Abstract is missing.
- Single Password Authentication ProtocolPramote Kuacharoen. 1-6 [doi]
- Performance Analysis of Congestion Control for Massive MTC NetworksYi-Yen Chen, Yu-Chee Tseng, Jyh-Cheng Chen. 7-11 [doi]
- How to Train People to Increase Their Security Awareness in ITAgata Niescieruk, Bogdan Ksiezopolski, Radoslaw Nielek, Adam Wierzbicki. 12-17 [doi]
- Advanced Data Communication Framework for Cloud Computing from CDMIJae-Yun Jeong, Jae-woong Jeong. 18-23 [doi]
- A Study of AI Based E-learning System and ApplicationMin-Gyu Shim, Jae-woong Jeong. 24-30 [doi]
- A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on RansomwareJunHak Lee, Jae-woong Jeong. 31-36 [doi]
- Mobile App for Analyzing Environmental Visual Parameters with Life Logging CameraHyeonsang Hwang, Daejune Ko, Mincheol Whang, Eui Chul Lee. 37-42 [doi]
- Fake Fingerprint Detection Based on Statistical MomentsYosep Park, Unsoo Jang, Jiwon Im, Woohyuk Jang, Daejune Ko, Eui Chul Lee. 43-48 [doi]
- Path Planning Method for Collision Avoidance of Multiple UAVsHyeok Kim, Jeonghoon Kwak, Guichang Sim, Yunsick Sung. 49-55 [doi]
- 3D UAV Flying Path Optimization Method Based on the Douglas-Peucker AlgorithmGuichang Sim, JaeHwa Chung, Yunsick Sung. 56-60 [doi]
- Encrypted Network Traffic Analysis Method via Secure Socket Layer Handshake ControlJihoon Yoon, Kangsik Shin, Yoojae Won. 61-66 [doi]
- Property Analysis of SMS Spam Using Text MiningManki Baek, Youngkyung Lee, Yoojae Won. 67-73 [doi]
- An Automatic Patch Management System with Improved SecurityJunhee Kim, MinSeok Sohn, Yoojae Won. 74-80 [doi]
- An Empirical Study on the Relationship Between User Interface Design Attributes in Smartphone Applications and Intention to UseWonjin Jung, HyungRok Yim. 81-84 [doi]
- Thumb Biometric Using Scale Invariant Feature TransformNaeun Lim, Daejune Ko, Kun Ha Suh, Eui Chul Lee. 85-90 [doi]
- Image Classification Using Color and Spatial Frequency in Terms of Human EmotionMin Woo Park, Daejune Ko, Hyeonsang Hwang, Jiyeon Moon, Eui Chul Lee. 91-96 [doi]
- Human Robot Interaction Method by Using Hand Gesture RecognitionJae Hyun Han, Woohyuk Jang, Dojoon Jung, Eui Chul Lee. 97-102 [doi]
- A Beacon-Based User Direction Estimating Method in Indoor EnvironmentsJeonghoon Kwak, Yunsick Sung. 103-108 [doi]
- User Selection Based Backpropagation for Siamese Neural Networks in Visual FiltersHanju Park, Sukho Lee. 109-115 [doi]
- Methodological Route to Designing Optimized Bedroom Environment for Active-AgingSung-Jun Park. 116-121 [doi]
- Grayscale and Halftone Gel Lithography as Promising Techniques for Swelling-Induced Deformation of Smart Polymer Hydrogel FilmsMyunghwan Byun. 122-125 [doi]
- Methodology for Improving Usability Model of Multiple DevicesJeyoun Dong, Myunghwan Byun. 126-129 [doi]
- Development of SMART Base Isolation Using Linear Motion GuideChunho Chang, Sangyoung Shin. 130-133 [doi]
- Analysis on Work Zone Characteristics in South Korean Expressways Using Text Mining TechniqueOh-Hoon Kwon, Je Jin Park, Shin Hyoung Park. 134-139 [doi]
