Abstract is missing.
- The Mobile Edge Computing (MEC)-based Vehicle to Infrastructure (V2I) Data Offloading from Cellular Network to VANET using the Delay-Constrained Computing SchemeChung-Ming Huang, Chi-Feng Lai. 1-6 [doi]
- A Study on Handover Mechanism in 5G Non-standalone NetworkHung-Chin Jang, Kai-Sheng Chang. 7-12 [doi]
- A User Pairing Technique for Mixed Traffic Types in Downlink NOMAYerra Prathyusha, Tsang-Ling Sheu. 13-18 [doi]
- Charging Models for MANO-based 5G Core NetworksJean Jimmy Julien, Fuchun Joseph Lin, Chiao-Hsuan Yu, Wan-Hsun Hu. 19-24 [doi]
- An Effective Flow-Rule-Reducing Algorithm for Flow Tables in Software-Defined NetworksMing-Hua Cheng, Wen-Shyang Hwang, Yan-Jing Wu, Cheng-Han Lin, Jhen-Siang Syu. 25-30 [doi]
- A novel Scheduling Algorithm applied to the Component Carrier Selection for Femtocell in Wireless CommunicationYing-Hong Wang. 31-36 [doi]
- A Feature Fusion Approach for Multiple Signal ClassificationShih-Feng Huang, Yen-Wen Lin. 37-42 [doi]
- HPCF: Hybrid Music Group Recommendation System based on Item Popularity and Collaborative FilteringShih-Han Chen, Sok-Ian Sou, Hsun-Ping Hsieh. 43-49 [doi]
- Room-based Playlist Arrangement System using Group RecommendationHsin-Wei Li, Sok-Ian Sou, Hsun-Ping Hsieh. 50-54 [doi]
- The MuTube Dataset for Music Listening History Retrieval and Recommendation SystemYi-Chen Wang, Pei-Lin Yang, Sok-Ian Sou, Hsun-Ping Hsieh. 55-60 [doi]
- One-Class Novelty Detection via Sparse Representation with Contrastive Deep FeaturesKuang-Ting Lee, Chien-Yu Chiou, Chun-Rong Huang. 61-66 [doi]
- Grid Structure Attention for Natural Language Interface to Bash CommandsJia-Wei Kan, Wei-Chin Chien, Sheng-De Wang. 67-72 [doi]
- A Speedup Simulation-based Fire Prediction for Online Evacuation PlanningHung-Yun Chen, Pei-Hsuan Tsai. 73-78 [doi]
- Convolution Filter Pruning for Transfer Learning on Small DatasetChing Ya Liao, Pangfeng Liu, Jan-Jan Wu. 79-84 [doi]
- Speak to Action: Offline and Hybrid Language Recognition on Embedded Board for Smart Control SystemAanand. P. Pant, Kun-Ru Wu, Yu-Chee Tseng. 85-90 [doi]
- An AI-based System for Monitoring Behavior and Growth of PigsYou-rong Chen, Chi-Ting Ni, Kiat Siong Ng, Chia-Lun Hsu, Shen-Chang Chang, Chin-Bin Hsu, Pei-Yin Chen. 91-95 [doi]
- Anomaly Detection with Autoencoder and Random ForestTzu-Hsuan Lin, Jehn-Ruey Jiang. 96-99 [doi]
- An Efficient Methodology for the Cross-Comparison of Text DocumentsShu-Kai Yang, Chien Chou. 100-104 [doi]
- Text Mining over Curriculum Vitae of Peruvian Professionals using Official Scientific Site DINAJosimar Edinson Chire Saire, Honorio Apaza. 105-109 [doi]
- Sensor Activity Control Strategy for Random Access Wireless Sensor Network SystemsRong-Guei Tsai, Guan-Rong Shih, Pei-Hsuan Tsai. 110-115 [doi]
- A Parallel Algorithm for Constructing Two Edge-disjoint Hamiltonian Cycles in Locally Twisted CubesShun-Yu Li, Jou-Ming Chang, Kung-Jui Pai. 116-119 [doi]
- On the Valuedness of Symbolic Finite TransducersDi-De Yen, Hsu-Chun Yen. 120-125 [doi]
