Abstract is missing.
- Tree-mapping Technique as a Computer System for Sustainable Forest ManagementYasmin Yahya, Roslan Ismail. 1-6 [doi]
- The Practice of Cloud-based Navigation System for Indoor RobotTran Trong Khanh, Tran Hoang Hai, Vandung Nguyen, Tri D. T. Nguyen, Ngo Thien Thu, Eui-nam Huh. 1-4 [doi]
- Effects on Concentration of Different E-Learner Resting Behaviors in Reponse to Communication Robot Actions During Break TimesYusuke Yasumura, Takashi Ito, Kenichi Takahashi, Tomoko Kajiyama. 1-5 [doi]
- Distributed Feature Extraction on Apache Spark for Human Action RecognitionNguyen Anh Tu, Thien Huynh-The, Kok Seng Wong, Dinh-Mao Bui, Young-Koo Lee. 1-6 [doi]
- A Review on Credibility Perception of Online InformationShafiza Mohd Shariff. 1-7 [doi]
- Adoption and Continuance Intention Model of Applying Telemedicine Technology in Digital Games AddictionAbdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Mohd Nizam Husen, Zalizah Awang Long, Nor Azlina Ali, Vickneshwaran A. L. Murugan. 1-9 [doi]
- Deep Learning for Tree Crown Detection In Tropical ForestZhafri Hariz Roslan, Zalizah Awang, Mohd Nizam Husen, Roslan Ismail, Robiah Hamzah. 1-7 [doi]
- Ensemble based Cost-Sensitive Feature Selection for Consolidated Knowledge Base CreationSyed Imran Ali, Sungyoung Lee. 1-7 [doi]
- *Liang Jung, Wen-Hung Liao, Yi-Chieh Wu. 1-5 [doi]
- Automatic Handgun and Knife Detection Algorithms: A ReviewArif Warsi, Munaisyah Abdullah, Mohd Nizam Husen, Muhammad Yahya. 1-9 [doi]
- Intimacy Between Actual Users and Virtual Agents: Interaction through "likes" and "comments"Jaeeun Shin, Sangwon Lee. 1-4 [doi]
- Communication MAC Protocol for Coexisting Wireless Devices and Backscatter TagsArshad Iqbal, Tae-Jin Lee. 1-6 [doi]
- Machine Learning in Indian Crop Classification of Temporal Multi-Spectral Satellite ImageRavali Koppaka, Teng-Sheng Moh. 1-8 [doi]
- A Study on I/O Performance in Highly Consolidated Container-Based Virtualized Environment on OverlayFS with Optimized SynchronizationNaoki Mizusawa, Yuya Seki, Jian Tao, Saneyasu Yamaguchi. 1-4 [doi]
- Development of the LoRaWAN-based Movement Tracking SystemJasrina Jaffar, Ahmad Faeez Abdul Malik, Megat Farez Azril Zuhairi, Aznida Abu Bakar Sajak, Mohd Taha Ismail. 1-6 [doi]
- Progressive Framework of Learning 3D Object Classes and Orientations from Deep Point Cloud RepresentationSukhan Lee, Wencan Cheng. 1-6 [doi]
- Comment Evaluation using Mutual Method, LSTM, Bootstrap and Co-occurrence word in Lecture QuestionnaireNobuyuki Kobayashi, Hiromitsu Shiina, Takafumi Ohtani. 1-7 [doi]
- A Vertex Matcher for Entity Resolution on GraphsMuhammad Sadiq, Syed Imran Ali, Muhammad Bilal Amin, Sungyoung Lee. 1-4 [doi]
- Tactics-Trend Analysis for Increasing the Possibility of Shooting in a Basketball MatchShu Yano, Kenji Matsuura, Hiroki Tanioka, Stephen Karungaru, Naoya Kohda, Naka Gotoda, Tomohito Wada. 1-4 [doi]
- Performance Comparison of Machine Learning Algorithms for Imbalanced Class Classification in Hydraulic SystemYohan Joo, Kyutae Kim, Jongpil Jeong. 1-8 [doi]
- Skill Training Support in Education/Learning FieldToyohide Watanabe. 1-8 [doi]
- VCPU Prioritization Interface for Improving the Performance of Latency-Critical TasksTae Hyung Lee, Young Ik Eom. 1-4 [doi]
