<p>Part 1.</p><p>QoS-aware Mapping and Scheduling for Integrated CWDM-PON and WiMAX Network; Siti Hasunah Mohammad, Nadiatulhuda Zulkifli, Sevia Mahdaliza Idrus.</p><p>Resource Management Scheme Based on Position and Direction for Handoff Control in Micro/Pico -Cellular Networks; Dong Chun Lee, Kuinam J. Kim, Jong Chan Lee.</p><p>A Pilot Study of Embedding Android Apps with Arduino for Monitoring Rehabilitation Process; Safyzan Salim, Wan Nurshazwani Wan Zakaria, Muhammad Mahadi Abdul Jamil.</p><p>A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network; NDIBANJE Bruce, Young Jin Kang, Hyeong Rag Kim, Su Hyun Park, Hoon Jae Lee.</p><p>A Noninvasive Sensor System for Discriminating Mobility Pattern on a Bed; Seung Ho Cho, Seokhyang Cho.</p><p>A Fault-Tolerant Multi-Path Multi-Channel Routing Protocol for Cognitive Radio Ad Hoc Networks; Zamree Che-aron, Aisha Hassan Abdalla, Khaizuran Abdullah, Wan Haslina Hassan, Md. Arafatur Rahman.</p><p>Study of Sound and Haptic Feedback in Smart Wearable Devices to Improve Driving Performance of Elders; Chularas Natpratan, Nagul Cooharojananone.</p><p>Indoor WIFI localization on embedded systems; Anya Apavatjrut, Ekkawit Boonyasiwapong.</p><p>Bacterial Foraging-based Power Allocation for Cooperative Wireless Sensor Networks; Mohammad Abdul Azim, Zeyar Aung, Mario E. Rivero-Angeles.</p><p>Part 2.</p><p>Maintaining a trajectory data warehouse under schema changes with the mobile agent view adaptation technique; Wided Oueslati, Jalel akaichi.</p><p>Traffic Analysis in Concurrent Multi-Channel Viewing on P2PTV; Koki Mizutani, Takumi Miyoshi, Olivier Fourmaux.</p><p>Evaluation Method of MANET over Next Generation Optical Wireless Access Network; Muhammad Adam Wong, Nadiatulhuda Zulkifli, Sevia Idrus, Mohamed Elshaikh SAID AHMED.</p><p>A Feedback Mechanism Based on Randomly Suppressed Timer for ForCES Protocol; Lijie Cen, Chuanhuang Li, Weiming Wang.</p><p>Operational Analysis of Arrival Rate-based Queuing Management Mechanism for High-speed Networks; Mohammed M. Kadhum, Selvakumar Manickam.</p><p>E-Government project enquiry framework for a continuous improvement process, A case study in Malaysia and Comoros; Said Abdou Mfoihaya, Mokhtar Mohd Yusof.</p><p>Objective Non-intrusive Conversational VoIP Quality Prediction using Data mining methods; Sake Valaisathien, Vajirasak Vanijja.</p><p>A Hybrid Incentive-based Peer Selection Scheme for Unstructured Peer-to-peer Media Streaming Systems; Victor II Romero, Cedric Angelo Festin.</p><p>A transmission method to improve quality of multimedia in Hybrid Broadcast/ Mobile Networks; Hyung-Yoon Seo, Byungjun Bae, Jong-Deok Kim.</p>HyunJin Kim.<p><p>Revised P2P Data Sharing Scheme over Distributed Cloud Networks; Wonhyuk Lee, TaeYeon Kim, Seungae Kang, HyunCheol Kim.</p><p>LQDV Routing Protocol Implementation Design in Arduino Platform and Xbee module; SY KHANH HO, Myung Kyun Kim.</p><p>A Virtualization and Management Architecture of Micro-Datacenter; Byungyeon Park, Wonhyuk Lee, TaeYeon Kim, HyunCheol Kim.</p><p>Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks; Baidaa Hamza Khudayer, Mohammed M Kadhum, Tat Chee Wan.</p><p>Passive Network Monitoring using REAMS; Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel.</p><p>Low Latency Video Transmission Device; Chanho Park, Hagyoung Kim.</p><p>Part 3.</p><p>Comparative Investigation of Biomedical Contents using Desktop and Tabletop Technologies; Tahir Mustafa Madni Ikram, Yunus B Nayan, Suziah Bt Sulaiman, Muhammad Tahir.</p><p>Dynamic-Time-Warping Analysis of Feature-Vector Reliability for Cognitive Stimulation Therapy Assessment; Tuan Pham.