- The Hardness and Approximation of the Densest k-Subgraph Problem in Parameterized Metric GraphsShih-Chia Chang, Li-Hsuan Chen, Ling-Ju Hung, Shih-Shun Kao, Ralf Klasing. 126-130 [doi]
- BitTorrent-Based P2P Locality-Awareness File Sharing over Software-defined NG-PON2I-Shyan Hwang, Ardian Rianto, Razat Kharga. 131-134 [doi]
- DeepSafety: A Deep Learning Framework for Unsafe Behaviors Detection of Steel Activity in Construction ProjectsChia-Chun Liu, Josh Jia-Ching Ying. 135-140 [doi]
- Predicting the Japanese Yen to US Dollar Exchange Rate Based on Machine Learning ModelsRung Ching Chen, Yi Chen Shiao, Christine Dewi, Qiao-En Liu. 141-146 [doi]
- An Effective and Efficient Algorithm for Detecting Exact Deletion Breakpoints from Viral Next-Generation Sequencing DataJi-Hong Cheng, Wen-Chun Liu, Ting-Tsung Chang, Sun-Yuan Hsieh, Vincent S. Tseng. 147-152 [doi]
- PerfNetRT: Platform-Aware Performance Modeling for Optimized Deep Neural NetworksYing-Chiao Liao, Chuan Chi Wang, Chia-Heng Tu, Ming-Chang Kao, Wen-Yew Liang, Shih-Hao Hung. 153-158 [doi]
- Resolving automatic high availability operations and users commands to virtual machines on OpenStackYen-Lin Lee, Ratri Abdatush Sholihah, Deron Liang, Wei-Jen Wang. 159-164 [doi]
- Real-time Transfers for Improving Efficiency of Ridesharing Services in the Environment with Connected and Self-driving VehiclesYen-Long Chen, Kuo-Feng Ssu, Yu-Jung Chang. 165-170 [doi]
- An efficient data structure for distributed ledger in blockchain systemsTzu-Lun Huang, Jason Huang. 175-178 [doi]
- Design and analysis of a distributed consensus protocol for real-time blockchain systemsTzu-Lun Huang, Jason Huang. 179-184 [doi]
- Enhanced OpenStack Cloud for Network Function VirtualizationMing-Huang Tsai, Han-Ting Liang, Yun-He Wang, Wu-Chun Chung. 185-190 [doi]
- Performance Analysis and Optimization for Federated Learning Applications with PySyft-based Secure AggregationPo-Sheng Lin, Ming-Chang Kao, Wen-Yew Liang, Shih-Hao Hung. 191-196 [doi]
- The Brain Memory Architecture HW/SW Co-Design Platform with Adaptive CNN AlgorithmJih-Ching Chiu, Yu-Yi Wang, Wei-Yi Lin. 197-202 [doi]
- A Hybrid Computational Storage Architecture to Accelerate CNN TrainingChun-Zhang Zheng, Chin-Hsien Wu. 203-208 [doi]
- A Novel VLSI Architecture for Barrel Distortion CorrectionChi-Ting Ni, Chen-An Chang, Jia-Wei Liao, Pei-Yin Chen. 209-213 [doi]
- An Empirical Approach to Minimize Latency of Real-Time Multiprocessor Linux KernelChing-Chun Jim Huang, Chung-Fan Yang. 214-218 [doi]
- The Design and Implementation of a Power Management Solution for Smart GlassesJing Chen, Yi-Wei Chen. 219-224 [doi]
- Using multiclass machine learning model to improve outcome prediction of acute ischemic stroke patients after reperfusion therapyI-Min Chiu, Wun-Huei Zeng, Chun-Hung Richard Lin. 225-231 [doi]
- Rectum Segmentation in Brachytherapy Dataset Using Recurrent NetworkKai-Hsiang Lin, Jui-Hung Chang, Ti-Hao Wang, Hoe-Yuan Ong, Pau-Choo Chung. 232-236 [doi]
- Skin Cancer Dermoscopy Images Classification with Meta Data via Deep Learning EnsembleTsung-Chieh Lin, Hsi-Chieh Lee. 237-241 [doi]
