Abstract is missing.
- Benefits and Challenges in the Use of Big Data and AILiz Bacon. 1 [doi]
- Implemention BiSS Communication of Encoder System without Slave ModuleHo Yong Jin, Jae-Wan Park, Jae Wook Jeon. 1-6 [doi]
- Optimized Common Parameter Set Extraction by Benchmarking Applications on a Big Data PlatformJongyeop Kim, Abhilash Kancharla, Jongho Seol, Noh-Jin Park, Nohpill Park. 1-7 [doi]
- Functional Expansion of Morphological Analyzer For Efficient Korean ParsingSeungwon Yang, Jongseok Lee. 1-5 [doi]
- Surface Problems in Information Science Keynote AddressNaohiro Ishii. 2 [doi]
- Applying Deep Learning to Preserve Data Confidentiality Keynote AddressXiaohi Cui. 3 [doi]
- Interactive Distance Media Learning Collaborative Based on Virtual Reality with Solar System SubjectMoh. Zikky, Kholid Fathoni, Miftakhul Firdaus. 4-9 [doi]
- Analysis of Android Camera Spoofing TechniquesBulat Saifullin, Rasheed Hussain, Ali Abdulmadzidov, Jooyoung Lee, Adil Mehmood Khan, Muhammad Ahmad. 10-14 [doi]
- A 3D Topology Optimization Scheme for M2M CommunicationsYalong Wu, Wei Yu 0002, Jin Zhang, David W. Griffith, Nada Golmie, Chao Lu 0002. 15-20 [doi]
- An SDN-Based Approach to Support Dynamic Operations of Multi-Domain Heterogeneous MANETsJames Nguyen, Wei Yu. 21-26 [doi]
- A Privacy Preserving Framework for the Internet of ThingsDhiah el Diehn I. Abou-Tair, Simon Buchsenstein, Ala F. Khalifeh. 27-31 [doi]
- Performance Control of Semiconductor Optical Amplifier and Fiber Raman Amplifier in Communication SystemRoby Ikhsan, Romi Fadli Syahputra, Saktioto, Okfalisa. 32-36 [doi]
- Achievable Rates and Spectral Efficiency Analysis in Massive MIMO Systems with MMSE Channel EstimationRazu Ahmed, Emmanuel Obeng Asiedu. 37-42 [doi]
- SDN-SDWSN Controller Fault Tolerance Framework for Small to Medium Sized NetworksBassey Isong, Ishmael Mathebula, Nosipho Dladlu. 43-51 [doi]
- Re-weighting Relevance Feedback in HSV Quantization for CBIRJasman Pardede, Benhard Sitohang, Saiful Akbar, Masayu Leylia Khodra. 58-63 [doi]
- An Improvement on ArUco Marker for Pose Tracking Using Kalman FilterHo Chuen Kam, Ying Kin Yu, Kin-hong Wong. 65-69 [doi]
- Human Body Model using Multiple Depth Camera for Gait AnalysisWonjin Kim, Yanggon Kim. 70-75 [doi]
- Parallelize Simulated Annealing Heuristics with GPUsMohammad Harun Rashid, Lixin Tao. 76-81 [doi]
- A GPU Accelerated Parallel Heuristic for Travelling Salesman ProblemMohammad Harun Rashid. 82-86 [doi]
- Performance of Convolution Neural Network based on Multiple GPUs with Different Data Communication ModelsChe-Lun Hung, Yi-Yang Lin, Chuan Yi Tang, Chilung Wang, Ming-Chiang Chen. 87-92 [doi]
- Hadoop based Demography Big Data Management SystemSyeda Sana Bukhari, JinHyuck Park, Dong Ryeol Shin. 93-98 [doi]
- OpenFlow-based Server Cluster with Dynamic Load BalancingHsien-Yi Liu, Ching-Yi Chiang, Hui-Sheng Cheng, Mei-Ling Chiang. 99-104 [doi]
- An Improved Partitioning Heuristic for Solving TSP: An Empirical StudyMohamed Abdellahi Amar, Walid Khaznaji, Monia Bellalouna. 105-110 [doi]
- A Fast GPU Point-cloud Registration AlgorithmMd Mushfiqur Rahman, Panagiota Galanakou, Georgios Kalantzis. 111-116 [doi]
- Acceleration of a CUDA-Based Hybrid Genetic Algorithm and its Application to a Flexible Flow Shop Scheduling ProblemJia Luo, Didier El Baz, Jinglu Hu. 117-122 [doi]
- Evaluation of Embedded Systems for Automotive Image ProcessingTrung Tin Duong, Jung Hwan Seo, Thi Dinh Tran, Byun Jin Young, Jae Wook Jeon. 123-128 [doi]
