Abstract is missing.
- An Approach for Predicting Disease Outbreaks Using Fuzzy Inference among Physiological VariablesEunji Lee, Chang Choi, Minchang Lee, Kunseok Oh, PanKoo Kim. 1-4 [doi]
- Image-Based Plant Recognition by Fusion of Multimodal InformationJen-Chang Liu, Chieh-Yu Chiang, Sam Chen. 5-11 [doi]
- Mining Crowdsourcing Photos for Recognizing Landmark AreasYi-Hau Liu, Shian-Hua Lin, Chun-Ku Lai, Chun-Che Huang, Cheng-Yu Lu. 12-19 [doi]
- Component Extraction from Handwritten Chinese Characters for Font Synthesis in Personal Style Using Smartphone APPChen-Ying Hsieh, Jeng-Wei Lin. 20-25 [doi]
- A Particle Filter Approach for Pedestrian Dead Reckoning Using Wearable SensorsYi-Lin Hsu, Yan-Ju Chen, Sheng-Wen Shih. 26-32 [doi]
- Performance Analysis of Amplify and Forward Technique in Region Based Cooperative Routing for Underwater Wireless Sensor NetworksSheraz Hussain, Nadeem Javaid, Muhammad, Israr Ahmad, Umar Qasim, Zahoor Ali Khan. 33-41 [doi]
- A QoS-aware Actor Node Selection System for Wireless Sensor and Actor Networks Using Fuzzy LogicDonald Elmazi, Shinji Sakamoto, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 42-48 [doi]
- AVN-AHH-VBF: Avoiding Void Node with Adaptive Hop-by-Hop Vector Based Forwarding for Underwater Wireless Sensor NetworksTaimur Hafeez, Nadeem Javaid, Ahmad Raza Hameed, Arshad Sher, Zahoor Ali Khan, Umar Qasim. 49-56 [doi]
- Geographic and Opportunistic Clustering for Underwater WSNsSyed Zarar, Nadeem Javaid, Arshad Sher, Ahmad Raza Hameed, Zahoor Ali Khan, Umar Qasim. 57-62 [doi]
- Multi-sensor Based Low Power Sensing Model for Inferencing Location ContextDeok-Ki Kim, Jae-Hyeon Park, Jung-Won Lee. 63-69 [doi]
- Enhanced Energy Efficient Depth Based Routing Protocol for Underwater WSNsMalik Khizar, Abdul Wahid, Khayyam Pervaiz, Mahin Sajid, Umar Qasim, Zahoor Ali Khan, Nadeem Javaid. 70-77 [doi]
- DRADS: Depth and Reliability Aware Delay Sensitive Routing Protocol for Underwater WSNsUsman Shakeel, Naeem Jan, Khizar, Umar Qasim, Zahoor Ali Khan, Nadeem Javaid. 78-83 [doi]
- Anomaly Detection Model Based on Hadoop Platform and Weka InterfaceBaojiang Cui, Shanshan He. 84-89 [doi]
- An Emergency Communication System Based on UAV-assisted Self-Organizing NetworkTian-han Gao, Fan Lang, Nan Guo. 90-95 [doi]
- Dynamic Taint Tracking of Web Application Based on Static Code AnalysisJingling Zhao, Junxin Qi, Liang Zhou, Baojiang Cui. 96-101 [doi]
- A Security Risk Assessment Framework for Smart CarHee-Kyung Kong, Tae Sung Kim, Myoung-Ki Hong. 102-108 [doi]
- Understanding Factors Affecting Information Security Practice of Elementary School StudentsSeung-Jae Choi, Tae Sung Kim. 109-113 [doi]
- Achieving Virtualization Trustworthiness Using Software MechanismsFrancois Serman, Michaƫl Hauspie. 114-119 [doi]
- Proposal of a Virtual Traditional Japanese Crafting Presentation System Mobile EditionMisaki Iyobe, Tomoyuki Ishida, Akihiro Miyakawa, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata. 120-125 [doi]
- Template-Driven Medical Imaging Information Providing Process Using Semantic Relations Targeting Acute Myocardial InfarctionYe-seul Park, Meeyeon Lee, Jung-Won Lee. 126-132 [doi]
- Implementation of Voice Guidance Function for Sightseeing Contents Using Web Speech APIKaoru Sugita, Masao Yokota. 133-138 [doi]
