Abstract is missing.
- The overview of software and information support services for distance learningSergey Kratov, Alexey Podsadnikov. 1-6 [doi]
- Performance Analyzing System Based on Visualization of Packet Transfers and Method Calls on Object Storage SystemMakoto Nakagami, Shunpei Hayakawa, Saneyasu Yamaguchi. 1-5 [doi]
- More Complex More Productive: Characterizing Top Universities Based on Research PublicationsJiaxing Li, Luna Wang, Yiming Sun, Guojiang Shen, Ivan Lee, Xiangjie Kong. 1-7 [doi]
- FTTH Zero-Touch Multi-Service Provisioning on CORD-Based Access Network Virtualization PlatformTri Trinh, Nguyen Viet Bang, Manabu Yoshino, Hiro Suzuki, Nguyen Huu Thanh 0001. 1-7 [doi]
- Real-time scene-based nonuniformity correction using feature pattern matchingSeongGyo Seo, Jaewook Jeon. 1-6 [doi]
- Dual Approach to Handling Imbalanced Class in Datasets Using Oversampling and Ensemble Learning TechniquesYoga Pristyanto, Anggit Ferdita Nugraha, Irfan Pratama, Akhmad Dahlan, Lucky Adhikrisna Wirasakti. 1-7 [doi]
- Intermediate Data Format for the Elastic Data Conversion FrameworkTran Khanh Dang, Manh Huy Ta, Nguyen Le Hoang. 1-5 [doi]
- Non-Invertibility for Random Projection based Biometric Template Protection SchemeThi Ai Thao Nguyen, Tran Khanh Dang, Dinh Thanh Nguyen. 1-8 [doi]
- Automatic Event Extraction method for Analyzing Text Narrative StructureHye-Yeon Yu, Moon-Hyun Kim. 1-4 [doi]
- AnoGAN-Based Anomaly Filtering for Intelligent Edge Device in Smart FactoryDonghyun Kim, Jaegyeong Cha, Seokju Oh, Jongpil Jeong. 1-6 [doi]
- Developing a Ophthalmic Chatbot SystemJung Hoon Lee, Min-Su Jeong, Jin-Uk Cho, Hyun-Kyu Jeon, Jong-Hyeok Park, Kyoung-Deok Shin, Su Jeong Song, Yun-Gyung Cheong. 1-7 [doi]
- Behavioral Issues of Children in Terms of Internet Usages Time in BangladeshNabila Ahmad, Tasnia Sharmin, Jesmin Akter, Rashedul Amin Tuhin, Amit Kumar Das. 1-6 [doi]
- A Cluster Analysis of Lotte Young Plaza Using Semantic Network Analysis MethodShaoPeng Che, Dongyan Nan, Pim Kamphuis, Xinvu Jin, Jang-Hyun Kim. 1-6 [doi]
- Development of Robotic Sorting System for Small Parts Using SCARA RobotKyu Man Shin, Dong Min Lee, Jae Wook Jeon. 1-6 [doi]
- Examining a Covid-19 Twitter Hashtag Conversation in Indonesia: A Social Network Analysis ApproachStevanus Wisnu Wiiava, Indria Handoko. 1-6 [doi]
- Transparent Data Dealing: Hyperledger Fabric Based Biomedical Engineering Supply ChainMd. Ratul Amin, Megat Farez Azril Zuhairi, Md. Nazmus Saadat. 1-5 [doi]
- Chinese Triple Extraction Based on BERT ModelWeidong Deng, Yun Liu. 1-5 [doi]
- EnvBERT: Multi-Label Text Classification for Imbalanced, Noisy Environmental News DataDohyung Kim, Jahwan Koo, Ung-Mo Kim. 1-8 [doi]
- Community Search in a Multi-Attributed Graph using Collaborative Similarity Measure and Node FilteringNaveed Javaid, Kifayat-Ullah Khan, Asad Masood Khattak, Waqas Nawaz. 1-8 [doi]
- A Feature Selection Based DNN for Intrusion Detection SystemLi-Hua Li, Ramli Ahmad, Wen-Chung Tsai, Alok Kumar Sharma. 1-8 [doi]
- A Byzantine Fault-Tolerant Raft Algorithm Combined with Schnorr SignatureSihan Tian, Yun Liu, Yansong Zhang, Yingsi Zhao. 1-5 [doi]
- On Modeling Air Pollution Detection With Internet of VehiclesVladimir V. Shakhov, Olga Sokolova. 1-3 [doi]