- Seismic Performance Evaluation of a Prestressed I-Type Girder Bridge in Daegu for ICT Based Disaster Management in Daegu Metropolitan CityChunho Chang, Sung Jig Kim, Shin Hyoung Park. 140-143 [doi]
- Implementation of Sitting Posture Monitoring System with KinectDong-Jun Shin, Minsang Kim, Wook Song, Se Dong Min, Min Hong. 144-150 [doi]
- Solving the Subgraph Isomorphism Problem Using Harmony SearchHoyeong Yun, Yongjoon Joe, Byung-Ok Jung, Hyoguen Bang, Dongmyung Shin. 151-158 [doi]
- Persuading Recommendations Using Customized Content CurationKeonsoo Lee, Yunyoung Nam. 159-163 [doi]
- Improving the Quality of an R-Tree Using the Map-Reduce FrameworkViet-Ngu Huynh Cong, Kang-Woo Lee, In-Hak Joo, Oh-Heum Kwon, Ha-Joo Song. 164-170 [doi]
- An Energy-Efficient and Reliable Routing Protocol for Cognitive Radio Sensor NetworksZamree Che-aron. 171-180 [doi]
- A Novel on Automatic K Value for Efficiency Improvement of K-means ClusteringSe-Hoon Jung, Kyoung-Jong Kim, Eun-Cheon Lim, Chun-Bo Sim. 181-186 [doi]
- Study on Integrity Verification and Compatibility-Conflict Analysis for Safe PatchingJeongmin An, Sangmoon Jung, Yoojae Won. 187-192 [doi]
- OFART: OpenFlow-Switch Adaptive Random TestingDong-Su Koo, Young Bom Park. 193-198 [doi]
- Patch Alarm and Collecting SystemJaegeun Oh, Chaeho Cho, Yoojae Won. 199-204 [doi]
- Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT DevicesKisu Kim, Jongsoo Lee, Wonkang Jung. 205-210 [doi]
- A Cluster Head Selection Method by Restricting Selection Area in Wireless Sensor NetworksJong Won Lee, JiSu Park, Heung-Keun Kim, Jin Gon Shon. 211-217 [doi]
- An Improved Pedestrian Detection System that Utilizes the HOG-UDP AlgorithmPyeong Kang Kim, Hyung Heon Kim, Tae-Woo Kim. 218-225 [doi]
- An Approach to Fast Protocol Information Retrieval from IoT SystemsOnur Soyer, Kwan-Young Park, Nomota Hiongun Kim, Tae-Soo Kim. 226-232 [doi]
- IoT Vulnerability Information Sharing SystemTaeho Seo. 233-236 [doi]
- A Study on the Service Identification of Internet-Connected Devices Using Common Platform EnumerationSarang Na, Taeeun Kim, Hwankuk Kim. 237-241 [doi]
- A Design of IoT Protocol FuzzerDae-il Jang, Taeeun Kim, Hwankuk Kim. 242-246 [doi]
- A Study on the Management Structure of Vulnerability Information in IoT EnvironmentEunhye Ko, Taeeun Kim, Hwankuk Kim. 247-251 [doi]
- Assessing the Impact of DoS Attacks on IoT GatewayYungee Lee, Wangkwang Lee, Giwon Shin, Kyungbaek Kim. 252-257 [doi]
- Low-Cost Infrared Video-Oculography for Measuring Rapid Eye MovementsYoungsun Kong, Hyeonsoo Lee, Namik Kim, SeungYeon Lee, Jihwan Park, Tae-Yang Han, Yunyoung Nam. 258-262 [doi]
- VM Relocation Method for Increase the Resource Utilization in Cloud ComputingSangwook Han, MinSoo Chae, Hwa-Min Lee. 263-268 [doi]
- Challenges and Experiment with LoRaWANSeung-Kyu Park, Kwang-il Hwang, Hyo-Seong Kim, Byoung-Sup Shim. 269-276 [doi]
- Consumer's Behavioral System of Approach and Avoidance Investigating Generic Medicine Distribution and Logistics in JapanTakefumi Hosoda, Hongsik J. Cheon. 277-282 [doi]
- Cross-Conforming Approaches of ICT Functionality Design for Smart CityJae Young Ahn, Eunjun Rhee, Hyun-Woo Lee, Dae-Joon Hwang. 283-288 [doi]