</p><p>An Algorithm for Rock Pore Image Segmentation; Zhang Jiqun, Hu Chungjin, Liu Xin, He Dongmei, Li Hua.</p><p>Action Recognition by Extracting Pyramidal Motion Features from Skeleton Sequences; Guoliang LU, Yiqi ZHOU, Xueyong LI, Chen LV.</p><p>P-PCC: Parallel Pearson Correlation Condition for Robust Cosmetic Makeup Face Recognitions; Kanokmon Rujirakul, Chakchai So-In.</p><p>Flight Simulator for Serious Gaming; Aruni Nisansala, Maheshya Weerasinghe, Kapila Dias, Damitha Sandaruwan, Chamath Keppitiyagama, Nihal Kodikara, Chamal Perera, Prabhath Samarasinghe.</p><p>Potential Z-Fighting Conflict Detection System in 3D Level Design Tools; Pisal Setthawong.</p><p>Efficient Motion Vector Algorithms for Faster Implementation of HEVC/H.265 Video Coding; Edward Jaja, Zaid Omar, Ab Al-Hadi Ab Rahman, Mun'im Zabidi.</p><p>A Synthesis of 2D Mammographic Image Using Super-Resolution Technique: A Phantom Study; Surangkana Kantharak, Thanarat H. Chalidabhongse, Jenjeera Prueksadee.</p><p>Using complex events to represent domain concepts in graphs; Riley Tipton Perry, Cat Kutay, Fethi Rabhi.</p><p>Unequal Loss Protection Mechanism for Wi-Fi based Broadcasting system using a Video Quality Prediction Model; Dong Hyun Kim, Hyeong Yun Seo, Byungjun Bae, Jong Deok Kim.</p><p>An Approximate Matching Preprocessing for Efficient Phase-Only Correlation-Based Image Retrieval; Honghang Wang, Masayoshi Aritsugi.</p><p>Pixel Art Color Palette Synthesis; Ming-Rong Huang, Ruen-Rone Lee.</p><p>Introducing a New Radiation Detecting Device Calibration Method and Estimating 3D Distance to Radiation Sources; Pathum Rathnayaka, Seung-Hae Baek, Soon-Yong Park.</p><p>Integrating Feature Descriptors to Scanpath-based Decoding of Deformed Barcode Images; Poonna Yospanya, Yachai Limpiyakorn.</p><p>Detecting and extracting text in video via sparse representation based classification method; Bo Sun, Yang Wu, Yongkang Xiao, Jun. </p><p>Part 4.</p><p>A Cost Model for Client-Side CaaS; Chaturong Sriwiroj, Thepparit Banditwattanawong.</p><p>A Reliability Analysis of Cascaded TMR Systems; Hyun Joo Yi, Tae-Sun Chung, Sungsoo Kim.</p><p>Availability Analysis for A Data Center Cooling System with (n,k)-way CRACs; Sohyun Koo, Tae-Sun Chung, Sungsoo Kim.</p><p>A Recovery Model for Improving Reliability of PCM WL-Reviver System; Taehoon Roh, Tae-Sun Chung, Sungsoo Kim.</p><p>Real-time Sitting Posture Monitoring System for Functional Scoliosis Patients; Ji-Yong Jung, Soo-Kyung Bok, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim.</p><p>Part 5.</p><p>Decreasing Size of Parameter for Computing Greatest Common Divisor to Speed up New Factorization Algorithm Based on Pollard Rho; Kritsanapong Somsuk.</p><p>Network Security Situation Assessment: A Review and Discussion; Yu Beng Leau, Selvakumar Manickam.</p><p>Protecting Binary Files from Stack-Based Buffer Overflow; Sahel Alouneh, Heba Bsoul, Mazen Kharbutli.</p><p>Meet-in-the-middle Attack with Splice-and-Cut Technique on the 19-round Variant of Block Cipher HIGHT; Yasutaka Igarashi, Ryutaro Sueyoshi, Toshinobu Kaneko, Takayasu Fuchida.</p><p>Nonintrusive SSL/TLS Proxy with JSON-Based Policy; Suhairi Mohd Jawi, Fakariah Hani Mohd Ali , Nurul Huda Nik Zulkipli.</p><p>Secure Problem Solving Scheme by Encrypted Computing; Hiroshi Yamaguchi, Phillip Sheu, Shigeo Tsujii.</p><p>Anomaly Detection from Log Files Using Data Mining Techniques; Jakub Breier, Jana Branisova.</p><p>Improved Remote User Trust Evaluation Scheme to apply to Social Network Services; Youngwoong Kim, Younsung Choi, Dongho Won.