Abstract is missing.
- Mobile Application for the Teaching of EnglishAles Berger, Blanka Klímová. 1-6 [doi]
- Mobile Phone Apps as Support Tools for People with DementiaBlanka Klímová, Zuzana Bouckova, Josef Toman. 7-12 [doi]
- Optimization of Running a Personal Assistance Center - A Czech Case StudyPetra Poulova, Blanka Klímová. 13-19 [doi]
- Data Science - A Future Educational PotentialPetra Poulova, Blanka Klímová, Jaroslava Mikulecká. 21-27 [doi]
- Load Predicting Algorithm Based on Improved Growing Self-organized MapNawaf Alharbe. 29-39 [doi]
- Superpixel Based ImageCut Using Object DetectionJong-Won Ko, Seung-Hyuck Choi. 41-47 [doi]
- Anomaly Detection via Trajectory RepresentationRuizhi Wu, Guangchun Luo, Qing Cai, Chunyu Wang. 49-56 [doi]
- Towards Unified Deep Learning Model for NSFW Image and Video CaptioningJong-Won Ko, Dong-Hyun Hwang. 57-63 [doi]
- A Forecasting Model Based on Enhanced Elman Neural Network for Air Quality PredictionLizong Zhang, Yinying Xie, Aiguo Chen, Guiduo Duan. 65-74 [doi]
- Practice of Hybrid Approach to Develop State-Based Control Embedded Software Product LineJeong Ah Kim, Jinseok Yang. 75-82 [doi]
- An Anomaly Detection Algorithm for Spatiotemporal Data Based on Attribute CorrelationAiguo Chen, Yuanfan Chen, Guoming Lu, Lizong Zhang, Jiacheng Luo. 83-89 [doi]
- Behavior of Social Network Users to Privacy Leakage: An Agent-Based ApproachKaiyang Li, Guangchun Luo, Huaigu Wu, Chunyu Wang. 91-100 [doi]
- Measurement of Firm E-business Capability to Manage and Improve Its E-business ApplicationsChui Young Yoon. 101-107 [doi]
- Deep Learning-Based Intrusion Detection Systems for Intelligent Vehicular Ad Hoc NetworksAyesha Anzer, Mourad Elhadef. 109-116 [doi]
- A Citywide Distributed inVANETs-Based Protocol for Managing TrafficSarah Hasan, Mourad Elhadef. 117-124 [doi]
- Quantization Parameter and Lagrange Multiplier Determination for Virtual Reality 360 Video Source CodingLing Tian, Chengzong Peng, Yimin Zhou, Hongyu Wang. 125-136 [doi]
- GFramework: Implementation of the Gamification Framework for Web ApplicationsJae-Ho Choi, KyoungHwa Do. 137-143 [doi]
- Verification of Stop-Motion Method Allowing the Shortest Moving Time in (sRd-Camera-pRd) TypeSoon-Ho Kim, Chi-Su Kim. 145-151 [doi]
- A Long-Term Highway Traffic Flow Prediction Method for HolidayGuoming Lu, Jiaxin Li, Jian Chen, Aiguo Chen, Jianbin Gu, Ruiting Pang. 153-159 [doi]
- Parallel Generator of Discrete Chaotic Sequences Using Multi-threading ApproachMohammed AbuTaha, Safwan El Assad, Audrey Queduet. 161-167 [doi]
- Machine Learning Based Materials Properties Prediction Platform for Fast Discovery of Advanced MaterialsJeongcheol Lee, Sunil Ahn, Jaesung Kim, Sik Lee, Kumwon Cho. 169-175 [doi]
- A Secure Group Management Scheme for Join/Leave Procedures of UAV SquadronsSeungmin Kim, Moonwon Choi, Wooyeob Lee, Donguk Gye, Inwhee Joe. 177-183 [doi]
- View Designer: Building Extensible and Customizable Presentation for Various Scientific DataJaesung Kim, Sunil Ahn, Jeongcheol Lee, Sik Lee, Kumwon Cho. 185-191 [doi]
- A GPU-Based Training of BP Neural Network for Healthcare Data AnalysisWei Song 0004, Shuanghui Zou, Yifei Tian, Simon Fong. 193-198 [doi]