- Social Media Comment Management using SMOTE and Random Forest AlgorithmsNuanwan Soonthornphisaj, Taratep Sira-Aksorn, Pornchanok Suksankawanich. 129-134 [doi]
- Stock Market Movement Prediction using LDA-Online Learning ModelTanapon Tantisripreecha, Nuanwan Soonthornphisaj. 135-139 [doi]
- Tuning Deep Learning Performance for Android Malware DetectionJarrett Booz, Josh McGiff, William G. Hatcher, Wei Yu 0002, James H. Nguyen, Chao Lu 0002. 140-145 [doi]
- Multi-label Class-imbalanced Action Recognition in Hockey Videos via 3D Convolutional Neural NetworksKonstantin Sozykin, Stanislav Protasov, Adil Khan, Rasheed Hussain, Jooyoung Lee. 146-151 [doi]
- Recommendation Statements Identification in Clinical Practice Guidelines Using Heuristic PatternsMusarrat Hussain, Jamil Hussain, Muhammad Sadiq, Anees Ul Hassan, Sungyoung Lee. 152-156 [doi]
- Branching Artificial Neural Ensemble (BRANE): Supervised Learning For Missing DataMuhammad Wasimuddin, Viyaleta Peterson, Karan Manoj Bhosale, JeongKyu Lee. 157-162 [doi]
- Improved Multiplication Algorithm by Clearing Leading Zeros of Binary Numbers based on Big Data AnalysisDonghoon Kim, Jaehee Jung. 163-168 [doi]
- A Beforehand Extraction Method for Dynamic Software Birthmarks using Unit Test CodesTakanori Yokoi, Haruaki Tamada. 169-175 [doi]
- An Analysis of Music Lyrics by Measuring the Distance of Emotion and SentimentJinhyuck Choi, Jin-Hee Song, Yanggon Kim. 176-181 [doi]
- Improving Short Text Classification Using Fast Semantic Expansion on Multichannel Convolutional Neural NetworkNatthapat Sotthisopha, Peerapon Vateekul. 182-187 [doi]
- Estimation Improvement of Objective Scores of Answer Statements with Consideration of Semantic SimilarityYuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya. 188-193 [doi]
- The Comparison of Linear Regression Method and K-Nearest Neighbors in Scholarship RecipientOkfalisa, Ratika Fitriani, Yelfi Vitriani. 194-199 [doi]
- Defective Fiducial Mark Detection Using Machine LearningDo Gyu An, Jung Won Jung, Jae Wook Jeon. 200-205 [doi]
- Speeding up Incomplete Data Analysis using Matrix-Represented ApproximationsThin Thin Soe, Myat Myat Min. 206-211 [doi]
- A Neural Language Model for Multi-Dimensional Textual Data based on CNN-LSTM NetworkSeong Ik Park, Jin-Hee Song, Yanggon Kim. 212-217 [doi]
- Hybrid Intrusion Detection System using K-Means and Random Tree AlgorithmsYi Yi Aung, Myat Myat Min. 218-223 [doi]
- Modeling Stock Prices with Text Contents in 10-Q ReportsWonho Lee, Bongwon Suh. 224-229 [doi]
- Estimating Procedure for Function Point Analysis in KoreaByeongdo Kang, Jongseok Lee. 230-233 [doi]
- Study on Detection Algorithm of Live Animal in Self-Bag-Drop Kiosk in Airport Using UWB RadarKiwon Jung, Younghwan Bang, Sun-Myung Hwang. 242-245 [doi]
- Proposed Quality of an Enterprise Architecture ModelSri Agustina Rumapea, Benhard Sitohang, Yudistira Dwi Wardhana Asnar. 246-250 [doi]
- Traffic Adaptive Hybrid MAC with QoS Driven Energy Efficiency for WSNs Through Joint Dynamic Scheduling ModeJawad Ahmad Haqbeen, Takayuki Ito, Takanobu Otsuka, Mohammad Arifuzzaman. 252-258 [doi]
- Energy Efficient Protocol for Corona-Based Wireless Sensor NetworkChih-Min Chao, Cheng-Hong Jiang. 259-264 [doi]
- Barnacles Mating Optimizer: A Bio-Inspired Algorithm for Solving Optimization ProblemsMohd Herwan Sulaiman, Zuriani Mustaffa, Mohd Mawardi Saari, Hamdan Daniyal, Mohd Razali Daud, Saifudin Razali, Amir Izzani Mohamed. 265-270 [doi]