- TSS-Net: Time-based Semantic Segmentation Neural Network for Road Scene UnderstandingTin Trung Duong, Huy Hung Nguyen, Jae Wook Jeon. 1-7 [doi]
- Deep Learning-Aided 5G Channel EstimationAn Le Ha, Trinh Van Chien, Tien-Hoa Nguyen, Wan Choi, Van-Duc Nguyen. 1-7 [doi]
- Generative Adversarial Networks for Retinal Image Enhancement with Pathological InformationQuang T. M. Pham, Jitae Shin. 1-4 [doi]
- Machine Learning for Prediction of Imbalanced Data: Credit Fraud DetectionThanh Cong Tran, Tran Khanh Dang. 1-7 [doi]
- Bangla Handwritten Word Recognition System Using Convolutional Neural NetworkMd. Tanvir Hossain, Md. Wahid Hasan, Amit Kumar Das. 1-8 [doi]
- Eff-YNet: A Dual Task Network for DeepFake Detection and SegmentationEric Tjon, Melody Moh, Teng-Sheng Moh. 1-8 [doi]
- A novel translation estimation for essential matrix based stereo visual odometryHuu Hung Nguyen, The-Tien Nguyen, Cong Manh Tran, Kim-Phuong Phung, Quang Thi Nguyen. 1-6 [doi]
- Authentication and Trustful Communication Protocol for IoT DevicesSeiya Kobayashi, Toshiaki Miyazaki. 1-4 [doi]
- Computers as Social Actors? Examining How Users Perceive and Interact with Virtual Influencers on Social MediaGyeongbin Park, Dongyan Nan, Eunil Park, Ki Joon Kim, Jinyoung Han, Angel P. Del Pobil. 1-6 [doi]
- CbI-M: Context-based Intervention Methodology for Rehabilitation of Persons with NCDsHafiz Syed Muhammad Bilal, Usman Akhtar, Asim Abbas 0001, Muhammad Asif Razzaq, Ubaid Ur Rehman, Jamil Hussain, Sun-Moo Kang, Sungyoung Lee, Seong-Bae Park. 1-5 [doi]
- Skipping Skippable Ads on YouTube: How, When, Why and Why Not?Snehasish Banerjee, Anjan Pal. 1-5 [doi]
- A Predictive ECMP Routing Protocol for Fat-Tree Enabled Data Centre NetworksEdward Nepolo, Guy-Alain Lusilao-Zodi. 1-8 [doi]
- Learning for Free: Object Detectors Trained on Synthetic DataCharles Thane MacKay, Teng-Sheng Moh. 1-8 [doi]
- Investigating Network Performance of a Multi-user Virtual Reality Environment for Mining EducationAndreas Lindblom, Teemu H. Laine, Henrique Souza Rossi. 1-8 [doi]
- Predicting who will benefit from relaxation or stress reduction through virtual realityHyewon Kim, Hong Jin Jeon. 1-5 [doi]
- Crowd Worker Selection with Wide Learning and Narrow EvaluationJeon-Pyo Hong, Yoon-Yeol Lee, Jahwan Koo, Ung-Mo Kim. 1-4 [doi]
- Time-Series Data Regression Modeling Method for Efficient Operation of Virtual EnvironmentsYuriko Takahashi, Shigeto Suzuki, Takuji Yamamoto, Hiroyuki Fukuda, Masato Oguchi. 1-6 [doi]
- Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing InfrastructureHakjun Lee, Jihyeon Ryu, Youngsook Lee, Dongho Won. 1-4 [doi]
- Method for Product Selection Support Based on Reliability of Features in ReviewsSiqian Yu, Taketoshi Ushiama. 1-5 [doi]
- Water Leakage Detection based on Automatic Meter ReadingFuead Ali, Mohamad Firdaus Hafifi Saidi. 1-7 [doi]
- A Cross-Cultural Comparative Study on the Startup Discourse in 2000-2019 between United States and ChinaJaeyeon Jang, Byungjun Kim, Kveo Re Lee, Jang-Hyun Kim. 1-5 [doi]
- Agreeableness of a Virtual Agent: Effects of Reciprocity and Need for HelpJieun Kim, Young June Sah, Hayeon Song. 1-6 [doi]
- Analysis of User-Generated Comments on Rumor Correction YouTube VideosGilang Maulana Majid, Anjan Pal, Siska Premida Wardani, Snehasish Banerjee. 1-5 [doi]
