Abstract is missing.
- Dimensionality reduction by bayesian eigenvalue-analysis for state prediction in large sensor systems: with application in wind turbinesJürgen Herp, Esmaeil S. Nadimi. 1-5 [doi]
- ECG-based biometric human identification based on backpropagation neural networkHtet Myet Lynn, SoonJa Yeom, PanKoo Kim. 6-10 [doi]
- Abstractive summarization by neural attention model with document content memoryYunseok Choi, Dahae Kim, Jee-Hyong Lee. 11-16 [doi]
- Clustering algorithms on imbalanced data using the SMOTE technique for image segmentationWajira Abeysinghe, Chih-Cheng Hung, Slim Bechikh, Xiaosong Wang, Altaf Rattani. 17-22 [doi]
- A SSLBP-based feature extraction framework to detect bones from knee MRI scansJin Yeong Mun, Youjeong Jang, Seong-Ho Son, Hyeun Joong Yoon, John Kim. 23-28 [doi]
- Travel planning problem considering site selection and itinerary makingJiaoman Du, Lei Li, Xiang Li. 29-36 [doi]
- Optimization of vehicle routing problem with fatigue driving based on genetic algorithmJiacheng Li, Jiaoman Du, Lei Li. 37-42 [doi]
- Machine learning-based colorectal cancer detectionVictoria Blanes-Vidal, Gunnar Baatrup, Esmaeil S. Nadimi. 43-46 [doi]
- A deep learning model generation method for code reuse and automatic machine learningKeon-Myung Lee, Kyoung-Soon Hwang, Kwang il Kim, Sang Hyun Lee, Ki Sun Park. 47-52 [doi]
- Development of vegetation mapping with deep convolutional neural networkSae-han Suh, Ji-eun Jhang, Kwanghee Won, Sung Y. Shin, Chang Oan Sung. 53-58 [doi]
- Phoneme segmentation using deep learning for speech synthesisYoung Han Lee, Jong Yeol Yang, Choong Sang Cho, Hyedong Jung. 59-61 [doi]
- Analysis an identification with ECG base in augmented-realityHoon Ko, Batenkina Oksana, In Seop Na, Sung Bum Pan. 62-63 [doi]
- Deep-learning based web UI automatic programmingBada Kim, Sangmin Park, Taeyeon Won, Junyoung Heo, Bongjae Kim. 64-65 [doi]
- Deep neural networks based user interface detection for mobile applications using symbol markerJiSu Park, Young-Sun Yun, Seongbae Eun, Sin Cha, Sun Sup So, Jinman Jung. 66-67 [doi]
- Energy-balancing unequal concentric chain clustering (MIMO-UCC) protocol for IoT system in 5G environmentMohammad Baniata, Hyunho Ji, Yongmin Kim, Jeongwoo Choi, Jiman Hong. 68-74 [doi]
- Signal reception for successive interference cancellation in NOMA downlinkLeilei Meng, Xin Su 0002, Xuewu Zhang 0001, Chang Choi, Dongmin Choi. 75-79 [doi]
- Dynamic bandwidth allocation in SDN based next generation virtual networks: a deterministic network calculus approachAhyoung Lee, Pu Wang, Shih-Chun Lin, Ian F. Akyildiz, Min Luo. 80-87 [doi]
- A mutual authentication scheme with user anonymity for cyber-physical and internet of thingsYung-Feng Lu, Chin-Fu Kuo, Hung-Ming Chen, Guan-Bo Wang, Shih-Chun Chou. 88-93 [doi]
- Enabling critical content dissemination in vehicular named data networksMuhammad Azfar Yaqub, Syed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim. 94-99 [doi]
- Network-assisted HTTP adaptive streaming for hybrid software defined networkHieu Nguyen, Ahyoung Lee, Ilkyeun Ra. 100-105 [doi]
- Efficient power control for D2D with SWIPTJun Huang, Yong Liao, Cong-Cong Xing. 106-111 [doi]
