Abstract is missing.
- An Examination of the Effect of the Contextual UI Design Quality of Mobile Shopping Applications on the Loyalty of Users to the ApplicationsWonjin Jung. 1-5 [doi]
- Securing Intelligent Vehicular Ad Hoc Networks: A SurveyWedad Ahmed, Mourad Elhadef. 6-14 [doi]
- An Approach of Test Case Generation for Spreadsheet CellsBo Yang, Qian Yu. 15-20 [doi]
- Bearing Fault Diagnosis Based on Convolutional Neural Networks with Kurtogram Representation of Acoustic Emission SignalsAlexander E. Prosvirin, Jaeyoung Kim, Jong Myon Kim. 21-26 [doi]
- CHMM-Based Classification of Dynamic TexturesYulong Qiao, Na Li, Yufei Wang, Wei Xi. 27-34 [doi]
- Survey of On-Line & Block Programming Language-Scratch: On Perspective of Educational AchievementsJeong Ah Kim, Dae Young Ko. 35-40 [doi]
- A Study on Lightweight Mutual Authentication Protocol Based on Simple OperationYong-Woon Hwang, Im-Yeong Lee. 41-46 [doi]
- Performance Analysis of Spark-DLF: Spark Based Distributed Deep Learning Framework for Article Headline GenerationAkhmedov Khumoyun, Yun Cui, Myoungjin Kim, Hanku Lee. 47-52 [doi]
- Robust Cartoon Zero-Watermark Algorithm Based on NSSTYuchao Sun, De-li. 53-59 [doi]
- Robust Animation Zero Watermarking Based on Visual Cryptography and Complete Complementary CodeDe-li, Lihua Cui. 60-65 [doi]
- Secure Multicast Using Proxy Re-encryption in IoT EnvironmentSuhyun Kim, ImYeong Lee. 66-70 [doi]
- Fast Provisioning Service in Shared-Storage Based VDI According to User's TypeDae Won Kim, Soo-Cheol Oh, Jae-Geun Cha, JiHyeok Choi, Sunwook Kim, Seongwoon Kim. 71-76 [doi]
- Design of Smart Cattle Shed System Based on BLE Beacon to Improve Power ConsumptionSeung Su Yang, Young-Hwan Jang, Yong-Wan Ju, Seok Cheon Park. 77-82 [doi]
- Design of TensorFlow-Based Proactive Smart Home ManagersMin-Hyung Park, Young-Hwan Jang, Yong-Wan Ju, Seok Cheon Park. 83-89 [doi]
- Design of Effective Indexing Technique in Hadoop-Based DatabaseJae-Sung Shim, Young-Hwan Jang, Yong-Wan Ju, Seok Cheon Park. 90-95 [doi]
- Transformation of EEG Signal for Emotion Analysis and Dataset Construction for DNN LearningYea-Hoon Kwon, Yiyan Nan, Shin-Dug Kim. 96-101 [doi]
- Impact of Passive UHF RFID Reader Antenna Locations for Immobile Object LocalizationJae Sung Choi. 102-107 [doi]
- Development of 3D Surface Shape Analysis System Using White Light Scanning InterferenceYong-Tae Jeon, Hyun Lee, Jae Sung Choi. 108-113 [doi]
- Life Log Collection and Analysis System Using Mobile DeviceYunjin Nam, Dongkyoo Shin, Dongil Shin. 114-119 [doi]
- Introduction of an Interactive Growing Robot/Toy for BabiesJiyong Kim, Hyunsu Jeong, Azure Yvette Pham, Changhyeon Lee, Thiha Soe, PilWoo Lee, Mingu Lee, Seong-Woo Kim, JuHyun Eune. 120-125 [doi]
- Multiclass Data Classification Using Multinomial Logistic Gaussian Process ModelWanhyun Cho, Soonyoung Park, Sangkyoon Kim. 126-130 [doi]
- Implementation of Redundant Digital Excitation Control System AlgorithmHoon-Gi Lee, Hie-Sik Kim. 131-136 [doi]
- Improving Top-K Contents Recommendation Performance by Considering Bandwagon Effect: Using Hadoop-Spark FrameworkSuk-kyoon Kang, Kiejin Park. 137-142 [doi]
- A Method for Replacing Protective Relay at Kanudi Power Plant and ValidationHoon-Gi Lee, Hie-Sik Kim. 143-148 [doi]
- A Critical Review on Operation and Management System of Doping Control Officer in Korea Anti-Doping AgencySeung-Hoon Lee, Chang-Hyeok Seok. 149-154 [doi]
- The Issues of Media and Public Ethics on Doping ProblemsSeung-Hoon Lee, Chang-Hyeok Seok. 155-160 [doi]
- Seamless Reconfiguration of Virtual Dedicate Network Based on Software Defined NetworkYong Hwan Kim, Ki-Hyeon Kim, Joon-Min Gil, Dongkyun Kim. 161-167 [doi]
- Design and Implementation of Digital Doorsign System Based on E-paper DisplayBong-Ki Son, Jaeho Lee. 168-173 [doi]
- A Novel for Light-Weighted Indoor Positioning Algorithm with Hybridizing Trilateration and Fingerprinting Method Considering Bluetooth Low Energy EnvironmentJaeho Lee, Bong-Ki Son. 174-179 [doi]