- A Parallel Neural Network-based Scheme for Radar Emitter RecognitionHa Phan Khanh Nguyen, Van-Long Do, Quang Trung Dong. 1-8 [doi]
- Development of mobile markerless augmented reality for cardiovascular system in anatomy and physiology courses in physiotherapy educationNurul Shuhadah Rosni, Zahidah Abd Kadir, Megat Norulazmi Megat Mohamed Noor, Zaidatul Husna Abdul Rahman, Nurulain Abu Bakar. 1-5 [doi]
- No "Love" Lost: Defending Hate Speech Detection Models Against AdversariesMelody Moh, Teng-Sheng Moh, Brian Khieu. 1-6 [doi]
- An IPv6 Internet Accessing Architecture and Approach for Industrial Wireless NetworkMin Wei, Cheng Li, Caiqin Li. 1-6 [doi]
- User Cooperative Mobility with Optimal Node Selection for High Throughput in Multiple Ad-Hoc NetworksKousuke Okumura, Tutomu Murase. 1-7 [doi]
- Priority Policy in Multi-Queue Data Center Networks via per-Port ECN MarkingAkbar Majidi, Xiaofeng Gao, Nazila Jahanbakhsh, Jiaqi Zheng, Guihai Chen. 1-8 [doi]
- Intelligent Camera Using a Finite-State Machine (FSM)Woohyun Park. 1-9 [doi]
- Personalized Local Event Search Based on SNS Data AnalysisMiki Imai, Miki Enoki, Ruriko Kudo, Masato Oguchi. 1-9 [doi]
- Automatic Generation of Pictorial Maps from Photos on Social Media to Represent Regional FeaturesWentong Zhou, Taketoshi Ushiama. 1-5 [doi]
- Efficient Face Detection And Identification In Networked Video Surveillance SystemsMd. Nazmus Saadat, Hasibul Kabir, Zalizah Awang Long, Hannah Sofian, Megat Farez Azril Zuhairi. 1-9 [doi]
- A Study on Computation Offloading in MEC Systems using Whale Optimization AlgorithmLuan N. T. Huynh, Quoc-Viet Pham, Tri D. T. Nguyen, Md Delowar Hossain, Jae-Ho Park, Eui-nam Huh. 1-4 [doi]
- DNS Server Caching and Forwarding with Load BalanceNur Zaimah Ahmad, Megat F. Zuhairi, Hassan Dao, Eiad Yafi. 1-5 [doi]
- Control Plane Design for Failure Protection in Software Defined Service Function ChainsHaekwon Jeong, Syed M. Raza, Dung Tien Nguyen, Siwon Kim, Moonseong Kim, Hyunseung Choo. 1-6 [doi]
- Multi-Modal Component Embedding for Fake News DetectionSeongKu Kang, Junyoung Hwang, Hwanjo Yu. 1-6 [doi]
- Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech SignalAbdulAleem Al-Othmani, Azizah Abdul Manaf, Akram M. Zeki, Qusay Almaatouk, Abdulaziz Aborujilah, Maen T. Al-Rashdan. 1-6 [doi]
- PollO: Polling-aware On-demand Governor for Improving Power EfficiencySungwoo Lee, Yongju Song, Young Ik Eom. 1-4 [doi]
- Sex Classification of Salmon Using Convolutional Neural NetworkTakumi Kuramoto, Shuji Abe, Hiroaki Ishihata. 1-4 [doi]
- Enhancing the Adaptiveness of Gaussian Process Regression based on Power Spectral DensityDinh-Mao Bui, Nguyen Anh Tu, Kok Seng Wong. 1-6 [doi]
- A Farthest First Traversal based Sampling Algorithm for k-clusteringLe Hong Trang, Nguyen Le Hoang, Tran Khanh Dang. 1-6 [doi]
- Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin CryptosystemDongwoo Kang, Hakjun Lee, Dongho Won, Youngsook Lee. 1-8 [doi]
- Community Detection Framework based on Multi-Strengthening ApproachSuriana Ismail, Roslan Ismail. 1-4 [doi]
- Investigating Real-Time Entropy Features of DDoS Attack Based on Categorized Partial-FlowsHamidreza Lotfalizadeh, Dongsoo S. Kim. 1-6 [doi]
