


default search action
CSA/CUTE 2016: Bangkok, Thailand
- James J. Park, Yi Pan, Gangman Yi, Vincenzo Loia:

Advances in Computer Science and Ubiquitous Computing - CSA/CUTE 2016, Bangkok, Thailand, 19-21 December. Lecture Notes in Electrical Engineering 421, Springer 2017, ISBN 978-981-10-3022-2
Advances in Information Technologies and Applications
- Sarut Panjan, Siam Charoenseang:

Design and Development of a Robotic Arm for Rehabilitation and Training. 3-8 - Myoungbeom Chung, IlJu Ko:

Detection of a Robust High-Frequency Range via Noise Analysis in a Real-World Environment. 9-15 - Ganjar Alfian

, Hyejung Ahn, Yoonmo Shin, Jaeho Lee
, Jongtae Rhee
:
Intelligent Food Distribution Monitoring System. 16-22 - Jea-Hui Cha, Tae-Hyoung Kim, Jong-Wook Jang

:
Design of Sudden Unintended Acceleration Check System Using Distance Measurement Sensor. 23-28 - Seongmin Baek, Myunggyu Kim:

Real-Time Dynamic Motion Capture Using Multiple Kinects. 29-35 - Yan Li, Byeong-Seok Shin:

Cell-Based Indexing Method for Spatial Data Management in Hybrid Cloud Systems. 36-41 - YunHee Kang, Soong-ho Ko, KyoungWoo Kang:

SOA Based Equipment Data Management System for Smart Factory. 42-47 - Sanggyu Shin

, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto:
The Problem Analysis of Specific Personal Information Protection Assessment in Japan Case. 48-53 - Jing Liu, Yongjun Wang, Peidai Xie, Xingkong Ma:

Using a Fine-Grained Hybrid Feature for Malware Similarity Analysis. 54-60 - Mengxuan Li, Wei Song, Liang Song, Kaisi Huang, Yulong Xi, Kyungeun Cho:

A Wireless Kinect Sensor Network System for Virtual Reality Applications. 61-65 - Anunpattana Punyawee

, Chetprayoon Panumate, Hiroyuki Iida
:
Finding Comfortable Settings of Snake Game Using Game Refinement Measurement. 66-73 - Seong-Min Park, Han-Chul Bae, Young Tae Cha, Hwankuk Kim

:
Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection Technology. 74-80 - Shih-Yun Huang, Hsin-Hung Cho, Yu-Zen Wang, Timothy K. Shih, Han-Chieh Chao

:
Initialization of Software Defined Wireless Bacteria-Inspired Network Platform. 81-86 - Yuan Zhou

, Hongbiao Gao, Jingde Cheng:
An Extension of QSL for E-voting Systems. 87-96 - Soojin Yoon, Hyun Lock Choo, Hanchul Bae, Hwankuk Kim:

Behavior-Based Detection for Malicious Script-Based Attack. 97-103 - Guang-Ho Cha:

The SP-tree: A Clustered Index Structure for Efficient Sequential Access. 104-110 - Jaeho Lee, Bong-Ki Son:

An Address Conflict Resolving Scheme of Inter-drone Ad Hoc Communications for Hide Densely Deployed Low Power Wide Area Networks. 111-116 - Donggyu Kim, Unil Yun:

State-of-the-Art Algorithms for Mining Up-to-Date High Average-Utility Patterns. 117-121 - Unil Yun, Heungmo Ryang:

Design of Shoot'em up Game Using OpenGL. 122-126 - Heungmo Ryang, Unil Yun:

Performance Analysis of Tree-Based Algorithms for Incremental High Utility Pattern Mining. 127-131 - Wooseong Jeong, Unil Yun:

Development of 2D Side-Scrolling Running Game Using the Unity 3D Game Engine. 132-136 - Bong-Ki Son, Jaeho Lee:

EPD Noticeboard for Posting Multiple Information. 137-142 - Lionel Nkenyereye

, Jong-Wook Jang
:
Design of Processing Model for Connected Car Data Using Big Data Technology. 143-148 - Dae-Young Kim, Seokhoon Kim

:
Efficient Path Selection for IoT Devices in Heterogeneous Service Environments. 149-153 - Supawadee Srikamdee, Sunisa Rimcharoen