- Design of Beacon-Based Positioning System Using RF and Sound Wave in SmartphoneHyun-Seong Lee, Seoung-Hyeon Lee, Jae-Gwang Lee, Jae Kwang Lee. 180-186 [doi]
- A Study on the Designing of a Laboratory Accident Cognition Model Using Smart Sensor Based Decision TreeKi-Su Yoon, Seoung-Hyeon Lee, Jae-Pil Lee, Jae Kwang Lee. 187-191 [doi]
- Positioning Model Design Using Beacon and Geomagnetic Sensor of SmartphoneJae-Gwang Lee, Seoung-Hyeon Lee, Jae Kwang Lee. 192-197 [doi]
- A Design of Scheduling Program for Diabetic Patients: A Software Engineering ApproachJeong-Hoon Choi, Jun Ho Huh, Sunghyun Weon. 198-203 [doi]
- A Simulated Infiltration Test for Network in Virtual Environment Using VMware Virtualization TechniqueGuk-Il Kim, Jonghyeon Kim. 204-209 [doi]
- Development of Network Cyber Attack Training Curriculum for Security StaffGuk-Il Kim, Jonghyeon Kim. 210-214 [doi]
- A Design of Portable Continuous Passive Joint Mobilization Equipment SystemDo Yeon Jeon, Young Hyo Kim, Ha Yeon Park, Jun Ho Huh, Hyeok Gyu Kwon. 215-220 [doi]
- Delivering Historical Information Shown in Korean TV Drama Over Smart TVJisun Byun. 221-226 [doi]
- An Efficient Clustering Technique for Unstructured Data Utilizing Latent Semantic AnalysisYonghoon Kim, Mokdong Chung. 227-232 [doi]
- An Improving Algorithm of Generator Reactive Power Reserves Calculation Considering Effective Generators in IEEE-39 SystemMoonsung Bae, Byongjun Lee. 233-239 [doi]
- Load Loss Coefficient and Power Loss Tracing in Power SystemsMoonsung Bae, Byongjun Lee. 240-247 [doi]
- A Power Generation Rescheduling Method Under Power Flow Constraints Using Power Flow TracingMoonsung Bae, Byongjun Lee. 248-252 [doi]
- The Effect of the Intrinsic Quality of UI of Mobile Apps on the Behavioral Intention to Use the AppsWonjin Jung. 253-257 [doi]
- Consideration of Privacy Risk Assessment of the My Number in the Financial Industry in JapanSanggyu Shin, Yoichi Seto, Kei Sakamoto, Mayumi Sasaki. 258-264 [doi]
- VANETs-Based Intelligent Transportation Systems: An OverviewSarah Baras, Iman Saeed, Hadeel A. Tabaza, Mourad Elhadef. 265-273 [doi]
- Designing Network-Attached Storage Architecture for Small and Medium Enterprise ApplicationsAndy Shui-Yu Lai, Anson Man-Sing Ma. 274-279 [doi]
- Limited Constraint Problems Reasoning on Computer Based on "And/Or" TreeDanyang Cao, Lina Duan, Xue Gao, Lei Gao. 280-286 [doi]
- Impact of the Selection of a Communication Tool on the Effectiveness of Media Outputs About the Results of Science and ResearchZuzana Bouckova, Blanka Klimova. 287-292 [doi]
- TCP Performance of CSMA/CA Wireless Networks in Different MCS and PPP SettingsSooHyun Cho. 293-298 [doi]
- Expected Patch Log Likelihood Based on Multi-layer Prior Information LearningShunfeng Wang, Jiacen Xie, Yuhui Zheng, Tao Jiang, ShuHang Xue. 299-304 [doi]
- Decentralized E-Voting Systems Based on the Blockchain TechnologyJen-Ho Hsiao, Raylin Tso, Chien-Ming Chen, Mu-En Wu. 305-309 [doi]
- Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart ContractsKun-Tai Chan, Raylin Tso, Chien-Ming Chen, Mu-En Wu. 310-314 [doi]
- Password-Based Authenticated Key Exchange from Lattices for Client/Server ModelYi-Siou Jheng, Raylin Tso, Chien-Ming Chen, Mu-En Wu. 315-319 [doi]
- Ocean Adventure Cell Phone Adventure Game Design and ImplementationXingquan Cai, Chao Chen. 320-327 [doi]
- Analysis of Thermocline Influencing Factors Based on Decision Tree MethodsChengquan Hu, Yu Gou, Tong Zhang, Kai Wang, Lili He 0002, Yu Jiang. 328-334 [doi]
- Thermocline Analysis Based on Entropy Value MethodsChengquan Hu, Yu Gou, Tong Zhang, Kai Wang, Lili He 0002, Yu Jiang. 335-340 [doi]
- Design and Implement of Intelligent Insole SystemRuisheng Li, Bin Ma, Lili He 0002, Jin Wang. 341-345 [doi]
- Fitness Sport Data Recording System Design and Implementation on Smart PhoneXingquan Cai, Runbo Cai. 346-352 [doi]
- Construction of High Resolution Thermocline Grid Data SetsChengquan Hu, Tong Zhang, Jin Wang, Yu Gou, Kai Wang, Hongtao Bai, Yu Jiang. 353-358 [doi]