</p><p>Threat assessment model for mobile malware; Thanh van Do, Fredrik B. Lyche, Jørgen Lytskjod, Van Thuan Do.</p><p>Performance Evaluation of System Resources Utilization with Sandboxing Applications; Tarek Helmy, Ismail Keshta, Abdallah Rashed.</p><p>Fault Attacks by using Voltage and Temperature Variations: An Investigation and Analysis of Experimental Environment; Young Sil Lee, Non Thiranant, HyeongRag Kim, JungBok Jo, HoonJae Lee.</p><p>Pseudoinverse Matrix over Finite Field and Its Applications; Van Dang, Thuc Nguyen.</p><p>Multi-Agent based Framework for Time-correlated Alert Detection of Volume Attacks; Abimbola Olabelurin, Georgios Kallos, Suresh Veluru, Muttukrishnan Rajarajan.</p><p>Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis; HyunHo Kim, Bruce Ndibanje, HoonJae Lee, YongJe Choi, Dooho Choi.</p><p>Exploring Bad Behaviors from Email Logs; Supachai Kanchanapokin, Sirapat Boonkrong.</p><p>Using PKI to Provide Credential Delegation in non-Web-based Federations; Daniel Kouril, Marcel Poul, Michal Prochazka.</p><p>Modeling and Simulation of Identification Protocol for Wireless Medical Devices in Healthcare System Communication; Hyun Ho Kim, Bruce Ndibanje, Hyun Su Park, JungBok Jo, Hoon Jae Lee.</p><p>A Method for Web Security Context Patterns Development from User Interface Guidelines based on Structural and Textual Analysis; Pattariya Singpant, Nakornthip Prompoon.</p><p>A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography; Mohammed Salem Atoum.</p><p>Review of Digital Investigation Frameworks; Ritu Agarwal, Suvarna Kothari.</p><p>Part 6.</p><p>Knowledge Discovery in Dynamic Data Using Neural Networks; </p><p>Data Mining for Industrial System Identification: A Turning Process; Karin Kandananond.</p><p>Investigating the Effectiveness of E-mail Spam Image Data for Phone Spam Image Detection using Scale Invariant Feature Transform Image Descriptor; So Yeon Kim, Kyung-Ah Sohn.</p><p>Features extraction for classification of focal and non-focal EEG signals; Khushnandan Rai, Varun Bajaj, Anil Kumar.</p><p>Relations on Intuitionistic Fuzzy Soft Multi Sets; Anjan Mukherjee, Ajoy Das.</p><p>Towards Automatically Retrieving Discoveries and Generating Ontologies; Kenneth Cosh.</p><p>Improving process models discovery using AXOR Clustering Algorithm; Hanane Ariouat, Kamel Barkaoui, Jacky Akoka.</p><p>Simple approaches of sentiment analysis via ensemble learning; Tawunrat Chalothorn, Jeremy Ellman.</p><p>Effective Trajectory Similarity Measure for Moving Objects in Real-world Scene; Moonsoo Ra, Chiawei Lim, Yong Ho Song, Jechang Jung, Whoi-Yul Kim.</p><p>A Prediction of Engineering Students Performance from Core Engineering Course using Classification; Nachirat Rachburee, Wattana Punlumjeak, Sitti Rugtanom, Deachrut Jaithavil, Manoch Pracha.</p><p>Evolutionary Circular-ELM for the reduced-reference assessment of perceived image quality; Sarutte Atsawaraungsuk, Punyaphol Horata.</p><p>Enhanced Web page Cleaning for Constructing Social Media Text Corpora; Melanie Neunerdt, Eva Reimer, Michael Reyer, Rudolf Mathar.</p><p>Finding Knee Solutions in Multi-objective Optimization using Extended Angle Dominance Approach; Sufian Sudeng, Naruemon Wattanapongsakorn.</p><p>Affective Learning Analysis of Children in a Card Sorting Game; Marini Othman, Abdul Wahab Abdul Rahman, Abdul Qayoom Hamal, Mohd Syarqawy Hamzah, Muhamad Sadry Abu Seman.</p><p>Application of Mean and Median Frequency Methods for Identification of Human Joint Angles Using EMG Signal; Sirinee Thongpanja, Angkoon Phinyomark, Chusak Limsakul, Pornchai Phukpattaranont.