Abstract is missing.
- An Efficient Moving Detection Methodology in Mobile Cloud EnvironmentChanghee Cho, Sanghyun Park, Jinsul Kim, Sang Joon Lee. 1-3 [doi]
- Analysis of Spectrum Sensing Based on Energy Detection Method in Cognitive Radio NetworksNamburu Swetha, Panyam Narahari Sastry, Yandra Rajasree Rao. 1-4 [doi]
- Cluster Business Model for Wellness ITSeungae Kang, Youngjoo Kim. 1-2 [doi]
- Research and Implementation of an IMS-Based AS/MRFC Model for IVR ServicesYouzheng Chen, Baozhong Cheng, Xiaoyan Zhang. 1-5 [doi]
- Dynamic Encryption Key Design and Its Security Evaluation for Memory Data Protection in Embedded SystemsTao Liu, Hui Guo. 1-4 [doi]
- Web Based Enterprise Business Intelligence Maturity (EBI2M) Assessment ToolMin-Hooi Chuah, Kee-Luen Wong. 1-3 [doi]
- Web Login Vulnerability Analysis and CountermeasuresSeung-Jae Yoo, Jeong-Mo Yang. 1-4 [doi]
- Transportation Methods of Sensory Information Using Multimedia PacketJaeho Lee, Kyoungro Yoon. 1-4 [doi]
- Developing an Audio-Based GameByoung U. Kim, Nakhoon Baek. 1-3 [doi]
- Foreground Extraction in Video Based on Edge-Based Robust Principal Component AnalysisThuong-Khanh Tran, Ngoc Nam Bui, Jin Young Kim 0002. 1-2 [doi]
- A Novel Prefetch Technique for High Performance Embedded SystemHong Jun Choi, Dong Oh Son, Cheol Hong Kim, Jong Myron Kim Kim. 1-3 [doi]
- Micro-Datacenter Management Architecture for Mobile Wellness InformationWonhyuk Lee, Seunghae Kim, Taeyeon Kim, Hyuncheol Kim. 1-4 [doi]
- Simulations of continental logistics center from the perspective of technologistJuraj Camaj, Jana Lalinska, Jaroslav Masek. 1-4 [doi]
- A General Transfer Station Location Model in Relay Delivery Considering Carbon FootprintQun Zhang, Lirong Wei, Rui Hu. 1-4 [doi]
- Choosing How Tight to Bond: The Interplay between Corporate Combinations, Alliances and NetworksMait Rungi, Valeria Stulova. 1-4 [doi]
- Non-Volatile Unified Memory Page Management for Improving PerformanceAshok Sharma, Sangjae Nam, Cheong-Ghil Kim, Shin-Dug Kim. 1-4 [doi]
- Smart Recycle Bin: A Conceptual Approach of Smart Waste Management with Integrated Web Based SystemMohd Helmy Abd Wahab, Aeslina Abdul Kadir, Mohd Razali Tomari, Mohamad Hairol Jabbar. 1-4 [doi]
- Authentication Techniques for Improving the Reliability of the Nodes in the MANETHwan-Seok Yang, Seung-Jae Yoo. 1-3 [doi]
- On the Approach of Static Feature Extraction in Trojans to Combat against Zero-Day ThreatsAzhar Javed, Monis Akhlaq. 1-5 [doi]
- Network-Based Visualization of Opinion Mining and Sentiment Analysis on TwitterAlemu Molla, Yenewondim Biadgie, Kyung-Ah Sohn. 1-4 [doi]
- Bad Symptoms for Usability of Mobile ApplicationsSoojin Park, Jeongwon Byeon, Mansoo Whang, Young B. Park. 1-4 [doi]
- The Design of Two Versions of 3D MouseJiayang Sun, Cheng Feng, Donglin Wang, Meng Gu. 1-5 [doi]
- A Study on Audio Levels and Loudness Standard for Digital Broadcasting ProgramSangwoon Lee, BongJin Baek, Cheongghil Kim. 1-3 [doi]
- Heuristics for the Vendor-Managed Inventory Problem of Convenience StoresSung-Joon Yoon, Yang-Byung Park. 1-3 [doi]
- Fitness Image Model for Individual with DisabledSeungae Kang, Sunyoung Kang, Hyuncheol Kim. 1-3 [doi]
- Risk Management & Assessment on Road Safety Concerns: Case of Road Rehabilitation ProjectShamsiya Kudratova, Xiaoxia Huang, Khikmatullo Kudratov. 1-4 [doi]