- Feedback of Laughter by Detecting Variation in Respiration Amplitude for Augmenting LaughterMakoto Fukumto, Ryoichi Nagamatsu. 139-142 [doi]
- Improvement of Group Discussion System for Active Learning Using SmartphoneNoriyasu Yamamoto. 143-148 [doi]
- Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic InstrumentationLiang Zhou, Siran Fu, Tao Guo, Lifang Han, Baojiang Cui. 149-153 [doi]
- Automatic Synthesis of Best Practices for Energy ConsumptionsMatteo Cristani, Francesco Olivieri, Claudio Tomazzoli. 154-161 [doi]
- Design and Evaluation of Algorithms to Energy-Efficiently Select Servers for Storage and Computation ProcessesAtsuhiro Sawada, Hiroki Kataoka, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 162-169 [doi]
- MobiL-AUV: AUV-Aided Localization Scheme for Underwater Wireless Sensor NetworksHammad Maqsood, Nadeem Javaid, Aqeb Yahya, Babar Ali, Zahoor Ali Khan, Umar Qasim. 170-175 [doi]
- Bandwidth Estimation Based on MACD for DASHVan-Huy Vu, Tein-Yaw Chung. 176-181 [doi]
- Performance Analysis of a Genetic Algorithm Based System for Wireless Mesh Networks Considering Weibull Distribution, DCF and EDCAAdmir Barolli, Tetsuya Oda, Ilir Shinko, Leonard Barolli, Fatos Xhafa, Makoto Takizawa. 182-188 [doi]
- A Vegetable Category Recognition System Using Deep Neural NetworkYuki Sakai, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 189-192 [doi]
- Rule-Based Action Recognition: Performance Comparison between Lua and GDL Script LanguageTomasz Hachaj, Marek R. Ogiela. 193-197 [doi]
- Efficiency of Strategic Data Sharing and Management ProtocolsLidia Ogiela, Marek R. Ogiela, Urszula Ogiela. 198-201 [doi]
- A New Multiple Label Propagation Algorithm for Linked Open DataToshitaka Maki, Kazuki Takahashi, Toshihiko Wakahara, Akihiro Yamaguchi, Yu Ichifuji, Noboru Sonehara. 202-208 [doi]
- Adaptive Array Antenna Control Methods on Delay Tolerant Networks for Road Surveillance SystemsNoriki Uchida, Kenta Ito, Go Hirakawa, Yoshitaka Shibata. 209-214 [doi]
- Energy-Aware Analysis of Synchronizing a Groupware CalendarFatos Xhafa, Daniel Palou, Leonard Barolli, Makoto Takizawa. 215-222 [doi]
- Improvement of Large Data Acquisition Method without the Interference on the CPU Load for Automotive Software TestingJong-Hwan Shin, Ki Yong Choi, Jeong-Woo Lee, Jung-Won Lee. 223-230 [doi]
- HRB: A New MAC Level 2-Hop Broadcast Protocol with Directional ReceivingTetsuro Kuniyasu, Tetuya Shigeyasu. 231-236 [doi]
- An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic NetworksKhuram Khalid, Isaac Woungang, Sanjay Kumar Dhurandher, Leonard Barolli, Glaucio H. S. Carvalho, Makoto Takizawa. 237-244 [doi]
- An Intra-Cluster CoMP Based Sleep-Mode Scheme in Dense Heterogeneous NetworkDa Li, Wenan Zhou, Xuhui Yang, Haitao Du. 245-249 [doi]
- Hybrid Routing Scheme Combining with Geo-Routing and DTN in VANETFumiaki Sato, Ryohei Kikuchi. 250-255 [doi]
- Cooperative Load Balancing in OFDMA Small Cell NetworksTianrun Gao, Gaofeng Nie, Chenshan Ren, Hui Tian. 256-260 [doi]
- On Timing of Handoff Decision Making on Heterogeneous Wireless NetworksTein-Yaw Chung, Fong-Ching Yuan, Hsun-Fu Liu. 261-266 [doi]
- Assessing Driving Behavior in Public Transportation through Mobile Crowd Sensing: A Concept Proposal for Macau Public Transportation SystemFei Chun Ma, Sok HĆ”n TĆ³ng, JoĆ£o Cordeiro. 267-271 [doi]
