Abstract is missing.
- Cryptanalysis of Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve CryptosystemJongho Mun, Jiseon Yu, Jiye Kim, Hyungkyu Yang, Dongho Won. 1-6 [doi]
- Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor NetworksYounsung Choi, Youngsook Lee, Dongho Won. 7-13 [doi]
- Proving Sufficient Completeness of Constructor-Based Algebraic SpecificationsMasaki Nakamura 0001, Daniel Gâinâ, Kazuhiro Ogata 0001, Kokichi Futatsugi. 15-21 [doi]
- Effect of Zooming Speed and Pattern on Using IPTV by Zoomable User InterfaceSamuel Sangkon Lee, Haeng-Suk Chae. 23-29 [doi]
- Malware Similarity Analysis Based on Graph Similarity Flooding AlgorithmJing Liu, Yongjun Wang, Peidai Xie, Yuan Wang, Zhijian Huang. 31-37 [doi]
- The Effect of Information Quality on User Loyalty Towards Smartphone ApplicationsWonjin Jung. 39-44 [doi]
- Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier TablesJaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, Jongho Mun, Dongho Won. 45-51 [doi]
- The Effects of Information Quality on Mental Model and Interactivity in a Smartphone ContextWonjin Jung. 53-58 [doi]
- Immersive Dissection Simulator Using Multiple Volume RenderingKoo-Joo Kwon, Dong-Su Kang, Byeong-Seok Shin. 59-64 [doi]
- Business Informatics Management ModelAlena Buchalcevová, Jan Pour. 65-71 [doi]
- Group Awareness in Task Context-Aware E-mail PlatformMasashi Katsumata. 73-78 [doi]
- An Android-Based Feed Behavior Monitoring System for Early Disease Detection in LivestockSaraswathi Sivamani, HongGeun Kim, Myeongbae Lee, Chang-Sun Shin, Jangwoo Park, Yongyun Cho. 79-84 [doi]
- Location-Aware WBAN Data Monitoring System Based on NoSQLYan Li, Byeong-Seok Shin. 85-91 [doi]
- Optimization of a Hybrid Renewable Energy System with HOMEROlly Roy Chowdhury, HongGeun Kim, Yongyun Cho, Chang-Sun Shin, Jangwoo Park. 93-99 [doi]
- Efficient Character Input Scheme Based on Gyro-Accelerometer Sensor for NUIHyun Woo Kim, Boo-Kwang Park, HwiRim Byun, Yoon-A. Heo, Young-Sik Jeong. 101-107 [doi]
- Ubiquitous Bluetooth Mobile Based Remote Controller for Home Entertainment CentreAndy Shui-Yu Lai, Ching-Laam Leung. 109-115 [doi]
- Robust Feature Design for Object DetectionWoong Hu, Min-Su Koo, Jae-Hyun Nam, Byung-Gyu Kim, Sung Ki Kim. 117-123 [doi]
- An Efficient Key Management Scheme for Advanced Metering InfrastructureMin Sik Kim, Seung-Kyu Park, Hyo-Seong Kim, Kwang-il Hwang. 125-130 [doi]
- Levenshtein Distance-Based Posture Comparison Method for Cardiopulmonary Resuscitation EducationYunsick Sung, Ji-Won Kim, Hyung Jin Park, Kyung-Min Park. 131-136 [doi]
- HMM Based Duration Control for Singing TTSNajeeb Ullah Khan, Jung-Chul Lee. 137-143 [doi]
- Data Analysis of Automated Monitoring System Based on Target FeaturesM. S. Islam, J.-C. Lee, J. P. Shin, U. P. Chong. 145-152 [doi]
- A Persistent Web Data Architecture with Named Data NetworkingEuihyun Jung. 153-158 [doi]
- Load Shedding for Window Queries Over Continuous Data StreamsKwang Rak Kim, Hyeon Gyu Kim. 159-164 [doi]