, Nutthanon Leelathakul:
Forecasting Sugarcane Yield Using (μ+λ) Adaptive Evolution Strategies. 154-159 - Seok-Hyeon Han, Hyun-Woo Kim, Young-Sik Jeong:

Resource Pooling Mechanism for Mobile Cloud Computing Service. 160-165 - Sora Lim, Yongjin Kwon:

IPC Multi-label Classification Applying the Characteristics of Patent Documents. 166-172 - Euihyun Jung:

A Comparison of Data Mining Methods in Analyzing Educational Data. 173-178 - Tao Zhang, Zhilong Wang:

A New Secure Android Model Based on Privilege. 179-184 - Byeong-Seok Park, Yoon-A. Heo, Young-Sik Jeong:

Survey of MCC Architectures for Computing Service. 185-191 - Chui Young Yoon:

Measurement of Enterprise Smart Business Capability in a Global Management Environment. 192-197 - Sangyoon Kim, Moonhyun Kim:

Occluded Pedestrian Classification Using Gradient Patch and Convolutional Neural Networks. 198-204 - Sang-Hyeon Park, Jeong-Ho Kim, Moon-Seog Jun:

A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment. 205-210 - Jae Seung Lee, Jaehwa Chung, Sangkee Suk:

A Design of Certificateless-Based Device Authentication Scheme in the SmartHome Environment. 211-214 - Geunil Park, Bumryong Kim

, Moon-Seog Jun:
A Design of Secure Authentication Method Using Zero Knowledge Proof in Smart-Home Environment. 215-220 - Mansik Kim, Hyungjoo Kim, Jungho Kang, Jaesoo Kim:

Drone Classification by Available Control Distances. 221-223 - Hague-Chung, Keun-Chang Choi, Moon-Seog Jun:

A Design of Key Agreement Scheme Between Lightweight Devices in IoT Environment. 224-229 - Tai-Yeon Ku, Hee-Sun Won, Hoon Choi

:
Platform Independent Workflow Mechanism for Bigdata Analytics. 230-235 - Hua Li, Huamin Yang, Chao Xu, Yuling Cao:

Water Surface Simulation Based on Perlin Noise and Secondary Distorted Textures. 236-245 - Mai Thanh Nhat Truong

, Sanghoon Kim:
Optimization for Particle Filter-Based Object Tracking in Embedded Systems Using Parallel Programming. 246-252 - Chao Li, Lili Guo, Zheng Dou, Guangzhen Si, Chunmei Li:

Generalized Multi-linear Mixed Effects Model. 253-258 - Qingsong Feng, Zheng Dou, Chunmei Li, Guangzhen Si:

Anomaly Detection of Spectrum in Wireless Communication via Deep Autoencoder. 259-265 - Zheng Dou, Zi Xiao, Yang Zhao, Jinyu Wang:

A Modified Complex ICA for Blind Source Separation and the Application in Communication Reconnaissance. 266-272 - JongBeom Lim, HeonChang Yu

, Joon-Min Gil:
Sensor Coverage Problem in Sparse MANET Environments. 273-278 - Dong-Wan Joe, Jae-Sung Shim, Yong-Wan Ju, Seok-Cheon Park:

Design of Jitter Buffer Control Algorithm for Guaranteeing the Medical Information Data Transmission Quality in Wireless Network Environment. 279-284 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang

:
Student's-t Mixture Model Based Excepted Patch Log Likelihood Method for Image Denoising. 285-290 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang

:
Regularization Parameter Selection for Gaussian Mixture Model Based Image Denoising Method. 291-297 - Yuhui Zheng, Xiaozhou Zhou, Tong Li, Jin Wang

:
Restoration Method for Satellite Image Based on Content-Aware Reciprocal Cell Pool. 298-305 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang

:
Student's-t Mixture Model Based Image Denoising Method with Gradient Fidelity Term. 306-311 - Sai Ji, Zhen Wang, Qi Liu, Xiaodong Liu:

Classification Algorithms for Privacy Preserving in Data Mining: A Survey. 312-322 - Sai Ji, Dengzhi Liu, Jian Shen