- A Scalable SDN-EPC Architecture Based on OpenFlow-Enabled Switches to Support Inter-domain HandoverEl Bouatmani Hamza, Shigetomo Kimura. 272-277 [doi]
- Improving Energy Consumption of Epidemic Routing in Delay Tolerant NetworksBhed Bahadur Bista. 278-283 [doi]
- Improved HydroCast: A Technique for Reliable Pressure Based Routing for Underwater WSNsMuhammad, Nadeem Javaid, Babar Ali, Aqeb Yahya, Zahoor Ali Khan, Umar Qasim. 284-290 [doi]
- An Improved Algorithm of PrefixspanPengfei Li, Songling Shan. 291-294 [doi]
- Research on the Identification of Software Behavior in Anomaly DetectionJun Yang, Xiangping Du, Liang Zhou, Songling Shan, Baojiang Cui. 295-298 [doi]
- Research on the Vulnerability Predicting Analysis Model for Binary ExecutablesXiaobing Liang, Bing Zhao, Rui Wang, Ying Liu. 299-304 [doi]
- The Performance Optimization of Hadoop during Mining Online Education Packets for Malware DetectionXuan Tian, Baojiang Cui, Jiangdong Deng, Jun Yang. 305-309 [doi]
- The Scheme of Detecting Encoded Malicious Web Pages Based on Information EntropyShuang Liang, Yong Ma, Yanyu Huang, Jia Guo, Chunfu Jia. 310-312 [doi]
- The Approach to Detect Abnormal Access Behavior Based on Naive Bayes AlgorithmYong Ma, Shuang Liang, Xuan Chen, Chunfu Jia. 313-315 [doi]
- Plug-and-Play Transducers in Cyber-Physical Systems for Device-Driven ApplicationsBorja Bordel SĆ”nchez, Diego SĆ”nchez de Rivera, RamĆ³n Alcarria. 316-321 [doi]
- Emergency Population Warning about Floods by Social MediaMiguel A. Wister, JosƩ AdƔn HernƔndez-Nolasco, Pablo Pancardo, Francisco D. Acosta, Antonio Jara. 322-327 [doi]
- Appliance Scheduling for Energy Management with User PreferencesNusrat Shaheen, Nadeem Javaid, Najmun Nisa, Amber Madeeha Zeb, Zahoor Ali Khan, Umar Qasim. 328-334 [doi]
- Performance Evaluation of an IoT-based e-Learning Testbed Considering OLSR and WEP ProtocolsMasafumi Yamada, Tetsuya Oda, Yi Liu, Masahiro Hiyama, Keita Matsuo, Leonard Barolli. 335-341 [doi]
- Optimal Scheduling in Smart Homes with Energy Storage Using Appliances' Super-ClusteringSakeena Javaid, Nadeem Javaid, Muhammad Shoaib Javaid, Sehrish Javaid, Umar Qasim, Zahoor Ali Khan. 342-348 [doi]
- The Expert System of Locomotive Running Gear Based on Sematic NetworkJie Tao, Yilun Liu, Yiping Wen, Jiahui Su. 349-354 [doi]
- Access Authentication Schemes for PMIPV6: A SurveyTian-han Gao, Nan Guo, Fanghua Geng, Xinyang Deng. 355-360 [doi]
- A New Laboratory Assignment Support System for Undergraduate StudentsKazuki Takahashi, Toshitaka Maki, Toshihiko Wakahara. 361-366 [doi]
- Wireless Remote Patient Monitoring System: Effects of InterferenceAndrew Yearp, David Newell, Philip Davies, Russell Wade, Reza Sahandi. 367-370 [doi]
- A Collaborative Safety Flight Control System for Multiple DronesTomoki Okutake, Noriki Uchida, Noriyasu Yamamoto. 371-375 [doi]
- Skyline Query Processing System for Taiwan MapsTzu-Hsien Wang, Yuan-Ko Huang, Chiang Lee. 376-380 [doi]
- Authentication for Mobile Open IPTV Service SecurityJiyoung Lim, Inshil Doh, Kijoon Chae. 381-385 [doi]
- A Group Authentication Scheme Based on Lagrange Interpolation PolynomialShi Li, Inshil Doh, Kijoon Chae. 386-391 [doi]
- Study on the Sustainable Migration to Software Defined Network for Nation-Wide R&E NetworkHyoungwoo Park, I. L. Sun Hwang, Jongsuk Ruth Lee. 392-396 [doi]
