Abstract is missing.
- Experimental Evaluation of Congestion AvoidanceDavid Murray, Kevin Ong. 1-8 [doi]
- On the Benefits of Using Multipath TCP and Openflow in Shared BottlenecksMarcus Sandri, Alan Silva, Lucio A. Rocha, Fábio L. Verdi. 9-16 [doi]
- Base Station Selection in M2M Communication Using Q-Learning Algorithm in LTE-A NetworksA. H. Mohammed, Ahmed Shaharyar Khwaja, Alagan Anpalagan, Isaac Woungang. 17-22 [doi]
- Evaluation of AggSessAC Admission Control Solution to Improve Network RevenueAndris Skrastins, Gunars Lauks. 23-28 [doi]
- E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc NetworksSsowjanya Harishankar, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré, Shakira Banu Kaleel. 29-36 [doi]
- Implementation and Experimental Results of a WMN Testbed in Indoor Environment Considering LoS ScenarioTetsuya Oda, Admir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Ikeda, Kazunori Uchida. 37-42 [doi]
- Application of WMN-SA Simulation System for WMN Node Placement in a Realistic ScenarioShinji Sakamoto, Tetsuya Oda, Leonard Barolli, Makoto Ikeda, Fatos Xhafa, Kazunori Uchida. 43-47 [doi]
- Energy-Efficient Cooperative MAC Protocol Based on Power Control in MANETsXiaoying Zhang, Alagan Anpalagan, Lei Guo, Ahmed Shaharyar Khwaja. 48-53 [doi]
- Continuous Neighbor Discovery Protocol in Wireless Ad Hoc Networks with Sectored-AntennasZeeshan Hameed Mir, Woo-Sung Jung, Young-Bae Ko. 54-61 [doi]
- Efficient Coverage of Agricultural Field with Mobile Sensors by Predicting Solar Power GenerationMasaru Eto, Ryo Katsuma, Morihiko Tamai, Keiichi Yasumoto. 62-69 [doi]
- A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor NetworksOussama Ghorbel, Mohamed Abid, Hichem Snoussi. 70-76 [doi]
- AAEERP: Advanced AUV-Aided Energy Efficient Routing Protocol for Underwater WSNsNaveed Ilyas, Nadeem Javaid, zafar iqbal, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Muhammad Shoaib. 77-83 [doi]
- An Efficient Distributed TDMA MAC Protocol for Large-Scale and High-Data-Rate Wireless Sensor NetworksKouhei Moriyama, Yongbing Zhang. 84-91 [doi]
- DYN-NbC: A New Routing Scheme to Maximize Lifetime and Throughput of WSNsAyesha Hussain Khan, Nadeem Javaid, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Noman Haider. 92-97 [doi]
- Performance Analysis of Traffic Bottleneck Induced by Concentration at K-Ary N-Cube NoC RoutersSamia Loucif. 98-105 [doi]
- A Simple Predicate to Expedite the Termination of a Randomized Consensus AlgorithmMichel Raynal. 106-111 [doi]
- A Server Selection Method for Web-Based Multiserver SystemsMasaki Kohana, Shusuke Okamoto. 112-117 [doi]
- A Thread Merging Transformation to Improve Throughput of Multiple ProgramsYuanfang Chen, Xiaoming Li. 118-125 [doi]
- Processing Group Reverse kNN in Spatial DatabasesAnasthasia Agnes Haryanto, David Taniar, Kiki Maulana Adhinugraha. 126-133 [doi]
- Efficient Processing of Queries over Recursive XML DataNorah Saleh Alghamdi, J. Wenny Rahayu, Eric Pardede. 134-142 [doi]
- An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure ChannelBruce Ndibanje, Hyunho Kim, Suhyun Park, Hoon Jae Lee. 143-147 [doi]
