Abstract is missing.
- Strategy to Reduce I/O Access Time of Applications in Virtual MachinesJaemyoun Lee, Sanghwa Han, Junhee Ryu, Kyungtae Kang. 1-2 [doi]
- Critical Success Factors Model for Business Intelligent over ERP CloudAhmed Z. Emam. 1-5 [doi]
- A Study on Improvement Measures of Remote Diligence / Laziness Management Applying NFCYoung-Ho Lee, Min-Su Kim, Kuinam J. Kim. 1-3 [doi]
- Abnormal Event Detection Using HOSFShwu-Huey Yen, Chun-Hui Wang. 1-4 [doi]
- Fibonacci-Based Hardware Post-Processing for Non-Autonomous Signum Hyperchaotic SystemAbhinav S. Mansingka, Mohamed L. Barakat, Mohammed Affan Zidan, Ahmed Gomaa Radwan, Khaled N. Salama. 1-4 [doi]
- An In-Vehicle Data Management Framework for Interaction between IVI and Vehicular NetworksKabsu Han, Insick Son, Jeonghun Cho. 1-4 [doi]
- Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass MarketInsu Song, John Vong. 1-4 [doi]
- A Framework for Energy Monitoring and Management System for Educational InstitutionsAhmad Al-Daraiseh, Eyas El-Qawasmeh, Nazaraf Shah. 1-4 [doi]
- A Study on Improvement Measures of Unmanned Security System against Security ThreatsByung Seok Kong, Min-Su Kim, Kuinam J. Kim. 1-3 [doi]
- Co-Processor Aided Attack on Embedded Multi-OS EnvironmentsPierre Schnarz, Joachim Wietzke, Ingo Stengel. 1-4 [doi]
- Smart Wheelchair Control System Using Cloud-Based Mobile DeviceSanghyun Park, Tran Thi Thu Ha, Jadhav Yogiraj Shivajirao, Minsoo Hahn, Jaehyung Park, Jinsul Kim. 1-3 [doi]
- Instance-Based Ontology Matching with Rough Set Features SelectionChee Een Yap, Myung Ho Kim. 1-4 [doi]
- An Improvement of Secure Remote User Authentication Scheme Using Smart CardsJongho Mun, Qiuyan Jin, Woongryul Jeon, Dongho Won. 1-4 [doi]
- Development of Telugu Text to Speech System Using OMAP 3530Safia Shaik, Y. Padmasai, V. Naveen Kumar. 1-5 [doi]
- Implementation of Template Matching Based ECG Compression Algorithm for Mobile ApplicationByeong Hoon Kim, Yun-Hong Noh, Do-Un Jeong. 1-4 [doi]
- Using Simulation and Modeling Tools in Teaching Computer Network CoursesAzeddien M. Sllame, Mohamed Jafaray. 1-4 [doi]
- A Study on Secure Chip for Message Authentication between a Smart Meter and Home Appliances in Smart GridYun-Seok Lee, Eun Kim, Young-Sub Kim, Ha-Yong Jeon, Min-Soo Jung. 1-3 [doi]
- An Approach to Identify Levels of Reflection Using Latent Semantic AnalysisGary Cheng, Juliana Chau. 1-3 [doi]
- Rotated Object Recognition Based on Corner Feature Points for Mobile Augmented Reality ApplicationsDae-Hwan Kim, Hyeon-Sub Jung, Chung-Pyo Hong, Cheong-Ghil Kim, Shin-Dug Kim. 1-3 [doi]
- Comparison Performance of MFFV2 and MVFactor for Factoring the ModulusKritsanapong Somsuk, Sumonta Kasemvilas. 1-4 [doi]
- Handwritten Character Recognition Using Histograms of Oriented Gradient Features in Deep Learning of Artificial Neural NetworkSuthasinee Iamsa-at, Punyaphol Horata. 1-5 [doi]
- Physical Interactive Contents for the Converged Wellness EducationBongsup Park. 1-2 [doi]
- A Text-Based User Interface Style Toolkit for Low-Tier Embedded SystemsJonghyuk Park, Nakhoon Baek. 1-4 [doi]
- Wireless Radio Frequency Transmission for Bladder PressureAnusha Bandari, D. Aarti, S. Alekhya, Ashok Shigli, Ibrahim Patel. 1-4 [doi]
- Using Neural Networks as Pipeline Defect ClassifiersNik Ahmad Akram, Niusha Shafiabady, Dino Isa. 1-4 [doi]