:
Exploiting Group Signature to Implement User Authentication in Cloud Computing. 323-331 - Hao Wu, Fangpeng Chen, Hanfeng Hu, Qi Liu, Sai Ji:

A Secure System Framework for an Agricultural IoT Application. 332-341 - Sai Ji, Dengzhi Liu, Jian Shen

:
Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A Survey. 342-351 - Jin Wang

, Yiquan Cao, Jiayi Cao, Huan Ji, Xiaofeng Yu:
Energy-Balanced Unequal Clustering Routing Algorithm for Wireless Sensor Networks. 352-359 - Mi-Sun Kim, Green Bang, Il-Ju Ko:

The Agent Communication Simulation Based on the Ego State Model of Transactional Analysis. 360-365 - Doo-Soon Park, Seokhoon Kim

:
Design of Software Reliability Test Architecture for the Connected Car. 366-370 - Dae-Young Kim, Young-Sik Jeong, Seokhoon Kim

:
Network Activation Control According to Traffic Characteristics in Sensor Networks for IoT. 371-375 - Erik Miranda Lopez, Yoon Ho Kim, Jong Hyuk Park:

Data Mining Techniques to Facilitate Digital Forensics Investigations. 376-379 - Pradip Kumar Sharma

, Saurabh Singh, Jong Hyuk Park:
Solving Standard Cell Placement Problem Using Discrete Firefly Algorithm: A Nature Inspired Approach. 380-384 - Saurabh Singh, Pradip Kumar Sharma

, Jong Hyuk Park:
A Security Model for Protecting Virtualization in Cloud Computing. 385-388 - Wonhee Cho, Eunmi Choi:

Effective Pre-processing Methods with DTG Big Data by Using MapReduce Techniques. 389-395 - Seo Yeon Moon, Saurabh Singh, Jong Hyuk Park:

Security Requirements and Countermeasures for Secure Home Network in Internet of Things. 396-400 - Hye-Yeon Yu, Young-Nam Kim, Moon-Hyun Kim:

Machine Learning for Trajectory Generation of Multiple-pedestrians. 401-406 - Md. Zia Uddin

, Mi Ryang Kim:
A Deep Learning-Based Gait Posture Recognition from Depth Information for Smart Home Applications. 407-413 - Ji Yeon Lee, Kuk Won Ko, Sangjoon Lee:

Implementation of an Image Restoration with Block Iteration Method for Spatially Variant Blur Models. 414-420 - Hua Li, Yuling Cao, Xin Feng:

Analysis of Hard Shadow Anti-aliasing. 421-429 - Gyujin Jang, Jinhee Park, Moonhyun Kim:

Cascade-Adaboost for Pedestrian Detection Using HOG and Combined Features. 430-435 - Kangho Kim, Kwangwon Koh, Seung-Hyub Jeon, Sungin Jung:

Portable Hypervisor Design for Commercial 64-Bit Android Devices Supporting 32-Bit Compatible Mode. 436-441 - Samuel Sangkon Lee:

Concept-Based Compound Keyword Extraction Based on Using Sentential Distance, Conceptual Distance and Production Rules: Calculation of the Keyword Importance. 442-448 - Lili He, Hongtao Bai, Jin Wang, Yu Jiang, Tonglin Li:

Coarse-Grained 2.5-D CSAMT Parallel Inversion Method Based on Multi-core CPU. 449-455 - Jin Wang

, Yiquan Cao, Jiayi Cao, Huan Ji, Xiaofeng Yu:
Virtual Force and Glowworm Swarm Optimization Based Node Deployment Strategy for WSNs. 456-462 - Yu Jiang, Lili He, Yan Gao, Kai Wang

, Chengquan Hu:
Comparison with Recommendation Algorithm Based on Random Forest Model. 463-470 - Xue Wang

, Lili He, Hongtao Bai:
Risk Factors and the Difference Among Hypertension, Diabetes and Heart Disease. 471-476 - Hongtao Bai, Lili He, Yu Jiang, Jin Wang, Shanshan Jiang:

Linear Programming Computation Model Based on DPVM. 477-483 - Yun-Seok Lee, Eun Kim, Sungyun Kim, Seokhoon Kim