- Online Data Flow Prediction Using Generalized Inverse Based Extreme Learning MachineYing Jia. 199-206 [doi]
- A Test Data Generation for Performance Testing in Massive Data Processing SystemsSunkyung Kim, JiSu Park, Kang Hyoun Kim, Jin Gon Shon. 207-213 [doi]
- A Study on the Variability Analysis Method with Cases for Process TailoringSeung Yong Choi, Jeong Ah Kim, Yeonghwa Cho. 215-220 [doi]
- A Comparative Study of 2 Resolution-Level LBP Descriptors and Compact Versions for Visual AnalysisKarim Hammoudi, Mahmoud Melkemi, Fadi Dornaika, Halim Benhabiles, Féryal Windal, Oussama Taoufik. 221-227 [doi]
- Local Feature Based CNN for Face RecognitionMengti Liang, Baocheng Wang, Chen Li 0025, Linda Markowsky, Hui Zhou. 229-235 [doi]
- An Interactive Augmented Reality System Based on LeapMotion and MetaioXingquan Cai, Yuxin Tu, Xin He. 237-244 [doi]
- Network Data Stream Classification by Deep Packet Inspection and Machine LearningChunyong Yin, Hongyi Wang, Jin Wang 0001. 245-251 [doi]
- Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy ProtectionChunyong Yin, Lingfeng Shi, Jin Wang. 253-258 [doi]
- Improved Personalized Recommendation Method Based on Preference-Aware and Time FactorChunyong Yin, Shilei Ding, Jin Wang. 259-265 [doi]
- A Multi-objective Signal Transition Optimization Model for Urban Transportation Emergency RescueYouding Fan, Jiao Yao, Yuhui Zheng, Jin Wang. 267-273 [doi]
- Modeling Analysis on the Influencing Factors of Taxi Driver's Illegal Behavior in MetropolisTianyu Wang, Jiao Yao, Yuhui Zheng, Jin Wang. 275-281 [doi]
- Evaluation of Passenger Service Quality in Urban Rail Transit: Case Study in ShanghaiChenpeng Li, Jiao Yao, Yuhui Zheng, Jin Wang. 283-289 [doi]
- Research on the Mechanism of Value Creation and Capture Process for Mass Rail Transit DevelopmentWeiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang. 291-297 [doi]
- Transport Related Policies for Regional Balance in ChinaWeiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang. 299-305 [doi]
- Transportation Systems Damage and Emergency Recovery Based on SD MechanismWeiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang. 307-313 [doi]
- Chinese Question Classification Based on Deep LearningYihe Yang, Jin Liu, Yunlu Liaozheng. 315-320 [doi]
- A Domain Adaptation Method for Neural Machine TranslationXiaohu Tian, Jin Liu, Jiachen Pu, Jin Wang. 321-326 [doi]
- Natural Answer Generation with QA Pairs Using Sequence to Sequence ModelMinjie Liu, Jin Liu, Haoliang Ren. 327-332 [doi]
- DoS Attacks and Countermeasures in VANETsWedad Ahmed, Mourad Elhadef. 333-341 [doi]
- A Distributed inVANETs-Based Intersection Traffic Control AlgorithmIman Saeed, Mourad Elhadef. 343-351 [doi]
- A Study on the Recovery Method of PPG Signal for IPI-Based Key ExchangeJuyoung Kim, Kwantae Cho, Yong-Kyun Kim, Kyung-Soo Lim, Sang Uk Shin. 353-358 [doi]
- A Study on the Security Vulnerabilities of Fuzzy Vault Based on PhotoplethysmogramJuyoung Kim, Kwantae Cho, Sang Uk Shin. 359-365 [doi]
- Design of Readability Improvement Control System for Electric Signboard Based on Brightness AdjustmentPhyoung Jung Kim, Sung Woong Hong. 367-373 [doi]