- An Enhanced TAC/AA Competition Model Designed for Sponsored Search MarketBing Li, Xin Fang, Ruifeng Sun, Xue Luo, Wei-Hao Chang. 1-4 [doi]
- An Object Pool Realization of Whitelist Strategies to Neutralize Injection FlawsSeokmo Kim, Young B. Park. 1-5 [doi]
- Information Sharing in Governance of Flood Management in Malaysia: COBIT Based FrameworkSiti Sarah Maidin, Marini Othman, Mohammad Nazir Ahmad. 1-5 [doi]
- Profiling Flood Risk through Crowdsourced Flood Level ReportsJohn Noel C. Victorino, Maria Regina Justina E. Estuar. 1-4 [doi]
- GTS Allocation Strategy for IEEE 802.15.4 WSNSatish K. Shah, Sonal J. Rane, Dharmistha D. Vishwakarma. 1-5 [doi]
- Impact of Clock Frequency and Number of Cores on GPU PerformanceHong Jun Choi, Dong Oh Son, Cheol Hong Kim, Jong Myron Kim Kim. 1-4 [doi]
- A Research on Expatriate Cross- Cultural Adjustment and Job Performance in MNCsKudratov Khikmatullo, Liu Cheng. 1-4 [doi]
- Telugu Handwritten Character Recognition Using Zoning FeaturesPanyam Narahari Sastry, T. R. Vijaya Lakshmi, N. V. Koteswara Rao, T. V. Rajinikanth, Abdul Wahab. 1-4 [doi]
- Implementation of a Reading Assistive Computer System Using Image Processing TechniquesSe-Yeol Yang, Jung-Ja Kim. 1-4 [doi]
- Enhanced Face Recognition by Fusion of Global and Local Features under Varying IlluminationTan Dat Trinh, Jin Young Kim, Seung You Na. 1-4 [doi]
- Pruning Algorithm for Multi-Objective Optimization with Decision Maker's Preferences of System Redundancy Allocation ProblemTipwimol Sooktip, Naruemon Wattanapongsakorn. 1-4 [doi]
- An Approach to Detecting Software Process DeviationsRui Zhu, Tong Li, Fei Dai, Qi Mo, Leilei Lin, Yun He, Yeting Chen. 1-4 [doi]
- A Case Study of Visual Analytic Method on Behavior Modification by Movement TherapyJaeho Lee, Inkyung Byun, Kyoungro Yoon. 1-4 [doi]
- Intuitive Gestural Interfaces / Adaptive Environments and Mobile Devices / Apps.: Playing Music and the Musical Work as a Role Model for Personalized Gestural Interaction in Social EnvironmentsWerner Jauk. 1-4 [doi]
- An Adaptive LOD Setting Methodology with OpenGL ES Library on Mobile DevicesJin-Chun Piao, Chang-Woo Cho, Cheong-Ghil Kim, Bernd Burgstaller, Shin-Dug Kim. 1-4 [doi]
- Virtual Environment Based Graphical User Interface for Authoring and Visualization SystemDongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee. 1-2 [doi]
- Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging TechnologySeokcheol Lee, Yongmin Park, Hyunwoo Lim, Taeshik Shon. 1-4 [doi]
- Analysing Different Threats Levels in NGN and Ensuring Its Security with Quality of ServicesMuhammad Usman, Shoaib Hassan. 1-5 [doi]
- QoE Oriented Analysis for Video Quality AssessmentYogiraj S. Jadhav, Baeho Lee, Jinsul Kim. 1-4 [doi]
- Line-Of-Sight Based Beamforming for Security Enhancements in Wiretap ChannelsShihao Yan, Robert A. Malaney. 1-4 [doi]
- A SIFT-Color Moments Descriptor for Object RecognitionLu Bo, TaegKeun Whangbo. 1-3 [doi]
- Building UWB Based Smart Home Network for Wireless IPTVSeong Ro Lee, Beom Mu Kim, Min A. Jeong, Jin-Woo Kim. 1-4 [doi]
- Human Detection in Video Using Poselet Combine with Gradient Local Auto Correlation ClassifierThuong-Khanh Tran, Ngoc Nam Bui, Jin Young Kim. 1-4 [doi]