- GUI-Based Korean Font Editing System Using Font Parameterization TechniqueMinju Son, Gyeongjae Gwon, Geunho Jeong, Jaeyoung Choi. 289-295 [doi]
- Spatial Big Data Analysis System for Vehicle-Driving GPS TrajectoryWonhee Cho, Eunmi Choi. 296-302 [doi]
- i-SHSS: An IoT Based Smart Home Security SystemSaurabh Singh 0001, Pradip Kumar Sharma, Seo Yeon Moon, Jong Hyuk Park. 303-306 [doi]
- The VM Weighted Filter Scheduling Algorithm for OpenStack CloudMohan Krishna Varma Nandimandalam, Eunmi Choi. 307-313 [doi]
- A Hierarchical Motion Estimation Based on the Properties of Motion Vectors for Low Complexity in Video CodingHyo Sun Yoon, Mi-Young Kim. 314-320 [doi]
- Research on Method of Technological Evolution Analysis Based on HLDALiang Chen, Xiao-ping Lei, Guancan Yang, Jing Zhang. 321-330 [doi]
- A Mixture Record Linkage Approach for US Patent Inventor DisambiguationGuan-Can Yang, Cheng Liang, Zhang Jing, Dao-Ren Wang, Hai-Chao Zhang. 331-338 [doi]
- The LTC Framework for Competitive Analysis on Industrial TechnologyHongqi Han, Changqing Yao, Maoxiang Peng, Yongsheng Yu. 339-346 [doi]
- Bayesian Multinomial NaĂŻve Bayes Classifier to Text ClassificationShuo Xu, Yan Li, Zheng Wang. 347-352 [doi]
- CERIF: A Research Information Model for Electric Vehicles Decision Support SystemYingjie Zhang, Na Qi. 353-360 [doi]
- On Bypassing Page Cache for Block Devices on Storage Class MemoryJin Baek Kwon. 361-366 [doi]
- Applying Tensorflow with Convolutional Neural Networks to Train Data and Recognize National FlagsHoang Huu Duc, Keechul Jung. 367-373 [doi]
- An Empirical Study on the Effect of the Interpretability of Metaphors in UI on the Learnability of Mobile AppsWonjin Jung, HyungRok Yim. 374-378 [doi]
- A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile ServicesMoon-Hwan Kang, Min Yoon, Jae-Woo Chang. 379-385 [doi]
- A Kernel Density Estimation Model for Moving Object DetectionYulong Qiao, Wei Xi. 386-392 [doi]
- Detecting Bases of Maximal Cliques in a GraphFei Hao, Doo-Soon Park, Zheng Pei. 393-398 [doi]
- Forecasting Cultivable Region-Specific Crops Based on Future Climate Change Utilizing Public Big DataYoo-Jin Moon, Won Whee Cho, Jieun Oh, Jeong Mok Kim, Sang Yub Han, Kee-Hwan Kim, Sungkap Cho. 399-404 [doi]
- Statistical Analysis of Determinants of Intention to Use Virtual Reality Services and Moderating EffectsYoung-Ho Hwang, Yoo-Jin Moon. 405-411 [doi]
- Real-Time Human Depression Diagnosis System Using Brain Wave AnalysisDong-Min Shin, Yunjin Nam, Dongil Shin, Dongkyoo Shin. 412-418 [doi]
- Deep Belief Network Based on Double Weber Local Descriptor in Micro-expression RecognitionXiao-li Hao, Miao Tian. 419-425 [doi]
- Design for Network File Forensics System Based on Approximate MatchingAonan Zhai, Fei Xu, Haiqing Pan, Junzheng Shi, Gang Xiong. 426-431 [doi]
- The Comparative Analysis of the Repeat Regions from the Assembled ContigsJaehee Jung. 432-439 [doi]
- Senior Tourism and Information and Communication TechnologiesBlanka KlĂmová. 440-445 [doi]