- A Novel on Altered K-Means Algorithm for Clustering Cost Decrease of Non-labeling Big-DataSe-Hoon Jung, Won-Ho So, Kang-Soo You, Chun-Bo Sim. 375-381 [doi]
- Security Threats in Connected Car Environment and Proposal of In-Vehicle Infotainment-Based Access Control MechanismJoongyong Choi, Seong-il Jin. 383-388 [doi]
- Software Defined Cloud-Based Vehicular Framework for Lowering the Barriers of Applications of Cloud-Based Vehicular NetworkLionel Nkenyereye, Jong-Wook Jang. 389-395 [doi]
- A Study on Research Trends of Technologies for Industry 4.0; 3D Printing, Artificial Intelligence, Big Data, Cloud Computing, and Internet of ThingsKi Woo Chun, Haedo Kim, Keonsoo Lee. 397-403 [doi]
- Hardware Design of HEVC In-Loop Filter for Ultra-HD Video EncodingSeungyong Park, Kwangki Ryoo. 405-409 [doi]
- Design of Cryptographic Core for Protecting Low Cost IoT DevicesDennis Agyemanh Nana Gookyi, Kwangki Ryoo. 411-416 [doi]
- Efficient Integrated Circuit Design for High Throughput AESAlexander O. A. Antwi, Kwangki Ryoo. 417-422 [doi]
- Hardware Architecture Design of AES Cryptosystem with 163-Bit Elliptic CurveGuard Kanda, Alexander O. A. Antwi, Kwangki Ryoo. 423-429 [doi]
- Area-Efficient Design of Modular Exponentiation Using Montgomery Multiplier for RSA CryptosystemRichard Boateng Nti, Kwangki Ryoo. 431-437 [doi]
- Efficient Hardware Architecture Design of Adaptive Search Range for Video EncodingInhan Hwang, Kwangki Ryoo. 439-443 [doi]
- Effect: Business Environment Factors on Business Strategy and Business PerformanceWon-Hyun So, Ha-Kyun Kim. 445-453 [doi]
- Economic Aspect: Corporate Social Responsibility and Its Effect on the Social Environment and Corporate ValueWon-Hyun So, Ha-Kyun Kim. 455-462 [doi]
- Effect: Information Welfare Policies on the Activation of Information Welfare and Information SatisfactionWon-geun So, Ha-Kyun Kim. 463-470 [doi]
- Study on the Design Process of Screen Using a Prototype MethodTaewoo Kim, Sunyi Park, Jeongmo Yeo. 471-478 [doi]
- Study on the Business Process Procedure Based on the Analysis of RequirementsSunyi Park, Taewoo Kim, Jeongmo Yeo. 479-486 [doi]
- A Study on the Harmony of Music and TV Lighting Through Music AnalysisJeong Min Lee, Jun Ho Huh, Hyun Suk Kim. 487-495 [doi]
- Mobile Atmospheric Quality Measurement and Monitoring SystemKyeongseok Park, Sungkuk Kim, Sojeong Lee, Jun Lee, Kyoung-Sook Kim, So-Young Hwang. 497-503 [doi]
- Design of Simulator for Time Comparison and Synchronization Method Between Ground Clock and Onboard ClockDonghui Yu, Soyoung Hwang. 505-510 [doi]
- A Design of Demand Response Energy Optimization System for Micro GridSooyoung Jung, Jun Ho Huh. 511-516 [doi]
- Demand Response Resource Energy Optimization System for Residential Buildings: Smart Grid ApproachSooyoung Jung, Jun Ho Huh. 517-522 [doi]
- Improvement of Multi-Chain PEGASIS Using Relative DistanceBok Gi Min, JiSu Park, Hyoung Geun Kim, Jin Gon Shon. 523-529 [doi]
- The Design and Implementation of an Enhanced Document Archive System Based on PDFHyun Cheon Hwang, JiSu Park, Byeong Rae Lee, Jin Gon Shon. 531-537 [doi]
- Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage EnvironmentWon-Bin Kim, Im-Yeong Lee. 539-545 [doi]
- Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A ReviewAveen Muhamad, Mourad Elhadef. 547-555 [doi]
- A Zero-Watermarking Algorithm Based on Visual Cryptography and Matrix Norm in Order to Withstand Printing and ScanningDe-li, XianLong Dai, Liang Chen, Lihua Cui. 557-563 [doi]
- Animation Zero Watermarking Algorithm Based on Edge FeatureDe-li, Shan Yang, YiAn Zuo, ZhiXun Zheng, Lihua Cui. 565-571 [doi]
- Separate Human Activity Recognition Model Based on Recognition-Weighted kNN AlgorithmHaiqing Tan, Lei Zhang. 573-581 [doi]
- Detecting (k, r)-Clique Communities from Social NetworksFei Hao, Liang Wang, Yifei Sun, Doo-Soon Park. 583-590 [doi]
- Design of Competency Evaluation System Using Type Matching AlgorithmSeung Su Yang, Hyung-Joon Kim, Seok Cheon Park. 591-597 [doi]
- Design of Social Content Recommendation System Based on Influential Ranking AlgorithmYoung-Hwan Jang, Hyung-Joon Kim, Seok Cheon Park. 599-605 [doi]
- Index Design for Efficient Ontological Data ManagementMin-Hyung Park, Hyung-Joon Kim, Seok Cheon Park. 607-613 [doi]
- The Analysis of Consumption Behavior Pattern Cluster that Reflects Both On-Offline by RegionJinah Kim, Nammee Moon. 615-622 [doi]
- A Scene Change Detection Framework Based on Deep Learning and Image MatchingDayou Jiang, JongWeon Kim. 623-629 [doi]
- K-Means and CRP-Based Characteristic Investigating Method of Traffic Accidents with Automated Speed Enforcement CamerasShin Hyung Park, Shin Hyoung Park, Oh-Hoon Kwon. 631-637 [doi]
- A Uniformed Evidence Process Model for Big Data Forensic AnalysisNing Wang, Yanyan Tan, Shuyang Guo. 639-645 [doi]
- Evidence Collection Agent Model Design for Big Data Forensic AnalysisZhihao Yuan, Hao Li, Xian Li. 647-653 [doi]
- A Deep Learning Approach for Road Damage ClassificationGioele Ciaparrone, Angela Serra, Vito Covito, Paolo Finelli, Carlo Alberto Scarpato, Roberto Tagliaferri. 655-661 [doi]
- A Framework for Situated Learning Scenarios Based on Learning Cells and Augmented RealityAngelo Gaeta, Francesco Orciuoli, Mimmo Parente, Minjuan Wang. 663-669 [doi]
- Discovery of Interesting Users in Twitter by Using Rough SetsCarmen De Maio, Stefania Boffa. 671-677 [doi]
- Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health InformationSandi Rahmadika, Kyung Hyune Rhee. 679-685 [doi]
- A Blockchain-Based Access Control with Micropayment ChannelsSi-Wan Noh, Youngho Park 0004, Kyung Hyune Rhee. 687-692 [doi]
- A Fog Computing-Based Automotive Data Overload Protection System with Real-Time AnalysisByung Wook Kwon, Jungho Kang, Jong Hyuk Park. 693-696 [doi]
- Intelligent Security Event Threat Ticket Management System on Secure Cloud Security Infrastructures Being Able to Dynamic ReconfigurationYoungsoo Kim, Jungtae Kim, Jonghyun Kim. 697-703 [doi]
- Design and Implementation on the Access Control Scheme Against V2N Connected Car AttacksSokjoon Lee, Byung-Ho Chung, Joongyong Choi, Hyeokchan Kwon. 705-710 [doi]
- OpenCL Based Implementation of ECDSA Signature Verification for V2X CommunicationSokjoon Lee, Hwajeong Seo, Byungho Chunng, Joongyong Choi, Hyeokchan Kwon, Hyunsoo Yoon. 711-716 [doi]
- Developing Participatory Clothing Shopping Platform for Customer's Participation in DesignYing Yuan, Jun Ho Huh. 717-723 [doi]