- A pursuit learning solution to underwater communications with limited mobility agentsHajar Bennouri, Anis Yazidi, Amine Berqia. 112-117 [doi]
- Autonomous configuration of network parameters in operating systems using evolutionary algorithmsBartosz Gembala, Anis Yazidi, Hårek Haugerud, Stefano Nichele. 118-125 [doi]
- A survey on ocean observatory networksJingyi Chen, Xin Su 0002, Xuewu Zhang 0001, Chang Choi, Dongmin Choi. 126-131 [doi]
- Implement of mobile server based on micro-webpage for multi-lingual support menuSeoyeon Kim, Jinman Jung, Taeil Son, Changhyung Ryu, Heesung Woo. 132-133 [doi]
- A communication model based offloading decision for flying ad-hoc networksHong Min, Jinman Jung, Bongjae Kim, Junyoung Heo. 134-135 [doi]
- Data hiding using compressed archivesBruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, Francesco Palmieri, Raffaele Pizzolante. 136-142 [doi]
- Malware classification using byte sequence informationByungho Jung, TaeGuen Kim 0002, Eul-Gyu Im. 143-148 [doi]
- Android malware detection using convolutional neural networks and data section imagesJaemin Jung, Jongmoo Choi, Seong Je Cho, Sangchul Han, Minkyu Park, Young-Sup Hwang. 149-153 [doi]
- A malware detection system based on heterogeneous information networkShang-nan Yin, Ho Seok Kang, Zhi-guo Chen, Sung-Ryul Kim. 154-159 [doi]
- Ontology modeling for APT attack detection in an IoT-based power systemGihoon Kim, Chang Choi, Junho Choi. 160-164 [doi]
- Dynamic code whitelist for efficient analysis of Android codeJeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong. 165-166 [doi]
- Vulnerability analysis of secure USB: based on the fingerprint authentication of product BKyungroul Lee, Byeonggeun Son, Sun-Young Lee, Kangbin Yim. 167-169 [doi]
- Load balancing scheme for supporting real-time processing of big data in distributed in-memory systemsKyoungsoo Bok, Kitae Choi, Jongtae Lim, Jaesoo Yoo. 170-174 [doi]
- A priority-based data placement method for databases using solid-state drivesChin-Hsien Wu, Cheng-Wei Huang, Chen-Yu Chang. 175-182 [doi]
- An efficient continuous subgraph matching scheme over graph streamsDojin Choi, Jongtae Lim, Kyoungsoo Bok, Jaesoo Yoo. 183-188 [doi]
- Automatic knowledge extraction from OCR documents using hierarchical document analysisMasum Mohammad, Sai Kosaraju, Tanju Bayramoglu, Girish Modgil, Mingon Kang. 189-194 [doi]
- Sequence homology in circular RNA detectionMohammed Sayed, Jae Yeon Hwang, Juw Won Park. 195-198 [doi]
- Identifying text reuse using word net-based extended named entity recognitionEunji Lee, PanKoo Kim. 199-202 [doi]
- Deep learning based customer product rating prediction modelYongcheon Park, Jeongmin Park, Eunkyong Lee, Kyoungchul Lee, Jiman Hong. 203-204 [doi]
- OSAMIC: online schedulability analysis of real-time mode change on heterogeneous multi-core platformsChi-Sheng Shih, Chang-Min Yang, Wei-Lun Su, Pei-Kuei Tsung. 205-212 [doi]
- Scheduling algorithms for dynamical real-time tasks on multiprocessor systemsChin-Fu Kuo, Yung-Feng Lu. 213-218 [doi]
- An efficient load balancing multicast scheduling for solving congestion problem in social data center networksHsueh-Wen Tseng, Ya-Ju Yu, Kai-Hsu Hsieh. 219-224 [doi]
