Abstract is missing.
- Design and Development of a Robotic Arm for Rehabilitation and TrainingSarut Panjan, Siam Charoenseang. 3-8 [doi]
- Detection of a Robust High-Frequency Range via Noise Analysis in a Real-World EnvironmentMyoungbeom Chung, IlJu Ko. 9-15 [doi]
- Intelligent Food Distribution Monitoring SystemGanjar Alfian, Hyejung Ahn, Yoonmo Shin, Jaeho Lee, Jongtae Rhee. 16-22 [doi]
- Design of Sudden Unintended Acceleration Check System Using Distance Measurement SensorJea-Hui Cha, Tae-Hyoung Kim, Jong-Wook Jang. 23-28 [doi]
- Real-Time Dynamic Motion Capture Using Multiple KinectsSeongmin Baek, Myunggyu Kim. 29-35 [doi]
- Cell-Based Indexing Method for Spatial Data Management in Hybrid Cloud SystemsYan Li, Byeong-Seok Shin. 36-41 [doi]
- SOA Based Equipment Data Management System for Smart FactoryYunHee Kang, Soong-ho Ko, KyoungWoo Kang. 42-47 [doi]
- The Problem Analysis of Specific Personal Information Protection Assessment in Japan CaseSanggyu Shin, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto. 48-53 [doi]
- Using a Fine-Grained Hybrid Feature for Malware Similarity AnalysisJing Liu, Yongjun Wang, Peidai Xie, Xingkong Ma. 54-60 [doi]
- A Wireless Kinect Sensor Network System for Virtual Reality ApplicationsMengxuan Li, Wei Song 0004, Liang Song, Kaisi Huang, Yulong Xi, Kyungeun Cho. 61-65 [doi]
- Finding Comfortable Settings of Snake Game Using Game Refinement MeasurementAnunpattana Punyawee, Chetprayoon Panumate, Hiroyuki Iida. 66-73 [doi]
- Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection TechnologySeong-Min Park, Han-Chul Bae, Young Tae Cha, Hwan Kuk Kim. 74-80 [doi]
- Initialization of Software Defined Wireless Bacteria-Inspired Network PlatformShih-Yun Huang, Hsin-Hung Cho, Yu-Zen Wang, Timothy K. Shih, Han-Chieh Chao. 81-86 [doi]
- An Extension of QSL for E-voting SystemsYuan Zhou, Hongbiao Gao, Jingde Cheng. 87-96 [doi]
- Behavior-Based Detection for Malicious Script-Based AttackSoojin Yoon, Hyun Lock Choo, HanChul Bae, Hwankuk Kim. 97-103 [doi]
- The SP-tree: A Clustered Index Structure for Efficient Sequential AccessGuang-Ho Cha. 104-110 [doi]
- An Address Conflict Resolving Scheme of Inter-drone Ad Hoc Communications for Hide Densely Deployed Low Power Wide Area NetworksJaeho Lee, Bong-Ki Son. 111-116 [doi]
- State-of-the-Art Algorithms for Mining Up-to-Date High Average-Utility PatternsDonggyu Kim, Unil Yun. 117-121 [doi]
- Design of Shoot'em up Game Using OpenGLUnil Yun, Heungmo Ryang. 122-126 [doi]
- Performance Analysis of Tree-Based Algorithms for Incremental High Utility Pattern MiningHeungmo Ryang, Unil Yun. 127-131 [doi]
- Development of 2D Side-Scrolling Running Game Using the Unity 3D Game EngineWooseong Jeong, Unil Yun. 132-136 [doi]
- EPD Noticeboard for Posting Multiple InformationBong-Ki Son, Jaeho Lee. 137-142 [doi]
- Design of Processing Model for Connected Car Data Using Big Data TechnologyLionel Nkenyereye, Jong-Wook Jang. 143-148 [doi]
- Efficient Path Selection for IoT Devices in Heterogeneous Service EnvironmentsDae-Young Kim 0005, Seokhoon Kim. 149-153 [doi]
- Forecasting Sugarcane Yield Using (μ+λ) Adaptive Evolution StrategiesSupawadee Srikamdee, Sunisa Rimcharoen, Nutthanon Leelathakul. 154-159 [doi]
- Resource Pooling Mechanism for Mobile Cloud Computing ServiceSeok-Hyeon Han, Hyun Woo Kim, Young-Sik Jeong. 160-165 [doi]