</p><p>A study of Big Data solution using Hadoop to process Connected vehicle's Diagnostics data; Lionel Nkenyereye, Jong-Wook Jang.</p><p>Wiki SaGa: an Interactive Timeline to Visualize Historical Documents; Daniel Tan, Balisoamanandray Ranaivo-Malancon, Narayanan Kulathuramaiyer.</p><p>Discovering genomic associations on cancer datasets by applying sparse regression methods; Reddy Rani Vangimalla, KyungAh Sohn.</p><p>The Adaptive Dynamic Clustering of Neuro-Fuzzy System for Classification; Phichit Napook, Narissara Eiamkanitchat.</p><p>A Hybrid Approach of Neural Network and Level-2 Fuzzy set; Jirawat Teyakome, Narissara Eiamkanitchat.</p><p>Developing Term Weighting Scheme based on Term Occurrence Ratio for Sentiment Analysis; Nivet Chirawichitchai.</p><p>A Comparison of Artificial Neural Network and Regression Model for Predicting the Rice Production in Lower Northern Thailand; Anamai Na-udom, Jaratsri Rungrattanaubol.</p><p>Study on Local Path Planning for Collision Avoidance in Vehicle-to-Vehicle Communication Environment; Gyoung-eun Kim, Byeong-woo Kim.</p><p>Vehicle Position Estimation using Tire Model; Jae-woo Yoon, Byeong-woo Kim.</p><p>I know when you are happy - Emotion Detection; Abhishek Singh Kilak, Namita Mittal.</p><p>Interconnection Learning between Economic Indicators in Indonesia Optimized by Genetic Algorithm; Siti Saadah, Gia Septiana Wulandari.</p><p>Classification Prediction of the Foot Disease Pattern Using Decision Tree Model; Jung-Kyu Choi, Yonggwan Won, Jung-Ja Kim.</p><p>Non-Preference Based Pruning Algorithm for Multi-Objective Redundancy Allocation Problem; Tipwimol Sooktip, Naruemon Wattanapongsakorn, Sanan Srakaew.</p><p>A Combined AdaBoost and NEWFM Technique for Medical Data Classification; Khaled A. Abuhasel, Abdullah M. Iliyasu, Chastine Fatichah.</p><p>On sentence length distribution as an authorship attribute; Miro Lehtonen.</p><p>Learning models for activity recognition in smart homes; Labiba Gillani Fahad, Arshad Ali, Muttukrishnan Rajarajan.</p><p>Tackling Class Imbalance Problem in Binary Classification using Augmented Neighborhood Cleaning Algorithm; Nadyah Obaid Al Abdouli, Zeyar Aung, Wei Lee Woon, Davor Svetinovic.</p><p>Part 7.</p><p>Software Effective Risk Management: An Evaluation of Risk Management Process Models and Standards; Jafreezal Jaafar, Uzair Iqbal Janjua, Fong Woon Lai.</p><p>Validating Reusability of Software Projects using Object-Oriented Design Metrics; Zhamri Che Ani, Shuib Basri, Aliza Sarlan.</p><p>Plasticine Scrum: An Alternative Solution for Simulating Scrum Software Development; Sakgasit Ramingwong , Lachana Ramingwong.</p><p>Understanding of Agile Project Manager Competencies; Kamalrufadillah Sutling, Zulkefli Mansor, Setyawan Widyarto, Sukumar Lecthmunan, Noor Habibah Arshad.</p><p>Design IP Camera for Android-Based system using the Around-View; Gyu-Hyun Kim, Jong-Wook Jang.</p><p>Identification of Opportunities for Move Method Refactoring Using Decision Theory; Siriwan Boonkwan, Pornsiri Muenchaisri.</p><p>Requirements Engineering for Cloud Computing in University Using iStar Hierarchy Method; Sandfreni Sandfreni, Nabila Rizky Oktadini, Kridanto Surendro.</p><p>Power Consumption Profiling Method based on Android Application Usage; Hiroki Furusho, Kenji Hisazumi, Takeshi Kamiyama, Hiroshi Inamura, Tsuneo Nakanishi, Akira Fukuda.</p><p>Evergreen Software Preservation: The Conceptual Framework of Anti-Ageing Model; Jamaiah Yahaya, Aziz Deraman, Zuriani Hayati Abdullah.</p><p>A Framework Analysis for Distributed Interactive Multimedia System on Location-based Service; Shan Liu, Jianping Chai.