- Service Identification Framework for Systems of Systems Based on MPLS TechnologySahel Alouneh, Dhiah el Diehn I. Abou-Tair, Ala F. Khalifeh, Roman Obermaisser. 359-364 [doi]
- FPGA Based Face Detection Using Local Ternary Pattern Under Variant Illumination ConditionByun Jin Young, Jae Wook Jeon. 365-370 [doi]
- Finding Similar Microblogs According to Their Word Similarities and Semantic SimilaritiesYuan Wang. 371-375 [doi]
- An Improved Trust Model Based on Time EffectZhichao Yin, Hui Zhang, Chunyong Yin, Jin Wang. 376-381 [doi]
- Text Classification Algorithm Based on SLAS-CZhichao Yin, Jun Xiang, Chunyong Yin, Jin Wang. 382-387 [doi]
- A Ground Segmentation Method Based on Gradient Fields for 3D Point CloudsHoang-Vu, Hieu Trong Nguyen, Phuong Chu, Seoungjae Cho, Kyungeun Cho. 388-393 [doi]
- Recognizing the Adhesion Hollow Characters Based on the Closed Cutting AlgorithmChunyong Yin, Kaiwen Zhu, Lian Xia, Jin Wang. 394-399 [doi]
- Ensemble R-FCN for Object DetectionJian Li, Jianjun Qian, Yuhui Zheng. 400-406 [doi]
- A Design of Evolutionary Personal Information Partner Based on Software as a ServiceYifeng Han, Hongbiao Gao, Jingde Cheng. 407-412 [doi]
- A New Method of Arm Motion Detection Based on MEMS SensorKai Wang, Chengquan Hu, Lili He 0002, Fenglin Wei, Yu Jiang. 413-419 [doi]
- Fitness Device Based on MEMS SensorFenglin Wei, Chengquan Hu, Lili He 0002, Kai Wang, Yu Jiang. 420-426 [doi]
- A Security Framework for Systems-of-SystemsDhiah el Diehn I. Abou-Tair, Sahel Alouneh, Ala F. Khalifeh, Roman Obermaisser. 427-432 [doi]
- A PSO Based Coverage Hole Patching Scheme for WSNsJin Wang, Chunwei Ju, Hye-Jin Kim, R. Simon Sherratt, Sungyoung Lee. 433-439 [doi]
- A Novel Feature-Based Text Classification Improving the Accuracy of Twitter Sentiment AnalysisYili Wang 0002, Le Sun, Jin Wang, Yuhui Zheng, Hee Yong Youn. 440-445 [doi]
- System Information Comparison and Analysis Technology for Cyber AttacksHyeonsu Youn, Duhoe Kim, Yong-Hyun Kim, Dongkyoo Shin, Dongil Shin. 446-451 [doi]
- A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural NetworkHyunjung Ji, DongHwa Kim, Dongkyoo Shin, Dongil Shin. 452-457 [doi]
- The Application of Augmented Reality Based on Body Parts RecognitionJianfeng Hou, Wei Song, Mengxuan Li. 458-463 [doi]
- A Novel Subspace Super-Pixel Based Low Rank Representation Method for Hyperspectral DenoisingLe Sun, Yili Wang 0002, Jin Wang, Yuhui Zheng. 464-469 [doi]
- A Chinese Handwriting Word Segmentation Method via Faster R-CNNZelun Zhang, Jin Liu, Chenkai Gu. 470-474 [doi]
- Aspect Based Sentiment Analysis for Online ReviewsLamei Xu, Jin Liu, Lina Wang, Chunyong Yin. 475-480 [doi]
- Chinese Anaphora Resolution Based on Adaptive ForestYunqing Zhao, Jin Liu, Chunyong Yin. 481-486 [doi]
- Construction and Application of Fuzzy OntologyLi Lin, Jin Liu, Yuhui Zheng. 487-493 [doi]
- Generating Realistic Chinese Handwriting Characters via Deep Convolutional Generative Adversarial NetworksChenkai Gu, Jin Liu, Lei Kong. 494-498 [doi]
- Hadoop Based Parallel Deduplication Method for Web DocumentsJunjie Song, Jin Liu, Yuhui Zheng. 499-504 [doi]
- Ontology Construction Based on Deep LearningJianan Wang, Jin Liu, Lei Kong. 505-510 [doi]
- Personal Attributes Extraction in Chinese Text Based on Distant-Supervision and LSTMWenxi Yao, Jin Liu, Zehuan Cai. 511-515 [doi]
- Web Pages Ranking with Domain OntologyMingji Zhou, Jin Liu, Yuhui Zheng. 516-521 [doi]
- Simulation-Based Reliability Improvement Factor for Safety-Critical Embedded SystemsJongwhoa Na, Dongwoo Lee. 522-527 [doi]
- SBraille: A New Braille Input Method for Mobile DevicesSoonyong Lee, Ji Su Park, Jin Gon Shon. 528-533 [doi]
- Confirmation Delay Prediction of Transactions in the Bitcoin NetworkBeltran Fiz, Stefan Hommes, Radu State. 534-539 [doi]
- Failure Analysis in Safety Critical Systems Using Failure State MachineAnit Thapaliya, Daehui Jeong, Gihwon Kwon. 540-545 [doi]