- Study on Datamining Techinique for Foot Disease PredictionJung-Kyu Choi, Chan-Il Yoo, Kyung-ah Kim, Yonggwan Won, Jung-Ja Kim. 1-4 [doi]
- A Magnetic Resonant Coupling Wireless Power Transmission System under Different Load ConditionsHanqiu Mo, Yasuaki Inoue. 1-4 [doi]
- Improved QEM Simplification Algorithm Based on Discrete Curvature and a Sparseness CoefficientYungang Wei, Lei Wu, Bo Sun, Xiaoming Zhu. 1-5 [doi]
- Dynamic Security Level Changing Strategy Using Attack Predictions - Case Study of TCP SYN AttacksSung-Hwa Lim, Jai-Hoon Kim. 1-4 [doi]
- A Code Based Fruit Recognition Method Via Image Convertion Using Multiple FeaturesJang-Yoon Kim, Michael Vogl, Shin-Dug Kim. 1-4 [doi]
- New Solution for a Benchmark Nurse Scheduling Problem Using Integer ProgrammingGeetha Baskaran, Andrzej Bargiela, Rong Qu. 1-4 [doi]
- An Evaluation of Feature Selection Technique for Dendrite Cell AlgorithmMohamad Farhan Mohamad Mohsin, Abdul Razak Hamdan, Azuraliza Abu Bakar. 1-5 [doi]
- Analysis on the Power Efficiency of Mobile Systems Varying Device ParametersDong Oh Son, Hong Jun Choi, Jong Myon Kim, Cheol Hong Kim. 1-3 [doi]
- A Community Divisive Algorithm Using Local Weak LinksLin Li, Songnian Lu, Shenghong Li, Zhengmin Xia. 1-5 [doi]
- IT Technology and Exercise RehabilitationByungyeon Park, Wonhyuk Lee, Hyuncheol Kim. 1-2 [doi]
- A User Centric Identity Management for Internet of ThingsDo van Thuan, Pranas Butkus, Do Van Thanh. 1-4 [doi]
- Emergent Challenges and IPDS for Anti-Phishing AttackBing Li, Ruifeng Sun, Xin Fang, Xue Luo, Wei-Hao Chang. 1-4 [doi]
- Network Stability Based on Node WeightSeunghae Kim, Wonhyuk Lee, Hyuncheol Kim. 1-3 [doi]
- Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 NetworksDong Chun Lee, Kuinam J. Kim. 1-4 [doi]
- Application of Advanced Encryption Standard to Chaotic Synchronization Systems: Using an Improved Genetic Algorithm as AuxiliaryFeng-Hsiag Hsiao, Guang-Wei Liou. 1-4 [doi]
- Rotation Invariant Detection Using Image IdentifierTakaaki Ishikawa, Je-Ho Park. 1-3 [doi]
- SLAN-Based Next Generation User-Customized Dynamic Interface Sharing for Smart Mobile DevicesSanghyun Park, Jiseung Nam, Jinsul Kim. 1-3 [doi]
- Classification of Human Postures Using Ultra-Wide Band Radar Based on Neural NetworksMohammad Ahangar Kiasari, Seung You Na, Jin Young Kim 0002. 1-4 [doi]
- Study of Packet Level UDP Performance of NAT44, NAT64 and IPv6 Using Iperf in the Context of IPv6 MigrationVitruvius John D. Barayuga, William Emmanuel S. Yu. 1-6 [doi]
- Evaluation of Sitting Balance in Adolescent Idiopathic Scoliosis Patients with Pelvic Rotation Using Balance Board System with AccelerometerJi-Yong Jung, Chan-Il Yoo, Kyung-ah Kim, Soo-Kyung Bok, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim. 1-4 [doi]
- Data Perturbations for All DMUs in DEA with Interval UncertaintyFeng He, Xiaoning Xu, Liyun Zhu. 1-6 [doi]
- Environmental Efficiency Evaluation with Undesirable Outputs-A Study on China's Iron and Steel IndustryFeng He, Liyun Zhu, Wei Jiang. 1-4 [doi]
- Validating UI through UX in the Context of a Mobile - Web Crowdsourcing Disaster Management ApplicationMaria Regina Justina E. Estuar, Marlene M. De Leon, Maria Dianne Santos, John Owen F. Ilagan, Barbara Anne May. 1-4 [doi]
- White Matter Hyperintensities Extraction Based T2-FLAIR MRI Using Non-Local Means Filter and Nearest Neighbor AlgorithmTrin Thi Thu Hah, Jin Young Kim, Seung Ho Choi. 1-4 [doi]