- Wearable and Portable Monitoring Devices for Older PeopleBlanka KlĂmová, Petra Maresová. 446-451 [doi]
- A Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier EnsemblesBayu Adhi Tama, Kyung Hyune Rhee. 452-458 [doi]
- Learning Reaction Analysis Engine for Interactive Digital Textbook PlatformKwang-Sik Chung. 459-465 [doi]
- Rule-Based Topic Trend Analysis by Using Data Mining TechniquesYunwan Jeon, Chanho Cho, Jongwoo Seo, Kyunglag Kwon, Hansaem Park, In Jeong Chung. 466-473 [doi]
- A Case Study of Hierarchical Safety Analysis for Eliciting Traceable Safety RequirementsDaehui Jeong, Anit Thapaliya, Gihwon Kwon. 474-480 [doi]
- Smart Home Technology and Energy Savings with a Special Focus on EuropeBlanka KlĂmová, Petra Maresová, Ondrej Krejcar. 481-486 [doi]
- Senior Citizens' Views of Using Medical Technologies - Case Study in Central EuropePetra Maresová, Jaroslav Kacetl. 487-492 [doi]
- Audiences Counting in Cinema by Detecting Occupied ChairsZhitong Su, Jun Lan, Wei Song 0004, Simon Fong, Yifei Tian. 493-498 [doi]
- Efficient Distributed Index Structure and Encrypted Query Processing Scheme for Cloud Computing EnvironmentYeon-Woo Jang, Hyunjo Lee, Jae-Woo Chang. 499-505 [doi]
- A Data Encryption Scheme Using Periodic Functions for Efficient Query Processing on Encrypted DataHyunjo Lee, Youngho Song, Jae-Woo Chang. 506-512 [doi]
- Software Product Line Lifecycle Management-Integration Engineering and Management ProcessJeong Ah Kim, Jinseok Yang. 513-520 [doi]
- OLSR Improvement with Link Live Time for FANETsYan Jiao, Wenyu Li, Inwhee Joe. 521-527 [doi]
- An Efficient Partition-Based Filtering for Similarity Joins on MapReduce FrameworkMiyoung Jang, Archana B. Lokhande, Naeun Baek, Jae-Woo Chang. 528-533 [doi]
- A Study of Algorithm Replacement Mechanism for Environment Adaptive Load BalancerJongmin Lee, Young B. Park 0001. 534-538 [doi]
- Face Recognition Based on Enhanced CSLBPChen Li 0025, Shuai Zhao, Ke Xiao, Yanjie Wang. 539-544 [doi]
- A Supporting Environment for Formal Analysis of Cryptographic ProtocolsJingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, Jingde Cheng. 545-550 [doi]
- Modeling and Simulation of LoRa in OPNETAndrew D. Jun, Seokjoon Hong, Wooyeob Lee, Kyungrak Lee, Inwhee Joe, Kyeseon Lee, Tae-Joon Park. 551-559 [doi]
- Dynamic Analysis Bypassing Malware Detection Method Utilizing Malicious Behavior Visualization and SimilarityJihun Kim, Jonghee M. Youn. 560-565 [doi]
- Mongolian Internet Consumers' Attitude Towards Web AdvertisingBulganmaa Togookhuu, Junxing Zhang, Wuyungerile Li. 566-572 [doi]
- A Study on the Quantitative Design and Documentation for the VR Based Training Contents RealismGyungchang Lee, Kyoil Chung, Cheong Youn. 573-579 [doi]
- Progressive Motion Artifact Removal in PPG Signal for Accurate Heart Rate EstimationJi Hun An, Heemang Song, Hyun-Chool Shin. 580-587 [doi]
- A Case Study on How to Predict Café Profit: A Dimension Reduction via Factor AnalysisJeong-Hyeon Moon, Chae-Young Yun, Seon Joo Park, Kyung-Ah Sohn. 588-593 [doi]
- Motion Blurred Shadows Using a Hybrid ApproachMinhPhuoc Hong, Kyoungsu Oh. 594-600 [doi]