</p><p>An Empirical Validation of Coupling and Cohesion Metrics as Testability Indicators; Amos Orenyi Bajeh, Shuib Basri, Low Tan Jung.</p><p>Software Defect Prediction in Imbalanced Data Sets Using Unbiased Support Vector Machine; Teerawit Choeikiwong, Peerapon Vateekul.</p><p>Evaluation of Separated Concerns in Web-based Delivery of User Interfaces; Tomas Cerny, Lubos Matl, Karel Cemus, Michael Donahoo.</p><p>Separating out Platform-independent Particles of User Interface; Tomas Cerny, Michael Donahoo.</p><p>Implementing Personal Software Process in Undergraduate Course to Improve Model-View-Controller Software Construction; Wacharapong Nachiengmai, Sakgasit Ramingwong.</p><p>Part 8.</p><p>Personalized Care Recommendation Approach for Diabetes patients Using Ontology and SWRL; Benjamas Hempho, Ngamnij Arch-int, Somjit Arch-int, Cherdpan Pattarapongsin.</p><p>An Experimental Study for Neighbor Selection in Collaborative Filtering; Soojung Lee.</p><p>Transforming e-Procurement Platforms for PEPPOL and WCAG 2.0 Compliance - The anoGov-PEPPOL Project; Jose Martins, Joao Barroso, Ramiro Goncalves, Andre Sousa, Miguel Bacelar, Hugo Paredes.</p><p>Analzying Developer Behevior and Community Structure In Software Crowdsourcing; Hui Zhang, Wu Yuchuan, Wu Wenjun.</p><p>A Semantic Similarity Assessment Tool for Computer Science Subjects Using Extended Wu & Palmer's Algorithm and Ontology; Chayan Nuntawong, Chakkrit Snae Namahoot, Michael Bruckner.</p><p>Comparison of Architecture-Centric Model-Driven Web Engineering and Abstract Behavioural Specification in Constructing Software Product Line for Web Application; Daya Adianto, Maya Retno Ayu Setyautami, Salman El Farisi.</p><p>Prediction of Query Satisfaction Based on CQA-Oriented Browsing Behaviors; Junxia Guo, Hao Han, Cheng Gao, Takashi Nakayama, Keizo Oyama.</p><p>The Competition-based Information Propagation in Online Social Networks; Liyuan Sun, Yadong Zhou, Xiaohong Guan.</p><p>e-Learning Recommender System for Teachers using Opinion Mining; Anand Shanker Tewari, Anita Saroj, Asim Gopal Barman.</p><p>Part 9: ICWCIA.</p><p>Evaluating Heuristic Optimization, Bio-Inspired and Graph-Theoretic Algorithms for the Generation of Fault-Tolerant Graphs with Minimal Costs; Matthias Becker, Markus Kromker, Helena Szczerbicka.</p><p>Part 10: IWICT.</p><p>Real-time Night Visibility Enhancement Algorithm Using the Similarity of Inverted Night Image and Fog Image; Jae-Won Lee, Bae-Ho Lee, Yongkwan Won, Cheol-Hong Kim, Sung-Hoon Hong.<p>Service Protection mechanism Using VPN GW Hiding Techniques; PyungKoo Park, GyungTae Hong, SeongMin Yoo, HoYong Ryu, Jaehyung Park, JaeCheol Ryou.</p><p>Networking Service Availability Analysis of 2N Redundancy Model with Non-Stop Forwarding; Dong-Hyun Kim, Jae-Chan Shim, Ho-Yong Ryu, Jaehyung Park, Yutae Lee.</p><p>Property Analysis of Classifiers for Sleep Snoring Detection; Tan Loc Nguyen, Young Y Lee, Su-il Choi , Yonggwan Won.</p><p>An Innovative Detection Method Integrating Hybrid Sensors for Motorized Wheelchairs; Sanghyun Park, Hyunyoung Kim, Jinsul Kim, Taeksoo Ji, Myoung Jin Lee.</p><p>Part 11: IWSATA.</p><p>Road Weather Information transmission method for digital multimedia broadcasting; SangWoon Lee.</p><p>Color Overlapping Method of Projection System on LEDs; Yongseok Chi, Youngseop Kim, Je-Ho Park, Kyoungro Yoon, Cheong-Ghil Kim, Yong-Hwan Lee.</p><p>A System Design for Audio Level Measurement based on ITU-R BS.1770-3; Sang Woon Lee, Hyun Woo Lee, Cheong Ghil Kim.</p><p>A Prototype Implementation of Contents Sharing System on Networked Heterogeneous Devices; Cheong Ghil Kim, Dae Seung Park.</p>