default search action
MUE/FutureTech 2018: Salerno, Italy
- James J. Park, Vincenzo Loia, Kim-Kwang Raymond Choo, Gangman Yi:
Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2018, Salerno, Italy, 23-25 April 2018. Lecture Notes in Electrical Engineering 518, Springer 2019, ISBN 978-981-13-1327-1 - Ales Berger, Blanka Klímová:
Mobile Application for the Teaching of English. 1-6 - Blanka Klímová, Zuzana Bouckova, Josef Toman:
Mobile Phone Apps as Support Tools for People with Dementia. 7-12 - Petra Poulova, Blanka Klímová:
Optimization of Running a Personal Assistance Center - A Czech Case Study. 13-19 - Petra Poulova, Blanka Klímová, Jaroslava Mikulecká:
Data Science - A Future Educational Potential. 21-27 - Nawaf Alharbe:
Load Predicting Algorithm Based on Improved Growing Self-organized Map. 29-39 - Jong-Won Ko, Seung-Hyuck Choi:
Superpixel Based ImageCut Using Object Detection. 41-47 - Ruizhi Wu, Guangchun Luo, Qing Cai, Chunyu Wang:
Anomaly Detection via Trajectory Representation. 49-56 - Jong-Won Ko, Dong-Hyun Hwang:
Towards Unified Deep Learning Model for NSFW Image and Video Captioning. 57-63 - Lizong Zhang, Yinying Xie, Aiguo Chen, Guiduo Duan:
A Forecasting Model Based on Enhanced Elman Neural Network for Air Quality Prediction. 65-74 - Jeong Ah Kim, JinSeok Yang:
Practice of Hybrid Approach to Develop State-Based Control Embedded Software Product Line. 75-82 - Aiguo Chen, Yuanfan Chen, Guoming Lu, Lizong Zhang, Jiacheng Luo:
An Anomaly Detection Algorithm for Spatiotemporal Data Based on Attribute Correlation. 83-89 - Kaiyang Li, Guangchun Luo, Huaigu Wu, Chunyu Wang:
Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach. 91-100 - Chui Young Yoon:
Measurement of Firm E-business Capability to Manage and Improve Its E-business Applications. 101-107 - Ayesha Anzer, Mourad Elhadef:
Deep Learning-Based Intrusion Detection Systems for Intelligent Vehicular Ad Hoc Networks. 109-116 - Sarah Hasan, Mourad Elhadef:
A Citywide Distributed inVANETs-Based Protocol for Managing Traffic. 117-124 - Ling Tian, Chengzong Peng, Yimin Zhou, Hongyu Wang:
Quantization Parameter and Lagrange Multiplier Determination for Virtual Reality 360 Video Source Coding. 125-136 - Jae-Ho Choi, KyoungHwa Do:
GFramework: Implementation of the Gamification Framework for Web Applications. 137-143 - Soon-Ho Kim, Chi-Su Kim:
Verification of Stop-Motion Method Allowing the Shortest Moving Time in (sRd-Camera-pRd) Type. 145-151 - Guoming Lu, Jiaxin Li, Jian Chen, Aiguo Chen, Jianbin Gu, Ruiting Pang:
A Long-Term Highway Traffic Flow Prediction Method for Holiday. 153-159 - Mohammed AbuTaha, Safwan El Assad, Audrey Queudet:
Parallel Generator of Discrete Chaotic Sequences Using Multi-threading Approach. 161-167 - Jeongcheol Lee, Sunil Ahn, Jaesung Kim, Sik Lee, Kumwon Cho:
Machine Learning Based Materials Properties Prediction Platform for Fast Discovery of Advanced Materials. 169-175 - Seungmin Kim, Moonwon Choi, Wooyeob Lee, Donguk Gye, Inwhee Joe:
A Secure Group Management Scheme for Join/Leave Procedures of UAV Squadrons. 177-183 - Jaesung Kim, Sunil Ahn, Jeongcheol Lee, Sik Lee, Kumwon Cho:
View Designer: Building Extensible and Customizable Presentation for Various Scientific Data. 185-191 - Wei Song, Shuanghui Zou, Yifei Tian, Simon Fong:
A GPU-Based Training of BP Neural Network for Healthcare Data Analysis. 193-198 - Ying Jia:
Online Data Flow Prediction Using Generalized Inverse Based Extreme Learning Machine. 199-206 - Sunkyung Kim, JiSu Park, Kang Hyoun Kim, Jin Gon Shon:
A Test Data Generation for Performance Testing in Massive Data Processing Systems. 207-213 - Seung Yong Choi, Jeong Ah Kim, Yeonghwa Cho:
A Study on the Variability Analysis Method with Cases for Process Tailoring. 215-220 - Karim Hammoudi, Mahmoud Melkemi, Fadi Dornaika, Halim Benhabiles, Féryal Windal, Oussama Taoufik:
A Comparative Study of 2 Resolution-Level LBP Descriptors and Compact Versions for Visual Analysis. 221-227 - Mengti Liang, Baocheng Wang, Chen Li, Linda Markowsky, Hui Zhou:
Local Feature Based CNN for Face Recognition. 229-235 - Xingquan Cai, Yuxin Tu, Xin He:
An Interactive Augmented Reality System Based on LeapMotion and Metaio. 237-244 - Chunyong Yin, Hongyi Wang, Jin Wang:
Network Data Stream Classification by Deep Packet Inspection and Machine Learning. 245-251 - Chunyong Yin, Lingfeng Shi, Jin Wang:
Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy Protection. 253-258 - Chunyong Yin, Shilei Ding, Jin Wang:
Improved Personalized Recommendation Method Based on Preference-Aware and Time Factor. 259-265 - Youding Fan, Jiao Yao, Yuhui Zheng, Jin Wang:
A Multi-objective Signal Transition Optimization Model for Urban Transportation Emergency Rescue. 267-273 - Tianyu Wang, Jiao Yao, Yuhui Zheng, Jin Wang:
Modeling Analysis on the Influencing Factors of Taxi Driver's Illegal Behavior in Metropolis. 275-281 - Chenpeng Li, Jiao Yao, Yuhui Zheng, Jin Wang:
Evaluation of Passenger Service Quality in Urban Rail Transit: Case Study in Shanghai. 283-289 - Weiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang:
Research on the Mechanism of Value Creation and Capture Process for Mass Rail Transit Development. 291-297 - Weiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang:
Transport Related Policies for Regional Balance in China. 299-305 - Weiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang:
Transportation Systems Damage and Emergency Recovery Based on SD Mechanism. 307-313 - Yihe Yang, Jin Liu, Yunlu Liaozheng:
Chinese Question Classification Based on Deep Learning. 315-320 - Xiaohu Tian, Jin Liu, Jiachen Pu, Jin Wang:
A Domain Adaptation Method for Neural Machine Translation. 321-326 - Minjie Liu, Jin Liu, Haoliang Ren:
Natural Answer Generation with QA Pairs Using Sequence to Sequence Model. 327-332 - Wedad Ahmed, Mourad Elhadef:
DoS Attacks and Countermeasures in VANETs. 333-341 - Iman Saeed, Mourad Elhadef:
A Distributed inVANETs-Based Intersection Traffic Control Algorithm. 343-351 - Juyoung Kim, Kwantae Cho, Yong-Kyun Kim, Kyung-Soo Lim, Sang Uk Shin:
A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange. 353-358 - Juyoung Kim, Kwantae Cho, Sang Uk Shin:
A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram. 359-365 - Phyoung Jung Kim, Sung Woong Hong:
Design of Readability Improvement Control System for Electric Signboard Based on Brightness Adjustment. 367-373 - Se-Hoon Jung, Won-Ho So, Kang-Soo You, Chun-Bo Sim:
A Novel on Altered K-Means Algorithm for Clustering Cost Decrease of Non-labeling Big-Data. 375-381 - Joongyong Choi, Seong-Il Jin:
Security Threats in Connected Car Environment and Proposal of In-Vehicle Infotainment-Based Access Control Mechanism. 383-388 - Lionel Nkenyereye, Jong-Wook Jang:
Software Defined Cloud-Based Vehicular Framework for Lowering the Barriers of Applications of Cloud-Based Vehicular Network. 389-395 - Ki Woo Chun, Haedo Kim, Keonsoo Lee:
A Study on Research Trends of Technologies for Industry 4.0; 3D Printing, Artificial Intelligence, Big Data, Cloud Computing, and Internet of Things. 397-403 - Seungyong Park, Kwangki Ryoo:
Hardware Design of HEVC In-Loop Filter for Ultra-HD Video Encoding. 405-409 - Dennis Agyemanh Nana Gookyi, Kwangki Ryoo:
Design of Cryptographic Core for Protecting Low Cost IoT Devices. 411-416 - Alexander O. A. Antwi, Kwangki Ryoo:
Efficient Integrated Circuit Design for High Throughput AES. 417-422 - Guard Kanda, Alexander O. A. Antwi, Kwangki Ryoo:
Hardware Architecture Design of AES Cryptosystem with 163-Bit Elliptic Curve. 423-429 - Richard Boateng Nti, Kwangki Ryoo:
Area-Efficient Design of Modular Exponentiation Using Montgomery Multiplier for RSA Cryptosystem. 431-437 - Inhan Hwang, Kwangki Ryoo:
Efficient Hardware Architecture Design of Adaptive Search Range for Video Encoding. 439-443 - Won-hyun So, Ha-Kyun Kim:
Effect: Business Environment Factors on Business Strategy and Business Performance. 445-453 - Won-hyun So, Ha-Kyun Kim:
Economic Aspect: Corporate Social Responsibility and Its Effect on the Social Environment and Corporate Value. 455-462 - Won-geun So, Ha-Kyun Kim:
Effect: Information Welfare Policies on the Activation of Information Welfare and Information Satisfaction. 463-470 - Taewoo Kim, Sunyi Park, Jeongmo Yeo:
Study on the Design Process of Screen Using a Prototype Method. 471-478 - Sunyi Park, Taewoo Kim, Jeongmo Yeo:
Study on the Business Process Procedure Based on the Analysis of Requirements. 479-486 - Jeong-Min Lee, Jun-Ho Huh, Hyun-Suk Kim:
A Study on the Harmony of Music and TV Lighting Through Music Analysis. 487-495 - Kyeongseok Park, Sungkuk Kim, Sojeong Lee, Jun Lee, Kyoung-Sook Kim, So-Young Hwang:
Mobile Atmospheric Quality Measurement and Monitoring System. 497-503 - Donghui Yu, Soyoung Hwang:
Design of Simulator for Time Comparison and Synchronization Method Between Ground Clock and Onboard Clock. 505-510 - Sooyoung Jung, Jun-Ho Huh:
A Design of Demand Response Energy Optimization System for Micro Grid. 511-516 - Sooyoung Jung, Jun-Ho Huh:
Demand Response Resource Energy Optimization System for Residential Buildings: Smart Grid Approach. 517-522 - Bok Gi Min, JiSu Park, Hyoung Geun Kim, Jin Gon Shon:
Improvement of Multi-Chain PEGASIS Using Relative Distance. 523-529 - Hyun Cheon Hwang, JiSu Park, Byeong Rae Lee, Jin Gon Shon:
The Design and Implementation of an Enhanced Document Archive System Based on PDF. 531-537 - Won-Bin Kim, Im-Yeong Lee:
Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment. 539-545 - Aveen Muhamad, Mourad Elhadef:
Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A Review. 547-555 - De Li, XianLong Dai, Liang Chen, Lihua Cui:
A Zero-Watermarking Algorithm Based on Visual Cryptography and Matrix Norm in Order to Withstand Printing and Scanning. 557-563 - De Li, Shan Yang, YiAn Zuo, ZhiXun Zheng, Lihua Cui:
Animation Zero Watermarking Algorithm Based on Edge Feature. 565-571 - Haiqing Tan, Lei Zhang:
Separate Human Activity Recognition Model Based on Recognition-Weighted kNN Algorithm. 573-581 - Fei Hao, Liang Wang, Yifei Sun, Doo-Soon Park:
Detecting (k, r)-Clique Communities from Social Networks. 583-590 - Seung-Su Yang, Hyung-Joon Kim, Seok-Cheon Park:
Design of Competency Evaluation System Using Type Matching Algorithm. 591-597 - Young-Hwan Jang, Hyung-Joon Kim, Seok-Cheon Park:
Design of Social Content Recommendation System Based on Influential Ranking Algorithm. 599-605 - Min-Hyung Park, Hyung-Joon Kim, Seok-Cheon Park:
Index Design for Efficient Ontological Data Management. 607-613 - Jinah Kim, Nammee Moon:
The Analysis of Consumption Behavior Pattern Cluster that Reflects Both On-Offline by Region. 615-622 - Dayou Jiang, Jongweon Kim:
A Scene Change Detection Framework Based on Deep Learning and Image Matching. 623-629 - Shin Hyung Park, Shin Hyoung Park, Oh Hoon Kwon:
K-Means and CRP-Based Characteristic Investigating Method of Traffic Accidents with Automated Speed Enforcement Cameras. 631-637 - Ning Wang, Yanyan Tan, Shuyang Guo:
A Uniformed Evidence Process Model for Big Data Forensic Analysis. 639-645 - Zhihao Yuan, Hao Li, Xian Li:
Evidence Collection Agent Model Design for Big Data Forensic Analysis. 647-653 - Gioele Ciaparrone, Angela Serra, Vito Covito, Paolo Finelli, Carlo Alberto Scarpato, Roberto Tagliaferri:
A Deep Learning Approach for Road Damage Classification. 655-661 - Angelo Gaeta, Francesco Orciuoli, Mimmo Parente, Minjuan Wang:
A Framework for Situated Learning Scenarios Based on Learning Cells and Augmented Reality. 663-669 - Carmen De Maio, Stefania Boffa:
Discovery of Interesting Users in Twitter by Using Rough Sets. 671-677 - Sandi Rahmadika, Kyung-Hyune Rhee:
Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health Information. 679-685 - Si-Wan Noh, Youngho Park, Kyung-Hyune Rhee:
A Blockchain-Based Access Control with Micropayment Channels. 687-692 - Byung Wook Kwon, Jungho Kang, Jong Hyuk Park:
A Fog Computing-Based Automotive Data Overload Protection System with Real-Time Analysis. 693-696 - Youngsoo Kim, Jungtae Kim, Jonghyun Kim:
Intelligent Security Event Threat Ticket Management System on Secure Cloud Security Infrastructures Being Able to Dynamic Reconfiguration. 697-703 - Sokjoon Lee, Byung-Ho Chung, Joongyong Choi, Hyeokchan Kwon:
Design and Implementation on the Access Control Scheme Against V2N Connected Car Attacks. 705-710 - Sokjoon Lee, Hwajeong Seo, Byungho Chunng, Joongyong Choi, Hyeokchan Kwon, Hyunsoo Yoon:
OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication. 711-716 - Ying Yuan, Jun-Ho Huh:
Developing Participatory Clothing Shopping Platform for Customer's Participation in Design. 717-723 - Ying Yuan, Jun-Ho Huh:
Cloth Size Coding and Size Recommendation System Applicable for Personal Size Automatic Extraction and Cloth Shopping Mall. 725-731 - Ying Yuan, Jun-Ho Huh, Myung-Ja Park:
Definition of Digital Printing Type Cloth Pattern Drawing for Mass Customizing. 733-739 - Ying Yuan, Jun-Ho Huh:
A Case Study Analysis of Clothing Shopping Mall for Customer Design Participation Service and Development of Customer Editing User Interface with Solutions for Picture Works Copyright. 741-746 - Ying Yuan, Jun-Ho Huh:
Development of Customer Design Responsive Automation Design Pattern Setting System. 747-753 - Ying Yuan, Jun-Ho Huh, Myung-Ja Park:
A Development of Automation Position Processing Process and Pattern Grouping Technology Per Size for Automation Printing Pattern Image Generation. 755-761 - Emanuela Mattia Cafaro, Pietro Luise, Raffaele D'Alessio, Valerio Antonelli:
A Big Data Application in Renewable Energy Domain: The Wind Plant Case Contributions to MUE Proceedings. 763-771 - Seong-Kyu Kim, Jun-Ho Huh:
A Study on the RFID and 2D Barcode, and NFC and Performance Improvement. 773-779 - Seong-Kyu Kim, Jun-Ho Huh:
A Study on the LMS Platform Performance and Performance Improvement of K-MOOCs Platform from Learner's Perspective. 781-786 - Seong-Kyu Kim, Jun-Ho Huh:
A Study on the Security Performance Improvement in BoT Perspective in Order to Overcome Security Weaknesses of IoT Devices. 787-792 - Seong-Kyu Kim, Jun-Ho Huh:
A Study on the Rainbowchain Certificate in Order to Overcome Existing Certification System. 793-798 - Nak-Hwe Kim, Jun-Ho Huh:
A Study on the Method of Propelling by Analyzing the Form of Bird's Movement. 799-804 - Nak-Hwe Kim, Jun-Ho Huh:
A Method of Propelling with Many Whirlpools Used by Inland Birds. 805-810 - Nak-Hwe Kim, Jun-Ho Huh:
Designing 3D Propeller by Applying Bird's Wing and Making a Test Product. 811-817 - Nak-Hwe Kim, Jun-Ho Huh:
A Study on the Bumps at the Leading Edge of the Wing Used by Hovering Birds. 819-824 - Jun-Ho Huh, Kyungryong Seo:
Artificial Intelligence Shoe Cabinet Using Deep Learning for Smart Home. 825-834 - Min Ji Kang, Oh Hoon Kwon, Shin Hyoung Park:
Development of a Crash Risk Prediction Model Using the k-Nearest Neighbor Algorithm. 835-840 - Yong Woo Park, Oh Hoon Kwon, Shin Hyoung Park:
Traffic Big Data Analysis for the Effect Evaluation of a Transportation Management Plan. 841-847 - Jeyoun Dong, Myunghwan Byun:
Enhanced Usability Assessment on User Satisfaction with Multiple Devices. 849-853 - Seungchul Kim, Mu He, Hyun-Woo Kim, Young-Sik Jeong:
Rapid Parallel Transcoding Scheme for Providing Multiple-Format of a Single Multimedia. 855-861 - Cheol Shim, Min Choi:
Design and Development of Android Application and Power Module for AWS Cloud like HPC Servers. 863-869 - Injun Ohk, Min Choi:
Development of Working History Monitoring and Electronic Approval on Android. 871-878 - Oh Hoon Kwon, Yongjin Park, Shin Hyoung Park:
Density-Based Clustering Methodology for Estimating Fuel Consumption of Intracity Bus by Using DTG Data. 879-885
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.