graph selection manager for end-to-end network service on heterogeneous infrastructuresChangwoo Kim, Yujeong Oh, Jaiyong Lee. 534-539 [doi]
- A study on the processing and reinforcement of message digest through two-dimensional array maskingSun Young Park, Keecheon Kim. 540-544 [doi]
- Towards a self-adaptive access control middleware for the Internet of ThingsHamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said. 545-550 [doi]
- Study on information security sharing system among the industrial IoT service and product providerJongsoek Choi, Yongtae Shin, Sunok Cho. 551-555 [doi]
- Faster detection and prediction of DDoS attacks using MapReduce and time series analysisVishal Maheshwari, Ashutosh Bhatia, Kuldeep Kumar. 556-561 [doi]
- Multi-view topic model learning to generate audience metadata automaticallyWonjoo Park, Jeong Woo Son, Sang-Yun Lee, Sun-Joong Kim. 562-564 [doi]
- Quantitative security analysis of network OSes by fitting VDM and examining CVSSHyunChul Joh. 565-570 [doi]
- Enhancing supercomputing with software defined networkingJason R. Lee, Shane Richard Canon, Tina Declerck, Brent Draney, David Paul, David Skinner. 571-576 [doi]
- Simulation of scalability in IoT applicationsLuis Jurado Perez, Joaquin Salvachua Rodriguez. 577-582 [doi]
- A 2.4-GHz VCO using a symmetric layout technique to minimize mismatches in differential signalsMilim Lee, Changkun Park. 583-585 [doi]
- Increasing the efficiency of labor protection in the enterpriseJ. I. Idrisova, V. N. Myasnikov, A. I. Uljanov, N. V. Belina. 586-588 [doi]
- Evaluation of efficiency of using bank smart-card in Russian financial institutionsAlexey V. Bataev, Dmitriy G. Rodionov, Ekaterina S. Kosonogova. 589-593 [doi]
- Analysis of world trends in the field of cloud technologyAlexey V. Bataev, Dmitriy G. Rodionov, Darya A. Andreyeva. 594-598 [doi]
- Toward hybrid RPL based IoT sensing for smart cityYahya Al Sawafi, Abderezak Touzene, Khaled Day, Nasser Alzeidi. 599-604 [doi]
- Occupancy-based adaptive dimmable lighting energy management scheme combined with cyber physical systemChangmin Lee, Duckhee Lee, Jaiyong Lee. 605-610 [doi]
- Innovative and technological potential of the region and its impact on the social sector developmentN. I. Didenko, D. F. Skripnuk, K. N. Kikkas, V. Sevashkin, G. Romashkin, S. V. Kulik. 611-615 [doi]
- Identifying signal source using channel state information in wireless LANsYonghwi Kim, Sanghyun An, Jungmin So. 616-621 [doi]
- ISO as a real source of funding. Pricing issuesDaniel S. Demidenko, Ekaterina D. Malevskaia-Malevich, Yulia A. Dubolazova. 622-625 [doi]
- The analysis of convergence - Divergence in the development of innovative and technological processes in the countries of the Arctic CouncilN. I. Didenko, D. F. Skripnuk, K. N. Kikkas, Viktor Merkulov, G. Romashkin, S. V. Kulik. 626-631 [doi]
- Energy efficient K-means clustering-based routing protocol for WSN using optimal packet sizeMadiha Razzaq, Ningombam Devarani Devi, Seokjoo Shin. 632-635 [doi]
- Digitalization of banking in Russia: OverviewTatiana J. Kudryavtseva, Angi E. Skhvediani, Arseniy A. Bondarev. 636-639 [doi]
- A fault management system for NFVHan Bum Lee, Sang-Il Kim, Hwa-sung Kim. 640-645 [doi]