- EDISON Nanophysics: Web-Based e-Learning Platform for Education and Research in NanoscienceInho Jeon, Chan-Ho Choi, Jerry H. Seo, Youngsik Joe, Kumwon Cho, Hoon Ryu. 397-402 [doi]
- Analysis and Detection of Anomalous Network TrafficHae-Duck Joshua Jeong, Hyeonggeun Kim, WonHwi Ahn, Jung-Hee Oh, Dawoon Lee, Sang-Kug Ye, Jongsuk Ruth Lee. 403-408 [doi]
- Health Service Knowledge Management to Support Medical Group Decision MakingHyun Jung Lee, Mye M. Sohn. 409-414 [doi]
- A Wireless Body Sensor Network and Its Applications: Rehearsal with a SmartphoneWooSeok Hyun, Ilsun You, JoungSoon Jang, Fang-Yie Leu. 415-418 [doi]
- Modified Active Shape Model for Realtime Facial Feature Tracking on iPhoneYong-Hwan Lee, YoungSeop Kim, Heung-Jun Kim, In-Kyoung Shin, Hyochang Ahn, Yukyong Lee. 419-421 [doi]
- Efficient Image Retrieval Using Image and Audio Features in Video StreamIn-Kyoung Shin, Hyochang Ahn, Yong-Hwan Lee. 422-424 [doi]
- On the Robust Approach to Data Inconsistency Detection of Sensor NetworksTzu-Liang Kung, Chun-Nan Hung, Yuan-Hsiang Teng, Jui-Yu Hung, Lih-Hsing Hsu. 425-429 [doi]
- A Framework of Cycle-Based Clustering on the Crossed Cube ArchitectureTzu-Liang Kung, Chun-Nan Hung, Cheng-Kuan Lin, Hsiang-Chun Chen, Chia-Hui Lin, Lih-Hsing Hsu. 430-434 [doi]
- Identification of Negative Comments on Internet ForumsJung-Kuei Chang, Wei-Yun Hsu, Te-Chan Chen, Hui-Huang Hsu. 435-439 [doi]
- Security Awareness Investigation for Mobile User Examined by Using Association Rule Mining MethodHsing-Chung Chen, Pei-Chi Yeh, Ze-Min Lin, Qiu-Hua Ruan. 440-445 [doi]
- Intelligent Management Model Based on CBR-SDA Approach - An Example of Smart Life Recommendation System for Choosing Clothes and AccessoriesHsing-Chung Chen, Qiu-Hua Ruan, Pei-Chi Yeh, Ze-Min Lin. 446-451 [doi]
- Identifying Variable-Power Appliances in Non-intrusive Load Monitoring SystemsHung-Yuan Chen, Yao-Chung Fan, Chien-Liang Lai, Huan Chen. 452-457 [doi]
- Finite State Machine Based Real Time Scheduling for MicrochipFang-Yie Leu, Yi-Ting Hsiao. 458-463 [doi]
- A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and QualitySen-Tarng Lai, Fang-Yie Leu. 464-469 [doi]
- A Secure and High Performance Wireless Sensor Network Based on Symmetric Key MatrixYi-Li Huang, Fang-Yie Leu, Po-Hao Su, Ti-Hsun Sung, Sin-Cheng Liu. 470-475 [doi]
- Cloud Encryption Using Distributed Environmental KeysKun-Lin Tsai, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, Guan-Chi Lai. 476-481 [doi]
- A Secure Official Vehicle Communication Protocol for VANETXia-Yun Guo, Chin-Ling Chen, Chang-qing Gong, Fang-Yie Leu. 482-485 [doi]
- A Brief Review on JTAG SecurityKyungroul Lee, Yeunsu Lee, Hyeji Lee, Kangbin Yim. 486-490 [doi]
- Impacts of Frequency Selectivity on the Error Performance of Time-Domain Equalizers in MIMO SystemsByeong-Gwon Kang, Seungyong Han, Sangjoon Park. 491-494 [doi]
- Malicious Script Blocking Detection Technology Using a Local ProxySanghwan Oh, HanChul Bae, Soojin Yoon, Hwankuk Kim, YoungTae Cha. 495-498 [doi]
- Analysis on the Key Storage Mechanism of the CNG LibraryKyungroul Lee, Hyeji Lee, Yeunsu Lee, Kangbin Yim. 499-502 [doi]
- Issues and Implementation Strategies of the IoT (Internet of Things) IndustrySeungjun Yeon, Hyojung Jun. 503-508 [doi]