- Cloth Size Coding and Size Recommendation System Applicable for Personal Size Automatic Extraction and Cloth Shopping MallYing Yuan, Jun Ho Huh. 725-731 [doi]
- Definition of Digital Printing Type Cloth Pattern Drawing for Mass CustomizingYing Yuan, Jun Ho Huh, Myung-Ja Park. 733-739 [doi]
- A Case Study Analysis of Clothing Shopping Mall for Customer Design Participation Service and Development of Customer Editing User Interface with Solutions for Picture Works CopyrightYing Yuan, Jun Ho Huh. 741-746 [doi]
- Development of Customer Design Responsive Automation Design Pattern Setting SystemYing Yuan, Jun Ho Huh. 747-753 [doi]
- A Development of Automation Position Processing Process and Pattern Grouping Technology Per Size for Automation Printing Pattern Image GenerationYing Yuan, Jun Ho Huh, Myung-Ja Park. 755-761 [doi]
- A Big Data Application in Renewable Energy Domain: The Wind Plant Case Contributions to MUE ProceedingsEmanuela Mattia Cafaro, Pietro Luise, Raffaele D'Alessio, Valerio Antonelli. 763-771 [doi]
- A Study on the RFID and 2D Barcode, and NFC and Performance ImprovementSeong-Kyu Kim, Jun Ho Huh. 773-779 [doi]
- A Study on the LMS Platform Performance and Performance Improvement of K-MOOCs Platform from Learner's PerspectiveSeong-Kyu Kim, Jun Ho Huh. 781-786 [doi]
- A Study on the Security Performance Improvement in BoT Perspective in Order to Overcome Security Weaknesses of IoT DevicesSeong-Kyu Kim, Jun Ho Huh. 787-792 [doi]
- A Study on the Rainbowchain Certificate in Order to Overcome Existing Certification SystemSeong-Kyu Kim, Jun Ho Huh. 793-798 [doi]
- A Study on the Method of Propelling by Analyzing the Form of Bird's MovementNak-Hwe Kim, Jun Ho Huh. 799-804 [doi]
- A Method of Propelling with Many Whirlpools Used by Inland BirdsNak-Hwe Kim, Jun Ho Huh. 805-810 [doi]
- Designing 3D Propeller by Applying Bird's Wing and Making a Test ProductNak-Hwe Kim, Jun Ho Huh. 811-817 [doi]
- A Study on the Bumps at the Leading Edge of the Wing Used by Hovering BirdsNak-Hwe Kim, Jun Ho Huh. 819-824 [doi]
- Artificial Intelligence Shoe Cabinet Using Deep Learning for Smart HomeJun Ho Huh, Kyungryong Seo. 825-834 [doi]
- Development of a Crash Risk Prediction Model Using the k-Nearest Neighbor AlgorithmMin Ji Kang, Oh-Hoon Kwon, Shin Hyoung Park. 835-840 [doi]
- Traffic Big Data Analysis for the Effect Evaluation of a Transportation Management PlanYong Woo Park, Oh-Hoon Kwon, Shin Hyoung Park. 841-847 [doi]
- Enhanced Usability Assessment on User Satisfaction with Multiple DevicesJeyoun Dong, Myunghwan Byun. 849-853 [doi]
- Rapid Parallel Transcoding Scheme for Providing Multiple-Format of a Single MultimediaSeungchul Kim, Mu He, Hyun Woo Kim, Young-Sik Jeong. 855-861 [doi]
- Design and Development of Android Application and Power Module for AWS Cloud like HPC ServersCheol Shim, Min Choi. 863-869 [doi]
- Development of Working History Monitoring and Electronic Approval on AndroidInjun Ohk, Min Choi. 871-878 [doi]
- Density-Based Clustering Methodology for Estimating Fuel Consumption of Intracity Bus by Using DTG DataOh-Hoon Kwon, Yongjin Park, Shin Hyoung Park. 879-885 [doi]