- A Scalable Inter-AS QoS Routing Architecture in Software Defined Network (SDN)Murat Karakus, Arjan Durresi. 148-154 [doi]
- A Flexible Read-Write Abortion Protocol to Prevent Illegal Information FlowShigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 155-162 [doi]
- Evaluation of Human Activity Recognition and Fall Detection Using Android PhoneMuhammad Babar Rasheed, Nadeem Javaid, Turki Ali Alghamdi, Sana Mukhtar, Umar Qasim, Zahoor Ali Khan, M. Haris Baidar Raja. 163-170 [doi]
- Heterogeneous Network Handover Using 3GPP ANDSFChin-Yu Liu, Fang-Yie Leu, Jung-Chun Liu, Aniello Castiglione, Francesco Palmieri. 171-175 [doi]
- A Protocol for End-to-End Key Establishment During Route Discovery in MANETsShrikant H. Talawar, Ramesh C. Hansdah. 176-184 [doi]
- Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective LogicMahdieh Ahmadi, Mohammed Gharib, Fatemeh Ghassemi, Ali Movaghar. 185-192 [doi]
- Optimizing Cached Route Time-to-Live in Mobile Ad-Hoc NetworksQuang-My Tran, Arek Dadej. 193-200 [doi]
- Transmitting Scalable Video Streaming over Wireless Ad Hoc NetworksWalayat Hussain, Farookh Khadeer Hussain, Omar Khadeer Hussain. 201-206 [doi]
- Performance Analysis of WMN-GA Simulation System for Different WMN Architectures Considering OLSRAdmir Barolli, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Vincenzo Loia, Kazunori Uchida. 207-214 [doi]
- Optimization of Giant Component and Number of Covered Users in Wireless Mesh Networks: A Comparison StudyVladi Kolici, Leonard Barolli, Shinji Sakamoto, Tetsuya Oda, Fatos Xhafa, Kazunori Uchida. 215-222 [doi]
- Energy-Efficient QoS Routing in Wireless Multimedia Sensor NetworksZiad Serhan, Wafaa Bou Diab. 223-230 [doi]
- Improving the Energy Efficiency of a Clock Synchronization Protocol for WSNs Using a TDMA-Based MAC ProtocolSiddharth Watwe, R. C. Hansdah. 231-238 [doi]
- Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor NetworksArpan Sen, Shrestha Ghosh, Arinjoy Basak, Harsh Parsuram Puria, Sushmita Ruj. 239-246 [doi]
- Energy Efficient Extended Coverage in Wireless Sensor NetworksNachiketa Tarasia, Manas Ranjan Lenka, Amulya Ratna Swain. 247-254 [doi]
- Parallel Processing Simulator for Separate Sensor of WSN Simulator with GPUHyun Woo Kim, Eun-Ha Song, Jong Hyuk Park, Young-Sik Jeong. 255-262 [doi]
- Processing and Analytics of Big Data Streams with Yahoo!S4Fatos Xhafa, Victor Naranjo, Santi Caballé. 263-270 [doi]
- Asynchronous Migration of Process Replicas in a ClusterDilawaer Duolikun, Tomoya Enokido, Hui-Huang Hsu, Makoto Takizawa. 271-278 [doi]
- Energy-Efficient Delay Time-Based Process Allocation Algorithm for Heterogeneous Server ClustersTomoya Enokido, Makoto Takizawa. 279-286 [doi]
- TeleBuilder: A 3DCG Builder System for Multiplayers via NetworkNingping Sun, Masataka Murakami, Youhei Yamashita, Tomonori Yagi. 287-293 [doi]
- Anomaly Detection of Solar Power Generation Systems Based on the Normalization of the Amount of Generated ElectricityYohei Akiyama, Yuji Kasai, Masaya Iwata, Eiichi Takahashi, Fumiaki Sato, Masahiro Murakawa. 294-301 [doi]
- Location Search Based on Subarea Fingerprinting and Surface Fitting for Indoor Positioning SystemBang Wang, Shengliang Zhou. 302-309 [doi]