- Detecting Security Breaches in Personal Data Protection with Machine LearningChu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin. 1-7 [doi]
- Next Point-of-Attachment Selection Based on Long Short Term Memory Model in Wireless NetworksHuigyu Yang, Syed M. Raza, Moonseong Kim, Duc Tai Le, Van Vi Vo, Hyunseung Choo. 1-4 [doi]
- Information Systems Outsourcing Success- A Perspective of Information Processing TheoryYing-Chieh Liu, Yu-An Huang. 1-3 [doi]
- Using Deep Learning to Solve Google reCAPTCHA v2's Image ChallengesDylan Wang, Melody Moh, Teng-Sheng Moh. 1-5 [doi]
- A Secure Platform for IoT Devices based on ARM Platform Security ArchitectureJunyoung Jung, Jinsung Cho, Ben Lee. 1-4 [doi]
- Emergency Evacuation AssistanceJohn Lee, Dan Koo, Dinaol Tadesse, Atharv Jain, Sushmitha Shettar, Dongsoo Kim. 1-6 [doi]
- Performance Enhancement of GPU Parallel Computing Using Memory Allocation OptimizationChu-Hsing Lin, Jung-Chun Liu, Po-Kai Yang. 1-5 [doi]
- Intelligent Reflecting Surface-aided Phase-Shift Backscatter CommunicationSung Yon Park, Dong In Kim. 1-5 [doi]
- Some New Ideas About Obtaining and Estimating Reliability Polynomial of a Random GraphAlexey S. Rodionov. 1-5 [doi]
- A Novel Approach to Music Genre Classification using Natural Language Processing and SparkSharan Duggirala, Teng-Sheng Moh. 1-8 [doi]
- Multi-Beam Connection Request Transmission Scheme for 5G Initial AccessYijun Piao, Yunmin Kim, Tae-Jin Lee. 1-4 [doi]
- Towards Making Regional Issues of Marine Resources a Teaching and Learning MaterialNoriyuki Iwane, Mitsuaki Yamaguchi. 1-4 [doi]
- Network Prediction with Traffic Gradient Classification using Convolutional Neural NetworksTaejin Ko, Syed M. Raza, Thien-Binh Dang, Moonseong Kim, Hyunseung Choo. 1-4 [doi]
- Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things EnvironmentJihyeon Ryu, Hyoungshick Kim, Youngsook Lee, Dongho Won. 1-4 [doi]
- 3D Action Recognition Exploiting Hierarchical Deep Feature Fusion ModelThien Huynh-The, Cam-Hao Hua, Nguyen Anh Tu, Jae-Woo Kim, Seung-Hwan Kim 0003, Dong Seong Kim. 1-3 [doi]
- Visualization of Texture Expressions for Recipes by Using ReviewsKento Shigyo, Hidenari Kiyomitsu, Kazuhiro Ohtsuki. 1-4 [doi]
- Mobile Marker-based Augmented Reality Coloring Sheets Development for Dengue AwarenessZahidah Abd Kadir, Nurul Shuhadah Rosni, Bazilah A. Talip, Mohd Amin Che Mohd Shabri. 1-5 [doi]
- Quantum-resistant Lattice-based Authentication for V2X Communication in C-ITSSewan Ha, Hakjun Lee, Dongho Won, Youngsook Lee. 1-8 [doi]
- Research on the traffic type recognition technique for advanced network control using FloodlightSangwon Kim, Thummim Lee, Keecheon Kim. 1-6 [doi]
- Enterprise Architecture for Healthcare Information Exchange (HIE) Cloud MigrationKofi Osei-Tutu, Yeong-Tae Song. 1-8 [doi]
- Evaluation of Improved Botanical Search Application for Elementary School StudentsTomoko Kajiyama. 1-5 [doi]
- Convolutional Network with Densely Backward Attention for Facial Expression RecognitionCam-Hao Hua, Thien Huynh-The, Hyunseok Seo, Sungyoung Lee. 1-6 [doi]
- Country Selection on Web Forms: A Comparison of Dropdown Menus, Radio Buttons and Text Field with AutocompleteEmil Thorstensen Jensen, Martin Hansen, Evelyn Eika, Frode Eika Sandnes. 1-4 [doi]