Abstract is missing.
- CLDM: A Clothing Landmark Detector Based on Mask R-CNNTianyou Yang, Yingjie Shi, Haiqiao Huang. 1-5 [doi]
- How to Determine Minimum Support in Association RuleErna Hikmawati, Kridanto Surendro. 6-10 [doi]
- Training Strategies for CNN-based Models to Parse Complex Floor PlansRuiyun Zhu, Jingcheng Shen, Xiangtian Deng, Marcus Wallden, Fumihiko Ino. 11-16 [doi]
- Towards Interpretation of Abstract Instructions Using Declarative Constraints in Temporal LogicMasaya Shimakawa, Kentaro Hayashi, Shigeki Hagihara, Naoki Yonezaki. 17-20 [doi]
- Estimation of Heat of Formation for Chemical Systems using the Lasso Regression-Based ApproachThang V. Nguyen, Nam T. H. Nguyen, Triet Le, Sang T. T. Nguyen, Lam Huynh. 21-25 [doi]
- Exploiting Deep Neural Networks for Intention MiningAnam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, Muhammad Zubair Asghar. 26-30 [doi]
- ADHD Identification using Convolutional Neural Network with Seed-based Approach for fMRI DataGangani Ariyarathne, Senuri De Silva, Sanuwani Dayarathna, Dulani Meedeniya, Sampath Jayarathna. 31-35 [doi]
- Performance Evaluation for Class Center-Based Missing Data Imputation AlgorithmHeru Nugroho, Nugraha Priya Utama, Kridanto Surendro. 36-40 [doi]
- Digital Shop Floor Management: A Practical Framework For ImplementationRaphael Hartner, Vitaliy Mezhuyev, Martin Tschandl, Christian Bischof. 41-45 [doi]
- Comparison Method for Handling Missing Data in Clinical StudiesHeru Nugroho, Nugraha Priya Utama, Kridanto Surendro. 46-50 [doi]
- Geospatial Data Sharing: Preliminary Studies on Issues and Challenges in Natural Disaster ManagementMageshwari Valachamy, Shamsul Sahibuddin, Noor Azurati Ahmad, Nur Azaliah Abu Bakar. 51-56 [doi]
- Recommendations for Improving Data Management Process in Government of Bandung Regency using COBIT 4.1 FrameworkHeru Nugroho, Soni Fajar Surya Gumilang. 57-61 [doi]
- Adopting Jaya Algorithm for Team Formation ProblemMd. Abdul Kader, Kamal Z. Zamli. 62-66 [doi]
- A Hybrid "Quantum and Classical" Method for Outlier DetectionRabah Mazouzi, Philippe Harel. 67-73 [doi]
- A Distributed Directed Breadth-First Search Algorithm Based on Message-Passing Model for Efficient Line-of-Sight ComputationTuyen Phong Truong, Toan Hai Le. 74-78 [doi]
- An Educational Tool Aimed at Learning MetaheuristicsMd. Abdul Kader, Jamal A. Jamaluddin, Kamal Z. Zamli. 79-83 [doi]
- Research on Product Detection Algorithm for Intelligent RefrigeratorYi Zhou, Shanru Li, Chongwen Wang. 84-88 [doi]
- Applying Prefixed-Itemset and Compression Matrix to Optimize the MapReduce-based Apriori Algorithm on HadoopRui Sun, Yuqiang Li. 89-93 [doi]
- An Improved Genetic Bat algorithm for Unconstrained Global Optimization ProblemsMuhammad Zubair Rehman, Kamal Z. Zamli, Abdullah B. Nasser. 94-98 [doi]
- Improving Classification Accuracy of Random Forest Algorithm Using Unsupervised Discretization with Fuzzy Partition and Fuzzy Set IntervalsMuhammad Nur Fikri Hishamuddin, Mohd. Fadzil Hassan, Ainul Akmar Mokhtar. 99-104 [doi]
- Latin Hypercube Sampling Jaya Algorithm based Strategy for T-way Test Suite GenerationAbdullah B. Nasser, Antar S. H. Abdul-Qawy, Nibras Abdullah, Fadhl Hujainah, Kamal Z. Zamli, Waheed Ali H. M. Ghanem. 105-109 [doi]
- Real Time Face Recognition on an Edge Computing DeviceSamarth Gupta. 110-113 [doi]