- User-Centric Contexts Sensing for Instant Information Seeking SupportNeil Y. Yen, Jason C. Hung. 310-315 [doi]
- A New Unreliable Failure Detector for Self-Healing in Ubiquitous EnvironmentsAnubis Graciela de Moraes Rossetto, Carlos Oberdan Rolim, Valderi R. Q. Leithardt, Guilherme A. Borges, Cláudio Fernando Resin Geyer, Luciana Arantes, Pierre Sens. 316-323 [doi]
- Improving Energy Saving Techniques by Ambient Intelligence SchedulingMatteo Cristani, Erisa Karafili, Claudio Tomazzoli. 324-331 [doi]
- Privacy-Preserving Ubiquitous Social Mining via Modular and Compositional Virtual SensorsEvangelos Pournaras, Izabela Moise, Dirk Helbing. 332-338 [doi]
- Encrypted Gradient Descent Protocol for Outsourced Data MiningFang Liu, Wee Keong Ng, Wei Zhang. 339-346 [doi]
- A Proposal and Implementation of an ID Federation that Conceals a Web Service from an Authentication ServerYuto Iso, Takamichi Saito. 347-351 [doi]
- O-Bin: Oblivious Binning for Encrypted Data over CloudMahmood Ahmad, Zeeshan Pervez, Byeong Ho Kang, Sungyoung Lee. 352-357 [doi]
- Traffic Flow Classification and Visualization for Network Forensic AnalysisNuttachot Promrit, Anirach Mingkhwan. 358-364 [doi]
- Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor NetworksThach V. Bui, Thuc Dinh Nguyen, Noboru Sonehara, Isao Echizen. 365-372 [doi]
- AGA-MAC: Adaptive Geographic Anycast MAC Protocol for Wireless Sensor NetworksTales Heimfarth, João Carlos Giacomin, João Paulo de Araujo. 373-381 [doi]
- A Distributed Approach to Construct Hierarchical Structure for Routing with Balanced Energy Consumption in WSNsSubhasis Dash, Satya Sundar Mallick, R. C. Hansdah, Amulya Ratna Swain. 382-388 [doi]
- A New Linear Cluster Handling (LCH) Technique Toward's Energy Efficiency in Linear WSNsM. Sajid, K. Khan, Umar Qasim, Z. A. Khan, S. Tariq, Nadeem Javaid. 389-393 [doi]
- (LEACH)2: Combining LEACH with Linearly Enhanced Approach for Cluster Handling in WSNsK. Khan, M. Sajid, S. Mahmood, Z. A. Khan, Umar Qasim, Nadeem Javaid. 394-399 [doi]
- Extensive Simulation Performance Evaluation of MSK Scheme with Error Correcting Codes in Wireless Sensor NetworksRajoua Anane, Ridha Bouallegue, Kosai Raoof. 400-405 [doi]
- Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification AlgorithmsZhongqqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai. 406-413 [doi]
- City-Level Geolocation Based on Routing FeatureFan Zhao, Yuhan Song, Fenlin Liu, Ke Ke, Jingning Chen, Xiangyang Luo. 414-419 [doi]
- Framework of Marketing or Newsletter Sender Reputation System (FMNSRS)Akkarach Kawbunjun, Ubon Thongsatapornwatana, Woraphon Lilakiatsakun. 420-427 [doi]
- Exploring Stock Market Using Twitter Trust NetworkYefeng Ruan, Lina Alfantoukh, Arjan Durresi. 428-433 [doi]
- A Framework for Secure Information Flow Analysis in Web ApplicationsRalph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem M. Hajj, Haïdar Safa. 434-441 [doi]
- A Network Topology Visualization System Based on Mobile AR TechnologyToshiyuki Haramaki, Hiroaki Nishino. 442-447 [doi]
- Implementation of the Smart Chair System for Multi-functional Unconstrained Healthcare MonitoringByeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong. 448-452 [doi]