- Simple and Low-Cost Heartbeat-Based Dual Modular Redundant Systems for Wireless Sensor NetworksJongwhoa Na, Dongwoo Lee, Munkh Zorigbold, Dongmin Lee, Sungyup Moon. 546-552 [doi]
- Hidden Markov Model for Floating Car Trajectory Map MatchingChengbo Song, Xuefeng Yan. 553-559 [doi]
- Simulation Game System: A Possible Way to Realize Intelligent Command and ControlXin Jin. 560-565 [doi]
- Experiential Interaction Modeling for Virtual Training of Ultra-High Voltage Power System and Its ApplicationJian Shao, Wei Liu, Wei Dai, Shengkun Ma, Qun Li, Ji Wang, Jian Chen, Neal N. Xiong. 566-572 [doi]
- Analysis on the Technology of the Internetware Comprehensive TestingZhengxian Wei, Mingqi Fan, Min Song, Hongbin Wang, Zhe Zhang. 573-578 [doi]
- Analysis and Inspiration to Intelligent Command and ControlTingting Li. 579-585 [doi]
- Exploratory Search for Learning: Finding the Concept with Minimal Cognitive LoadZhuyin Xue, Zhen Hu, Yunhai Jia. 586-590 [doi]
- Predicting the Metro Passengers Flow by Long-Short Term MemoryZhen Hu, Yi Zuo, Zhuyin Xue, Wenting Ma, Guilin Zhang. 591-595 [doi]
- Research on Hierarchical Aggregation Method for Situation AssessmentXiaoxuan Wang, Zhenyi Zhao. 596-602 [doi]
- The Testing Execution Mechanism on Internetware Oriented Flow Dynamic BuildingMin Song, Ying Song, Zhengxian Wei, Hongbin Wang, Albert M. K. Cheng. 603-609 [doi]
- A Model and Application of Collaborative Simulation Training System for Substation Based on Virtual RealityWei Dai, Wei Liu, Xin-dong Zhao, Jian Shao, Qun Li, Sheng-kun Ma, Neal Xiong, Chang-nian Lin. 610-616 [doi]
- A Model-Based Transformation from SCR Specification Models into Altatica3.0 Design ModelsJun Hu, Mingming Wang, Weijun Zhang, Wanqian Li. 617-623 [doi]
- Simulation and Verification of Software Architecture for Loosely-Coupled Distributed SystemShen Jun, Shen Xuan, Gao Wen, Zhang Yong. 624-630 [doi]
- Research on Hybrid Storage Method of Massive Heterogeneous Data for Mobile EnvironmentShanshan Wu, Fan Yi. 631-640 [doi]
- User Targeting SaaS Application Interworking Service Framework Using Complex Context and Rule-MatrixJong-Jin Jung, Yun Cui, Myungjin Kim. 641-647 [doi]
- A Framework for Preventing Illegitimate e-Prescribing PracticesDeuk-Hun Kim, Jin Kwak. 648-653 [doi]
- Research on Horizontal Damage Zone Airspace of Ship-to-Air Missile Under Cooperative OperationYitao Wang, Huayang Wang, Haiming Liang, Liying Wang. 654-660 [doi]
- Key Issues of Military Simulation and Analysis SystemYitao Wang, Huayang Wang, Xinye Zhao, Kedi Huang, Haiming Liang. 661-668 [doi]
- A Study on the Comparison of "Internet+" Paradigm and Means and the Analysis and Evaluation of Its Typical Development PathChao Geng, Shiyou Qu, Guoqiang Shi, Baocun Hou, Mei Wang, Tingyu Lin, Yingying Xiao, Zhengxuan Jia. 669-676 [doi]
- Stripe Noise Correction for Infrared Imaging System Using Neural Network TheoryJunqi Bai, Chuanwen Chang, Wen Liu. 677-682 [doi]
- A Smart Indoor Gardening System Using IoT TechnologyByoungwook Min, Sung-Jun Park. 683-687 [doi]
- A User-Defined Code Reinforcement Technology Based on LLVM-ObfuscatorXue Yao, Bin Li, Yahong Sun. 688-694 [doi]
- An iPOJO Components-Based Workflow Architecture in Ubiquitous Cloud EnvironmentsXipu Zhang, Choonhwa Lee, Bleza Takouda, Ryu Giha. 695-700 [doi]
- An Effective Framework for Identifying Good XML Feedback FragmentsMinjuan Zhong, Beiji Zou, Lei Wang 0017, Shumei Liao, Naixue Xiong. 701-707 [doi]
- Minimum-Cost Consensus Models for Group Decision Making Under Intuitionistic Fuzzy EnvironmentYuanyuan He, Chengshan Qian, Neal N. Xiong. 708-713 [doi]
- Research on Ontology-Based Data FusionShun Wang, Da-zhou Kang, Yan-Hui Li, Zhe Zhang, Zhengxian Wei. 714-720 [doi]
- An Effective High Resolution Rainfall Estimation Based on Spatiotemporal ModelingQiuming Kuang, Xuebing Yang, Wensheng Zhang, Guoping Zhang, Naixue Xiong. 721-726 [doi]
- A General and Effective Network Failure Ant Colony Algorithm Based on Network Fault Location MethodsLing Ruan, Changhua Liu, Yuling Wang. 727-733 [doi]