- IPC Multi-label Classification Applying the Characteristics of Patent DocumentsSora Lim, Yongjin Kwon. 166-172 [doi]
- A Comparison of Data Mining Methods in Analyzing Educational DataEuihyun Jung. 173-178 [doi]
- A New Secure Android Model Based on PrivilegeTao Zhang, Zhilong Wang. 179-184 [doi]
- Survey of MCC Architectures for Computing ServiceByeong-Seok Park, Yoon-A. Heo, Young-Sik Jeong. 185-191 [doi]
- Measurement of Enterprise Smart Business Capability in a Global Management EnvironmentChui Young Yoon. 192-197 [doi]
- Occluded Pedestrian Classification Using Gradient Patch and Convolutional Neural NetworksSangYoon Kim, Moonhyun Kim. 198-204 [doi]
- A Design of Secure Authentication Method with Bio-Information in the Car Sharing EnvironmentSang-Hyeon Park, Jeong-Ho Kim, Moon-Seog Jun. 205-210 [doi]
- A Design of Certificateless-Based Device Authentication Scheme in the SmartHome EnvironmentJae-Seung Lee, JaeHwa Chung, Sangkee Suk. 211-214 [doi]
- A Design of Secure Authentication Method Using Zero Knowledge Proof in Smart-Home EnvironmentGeunil Park, Bumryong Kim, Moon-Seog Jun. 215-220 [doi]
- Drone Classification by Available Control DistancesMansik Kim, Hyungjoo Kim, Jungho Kang, Jaesoo Kim. 221-223 [doi]
- A Design of Key Agreement Scheme Between Lightweight Devices in IoT EnvironmentHague Chung, Keun-Chang Choi, Moon-Seog Jun. 224-229 [doi]
- Platform Independent Workflow Mechanism for Bigdata AnalyticsTai-Yeon Ku, Hee-Sun Won, Hoon Choi. 230-235 [doi]
- Water Surface Simulation Based on Perlin Noise and Secondary Distorted TexturesHua Li, Huamin Yang, Chao Xu, Yuling Cao. 236-245 [doi]
- Optimization for Particle Filter-Based Object Tracking in Embedded Systems Using Parallel ProgrammingMai Thanh Nhat Truong, Sanghoon Kim. 246-252 [doi]
- Generalized Multi-linear Mixed Effects ModelChao Li, Lili Guo, Zheng Dou, Guangzhen Si, Chunmei Li. 253-258 [doi]
- Anomaly Detection of Spectrum in Wireless Communication via Deep AutoencoderQingsong Feng, Zheng Dou, Chunmei Li, Guangzhen Si. 259-265 [doi]
- A Modified Complex ICA for Blind Source Separation and the Application in Communication ReconnaissanceZheng Dou, Zi Xiao, Yang Zhao, Jinyu Wang. 266-272 [doi]
- Sensor Coverage Problem in Sparse MANET EnvironmentsJongBeom Lim, HeonChang Yu, Joon-Min Gil. 273-278 [doi]
- Design of Jitter Buffer Control Algorithm for Guaranteeing the Medical Information Data Transmission Quality in Wireless Network EnvironmentDong-Wan Joe, Jae-Sung Shim, Yong-Wan Ju, Seok Cheon Park. 279-284 [doi]
- Student's-t Mixture Model Based Excepted Patch Log Likelihood Method for Image DenoisingJ. W. Zhang, J. Liu, Y. H. Zheng, J. Wang. 285-290 [doi]
- Regularization Parameter Selection for Gaussian Mixture Model Based Image Denoising MethodJ. W. Zhang, J. Liu, Y. H. Zheng, J. Wang. 291-297 [doi]
- Restoration Method for Satellite Image Based on Content-Aware Reciprocal Cell PoolYuhui Zheng, Xiaozhou Zhou, Tong Li 0012, Jin Wang. 298-305 [doi]
- Student's-t Mixture Model Based Image Denoising Method with Gradient Fidelity TermJ. W. Zhang, J. Liu, Y. H. Zheng, J. Wang. 306-311 [doi]
- Classification Algorithms for Privacy Preserving in Data Mining: A SurveySai Ji, Zhen Wang, Qi Liu, Xiaodong Liu. 312-322 [doi]
- Exploiting Group Signature to Implement User Authentication in Cloud ComputingSai Ji, Dengzhi Liu, Jian Shen 0001. 323-331 [doi]