- SmartMind: Activity Tracking and Monitoring for Patients with Alzheimer's DiseaseKam-yiu Lam, Nelson Wai-Hung Tsang, Song Han, Joseph Kee-Yin Ng, Sze-Wei Tam, Ajit Nath. 453-460 [doi]
- On Data Fusion for Orientation Sensing in WBASNs Using Smart PhonesDanish Mahmood, Nadeem Javaid, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Mohammed Abdullah Alnuem. 461-467 [doi]
- Detecting Driver Distraction Using SmartphonesVamsi Paruchuri, Aravind Kumar. 468-475 [doi]
- On the Protection of fMRI Images in Multi-domain EnvironmentsArcangelo Castiglione, Alfredo De Santis, Raffaele Pizzolante, Aniello Castiglione, Vincenzo Loia, Francesco Palmieri. 476-481 [doi]
- An Endorsement-Based Mobile Payment System for a Disaster AreaBabatunde Ojetunde, Naoki Shibata, Juntao Gao, Minoru Ito. 482-489 [doi]
- A Data Visualization Approach for Trustworthiness in Social Networks for On-line LearningJorge Miguel, Santi Caballé, Fatos Xhafa, Václav Snásel. 490-497 [doi]
- On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security AnalysisBruce Ndibanje, Hyunho Kim, Young-Jin Kang, Young Sil Lee, Hoon Jae Lee. 498-505 [doi]
- Correlation Power Analysis Attack on the Ping Pong-128 Key Stream GeneratorYoung-Jin Kang, Hyunho Kim, Bruce Ndibanje, Younggoo Park, Hoonjae Lee. 506-509 [doi]
- Scalability of Privacy-Preserving Linear Regression in Epidemiological StudiesHiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga, Takamichi Saito. 510-514 [doi]
- P2P-Based Service Distribution over Distributed ResourcesSujoy Mistry, Dibyanshu Jaiswal, Arijit Mukherjee, Nandini Mukherjee. 515-520 [doi]
- A Reliable System for JXTA-Overlay P2P Platform Considering Number of Authentic Files, Security and QoS ParametersYi Liu, Donald Elmazi, Shinji Sakamoto, Leonard Barolli, Fatos Xhafa, Kazunori Uchida. 521-526 [doi]
- Content Access Control Scheme for P2P Networks Using a Reputation ValueKentaro Aburada, Yoshihiro Kita, Mirang Park, Naonobu Okazaki. 527-533 [doi]
- Causally Ordered Delivery of Event Messages with Keyword Vectors in P2P Publish/Subscribe SystemsHiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 534-541 [doi]
- Accurate Data Aggregation on Unstable Structured P2P NetworkAtsushi Takeda, Takuma Oide, Akiko Takahashi, Takuo Suganuma. 542-549 [doi]
- Encrypted Association Rule Mining for Outsourced Data MiningFang Liu, Wee Keong Ng, Wei Zhang. 550-557 [doi]
- RTT-Based Random Walk Approach to Detect Stepping-Stone IntrusionJianhua Yang, Yongzhong Zhang. 558-563 [doi]
- A New (n, 2n) Double Block Length Hash Function Based on Single Key SchedulingAtsuko Miyaji, Mazumder Rashed. 564-570 [doi]
- ConDroid: Targeted Dynamic Analysis of Android ApplicationsJulian Schütte, Rafael Fedler, Dennis Titze. 571-578 [doi]
- Apparecium: Revealing Data Flows in Android ApplicationsDennis Titze, Julian Schütte. 579-586 [doi]
- Neuromodulating Cognitive Architecture: Towards Biomimetic Emotional AIMax Talanov, Jordi Vallverdú, Salvatore Distefano, Manuel Mazzara, Radhakrishnan DelhiBabu. 587-592 [doi]
- Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE NetworksHaïdar Safa, Nadine Ahmad. 593-599 [doi]