- Improved Location Estimation Method of Trilateration in Ubiquitous Computing Indoor EnvironmentJeonghoon Kwak, Hyunseok Jang, Yunsick Sung, Young-Sik Jeong. 165-169 [doi]
- Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network FlowsSunoh Choi, Hyun Wook Park, Joo-Young Lee, Jong-Hyun Kim, Ik-Kyun Kim. 171-175 [doi]
- Group ID Issuing Model Using Temporal Explicit Movement in Social Life LoggingYoung Ho Jo, Jung Nyun Lee, Heajin Kim, Jin Cheol Woo, Yu-Jin Lee, Min Cheol Whang. 177-183 [doi]
- An Analysis of Infographic Design for Life-Logging ApplicationSojung Kwak, Joeun Lee, Jieun Kwon. 185-191 [doi]
- Cardiovascular Synchrony for Determining Significant Group in Social Life LoggingJincheol Woo, Young-Ju Kim, Seung Seob Shin, Young Ho Jo, Hojung Choi, Mincheol Whang. 193-199 [doi]
- Correlation Between Heart Rate and Image ComponentsMin Woo Park, Jiwon Im, Jieun Kwon, Mincheol Whang, Eui Chul Lee. 201-207 [doi]
- Experimental Verification of Gender Differences in Facial Movement According to EmotionYoonkyoung Kim, Eui Chul Lee. 209-215 [doi]
- Heart Rate Synchronization with Spatial Frequency of Visual StimuliJiwon Im, Min Woo Park, Eui Chul Lee. 217-222 [doi]
- Effective Similarity Measurement for Key-Point Matching in ImagesSungmin Lee, Seung-Won Jung, Chee Sun Won. 223-228 [doi]
- Vocabulary Modeling of Social Emotion Based on Social Life LoggingHea-Jin Kim, Young Ho Jo, Young-Joo Kim, Hye Sun Kim, Min Cheol Whang. 229-236 [doi]
- LIDAR Simulation Method for Low-Cost Repetitive ValidationSeongjo Lee, Dahyeon Kang, Seoungjae Cho, Sungdae Sim, Yong Woon Park, Kyhyun Um, Kyungeun Cho. 237-242 [doi]
- Posture Recognition Using Sensing BlocksYulong Xi, Seoungjae Cho, Kyhyun Um, Kyungeun Cho. 243-247 [doi]
- Design of Secure Protocol for Session Key Exchange in Vehicular Cloud ComputingJungho Kang, Jong Hyuk Park. 249-254 [doi]
- Zero-Knowledge Authentication for Secure Multi-cloud Computing EnvironmentsHyungjoo Kim, Hyunsoo Chung, Jungho Kang. 255-261 [doi]
- PUF-Based Privacy Protection Method in VANET EnvironmentMansik Kim, Wonkyu Choi, Ayoung Lee, Moon-Seog Jun. 263-268 [doi]
- Design of Authentication Protocol Based on Distance-Bounding and Zero-Knowledge for Anonymity in VANETMinjin Kim, Keun-Chang Choi, Hanna You, Moon-Seog Jun. 269-274 [doi]
- Design of Exploitable Automatic Verification System for Secure Open Source SoftwareBumryong Kim, Jun-ho Song, Jae-Pyo Park, Moon-Seog Jun. 275-281 [doi]
- User Authentication Method Design Based on Biometrics in a Multi-cloud EnvironmentSeokhwa Song, Jaeseung Lee, Jaesik Lee, Moon-Seog Jun. 283-288 [doi]
- A Study on Framework for Developing Secure IoT ServiceMiyeon Yoon, Jonghyun Baek. 289-294 [doi]
- Device Dedication in Virtualized Embedded SystemsSoo Young Kim, Hyunwoo Joe, Dongwook Kang, Jin-Ah Shin, Vincent Dupre, Taeho Kim, Chaedeok Lim. 295-299 [doi]