- A Secure System Framework for an Agricultural IoT ApplicationHao Wu, Fangpeng Chen, Hanfeng Hu, Qi Liu, Sai Ji. 332-341 [doi]
- Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A SurveySai Ji, Dengzhi Liu, Jian Shen. 342-351 [doi]
- Energy-Balanced Unequal Clustering Routing Algorithm for Wireless Sensor NetworksJin Wang, Yiquan Cao, Jiayi Cao, Huan Ji, Xiaofeng Yu. 352-359 [doi]
- The Agent Communication Simulation Based on the Ego State Model of Transactional AnalysisMi-Sun Kim, Green Bang, Il-Ju Ko. 360-365 [doi]
- Design of Software Reliability Test Architecture for the Connected CarDoo-Soon Park, Seokhoon Kim. 366-370 [doi]
- Network Activation Control According to Traffic Characteristics in Sensor Networks for IoTDae-Young Kim 0005, Young-Sik Jeong, Seokhoon Kim. 371-375 [doi]
- Data Mining Techniques to Facilitate Digital Forensics InvestigationsErik Miranda Lopez, Yoon Ho Kim, Jong Hyuk Park. 376-379 [doi]
- Solving Standard Cell Placement Problem Using Discrete Firefly Algorithm: A Nature Inspired ApproachPradip Kumar Sharma, Saurabh Singh 0001, Jong Hyuk Park. 380-384 [doi]
- A Security Model for Protecting Virtualization in Cloud ComputingSaurabh Singh 0001, Pradip Kumar Sharma, Jong Hyuk Park. 385-388 [doi]
- Effective Pre-processing Methods with DTG Big Data by Using MapReduce TechniquesWonhee Cho, Eunmi Choi. 389-395 [doi]
- Security Requirements and Countermeasures for Secure Home Network in Internet of ThingsSeo Yeon Moon, Saurabh Singh 0001, Jong Hyuk Park. 396-400 [doi]
- Machine Learning for Trajectory Generation of Multiple-pedestriansHye-Yeon Yu, Young-Nam Kim, Moon-Hyun Kim. 401-406 [doi]
- A Deep Learning-Based Gait Posture Recognition from Depth Information for Smart Home ApplicationsMd. Zia Uddin, Mi-Ryang Kim. 407-413 [doi]
- Implementation of an Image Restoration with Block Iteration Method for Spatially Variant Blur ModelsJi Yeon Lee, Kuk Won Ko, SangJoon Lee. 414-420 [doi]
- Analysis of Hard Shadow Anti-aliasingHua Li, Yuling Cao, Xin Feng. 421-429 [doi]
- Cascade-Adaboost for Pedestrian Detection Using HOG and Combined FeaturesGyujin Jang, Jinhee Park, Moonhyun Kim. 430-435 [doi]
- Portable Hypervisor Design for Commercial 64-Bit Android Devices Supporting 32-Bit Compatible ModeKangho Kim, Kwangwon Koh, Seunghyub Jeon, Sungin Jung. 436-441 [doi]
- Concept-Based Compound Keyword Extraction Based on Using Sentential Distance, Conceptual Distance and Production Rules: Calculation of the Keyword ImportanceSamuel Sangkon Lee. 442-448 [doi]
- Coarse-Grained 2.5-D CSAMT Parallel Inversion Method Based on Multi-core CPULili He 0002, Hongtao Bai, Jin Wang, Yu Jiang, Tonglin Li. 449-455 [doi]
- Virtual Force and Glowworm Swarm Optimization Based Node Deployment Strategy for WSNsJin Wang, Yiquan Cao, Jiayi Cao, Huan Ji, Xiaofeng Yu. 456-462 [doi]
- Comparison with Recommendation Algorithm Based on Random Forest ModelYu Jiang, Lili He 0002, Yan Gao, Kai Wang, Chengquan Hu. 463-470 [doi]
- Risk Factors and the Difference Among Hypertension, Diabetes and Heart DiseaseXue Wang, Lili He 0002, Hongtao Bai. 471-476 [doi]
- Linear Programming Computation Model Based on DPVMHongtao Bai, Lili He 0002, Yu Jiang, Jin Wang, Shanshan Jiang. 477-483 [doi]