- Performance Interpretation Method for Electrical Tractor Based on Model-Based DesignIlhoon Yoo, Taehyung Lee, Byeongwoo Kim, Jin Hur, Kyubong Yeon, Gyeonggeun Kim. 1-4 [doi]
- Implementation of Mobile Based Multi-Function Health Monitoring SystemByeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong. 1-4 [doi]
- VLC-TDOA Using Sinusoidal Pilot SignalYoungsuk Kim, Yoan Shin, Myungsik Yoo. 1-3 [doi]
- Dynamic Innate Immune System Model for Malware DetectionMohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof. 1-4 [doi]
- A Study on Distance-Based Multi-Hop Broadcast Scheme for Inter-Vehicle CommunicationSang-woo Chang, Sang Sun Lee. 1-4 [doi]
- A New Key Exchange Protocol on Thompson GroupsHongxin Ma, YingJue Fang, Xiaofeng Wang. 1-4 [doi]
- Enhanced Visual Clustering by Reordering of Dimensions in Parallel CoordinatesKhadidja Ameur, Nadjia Benblidia, Saliha Oukid-Khouas. 1-4 [doi]
- Notes on Two Flawed Attacks on Undeniable Signature SchemesRouzbeh Behnia, Swee-Huay Heng. 1-4 [doi]
- Speaker Dependent Real-Time Vowel Recognition Algorithm for Lip Sync in Digital ContentsSun-Min Hwang, Bok-Hee Song, Han-Hyung Yun. 1-4 [doi]
- Spatial Information Service Model and Considerations in u-CityInsu Cho, Heejun Park. 1-3 [doi]
- FPGA Based Real Time Embedded Color Tracking Mobile RobotSanjaa Bold, Min A. Jeong, Seong Min Jeon, Seong Ro Lee. 1-4 [doi]
- Review on Sensor Cloud and Its Integration with Arduino Based Sensor NetworkAbel Avitesh Chandra, Yeonwoo Lee, Beom Mu Kim, Se Yeong Maeng, Sang Hyeok Park, Seong Ro Lee. 1-4 [doi]
- A Celestial Map Renderer Based on 3D Graphics SystemYoung Chun Kwon, Nakhoon Baek. 1-3 [doi]
- Privacy Preserving Problem Solving SchemeHiroshi Yamaguchi, Masahito Gotaishi, Phillip C.-Y. Sheu, Shigeo Tsujii. 1-4 [doi]
- Social Graph-Based Partitioning and Distribution for OSN Content Caching and Proactive DeliveryJaybie A. de Guzman, Roel M. Ocampo, Cedric Angelo M. Festin. 1-4 [doi]
- Dynamic Time Warping Algorithm: A Hardware Realization in VHDLJames Shueyen Tai, Kin Fun Li, Haytham Elmiligi. 1-4 [doi]
- An LRU Approach for the Virtual Texture ManagementXin Li, Nakhoon Baek. 1-3 [doi]
- Virtual Private Network for Wellness Sports InformationSunyoung Kang, Seungae Kang. 1-3 [doi]
- Key Distribution Protocol on Quantum CryptographyKondwani Makanda, Jun-Cheol Jeon. 1-2 [doi]
- A Study on Trend and Detection Technology for Cyber Threats in Mobile EnvironmentWon Hyung Park, Dae Hyeob Kim, Myung-Soo Kim, Neo Park. 1-4 [doi]
- Security Architecture Model for Smart Grid Communication SystemsHyunwoo Lim, Jongbin Ko, Seokjun Lee, Jongwan Kim, Mijoo Kim, Taeshik Shon. 1-4 [doi]
- Open Source Developer Download Tiers: A Survival FrameworkBee Bee Chua, Danilo Valeros Bernardo. 1-5 [doi]
- A P2P Network Booting Scheme Using a BitTorrent-Like ProtocolWigi Vei A. Oliveros, Cedric Angelo M. Festin, Roel M. Ocampo. 1-4 [doi]
- Better User Protection with Mobile IdentityDo Van Thanh, Tore E. Jønvik, Ivar Jørstad, Do van Thuan. 1-4 [doi]
- A Systematic Approach to Generate and Clarify Consistent RequirementsMohamed A. Hagal, Sohil F. Alshareef. 1-4 [doi]
- Wellness Contents for Disabled People's RehabilitationSeungae Kang. 1-3 [doi]
- Developing of Vision-Based Virtual Combat SimulatorNam Woo Kim, Hoonjae Lee. 1-4 [doi]
- Utilization of Directional Properties of Optical Flow for Railway Crossing Occupancy MonitoringZdenek Silar, Martin Dobrovolny. 1-4 [doi]