- Behavior recognition and disaster detection by the abnormal analysis using SVM for ERESSShingo Nakajima, Toshiki Yamasaki, Koki Matsumoto, Kazuki Uemura, Tomotaka Wada, Kazuhiro Ohtsuki. 646-651 [doi]
- Enhanced cluster-based CoAP in Internet-of-Things networksDong-Kyu Choi, Joong-Hwa Jung, Seok Joo Koh. 652-656 [doi]
- Distributed pub/sub model in CoAP-based Internet-of-Things networksJoong-Hwa Jung, Dong-Kyu Choi, Seok Joo Koh. 657-662 [doi]
- Identification of TCP congestion control algorithms with convolution neural networksTakahiro Nogiwa, Kouji Hirata. 663-665 [doi]
- Formal verification for wireless sensor network in consideration of communication errorsAkihiro Ikeda, Naoki Akiyama, Toshiaki Miyazaki. 666-670 [doi]
- Low - Power wind generatorY. A. Makarichev, A. S. Anufriev, Y. N. Ivannikov, N. Didenko, A. Gazizulina. 671-672 [doi]
- Use of nomadic computing devices for storage synchronizationAnuradha Wickramarachchi, Dulaj Atapattu, Pamoda Wimalasiri, Ravidu Mallawa Arachchi, Gihan Dias. 673-678 [doi]
- Cooperative between V2C and V2V charging: Less range anxiety and more charged EVsOanh Tran Thi Kim, Nguyen H. Tran, Vandung Nguyen, Sun-Moo Kang, Choong Seon Hong. 679-683 [doi]
- State diagram based IoT Ecosystem's IoT device conflict problem migration methodSeungmin Lee, Soojin Park, Young B. Park. 684-688 [doi]
- A design of IL-CyTIS for automated cyber threat detectionKeecheon Kim, Junghyun An, Joseph Yoo. 689-693 [doi]
- Optimal placement considering interference in multiple ad hoc networksRiku Ohmiya, Hiroyasu Obata, Tutomu Murase. 694-699 [doi]
- Interference of overhearing by eavesdropper nodes for secure wireless ad-hoc networksIsamu Shimada, Hiroaki Higaki. 700-705 [doi]
- Authorization based on mobile whitelist in devices for device-to-device communicationsSeohee You, Dana Yang, Inshil Doh, Kijoon Chae. 706-711 [doi]
- RMBC: Randomized mesh blockchain using DBFT consensus algorithmSol Jeon, Inshil Doh, Kijoon Chae. 712-717 [doi]
- Resource management for mobile edge computing using user mobility predictionTakayuki Ojima, Takeo Fujii. 718-720 [doi]
- An energy and link aware next node selection protocol for body area networksKashif Naseer Qureshi, Faisal Bashir, Abdul Hanan Abdullah. 721-726 [doi]
- Photovoltaic power data analysis using hierarchical clusteringSungsik Park, Young B. Park. 727-731 [doi]
- A comparison of decision tree based techniques for indoor positioning systemLummanee Chanama, Olarn Wongwirat. 732-737 [doi]
- Network lifetime enhancement of multi-hop wireless sensor network by RF energy harvestingP. Sethu Lakshmi, M. G. Jibukumar, V. S. Neenu. 738-743 [doi]
- Trend-adaptive multi-scale PCA for data fault detection in IoT networksThien-Binh Dang, Manh-Hung Tran, Duc Tai Le, Vyacheslav V. Zalyubovskiy, Hyohoon Ahn, Hyunseung Choo. 744-749 [doi]
- Towards data extraction of dynamic content from JavaScript Web applicationsWinai Nadee, Korawit Prutsachainimmit. 750-754 [doi]
- Phase-compensation-based cooperative spectrum sensing algorithm for cognitive cloud networksXiaoxiao Wu, Li Wang, Shibing Zhang, Guodong Zhang. 755-759 [doi]
- Priority based deployment of IoT devicesMandeep Kumar, Ketan Sabale, S. Mini 0001, Trilochan Panigrahi. 760-764 [doi]