- Masked Face Detection Based on Locally Nonlinear Feature FusionXin-Yi Peng, Jun Cao, Fuyuan Zhang. 114-118 [doi]
- Semantic Based Vitamin Deficiency Monitoring SystemOluyinka Omotosho, Yetunde Akinwale, Adedoyin Idris. 119-123 [doi]
- Accuracy Improvement of Human Tracking in Aerial Images Using Error Correction Based on Color InformationRisako Aoki, Takuro Oki, Ryusuke Miyamoto. 124-128 [doi]
- Deep Learning in Semantic Segmentation of Rust in ImagesLe Dinh Duy, Ngo Tuan Anh, Ngo Tung Son, Nguyen Viet Tung, Nguyen Ba Duong, Muhammad Hassan Raza Khan. 129-132 [doi]
- Spatial Pyramid Block for Oracle Bone Inscription DetectionGuoying Liu, Jici Xing, Jing Xiong. 133-140 [doi]
- A Method of Workpiece Coherent Line Detection Based on Progressive Probabilistic Hough TransformZiyao Wang, Dali Yang, Qiang Tong. 141-146 [doi]
- A Framework for Automated Reengineering of BPMN Models by Excluding Inefficient ActivitiesRimsha Khan, Farooque Azam, Bilal Maqbool, Muhammad Waseem Anwar. 147-151 [doi]
- A Systematic Literature Review for Software Portability Measurement: Preliminary ResultsHamza Ghandorh, Abdulfattah Noorwali, Ali Bou Nassif, Luiz Fernando Capretz, Roy Eagleson. 152-157 [doi]
- Service Learning in Application Development Course: A Case Study of a Rural Community EngagementShahida Sulaiman, Siti Julia Mohd Shahrol, Abd Rahman Abd Samad. 158-162 [doi]
- Requirements Traceability Management Support Tool for UML ModelsKaito Yoshino, Saeko Matsuura. 163-166 [doi]
- A Keyword Based Technique to Evaluate Broad Question Answer ScriptTamim Al Mahmud, Md Gulzar Hussain, Sumaiya Kabir, Hasnain Ahmad, Mahmudus Sobhan. 167-171 [doi]
- EQ101: Emotional Quotient Assessment A Mobile Application for StudentsNualsawat Hiransakolwong. 172-176 [doi]
- A Systematical Study for Deep Learning Based Android Malware DetectionHuanyu Wu. 177-182 [doi]
- A Meta-Model for Automated Black-Box Testing of Visualization Based Software ApplicationsSyed Husnain Kazmi, Farooque Azam, Muhammad Waseem Anwar, Bilal Maqbool. 183-187 [doi]
- A Reliability Automatic Assessment Framework of Open Source Software Based on JIRAQian Wang, Wei Zhang, Jianhui Jiang, Long Li. 188-193 [doi]
- A Malware Detection Framework Based on Forensic and Unsupervised Machine Learning MethodologiesAhmad Naim Irfan, Aswami Ariffin, Mohd Naz'ri Mahrin, Syahid Anuar. 194-200 [doi]
- Mixed Initiative Realizability Problem Resolution Using UML Composite StatesMuhammad Sohaib Munir, Hafsa Tanveer, Urooj Fatima. 201-205 [doi]
- Automated Office Software Test MethodLin Zhang, Ning Li, Xia Hou, Yingai Tian. 206-211 [doi]
- New Approach on Steganalysis: Reverse-Engineering based Steganography SW AnalysisHanseong Lee, Hyung-Woo Lee. 212-216 [doi]
- Design of Cultural Relics Protection Micro-environment Monitoring System Based on ZigBee Wireless CommunicationChangsong Ma, Hongwei Rong, Yushu Liu. 217-221 [doi]
- Anchor Based Geographical Routing in WSNNaveen Kumar Gupta, Rama Shankar Yadav, Rajendra Kumar Nagaria. 222-226 [doi]
- Packet Reachability Verification in OpenFlow NetworksNoriaki Yoshiura, Keigo Sugiyama. 227-231 [doi]
- IoTDePT: Detecting Security Threats and Pinpointing Anomalies in an IoT environmentEkkachan Rattanalerdnusorn, Montida Pattaranantakul, Phithak Thaenkaew, Chalee Vorakulpipat. 232-236 [doi]
