default search action
MUE/FutureTech 2017: Seoul, Korea
- James Jong Hyuk Park, Shu-Ching Chen, Kim-Kwang Raymond Choo:
Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2017, Seoul, Korea, 22-24 May 2017. Lecture Notes in Electrical Engineering 448, 2017, ISBN 978-981-10-5040-4 - Pramote Kuacharoen:
Single Password Authentication Protocol. 1-6 - Yi-Yen Chen, Yu-Chee Tseng, Jyh-Cheng Chen:
Performance Analysis of Congestion Control for Massive MTC Networks. 7-11 - Agata Niescieruk, Bogdan Ksiezopolski, Radoslaw Nielek, Adam Wierzbicki:
How to Train People to Increase Their Security Awareness in IT. 12-17 - Jae-Yun Jeong, Jae Woong Jeong:
Advanced Data Communication Framework for Cloud Computing from CDMI. 18-23 - Min-Gyu Shim, Jae Woong Jeong:
A Study of AI Based E-learning System and Application. 24-30 - Junhak Lee, Jae Woong Jeong:
A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on Ransomware. 31-36 - Hyeonsang Hwang, Daejune Ko, Mincheol Whang, Eui Chul Lee:
Mobile App for Analyzing Environmental Visual Parameters with Life Logging Camera. 37-42 - Yosep Park, Unsoo Jang, Jiwon Im, Woohyuk Jang, Daejune Ko, Eui Chul Lee:
Fake Fingerprint Detection Based on Statistical Moments. 43-48 - Hyeok Kim, Jeonghoon Kwak, Guichang Sim, Yunsick Sung:
Path Planning Method for Collision Avoidance of Multiple UAVs. 49-55 - Guichang Sim, Jaehwa Chung, Yunsick Sung:
3D UAV Flying Path Optimization Method Based on the Douglas-Peucker Algorithm. 56-60 - Jihoon Yoon, Kangsik Shin, Yoojae Won:
Encrypted Network Traffic Analysis Method via Secure Socket Layer Handshake Control. 61-66 - Manki Baek, Youngkyung Lee, Yoojae Won:
Property Analysis of SMS Spam Using Text Mining. 67-73 - JunHee Kim, MinSeok Sohn, Yoojae Won:
An Automatic Patch Management System with Improved Security. 74-80 - Wonjin Jung, HyungRok Yim:
An Empirical Study on the Relationship Between User Interface Design Attributes in Smartphone Applications and Intention to Use. 81-84 - Naeun Lim, Daejune Ko, Kun Ha Suh, Eui Chul Lee:
Thumb Biometric Using Scale Invariant Feature Transform. 85-90 - Min-Woo Park, Daejune Ko, Hyeonsang Hwang, Jiyeon Moon, Eui Chul Lee:
Image Classification Using Color and Spatial Frequency in Terms of Human Emotion. 91-96 - Jae Hyun Han, Woohyuk Jang, Dojoon Jung, Eui Chul Lee:
Human Robot Interaction Method by Using Hand Gesture Recognition. 97-102 - Jeonghoon Kwak, Yunsick Sung:
A Beacon-Based User Direction Estimating Method in Indoor Environments. 103-108 - Hanju Park, Sukho Lee:
User Selection Based Backpropagation for Siamese Neural Networks in Visual Filters. 109-115 - Sung Jun Park:
Methodological Route to Designing Optimized Bedroom Environment for Active-Aging. 116-121 - Myunghwan Byun:
Grayscale and Halftone Gel Lithography as Promising Techniques for Swelling-Induced Deformation of Smart Polymer Hydrogel Films. 122-125 - Jeyoun Dong, Myunghwan Byun:
Methodology for Improving Usability Model of Multiple Devices. 126-129 - Chunho Chang, Sangyoung Shin:
Development of SMART Base Isolation Using Linear Motion Guide. 130-133 - Oh Hoon Kwon, Je-Jin Park, Shin Hyoung Park:
Analysis on Work Zone Characteristics in South Korean Expressways Using Text Mining Technique. 134-139 - Chunho Chang, Sung Jig Kim, Shin Hyoung Park:
Seismic Performance Evaluation of a Prestressed I-Type Girder Bridge in Daegu for ICT Based Disaster Management in Daegu Metropolitan City. 140-143 - Dong-Jun Shin, Minsang Kim, Wook Song, Se Dong Min, Min Hong:
Implementation of Sitting Posture Monitoring System with Kinect. 144-150 - Hoyeong Yun, Yongjoon Joe, Byung-Ok Jung, Hyoguen Bang, Dongmyung Shin:
Solving the Subgraph Isomorphism Problem Using Harmony Search. 151-158 - Keonsoo Lee, Yunyoung Nam:
Persuading Recommendations Using Customized Content Curation. 159-163 - Viet-Ngu Huynh Cong, Kang-Woo Lee, In-Hak Joo, Oh-Heum Kwon, Ha-Joo Song:
Improving the Quality of an R-Tree Using the Map-Reduce Framework. 164-170 - Zamree Che-aron:
An Energy-Efficient and Reliable Routing Protocol for Cognitive Radio Sensor Networks. 171-180 - Se-Hoon Jung, Kyoung-Jong Kim, Eun-Cheon Lim, Chun-Bo Sim:
A Novel on Automatic K Value for Efficiency Improvement of K-means Clustering. 181-186 - Jeongmin An, Sangmoon Jung, Yoojae Won:
Study on Integrity Verification and Compatibility-Conflict Analysis for Safe Patching. 187-192 - Dong-Su Koo, Young Bom Park:
OFART: OpenFlow-Switch Adaptive Random Testing. 193-198 - Jaegeun Oh, Chaeho Cho, Yoojae Won:
Patch Alarm and Collecting System. 199-204 - Kisu Kim, Jongsoo Lee, Wonkang Jung:
Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices. 205-210 - Jong Won Lee, JiSu Park, Heung-Keun Kim, Jin Gon Shon:
A Cluster Head Selection Method by Restricting Selection Area in Wireless Sensor Networks. 211-217 - Pyeong-Kang Kim, Hyung-Heon Kim, Tae-Woo Kim:
An Improved Pedestrian Detection System that Utilizes the HOG-UDP Algorithm. 218-225 - Onur Soyer, Kwan-Young Park, Nomota Hiongun Kim, Tae-soo Kim:
An Approach to Fast Protocol Information Retrieval from IoT Systems. 226-232 - Taeho Seo:
IoT Vulnerability Information Sharing System. 233-236 - Sarang Na, Taeeun Kim, Hwankuk Kim:
A Study on the Service Identification of Internet-Connected Devices Using Common Platform Enumeration. 237-241 - Dae-il Jang, Taeeun Kim, Hwankuk Kim:
A Design of IoT Protocol Fuzzer. 242-246 - Eunhye Ko, Taeeun Kim, Hwankuk Kim:
A Study on the Management Structure of Vulnerability Information in IoT Environment. 247-251 - Yungee Lee, Wangkwang Lee, Giwon Shin, Kyungbaek Kim:
Assessing the Impact of DoS Attacks on IoT Gateway. 252-257 - Youngsun Kong, Hyeonsoo Lee, Namik Kim, Seungyeon Lee, Jihwan Park, Tae-Yang Han, Yunyoung Nam:
Low-Cost Infrared Video-Oculography for Measuring Rapid Eye Movements. 258-262 - Sangwook Han, MinSoo Chae, Hwa-Min Lee:
VM Relocation Method for Increase the Resource Utilization in Cloud Computing. 263-268 - Seung-Kyu Park, Kwang-il Hwang, Hyo-Seong Kim, Byoung-Sup Shim:
Challenges and Experiment with LoRaWAN. 269-276 - Takefumi Hosoda, Hongsik J. Cheon:
Consumer's Behavioral System of Approach and Avoidance Investigating Generic Medicine Distribution and Logistics in Japan. 277-282 - Jae-Young Ahn, Eunjun Rhee, Hyun-Woo Lee, Dae-Joon Hwang:
Cross-Conforming Approaches of ICT Functionality Design for Smart City. 283-288 - Minju Son, Gyeongjae Gwon, Geunho Jeong, Jaeyoung Choi:
GUI-Based Korean Font Editing System Using Font Parameterization Technique. 289-295 - Wonhee Cho, Eunmi Choi:
Spatial Big Data Analysis System for Vehicle-Driving GPS Trajectory. 296-302 - Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, Jong Hyuk Park:
i-SHSS: An IoT Based Smart Home Security System. 303-306 - Mohan Krishna Varma Nandimandalam, Eunmi Choi:
The VM Weighted Filter Scheduling Algorithm for OpenStack Cloud. 307-313 - Hyo-Sun Yoon, Mi-Young Kim:
A Hierarchical Motion Estimation Based on the Properties of Motion Vectors for Low Complexity in Video Coding. 314-320 - Liang Chen, Xiao-ping Lei, Guancan Yang, Jing Zhang:
Research on Method of Technological Evolution Analysis Based on HLDA. 321-330 - Guan-Can Yang, Cheng Liang, Jing Zhang, Dao-Ren Wang, Hai-Chao Zhang:
A Mixture Record Linkage Approach for US Patent Inventor Disambiguation. 331-338 - Hongqi Han, Changqing Yao, Maoxiang Peng, Yongsheng Yu:
The LTC Framework for Competitive Analysis on Industrial Technology. 339-346 - Shuo Xu, Yan Li, Zheng Wang:
Bayesian Multinomial Naïve Bayes Classifier to Text Classification. 347-352 - Yingjie Zhang, Na Qi:
CERIF: A Research Information Model for Electric Vehicles Decision Support System. 353-360 - Jin Baek Kwon:
On Bypassing Page Cache for Block Devices on Storage Class Memory. 361-366 - Hoang Huu Duc, Keechul Jung:
Applying Tensorflow with Convolutional Neural Networks to Train Data and Recognize National Flags. 367-373 - Wonjin Jung, HyungRok Yim:
An Empirical Study on the Effect of the Interpretability of Metaphors in UI on the Learnability of Mobile Apps. 374-378 - Moon-Hwan Kang, Min Yoon, Jae-Woo Chang:
A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile Services. 379-385 - Yulong Qiao, Wei Xi:
A Kernel Density Estimation Model for Moving Object Detection. 386-392 - Fei Hao, Doo-Soon Park, Zheng Pei:
Detecting Bases of Maximal Cliques in a Graph. 393-398 - Yoo-Jin Moon, Won Whee Cho, Jieun Oh, Jeong Mok Kim, Sang Yub Han, Kee Hwan Kim, Sungkap Cho:
Forecasting Cultivable Region-Specific Crops Based on Future Climate Change Utilizing Public Big Data. 399-404 - Young-Ho Hwang, Yoo-Jin Moon:
Statistical Analysis of Determinants of Intention to Use Virtual Reality Services and Moderating Effects. 405-411 - Dong-Min Shin, Yunjin Nam, Dongil Shin, Dongkyoo Shin:
Real-Time Human Depression Diagnosis System Using Brain Wave Analysis. 412-418 - Xiao-li Hao, Miao Tian:
Deep Belief Network Based on Double Weber Local Descriptor in Micro-expression Recognition. 419-425 - Aonan Zhai, Fei Xu, Haiqing Pan, Junzheng Shi, Gang Xiong:
Design for Network File Forensics System Based on Approximate Matching. 426-431 - Jaehee Jung:
The Comparative Analysis of the Repeat Regions from the Assembled Contigs. 432-439 - Blanka Klímová:
Senior Tourism and Information and Communication Technologies. 440-445 - Blanka Klímová, Petra Maresová:
Wearable and Portable Monitoring Devices for Older People. 446-451 - Bayu Adhi Tama, Kyung-Hyune Rhee:
A Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier Ensembles. 452-458 - Kwang-Sik Chung:
Learning Reaction Analysis Engine for Interactive Digital Textbook Platform. 459-465 - Yunwan Jeon, Chanho Cho, Jongwoo Seo, Kyunglag Kwon, Hansaem Park, In-Jeong Chung:
Rule-Based Topic Trend Analysis by Using Data Mining Techniques. 466-473 - Daehui Jeong, Anit Thapaliya, Gihwon Kwon:
A Case Study of Hierarchical Safety Analysis for Eliciting Traceable Safety Requirements. 474-480 - Blanka Klímová, Petra Maresová, Ondrej Krejcar:
Smart Home Technology and Energy Savings with a Special Focus on Europe. 481-486 - Petra Maresová, Jaroslav Kacetl:
Senior Citizens' Views of Using Medical Technologies - Case Study in Central Europe. 487-492 - Zhitong Su, Jun Lan, Wei Song, Simon Fong, Yifei Tian:
Audiences Counting in Cinema by Detecting Occupied Chairs. 493-498 - Yeon-Woo Jang, Hyunjo Lee, Jae-Woo Chang:
Efficient Distributed Index Structure and Encrypted Query Processing Scheme for Cloud Computing Environment. 499-505 - Hyunjo Lee, Youngho Song, Jae-Woo Chang:
A Data Encryption Scheme Using Periodic Functions for Efficient Query Processing on Encrypted Data. 506-512 - Jeong Ah Kim, JinSeok Yang:
Software Product Line Lifecycle Management-Integration Engineering and Management Process. 513-520 - Yan Jiao, Wenyu Li, Inwhee Joe:
OLSR Improvement with Link Live Time for FANETs. 521-527 - Miyoung Jang, Archana B. Lokhande, Naeun Baek, Jae-Woo Chang:
An Efficient Partition-Based Filtering for Similarity Joins on MapReduce Framework. 528-533 - JongMin Lee, Young B. Park:
A Study of Algorithm Replacement Mechanism for Environment Adaptive Load Balancer. 534-538 - Chen Li, Shuai Zhao, Ke Xiao, Yanjie Wang:
Face Recognition Based on Enhanced CSLBP. 539-544 - Jingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, Jingde Cheng:
A Supporting Environment for Formal Analysis of Cryptographic Protocols. 545-550 - Andrew D. Jun, Seokjoon Hong, Wooyeob Lee, Kyungrak Lee, Inwhee Joe, Kyeseon Lee, Tae-Joon Park:
Modeling and Simulation of LoRa in OPNET. 551-559 - Jihun Kim, Jonghee M. Youn:
Dynamic Analysis Bypassing Malware Detection Method Utilizing Malicious Behavior Visualization and Similarity. 560-565 - Bulganmaa Togookhuu, Junxing Zhang, Wuyungerile Li:
Mongolian Internet Consumers' Attitude Towards Web Advertising. 566-572 - Gyungchang Lee, Kyoil Chung, Cheong Youn:
A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism. 573-579 - Ji Hun An, Heemang Song, Hyun-Chool Shin:
Progressive Motion Artifact Removal in PPG Signal for Accurate Heart Rate Estimation. 580-587 - Jeong-Hyeon Moon, Chae-Young Yun, Seon-Joo Park, Kyung-Ah Sohn:
A Case Study on How to Predict Café Profit: A Dimension Reduction via Factor Analysis. 588-593 - MinhPhuoc Hong, Kyoungsu Oh:
Motion Blurred Shadows Using a Hybrid Approach. 594-600 - Jae-Sung Shim, Seung-Su Yang, Young-Hwan Jang, Yong-Wan Ju, Seok-Cheon Park:
Design of ECG Data Compression Algorithm for Efficient M2M-Based Mass Biometric Data Transmission. 601-606 - Seung-Su Yang, Jae-Sung Shim, Young-Hwan Jang, Yong-Wan Ju, Seok-Cheon Park:
Design of Clustering Algorithm for Efficient Energy Management in Wireless Sensor Network Environments. 607-612 - Kiyoung Jang, Suhong Shin, Byoungsoo Koh:
Design of a Framework for Security Enhancement in Telematics Control Units (TCUs). 613-619 - Chunyong Yin, Sun Zhang, Jin Wang:
Improved Data Stream Clustering Algorithm for Anomaly Detection. 620-625 - Chunyong Yin, Lian Xia, Jin Wang:
Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection System. 626-632 - Chunyong Yin, Lingfeng Shi, Jin Wang:
Short Text Classification Technology Based on KNN+Hierarchy SVM. 633-639 - Yuhui Zheng, Min Li, Kai Ma, Shunfeng Wang, Jin Wang:
Spectral Response Based Regularization Parameter Selection for Total Variation Image Restoration. 640-645 - Seon Ho Oh, Geon Woo Kim:
Face Recognition for Mobile Self-authentication with Online Model Update. 646-648 - Seon Ho Oh, Seung-Wan Han, Beom-Seok Choi, Geon Woo Kim:
Prototype System Design for Large-Scale Person Re-identification. 649-651 - Kyungrog Kim, Hyejin Song, Nammee Moon:
Topic Modeling for Learner Question and Answer Analytics. 652-655 - Svetlana Kim, Yong-Ik Yoon:
A Model of Energy-Awareness Predictor to Improve the Energy Efficiency. 656-662 - Yin Yu, Kai Ma, Yuhui Zheng, Jin Wang:
A Novel Structure Tensor Using Nonlocal Total Variation Operator. 663-669 - Min Li, Yuhui Zheng, Shunfeng Wang, Jin Wang:
Gaussian Mixture Model Based Image Denoising Method with Local Constraints. 670-675 - Byoungsoo Koh, Suhong Shin:
A Study on Secure Protocol Techniques Supporting TCUs in a Telematics Environment. 676-682 - Seoung-Hyeon Lee, Jung-Chan Na:
Development of Test Agents for Automated Dynamic Testing of UNIWAY. 683-688 - Mingji Zhou, Jin Liu, Fei Li, Jin Wang:
Multi-step Prediction for Time Series with Factor Mining and Neural Network. 689-695 - Jiachen Pu, Jin Liu, Jin Wang:
A Vision-Based Approach for Deep Web Form Extraction. 696-702 - Yunlu Liaozheng, Jin Liu, Jin Wang:
Questions Classification with Attention Machine. 703-708 - Seon-Gyoung Sohn, Jungchan Na, Kyung-Soo Lim:
Development of Unidirectional Security Gateway Satisfying Security Functional Requirements. 709-714 - MiYoung Nam, Jun-Young Lee, Sung Youb Kim, Young-Giu Jung:
Context Based Multiple Players Identification in Sports Images. 715-719 - Gwang-il Ju, Jinhyung Park, Wanyoung Heo, Joon-Min Gil, Hark-Soo Park:
A Study of the Factors Influencing Information Security Policy Compliance: Focusing on the Case of 'K' Institute. 720-728 - Byoung Wook Kwon, Kyung Yeob Park, Seo Yeon Moon, Jong Hyuk Park:
Safe-Driving Aid System Using Bi-directional Cameras. 729-732 - Jung Hyun Ryu, Nam Yong Kim, Seo Yeon Moon, Jong Hyuk Park:
Telling Computer and Human Apart: Image-Sound Based CAPTCHA System. 733-736
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.