- Generating a Road Situation Data Warehouse Using Detectives Car ApproachCheng-Da Huang, Acquah Hackman, Hsiu-Hsen Yao, Syuan-Yi Chen. 1-4 [doi]
- RNA-Seq Read Simulator Using SAM TemplateSang Min Lee, Haesung Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee. 1-4 [doi]
- A Real-Time Fire Detection and Notification System Based on Computer VisionSahar Bayoumi, Elham AlSobky, Moneerah Al-Mohsin, Manahel Al-Twaim, Monira Alkaldi, Munera Alkahtani. 1-4 [doi]
- Generation of Pencil Sketch DrawingHwei-Jen Lin, Yue Sheng Li. 1-4 [doi]
- Face Recognition LockLawrence Y. Deng, Dong-liang Lee, Yi-Jen Liu. 1-2 [doi]
- Optimal Placement of TCSC for Transmission Congestion Management Using Hybrid Optimization ApproachManasarani Mandala, C. P. Gupta. 1-5 [doi]
- Implementation of the Abnormal ECG Monitoring System Using Heartbeat Check Map TechniqueYun-Hong Noh, Jiunn Huei Yap, Do-Un Jeong. 1-4 [doi]
- A Study of Wellness Core Technology and E-SportsYoungjoo Kim. 1-3 [doi]
- A Network-Based Internet Worm Intrusion Detection and Prevention SystemNaruemon Wattanapongsakorn, E. Wonghirunsombat, Chalermpol Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew. 1-4 [doi]
- Remote Data Transmission Middleware for TeleroboticsJeong Seok Kang, Young-Gyu Kim, Hong Seong Park. 1-4 [doi]
- Motion Dense Sampling for Video ClassificationKazuaki Aihara, Terumasa Aoki. 1-4 [doi]
- Test Data Combination Strategy for Effective Test Suite GenerationJae Hoon Yoon, Jeong Seok Kang, Hong Seong Park. 1-4 [doi]
- Study of Garbage Collection Performance on Dalvik VM Heap Considering Real-Time ResponseHyun-Joo Yoo, Seong-jeen Kim, Min-Soo Jung. 1-3 [doi]
- Reinforcement Learning-Based Trust and Reputation Model for Spectrum Leasing in Cognitive Radio NetworksMee Hong Ling, Kok-Lim Alvin Yau. 1-6 [doi]
- Iridescent Surface Rendering with Per-Channel Rotation of Anisotropic Microfacet DistributionYoung-Min Kang, Do-Hoon Lee, Hwan-Gue Cho. 1-4 [doi]
- Development of Doubango-Based IMS UE for Teaching ExperimentsYouzheng Chen, Baozhong Cheng, Xiaoyan Zhang, Yi Sun, Jin Xie, Kun Li. 1-4 [doi]
- Meeting Scheduling System Using Unpleasant NotificationTomoyuki Mishima, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara. 1-4 [doi]
- A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking ContextAbdullah A. I. Alnajem, Ning Zhang. 1-4 [doi]
- Improvement of the Quality for Digital Image Watermarking Based on Dual ISBGhassan N. Mohammed, Azman Yasin, Akram M. Zeki. 1-4 [doi]
- The Experiment Results of Webcam Broadcasting SystemsJeong-Myeong Kim, Geun-Duk Park. 1-4 [doi]
- Phishing Detection via Identification of Website IdentityEe Hung Chang, Kang-Leng Chiew, San-Nah Sze, Wei King Tiong. 1-4 [doi]
- Memory Compaction Performance Improvement by Separating a Dirty Page AllocationYoungjun Jang, Jaeook Kwon, Sung Won Ahn, Chuck Yoo. 1-3 [doi]
- An Enterprise Business Intelligence Maturity Model: Case Study ApproachMin-Hooi Chuah, Kee-Luen Wong. 1-4 [doi]
- Graphical Analysis of Mobile Computing Traffic Simulation ModelWonho Suh. 1-4 [doi]
- A Virtualized Network Model for Wellness Information Technology ResearchWonhyuk Lee, Seunghae Kim, Minki Noh, Hyuncheol Kim. 1-3 [doi]
- Design and Implementation of NFC-Based Mobile Coupon for Small Traders and EnterprisersSang-Won Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im. 1-2 [doi]