- A Novel Method of Distortionless Correlation Function after STAP for BOCZukun Lu, Feiqiang Chen, Honglei Lin, Yifan Sun, Yuchen Xie. 237-241 [doi]
- A Method of Collecting the IP Addresses of Hidden Server in Tor NetworksNoriaki Yoshiura, Kento Koizumi. 242-246 [doi]
- IoT Soil Moisture Monitoring and Irrigation System DevelopmentKim Mey Chew, Syvester Chiang-Wei Tan, Gary Chee-Wyai Loh, Nancy Bundan, Siew-Ping Yiiong. 247-252 [doi]
- Modeling and Simulating Concurrent Communications of Distributed Sensing NetworksTuyen Phong Truong, Toan Hai Le. 253-257 [doi]
- Backward Slicing Analysis on Debug Log for Crash ComprehensionMa Chi. 258-263 [doi]
- MIRCS: A Mobile USSD-SMS Interactive Result Checking System for Resource-Constrained SettingsAbdullahi Abubakar Kawu, Abdulkarim Abdullahi, Elijah Joseph, Amit Mishra, Abdulganiyu Abdulrahman. 264-268 [doi]
- BGSGA: Combining Bi-GRU and Syntactic Graph Attention for Improving Distant Supervision Relation ExtractionChengcheng Peng, Bin Wu, Zekun Li. 269-275 [doi]
- A False Negative Cost Minimization Ensemble Methods for Customer Churn AnalysisWong Keng Tuck, Goh Chien-Le, Ng Hu. 276-280 [doi]
- A Review of Artificial Intelligence Techniques used for Urban Automatic Incident Detection SystemsHireche Samia, Dennai Abdeslem. 281-286 [doi]
- Non-Stationary Car-Following Dynamics: Driving Simulator ExperimentsIhor Lubashevsky, Akihito Usui, Kaito Morimura. 287-291 [doi]
- Sub-word Embedding Auxiliary Encoding in Mongolian-Chinese Neural Machine TranslationTiangang Bai, Hongxu Hou, Yatu Ji. 292-296 [doi]
- Design and Implementation of Intelligent Ear Tag for Dairy Cows in FarmsLong Xia, Sun Chunxia, Tan Ming. 297-301 [doi]
- Responsive Motif Exploration Using Symmetry Dependency SyntaxXinwei Zhang, Jin Wang 0015, Yuxiao Zhang, Guodong Lu. 302-306 [doi]
- Wikidata based Location Entity LinkingFathima Shanaz, Roshan G. Ragel. 307-312 [doi]
- Stream-Monitoring AutomataHernan M. Palombo, Egor Dolzhenko, Jay Ligatti, Hao Zheng. 313-320 [doi]
- Development of a Parameterizable Process-Oriented Model for Freight Cost EstimationUwe Brunner, Christoph Hechtl, Vitaliy Mezhuyev. 321-325 [doi]
- An Improved Gas Efficient Library for Securing IoT Smart Contracts Against Arithmetic VulnerabilitiesJing Huey Khor, Mansur Aliyu Masama, Michail Sidorov, WeiChung Leong, JiaJun Lim. 326-330 [doi]
- PoCo: A Language for Specifying Obligation-Based Policy CompositionsDanielle Ferguson, Yan Albright, Daniel Lomsak, Tyler Hanks, Kevin Orr, Jay Ligatti. 331-338 [doi]
- A Comprehensive Investigation of Universal Verification Methodology (UVM) Standard for Design VerificationShumaila Qamar, Wasi Haider Butt, Muhammad Waseem Anwar, Farooque Azam, Muhammad Qasim Khan. 339-343 [doi]
- Design of An Automated Testing Tool for Typesetting of Reflowable DocumentsKuo Zuo, Ning Li, Yingai Tian, Xia Hou. 344-350 [doi]
- Combining Movement Model with Finger-Stroke Level Model Towards Designing a Security Enhancing Mobile Friendly CAPTCHAAhmed Iqbal Pritom, Mehrab Zaman Chowdhury, Joy Protim, Shanto Roy, Md Rashedur Rahman, Sadia Mehnaz Promi. 351-356 [doi]
- Static Code Analysis Using Refinement Types based on Design by ContractKoji Ishii, Shin-ya Nishizaki. 357-363 [doi]
- DDoSify: Server Workload Migration During DDOS Attack In NFVAman Kumar Singh, Raj K. Jaiswal. 364-369 [doi]