- An airfare prediction model for developing marketsViet-Hoang Vu, Quang Tran Minh, Phu H. Phung. 765-770 [doi]
- Transmit control for secure information sharing in untrusted relay with two antennasTetsuya Noguchi, Osamu Takyu, Fumihito Sasamori, Shiro Handa, Takeo Fujii, Tomoaki Ohtsuki. 771-775 [doi]
- A software-defined model for IoT clusters: Enabling applications on demandThi Minh Chau Nguyen, Doan B. Hoang, Thanh Dat Dang. 776-781 [doi]
- Area based routing protocol for mobile wireless sensor networksV. Sreejith, Rutuja Surve, Nikhil Vyas, K. R. Anupama, Lucy J. Gudino. 782-786 [doi]
- Experimental study of signaling with IFDMA modulation and nonlinear amplifying for recovering access channel mismatchRyo Kurosawa, Osamu Takyu, Fumihito Sasamori, Shiro Handa, Mai Ohta, Takeo Fujii. 787-790 [doi]
- Dual threshold load balancing in SDN environment using process migrationAshis Talukder, Sarder Fakhrul Abedin, Md. Shirajum Munir, Choong Seon Hong. 791-796 [doi]
- Mapping mechanism to enhance QoS in IP networksSriharsha Karamchati, Shatrunjay Rawat, Sudhir Yarram, Guru Prakash Ramaguru. 797-803 [doi]
- Reliability measures of crossed cube networksLitao Guo. 804-806 [doi]
- Implementation of smartwatch user interface using machine learning based motion recognitionKyung-Taek Lee, Hyoseok Yoon, Youn-Sung Lee. 807-809 [doi]
- An opportunistic MAC protocol for full duplex wireless LANsWonjung Kim, Tae-Yoon Kim, Sohyun Joo, Sangheon Pack. 810-812 [doi]
- Detection and classification of HGG and LGG brain tumor using machine learningF. P. Polly, S. K. Shil, M. A. Hossain, A. Ayman, Y. M. Jang. 813-817 [doi]
- Data compression and prediction using machine learning for industrial IoTJunmin Park, Hyunjae Park, Young-June Choi. 818-820 [doi]
- Semi-automatic image and video annotation system for generating ground truth informationChang-Mo Yang, Yusik Choo, Sungjoo Park. 821-824 [doi]
- EMG based gesture recognition using feature calibrationKimoon Kang, Hyun-Chool Shin. 825-827 [doi]
- EEG binarization for burst suppression segmentationJaeyun Lee, Woo-Jin Song, Hyun-Chool Shin. 828-830 [doi]
- Effective object tracking framework using weight adjustment of particle swarm optimizationChangseok Bae, Henry Wing Fung Teung, Yuk Ying Chung. 831-833 [doi]
- Finger motion recognition robust to diverse arm postures using EMG and accelerometerKiwon Rhee, Hyun-Chool Shin. 834-836 [doi]
- Novel Korean finger language recognition using EMG and motion sensorsInseok Yeo, Hyun-Chool Shin. 837-839 [doi]
- Development of multi-channel brain stimulatorHyejin An, Hyun-Chool Shin. 840-842 [doi]
- A probability model of stationary object using radar time-frequency spectrumHeemang Song, Hyun-Chool Shin. 843-845 [doi]
- Interpixel interference mitigation using differential coding in vehicular visible light communication based image sensorDat Vuong, Jaejin Lee, Sun K. Hong, Won-Yong Shin, Myungsik Yoo. 846-847 [doi]
- AI platform to accelerate API economy and ecosystemKangYoon Lee, Neul Ha. 848-852 [doi]
- Performance of a receiver-initiated MAC protocol with aggregation for event-driven wireless sensor networksHyungkeun Lee, Inhye Park. 853-856 [doi]
- Real-time 360-degree video streaming over millimeter wave communicationThanh-Tuan Le, Dien Nguyen Van, Eun-Seok Ryu. 857-862 [doi]