- Differential Privacy using Fuzzy Convolution Neural Network (DP-FCNN) with Laplace Mechanism and Authenticated Access in Edge ComputingJhilakshi Sharma, Donghyun Kim 0001, Ahyoung Lee, Daehee Seo. 1-5 [doi]
- An Efficient Scheme for the Generation of Ordered Trees in Constant Amortized TimeVictor Parque, Tomoyuki Miyashita. 1-8 [doi]
- Dynamic Multi Level Approach for Community DetectionSuriana Ismail, Roslan Ismail. 1-5 [doi]
- Individual Tree Crown Detection using GAN and RetinaNet on Tropical ForestZhafri Hariz Roslan, Zalizah Awang Long, Roslan Ismail. 1-7 [doi]
- Scientific Collaboration Analytics based on Multi-Player Game TheoryNakema Deonauth, Xiangtai Chen, MingChu Li. 1-4 [doi]
- A Frequency Estimation Algorithm under Local Differential PrivacyDesong Qin, Zhenjiang Zhang. 1-5 [doi]
- Research Issues & State of the Art Challenges in Event DetectionMd. Nazmus Saadat, Hasibul Kabir, Muhammad Shuaib, Rasheed Mohammad Nassr, Mohd Nizam Husen, Husna Osman. 1-18 [doi]
- User Stress Modeling through Galvanic Skin ResponseFahad Ahmed Satti, Musarrat Hussain, Jamil Hussain, Tae-Seong Kim, Sungyoung Lee, TaeChoong Chung. 1-6 [doi]
- A Reconcile of Density Based and Hierarchical Clustering Based on the Laws of PhysicsNader Bazyari, Hedieh Sajedi. 1-8 [doi]
- On a Partially Verifiable Multi-party Multi-argument Zero-knowledge ProofHoil Ryu, Dongwoo Kang, Dongho Won. 1-8 [doi]
- Enhanced Random Access with Beamforming Techniques in 5G NetworksJun-Woo Won, Kyoung Min Kim, Tae-Jin Lee. 1-4 [doi]
- Brain Age Estimation based on Brain MRI by an Ensemble of Deep NetworksZahra Jahanshiri, Mohammad Saniee Abadeh, Hedieh Sajedi. 1-6 [doi]
- Writing Reprogramming Data from RAM to Flash Memory Using Multicore Electronic Control UnitsDo Yeon Kim, Jun Young Moon, Jae Wook Jeon. 1-4 [doi]
- An Energy Management System with Edge Computing for Industrial FacilityMin Wei, Caiqin Li, Xu Yang. 1-7 [doi]
- Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic ApproachMd. Delowar Hossain, Tangina Sultana, Md. Alamgir Hossain, Eui-nam Huh. 1-7 [doi]
- Method for Changing Users' Attitudes Towards Fashion Styling by Showing Evaluations After Coordinate SelectionYuichi Chiken, Daisuke Kitayama. 1-7 [doi]
- A Geographical Object Extraction Method Using User's Trajectories for Generating Artificial MapsKoki Ohtsuka, Daisuke Kitayama, Kazutoshi Sumiya, Kazushi Fujita, Goto Shin, Munemasa Isshu. 1-5 [doi]
- Evolutionary Algorithms and Efficient Data Analytics for Image ProcessingFarid Ghareh Mohammadi, Farzan Shenavarmasouleh, M. Hadi Amini, Hamid R. Arabnia. 1-8 [doi]
- Time Series Prediction Based on Recursive Update Gaussian Kernel Function NetworksKyu Min Yoo, Rhee Man Kil, Hee Yong Youn. 1-6 [doi]
- Tactile-Color System for Accessibility of Color Education: 2.5D UV Printed Supplementary Material for Visually Impaired StudentsJaeeun Shin, Jundong Cho, Sangwon Lee. 1-7 [doi]
- Stabilization of Floor Projection Image with Soft Unmanned Aerial Vehicle ProjectorJoonhyung Lee, Byeunzwoo Jeon, Seung-hwan Song, Hyouk Ryeol Choi. 1-5 [doi]
- Comparing the Impact of Service Quality on Customers' Repurchase Intentions Based on Statistical Methods and Artificial Intelligence-Taking an Automotive Aftermarket (AM) Parts Sales Company as an ExampleLi-Hua Li, Chang-Yu Lai. 1-8 [doi]