- Study of Coronavirus Impact on Parisian Population from April to June using Twitter and Text Mining ApproachJosimar Edinson Chire Saire, Jimy Frank Oblitas Cruz. 242-246 [doi]
- Evaluation of Fatigue and Attention Levels in Multi-target Scenario using CNND. Sandeep Vara Sankar, Li-Wei Ko. 247-251 [doi]
- Design and Implement Robust Wireless Network Based on TCP ProtocolJih-Ching Chiu, Jun-Jiang Chen, Kuan-Lun Su. 252-261 [doi]
- Deployment and Evaluation of LoRa Network Configuration Based on Random ForestZhi hao Wang, Sung-Tsun Shih, Hendrick Hendrick, Mao-Yuan Pai, Gwo-Jiun Horng. 262-265 [doi]
- A Query-based Routing Table Update Mechanism for Content-Centric NetworkPei-Hsuan Tsai, Yu-Lin Tseng, Jun-Bin Zhang, Meng-Hsun Tsai. 266-271 [doi]
- Car Sales Prediction System Based on Fuzzy Time Series and Adaptive Neuro Fuzzy Inference SystemAbid Falih Zuhdi, Aripriharta, Agusta Rakhmat Taufani, Adim Firmansah, Gwo-Jiun Horng. 272-277 [doi]
- Design and Implement Adaptive Tree Topology Mechanism For Wi-Fi Wireless NetworkJih-Ching Chiu, Cheng-Lin Tsai, Zhi-Yu Lee. 278-282 [doi]
- Resource Allocation for Tactile Internet via Software-Defined FiWi Access NetworkElaiyasuriyan Ganesan, I-Shyan Hwang, Andrew Tanny Liem. 283-287 [doi]
- An Efficient Algorithm for Joint Power Allocation in NOMA-Based Diamond Relay NetworksYinman Lee, Bo-Ying Huang, Sok-Ian Sou. 288-293 [doi]
- A Survey on Clustering Algorithms in Wireless Sensor Networks: Challenges, Research, and TrendsMehdi Gheisari, Aaqif Afzaal Abbasi, Zahra Sayari, Qasim Rizvi, Alia Asheralieva, Sabitha Banu, Feras M. Awaysheh, Syed Bilal Hussain Shah, Khuhawar Arif Raza. 294-299 [doi]
- Usage Behavior Analysis of Intelligent Network based Public Bicycle Rental SystemHao-En Chueh, Chang-Yi Kao, Meng-Luen Wu. 300-303 [doi]
- Finding Periodicity of Subflows in SDN-based IoTLo-An Chen, Jing-Zhao Zhuo, Yun-Zhan Cai, Yu-Ting Wang, Meng-Hsun Tsai. 304-309 [doi]
- The Anomaly Detection Mechanism Using Extreme Learning Machine for Service Function ChainingSheng-Tzong Cheng, Chong-Yi Zhu, Chih-Wei Hsu, Jiashing Shih. 310-315 [doi]
- Key Factors for Suppliers of Gaming Notebook Keyboards with AHPHong Tsuen Lei, Ping-Yu Hsu 0001, Ming-Shien Cheng. 316-318 [doi]
- Constructing an Integrated Classifiers for Identifying Authenticity and Sentiment Analysis- A Case of Hotel ReviewsYing-Chia Peng, Ming-Shien Cheng, Ping-Yu Hsu 0001. 319-324 [doi]
- The Feature Extraction Modeling of Product Analysis in Injection Molding for Intelligent ManufacturingHao-Hsuan Tsou, Kuang-Di Lee, Zhi hao Wang, Chung-Ching Huang. 325-329 [doi]
- Maskless lithography laser source target light dose reversed mappingShau-Yin Tseng, Jian-Wei Chen. 330-334 [doi]
- Nonlinear PCB Compensation Based on Intel® HD graphics for Manufacturing ProcessingShau-Yin Tseng, Jin-Nan Liu, Jian-Wei Chen. 335-340 [doi]
- Design of Multidimension-media Streaming Protocol Based on RTSPJih-Ching Chiu, Hao-Yu Tseng, Zhi-Yu Lee. 341-347 [doi]
