


default search action
CSA/CUTE 2016: Bangkok, Thailand
- James J. Park, Yi Pan, Gangman Yi, Vincenzo Loia:
Advances in Computer Science and Ubiquitous Computing - CSA/CUTE 2016, Bangkok, Thailand, 19-21 December. Lecture Notes in Electrical Engineering 421, Springer 2017, ISBN 978-981-10-3022-2
Advances in Information Technologies and Applications
- Sarut Panjan, Siam Charoenseang:
Design and Development of a Robotic Arm for Rehabilitation and Training. 3-8 - Myoungbeom Chung, IlJu Ko:
Detection of a Robust High-Frequency Range via Noise Analysis in a Real-World Environment. 9-15 - Ganjar Alfian
, Hyejung Ahn, Yoonmo Shin, Jaeho Lee
, Jongtae Rhee:
Intelligent Food Distribution Monitoring System. 16-22 - Jea-Hui Cha, Tae-Hyoung Kim, Jong-Wook Jang
:
Design of Sudden Unintended Acceleration Check System Using Distance Measurement Sensor. 23-28 - Seongmin Baek, Myunggyu Kim:
Real-Time Dynamic Motion Capture Using Multiple Kinects. 29-35 - Yan Li, Byeong-Seok Shin:
Cell-Based Indexing Method for Spatial Data Management in Hybrid Cloud Systems. 36-41 - YunHee Kang, Soong-ho Ko, KyoungWoo Kang:
SOA Based Equipment Data Management System for Smart Factory. 42-47 - Sanggyu Shin, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto:
The Problem Analysis of Specific Personal Information Protection Assessment in Japan Case. 48-53 - Jing Liu, Yongjun Wang, Peidai Xie, Xingkong Ma:
Using a Fine-Grained Hybrid Feature for Malware Similarity Analysis. 54-60 - Mengxuan Li, Wei Song, Liang Song, Kaisi Huang, Yulong Xi, Kyungeun Cho:
A Wireless Kinect Sensor Network System for Virtual Reality Applications. 61-65 - Anunpattana Punyawee, Chetprayoon Panumate, Hiroyuki Iida
:
Finding Comfortable Settings of Snake Game Using Game Refinement Measurement. 66-73 - Seong-Min Park, Han-Chul Bae, Young Tae Cha, Hwankuk Kim
:
Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection Technology. 74-80 - Shih-Yun Huang, Hsin-Hung Cho, Yu-Zen Wang, Timothy K. Shih, Han-Chieh Chao:
Initialization of Software Defined Wireless Bacteria-Inspired Network Platform. 81-86 - Yuan Zhou
, Hongbiao Gao, Jingde Cheng:
An Extension of QSL for E-voting Systems. 87-96 - Soojin Yoon, Hyun Lock Choo, Hanchul Bae, Hwankuk Kim:
Behavior-Based Detection for Malicious Script-Based Attack. 97-103 - Guang-Ho Cha:
The SP-tree: A Clustered Index Structure for Efficient Sequential Access. 104-110 - Jaeho Lee, Bong-Ki Son:
An Address Conflict Resolving Scheme of Inter-drone Ad Hoc Communications for Hide Densely Deployed Low Power Wide Area Networks. 111-116 - Donggyu Kim, Unil Yun:
State-of-the-Art Algorithms for Mining Up-to-Date High Average-Utility Patterns. 117-121 - Unil Yun, Heungmo Ryang:
Design of Shoot'em up Game Using OpenGL. 122-126 - Heungmo Ryang, Unil Yun:
Performance Analysis of Tree-Based Algorithms for Incremental High Utility Pattern Mining. 127-131 - Wooseong Jeong, Unil Yun:
Development of 2D Side-Scrolling Running Game Using the Unity 3D Game Engine. 132-136 - Bong-Ki Son, Jaeho Lee:
EPD Noticeboard for Posting Multiple Information. 137-142 - Lionel Nkenyereye
, Jong-Wook Jang
:
Design of Processing Model for Connected Car Data Using Big Data Technology. 143-148 - Dae-Young Kim, Seokhoon Kim
:
Efficient Path Selection for IoT Devices in Heterogeneous Service Environments. 149-153 - Supawadee Srikamdee, Sunisa Rimcharoen