- An Estimation Filtering for Packet Loss Probability Using Finite Memory Structure StrategyPyung Soo Kim, Eung Hyuk Lee, Mun-Suck Jang. 301-307 [doi]
- Cryptanalysis of User Authentication Scheme Preserving Anonymity for Ubiquitous DevicesDongwoo Kang, Jongho Mun, Donghoon Lee, Dongho Won. 309-315 [doi]
- Feasibility and Reliability of a Mobile Application for Assessing Unilateral NeglectHyun Lee, Hyeon-Gi Lee, Ji Heon Hong. 317-323 [doi]
- A Context-Aware Framework for Mobile Computing EnvironmentHoon-Kyu Kim, Choung-Seok Kim, Kyung-Chang Kim. 325-330 [doi]
- The Design of Log Analysis Mechanism in SDN Quarantined Network SystemTae-young Kim, Nam-Uk Kim, Tai-Myoung Chung. 331-336 [doi]
- A Study on the Defense MITM with Message Authentication in WLAN EnvironmentsJi-Hoon Hong, Nam-Uk Kim, Tai-Myoung Chung. 337-344 [doi]
- Interactive Activity Recognition Using Articulated-Pose Features on Spatio-Temporal RelationThien Huynh-The, Dinh-Mao Bui, Sungyoung Lee, Yongik Yoon 0001. 345-351 [doi]
- Development of Learner-Centric Teaching-Learning Application Model for Ubiquitous LearningJi-Hye Bae, Hyun Lee. 353-359 [doi]
- EAP: Energy-Awareness Predictor in Multicore CPUDinh-Mao Bui, Thien Huynh-The, Yongik Yoon 0001, SungIk Jun, Sungyoung Lee. 361-366 [doi]
- Design and Implementation of LMS for Sharing Learning Resources in e-LearningDae-Hyun Lee, Yong Kim. 367-373 [doi]
- A Zero-Watermarking Scheme Based on Spread Spectrum and HolographyDe-li, Dayou Jiang, JongWeon Kim. 375-381 [doi]
- A Novel Seamless Redundancy Protocol for EthernetNguyen Xuan Tien, Jong-myung Rhee. 383-389 [doi]
- Mutual Authentication Scheme Based on GSM for NFC Mobile Payment EnvironmentsSung-Wook Park, Im-Yeong Lee. 391-395 [doi]
- Necessity of Incentive System for the First Uploader in Client-Side DeduplicationTaek-Young Youn, Ku-Young Chang. 397-402 [doi]
- Design and Implementation of Disaster Information Alert System Using Python in Ubiquitous EnvironmentJae-Pil Lee, Jae-Gwang Lee, Eun-Su Mo, Jun-Hyeon Lee, Jae Kwang Lee. 403-409 [doi]
- A Study on the Development of Real-Time Analysis Monitoring System and Its Application of Medical InsMi-Jin Kim, Jong-Wook Jang, Yun-Sik Yu. 411-416 [doi]
- Green Treatment Plan Selection Based on Three Dimensional Fuzzy Evaluation ModelFei Hao, Doo-Soon Park, Sangyeon Woo. 417-423 [doi]
- Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel StructureKeonwoo Kim, Ku-Young Chang. 425-430 [doi]
- Energy Consumption Reduction Technique on Smart Devices for Communication-Intensive ApplicationsJonghee M. Youn, Doosan Cho, Yunheung Paek, Kwangman Ko. 431-435 [doi]
- Framework of Service Accountability and Policy Representation for Trustworthy Cloud ServicesHyejoo Lee, Hyunil Kim, Changho Seo, Sang Uk Shin. 437-443 [doi]
- A New Visual Pet Activities Monitoring System DesignYahya Imad Mohammed, Jong-myung Rhee. 445-450 [doi]
- A Study of Security Level in Cloud ComputingEric Niyonsaba, Jong-Wook Jang. 451-456 [doi]
- The Dynamic Unequal Clustering Routing Protocol Based on Efficiency Energy in Wireless Sensor NetworkNurhayati. 457-463 [doi]