- Implementation of Inverse Perspective Mapping for Camera-Vision Water-Level MeasurementsLung-Chih Kuo, Cheng-Chi Tai. 348-351 [doi]
- Prediction of Hospital Readmission Combining Rule-based and Machine Learning ModelKareen Teo, Khin Wee Lai, Ching Wai Yong, Belinda Pingguan-Murphy, Joon Huang Chuah, Clarence Augustine Th Tee. 352-355 [doi]
- A Study of Self Distillation for Mango Image ClassificationWei-Chi Chen, Wei-Ta Chu. 356-359 [doi]
- Real-Time Human Violent Activity Recognition Using Complex Action DecompositionDylan Josh Coming Lopez, Cheng-Chang Lien. 360-364 [doi]
- Disparity Map Estimation From Stereo Image Pair Using Deep Convolutional NetworkWen-Nung Lie, Hung-Ta Chiu, Jui-Chiu Chiang. 365-369 [doi]
- A low-complexity learning-based algorithm for joint application of demosaicking and up-scalingKuan-Yu Huang, Pei-Yin Chen, Ching-Ching Huang. 370-375 [doi]
- Marine Pollution Detection based on Deep Learning and Optical FlowChih-Hsuan Wu, Jun-Wei Hsieh, Chia-Yu Wang, Chih-Hsiang Ho. 376-381 [doi]
- Smart Harvesting based on Image ProcessingS. P. Joseph, L. L. M. C. Wijerathna, K. G. R. D. Epa, E. K. W. A. P. K. Egalla, P. W. K. Abeygunawardhana, R. De Silva. 382-386 [doi]
- Detection of The Erosion Area of Lotus Leaf Using Hyperspectral ImagingTzu-Wei Chiu Huang, Keng-Hao Liu, Chih-Cheng Pai, Chinsu Lin, Yang-Chu Chen. 387-391 [doi]
- Pork Tissue Recognition Using Visible and Near Infrared Hyperspectral ImagingChih-Cheng Pai, Yang-Chu Chen, Keng-Hao Liu, Yuan-Hsun Tsai, Po-Chi Hu, Zong-Hsin Liu. 392-396 [doi]
- SandboxNet: An Online Malicious SDN Application Detection Framework for SDN NetworkingPo-Wen Chi, Ming-Hung Wang, Yu Zheng. 397-402 [doi]
- Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption SchemesYi-Fan Tseng, Jheng-Jia Huang. 403-407 [doi]
- Android malware detection system integrating block feature extraction and multi-head attention mechanismYi-Ming Chen, An-Chi He, Guo-Chung Chen, Yu-Chi Liu. 408-413 [doi]
- Feature Selection for Malicious Traffic Detection with Machine LearningSying-Jyan Wang, Cheng Xuan Cai, Yen-Wen Tseng, Katherine Shu-Min Li. 414-419 [doi]
- A Context-Policy-based Approach to Access Control for Healthcare Data ProtectionM. Fahim Ferdous Khan, Ken Sakamura. 420-425 [doi]
- Machine learning-based IP Camera identification systemCheng-Wei Huang, Tien-Yi Wu, Yuan Tai, Ching-Hsuan Shao, Lo-An Chen, Meng-Hsun Tsai. 426-430 [doi]
- Publicly Verifiable Proofs of Data Replication and Retrievability for Cloud StorageClémentine Gritti. 431-436 [doi]
- SSOV: A Single Sign-on Protocol for Accessing Vehicular Application Services with the Support of Secret Credential Management SystemYou-Wei Chang, Po-Ching Lin. 437-442 [doi]
- The Risk of Industrial Control System Programmable Logic Controller Default ConfigurationsKuan-Ming Su, I-Hsien Liu, Jung-Shian Li. 443-447 [doi]
- RNN-based DDoS Detection in IoT ScenarioChun-Yu Chen, Lo-An Chen, Yun-Zhan Cai, Meng-Hsun Tsai. 448-453 [doi]
- Autonomous Vehicle Simulation for Asia Urban Areas with a Perspective from EducationShao-Hua Wang, Chen-Xuan Lin, Chia-Heng Tu, Ching-Chun Jim Huang, Jyh-Ching Juang. 454-458 [doi]