- A Study on the Effective Communication Protocol of the Surface Inspection Rail Robot that it can be a Self-checkingYun-Seok Lee, Eun Kim, Sungyun Kim, Seokhoon Kim. 484-489 [doi]
- The Efficient Multimedia Transmission Services for the E-learning System with SensorSung Hwa Hong, Joon-Min Gil. 490-496 [doi]
- A Quality Model for IoT ServiceMi Kim, Jin Ho Park, Nam-Yong Lee. 497-504 [doi]
- An Empirical Study of Risk Factors for the Development Methodology for Small-Size IT ProjectsJoon Ho Park, Nam-Yong Lee, Jin Ho Park. 505-510 [doi]
- Nack-Based Broadcast Mechanism for Isochronous Audio Stream Transmission Using Bluetooth Low EnergyJaeho Lee. 511-516 [doi]
- Empirical Study on IoT-Learning for the Rehabilitation Treatment of Chronic Low Back Pain PatientsSeul-Ah Shin, Ji-Soo Choi, Young-Jong Kim, Nam-Yong Lee, Jin Ho Park. 517-524 [doi]
- A Theoretical Study of Hardware Architecture for Network Security ServerJoong-Yeon Lee, In-Taek Oh, Nam-Yong Lee, Jin Ho Park. 525-530 [doi]
- An Empirical Study of the Relationship Between DISC Behavioral Style of Application Programmer and Quality of Software DevelopmentIn-Taek Oh, Joong-Yeon Lee, Jae-Yoon Cheon, Nam-Yong Lee, Jin Ho Park. 531-539 [doi]
- The Development of COB Type LED Lighting System for High Temperature Machine VisionPark Sanggug. 543-548 [doi]
- An Alternative Management Scheme of DHCP Lease Time for Internet of ThingsPyung Soo Kim, Eung Hyuk Lee, Eung Tae Kim. 549-554 [doi]
- A User Empirical Context Model for a Smart Home SimulatorGreen Bang, IlJu Ko. 555-560 [doi]
- Co-display Content Service for First-Person Videos of Smart GlassBokyung Sung, IlJu Ko. 561-566 [doi]
- Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing AttackJu-Sung Kang, Hojoong Park, Yongjin Yeom. 567-572 [doi]
- Dynamic QoS Scheme for InfiniBand-Based ClustersBongjae Kim, Jeong-Dong Kim. 573-578 [doi]
- Applying PE-Miner Framework to Software Defined Network QuarantineDong-Hee Kim, Soo-Hwan Lee, Won-Sik Doo, Sang-il Ahn, Tai-Myoung Chung. 579-584 [doi]
- A Novel Method for Eliminating Duplicated Frames in Ethernet Standard (IEEE 802.3) NetworksSaad Allawi Nsaif, Jong-myung Rhee. 585-593 [doi]
- A Study of Malicious Code Classification System Using MinHash in Network Quarantine Using SDNSoo-Hwan Lee, Myeong-Uk Song, Jun-Kwon Jung, Tai-Myoung Chung. 594-599 [doi]
- Application of RFID and Computer Vision for the Inventory Management SystemGanjar Alfian, Jaeho Lee, Hyejung Ahn, Jongtae Rhee. 600-606 [doi]
- Prediction Method for Suspicious Behavior Based on Omni-View ModelJi-Hyen Choi, Jong-Won Choe, Yong-Ik Yoon 0001. 607-612 [doi]
- Optimal 3D Printing Direction for Stability of Slanted ShapesJiyoung Park, Hwa Seon Shin. 613-618 [doi]
- A Study on DDS-Based BLE Profile Adaptor for Solving BLE Data Heterogeneity in Internet of ThingsJung-Hoon Oh, Moon-Ki Back, Gil-Tak Oh, Kyu-Chul Lee. 619-624 [doi]
- A Study of Environment-Adaptive Intrusion Detection SystemKi-Hyun Lee, Young B. Park 0001. 625-630 [doi]
- OFART: OpenFlow-Switch Adaptive Random TestingDong-Su Koo, Young B. Park 0001. 631-636 [doi]
- An Evaluation of Availability, Reliability and Power Consumption for a SDN Infrastructure Using Stochastic Reward NetKihong Han, Tuan Anh Nguyen 0002, Dugki Min, Eunmi Choi. 637-648 [doi]
- A Dynamic Service Binding Scheme with Service OID for IoTEuihyun Jung. 649-653 [doi]