- A Study on the Localization Algorithm Using RSSI and Directional Antennas Between Sensor Nodes for the DV-HOP AlgorithmMunSuck Jang, Byungchul Kim, PyungSoo Kim, EungHyuk Lee. 465-470 [doi]
- Estimation of Human Social Relation Based on Device ConnectivityDong-Oh Kang, Changseok Bae. 471-476 [doi]
- Secure Framework for Software Defined Based Internet of ThingsSeong Ho Choi, Jin Kwak. 477-482 [doi]
- Secure Data Access Control Scheme for Smart HomeHo-Seok Ryu, Jin Kwak. 483-488 [doi]
- A Combination of PSO-Based Feature Selection and Tree-Based Classifiers Ensemble for Intrusion Detection SystemsBayu Adhi Tama, Kyung Hyune Rhee. 489-495 [doi]
- Secure Traffic Data Transmission Protocol for Vehicular CloudLewis Nkenyereye, Kyung Hyune Rhee. 497-503 [doi]
- A Short-Range Tracking System Based on Bluetooth Radio Identification: An Algorithm and Its ImplementationIbraheem Raed Altaha, Jong Myong Rhee. 505-512 [doi]
- Design and Implementation of a Collaboration Messenger System Based on MQTT ProtocolHyun Cheon Hwang, JiSu Park, Jin Gon Shon. 513-519 [doi]
- Financial Security Protocol and Service Model for Joint Account Banking TransactionJungJin Ahn, Eunmi Choi. 521-527 [doi]
- Development of a Cursor for Persons with Low VisionJong Won Lee, JiSu Park, Jong-il Lee, Jin Gon Shon. 529-534 [doi]
- Implementation of Unified Gesture Library for Multiple-Devices EnvironmentsEunji Song, Sunghan Kim, Geun-Hyung Kim. 535-540 [doi]
- Design of the Real-Time Mobile Push System for Implementation of the Shipboard Smart WorkingJoonheung Park, Taehoon Koh, Jun Ho Huh, Taeyoung Kim, Jeongho Lee, Jaesoon Kang, Donghyun Ju, Jeongdae Kim, Junwon Lee, Taewook Hwang, Youngjoon Park, Kyungryong Seo. 541-548 [doi]
- A Shipboard Secret Ballot System for the ICT-Isolated Ocean CrewsJun Ho Huh, Taehoon Koh, Kyungryong Seo. 549-557 [doi]
- Secure Deletion for Flash-Based Self-Encrypting DrivesHanWook Lee, Jongho Mun, Jiye Kim, Youngsook Lee, Dongho Won. 559-566 [doi]
- A Distributed Mobility Support in SDN-Based LTE/EPC ArchitectureYong Hwan Kim, Hyun-kyo Lim, Kyoung-han Kim, Youn-Hee Han, Joosang Youn. 567-573 [doi]
- Implementation of Wireless Communication-Based Video Control System for Media FaçadeSooyeon Lim, Jaeha Lyu. 575-581 [doi]
- Adaptive Clustering of Merchandise Code for Recommender System with an Immediate EffectYoung-Sung Cho, SongChul Moon. 583-592 [doi]
- Bayesian Probability-Based Motion Estimation Method in Ubiquitous Computing EnvironmentsPhil Young Kim, Yunsick Sung, Jong Hyuk Park. 593-598 [doi]
- Occlusion Detection Using Multi-Mode Mean-Shift TrackingEun-Sub Kim, Min Hong, Yoo-Joo Choi. 599-606 [doi]
- OCSP Modification for Supporting Anonymity and High-Speed Processing in Vehicle Communication SystemJaewon Lee, Beom-Jin Choi, Seol-Hee Seon, Eun-Gi Kim. 607-612 [doi]
- A Study on the New Ethernet Communication Method Using Virtual MAC AddressJae-Won Ahn, Seung-Peom Park, Kwon-Jeong Yoo, Eun-Gi Kim. 613-618 [doi]