- Big Data Analysis Using Apache HadoopShankar Ganesh Manikandan, Siddarth Ravi. 1-4 [doi]
- Ensuring Data Security by AES for Global Software Development in Cloud ComputingMuhammad Usman, Usman Akram. 1-7 [doi]
- Privacy Preserving Smart Grid Management in the CloudSelçuk Baktir. 1-4 [doi]
- A Study on Implementation of IVI Applications for Connected Vehicle Using HTML5Insick Son, Kabsu Han, Daejin Park, Meng Di Yin, Jeonghun Cho. 1-4 [doi]
- Rapid Application Development of Ebayanihan Patroller: A Crowdsourcing SMS Service and Web Visualization Disaster Reporting SystemMarlene M. De Leon, Ma. Regina E. Estuar. 1-4 [doi]
- Uncertain Portfolio Selection with Background RiskXiaoxia Huang, Hao Di. 1-3 [doi]
- An Interference Avoidance System Using Energy Contour Line for Coexistence with Ieee 802.11 Networks in Wireless Sensor NetworksJin-Woo Kim, Jin Gwan Park, Min A. Jeong, Seong Ro Lee. 1-4 [doi]
- A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile DeviceJong-Yeon Park, Jung-Nyeo Kim, Jae-Dock Lim, Dong-Guk Han. 1-5 [doi]
- Correlation Analysis between Idiopathic Scoliosis and Pelvic Asymmetry Using Sitting Posture Measurement SystemJi-Yong Jung, Chan-Il Yoo, Kyung-ah Kim, Soo-Kyung Bok, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim. 1-4 [doi]
- Defense Methodologies of AV Evasion for Access Control and Information Assurance in Industrial Distributed Control Systems and SCADA SystemsSai Krishna Pallimalli, Arshad Shaik. 1-5 [doi]
- A Systematic Redundancy Approach in Watermarking Using SudokuShamsul Kamal Ahmad Khalid, Mustafa Mat Deris, Kamaruddin Malik Mohamad. 1-5 [doi]
- Status Trend Evaluation Research on Development of Low Carbon Economy in Coal EnterprisesDong-dong Ma, Feng He. 1-4 [doi]
- Web Based Visualization for Sports Data PatternDongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee. 1-2 [doi]
- A GPS Information Sharing System Based on Bluetooth TechnologyChao Liu, Changkai Zhang, Hong Yao, Deze Zeng, Qingzhong Liang, Chengyu Hu. 1-2 [doi]
- Virtual Reality Exercise SimulatorSoojung Park, Bongsup Park. 1-2 [doi]
- Brain Segmentation Using Susceptibility Weighted Imaging MethodSung-Jong Eun, Taeg Keun Whangbo. 1-3 [doi]
- Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript EnginesAmir Azodi, David Jaeger, Feng Cheng 0002, Christoph Meinel. 1-4 [doi]
- The Five Factors Influencing Software Architecture Modeling and Evaluation TechniquesHassan Almari, Clive Boughton. 1-8 [doi]
- Object Tracking Methods in Wireless Sensor Network: Network Structure ClassificationRozanawati Darman, Norafida Ithnin. 1-3 [doi]
- User Position Estimation and Visualization Using Power Consumption of Home AppliancesDongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee. 1-4 [doi]
- Implementation of Mobile-Phone Services in Preventing Mother-To-Child Transmission of HIV (PMTCT)Christina Muro, Leonard James Mselle. 1-4 [doi]
- Effect of Knowledge Management Based Error Mitigation Techniques in Medical and Diagnostic ApplicationsMaysoon S. Aldekhail. 1-6 [doi]
- A Preference-Based Multi-Objective Evolutionary Algorithm for Redundancy Allocation ProblemSufian Sudeng, Naruemon Wattanapongsakorn. 1-4 [doi]
- PLGC: Partial Linked GC for DatacenterSohyun Koo, Se Jin Kwon, Sungsoo Kim, Tae-Sun Chung. 1-3 [doi]