- A Novel Hybrid Algorithm Based on Hill Matrix and Haar Domain SequenceGuangming Yang, Zhenhua Tan, Fanghua Geng, Tian-han Gao. 509-513 [doi]
- Invisible Secure Keypad Solution Resilient against Shoulder Surfing AttacksDongmin Choi, Chang Choi, Xin Su. 514-517 [doi]
- Exploring Value of e-Service Innovation: e-Service and Co-operation ComplementarityTin-Chang Chang, Shu-Hui Chuang. 518-521 [doi]
- Can Workplace Friendship Reduce Social Loafing?Ching-Hui Shih, Yao-Hua Wang. 522-526 [doi]
- Exploring the Performance of Service Innovation: Infrastructure Capability and Innovation Orientation ComplementarityShu-Hui Chuang, Shinyi Lin, Tin-Chang Chang. 527-530 [doi]
- Old-Established Companies' Traditions and Innovations - Focusing on e-Business of Japan and TaiwanMei-Hua Liao, Yu-Ci Xu, Hidekazu Sone. 531-532 [doi]
- The Key Value-Drivers of Successful Travel Agency from the Perspective of Its Core Competence: Lion Travel versus Phoenix ToursKuei-Yuan Wang, Cheng-Chun Kuo. 533-537 [doi]
- SEO Behavior of the Family Firms through Agency Theory PerspectiveMei-Hua Liao, Wun-Huei Chen, Ying-Yun Lin. 538-540 [doi]
- Antecedents and Outcomes of Trust in Professional AssociationsMei Hua Huang, Chiung Yen Chen. 541-545 [doi]
- Causal Analysis in Human Capital, R&D Assets and Financial Performance: Evidence from Taiwanese Firms Operating in ChinaYing-Li Lin, Fang-Hua Hsiao, Pei-Shan Li. 546-550 [doi]
- The Impact of Stock Prices, Risks and Business Cycle on OverconfidenceYung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang, Yu-Jhen Liou. 551-555 [doi]
- A Comparative Study of Valuation and Value Drivers in the Auto Lamp Industry: Two Cases of Auto Lamp CompaniesChien-Wen Lai, Kuei-Yuan Wang, Tzu-Yu Lin. 556-562 [doi]
- Successor Audit Partner Choice for Mandatory Audit Partner Rotation CompaniesLi-Jen He. 563-566 [doi]
- An Investigation into Human Resources and Operating Performance between Competitive Strategies of Taiwan Public Accounting FirmsChiung Yen Chen, Mei Hua Huang. 567-572 [doi]
- The Effect of Corporate Social Responsibility Initiatives on Internal Employee Motivation and Organizational IdentificationChia-Ju Lu, Yi-Yu Shih, Shih-Ten Wang. 573-577 [doi]
- The Hindsight of ADR Listing - An Empirical Study on M&A Activities for Acquirers Before-and-After ADR ListingNien-Tzu Yang. 578-583 [doi]
- Linking Dynamic Equity Valuations to Optimum Weighting in the Performance Compensation SystemChung-Jen Fu, Chiung-Yao Huang. 584-586 [doi]
- Estimating CPU Features by Browser FingerprintingTakamichi Saito, Koki Yasuda, Takayuki Ishikawa, Rio Hosoi, Kazushi Takahashi, Yongyan Chen, Marcin Zalasinski. 587-592 [doi]
- An Authorization Scheme Concealing Client's Access from Authentication ServerTakamichi Saito, Yuta Tsunoda, Daichi Miyata, Ryohei Watanabe, Yongyan Chen. 593-598 [doi]
- Interactive History Sniffing Attack with Amida LotteryHiroaki Kikuchi, Kota Sasa, Yuta Shimizu. 599-602 [doi]
- A Proposal for Cyber-Attack Trace-Back Using Packet Marking and LoggingPengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai. 603-607 [doi]
- A Behavior-Based Method for Detecting DNS Amplification AttacksLongzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai. 608-613 [doi]
- Generalized Graph-Based Visual Secret Sharing Schemes for Multiple SecretsYuji Suga. 614-619 [doi]