Abstract is missing.
- Performance tuning case study on graphics processing unit-accelerated monte carlo simulations for proton therapyYi-Shen Chen, Sheng-Wei Cheng, Tei-Wei Kuo. 1-6 [doi]
- A data sanitization method for mobile devices with NAND flash memoryChin-Hsien Wu, Po-Ling Lin, Yu-Hun Hu, Ming-Yang Du. 7-13 [doi]
- Energy-efficient scheduling algorithm for real-time tasks with multiple parallel segments in multiprocessor systemsChin-Fu Kuo, Jian-Xing Lin, Yung-Feng Lu. 14-19 [doi]
- Container-based load balancing for WebRTC applicationsYung-Feng Lu, Hung-Ming Chen, Chin-Fu Kuo, Bo-Kai Tseng, Shih-Chun Chou. 20-26 [doi]
- MIPS CPU development with analogous teaching method for experimental teaching of digital logic and computer organizationXing Liu 0002, Guangming Sheng, Bing Shi, Christophe De Vaulx, Wenbi Rao, Qing Li. 27-33 [doi]
- An indoor environmental monitoring system for large buildings based on LoRaWANWei Li, Guanxi Shen, Jinbo Zhang. 34-38 [doi]
- Energy-aware offloading for mobile computing with heterogeneous networkChia-Hsueh Wu, Chen-Tui Hung, Ya-Shu Chen. 39-44 [doi]
- Using real-time image enhancement technique to improve prostate capsula detectionBaonan Xiao, Jianfeng Yang, Shixiao Wu, Qing Geng. 45-50 [doi]
- Data consistency and temporal validity under the circular buffer communication paradigmEvariste Ntaryamira, Cristian Maxim, Liliana Cucu-Grosjean. 51-56 [doi]
- Design and implementation of virtual machine control and streaming scheme using Linux kernel-based virtual machine hypercall for virtual mobile infrastructureEunseok Choi, Jiman Hong. 57-60 [doi]
- IoT-based floodgate control systemSangmin Park, Bada Kim, Taeyeon Won, Junyoung Heo. 61-62 [doi]
- An IoT based distortion invariant motion detection using raspberry pi with mean shift algorithmTaeyeon Won, Bada Kim, Sangmin Park, Junyoung Heo. 63-64 [doi]
- Survey of IoT platforms supporting artificial intelligenceSeoyeon Kim, JiSu Park, Jaehyeok Jeong, Young-Sun Yun, Seongbae Eun, Jinman Jung. 65-66 [doi]
- Study of variable liquid fertilization control system based on fuzzy PID controlRui Zhang, Jun Zhou, Lixiao Feng, Wei Ma. 67-70 [doi]
- Abnormal object detection and recognition in the complex construction site via cloud computingChuang Wang, Jiakun Li, Tian Wang 0002, Peng Shi, Hichem Snoussi, Xin Su 0002. 71-75 [doi]
- Classification of multiclass datasets using genetic programmingMahsa Shokri Varniab, Chih-Cheng Hung, Vahid Khalilzad-Sharghi. 76-82 [doi]
- Modeling and control method of connected and autonomous vehicles(CAVs) in urban traffic network based on PC algorithmZhengze Zhu, Haiying Zhou, Kun Mean Hou, Kui Zhou, Sishan Wang, Jianping Lan, Jiayuan Gong, Dong Bi. 83-90 [doi]
- Human evaluation of virtual and real-world distanceTingting Zhang, Guimiao Liu, Ling Xia, Xiaofeng Liu. 91-95 [doi]
- Application of deep learning for power control in the interference channel: a RNN-based approachZhixiang Deng, Qian Sang, Yan Pan, Yuanxue Xin. 96-100 [doi]
- Computation offloading for fast CNN inference in edge computingQinglin Yang, Xiaofei Luo, Peng Li, Toshiaki Miyazaki, Xiaoyan Wang. 101-106 [doi]
- Development of a semantic scene conversion model for image-based localization at nightDongyoun Kim, Sangwon Shin, Jinwoo Park, Sung Shin. 107-112 [doi]
- Evaluation of deep learning models for information extraction from EMF-related literatureYoujeong Jang, Hyung Do Choi, Fang Deng, Sung Shin. 113-116 [doi]
- Machine learning modeling assistance for non-expert developersKi Sun Park, Kyoung-Soon Hwang, Keon-Myung Lee, Chan Sik Han, Jin Han. 117-122 [doi]
- Anomaly detection for deep-learning based license plate recognition in real time videoBada Kim, Taeyeon Won, Sangmin Park, Junyoung Heo. 123-124 [doi]
- Performance analysis of chinese cursive character recognition based on convolutional neural networkBoseon Hong, Bongjae Kim, Jeong-Dong Kim, Jeahyoun Koo. 125-127 [doi]
- Cluster management framework for autonomic machine learning platformHeejin Kim, Younggwan Kim, Jiman Hong. 128-130 [doi]
- A study on supporting spiking neural network models based on multiple neuromorphic processorsBoseon Hong, Jinsung Cho, Bongjae Kim, Hong Min, Jiman Hong, Keon-Myung Lee. 131-132 [doi]
