Abstract is missing.
- Gait Recognition for Human Identification using KinectWonjin Kim, Yanggon Kim. 1-4 [doi]
- Deep-MSP: Morphological Sentence Pattern Recognition based on ConvNetSeong Ik Park, Youngsub Han, Yanggon Kim. 5-10 [doi]
- Applied Statistical Model and Remote Sensing for Decision Management System for SoybeanMohammad Taheri, Dheeman Saha, Gary Hatfield, Emmanuel Byamukama, Sung Y. Shin. 11-14 [doi]
- Hand Gesture Recognition for Doors with Neural NetworkHyun Jin Ahn, Jun Sung Kim, Jae Youn Shim, Jin Suk Kim. 15-18 [doi]
- Circular RNA Detection from High-throughput SequencingMohamed Chaabane, Eric C. Rouchka, Juw Won Park. 19-24 [doi]
- Mining intrusion detection rules with longest increasing subsequences of q-gramsInbok Lee, Sung-il Oh. 25-29 [doi]
- Solving Stochastic Point Location Problem in a Dynamic Environment with Weak EstimationAsieh Abolpour Mofrad, Anis Yazidi, Hugo Lewi Hammer. 30-35 [doi]
- Temporal data stream analysis for EV charging infrastructure in JejuJunghoon Lee, Gyung-Leen Park. 36-39 [doi]
- An Improved Evolutionary Approach for Document ClusteringRuksana Akter, Yoojin Chung. 40-43 [doi]
- An Effective Feature Selection method using Monte Carlo SearchMuhammad Umar Chaudhry, Sang-Wook Kim, Jee-Hyong Lee. 44-45 [doi]
- Autonomicity Levels and Requirements for Automated Machine LearningKeon-Myung Lee, Kwang il Kim, Jaesoo Yoo. 46-48 [doi]
- Reducing Dimensionality Using NMF Based Cholesky DecompositionJasem M. Alostad. 49-55 [doi]
- An Efficient Tag Recommendation Method using Topic Modeling ApproachesBeomseok Hong, Yanggon Kim, Sang Ho Lee. 56-61 [doi]
- On Classifying Dynamic Graph BagsDong-Kyu Chae, Bo-Kyum Kim, Seung Ho Kim, Sang-Wook Kim. 62-66 [doi]
- Contents Recommendation Scheme Considering Trust and Collaborative Filtering in Online Social NetworksKyoungsoo Bok, Geonsik Ko, Jongtae Lim, Keonmyung Lee, Jaesoo Yoo. 67-71 [doi]
- Study on a Text Reuse Measurement Method Using Expanded Index TermEunji Lee, Htet Myet Lynn, Chang Choi, Hanil Kim, PanKoo Kim. 72-74 [doi]
- A Study on Prediction Comparison by Time Series Analysis Model of Load Big dataJaehyun Kim, Taehyoung Kim, Kyung Sun Ham. 75-76 [doi]
- A Study on Time Series Analysis by Data Processing for Load ForecastingTaehyoung Kim, Jaehyun Kim, Kyung Sun Ham. 77-78 [doi]
- Isolated Handwritten Arabic Character Recognition Using Freeman Chain Code and Tangent LineHassan Althobaiti, Kevat Shah, Chao Lu. 79-84 [doi]
- Comparison of single and deep long short-term memory for single object trackingKangUn Jo, JungHyuk Im, Dae-Shik Kim. 85-88 [doi]
- A Comparison on Sparse Coding and Moran's I Method for Image DenoisingMinh Nguyen, Chih-Cheng Hung, Mingon Kang. 89-93 [doi]
- Efficient Synthetic Light Field Rendering on Heterogeneous Systems Using a Pipeline-Based Runtime DesignChih-Chen Kao, Liang-Chi Tseng, Wei-Chung Hsu. 94-99 [doi]
- A Novelty Detection Approach to Classification of Breast Tissue Containing MicrocalcificationsErcan Avsar, Kurtulus Bulus. 100-103 [doi]
- Identification of the White-Mold affected Soybean fields by using Multispectral Imageries, Spatial Autocorrelation and Support Vector MachineSae-han Suh, Dong Youn Kim, Ji-eun Jhang, Emmanuel Byamukama, Gary Hatfield, Sung Y. Shin. 104-109 [doi]
- Efficient Horizon Line Detection Using an Energy FunctionEvgeny Gershikov. 110-115 [doi]
- Oriental Brush Simulation using 3 Dimensional ActionJungpil Shin, Cheol Min Kim. 116-119 [doi]
- Vessel Segmentation Model using Automated Threshold Algorithm from Lower Leg MRIJi Young Lee, Jin Yeong Mun, Mohammad Taheri, Seong-Ho Son, Sung Y. Shin. 120-125 [doi]
- MR images-Based Microwave Focusing for Thermal TherapyKwang-Jae Lee, Jang-Yeol Kim, Seong-Ho Son, Seok Kang. 126-131 [doi]
- Real-time motion blur based on per pixel fragment listJinhyung Choi, Kyoungsu Oh. 132-135 [doi]
- Development of Inter-Leaves Weed and Plant Regions Identification Algorithm using Histogram of Oriented Gradient and K-Means ClusteringDheeman Saha, George Hamer, Ji Young Lee. 136-139 [doi]