- Document Embedding using piped ELM-GAN ModelArefeh Yavary, Hedieh Sajedi. 1-4 [doi]
- Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic ThresholdingTao Wang, Yaokai Feng, Kouichi Sakurai. 1-7 [doi]
- Face Detection using Local Patterns in FPGAJin Young Byun, Jae Wook Jeon. 1-2 [doi]
- Design of Miniaturized On-chip SIW Cavity Filter and Diplexer in 65nm CMOS ProcessAmir Altaf, Waseem Abbas, Munkyo Seo. 1-4 [doi]
- Accurate RUL Prediction Based on Sliding Window with Sparse SamplingChanghoon Song, Sukhan Lee. 1-5 [doi]
- Online State of Health Estimation of Batteries under Varying Discharging Current Based on a Long Short Term MemoryAreum Kim, Sukhan Lee. 1-6 [doi]
- Smart Manufacturing Scheduling System: DQN based on Cooperative Edge ComputingJunhyung Moon, Jongpil Jeong. 1-8 [doi]
- Utilizing CNNs for Object Detection with LiDAR Data for Autonomous DrivingVinay Ponnaganti, Melody Moh, Teng-Sheng Moh. 1-6 [doi]
- Recommendation System with Reasoning Path Based on DQN and Knowledge GraphWenyi Xu, Xiaofeng Gao, Yin Sheng, Guihai Chen. 1-8 [doi]
- The Analysis of Web Search Snippets Displaying User's KnowledgeJumpei Yamada, Daisuke Kitayama. 1-8 [doi]
- Activity With Gender Recognition Using Accelerometer and GyroscopeAhmed Sharshar, Ahmed Fayez, Yasser Ashraf, Walid Gomaa. 1-7 [doi]
- Redundancy method to solve CAN-FD bus line breakage problemYoung Soo Do, Chang Young Jo, Jae Wook Jeon. 1-6 [doi]
- Lightweight Deep Extraction Networks for Single Image De-rainingYunseon Jang, Chang-Hwan Son, Hyunseung Choo. 1-4 [doi]
- Natural Sciences Meet Social Sciences: Census Data Analytics for Detecting Home Language ShiftsChristian M. Choy, M. Kiefer Co, Matthew J. Fogel, Clarke D. Garrioch, Carson K. Leung, Ekaterina Martchenko. 1-8 [doi]
- Hierarchical Cooperative Intrusion Detection Method for MANETs (HCIDM)Teresia Ankome, Guy-Alain Lusilao-Zodi. 1-7 [doi]
- UAV-aided Sensory Data Aggregation: Incremental Clustering and Scheduling ApproachTien-Dung Nguyen 0004, Duc Tai Le, Nguyen Pham-Van, Hyunseung Choo, Tien Pham Van. 1-5 [doi]
- Search Method of Number of Trees for Genetic Programming with Multiple TreesTakashi Ito. 1-6 [doi]
- Generalizing and Processing Topological Data using Sentence Data StructureSan Kim, Eunjung Joo, Jusung Ha, Jaekwang Kim. 1-4 [doi]
- Viewpoint of Class Subject and Classroom Space on Face-to-face Course and Online CourseToyohide Watanabe. 1-8 [doi]
- Inter-dependent LSTM: Baseball Game Prediction with Starting and Finishing LineupsSungjin Chun, Chang-Hwan Son, Hyunseung Choo. 1-4 [doi]
- BCGAN: Facial Expression Synthesis by Bottleneck-Layered Conditional Generative Adversarial NetworksYeji Shin, Junghyun Bum, Chang-Hwan Son, Hyunseung Choo. 1-4 [doi]
- A quantitative analysis of satisfaction on Airbnb from UX perspectives: The comparison between the United States and Hong KongKunwoo Bae, Yeonju Jang, Jinyoung Han, Angel P. Del Pobil, Eunil Park. 1-4 [doi]
- Big Data Analytics for Prediction Modelling in Healthcare DatabasesRitu Chauhan, Eiad Yafi. 1-5 [doi]
- Manipulating Retinal OCT data for Image Segmentation based on Encoder-Decoder NetworkMingue Song, Yanggon Kim. 1-7 [doi]
- Reduction of Data Dimensions in The PLA ProcessNurmalitasari, Zalizah Awana Long, Mohammad Faizuddin Mohd Noor. 1-8 [doi]