- Dengue Outbreak Prediction: Hybrid Meta-heuristic ModelZuriani Mustaffa, Mohd Herwan Sulaiman, Ferda Ernawan, Yuhanis Yusof, Mohamad Farhan Mohamad Mohsin. 271-274 [doi]
- Solving the Optimal Reactive Power Dispatch Problem Based on Moth-Flame Optimizer for Power System Operation and PlanningZuriani Mustaffa, Mohd Herwan Sulaiman, Rebecca Ng Shin Mei, Hamdan Daniyal, Muhammad Ikram Mohd Rashid, Nidzamuddeen Ishak. 275-280 [doi]
- Robust Pedestrian Detection via a Recursive Convolution Neural NetworkDinh Thi Tran, Vinh Dinh Nguyen, Jae Wook Jeon. 281-286 [doi]
- An Ontology-based Knowledge Acquisition for PDMWisarat Srisungnoen, Wiwat Vatanawood. 287-292 [doi]
- Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware DetectionMohit Sewak, Sanjay K. Sahay, Hemant Rathore. 293-296 [doi]
- Tracking by Recognition Using Neural NetworkZhiliang Zeng, Ying Kin Yu, Kin-hong Wong. 297-301 [doi]
- Color Classification based on Pixel Intensity ValuesJanya Sainui, Paiboon Pattanasatean. 302-306 [doi]
- Semantic Oriented Algorithm Design: A Case of Median SelectionYucong Duan. 307-311 [doi]
- Mining Profitable High Frequency Pairs Trading Forex Signal Using Copula and Deep Neural NetworkCarlin C. F. Chu, Po Kin Chan. 312-316 [doi]
- Global Minimal Diagnosis Algorithm For Repair Incoherent Mappings in Ontology AlignmentInne Gartina Husein, Benhard Sitohang, Saiful Akbar, Fazat Nur Azizah. 317-321 [doi]
- Are Identifier Renaming Methods Secure?Yosuke Isobe, Haruaki Tamada. 322-328 [doi]
- Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal InvestigationsWaqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan. 329-334 [doi]
- Component-based Engineering of Web User Interface Designs for Evolutionary OptimizationMaxim Bakaev, Vladimir Khvorostov. 335-340 [doi]
- Nominal Metaphor Identification Using Myanmar WordNet and Bilingual DictionariesSheinn Thawtar Oo, Aye Thida. 341-346 [doi]
- Formalism of Stochastic Queueing Network using Stochastic Petri NetsKesinee Soomanat, Wiwat Vatanawood. 347-351 [doi]
- Event-B Formalization of Basic Supply Chain PatternsChalika Saksupawattanakul, Wiwat Vatanawood. 352-357 [doi]
- Study Relational Database Transformation to OntologyParamita Mayadewi, Benhard Sitohang, Fazat Nur Azizah. 358-362 [doi]
- Improving Patient Outcomes through Customized LearningMajed Almotairi, Mohammed Abdulkareem Alyami, Lawrence Aikins, Yeong-Tae Song. 363-368 [doi]
- Analysis and Testing of Key Performance Indexes of Vxworks in Real-Time SystemMo Li, Zhigang Shang, Quan Hu, Guizhi Yang, Ya Li, Fengli Sun. 369-374 [doi]
- A Software Quality Quantifying Method Based on Preference and Benchmark DataXiaojian Liu, Yangyang Zhang, Xiuming Yu, Zengzhi Liu. 375-379 [doi]
- Development and Reconstitution of Software Quality Measurement and Evaluation StandardsYangyang Zhang, Xiaojian Liu, Zengzhi Liu, Wenpeng Li. 380-384 [doi]
- Research on Software Quality Assurance Based on Software Quality Standards and Technology ManagementPeng Shen, Xiaoming Ding, Wenjun Ren, Chujun Yang. 385-390 [doi]
- Variable Strength Combinatorial Test Data Generation Using Enhanced Bird Swarm AlgorithmLizhi Cai, Yang Zhang, Weijia Ji. 391-398 [doi]
- Comparative Study on Defect Prediction Algorithms of Supervised Learning Software Based on Imbalanced Classification Data SetsJianxin Ge, Jiaomin Liu, Wenyuan Liu. 399-406 [doi]
- Application of Requirement-oriented Data Quality Evaluation MethodZhenyu Liu, Qiang Chen, Lizhi Cai. 407-412 [doi]