- CBQ-API: A Cloud-Based Programming Interface for Qur'anic ApplicationsZameer Ahmed Adhoni, Husam Ahmed Al Hamad, Abdul Ahad Siddiqi, Zaheer Ahmed Adhoni. 1-5 [doi]
- Increasing Resilience of OpenFlow WANs Using Multipath CommunicationKien Nguyen, Quang Tran Minh, Shigeki Yamada. 1-2 [doi]
- Multi-Level Segmentation for Concealed Object Detection with Multi-Channel Passive Millimeter Wave ImagingSeokwon Yeom, Dong Su Lee. 1-4 [doi]
- Evaluating Mobility Models in Delay Tolerant NetworkRegin Cabacas, In-Ho Ra. 1-4 [doi]
- Combining Task- and Role-Based Access Control with Multi-Constraints for a Medical Workflow SystemIvy Joy G. Mallare, Susan Pancho-Festin. 1-4 [doi]
- Child's Body Part Tracking Simulates Babysitter Vision RobotHanan Aljuaid, Dzulkifli Mohamad. 1-4 [doi]
- Performance Evaluation for Cloud Computing in u-Health EnvironmentMin Woo Jung, Jeonghun Cho. 1-4 [doi]
- Sensible Heat Storage for Power GenerationIbrahim Patel, D. Aarti, S. Alekhya, Raghavender Kulkarni. 1-4 [doi]
- A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic InformationJeong-Seok Jang, Min-Soo Kang, Kyounghak Lee. 1-4 [doi]
- Method of Noise Reduction for High-Voltage Systems Applied in Subsea PlantsHyeok-Joon Kwon, Jae Woo Yoon, Hong Cho, Seung-Jae Ryu, Byeong-Woo Kim. 1-4 [doi]
- Implementing Decision Tree Fuzzy Rules in Clinical Decision Support System after Comparing with Fuzzy Based and Neural Network Based SystemsAnooj P. K.. 1-6 [doi]
- A Web Services-Based Cloud Interface Agent for Intelligent YOHO Information ProcessingSheng-Yuan Yang, Dong-liang Lee, Lawrence Y. Deng. 1-4 [doi]
- A Study on the Information Protection Modules for Secure Mobile PaymentsEun Kim, Yun-Seok Lee, Seong-Yun Kim, Jung-Won Choi, Min-Soo Jung. 1-2 [doi]
- A Simple Study of Webpage Text Classification Algorithms for Arabic and English LanguagesSumaia Mohammed Al-Ghuribi, Saleh Alshomrani. 1-5 [doi]
- Combining Context and Content for Automatic Image Annotation on Mobile PhonesSiham Bacha, Nadjia Benblidia. 1-4 [doi]
- Implementation of Logging for Information Tracking on NetworkAkihiko Maeta, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara. 1-4 [doi]
- A Novel Security Model for Robust Web ServicesHwan-Seok Yang, Seung-Jae Yoo. 1-3 [doi]
- Surprising Consequences of Simple Privacy Protection MethodRadoslaw Nielek, Bogdan Ksiezopolski, Adam Wierzbicki, Lukasz Anwajler. 1-5 [doi]
- A Thin-Thick Client Collaboration for Optimizing Task Scheduling in Mobile Cloud ComputingPham Phuoc Hung, Tuan-Anh Bui, Eui-nam Huh. 1-4 [doi]
- Attribute Relationship Evaluation Methodology for Big Data SecuritySung-Hwan Kim, Nam-Uk Kim, Tai-Myoung Chung. 1-4 [doi]
- A Space Effective DRAM Adapter for PRAM-Based Main Memory SystemDo-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim. 1-3 [doi]
- Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto SystemChi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang Hyung Lee, Choong-Ho Cho. 1-4 [doi]
- Mobile Computing Traffic Simulation FrameworkWonho Suh. 1-3 [doi]
- Mobile Collaborative Experiential Learning (MCEL): Personalized Formative AssessmentInsu Song, John Vong. 1-4 [doi]
- A Bergman Ring Based Cryptosystem Analogue of RSAD. T. Long, D. T. Thu, D. N. Thuc. 1-4 [doi]
- Security Event Correlation Supported by Multi-Core ArchitectureFeng Cheng 0002, Amir Azodi, David Jaeger, Christoph Meinel. 1-5 [doi]