- Development of a Prototype EV Autonomous Vehicle for Systematic ResearchB. V. P. Prasad, Qing Yuan Huang, Jing-Jou Tang. 459-461 [doi]
- User-Managed Access Delegation for Blockchain-driven IoT ServicesChun-An Lin, Chun-Feng Liao. 462-467 [doi]
- A Case Study on Experiment Site Selection for PV Energy Generation ForecastHuang Yu Hsiang, Tseng Sheng Yuan, Ping Wang, Lin Wen Hui, Lin Hsiao Chung. 468-472 [doi]
- Measure Students' Contribution in Web Programming Projects by Exploring Source Code RepositoryBao An Nguyen, Kuan-Yu Ho, Hsi-Min Chen. 473-478 [doi]
- Smart Human Resource Management System to Maximize ProductivityHewage H. A. S. S, Hettiarachchi K. U, Jayarathna K. M. J. B, Hasintha K. P. C., A. N. Senarathne, J. Wijekoon. 479-484 [doi]
- Exploiting Third-party SDK Sensitive Data LeakageHong-Bao Ye, Hsiang-Yang Weng, Hewijin Christine Jiau. 485-490 [doi]
- Revealing Coordination Needs from Task Allocation for Team Performance EstimationJen-Hao Kuo, Yi Hao Li, Hewijin Christine Jiau. 491-496 [doi]
- Study of Automatic Programs Quality Analysis and CorrectionJong-Yih Kuo, Hui-Chi Lin, Huang-Song Yu. 503-507 [doi]
- The Study of Programming Debugging and Intelligent Feedback SystemJong-Yih Kuo, Hui-Chi Lin, Jia-Yu Chen. 508-512 [doi]
- PDAS: A Digital-Signature-Based Authorization Platform for Digital Personal DataYu-Te Wang, Chu-Fei Wu, Shang-Pin Ma, Hsuan-Tung Chen, Shih-Ying Chang, Chun Sheng Li. 513-518 [doi]
- Microservice Migration Using Strangler Fig Pattern: A Case Study on the Green Button SystemChia-Yu Li, Shang-Pin Ma, Tsung-Wen Lu. 519-524 [doi]
- A Cross-lingual Patent Topics Model for Trend AnalysisYu Tsou, Deng-Neng Chen, Chia-Yu Lai. 525-528 [doi]
- Approaches for Representing Software as Graphs for Machine Learning ApplicationsVitaly Romanov, Vladimir Ivanov 0001, Giancarlo Succi. 529-534 [doi]
- Semantic Segmentation of Lotus Leaves in UAV Aerial Images via U-Net and DeepLab-based NetworksWen-Tse Chiu, Cheng-Hsuan Lin, Ci-Lin Jhu, Chinsu Lin, Ying-Cheng Chen, Mei-Jing Huang, Wei-Min Liu. 535-540 [doi]
- Application of Social Analytics to Credit Rating in Financial TechnologyChing-Ming Chao, Wei-Tien Chang. 541-547 [doi]
- EventGo! Exploring Event Dynamics from Social-Media PostsChia-Hui Chang, Yuan-Hao Lin, Hsiu-Min Chuang. 548-552 [doi]
- Automatic Spelling Correction for ASR Corpus in Traditional Chinese Language using Seq2Seq ModelsYu-Chieh Chao, Chia-Hui Chang. 553-558 [doi]
- Spatiotemporal Multi-Dimensional Modeling of Data Warehouse for Event Tracing ApplicationsFrank S. C. Tseng, Annie Y. H. Chou. 559-564 [doi]
- TideFC: Learning Temporal Interaction for Dynamic Embedding via Feature CrossingChang-Ming Tsai, Cheng-Te Li. 565-569 [doi]
- Pandemic Response and Crisis Informatics: An Imperative for Public Health MessagingChun-Ming Lai, Yi-Chen Liu, Rong-Ching Chang, Jon William Chapman, Chu-Hsing Lin. 570-575 [doi]
- An Algorithm based on Efficient Influence Maximization applied to Social NetworkYing-Hong Wang, Lin Hui, Yi-Cheng Chen, Meng-Shiu Chaung. 576-581 [doi]