- A Context-Aware Architecture Pattern to Enhance the Flexibility of Software Artifacts ReuseDoohwan Kim, Soon-Kyeom Kim, Woosung Jung, Jang-Eui Hong. 654-659 [doi]
- Deep Analysis of Tag Interference by Tag to Tag Relative Angles with Passive Far Field UHF RFID SystemJae Sung Choi, Hyun Lee. 660-664 [doi]
- Simple Method of Video Mapping of Multiple TargetsIn-Jae Jo, Joohun Lee, Yoo-Joo Choi. 665-673 [doi]
- Evolutionary Test Case Generation from UML-Diagram with ConcurrencySeungchan Back, Hyorin Choi, Jung-Won Lee, Byungjeong Lee. 674-679 [doi]
- Evaluating the Effectiveness of the Vector Space Retrieval Model IndexingJung-Hoon Shin, Mesfin Abebe, Cheol-Jung Yoo, Suntae Kim, Jeong-Hyu Lee, Hee-Kyung Yoo. 680-685 [doi]
- Active Tracking Strategy with Multiple Cameras in Large AreasSangjin Hong, Nammee Moon. 686-693 [doi]
- A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It's ApplicationsYeongpil Cho, Yunheung Paek, Ejaz Ahmed, Kwangman Ko. 694-698 [doi]
- Network Anomaly Detection Based on Probabilistic AnalysisJinsoo Park, Dong Hag Choi, You-Boo Jeon, Se Dong Min, Doo-Soon Park. 699-704 [doi]
- Hedonic Model Study for Retargeting Advertising Based on Space-Centered Internet of ThingsBo-Ram Kim, Man-Soo Chung, Yong-Ik Yoon 0001. 705-711 [doi]
- A New Automated Cell Counting Program by Using Hough Transform-Based Double EdgeJae Sung Choi, Moon-Jong Choi, Jung Min Lee, Hyun Lee. 712-716 [doi]
- An Approach for Interworking Heterogeneous Networks with DTN and IP Routing in Space InternetEuiri An, Kyungrak Lee, Jaewon Lee, Inwhee Joe. 717-722 [doi]
- Implementation of Recommender System Based on Personalized Search Using Intimacy in SNSJeong-Dong Kim, Bongjae Kim, Jeong-Ho Park. 723-729 [doi]
- Measuring Similarity Between Graphs Based on Formal Concept AnalysisFei Hao, Dae-Soo Sim, Doo-Soon Park. 730-735 [doi]
- TEXAS2: A System for Extracting Domain Topic Using Link Analysis and Searching for Relevant FeaturesSangwon Hwang, Yongseok Lee, Youngkwang Nam. 736-741 [doi]
- Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT EnvironmentDongBum Seo, Keun-Ho Lee, You-Boo Jeon. 742-749 [doi]
- What Are Learning Satisfaction Factors in Flipped Learning?Kyung Yeul Kim, Yong Kim. 750-755 [doi]
- Development of UI Guideline for Senior Citizens' e-Learning ContentMyung In Kim, Yong Kim. 756-761 [doi]
- Full Duplex Relaying with Buffer Based on Cognitive Radio TechniqueJunsu Kim, Doo-Hee Jung, Jeho Lee, Su Min Kim. 762-767 [doi]
- Design of Docking Drone System Using P-PID Flight ControllerBeck Jong-Hwan, Pak Myeong-Suk, Kim Sang-Hoon. 768-773 [doi]
- Lightweight Security for Underwater IoTSun-Ho Yeom, Jung-Il Namgung, Soo Young Shin, Soo-Hyun Park. 774-778 [doi]
- Image Based Video Querying Algorithm Using 3-Level Haar Wavelet Transform FeaturesChangseok Bae, Yuk Ying Chung, Jeun-Woo Lee. 779-785 [doi]
- Design and Implementation of the Mobile Learning App for Creative Problem Solving ActivitiesJi-Hye Bae, Hyun Lee. 786-792 [doi]
- IoT-Based Smart Photo FrameJi-Hye Bae, In-Hwan Kim, Yong-Tae Jeon, Hyun Lee. 793-798 [doi]
- A Fast Algorithm for Generating Virtual Dedicate Network Based on Software-Defined Wide Area NetworkYong Hwan Kim, Buseung Cho, Dongkyun Kim. 799-805 [doi]
- Detection of Content Changes Based on Deep Neural NetworksNoo-ri Kim, Yunseok Choi, Hyunsoo Lee, Jee-Hyong Lee. 806-811 [doi]