- Study on Smart Automated Sales System with Blockchain-Based Data Storage and ManagementMinjae Yoo, Yoojae Won. 734-740 [doi]
- Pairwise Relation Analysis and Quality Estimation of Classical Chinese Poetry in Ancient KoreaShohrukh Bekmirzaev, Byoung-Chan Lee, Tae-Hyong Kim. 741-747 [doi]
- A Parallel Adaptive Circumference Method with OpenMPHongtao Bai, Jinwei Fang, Fengxu Zhang, Xiaomeng Sun. 748-755 [doi]
- Maximum Stack Memory Monitoring Method Assisted by Static Analysis of the Stack Usage ProfileKiho Choi, Seongseop Kim, Moon Gi Seok, Jeonghun Cho, Daejin Park. 756-765 [doi]
- Design of Nonlinear Data-Based Wellness Content Recommendation AlgorithmYoung-Hwan Jang, Seung Su Yang, Hyung-Joon Kim, Seok Cheon Park. 766-771 [doi]
- User Modeling Based on Smart Media Eye Tracking Depending on the Type of Interior SpaceHyejin Song, Nammee Moon. 772-776 [doi]
- Frame Rate Control Buffer Management Technique for High-Quality Real-Time Video Conferencing SystemSangHyong Kim, Yoojae Won. 777-783 [doi]
- Method to Modify the Hex of Android Manifest File in Android Apps for Dynamic AnalysisSuhyoo Lee, Junhoo Park, Jaecheol Ryou. 784-789 [doi]
- An Implementation of Unidirectional Security Gateway to Guarantees Inter-VTS Exchange Service SecurityYong-Kyun Kim, Seoung-Hyeon Lee. 790-794 [doi]
- Implementation of NFC-Based Smart-Drug Information Management SystemKyeong-Rae Cho, Tae Bok Yoon. 795-804 [doi]
- DSS-SL: Dynamic Signage System Based on SDN with LiFi Communication for Smart BuildingsPradip Kumar Sharma, Byoung Wook Kwon, Jong Hyuk Park. 805-810 [doi]
- A Study of Service Quality in Multi Cloud ComputingSangdo Lee, Yongtae Shin. 811-816 [doi]
- Research on Cloud-Based on Web Application Malware Detection MethodsKi Hwan Kim, Dong Il Lee, Yong-Tae Shin. 817-822 [doi]
- Study on Customer Rating Using RFM and K-MeansHyunjung Ji, Gyeongil Shin, Dongil Shin, Dongkyoo Shin. 823-828 [doi]
- Scalable Distributed Temporal ReasoningJonghoon Kim, Incheol Kim. 829-835 [doi]
- An Efficient Algorithm for Influence Maximization Based on Propagation Path AnalysisWei Liu 0010, Xin Chen, Bolun Chen, Jin Wang, Ling Chen 0005. 836-845 [doi]
- Data Stream Clustering Algorithm Based on Bucket Density for Intrusion DetectionChunyong Yin, Lian Xia, Jin Wang. 846-850 [doi]
- A Study on Subsequence Similarity Join in Time Series Data Using MapReduceKyounghyun Park, Hee-Sun Won, Keun Ho Ryu. 851-859 [doi]
- A Practical Study on Data Logger for Gas IndustryJeong Seok Oh. 860-864 [doi]
- Operational Reliability Analysis of Guided Weapon SystemsJu-seok Ha, Kyung Mo Kim. 865-871 [doi]
- The Direction of Information Security Control Analysis Using Artificial IntelligenceSangdo Lee, Yongtae Shin. 872-877 [doi]
- Anonymous Signature with Signer-Controlled Opening CapabilitySungwook Eom, Jun Ho Huh. 878-882 [doi]
- Group Signature with Signer-Controlled Opening Capability: Separate Token GeneratorSungwook Eom, Jun Ho Huh. 883-887 [doi]
- The Personal Information Overloads Effect Information Protective Responses in the Internet of Thing (IoT) EraWon-Hyun So, Ha-Kyun Kim. 888-894 [doi]
- Development of Virtual Workbench to Solve Computational Science ProblemYejin Kwon, Inho Jeon, Sik Lee, Kumwon Cho, Jerry H. Seo. 895-900 [doi]
- A Design and Implementation of the CoAP Adaptor for Communication Between DDS-Based Adaptors and External DevicesGil-Tak Oh, Moon-Ki Back, Kyu-Chul Lee. 901-909 [doi]
- Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized APDoyeon Kim, Dongkyoo Shin, Dongil Shin. 910-914 [doi]
- Distributed Approach for the Security of P2P Wireless NetworkChunyong Yin, Nimenya Stacey, Tatiana Moreira Beita, Jin Wang. 915-919 [doi]
- Build Chinese Language Model with Recurrent Neural NetworkLi Lin, Jin Liu, Zhenkai Gu, Zelun Zhang, Haoliang Ren. 920-925 [doi]
- Pedestrian-Safe Smart Crossing System Based on IoT with Object TrackingKwangEun An, Sungwon Lee, Young-Ju Jeong, Dongmahn Seo. 926-931 [doi]
- Management and Measurement of Firm Smart Business CapabilityChui Young Yoon. 932-937 [doi]
