default search action
CSA/CUTE 2016: Bangkok, Thailand
- James J. Park, Yi Pan, Gangman Yi, Vincenzo Loia:
Advances in Computer Science and Ubiquitous Computing - CSA/CUTE 2016, Bangkok, Thailand, 19-21 December. Lecture Notes in Electrical Engineering 421, Springer 2017, ISBN 978-981-10-3022-2
Advances in Information Technologies and Applications
- Sarut Panjan, Siam Charoenseang:
Design and Development of a Robotic Arm for Rehabilitation and Training. 3-8 - Myoungbeom Chung, IlJu Ko:
Detection of a Robust High-Frequency Range via Noise Analysis in a Real-World Environment. 9-15 - Ganjar Alfian, Hyejung Ahn, Yoonmo Shin, Jaeho Lee, Jongtae Rhee:
Intelligent Food Distribution Monitoring System. 16-22 - Jea-Hui Cha, Tae-Hyoung Kim, Jong-Wook Jang:
Design of Sudden Unintended Acceleration Check System Using Distance Measurement Sensor. 23-28 - Seongmin Baek, Myunggyu Kim:
Real-Time Dynamic Motion Capture Using Multiple Kinects. 29-35 - Yan Li, Byeong-Seok Shin:
Cell-Based Indexing Method for Spatial Data Management in Hybrid Cloud Systems. 36-41 - YunHee Kang, Soong-ho Ko, KyoungWoo Kang:
SOA Based Equipment Data Management System for Smart Factory. 42-47 - Sanggyu Shin, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto:
The Problem Analysis of Specific Personal Information Protection Assessment in Japan Case. 48-53 - Jing Liu, Yongjun Wang, Peidai Xie, Xingkong Ma:
Using a Fine-Grained Hybrid Feature for Malware Similarity Analysis. 54-60 - MengXuan Li, Wei Song, Liang Song, Kaisi Huang, Yulong Xi, Kyungeun Cho:
A Wireless Kinect Sensor Network System for Virtual Reality Applications. 61-65 - Anunpattana Punyawee, Chetprayoon Panumate, Hiroyuki Iida:
Finding Comfortable Settings of Snake Game Using Game Refinement Measurement. 66-73 - Seong-Min Park, Han-Chul Bae, Young Tae Cha, Hwan-Kuk Kim:
Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection Technology. 74-80 - Shih-Yun Huang, Hsin-Hung Cho, Yu-Zen Wang, Timothy K. Shih, Han-Chieh Chao:
Initialization of Software Defined Wireless Bacteria-Inspired Network Platform. 81-86 - Yuan Zhou, Hongbiao Gao, Jingde Cheng:
An Extension of QSL for E-voting Systems. 87-96 - Soojin Yoon, Hyun Lock Choo, Hanchul Bae, Hwankuk Kim:
Behavior-Based Detection for Malicious Script-Based Attack. 97-103 - Guang-Ho Cha:
The SP-tree: A Clustered Index Structure for Efficient Sequential Access. 104-110 - Jaeho Lee, Bong-Ki Son:
An Address Conflict Resolving Scheme of Inter-drone Ad Hoc Communications for Hide Densely Deployed Low Power Wide Area Networks. 111-116 - Donggyu Kim, Unil Yun:
State-of-the-Art Algorithms for Mining Up-to-Date High Average-Utility Patterns. 117-121 - Unil Yun, Heungmo Ryang:
Design of Shoot'em up Game Using OpenGL. 122-126 - Heungmo Ryang, Unil Yun:
Performance Analysis of Tree-Based Algorithms for Incremental High Utility Pattern Mining. 127-131 - Wooseong Jeong, Unil Yun:
Development of 2D Side-Scrolling Running Game Using the Unity 3D Game Engine. 132-136 - Bong-Ki Son, Jaeho Lee:
EPD Noticeboard for Posting Multiple Information. 137-142 - Lionel Nkenyereye, Jong-Wook Jang:
Design of Processing Model for Connected Car Data Using Big Data Technology. 143-148 - Dae-Young Kim, Seokhoon Kim:
Efficient Path Selection for IoT Devices in Heterogeneous Service Environments. 149-153 - Supawadee Srikamdee, Sunisa Rimcharoen, Nutthanon Leelathakul:
Forecasting Sugarcane Yield Using (μ+λ) Adaptive Evolution Strategies. 154-159 - Seok-Hyeon Han, Hyun-Woo Kim, Young-Sik Jeong:
Resource Pooling Mechanism for Mobile Cloud Computing Service. 160-165 - Sora Lim, Yongjin Kwon:
IPC Multi-label Classification Applying the Characteristics of Patent Documents. 166-172 - Euihyun Jung:
A Comparison of Data Mining Methods in Analyzing Educational Data. 173-178 - Tao Zhang, Zhilong Wang:
A New Secure Android Model Based on Privilege. 179-184 - Byeong-Seok Park, Yoon-A. Heo, Young-Sik Jeong:
Survey of MCC Architectures for Computing Service. 185-191 - Chui Young Yoon:
Measurement of Enterprise Smart Business Capability in a Global Management Environment. 192-197 - Sangyoon Kim, Moonhyun Kim:
Occluded Pedestrian Classification Using Gradient Patch and Convolutional Neural Networks. 198-204 - Sang-Hyeon Park, Jeong-Ho Kim, Moon-Seog Jun:
A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment. 205-210 - Jae Seung Lee, Jaehwa Chung, Sangkee Suk:
A Design of Certificateless-Based Device Authentication Scheme in the SmartHome Environment. 211-214 - Geunil Park, Bumryong Kim, Moon-Seog Jun:
A Design of Secure Authentication Method Using Zero Knowledge Proof in Smart-Home Environment. 215-220 - Mansik Kim, Hyungjoo Kim, Jungho Kang, Jaesoo Kim:
Drone Classification by Available Control Distances. 221-223 - Hague-Chung, Keun-Chang Choi, Moon-Seog Jun:
A Design of Key Agreement Scheme Between Lightweight Devices in IoT Environment. 224-229 - Tai-Yeon Ku, Hee-Sun Won, Hoon Choi:
Platform Independent Workflow Mechanism for Bigdata Analytics. 230-235 - Hua Li, Huamin Yang, Chao Xu, Yuling Cao:
Water Surface Simulation Based on Perlin Noise and Secondary Distorted Textures. 236-245 - Mai Thanh Nhat Truong, Sanghoon Kim:
Optimization for Particle Filter-Based Object Tracking in Embedded Systems Using Parallel Programming. 246-252 - Chao Li, Lili Guo, Zheng Dou, Guangzhen Si, Chunmei Li:
Generalized Multi-linear Mixed Effects Model. 253-258 - Qingsong Feng, Zheng Dou, Chunmei Li, Guangzhen Si:
Anomaly Detection of Spectrum in Wireless Communication via Deep Autoencoder. 259-265 - Zheng Dou, Zi Xiao, Yang Zhao, Jinyu Wang:
A Modified Complex ICA for Blind Source Separation and the Application in Communication Reconnaissance. 266-272 - JongBeom Lim, HeonChang Yu, Joon-Min Gil:
Sensor Coverage Problem in Sparse MANET Environments. 273-278 - Dong-Wan Joe, Jae-Sung Shim, Yong-Wan Ju, Seok-Cheon Park:
Design of Jitter Buffer Control Algorithm for Guaranteeing the Medical Information Data Transmission Quality in Wireless Network Environment. 279-284 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang:
Student's-t Mixture Model Based Excepted Patch Log Likelihood Method for Image Denoising. 285-290 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang:
Regularization Parameter Selection for Gaussian Mixture Model Based Image Denoising Method. 291-297 - Yuhui Zheng, Xiaozhou Zhou, Tong Li, Jin Wang:
Restoration Method for Satellite Image Based on Content-Aware Reciprocal Cell Pool. 298-305 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang:
Student's-t Mixture Model Based Image Denoising Method with Gradient Fidelity Term. 306-311 - Sai Ji, Zhen Wang, Qi Liu, Xiaodong Liu:
Classification Algorithms for Privacy Preserving in Data Mining: A Survey. 312-322 - Sai Ji, Dengzhi Liu, Jian Shen:
Exploiting Group Signature to Implement User Authentication in Cloud Computing. 323-331 - Hao Wu, Fangpeng Chen, Hanfeng Hu, Qi Liu, Sai Ji:
A Secure System Framework for an Agricultural IoT Application. 332-341 - Sai Ji, Dengzhi Liu, Jian Shen:
Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A Survey. 342-351 - Jin Wang, Yiquan Cao, Jiayi Cao, Huan Ji, Xiaofeng Yu:
Energy-Balanced Unequal Clustering Routing Algorithm for Wireless Sensor Networks. 352-359 - Mi-Sun Kim, Green Bang, Il-Ju Ko:
The Agent Communication Simulation Based on the Ego State Model of Transactional Analysis. 360-365 - Doo-Soon Park, Seokhoon Kim:
Design of Software Reliability Test Architecture for the Connected Car. 366-370 - Dae-Young Kim, Young-Sik Jeong, Seokhoon Kim:
Network Activation Control According to Traffic Characteristics in Sensor Networks for IoT. 371-375 - Erik Miranda Lopez, Yoon Ho Kim, Jong Hyuk Park:
Data Mining Techniques to Facilitate Digital Forensics Investigations. 376-379 - Pradip Kumar Sharma, Saurabh Singh, Jong Hyuk Park:
Solving Standard Cell Placement Problem Using Discrete Firefly Algorithm: A Nature Inspired Approach. 380-384 - Saurabh Singh, Pradip Kumar Sharma, Jong Hyuk Park:
A Security Model for Protecting Virtualization in Cloud Computing. 385-388 - Wonhee Cho, Eunmi Choi:
Effective Pre-processing Methods with DTG Big Data by Using MapReduce Techniques. 389-395 - Seo Yeon Moon, Saurabh Singh, Jong Hyuk Park:
Security Requirements and Countermeasures for Secure Home Network in Internet of Things. 396-400 - Hye-Yeon Yu, Young-Nam Kim, Moon-Hyun Kim:
Machine Learning for Trajectory Generation of Multiple-pedestrians. 401-406 - Md. Zia Uddin, Mi Ryang Kim:
A Deep Learning-Based Gait Posture Recognition from Depth Information for Smart Home Applications. 407-413 - Ji Yeon Lee, Kuk Won Ko, Sangjoon Lee:
Implementation of an Image Restoration with Block Iteration Method for Spatially Variant Blur Models. 414-420 - Hua Li, Yuling Cao, Xin Feng:
Analysis of Hard Shadow Anti-aliasing. 421-429 - Gyujin Jang, Jinhee Park, Moonhyun Kim:
Cascade-Adaboost for Pedestrian Detection Using HOG and Combined Features. 430-435 - Kangho Kim, Kwangwon Koh, Seung-Hyub Jeon, Sungin Jung:
Portable Hypervisor Design for Commercial 64-Bit Android Devices Supporting 32-Bit Compatible Mode. 436-441 - Samuel Sangkon Lee:
Concept-Based Compound Keyword Extraction Based on Using Sentential Distance, Conceptual Distance and Production Rules: Calculation of the Keyword Importance. 442-448 - Lili He, Hongtao Bai, Jin Wang, Yu Jiang, Tonglin Li:
Coarse-Grained 2.5-D CSAMT Parallel Inversion Method Based on Multi-core CPU. 449-455 - Jin Wang, Yiquan Cao, Jiayi Cao, Huan Ji, Xiaofeng Yu:
Virtual Force and Glowworm Swarm Optimization Based Node Deployment Strategy for WSNs. 456-462 - Yu Jiang, Lili He, Yan Gao, Kai Wang, Chengquan Hu:
Comparison with Recommendation Algorithm Based on Random Forest Model. 463-470 - Xue Wang, Lili He, Hongtao Bai:
Risk Factors and the Difference Among Hypertension, Diabetes and Heart Disease. 471-476 - Hongtao Bai, Lili He, Yu Jiang, Jin Wang, Shanshan Jiang:
Linear Programming Computation Model Based on DPVM. 477-483 - Yun-Seok Lee, Eun Kim, Sungyun Kim, Seokhoon Kim:
A Study on the Effective Communication Protocol of the Surface Inspection Rail Robot that it can be a Self-checking. 484-489 - Sung-Hwa Hong, Joon-Min Gil:
The Efficient Multimedia Transmission Services for the E-learning System with Sensor. 490-496 - Mi Kim, Jin Ho Park, Nam Yong Lee:
A Quality Model for IoT Service. 497-504 - Joon Ho Park, Nam Yong Lee, Jin Ho Park:
An Empirical Study of Risk Factors for the Development Methodology for Small-Size IT Projects. 505-510 - Jaeho Lee:
Nack-Based Broadcast Mechanism for Isochronous Audio Stream Transmission Using Bluetooth Low Energy. 511-516 - Seul-Ah Shin, Ji-Soo Choi, Young-Jong Kim, Nam-Yong Lee, Jin-Ho Park:
Empirical Study on IoT-Learning for the Rehabilitation Treatment of Chronic Low Back Pain Patients. 517-524 - Joong-Yeon Lee, In-Taek Oh, Nam-Yong Lee, Jin-Ho Park:
A Theoretical Study of Hardware Architecture for Network Security Server. 525-530 - In-Taek Oh, Joong-Yeon Lee, Jae-Yoon Cheon, Nam-Yong Lee, Jin-Ho Park:
An Empirical Study of the Relationship Between DISC Behavioral Style of Application Programmer and Quality of Software Development. 531-539
Advances in Computer Science and Ubiquitous Computing
- Park Sanggug:
The Development of COB Type LED Lighting System for High Temperature Machine Vision. 543-548 - Pyung Soo Kim, Eung Hyuk Lee, Eung Tae Kim:
An Alternative Management Scheme of DHCP Lease Time for Internet of Things. 549-554 - Green Bang, IlJu Ko:
A User Empirical Context Model for a Smart Home Simulator. 555-560 - Bokyung Sung, Ilju Ko:
Co-display Content Service for First-Person Videos of Smart Glass. 561-566 - Ju-Sung Kang, Hojoong Park, Yongjin Yeom:
Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing Attack. 567-572 - Bongjae Kim, Jeong-Dong Kim:
Dynamic QoS Scheme for InfiniBand-Based Clusters. 573-578 - Dong-Hee Kim, Soo-Hwan Lee, Won-Sik Doo, Sang-il Ahn, Tai-Myoung Chung:
Applying PE-Miner Framework to Software Defined Network Quarantine. 579-584 - Saad Allawi Nsaif, Jong Myung Rhee:
A Novel Method for Eliminating Duplicated Frames in Ethernet Standard (IEEE 802.3) Networks. 585-593 - Soo-Hwan Lee, Myeong-Uk Song, Jun-Kwon Jung, Tai-Myoung Chung:
A Study of Malicious Code Classification System Using MinHash in Network Quarantine Using SDN. 594-599 - Ganjar Alfian, Jaeho Lee, Hyejung Ahn, Jongtae Rhee:
Application of RFID and Computer Vision for the Inventory Management System. 600-606 - Ji-Hyen Choi, Jong-Won Choe, Yong-Ik Yoon:
Prediction Method for Suspicious Behavior Based on Omni-View Model. 607-612 - Jiyoung Park, Hwa Seon Shin:
Optimal 3D Printing Direction for Stability of Slanted Shapes. 613-618 - Jung-Hoon Oh, Moon-Ki Back, Gil-Tak Oh, Kyu-Chul Lee:
A Study on DDS-Based BLE Profile Adaptor for Solving BLE Data Heterogeneity in Internet of Things. 619-624 - Ki-Hyun Lee, Young B. Park:
A Study of Environment-Adaptive Intrusion Detection System. 625-630 - Dong-Su Koo, Young B. Park:
OFART: OpenFlow-Switch Adaptive Random Testing. 631-636 - Kihong Han, Tuan Anh Nguyen, Dugki Min, Eunmi Choi:
An Evaluation of Availability, Reliability and Power Consumption for a SDN Infrastructure Using Stochastic Reward Net. 637-648 - Euihyun Jung:
A Dynamic Service Binding Scheme with Service OID for IoT. 649-653 - Doohwan Kim, Soon-Kyeom Kim, Woosung Jung, Jang-Eui Hong:
A Context-Aware Architecture Pattern to Enhance the Flexibility of Software Artifacts Reuse. 654-659 - Jae Sung Choi, Hyun Lee:
Deep Analysis of Tag Interference by Tag to Tag Relative Angles with Passive Far Field UHF RFID System. 660-664 - In-Jae Jo, Joohun Lee, Yoo-Joo Choi:
Simple Method of Video Mapping of Multiple Targets. 665-673 - Seungchan Back, Hyorin Choi, Jung-Won Lee, Byungjeong Lee:
Evolutionary Test Case Generation from UML-Diagram with Concurrency. 674-679 - Jung-Hoon Shin, Mesfin Abebe, Cheol-Jung Yoo, Suntae Kim, Jeong-Hyu Lee, Hee-Kyung Yoo:
Evaluating the Effectiveness of the Vector Space Retrieval Model Indexing. 680-685 - Sangjin Hong, Nammee Moon:
Active Tracking Strategy with Multiple Cameras in Large Areas. 686-693 - Yeongpil Cho, Yunheung Paek, Ejaz Ahmed, Kwangman Ko:
A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It's Applications. 694-698 - JinSoo Park, Dong Hag Choi, You-Boo Jeon, Se Dong Min, Doo-Soon Park:
Network Anomaly Detection Based on Probabilistic Analysis. 699-704 - Bo-Ram Kim, Man-Soo Chung, Yong-Ik Yoon:
Hedonic Model Study for Retargeting Advertising Based on Space-Centered Internet of Things. 705-711 - Jae Sung Choi, Moon Jong Choi, Jung-Min Lee, Hyun Lee:
A New Automated Cell Counting Program by Using Hough Transform-Based Double Edge. 712-716 - Euiri An, Kyungrak Lee, Jaewon Lee, Inwhee Joe:
An Approach for Interworking Heterogeneous Networks with DTN and IP Routing in Space Internet. 717-722 - Jeong-Dong Kim, Bongjae Kim, Jeong-Ho Park:
Implementation of Recommender System Based on Personalized Search Using Intimacy in SNS. 723-729 - Fei Hao, Dae-Soo Sim, Doo-Soon Park:
Measuring Similarity Between Graphs Based on Formal Concept Analysis. 730-735 - Sangwon Hwang, Yongseok Lee, Youngkwang Nam:
TEXAS2: A System for Extracting Domain Topic Using Link Analysis and Searching for Relevant Features. 736-741 - DongBum Seo, Keun-Ho Lee, You-Boo Jeon:
Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT Environment. 742-749 - Kyung Yeul Kim, Yong Kim:
What Are Learning Satisfaction Factors in Flipped Learning? 750-755 - Myung In Kim, Yong Kim:
Development of UI Guideline for Senior Citizens' e-Learning Content. 756-761 - Junsu Kim, Doo-Hee Jung, Jeho Lee, Su Min Kim:
Full Duplex Relaying with Buffer Based on Cognitive Radio Technique. 762-767 - Beck Jong-Hwan, Pak Myeong-Suk, Kim Sang-Hoon:
Design of Docking Drone System Using P-PID Flight Controller. 768-773 - Sun-Ho Yeom, Jung-Il Namgung, Soo Young Shin, Soo-Hyun Park:
Lightweight Security for Underwater IoT. 774-778 - Changseok Bae, Yuk Ying Chung, Jeun Woo Lee:
Image Based Video Querying Algorithm Using 3-Level Haar Wavelet Transform Features. 779-785 - Ji-Hye Bae, Hyun Lee:
Design and Implementation of the Mobile Learning App for Creative Problem Solving Activities. 786-792 - Ji-Hye Bae, In-Hwan Kim, Yong-Tae Jeon, Hyun Lee:
IoT-Based Smart Photo Frame. 793-798 - Yong-Hwan Kim, Buseung Cho, Dongkyun Kim:
A Fast Algorithm for Generating Virtual Dedicate Network Based on Software-Defined Wide Area Network. 799-805 - Noo-Ri Kim, YunSeok Choi, HyunSoo Lee, Jee-Hyong Lee:
Detection of Content Changes Based on Deep Neural Networks. 806-811 - Soo Hyeong Kang, Pyung Soo Kim, Bang Won Seo, Jeong Gon Kim:
Resource Allocation in D2D Networks with Location Based Distance Information. 812-818 - Seok-heon Ko, Gil-mo Yang, Jun-dong Lee:
Design of Corporate Business Card Management System. 819-824 - Dongchang Yoo, Yongjin Yeom:
The OpenWRT's Random Number Generator Designed Like /dev/urandom and Its Vulnerability. 825-830 - Kyoung-Han Kim, Hyun-Kyo Lim, Joo-Seong Heo, Youn-Hee Han:
Implementation of the Block2 Option Transfer for Resource Observing with the CoAPthon Library. 831-836 - Siwoon Son, Myeong-Seon Gil, Seokwoo Yang, Yang-Sae Moon:
Hive-Based Anomaly Detection in Hadoop Log Data Management. 837-842 - Xuhua Rui, Dugki Min:
HIM-PRS: A Patent Recommendation System Based on Hierarchical Index-Based MapReduce Framework. 843-848 - Joo-Seong Heo, Hyun-Kyo Lim, Kyong-Han Kim, Youn-Hee Han:
Finding Meaningful Chronological Pattern of Key Words in Computer Science Bibliography. 849-854 - Taewoo Kim, Hyungheon Kim, Pyeongkang Kim:
The Design of Intelligent Video Analytics System Performing Automatic Noise Rejection by Comparing Distribution of Metadata of Moving Object. 855-860 - Dongseok Lee, Sungsoo Kim, Tae-Sun Chung:
Dependability Analysis of Digital Library Cloud Services with Load Sharing. 861-866 - Mijin Choi, Rize Jin, Tae-Sun Chung:
Document Classification Using Word2Vec and Chi-square on Apache Spark. 867-872 - Gangin Lee, Unil Yun:
Analysis of Recent Maximal Frequent Pattern Mining Approaches. 873-877 - Judae Lee, Unil Yun:
Design of Noise Information Storage System Using IoT Devices. 878-882 - Unil Yun, Donggyu Kim:
Analysis of Privacy Preserving Approaches in High Utility Pattern Mining. 883-887 - Hyung-Joo Kim, Kwangil Lee:
An Agent-Based Remote Operation and Safety Monitoring System for Marine Elevators. 888-893 - Rustam Rakhimov Igorevich, Dugki Min:
Survey on CPN Applications in Cloud Computing. 894-899 - Mustafa Altaha, Humor Hwang:
An Observation Method for Estimating Carrier Frequency Offset in OFDM Systems. 900-905 - YunHee Kang, Myung-Ju Kang, WooSik Kim:
Korean-to-Korean Translation Based Learning Contents Management System for Parents of Multi-cultural Family. 906-911 - Jaekwon Lee, Kisub Kim, Jang-Eui Hong, Woosung Jung:
A Distributed Survey Automation Based on a Customizable Form Template. 912-919 - HwiRim Byun, Boo-Kwang Park, Young-Sik Jeong:
Mobile Agent Oriented Service for Offloading on Mobile Cloud Computing. 920-925 - Yonghoon Kim, Mokdong Chung:
Unstructured Data Service Model Utilizing Context-Aware Big Data Analysis. 926-931 - KyeYoung Kim, Byeong-Eon Ahn, Suk-Young Lim, Daejin Moon, Dae-Soo Cho:
Information Reminder System Based on Word Registered by User. 932-936 - Jin Su Kim, Min-Gu Kim, ByungRae Cha, Sung Bum Pan:
A Study of Determining Abnormal Behaviors by Using System for Preventing Agricultural Product Theft. 937-943 - Jihun Kim, Seungwon Lee, Jonghee M. Youn, Haechul Choi:
A Study of Simple Classification of Malware Based on the Dynamic API Call Counts. 944-949 - Dusan Baek, Jae-Hyeon Park, Byungjeong Lee, Jung-Won Lee:
A Low-Power Sensing Management Method for Sustainable Context-Awareness in Exclusive Contexts. 950-956 - Jong-Hwan Shin, Dusan Baek, Byungjeong Lee, Jung-Won Lee:
Content-Based Conformance Assurance Between Software Research Documentation and Design Guideline. 957-962 - Ji Yeon Lee, Wonwoo Bong, Sangjoon Lee, Chang Ho Han, Kuk Won Ko:
Development of the Vision System and Inspection Algorithms for Surface Defect on the Injection Molding Case. 963-970 - Sunho Kim, Kangwoo Lee, Yonghee Lee:
Implementation of the Smart System for Monitoring the PCG. 971-975 - SooHyun Cho:
The Effect of Introducing Small Cells in Wireless Networks. 976-981 - Hyun Cheon Hwang, Ji Su Park, Byeong Rae Lee, Jin Gon Shon:
An Enhanced Reliable Message Transmission System Based on MQTT Protocol in IoT Environment. 982-987 - Seokhoon Jeong, Ji Yeon Lee, Kuk Won Ko, Sangjoon Lee:
Implementation of a Smart IoT Factory Using an Agricultural Grade Sorting Device. 988-996 - Yeji Na, Sangjoon Lee, Jong Gab Ho, Hwayung Jung, Changwon Wang, Se Dong Min:
Segmentation and Counting of Cell in Fluorescence Microscopy Images Using Improved Chain Code Algorithm. 997-1004 - Seul-Ah Shin, Nam-Yong Lee, Jin-Ho Park:
Empirical Study of the IoT-Learning for Obese Patients that Require Personal Training. 1005-1012 - Changwon Wang, Sangjoon Lee, Jong Gab Ho, Yeji Na, Se Dong Min:
Detection of Optimal Activity Recognition Algorithm for Elderly Using Smartphone. 1013-1018 - Sang-Uk Woo, Dong-Hee Kim, Tai-Myoung Chung:
Method of Detecting Malware Through Analysis of Opcodes Frequency with Machine Learning Technique. 1019-1024 - Joon Ho Park, Jin Ho Park, Nam Young Lee:
Study of Big Data Analysis Procedures. 1025-1030 - Yong Hwan Jung, Jangwon Choi, Hyungju Lee, Joon-Min Gil, Haeng-Gon Lee:
Design and Implementation of Authentication Information Synchronization System for Providing Stability and Mobility of Wireless Authentication. 1031-1038 - Mi Kim, Nam Yong Lee, Jin Ho Park:
Study on the Generic Architecture Design of IoT Platforms. 1039-1045 - Jun-Ho Huh:
A Study on Digitalization of Seafarer's Book Republic of Korea for e-Navigation: Focusing on Wireless Network. 1046-1052 - Ki-Sik Kong:
A PMIPv6-Based Auxiliary Mobility Management Considering Traffic Locality. 1053-1058 - SangIl Park, SeoukJoo Lee:
A Study on Worker's Positional Management and Security Reinforcement Scheme in Smart Factory Using Industry 4.0-Based Bluetooth Beacons. 1059-1066 - Jong-Won Ko, Jae-Young Choi, Young-Hwa Cho:
A Study of the Extended Definition of Relation for Research Content Based Traceability. 1067-1073 - SungSuk Kim, Sun Ok Yang:
Transforming Algorithm of 3D Model Data into G-code for 3D Printers in Distributed Systems. 1074-1078 - Geun-Hyung Kim:
Cache Aware Web-Based Dynamic Adaptive Streaming Algorithm in Information Centric Networks. 1079-1085 - Seongjo Lee, Seoungjae Cho, Nguyen Trong Hieu, Phuong Chu, Kyungeun Cho:
Background Subtraction Framework for Mobile 3D Sensor Data. 1086-1090 - Yunji Jeong, Yulong Xi, Jisun Park, Kyhyun Um, Kyungeun Cho:
A Method for Multi-user Re-identification in Invoked Reality Space. 1091-1095 - Jeongyong Byun, Seongbum Hong, Hoyoung Kim:
A Design Scheme of Combined Syllable Fonts for Hunminjeongeum. 1096-1102 - Kyu Ik Kim, Musa Ibrahim M. Ishag, Myungsic Kim, Jin Suk Kim, Keun Ho Ryu:
Proposal of a Resource-Monitoring Improvement System Using Amazon Web Service API. 1103-1107
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.