- Resource Allocation in D2D Networks with Location Based Distance InformationSoo Hyeong Kang, Pyung Soo Kim, Bang Won Seo, Jeong Gon Kim. 812-818 [doi]
- Design of Corporate Business Card Management SystemSeok-heon Ko, Gil-Mo Yang, Jun-dong Lee. 819-824 [doi]
- The OpenWRT's Random Number Generator Designed Like /dev/urandom and Its VulnerabilityDongchang Yoo, Yongjin Yeom. 825-830 [doi]
- Implementation of the Block2 Option Transfer for Resource Observing with the CoAPthon LibraryKyoung-han Kim, Hyun-kyo Lim, Joo-Seong Heo, Youn-Hee Han. 831-836 [doi]
- Hive-Based Anomaly Detection in Hadoop Log Data ManagementSiwoon Son, Myeong-Seon Gil, Seokwoo Yang, Yang-Sae Moon. 837-842 [doi]
- HIM-PRS: A Patent Recommendation System Based on Hierarchical Index-Based MapReduce FrameworkXuhua Rui, Dugki Min. 843-848 [doi]
- Finding Meaningful Chronological Pattern of Key Words in Computer Science BibliographyJoo-Seong Heo, Hyun-kyo Lim, Kyong-Han Kim, Youn-Hee Han. 849-854 [doi]
- The Design of Intelligent Video Analytics System Performing Automatic Noise Rejection by Comparing Distribution of Metadata of Moving ObjectTaewoo Kim, Hyungheon Kim, Pyeongkang Kim. 855-860 [doi]
- Dependability Analysis of Digital Library Cloud Services with Load SharingDongseok Lee, Sungsoo Kim, Tae-Sun Chung. 861-866 [doi]
- Document Classification Using Word2Vec and Chi-square on Apache SparkMijin Choi, Rize Jin, Tae-Sun Chung. 867-872 [doi]
- Analysis of Recent Maximal Frequent Pattern Mining ApproachesGangin Lee, Unil Yun. 873-877 [doi]
- Design of Noise Information Storage System Using IoT DevicesJudae Lee, Unil Yun. 878-882 [doi]
- Analysis of Privacy Preserving Approaches in High Utility Pattern MiningUnil Yun, Donggyu Kim. 883-887 [doi]
- An Agent-Based Remote Operation and Safety Monitoring System for Marine ElevatorsHyung Joo Kim, Kwangil Lee. 888-893 [doi]
- Survey on CPN Applications in Cloud ComputingRustam Rakhimov Igorevich, Dugki Min. 894-899 [doi]
- An Observation Method for Estimating Carrier Frequency Offset in OFDM SystemsMustafa Altaha, Humor Hwang. 900-905 [doi]
- Korean-to-Korean Translation Based Learning Contents Management System for Parents of Multi-cultural FamilyYunHee Kang, Myung-Ju Kang, WooSik Kim. 906-911 [doi]
- A Distributed Survey Automation Based on a Customizable Form TemplateJaekwon Lee, Kisub Kim, Jang-Eui Hong, Woosung Jung. 912-919 [doi]
- Mobile Agent Oriented Service for Offloading on Mobile Cloud ComputingHwiRim Byun, Boo-Kwang Park, Young-Sik Jeong. 920-925 [doi]
- Unstructured Data Service Model Utilizing Context-Aware Big Data AnalysisYonghoon Kim, Mokdong Chung. 926-931 [doi]
- Information Reminder System Based on Word Registered by UserKyeYoung Kim, Byeong-Eon Ahn, Suk-Young Lim, Daejin Moon, Dae-Soo Cho. 932-936 [doi]
- A Study of Determining Abnormal Behaviors by Using System for Preventing Agricultural Product TheftJin-Su Kim, Min-Gu Kim, ByungRae Cha, Sung Bum Pan. 937-943 [doi]
- A Study of Simple Classification of Malware Based on the Dynamic API Call CountsJihun Kim, SeungWon Lee, Jonghee M. Youn, Haechul Choi. 944-949 [doi]
- A Low-Power Sensing Management Method for Sustainable Context-Awareness in Exclusive ContextsDusan Baek, Jae-Hyeon Park, Byungjeong Lee, Jung-Won Lee. 950-956 [doi]