- A Hybrid Prediction Model Integrating FCM Clustering Algorithm with Supervised LearningSeokhwan Yang, Jieun Choi, Sanghoon Bae, Mokdong Chung. 619-629 [doi]
- Environmental Monitoring Over Wide Area in Internet of ThingsSun Ok Yang, Joon-Min Gil, SungSuk Kim. 631-636 [doi]
- Speech-to-Text-Based Life Log System for SmartphonesDongmahn Seo, Joon-Min Gil. 637-642 [doi]
- The Packet Filtering Method with Packet Delay Distribution Forecasting for Stability and Synchronization in a Heterogeneous NetworkKyeong-Rae Cho, You-Boo Jeon, Keun-Ho Lee, Jinsoo Park. 643-648 [doi]
- An Automatic Feedback System Based on Confidence Deviations of Prediction and Detection Models for English Phrase BreakByeongchang Kim, Gary Geunbae Lee. 649-655 [doi]
- Conceptual Design of a Network-Based Personalized Research EnvironmentHeeseok Choi, Jiyoung Park, Hyungseop Shim, Beom-Jong You. 657-662 [doi]
- Design and Implementation of the Basic Technology for Realtime Smart Metering System Using Power Line Communication for Smart GridJun Ho Huh, Dong-Geun Lee, Kyungryong Seo. 663-669 [doi]
- Parallel Balanced Team Formation Clustering Based on MapReduceByoung Wook Kim, Ja Mee Kim, Won-Gyu Lee, Jin Gon Shon. 671-675 [doi]
- 2D Barcode Localization Using Multiple Features Mixture ModelMyeongsuk Pak, Sanghoon Kim. 677-682 [doi]
- LPLB: A Novel Approach for Loop Prevention and Load Balancing in Ethernet Ring NetworksSaad Allawi Nsaif, Nguyen Xuan Tien, Jong-myung Rhee. 683-691 [doi]
- Design & Implementation for Emergency Broadcasting Using Agencies' Disaster InformationGeum-Young Min, Hyoung-Seop Shim. 693-697 [doi]
- Application and Development of Service Integration Platform for Agricultural ProductsGeum-Young Min, Min-ho Jung, Hyoung-Seop Shim. 699-703 [doi]
- Implementation of Kegel Exercises for Prevention of Urinary Incontinence and Treatment ThereofJea-Hui Cha, Jong-Wook Jang. 705-711 [doi]
- A Functional Relationship Based Attestation Scheme for Detecting Compromised Nodes in Large IoT NetworksYong-Hyuk Moon, Yong-Sung Jeon, Chan-Hyun Youn. 713-721 [doi]
- Multiple Service Robot Synchronization and Control with Surveillance System Assistance for Confined Indoor Area ApplicationsDoug Kim, Sangjin Hong, Nammee Moon. 723-730 [doi]
- Author Identification and Analysis for Papers, Reports and PatentsKwang-Young Kim, Seok-Hyoung Lee, Jung-Sun Yoon, Beom-Jong You. 731-735 [doi]
- Resource-Aware Job Scheduling and Management System for Semiconductor ApplicationHyesuk Park, Seungyun Kim, Taehyun Kim, Junghoon Kim, Youngkwan Park, Young Ik Eom. 737-744 [doi]
- Live Mobile Learning System with Enhanced User InteractionJang Ho Lee, Haedong Hwang. 745-750 [doi]
- Implementation of Autonomous Navigation Using a Mobile Robot IndoorSung Woo Noh, Dong Jin Seo, Tae Gyun Kim, Seong Dae Jeong, Kwang Jin Kim. 751-756 [doi]
- Convergence Modeling of Heterogeneous Medical Information for Acute Myocardial InfarctionMeeyeon Lee, Ye-seul Park, Myung Hee Kim, Jung-Won Lee. 757-763 [doi]