- An Integrated Simulation Study on Reliable and Effective Distributed Energy Resources in Smart GridSriharsha Mallapuram, Wei Yu 0002, Paul Moulema, David W. Griffith, Nada Golmie, Fan Liang. 140-145 [doi]
- When D2D Meets Network Coding: A Tutorial Case StudyJun Huang, Shuai Huang, Cong-Cong Xing. 146-151 [doi]
- Collaborative Sensing for Privacy Preserving Gait Tracking Using IoT MiddlewareChi-Sheng Shih, Tim-Yuao Wang, Jyun-Jhe Chou, Ze-Yu Chuang, Ching-Chi Chuang, Kwei-Jay Lin, Wei-Dean Wang, Kuo-Chin Huang. 152-159 [doi]
- Performance Analysis of Bicycle-to-Pedestrian Safety Application using Bluetooth Low EnergyHyeongcheol Park, Sungwon Lee, Eunbae Moon, Syed Hassan Ahmed, Dongkyun Kim. 160-165 [doi]
- PEAR: A Privacy-Enabled Architecture for CrowdsensingAlfredo J. Perez, Sherali Zeadally. 166-171 [doi]
- Software Defined Radio Testbed Setup and ExperimentationAmirshahram Hematian, James Nguyen, Chao Lu, Wei Yu 0002, Daniel Ku. 172-177 [doi]
- An Efficient Error Prevention and Recovery for Multicast Traffic in Data Center NetworksHsueh-Wen Tseng, Ting-Ting Yang, Yu-Xiang Lan. 178-183 [doi]
- End-to-End Delay Minimization Approaches Using Software-Defined NetworkingTommy Chin, Mohamed Rahouti, Kaiqi Xiong. 184-189 [doi]
- OCPP security - Neural network for detecting malicious trafficAdrian-Gabriel Morosan, Florin Pop. 190-195 [doi]
- Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow GraphZhi-guo Chen, Ho Seok Kang, Shang-nan Yin, Sung-Ryul Kim. 196-201 [doi]
- Extracting the Representative API Call Patterns of Malware Families Using Recurrent Neural NetworkIltaek Kwon, Eul-Gyu Im. 202-207 [doi]
- How to Make Efficient Decoy Files for Ransomware Detection?Jeonghwan Lee, Jinwoo Lee, Jiman Hong. 208-212 [doi]
- User Authentication using Leap MotionKotaro Maruyama, Jungpil Shin, Cheol Min Kim, Chin-Ling Chen. 213-216 [doi]
- An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android ApplicationsKyeonghwan Lim, Jaemin Jeong, Seong Je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, Seongtae Jhang. 217-221 [doi]
- Whitelist for Analyzing Android MalwareKyoungmin Kim, Jeonghwan Lee, Seonguk Lee, Jiman Hong. 222-227 [doi]
- Disambiguation and Comparison of SOA, Microservices and Self-Contained SystemsTomás Cerný, Michael J. Donahoo, Jiri Pechanec. 228-235 [doi]
- Modeling Resource-centric Services for Service Adaptation in Cyber Physical SystemsVangalur S. Alagar, Kaiyu Wan. 236-240 [doi]
- Internal Quality to External Quality: an Approach to Manage ConflictsSumit Kalra, T. V. Prabhakar. 241-248 [doi]
- Highly Scalable Monitoring System on Chip for Multi-Stream Auto-Adaptable Vision SystemAli Isavudeen, N. Ngan, Eva Dokladalova, Mohamed Akil. 249-254 [doi]
- Program Analysis with a Loop-Function-based Tracing Tool on Virtual PlatformsTsung-Han Chiang, Cheng-Yueh Liu, Chih Wei Yeh, Chia-Heng Tu, Shih-Hao Hung. 255-260 [doi]
- Schedulability Analysis of Mode Change for Imprecise Computation on Multi-Core PlatformsChi-Sheng Shih, Chang-Min Yang. 261-268 [doi]
- A Fair Scheduling Algorithm for Multiprocessor Systems Using a Task Satisfaction IndexJinman Jung, Jongho Shin, Jiman Hong, Jinwoo Lee, Tei-Wei Kuo. 269-274 [doi]
- Impact of Memory Size on Bigdata Processing based on Hadoop and SparkSeunghye Han, Wonseok Choi, Rayan Muwafiq, Yunmook Nah. 275-280 [doi]
- A Virtual CPU Scheduling Model for I/O Performance in Paravirtualized EnvironmentsJinman Jung, JiSu Park, Seoyeon Kim, Mhanwoo Heo, Jiman Hong. 281-286 [doi]
- MACaaS Platform for Fog ComputingGibeom Byeon, Myungjoon Shon, Hansol Lee, Jiman Hong. 287-292 [doi]
- Implementing Hibernation-based Fast Booting as a Device DriverShiwu Lo, Yueyuan Zhang. 293-294 [doi]
- Intelligent Orchestration Agent for Storage Platform ManagementJae-Hoon An, Younghwan Kim, Chang-Won Park. 295-297 [doi]
- Design of Framework supporting IPMI and DCMI based on Open BMCJae-Hoon An, Younghwan Kim, Chang-Won Park. 298-299 [doi]
- Squall: Stream Processing and Analysis Model DesignJae-Hoon An, Jae Gi Son, Ji-Woo Kang. 300-302 [doi]
- Performance Evaluations of Multiple GPUs based on MPI EnvironmentsBongjae Kim, Jinmang Jung, Hong Min, Junyoung Heo, Hyedong Jung. 303-304 [doi]