- Study on Malicious Code Behavior Detection Using Windows Filter Driver and API Call SequenceKangsik Shin, Yoojae Won. 938-943 [doi]
- A Study on Optimal Warranty Period for Repairable Weapon SystemsJu-seok Ha, Kyung Mo Kim. 944-950 [doi]
- A Development on the SaaS Cloud Scientific Computing Platform for Education and Research in NanoscienceInho Jeon, Jin Ma, Jerry H. Seo, Jongsuk Ruth Lee, Kumwon Cho, Hoon Ryu. 951-956 [doi]
- EEG Based Smart Driving for Intelligent Accident ManagementByung Wook Kwon, Jong Hyuk Park. 957-961 [doi]
- DOTP-AaaS: Dynamic One Time Password Matching-Based Authentication as a ServiceNam Yong Kim, Kyung Yeob Park, Jong Hyuk Park. 962-966 [doi]
- The Study on Data of Smart Home System as Digital EvidenceJung Hyun Ryu, Seo Yeon Moon, Jong Hyuk Park. 967-972 [doi]
- A Solution for Reducing Redistribution Costs of HAILTaehyuk Kim, Minseok Lee, Doo Ho Choi, Taek-Young Youn. 973-978 [doi]
- New User Management Technique in Storage Services for Stronger PrivacyTaek-Young Youn, Ku-Young Chang. 979-984 [doi]
- Gesture-Based User Interface Design for UAV ControlsJeonghoon Kwak, Yunsick Sung. 985-989 [doi]
- Communication System of e-Navigation Between Vessel and Shore Utilizing Representational State Transfer at SeaTaehoon Koh, Yonghoon Kim, Kamyoung Park, Jeongho Lee, Kyungryong Seo. 990-997 [doi]
- Continuous-Time Estimation Filtering with Incorporation of Temporary Model UncertaintyPyung Soo Kim. 998-1003 [doi]
- Adverstise Based Adaptive Model for IoT Device in Network Virtualization EnvironmentYunHee Kang, Younhoon Park, Jonghee Yoon, KwngMan Ko. 1004-1007 [doi]
- Design and Implementation of a Wearable Device for the Blind by Using Deep Learning Based Object RecognitionBongjae Kim, Hyeontae Seo, Jeong-Dong Kim. 1008-1013 [doi]
- A Preference Based Recommendation System Design Through Eye-Tracking and Social Behavior AnalysisHyejin Song, Nammee Moon. 1014-1019 [doi]
- Design of Consumer Behavior Analysis by Region Through Reflecting Social Atmosphere Based on SNSJinah Kim, Nammee Moon. 1020-1025 [doi]
- Glove Type Air Mouse Powered by Kalman Filtering and Complementary FilteringJae Sung Choi, Won Jun Byoun, Ji Su Park, Min-Hyung Lee, Ye Seul Kang, Hyun Lee. 1026-1030 [doi]
- An Indoor Positioning System Using RSSI and BSSIDSunmin Lee, Nammee Moon. 1031-1036 [doi]
- IoT-Based VR Service Model to Improve Exercise CapacityJeong-Dong Kim, Min-Gyu Park, Do-Yeon Ki, Bum-Hee Cho, Gil-Yong Lee, Bongjae Kim. 1037-1042 [doi]
- Traffic Prediction System Utilizing Application and Control of Environmental InformationYonghoon Kim, Mokdong Chung. 1043-1050 [doi]
- Multi-screen Patterns and Multi-device Experiences in a Multi-screen EcosystemGeun-Hyung Kim. 1051-1056 [doi]
- Software Defined Personal Area Network for Secure and Efficient File ManagementYoung-Hoon Park, Kwangman Ko. 1057-1065 [doi]
- A Study on Resource Scaling Scheme for Energy Efficiency in Cloud DatacenterA.-Young Son, Eui-nam Huh. 1066-1071 [doi]
- A Machine Learning Approach to Classification of Case Reports on Adverse Drug Reactions Using Text Mining of Expert OpinionsHyon Hee Kim, Ki Yon Rhew. 1072-1077 [doi]
- Multi-scale Surface Curvature Based on Mesh SimplificationJaeyong Lee, Kyong-Ah Kim, Yoo-Joo Choi. 1078-1083 [doi]
- The microComponent and Its Extension Patterns for Flexible Reuse of Software ArtifactsDoohwan Kim, Jang-Eui Hong. 1084-1090 [doi]
- Using Code Skeleton Patterns for Open Source ReuseSeungwoo Nam, Doohwan Kim, Jang-Eui Hong. 1091-1096 [doi]
- Toward Offline Contents Based Software R&D Support SystemSuntae Kim, Joongi Hong, Seounghan Song, Sangchul Choi, JeongAh Kim, Jae Young Choi, Young Hwa Cho. 1097-1101 [doi]
- Ubiquitous Authentication and Authorization Mechanism for Enterprise Resources AcquisitionMei-Yu Wu, Chih-Kun Ke, Ming-Ru Lee. 1102-1107 [doi]
- Visualization Approach for R&D Monitoring - A Tracking of Research Contents Changes PerspectiveJae Young Choi, Jong-Won Ko, Suntae Kim, Young Hwa Cho. 1108-1113 [doi]