- RIPPLE: Adaptive fine-grained access control in multi-hop LLNsYoungho Kim, Yun-kyung Lee, Jeongnyeo Kim. 863-868 [doi]
- Leveraging multicores for mobile edge computingSeehwan Yoo. 869-874 [doi]
- Application of convolutional neural networks for visibility estimation of CCTV imagesAndrey Giyenko, Akmaljon Palvanov, Younglm Cho. 875-879 [doi]
- Real-world large-scale IoT systems for community eldercare: A comparative study on system dependabilityHwee Pink Tan, Austin Zhang. 880-885 [doi]
- Distributed dynamic power-aware buffering for multi-Gbps video streaming in IEEE 802.11ad fast session transferDohyun Kwon, Joongheon Kim. 886-890 [doi]
- Hybrid positioning system for improving location recognition performance in offshore plant environmentDong-hyun Lee, Youngbo Shim, Myoung Jin Kim, Yeon-Kug Moon. 891-893 [doi]
- The UWB-based positioning algorithm and H/W development for safety of offshore plant workersDong-hyun Lee, Youngbo Shim, Myoung Jin Kim, Yeon-Kug Moon. 894-896 [doi]
- High-dimensional statistical supervised learning for extracting information in steganographySunjun Hwang, Kyeong Seon Kim, Yejin Kim, Junhui Kim, Miji Park, SooHyun Park, Joongheon Kim. 897-898 [doi]
- A fast remote driver selection mechanism for remote-controlled driving systemsAli Gohar, Sanghwan Lee. 902-905 [doi]
- A convolution neural networks scheme for classification of motor imagery EEG based on wavelet time-frequecy imageHyeon-Kyu Lee, Young-Seok Choi. 906-909 [doi]
- Flow-based malware detection using convolutional neural networkM. Yeo, Y. Koo, Y. Yoon, T. Hwang, J. Ryu, J. Song, C. Park. 910-913 [doi]
- Classification of human attention to multimedia lectureH. Lee, Y. Kim, C. Park. 914-916 [doi]
- Pattern recognition of human arm movement using deep reinforcement learningW. Seok, Y. Kim, C. Park. 917-919 [doi]
- PTDU: Public transit system based framework of data upload in urban crowd sensingZhenlong Peng, Jian An, Xiaolin Gui, Tianjie Wu, Zhenlong Peng. 920-925 [doi]
- CCN-based vehicular communicationsKamrul Hasan, Seong-Ho Jeong. 926-929 [doi]
- API and permission-based classification system for Android malware analysisJungsoo Park, Hojin Chun, Souhwan Jung. 930-935 [doi]
- Implementation of IoT system using block chain with authentication and data protectionChan Hyeok Lee, Ki-Hyung Kim. 936-940 [doi]
- Block chain based data security enhanced IoT server platformJin Hyeong Jeon, Ki-Hyung Kim, Jai-Hoon Kim. 941-944 [doi]
- Intelligence provisioning model to support web objects enabled ubiquitous self-directed learningIlyoung Chong, Sajjad Ali, Sanghong Lee. 945-948 [doi]
- Recognition of the upper structure using the RCS characteristic of the automotive radarJunsu Oh, Heemang Song, Hyun-Chool Shin. 949-952 [doi]
- Design of an indoor positioning scheme using artificial intelligence algorithmsAmirul Islam, Md. Tanvir Hossan, Mostafa Zaman Chowdhury, Yeong Min Jang. 953-956 [doi]
- State of the art and challenges facing consensus protocols on blockchainNutthakorn Chalaemwongwan, Werasak Kurutach. 957-962 [doi]
- Immersive gesture interfaces for 3D map navigation in HMD-based virtual environmentsYeasom Lee, Wonjae Choi, Bong-Soo Sohn. 963-965 [doi]