- A Study of High Efficiency Video Coding File FormatApiradee Ampawasiri, Chompoo Suppatoomsin, BongJin Baek, JoonHo Ryu, Sangwoon Lee, Cheongghil Kim. 1-2 [doi]
- Multi-Objective Optimization Techniques for VLSI PlacementsYasutaka Matsuoka, Hua-An Zhao. 1-4 [doi]
- Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal ForceYongmin Park, Seokjun Lee, Jongwan Kim, Taeshik Shon. 1-4 [doi]
- JPEG-AR Standard Enabling Augmented MarketingMin-Uk Kim, Kyoungro Yoon. 1-2 [doi]
- Barriers to Community-Based Computing in the PhilippinesJohn Owen F. Ilagan, Ma. Regina E. Estuar. 1-4 [doi]
- A Study on Secure Element for SmartworkHwan-Seok Yang, Seung-Jae Yoo. 1-3 [doi]
- Massive Open Online Course (MOOC) with Learning Objects and Intelligent Agent TechnologiesOng Sing Goh, Mohd Khanapi Abd. Ghani, Yogan Jaya Kumar, Yun-Huoy Choo, Azah Kamilah Muda. 1-4 [doi]
- A Height-Map Based Terrain Rendering with Tessellation HardwareGoanghun Kim, Nakhoon Baek. 1-4 [doi]
- Abused Android Permissions by Advertising NetworksMurat Ogul, Selçuk Baktir, Emin Islam Tatli. 1-4 [doi]
- An SMO Approach to Fast SVM for Classification of Large Scale DataJuanxi Lin, Mengnan Song, Jinglu Hu. 1-4 [doi]
- On-Chip Event Debugger (OCeD) with Automated Code Execution Engine for Control Flow DetectionDaejin Park, Meng Di Yin, Jeonghun Cho. 1-3 [doi]
- Attacks about Channel Bonding on WLANDo-Young Chung, Sok-joon Lee, Sin-Hyo Kim. 1-3 [doi]
- Voting Models for Summary Extraction from Text DocumentsYogan Jaya Kumar, Ong Sing Goh, Mohd Khanapi Abd. Ghani, Naomie Salim, Ameer Tawfik Albaham. 1-4 [doi]
- Performance Comparison of Multilayer Neural Networks for Sleep Snoring DetectionTan Loc Nguyen, Yonggwan Won. 1-3 [doi]
- Design and Implementation of Display Module for Electronic Navigational Chart DataGeunHong Park, Dae-Won Park, Suhyun Park. 1-3 [doi]
- Real-Time Visualization of Disaster BehaviorJhoanna T. Isla, Ma. Regina E. Estuar. 1-4 [doi]
- A Multi-Core Architectural Pattern Selection Method for the Transition from Single-Core to Multi-Core ArchitectureSoojin Park, Young B. Park. 1-5 [doi]
- Combining STUN Protocol and UDP Hole Punching Technique for Peer-To-Peer Communication across Network Address TranslationTran Thi Thu Ha, Jaehyung Park, Yonggwan Won, Jinsul Kim. 1-4 [doi]
- Entropy Based Image Identifier GenerationJe-Ho Park, Changwon Kang. 1-2 [doi]
- Scenario-Based Attack Route on Industrial Control SystemSungMoon Kwon, Hyunguk Yoo, Taeshik Shon, Gunwoong Lee. 1-3 [doi]
- Secure Microcontroller with On-Chip Hierarchical Code Validator for Firmware AuthenticationDaejin Park, Meng Di Yin, Jeonghun Cho. 1-3 [doi]
- Analysis of Effect of Luminance Space on Face DetectionHyuk-Kyu Lim, Je-Ho Park, Han Auk Kim. 1-2 [doi]
- Efficient Method for Processing Consecutive Events over Streams with a Negation LinkYoung Cheul Kim, Jongik Kim, Hyung-Ju Cho, Tae-Sun Chung. 1-4 [doi]
- Evaluation of Custom-Made Insoles on Pes Cavus During WalkingJung-Kyu Choi, Chan-Il Yoo, Kyung-ah Kim, Yonggwan Won, Jung-Ja Kim. 1-4 [doi]
- A Study on Privacy Protection Tasks for Cross-Border Data TransfersYoung-Jin Shin. 1-4 [doi]
- Human Detection and Tracking Using Poselet with Weighted Motion Block Particle FiltersNgoc Nam Bui, Thuong-Khanh Tran, Chenlin Hu, Jin Young Kim, Hyoung-Gook Kim. 1-5 [doi]