- Hybrid Sensing and Behavior-Aware in Pedestrian Hazard DetectionSvetlana Kim, Yongik Yoon 0001. 1114-1120 [doi]
- Internet Articles Classification by Industry Types Based on TF-IDFJonghun Cha, Jee-Hyong Lee. 1121-1125 [doi]
- Adaptive Opportunistic Routing over DTMANETS: Proposals and IssuesJavid Ali, Raja Wasim Ahmad, Tahir Maqsood, Junaid Shuja, Yung-Wey Chong, SoonGohn Kim, Kwangman Ko. 1126-1133 [doi]
- Accelerated Purge Processes of Parallel File System on HPC by Using MPI ProgrammingMin Woo Kwon, JunWeon Yoon, Taeyoung Hong, Chanyeol Park. 1134-1140 [doi]
- Path Privacy Preservation Using Threshold Secret Sharing via Distributed Obfuscators in Directions SearchMihui Kim. 1141-1146 [doi]
- A QoE Based Trustable SDN Framework for IoT Devices in Mobile Edge ComputingHamid Tahaei, Kwangman Ko, Wonjeong Seo, Suchong Joo. 1147-1152 [doi]
- Cross-Cultural Touch-Based SNS Interface Design for the ElderlyFanny Febriani Susilo, Jung-Ho Lee, Ji-Hyung Park, Jung Min Park. 1153-1161 [doi]
- A Framework for Blockchain Based Secure Smart Green House FarmingAkash Suresh Patil, Bayu Adhi Tama, Youngho Park 0004, Kyung Hyune Rhee. 1162-1167 [doi]
- System for the Researcher Map to Promote Convergence ResearchSangwon Hwang, Kangwon Seo, Woncheol Ryu, Young-Kwang Nam. 1168-1173 [doi]
- The Congestion Control Model for Unmanned Aircraft System Traffic ManagementJung-In Choi, Seung-Hyun Seo, Taenam Cho. 1174-1179 [doi]
- Towards Recovering Fault Traceability Links by Using Information Retrieval TechniqueSeungsuk Baek, Jung-Won Lee, Byungjeong Lee. 1180-1185 [doi]
- Multi-level Key Establishment with Space-Time Graphs for Delay Tolerant NetworksJinyeong Kang, Inwhee Joe. 1186-1191 [doi]
- Defect Management Method for Content-based Document Artifact Test in Software R&D ProjectDusan Baek, Jong-Hwan Shin, Byungjeong Lee, Jung-Won Lee. 1192-1198 [doi]
- An Analysis of Online Learning Tools Based on Participatory Interaction: Focused on an Analysis of the Minerva School CaseDae-Hyun Lee, Yen-Woo You, Yong Kim. 1199-1206 [doi]
- A New Direction-Based Routing Protocol in WSNsKyeong Mi Noh, JiSu Park, Jin Gon Shon. 1207-1212 [doi]
- Fast Animation Crowds Using GPU Shaders and Motion Capture DataManKyu Sung. 1213-1219 [doi]
- Association-Based Process Integration for Compliance with Core Standards in Development of Medical SoftwareDongyeop Kim, Ye-seul Park, Byungjeong Lee, Jung-Won Lee. 1220-1226 [doi]
- Ventricular Arrhythmia Classification Based on High-Order Statistical Features of ECG SignalsSungHyun Moon, JungJoon Kim. 1227-1231 [doi]
- Compression and Variable-Sized ECC Scheme for the Reliable Flash Memory SystemKi-Jin Kim, Seung Ho Lim. 1232-1236 [doi]
- A Keyword-Based Big Data Analysis for Individualized Health Activity Using Keyword Analysis Technique: A Methodological Approach Using National Health DataSangdo Lee, Hoanh Su Le, Jun Ho Huh. 1237-1243 [doi]
- Reliability and Control Theory: An Integration Approach for Safety AnalysisAnit Thapaliya, Gihwon Kwon. 1244-1249 [doi]
- An Extended Hierarchical Safety Analysis for Software-Intensive SystemDaehui Jeong, Gihwon Kwon. 1250-1256 [doi]
- Toward Providing Automatic Program Repair by Utilizing Topic-Based Code Block SimilarityYoungjun Jeong, Kyeongsic Min, Geunseok Yang, Jung-Won Lee, Byungjeong Lee. 1257-1262 [doi]
- Comparing IO Visor and Pcap for Security Inspection of Traced Packets from SmartX BoxMuhammad Ahmad Rathore, Aris Cahyadi Risdianto, Taekho Nam, JongWon Kim 0001. 1263-1268 [doi]
- Building the De-obfuscation Platform Based on LLVMJihun Kim, Kwangman Ko, Jonghee M. Youn. 1269-1274 [doi]
- Understanding Automated Continuous Integration for Containerized Smart Energy IoT-Cloud ServiceChorwon Kim, Seungryong Kim, JongWon Kim 0001. 1275-1280 [doi]
- Comparing the Effectiveness of SFMEA and STPA in Software-Intensive Railway Level Crossing SystemTung La-Ngoc, Gihwon Kwon. 1281-1288 [doi]
- Vision-Based Humanoid Robot Control Using FIR FilterKwan Soo Kim, Hyun-Ho Kang, Sung Hyun You, Choon Ki Ahn. 1289-1294 [doi]