- English-Hindi Transliteration by Applying Finite Rules to Data before Training Using Statistical Machine TranslationMitali Halder, Anant Dev Tyagi. 1-4 [doi]
- Mobile Computing Traffic Simulation Data ProcessWonho Suh. 1-4 [doi]
- Generalized Architecture to Capture End to End Provenance in a SystemAnu Mary Chacko, Suresh Kumar, Vinod Pathari. 1-4 [doi]
- Comparative Study of Channel Codes for OFDM System and Judgement for Batter Peak to Average Power Ratio (PAPR)Pankaj Joshi, Divyanshu Joshi. 1-4 [doi]
- SMSHM: Secure Mesh Mode Protocol to Enhance Security of 4G NetworksSalwa Elramly, Saeed Ashry, Abdulatief Elkouny, Ahmed Elsherbini, Hesham Elbadawy. 1-5 [doi]
- A Case Study of Wellness IT: Therapeutic Horseback RidingSoojung Park. 1-3 [doi]
- A Leader Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETsAlmetwally M. Mostafa, Ahmed E. Youssef. 1-4 [doi]
- Analysis of Efficient Message Relay Methods in Intervehicle NetworksDonggeun Lee, Sang Sun Lee. 1-4 [doi]
- An Implementation and Experiment of Wireless Attack Emulator on Windows EnvironmentDo-Young Chung, Sok-joon Lee, Sin-Hyo Kim. 1-4 [doi]
- Building Composite Grid Tasks Using STROLL File-SystemAbdulrahman Azab, Hein Meling. 1-4 [doi]
- Comparison of ECC and RSA Algorithm in Resource Constrained DevicesMohsen Bafandehkar, Sharifah Md Yasin, Ramlan Mahmod, Zurina Mohd Hanapi. 1-3 [doi]
- Design of Data Structure for System ENC KernelDae-Won Park, Jaeyang Park, Doowy Kwon, Hyuk-Chul Kwon, Suhyun Park. 1-3 [doi]
- Multicast Based Service Orchestration ProtocolMinseok Pyo, Sangwook Bae, Sunyoung Han. 1-3 [doi]
- Visualization for Interest in Music Based on Plurk Social NetworkDong-liang Lee, Lawrence Y. Deng, Yi-Jen Liu. 1-4 [doi]
- Detecting Illegally-Copied Apps on Android DevicesEunhoe Kim, Sungmin Kim, Jaeyoung Choi. 1-4 [doi]
- A Mobile Device-Based Mobile AP Detection Scheme Using NAT BehaviorMinuk Kim, Jiman Mun, Souhwan Jung, Younghan Kim. 1-4 [doi]
- A Group Based In-Block Logging for Flash Based SystemsRize Jin, Hyung-Ju Cho, Tae-Sun Chung. 1-3 [doi]
- Robust Certificateless Signature Scheme without Bilinear PairingsKuo-Hui Yeh, Kuo-Yu Tsai, Ren-Zong Kuo, Tzong-Chen Wu. 1-4 [doi]
- The Efficient Security Management Measures Using K2-SMS in Case of Security TransportJi Woong Kim, Min-Su Kim, Seung-Jae Yoo, Kuinam J. Kim. 1-2 [doi]
- A Hierarchical Bag-of-Words Model Based on Local Space-Time Features for Human Action RecognitionJiangwei Wu, Daobing Zhou, Guoqiang Xiao. 1-4 [doi]
- Practical Secret Signature Scheme with No Randomness SavingByoungcheon Lee. 1-3 [doi]
- Development of Robust Sensor Node for Internet of ThingsMin-Soo Kang, Jeong-Seok Jang, Kyoung-hak Lee. 1-4 [doi]
- Modeling and Simulation of IM Drive Performance Using PI, ANN and FLCD. Nikhitha, J. N. Chandra Sekhar. 1-4 [doi]
- Panhinda - Offline Character Recognition System for Handwritten ArticlesD. M. D. S. S. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne. 1-4 [doi]
- Performance Evaluation of Wireless Body Area Network in u-Health EnvironmentMin Woo Jung, Jeonghun Cho. 1-4 [doi]
- Development of a Flute Self-Learning Tool Using an Electronic Flute and PC SoftwareJung-Chul Lee, Jae-Young Kim, Seungho Lee. 1-4 [doi]
- An Enhanced Public Key InfrastructureBoon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau. 1-4 [doi]
- National Standardization Strategy in Health Information Security EnvironmentJaeHyun Lee, Soonseok Kim, V. Scott Gordon. 1-3 [doi]