- Design of ECG Data Compression Algorithm for Efficient M2M-Based Mass Biometric Data TransmissionJae-Sung Shim, Seung Su Yang, Young-Hwan Jang, Yong-Wan Ju, Seok Cheon Park. 601-606 [doi]
- Design of Clustering Algorithm for Efficient Energy Management in Wireless Sensor Network EnvironmentsSeung Su Yang, Jae-Sung Shim, Young-Hwan Jang, Yong-Wan Ju, Seok Cheon Park. 607-612 [doi]
- Design of a Framework for Security Enhancement in Telematics Control Units (TCUs)Kiyoung Jang, Suhong Shin, Byoungsoo Koh. 613-619 [doi]
- Improved Data Stream Clustering Algorithm for Anomaly DetectionChunyong Yin, Sun Zhang, Jin Wang. 620-625 [doi]
- Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection SystemChunyong Yin, Lian Xia, Jin Wang. 626-632 [doi]
- Short Text Classification Technology Based on KNN+Hierarchy SVMChunyong Yin, Lingfeng Shi, Jin Wang. 633-639 [doi]
- Spectral Response Based Regularization Parameter Selection for Total Variation Image RestorationYuhui Zheng, Min Li, Kai Ma, Shunfeng Wang, Jin Wang. 640-645 [doi]
- Face Recognition for Mobile Self-authentication with Online Model UpdateSeon Ho Oh, Geon Woo Kim 0001. 646-648 [doi]
- Prototype System Design for Large-Scale Person Re-identificationSeon Ho Oh, Seung Wan Han, Beom-Seok Choi, Geon Woo Kim 0001. 649-651 [doi]
- Topic Modeling for Learner Question and Answer AnalyticsKyungrog Kim, Hyejin Song, Nammee Moon. 652-655 [doi]
- A Model of Energy-Awareness Predictor to Improve the Energy EfficiencySvetlana Kim, Yong-Ik Yoon 0001. 656-662 [doi]
- A Novel Structure Tensor Using Nonlocal Total Variation OperatorYin Yu, Kai Ma, Yuhui Zheng, Jin Wang. 663-669 [doi]
- Gaussian Mixture Model Based Image Denoising Method with Local ConstraintsMin Li, Yuhui Zheng, Shunfeng Wang, Jin Wang. 670-675 [doi]
- A Study on Secure Protocol Techniques Supporting TCUs in a Telematics EnvironmentByoungsoo Koh, Suhong Shin. 676-682 [doi]
- Development of Test Agents for Automated Dynamic Testing of UNIWAYSeoung-Hyeon Lee, Jung-Chan Na. 683-688 [doi]
- Multi-step Prediction for Time Series with Factor Mining and Neural NetworkMingji Zhou, Jin Liu 0009, Fei Li, Jin Wang 0001. 689-695 [doi]
- A Vision-Based Approach for Deep Web Form ExtractionJiachen Pu, Jin Liu, Jin Wang. 696-702 [doi]
- Questions Classification with Attention MachineYunlu Liaozheng, Jin Liu, Jin Wang. 703-708 [doi]
- Development of Unidirectional Security Gateway Satisfying Security Functional RequirementsSeon-Gyoung Sohn, Jungchan Na, Kyung-Soo Lim. 709-714 [doi]
- Context Based Multiple Players Identification in Sports ImagesMiYoung Nam, Jun-Young Lee, Sung Youb Kim, Young-Giu Jung. 715-719 [doi]
- A Study of the Factors Influencing Information Security Policy Compliance: Focusing on the Case of 'K' InstituteGwang-il Ju, Jinhyung Park, Wanyoung Heo, Joon-Min Gil, HarkSoo Park. 720-728 [doi]
- Safe-Driving Aid System Using Bi-directional CamerasByoung Wook Kwon, Kyung Yeob Park, Seo Yeon Moon, Jong Hyuk Park. 729-732 [doi]
- Telling Computer and Human Apart: Image-Sound Based CAPTCHA SystemJung Hyun Ryu, Nam Yong Kim, Seo Yeon Moon, Jong Hyuk Park. 733-736 [doi]