- Prototype Implementation of Site Visibility Framework Employing IO Visor-Based Packet TracingTaekho Nam, JongWon Kim 0001. 1295-1300 [doi]
- ICN Based Disaster Area Network PlatformMasashi Katsumata. 1301-1306 [doi]
- Single-Camera Vision-Based Vein Biometric Authentication and Heart Rate Monitoring via Infrared Imaging AnalysisJae Hyun Han, Jinman Kim, Eui Chul Lee. 1307-1313 [doi]
- Analysis of Agenda Prediction According to Big Data Based Creative Education Performance FactorsJi-Hoon Seo, Eunmi Cho, Kil Hong Joo. 1314-1319 [doi]
- Multimedia Design Approaches by Just Noticeable Difference (JND) of Audiovisual ModalitiesSuhhee Yoo, Mincheol Whang. 1320-1325 [doi]
- Usability Improvement of Life-Logging Contents Based on Gamification FactorsSojung Kwak, Jieun Kwon. 1326-1331 [doi]
- The Relationships Between Behavioral Patterns and Emotions in Daily LifeHyunWoo Lee, Ayoung Cho, Youseop Jo, Mincheol Whang. 1332-1339 [doi]
- Automated Verification Method of Korean Word Handwriting Using Geometric FeatureWoohyuk Jang, Sehee Kim, Yoonkyoung Kim, Eui Chul Lee. 1340-1345 [doi]
- Correlation Analysis Between Environmental Sound and Human EmotionMin Woo Park, Hyeonsang Hwang, Eui Chul Lee. 1346-1351 [doi]
- Image-Based Malware Classification Using Convolutional Neural NetworkHae Jung Kim. 1352-1357 [doi]
- Classification of Web Content by Category Generation in Social Life LoggingYoungho Jo, Heajin Kim, Hana Lee, Mincheol Whang. 1358-1363 [doi]
- Intrusion Detection in High-Speed Big Data Networks: A Comprehensive ApproachKamran Siddique, Zahid Akhtar, Yangwoo Kim. 1364-1370 [doi]
- Embodied Emotion Recognition SystemAyoung Cho, HyunWoo Lee, Hyeonsang Hwang, Youseop Jo, Mincheol Whang. 1371-1376 [doi]
- Patterns of Cardiovascular and Behavioral Movements in Life-Logging According to Social EmotionsHana Lee, Youngho Jo, Heajin Kim, Mincheol Whang. 1377-1382 [doi]
- Deep Representation of Raw Traffic Data: An Embed-and-Aggregate Framework for High-Level Traffic AnalysisWoo-Sung Choi, Jonghyeon Min, Taemin Lee, Kyeong-Seok Hyun, Taehyung Lim, Soonyoung Jung. 1383-1390 [doi]
- A Study on Traffic Signal Waiting Model Using Queuing TheoryJoongHoon Lee, HyuckJoong Yoon, Tae-Sun Chung. 1391-1396 [doi]
- Service Aware Orchestration for Dynamic Network Slicing in 5G NetworksJeongyun Kim. 1397-1402 [doi]
- Improved Schedulability Analysis of Fixed-Priority for Mixed-Criticality Real-Time Multiprocessor SystemsNamyong Jung, JinKyu Lee. 1403-1409 [doi]
- Analysis of the Elements of Future Development of Korean Style Software Education Through the Opinion Mining TechniqueJi-Hoon Seo, Kil Hong Joo. 1410-1415 [doi]
- Comparison of 2D&3D Performances of Facial Feature Analysis Using RGB-D Vision SensorKunyoung Lee, Eui Chul Lee. 1416-1421 [doi]
- The Two Dimensional Model of Social Emotion Based on Social Life LoggingHeajin Kim, Youngho Jo, Hana Lee, Mincheol Whang. 1422-1427 [doi]
- Design of Zigbee-BLE Gateway Direct Communication System for Smart Home EnvironmentJae-Sung Shim, Hyung-Joon Kim, Nam-Uk Lee, Seok Cheon Park. 1428-1433 [doi]
- Design of Automatic Source Code Generation Based on User Pattern DefinitionSeung Su Yang, Hyung-Joon Kim, Nam-Uk Lee, Seok Cheon Park. 1434-1439 [doi]
- Design of TDD-Based Automation System for Android Application Test AutomationMin-Hyung Park, Hyung-Joon Kim, Young-Hwan Jang, Seok Cheon Park. 1440-1444 [doi]
- Convolutional Neural Network Based Serial Number Recognition Method for Indian Rupee BanknotesUnsoo Jang, Eui Chul Lee. 1445-1450 [doi]
- Emotion Recognition Through Cardiovascular Response in Daily Life Using KNN ClassifierYouseop Jo, HyunWoo Lee, Ayoung Cho, Mincheol Whang. 1451-1456 [doi]
- Location Privacy for HIP Based Internet of ThingsKyung Choi, Mihui Kim. 1457-1463 [doi]
- Ubiquitous Learning and Digital Badges in the Age of Hyper-connectivityYoonil Auh, Heejung Raina Sim. 1464-1469 [doi]
- Private Data Protection of Android ApplicationJinseong Kim, Im Y. Jung. 1470-1475 [doi]