- Acceleration of Monte-Carlo simulation on high performance computing platformsPei-Jen Wang, Cheng-Yueh Liu, Chia-Heng Tu, Chen-Pang Lee, Shih-Hao Hung. 225-230 [doi]
- Hardware-accelerated cache simulation for multicore by FPGAShih-Hao Hung, Yi-Mo Ho, Chih Wei Yeh, Cheng-Yueh Liu, Chen-Pang Lee. 231-236 [doi]
- A comparison of energy-efficient strategies for real-time task synchronization protocolsJun Wu, Hsin-Hsien Yu. 237-242 [doi]
- Thermal-aware task and data co-allocation for multi-processor system-on-chips with 3D-stacked memoriesChia-Yin Liu, Cheng-En Wu, Yi-Jung Chen. 243-248 [doi]
- Dynamic tuning of applications using restricted transactional memoryShih-Kai Lin, Ding-Yong Hong, Sheng-Yu Fu, Jan-Jan Wu, Wei-Chung Hsu. 249-254 [doi]
- Timestamp-based hot/cold data identification scheme for solid state drivesNguyen-Van Hiep, Jen-Wei Hsieh. 255-259 [doi]
- Energy-aware task scheduling strategies with QoS constraint for green computing in cloud data centersXing Liu 0002, Panwen Liu, Hongjing Li, Zheng Li, Chengming Zou, Haiying Zhou, Xin Yan, Ruoshi Xia. 260-267 [doi]
- Data center traffic scheduling with hot-cold link detection capabilitiesAnis Yazidi, Hussein Abdi, Boning Feng. 268-275 [doi]
- The design and development of integrated interface for provision BMC frameworkJae-Hoon An, Chanyeong Kim, Younghwan Kim. 276-278 [doi]
- Effects of H.265 encoding on PNU and source camera identificationAndrea Bruno, Giuseppe Cattaneo. 279-284 [doi]
- Development of automated 3D knee bone segmentation with inhomogeneity correction for deformable approach in magnetic resonance imagingDongyoun Kim, Jiyoung Lee, Joon Shik Yoon, Kwang-Jae Lee, Kwanghee Won. 285-290 [doi]
- Texture weighted fuzzy C-means algorithm for 3D brain MRI segmentationJi Young Lee, Dongyoun Kim, Jin Yeong Mun, Seok Kang, Seong-Ho Son, Sung Shin. 291-295 [doi]
- A prototype of a self-motion training system based on deep convolutional neural network and multiple FAMirrorKi Yeol Baek, In-Su Kim, Jae Seok Jang, Soon Ki Jung. 296-301 [doi]
- On isolation-driven automated module decompositionTomás Cerný, Filip Sedlisky, Michael J. Donahoo. 302-307 [doi]
- Depth-of-field effect in subjective and objective evaluation of image qualityTingting Zhang, Harold T. Nefs, Hantao Liu, Ling Xia, Xiaofeng Liu, Xiaoli Wu. 308-312 [doi]
- Efficient synthetic light field generation using adaptive multi-level renderingLiang-Chi Tseng, Wei-Chung Hsu. 313-318 [doi]
- Aspect oriented context-aware and event-driven data processing for internet of thingsMichal Trnka, Jan Svacina, Tomás Cerný, Eunjee Song. 319-323 [doi]
- A study on utilization strategy of edu-tech-based MOOC for lifelong learning in the fourth industrial revolutionSungkwan Kang, Joonseub Cha, Sukyung Ban. 324-325 [doi]
- Sign language recognition with recurrent neural network using human keypoint detectionSang-Ki Ko, Jae Gi Son, Hye Dong Jung. 326-328 [doi]
- Multiple mobile devices based virtual display method using electronic LED stickSeoyeon Kim, JiSu Park, Jinman Jung, Taeil Son, Choonghee Jo, Jaehyeok Jeong, Inhwan Na, Jinsung Song. 329-330 [doi]
- An efficient method for automatic updating business rulesEunkyong Lee, Yongcheon Park, Heejin Kim, Byeongoh Jung, Jiman Hong. 331-332 [doi]