- Neural Network-Based Estimation for OFDM ChannelsChia-Hsin Cheng, Yung-Fa Huang, Hsing-Chung Chen, Tsung-Yu Yao. 600-604 [doi]
- Strength-Constrained Weighted Evolution Model for Wireless Sensor NetworksNan Jiang, Tao Wan, Lingfeng Liu, Jin Li. 605-610 [doi]
- Cooperative Resource Management in a IaaSGiang Son Tran, Alain Tchana, Daniel Hagimont, Noel De Palma. 611-618 [doi]
- A Network-Aware Optimization for VM PlacementL. A. Rocha, F. L. Verdi. 619-625 [doi]
- Efficient Computation Offloading Strategies for Mobile Cloud ComputingYaling Tao, Yongbing Zhang, Yusheng Ji. 626-633 [doi]
- On Supporting Service Selection for Collaborative Multi-cloud Ecosystems in Community NetworksAmin M. Khan, Felix Freitag, Smrati Gupta, Victor Muntés-Mulero, Jacek Dominiak, Peter Matthews. 634-641 [doi]
- TROBADOR: Service Discovery for Distributed Community Network Micro-CloudsMennan Selimi, Felix Freitag, Roger Pueyo Centelles, Agusti Moll, Luís Veiga. 642-649 [doi]
- FIrM: Functional Middleware with Support to Multi-tenancyAndre Silva, Nelson Rosa. 650-657 [doi]
- Free Split: A Write-Ahead Protocol to Improve Latency in Distributed Prefix Tree Indexing StructuresRudyar Cortes, Xavier Bonnaire, Olivier Marin, Pierre Sens. 658-665 [doi]
- A Survey of Home Energy Management for Residential CustomersIhsan Ullah, Nadeem Javaid, Muhammad Imran, Zahoor Ali Khan, Umar Qasim, Mohammed Abdullah Alnuem, Mudassar Bashir. 666-673 [doi]
- A Rule Processing Scheme Using the Rete Algorithm in Grid Topology NetworksTomoya Kawakami, Tomoki Yoshihisa, Yutaka Yanagisawa, Masahiko Tsukamoto. 674-679 [doi]
- Consumers' Sentiment Analysis of Popular Phone Brands and Operating System Preference Using Twitter Data: A Feasibility StudyDeepali Arora, Kin Fun Li, Stephen W. Neville. 680-686 [doi]
- Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoTMohammad Aazam, Eui-nam Huh. 687-694 [doi]
- Preparing and Inter-Connecting Hyper-Converged SmartX Boxes for IoT-Cloud TestbedSun Park, ByungRae Cha, JongWon Kim 0001. 695-697 [doi]
- Cryptographic Operation Load-Balancing between Cryptographic Module and CPUYohei Kaneko, Takamichi Saito, Hiroaki Kikuchi. 698-705 [doi]
- An Approach to Detect Remote Access Trojan in the Early Stage of CommunicationDan Jiang, Kazumasa Omote. 706-713 [doi]
- Privacy Preserving Data ProcessingHiroshi Yamaguchi, Masahito Gotaishi, Phillip C.-Y. Sheu, Shigeo Tsujii. 714-719 [doi]
- Study of Filter Sharing Method Using Virtual Peers in P2P NetworksMasahiro Sakuma, Yoshihiro Kita, Kentaro Aburada, Mirang Park, Naonobu Okazaki. 720-726 [doi]
- Per Connection Server-Side Identification of Connections via TorAndrew Springall, Christopher DeVito, Shou-Hsuan Stephen Huang. 727-734 [doi]
- A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio NetworksNimish Sharma, Danda B. Rawat, Bhed Bahadur Bista, Sachin Shetty. 735-740 [doi]
- Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient SystemGoshi Sato, Noriki Uchida, Yoshitaka Shibata. 741-746 [doi]
- Cluster Based Semantic Data Aggregation in VANETsAboobeker Sidhik Koyamparambil Mammu, Josef Jiru, Unai Hernández-Jayo. 747-753 [doi]