- HiL Test Based Fault Localization Method Using Memory Update FrequencyKi Yong Choi, Jooyoung Seo, Seung Yeun Jang, Jung-Won Lee. 765-772 [doi]
- Data Cascading Method for the Large Automotive Data Acquisition Beyond the CAN Bandwidth in HiL TestingJeong-Woo Lee, Ki Yong Choi, Seung Yeun Jang, Jung-Won Lee. 773-780 [doi]
- Classification Framework for Electropulsegraph WavesJinsoo Park, Dong Hag Choi, Se Dong Min, Doo-Soon Park. 781-787 [doi]
- Optimization of LSPL Algorithm for Data Transfer in Sensor Networks Based on LEACHWang-Boo Jeong, Dong-Won Park, Young-Ho Sohn. 789-796 [doi]
- In-Memory Processing for Nearest User-Specified Group SearchHong Jun Jang, Woo-Sung Choi, Kyeong-Seok Hyun, Taehyung Lim, Soon Young Jung, JaeHwa Chung. 797-803 [doi]
- Choreography Retrieval from the Korean POP Dance Motion Capture Database with Low-Cost Depth CamerasDohyung Kim, Minsu Jang, Youngwoo Yoon, Jaehong Kim. 805-811 [doi]
- Enhancing PIN Input for Preventing Eavesdropping in BLE Legacy PairingJun-Kwon Jung, Tai Myong Chung. 813-817 [doi]
- Erasure Codes Encoding Performance Enhancing Techniques Using GPGPU Based Non-sparse Coding Vector in Storage SystemsKwangsoo Lee, Huiseong Heo, Teagun Song, Deok-Hwan Kim. 819-824 [doi]
- FAIR-Based Loss Measurement Model for Enterprise Personal Information BreachJang Ho Yun, In-Hyun Cho, Kyung Ho Lee. 825-833 [doi]
- Variational Bayesian Inference for Multinomial Dirichlet Gaussian Process Classification ModelWanhyun Cho, Soon Ja Kang, Sangkyoon Kim, Soon-Young Park. 835-842 [doi]
- A Log Regression Seasonality Based Approach for Time Series Decomposition Prediction in System ResourcesChul Kim, Sang-Hun Nam, Inwhee Joe. 843-849 [doi]
- A Study on the Algorithm Design for Improving the Accuracy of Decision TreeChangSeup Han, HeeJun Moon, Changjae Kim. 851-859 [doi]
- Design of a Smartphone-Based Driving Habit Monitoring SystemJin-Woo An, Daejin Moon, Dae-Soo Cho. 861-866 [doi]
- Analysis of Medical Data Using the Big Data and RGiyong Choi, Kangwoo Lee, Deok Seok Seo, Soon Seok Kim, DongHo Kim, Yonghee Lee. 867-873 [doi]
- Homography-Based Motion Detection in Screen ContentTon Thi Kim Loan, Xuan-Qui Pham, Huu-Quoc Nguyen, Nguyen Dao Tan Tri, Quang Thai Ngo, Eui-nam Huh. 875-881 [doi]
- A Reference Architecture Framework for Orchestration of Participants Systems in IT EcosystemsSoojin Park, Seungmin Lee, Young B. Park. 883-889 [doi]
- Contents Based Traceability Between Research Artifact and Process for R&D ProjectsJong-Won Ko, Suntae Kim, Jae Young Choi, Young Hwa Cho. 891-898 [doi]
- Design and Implementation of Panoramic Vision System Based on MPEG-VJong-Seol Lee, Saim Shin, Dalwon Jang, Seong-Dong Kim, Min-Uk Kim, Kyoungro Yoon. 899-905 [doi]
- Computational Fluid Dynamics Analysis of the Air Damping for an Electromechanical ConverterGong Zhang, Jimin Liang, Chaomeng Jiang, Zhipeng Zhou, Xianshuai Chen, Lanying Yu. 907-914 [doi]