:
A Study on the Effective Communication Protocol of the Surface Inspection Rail Robot that it can be a Self-checking. 484-489 - Sung-Hwa Hong, Joon-Min Gil:

The Efficient Multimedia Transmission Services for the E-learning System with Sensor. 490-496 - Mi Kim, Jin Ho Park, Nam Yong Lee:

A Quality Model for IoT Service. 497-504 - Joon Ho Park, Nam Yong Lee, Jin Ho Park:

An Empirical Study of Risk Factors for the Development Methodology for Small-Size IT Projects. 505-510 - Jaeho Lee:

Nack-Based Broadcast Mechanism for Isochronous Audio Stream Transmission Using Bluetooth Low Energy. 511-516 - Seul-Ah Shin, Ji-Soo Choi, Young-Jong Kim

, Nam-Yong Lee, Jin-Ho Park:
Empirical Study on IoT-Learning for the Rehabilitation Treatment of Chronic Low Back Pain Patients. 517-524 - Joong-Yeon Lee, In-Taek Oh, Nam-Yong Lee, Jin-Ho Park:

A Theoretical Study of Hardware Architecture for Network Security Server. 525-530 - In-Taek Oh, Joong-Yeon Lee, Jae-Yoon Cheon, Nam-Yong Lee, Jin-Ho Park:

An Empirical Study of the Relationship Between DISC Behavioral Style of Application Programmer and Quality of Software Development. 531-539
Advances in Computer Science and Ubiquitous Computing
- Park Sanggug:

The Development of COB Type LED Lighting System for High Temperature Machine Vision. 543-548 - Pyung Soo Kim

, Eung Hyuk Lee, Eung Tae Kim:
An Alternative Management Scheme of DHCP Lease Time for Internet of Things. 549-554 - Green Bang, IlJu Ko:

A User Empirical Context Model for a Smart Home Simulator. 555-560 - Bokyung Sung, Ilju Ko:

Co-display Content Service for First-Person Videos of Smart Glass. 561-566 - Ju-Sung Kang, Hojoong Park, Yongjin Yeom

:
Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing Attack. 567-572 - Bongjae Kim

, Jeong-Dong Kim:
Dynamic QoS Scheme for InfiniBand-Based Clusters. 573-578 - Dong-Hee Kim, Soo-Hwan Lee, Won-Sik Doo, Sang-il Ahn, Tai-Myoung Chung:

Applying PE-Miner Framework to Software Defined Network Quarantine. 579-584 - Saad Allawi Nsaif, Jong Myung Rhee:

A Novel Method for Eliminating Duplicated Frames in Ethernet Standard (IEEE 802.3) Networks. 585-593 - Soo-Hwan Lee, Myeong-Uk Song, Jun-Kwon Jung, Tai-Myoung Chung:

A Study of Malicious Code Classification System Using MinHash in Network Quarantine Using SDN. 594-599 - Ganjar Alfian

, Jaeho Lee
, Hyejung Ahn, Jongtae Rhee
:
Application of RFID and Computer Vision for the Inventory Management System. 600-606 - Ji-Hyen Choi, Jong-Won Choe, Yong-Ik Yoon:

Prediction Method for Suspicious Behavior Based on Omni-View Model. 607-612 - Jiyoung Park, Hwa Seon Shin:

Optimal 3D Printing Direction for Stability of Slanted Shapes. 613-618 - Jung-Hoon Oh, Moon-Ki Back, Gil-Tak Oh, Kyu-Chul Lee:

A Study on DDS-Based BLE Profile Adaptor for Solving BLE Data Heterogeneity in Internet of Things. 619-624 - Ki-Hyun Lee, Young B. Park:

A Study of Environment-Adaptive Intrusion Detection System. 625-630 - Dong-Su Koo, Young B. Park:

OFART: OpenFlow-Switch Adaptive Random Testing. 631-636 - Kihong Han, Tuan Anh Nguyen

, Dugki Min, Eunmi Choi:
An Evaluation of Availability, Reliability and Power Consumption for a SDN Infrastructure Using Stochastic Reward Net. 637-648 - Euihyun Jung:

A Dynamic Service Binding Scheme with Service OID for IoT. 649-653 - Doohwan Kim, Soon-Kyeom Kim, Woosung Jung, Jang-Eui Hong:

A Context-Aware Architecture Pattern to Enhance the Flexibility of Software Artifacts Reuse. 654-659 - Jae Sung Choi, Hyun Lee:

Deep Analysis of Tag Interference by Tag to Tag Relative Angles with Passive Far Field UHF RFID System. 660-664 - In-Jae Jo, Joohun Lee, Yoo-Joo Choi:

Simple Method of Video Mapping of Multiple Targets. 665-673 - Seungchan Back, Hyorin Choi, Jung-Won Lee, Byungjeong Lee:

Evolutionary Test Case Generation from UML-Diagram with Concurrency. 674-679 - Jung-Hoon Shin, Mesfin Abebe, Cheol-Jung Yoo, Suntae Kim, Jeong-Hyu Lee, Hee-Kyung Yoo:

Evaluating the Effectiveness of the Vector Space Retrieval Model Indexing. 680-685 - Sangjin Hong, Nammee Moon:

Active Tracking Strategy with Multiple Cameras in Large Areas. 686-693 - Yeongpil Cho, Yunheung Paek, Ejaz Ahmed, Kwangman Ko:

A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It's Applications. 694-698 - JinSoo Park, Dong Hag Choi, You-Boo Jeon, Se Dong Min, Doo-Soon Park:

Network Anomaly Detection Based on Probabilistic Analysis. 699-704 - Bo-Ram Kim, Man-Soo Chung, Yong-Ik Yoon:

Hedonic Model Study for Retargeting Advertising Based on Space-Centered Internet of Things. 705-711 - Jae Sung Choi, Moon Jong Choi, Jung-Min Lee, Hyun Lee:

A New Automated Cell Counting Program by Using Hough Transform-Based Double Edge. 712-716 - Euiri An, Kyungrak Lee, Jaewon Lee, Inwhee Joe:

An Approach for Interworking Heterogeneous Networks with DTN and IP Routing in Space Internet. 717-722 - Jeong-Dong Kim, Bongjae Kim

, Jeong-Ho Park:
Implementation of Recommender System Based on Personalized Search Using Intimacy in SNS. 723-729 - Fei Hao

, Dae-Soo Sim, Doo-Soon Park:
Measuring Similarity Between Graphs Based on Formal Concept Analysis. 730-735 - Sangwon Hwang, Yongseok Lee, Youngkwang Nam:

TEXAS2: A System for Extracting Domain Topic Using Link Analysis and Searching for Relevant Features. 736-741 - DongBum Seo, Keun-Ho Lee, You-Boo Jeon:

Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT Environment. 742-749 - Kyung Yeul Kim, Yong Kim:

What Are Learning Satisfaction Factors in Flipped Learning? 750-755 - Myung In Kim, Yong Kim:

Development of UI Guideline for Senior Citizens' e-Learning Content. 756-761 - Junsu Kim

, Doo-Hee Jung
, Jeho Lee, Su Min Kim
:
Full Duplex Relaying with Buffer Based on Cognitive Radio Technique. 762-767 - Beck Jong-Hwan, Pak Myeong-Suk, Kim Sang-Hoon:

Design of Docking Drone System Using P-PID Flight Controller. 768-773 - Sun-Ho Yeom, Jung-Il Namgung, Soo Young Shin, Soo-Hyun Park:

Lightweight Security for Underwater IoT. 774-778 - Changseok Bae, Yuk Ying Chung, Jeun Woo Lee:

Image Based Video Querying Algorithm Using 3-Level Haar Wavelet Transform Features. 779-785 - Ji-Hye Bae, Hyun Lee:

Design and Implementation of the Mobile Learning App for Creative Problem Solving Activities. 786-792 - Ji-Hye Bae, In-Hwan Kim, Yong-Tae Jeon, Hyun Lee:

IoT-Based Smart Photo Frame. 793-798 - Yong-Hwan Kim, Buseung Cho, Dongkyun Kim:

A Fast Algorithm for Generating Virtual Dedicate Network Based on Software-Defined Wide Area Network. 799-805 - Noo-Ri Kim, YunSeok Choi, Hyunsoo Lee, Jee-Hyong Lee:

Detection of Content Changes Based on Deep Neural Networks. 806-811 - Soo Hyeong Kang, Pyung Soo Kim

, Bang Won Seo, Jeong Gon Kim:
Resource Allocation in D2D Networks with Location Based Distance Information. 812-818 - Seok-heon Ko, Gil-mo Yang, Jun-dong Lee:

Design of Corporate Business Card Management System. 819-824 - Dongchang Yoo, Yongjin Yeom

:
The OpenWRT's Random Number Generator Designed Like /dev/urandom and Its Vulnerability. 825-830 - Kyoung-Han Kim, Hyun-Kyo Lim, Joo-Seong Heo, Youn-Hee Han:

Implementation of the Block2 Option Transfer for Resource Observing with the CoAPthon Library. 831-836 - Siwoon Son, Myeong-Seon Gil, Seokwoo Yang, Yang-Sae Moon:

Hive-Based Anomaly Detection in Hadoop Log Data Management. 837-842 - Xuhua Rui, Dugki Min:

HIM-PRS: A Patent Recommendation System Based on Hierarchical Index-Based MapReduce Framework. 843-848 - Joo-Seong Heo, Hyun-Kyo Lim, Kyong-Han Kim, Youn-Hee Han:

Finding Meaningful Chronological Pattern of Key Words in Computer Science Bibliography. 849-854 - Taewoo Kim, Hyungheon Kim, Pyeongkang Kim:

The Design of Intelligent Video Analytics System Performing Automatic Noise Rejection by Comparing Distribution of Metadata of Moving Object. 855-860 - Dongseok Lee, Sungsoo Kim, Tae-Sun Chung:

Dependability Analysis of Digital Library Cloud Services with Load Sharing. 861-866 - Mijin Choi, Rize Jin, Tae-Sun Chung:

Document Classification Using Word2Vec and Chi-square on Apache Spark. 867-872 - Gangin Lee, Unil Yun:

Analysis of Recent Maximal Frequent Pattern Mining Approaches. 873-877 - Judae Lee, Unil Yun:

Design of Noise Information Storage System Using IoT Devices. 878-882 - Unil Yun, Donggyu Kim:

Analysis of Privacy Preserving Approaches in High Utility Pattern Mining. 883-887 - Hyung-Joo Kim, Kwangil Lee:

An Agent-Based Remote Operation and Safety Monitoring System for Marine Elevators. 888-893 - Rustam Rakhimov Igorevich, Dugki Min:

Survey on CPN Applications in Cloud Computing. 894-899 - Mustafa Altaha, Humor Hwang:

An Observation Method for Estimating Carrier Frequency Offset in OFDM Systems. 900-905 - YunHee Kang, Myung-Ju Kang, WooSik Kim:

Korean-to-Korean Translation Based Learning Contents Management System for Parents of Multi-cultural Family. 906-911 - Jaekwon Lee, Kisub Kim, Jang-Eui Hong, Woosung Jung:

A Distributed Survey Automation Based on a Customizable Form Template. 912-919 - HwiRim Byun, Boo-Kwang Park, Young-Sik Jeong:

Mobile Agent Oriented Service for Offloading on Mobile Cloud Computing. 920-925 - Yonghoon Kim, Mokdong Chung:

Unstructured Data Service Model Utilizing Context-Aware Big Data Analysis. 926-931 - KyeYoung Kim, Byeong-Eon Ahn, Suk-Young Lim, Daejin Moon, Dae-Soo Cho:

Information Reminder System Based on Word Registered by User. 932-936 - Jin Su Kim, Min-Gu Kim, ByungRae Cha, Sung Bum Pan:

A Study of Determining Abnormal Behaviors by Using System for Preventing Agricultural Product Theft. 937-943 - Jihun Kim, Seungwon Lee, Jonghee M. Youn, Haechul Choi:

A Study of Simple Classification of Malware Based on the Dynamic API Call Counts. 944-949 - Dusan Baek, Jae-Hyeon Park, Byungjeong Lee, Jung-Won Lee:

A Low-Power Sensing Management Method for Sustainable Context-Awareness in Exclusive Contexts. 950-956 - Jong-Hwan Shin, Dusan Baek, Byungjeong Lee, Jung-Won Lee:

Content-Based Conformance Assurance Between Software Research Documentation and Design Guideline. 957-962 - Ji Yeon Lee, Wonwoo Bong, Sangjoon Lee, Chang Ho Han, Kuk Won Ko:

Development of the Vision System and Inspection Algorithms for Surface Defect on the Injection Molding Case. 963-970 - Sunho Kim, Kangwoo Lee, Yonghee Lee:

Implementation of the Smart System for Monitoring the PCG. 971-975 - SooHyun Cho

:
The Effect of Introducing Small Cells in Wireless Networks. 976-981 - Hyun Cheon Hwang

, Ji Su Park, Byeong Rae Lee, Jin Gon Shon
:
An Enhanced Reliable Message Transmission System Based on MQTT Protocol in IoT Environment. 982-987 - Seokhoon Jeong, Ji Yeon Lee, Kuk Won Ko, Sangjoon Lee:

Implementation of a Smart IoT Factory Using an Agricultural Grade Sorting Device. 988-996 - Yeji Na, Sangjoon Lee, Jong Gab Ho, Hwayung Jung, Changwon Wang, Se Dong Min:

Segmentation and Counting of Cell in Fluorescence Microscopy Images Using Improved Chain Code Algorithm. 997-1004 - Seul-Ah Shin, Nam-Yong Lee, Jin-Ho Park:

Empirical Study of the IoT-Learning for Obese Patients that Require Personal Training. 1005-1012 - Changwon Wang

, Sangjoon Lee, Jong Gab Ho, Yeji Na, Se Dong Min:
Detection of Optimal Activity Recognition Algorithm for Elderly Using Smartphone. 1013-1018 - Sang-Uk Woo, Dong-Hee Kim, Tai-Myoung Chung:

Method of Detecting Malware Through Analysis of Opcodes Frequency with Machine Learning Technique. 1019-1024 - Joon Ho Park, Jin Ho Park, Nam Young Lee:

Study of Big Data Analysis Procedures. 1025-1030 - Yong Hwan Jung, Jangwon Choi, Hyungju Lee, Joon-Min Gil, Haeng-Gon Lee:

Design and Implementation of Authentication Information Synchronization System for Providing Stability and Mobility of Wireless Authentication. 1031-1038 - Mi Kim, Nam Yong Lee, Jin Ho Park:

Study on the Generic Architecture Design of IoT Platforms. 1039-1045 - Jun-Ho Huh

:
A Study on Digitalization of Seafarer's Book Republic of Korea for e-Navigation: Focusing on Wireless Network. 1046-1052 - Ki-Sik Kong:

A PMIPv6-Based Auxiliary Mobility Management Considering Traffic Locality. 1053-1058 - SangIl Park, SeoukJoo Lee:

A Study on Worker's Positional Management and Security Reinforcement Scheme in Smart Factory Using Industry 4.0-Based Bluetooth Beacons. 1059-1066 - Jong-Won Ko, Jae-Young Choi, Young-Hwa Cho:

A Study of the Extended Definition of Relation for Research Content Based Traceability. 1067-1073 - SungSuk Kim, Sun Ok Yang:

Transforming Algorithm of 3D Model Data into G-code for 3D Printers in Distributed Systems. 1074-1078 - Geun-Hyung Kim:

Cache Aware Web-Based Dynamic Adaptive Streaming Algorithm in Information Centric Networks. 1079-1085 - Seongjo Lee, Seoungjae Cho, Nguyen Trong Hieu, Phuong Chu, Kyungeun Cho:

Background Subtraction Framework for Mobile 3D Sensor Data. 1086-1090 - Yunji Jeong, Yulong Xi, Jisun Park, Kyhyun Um, Kyungeun Cho:

A Method for Multi-user Re-identification in Invoked Reality Space. 1091-1095 - Jeongyong Byun, Seongbum Hong, Hoyoung Kim:

A Design Scheme of Combined Syllable Fonts for Hunminjeongeum. 1096-1102 - Kyu Ik Kim, Musa Ibrahim M. Ishag, Myungsic Kim, Jin Suk Kim, Keun Ho Ryu:

Proposal of a Resource-Monitoring Improvement System Using Amazon Web Service API. 1103-1107

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