- A Message Suppression Controller for Vehicular Delay Tolerant NetworkingTaiki Honda, Makoto Ikeda, Seiichiro Ishikawa, Leonard Barolli. 754-760 [doi]
- Towards Resource-aware Business Process development in the CloudEmna Hachicha, Walid Gaaloul. 761-768 [doi]
- Establishment of Virtual Policy Based Network Management Scheme by Load Experimets in Virtual EnvironmentKazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa. 769-776 [doi]
- A Framework of Mobile Cloudlet Centers Based on the Use of Mobile Devices as CloudletsAbdalla Artail, Karim Frenn, Haïdar Safa, Hassan Artail. 777-784 [doi]
- Design and Implementation of the Hadoop-Based Crawler for SaaS Service DiscoveryAsma Alkalbani, Akshatha Shenoy, Farookh Khadeer Hussain, Omar Khadeer Hussain, Yanping Xiang. 785-790 [doi]
- Secured mVoIP Service over Cloud and Container-Based ImprovementByungRae Cha, Sun Park, Sujeong Shim, Jong Won Kim. 791-795 [doi]
- Introduction and Analysis of SDN and NFV Security Architecture (SN-SECA)Danilo Valeros Bernardo, Bee Bee Chua. 796-801 [doi]
- Enhancing RPL Resilience Against Routing Layer Insider AttacksKarel Heurtefeux, Ochirkhand Erdene-Ochir, Nasreen Mohsin, Hamid Menouar. 802-807 [doi]
- Secure Outsourcing of Multiple Modular ExponentiationsJinyang Li, Jun Ye. 808-811 [doi]
- Novel Approaches to Protecting Block Ciphers by Distributing Round KeysTaeyoung Jung, Jaein Kim, Junyoung Park, Kangbin Yim. 812-816 [doi]
- Fuzzing CAN Packets into AutomobilesHyeryun Lee, Kyunghee Choi, Kihyun Chung, Jaein Kim, Kangbin Yim. 817-821 [doi]
- Message Relay Decision Algorithm to Improve Message Delivery Ratio in DTN-Based Wireless Disaster Information SystemsMiho Kawamoto, Tetsuya Shigeyasu. 822-828 [doi]
- Adaptive Cell Range Expansion for Energy Cost Saving in Heterogeneous Cellular Networks with Hybrid Energy SuppliesQiao Kong, Bang Wang. 829-836 [doi]
- DCLA: Distributed Chunk Loss Avoidance Method for Cooperative Mobile Live StreamingKenta Mori, Sho Hatakeyama, Hiroshi Shigeno. 837-843 [doi]
- Upgrading 802.11 deployments: A Critical Examination of PerformanceMamun I. Abu-Tair, Saleem N. Bhatti. 844-851 [doi]
- MACoD: Mobile Device-Centric Approach for Identifying Access Point CongestionWoonghee Lee, Mungyu Bae, Hyunsoon Kim, Suk-Kyu Lee, Hwangnam Kim. 852-859 [doi]
- Stateless Adaptive Reliable Broadcast Protocol for Heterogeneous Wireless NetworksVamsi Paruchuri, Arjan Durresi. 860-867 [doi]
- A Triage Training System with Dynamic Scenario ChangeMisaki Hagino, Yuki Tayama, Ken-ichi Okada. 868-875 [doi]
- An Adaptive Video Quality Control Method in Wireless Network EnvironmentMotoo Ino, Koji Hashimoto, Yoshitaka Shibata. 876-881 [doi]
- Travel Agency Desk Support System Using Interest DegreeYusaku Maki, Satoshi Gondo, Tomoo Inoue, Ken-ichi Okada. 882-889 [doi]
- MR Manual and Authoring Tool with AfterimagesHiroyuki Endo, Shinnosuke Furuya, Ken-ichi Okada. 890-895 [doi]
- Item Similarity Learning Methods for Collaborative Filtering Recommender SystemsFeng Xie, Zhen Chen, Jiaxing Shang, Wen-Liang Huang, Jun Li. 896-903 [doi]
- Implementation of an Eye Gaze Tracking System for the Disabled PeopleJunghoon Park, Taeyoung Jung, Kangbin Yim. 904-908 [doi]