Abstract is missing.
- IOT (Internet of Things) Applications and Current Issues in Korea: Keynote AddressHaeng-Kon Kim. 1 [doi]
- Smart Farming Technology Review: Keynote AddressHyun Yeo. 2 [doi]
- Output-only Structural Damage Detection via Enhanced Random Vibration Analysis using LSTM/GRU modelMatthew Sands, Jongyeop Kim, Jinki Kim. 3-9 [doi]
- Concept of the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AIKazuya Odagiri, Shogo Shimizu, Naohiro Ishii. 10-15 [doi]
- Enhancing UML Connectors with Behavioral SpecificationsAlper Tolga Kocatas, Ali Hikmet Dogru. 16-21 [doi]
- Dolphin Whistle Visualization Framework: MySQL Query ApproachSeongSoo Kim, Yiming Ji, Jongyeop Kim, Eric W. Montie. 22-29 [doi]
- Introduction to Imperative Code Execution Machine - a framework for sustainable Salesforce application developmentPrateek Gupta. 30-38 [doi]
- Predicting Episodic Video Memorability using Deep Features Fusion StrategyHasnain Ali, Syed Omer Gilani, Muhammad Jawad Khan, Asim Waris, Muazzam Ali Khan Khattak, Mohsin Jamil. 39-46 [doi]
- Automatic Detection of Interaction ErrorsNader Kesserwan, Jameela Al-Jaroodi, Nader Mohamed, Imad Jawhar. 47-53 [doi]
- Analysis of Deep Learning Libraries: Keras, PyTorch, and MXnetSeongSoo Kim, Hayden Wimmer, Jongyeop Kim. 54-62 [doi]
- Internal Search Engine and Recommender System with Natural Language Processing in PaaSHerig Recalde, Santiago Soria, Diego Vallejo-Huanga. 63-69 [doi]
- Security Versus Performance Bugs: How Bugs are Handled in the Chromium ProjectAmrit Rajbhandari, Minhaz F. Zibran, Farjana Z. Eishita. 70-76 [doi]
- Finding the Middle Ground: Measuring Passwords for Security and MemorabilityJoshua J. Rodriguez, Minhaz F. Zibran, Farjana Z. Eishita. 77-82 [doi]
- Big Cyber Security Data Analysis with Apache MahouOmotola Adekanbmi, Hayden Wimmer, Jongyeop Kim. 83-90 [doi]
- Towards Internet of Things (IoT) Forensics Analysis on Intelligent Robot Vacuum SystemsHonghe Zhou, Lin Deng, Weifeng Xu, Wei Yu 0002, Josh Dehlinger, Suranjan Chakraborty. 91-98 [doi]
- Hybrid Analysis Based Cross Inspection Framework for Android Malware DetectionBiodoumoye Bokolo, GaganDeep Sur, Qingzhong Liu, Fang Yuan, Fan Liang. 99-105 [doi]
- What is Discussed About Software Engineering Ethics on Stack Exchange (Q&A) Websites? A Case StudyReem Alfayez, Yunyan Ding, Robert Winn, Ghaida Alfayez. 106-111 [doi]
- Automatic Transformation of Natural to Unified Modeling Language: A Systematic ReviewSharif Ahmed, Arif Ahmed, Nasir U. Eisty. 112-119 [doi]
- Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic StudyMd Jobair Hossain Faruk, Santhiya Subramanian, Hossain Shahriar, Maria Valero, Xia Li, Masrura Tasnim. 120-127 [doi]
- Securing Sensitive Data in Java Virtual MachinesLin Deng, Bingyang Wei, Jin Guo, Matt Benke, Tyler Howard, Matt Krause, Aman Patel. 128-131 [doi]
- Supporting Coordination among Participants in Crowdsourcing Software DesignOhoud Al Haqbani, Sultan Alyahya. 132-139 [doi]
- Using Metamorphic Relations to Improve The Effectiveness of Automatically Generated Test CasesPrashanta Saha, Upulee Kanewala. 140-148 [doi]
- Android Feature Selection based on Permissions, Intents, and API CallsFred Guyton, Wei Li 0025, Ling Wang, Ajoy Kumar. 149-154 [doi]
- Automated Testing to Detect Status Data Loss in Android ApplicationsAnusha Konduru, Zhiyong Shan. 155-160 [doi]