- Content-Based Conformance Assurance Between Software Research Documentation and Design GuidelineJong-Hwan Shin, Dusan Baek, Byungjeong Lee, Jung-Won Lee. 957-962 [doi]
- Development of the Vision System and Inspection Algorithms for Surface Defect on the Injection Molding CaseJi Yeon Lee, Wonwoo Bong, SangJoon Lee, Chang Ho Han, Kuk Won Ko. 963-970 [doi]
- Implementation of the Smart System for Monitoring the PCGSunho Kim, Kangwoo Lee, Yonghee Lee. 971-975 [doi]
- The Effect of Introducing Small Cells in Wireless NetworksSooHyun Cho. 976-981 [doi]
- An Enhanced Reliable Message Transmission System Based on MQTT Protocol in IoT EnvironmentHyun Cheon Hwang, Ji Su Park, Byeong Rae Lee, Jin Gon Shon. 982-987 [doi]
- Implementation of a Smart IoT Factory Using an Agricultural Grade Sorting DeviceSeokhoon Jeong, Ji Yeon Lee, Kuk Won Ko, SangJoon Lee. 988-996 [doi]
- Segmentation and Counting of Cell in Fluorescence Microscopy Images Using Improved Chain Code AlgorithmYeji Na, SangJoon Lee, Jong Gab Ho, Hwayung Jung, Changwon Wang, Se Dong Min. 997-1004 [doi]
- Empirical Study of the IoT-Learning for Obese Patients that Require Personal TrainingSeul-Ah Shin, Nam-Yong Lee, Jin Ho Park. 1005-1012 [doi]
- Detection of Optimal Activity Recognition Algorithm for Elderly Using SmartphoneChangwon Wang, SangJoon Lee, Jong Gab Ho, Yeji Na, Se Dong Min. 1013-1018 [doi]
- Method of Detecting Malware Through Analysis of Opcodes Frequency with Machine Learning TechniqueSang-Uk Woo, Dong-Hee Kim, Tai-Myoung Chung. 1019-1024 [doi]
- Study of Big Data Analysis ProceduresJoon Ho Park, Jin Ho Park, Nam Young Lee. 1025-1030 [doi]
- Design and Implementation of Authentication Information Synchronization System for Providing Stability and Mobility of Wireless AuthenticationYong Hwan Jung, Jang-Won Choi, Hyung-ju Lee, Joon-Min Gil, Haeng-Gon Lee. 1031-1038 [doi]
- Study on the Generic Architecture Design of IoT PlatformsMi Kim, Nam-Yong Lee, Jin Ho Park. 1039-1045 [doi]
- A Study on Digitalization of Seafarer's Book Republic of Korea for e-Navigation: Focusing on Wireless NetworkJun Ho Huh. 1046-1052 [doi]
- A PMIPv6-Based Auxiliary Mobility Management Considering Traffic LocalityKi-Sik Kong. 1053-1058 [doi]
- A Study on Worker's Positional Management and Security Reinforcement Scheme in Smart Factory Using Industry 4.0-Based Bluetooth BeaconsSangil Park, SeoukJoo Lee. 1059-1066 [doi]
- A Study of the Extended Definition of Relation for Research Content Based TraceabilityJong-Won Ko, Jae Young Choi, Young Hwa Cho. 1067-1073 [doi]
- Transforming Algorithm of 3D Model Data into G-code for 3D Printers in Distributed SystemsSungSuk Kim, Sun Ok Yang. 1074-1078 [doi]
- Cache Aware Web-Based Dynamic Adaptive Streaming Algorithm in Information Centric NetworksGeun-Hyung Kim. 1079-1085 [doi]
- Background Subtraction Framework for Mobile 3D Sensor DataSeongjo Lee, Seoungjae Cho, Nguyen Trong Hieu, Phuong Chu, Kyungeun Cho. 1086-1090 [doi]
- A Method for Multi-user Re-identification in Invoked Reality SpaceYunji Jeong, Yulong Xi, Jisun Park, Kyhyun Um, Kyungeun Cho. 1091-1095 [doi]
- A Design Scheme of Combined Syllable Fonts for HunminjeongeumJeongyong Byun, Seongbum Hong, Hoyoung Kim. 1096-1102 [doi]
- Proposal of a Resource-Monitoring Improvement System Using Amazon Web Service APIKyu Ik Kim, Musa Ibrahim M. Ishag, Myungsic Kim, Jin Suk Kim, Keun Ho Ryu. 1103-1107 [doi]