- Distinction of vegetable diseases by image processingHong Shen, Yuuki Kaiya. 133-136 [doi]
- Research of infrared image super-resolution reconstruction based on improved FSRCNNKai Che, Yufeng Chen, Zhengtao Xiang, Guosheng Peng, Jian Lv, Yun Zhou. 137-142 [doi]
- Validity of deriving low order photometry parameters from light solid distributionLing Xia, Tingting Zhang, Xiaofeng Liu. 143-146 [doi]
- Instance segmentation in urban scenes using inverse perspective mapping of 3D point clouds and 2D imagesChungyup Lee, Soohyeon Choi, Jung Y. Kim, Kwanghee Won. 147-152 [doi]
- Live migration in Greenplum database based on SDN via improved gray wolf optimization algorithmChengming Zou, Fanchao Zhao, Yi Xie, Haiying Zhou, Jun Qin. 153-160 [doi]
- Outlier detection using isolation forest and local outlier factorZhangyu Cheng, Chengming Zou, Jianwei Dong. 161-168 [doi]
- Malware classification for identifying author groups: a graph-based approachJiwon Hong, Sung-Jun Park, Taeri Kim, Yung-Kyun Noh, Sang-Wook Kim, Dongphil Kim, Wonho Kim. 169-174 [doi]
- Clustered NFV service chaining scheme for ocean observationsYuchen Gan, Xin Su 0002, Chang Choi, Zhou Zhou. 175-180 [doi]
- Design and implementation of distributed traceability system for smart factories based on blockchain technologyChi-Sheng Shih, Kai-Wei Yang. 181-188 [doi]
- Moving intelligence of mobile edge computing to maritime networkGodwin Kobby Gakpo, Xin Su 0002, Chang Choi. 189-193 [doi]
- Energy scheduling mechanism for intelligent terminal with simultaneous wireless information and power transferGang Yang, Jun Huang, Longyan Xu, Yahong Zhai. 194-199 [doi]
- Energy-efficient power allocation in analogue network coding based multi-hop D2D communicationPengfei Wu, Jun Huang, Longyan Xu. 200-205 [doi]
- Performance analysis for multi-priority data flow scheduling in SDNYinping Ding, Jun Huang, Peng Zhou. 206-211 [doi]
- Adaptive selection of configuration methods in 6LoWPAN based IoUTJunho Seo, Sungwon Lee, Muhammad Toaha Raza Khan, Dongkyun Kim. 212-216 [doi]
- Task offloading strategies based on workload balancing in ultra-dense networksCissoko Moussa, Haibo Zhang, Hasan Shamim, Kaijian Liu. 217-223 [doi]
- Effective capacity-aware resource allocation for 5G ultra dense network with hybrid access modeHasan Shamim, Haibo Zhang, Cissoko Moussa, Kaijian Liu. 224-229 [doi]
- Preprocessed symmetric RSA authentication for wireless body area networks in spaceSangwon Shin, Soohyeon Choi, Kwanghee Won, Sung Y. Shin. 230-235 [doi]
- Traffic big data assisted broadcast in vehicular networksSiri Guleng, Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji. 236-240 [doi]
- Enhancing the security of IoT gateway based on the classification of user security-sensitive dataSeungYeon Lee, Mhanwoo Heo, Kicheol Park, Bongjae Kim, Jiman Hong. 241-243 [doi]
- Time-dependent theme park routing problemYang Zhang, Jiacheng Li, Jiaoman Du, Lei Li. 244-249 [doi]
- Sliding mode control of PMSM based on novel convergence reaching lawXincheng Huang, Wei Jian, Cheng Yang, Yiren Li, Yun Gao, Zhihu Wang. 250-255 [doi]
- Intelligent token-based code clone detection system for large scale source codeAbdulrahman Abu Elkhail, Jan Svacina, Tomás Cerný. 256-260 [doi]
- Case study on data communication in microservice architectureAntonin Smid, Ruolin Wang, Tomás Cerný. 261-267 [doi]
- Vulnerability analysis and optimization of power communication networkGeng Zhang, Jian Hou, Yang Wang, Yanan Wang, Jianguo Zhou. 268-275 [doi]
- Automatic hybrid analysis technique to improve botnet code coverage using fake serverSeong Il Bae, Soo Han Kim, Eul-Gyu Im. 276-282 [doi]
- DGA-based malware detection using DNS traffic analysisJong Youn Lee, Jun Young Chang, Eul-Gyu Im. 283-288 [doi]
- Blockchain-based RBAC for user authentication with anonymityYongJoo Lee, Keon-Myung Lee. 289-294 [doi]
- Iris biometric feature hidden based on chaotic encryptionWenming Jiao, Heng Zhang, Qiyan Zang, Jian Zhang, Hongran Li. 295-299 [doi]
- Machine learning based Android malware classificationYena Lee, Yongmin Kim, SeungYeon Lee, Junyoung Heo, Jiman Hong. 300-302 [doi]