, Nutthanon Leelathakul:
Forecasting Sugarcane Yield Using (μ+λ) Adaptive Evolution Strategies. 154-159 - Seok-Hyeon Han, Hyun-Woo Kim, Young-Sik Jeong:
Resource Pooling Mechanism for Mobile Cloud Computing Service. 160-165 - Sora Lim, Yongjin Kwon:
IPC Multi-label Classification Applying the Characteristics of Patent Documents. 166-172 - Euihyun Jung:
A Comparison of Data Mining Methods in Analyzing Educational Data. 173-178 - Tao Zhang, Zhilong Wang:
A New Secure Android Model Based on Privilege. 179-184 - Byeong-Seok Park, Yoon-A. Heo, Young-Sik Jeong:
Survey of MCC Architectures for Computing Service. 185-191 - Chui Young Yoon:
Measurement of Enterprise Smart Business Capability in a Global Management Environment. 192-197 - Sangyoon Kim, Moonhyun Kim:
Occluded Pedestrian Classification Using Gradient Patch and Convolutional Neural Networks. 198-204 - Sang-Hyeon Park, Jeong-Ho Kim, Moon-Seog Jun:
A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment. 205-210 - Jae Seung Lee, Jaehwa Chung, Sangkee Suk:
A Design of Certificateless-Based Device Authentication Scheme in the SmartHome Environment. 211-214 - Geunil Park, Bumryong Kim
, Moon-Seog Jun:
A Design of Secure Authentication Method Using Zero Knowledge Proof in Smart-Home Environment. 215-220 - Mansik Kim, Hyungjoo Kim, Jungho Kang, Jaesoo Kim:
Drone Classification by Available Control Distances. 221-223 - Hague-Chung, Keun-Chang Choi, Moon-Seog Jun:
A Design of Key Agreement Scheme Between Lightweight Devices in IoT Environment. 224-229 - Tai-Yeon Ku, Hee-Sun Won, Hoon Choi
:
Platform Independent Workflow Mechanism for Bigdata Analytics. 230-235 - Hua Li, Huamin Yang, Chao Xu, Yuling Cao:
Water Surface Simulation Based on Perlin Noise and Secondary Distorted Textures. 236-245 - Mai Thanh Nhat Truong
, Sanghoon Kim:
Optimization for Particle Filter-Based Object Tracking in Embedded Systems Using Parallel Programming. 246-252 - Chao Li, Lili Guo, Zheng Dou, Guangzhen Si, Chunmei Li:
Generalized Multi-linear Mixed Effects Model. 253-258 - Qingsong Feng, Zheng Dou, Chunmei Li, Guangzhen Si:
Anomaly Detection of Spectrum in Wireless Communication via Deep Autoencoder. 259-265 - Zheng Dou, Zi Xiao, Yang Zhao, Jinyu Wang:
A Modified Complex ICA for Blind Source Separation and the Application in Communication Reconnaissance. 266-272 - JongBeom Lim, HeonChang Yu
, Joon-Min Gil:
Sensor Coverage Problem in Sparse MANET Environments. 273-278 - Dong-Wan Joe, Jae-Sung Shim, Yong-Wan Ju, Seok-Cheon Park:
Design of Jitter Buffer Control Algorithm for Guaranteeing the Medical Information Data Transmission Quality in Wireless Network Environment. 279-284 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang
:
Student's-t Mixture Model Based Excepted Patch Log Likelihood Method for Image Denoising. 285-290 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang
:
Regularization Parameter Selection for Gaussian Mixture Model Based Image Denoising Method. 291-297 - Yuhui Zheng, Xiaozhou Zhou, Tong Li, Jin Wang
:
Restoration Method for Satellite Image Based on Content-Aware Reciprocal Cell Pool. 298-305 - Jianwei Zhang, Jing Liu, Yuhui Zheng, Jin Wang
:
Student's-t Mixture Model Based Image Denoising Method with Gradient Fidelity Term. 306-311 - Sai Ji, Zhen Wang, Qi Liu, Xiaodong Liu:
Classification Algorithms for Privacy Preserving in Data Mining: A Survey. 312-322 - Sai Ji, Dengzhi Liu, Jian Shen
:
Exploiting Group Signature to Implement User Authentication in Cloud Computing. 323-331 - Hao Wu, Fangpeng Chen, Hanfeng Hu, Qi Liu, Sai Ji:
A Secure System Framework for an Agricultural IoT Application. 332-341 - Sai Ji, Dengzhi Liu, Jian Shen
:
Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A Survey. 342-351 - Jin Wang
, Yiquan Cao, Jiayi Cao, Huan Ji, Xiaofeng Yu:
Energy-Balanced Unequal Clustering Routing Algorithm for Wireless Sensor Networks. 352-359 - Mi-Sun Kim, Green Bang, Il-Ju Ko:
The Agent Communication Simulation Based on the Ego State Model of Transactional Analysis. 360-365 - Doo-Soon Park, Seokhoon Kim
:
Design of Software Reliability Test Architecture for the Connected Car. 366-370 - Dae-Young Kim, Young-Sik Jeong, Seokhoon Kim
:
Network Activation Control According to Traffic Characteristics in Sensor Networks for IoT. 371-375 - Erik Miranda Lopez, Yoon Ho Kim, Jong Hyuk Park:
Data Mining Techniques to Facilitate Digital Forensics Investigations. 376-379 - Pradip Kumar Sharma
, Saurabh Singh, Jong Hyuk Park:
Solving Standard Cell Placement Problem Using Discrete Firefly Algorithm: A Nature Inspired Approach. 380-384 - Saurabh Singh, Pradip Kumar Sharma
, Jong Hyuk Park:
A Security Model for Protecting Virtualization in Cloud Computing. 385-388 - Wonhee Cho, Eunmi Choi:
Effective Pre-processing Methods with DTG Big Data by Using MapReduce Techniques. 389-395 - Seo Yeon Moon, Saurabh Singh, Jong Hyuk Park:
Security Requirements and Countermeasures for Secure Home Network in Internet of Things. 396-400 - Hye-Yeon Yu, Young-Nam Kim, Moon-Hyun Kim:
Machine Learning for Trajectory Generation of Multiple-pedestrians. 401-406 - Md. Zia Uddin
, Mi Ryang Kim:
A Deep Learning-Based Gait Posture Recognition from Depth Information for Smart Home Applications. 407-413 - Ji Yeon Lee, Kuk Won Ko, Sangjoon Lee:
Implementation of an Image Restoration with Block Iteration Method for Spatially Variant Blur Models. 414-420 - Hua Li, Yuling Cao, Xin Feng:
Analysis of Hard Shadow Anti-aliasing. 421-429 - Gyujin Jang, Jinhee Park, Moonhyun Kim:
Cascade-Adaboost for Pedestrian Detection Using HOG and Combined Features. 430-435 - Kangho Kim, Kwangwon Koh, Seung-Hyub Jeon, Sungin Jung:
Portable Hypervisor Design for Commercial 64-Bit Android Devices Supporting 32-Bit Compatible Mode. 436-441 - Samuel Sangkon Lee:
Concept-Based Compound Keyword Extraction Based on Using Sentential Distance, Conceptual Distance and Production Rules: Calculation of the Keyword Importance. 442-448 - Lili He, Hongtao Bai, Jin Wang, Yu Jiang, Tonglin Li:
Coarse-Grained 2.5-D CSAMT Parallel Inversion Method Based on Multi-core CPU. 449-455 - Jin Wang
, Yiquan Cao, Jiayi Cao, Huan Ji, Xiaofeng Yu:
Virtual Force and Glowworm Swarm Optimization Based Node Deployment Strategy for WSNs. 456-462 - Yu Jiang, Lili He, Yan Gao, Kai Wang, Chengquan Hu:
Comparison with Recommendation Algorithm Based on Random Forest Model. 463-470 - Xue Wang
, Lili He, Hongtao Bai:
Risk Factors and the Difference Among Hypertension, Diabetes and Heart Disease. 471-476 - Hongtao Bai, Lili He, Yu Jiang, Jin Wang, Shanshan Jiang:
Linear Programming Computation Model Based on DPVM. 477-483 - Yun-Seok Lee, Eun Kim, Sungyun Kim, Seokhoon Kim
:
A Study on the Effective Communication Protocol of the Surface Inspection Rail Robot that it can be a Self-checking. 484-489 - Sung-Hwa Hong, Joon-Min Gil:
The Efficient Multimedia Transmission Services for the E-learning System with Sensor. 490-496 - Mi Kim, Jin Ho Park, Nam Yong Lee:
A Quality Model for IoT Service. 497-504 - Joon Ho Park, Nam Yong Lee, Jin Ho Park:
An Empirical Study of Risk Factors for the Development Methodology for Small-Size IT Projects. 505-510 - Jaeho Lee:
Nack-Based Broadcast Mechanism for Isochronous Audio Stream Transmission Using Bluetooth Low Energy. 511-516 - Seul-Ah Shin, Ji-Soo Choi, Young-Jong Kim
, Nam-Yong Lee, Jin-Ho Park:
Empirical Study on IoT-Learning for the Rehabilitation Treatment of Chronic Low Back Pain Patients. 517-524 - Joong-Yeon Lee, In-Taek Oh, Nam-Yong Lee, Jin-Ho Park:
A Theoretical Study of Hardware Architecture for Network Security Server. 525-530 - In-Taek Oh, Joong-Yeon Lee, Jae-Yoon Cheon, Nam-Yong Lee, Jin-Ho Park:
An Empirical Study of the Relationship Between DISC Behavioral Style of Application Programmer and Quality of Software Development. 531-539
Advances in Computer Science and Ubiquitous Computing
- Park Sanggug:
The Development of COB Type LED Lighting System for High Temperature Machine Vision. 543-548 - Pyung Soo Kim
, Eung Hyuk Lee, Eung Tae Kim:
An Alternative Management Scheme of DHCP Lease Time for Internet of Things. 549-554 - Green Bang, IlJu Ko:
A User Empirical Context Model for a Smart Home Simulator. 555-560 - Bokyung Sung, Ilju Ko:
Co-display Content Service for First-Person Videos of Smart Glass. 561-566 - Ju-Sung Kang, Hojoong Park, Yongjin Yeom
:
Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing Attack. 567-572 - Bongjae Kim
, Jeong-Dong Kim:
Dynamic QoS Scheme for InfiniBand-Based Clusters. 573-578 - Dong-Hee Kim, Soo-Hwan Lee, Won-Sik Doo, Sang-il Ahn, Tai-Myoung Chung:
Applying PE-Miner Framework to Software Defined Network Quarantine. 579-584 - Saad Allawi Nsaif, Jong Myung Rhee:
A Novel Method for Eliminating Duplicated Frames in Ethernet Standard (IEEE 802.3) Networks. 585-593 - Soo-Hwan Lee, Myeong-Uk Song, Jun-Kwon Jung, Tai-Myoung Chung:
A Study of Malicious Code Classification System Using MinHash in Network Quarantine Using SDN. 594-599 - Ganjar Alfian
, Jaeho Lee
, Hyejung Ahn, Jongtae Rhee:
Application of RFID and Computer Vision for the Inventory Management System. 600-606 - Ji-Hyen Choi, Jong-Won Choe, Yong-Ik Yoon:
Prediction Method for Suspicious Behavior Based on Omni-View Model. 607-612 - Jiyoung Park, Hwa Seon Shin:
Optimal 3D Printing Direction for Stability of Slanted Shapes. 613-618 - Jung-Hoon Oh, Moon-Ki Back, Gil-Tak Oh, Kyu-Chul Lee:
A Study on DDS-Based BLE Profile Adaptor for Solving BLE Data Heterogeneity in Internet of Things. 619-624 - Ki-Hyun Lee, Young B. Park:
A Study of Environment-Adaptive Intrusion Detection System. 625-630 - Dong-Su Koo, Young B. Park:
OFART: OpenFlow-Switch Adaptive Random Testing. 631-636 - Kihong Han, Tuan Anh Nguyen
, Dugki Min, Eunmi Choi:
An Evaluation of Availability, Reliability and Power Consumption for a SDN Infrastructure Using Stochastic Reward Net. 637-648 - Euihyun Jung:
A Dynamic Service Binding Scheme with Service OID for IoT. 649-653 - Doohwan Kim, Soon-Kyeom Kim, Woosung Jung, Jang-Eui Hong:
A Context-Aware Architecture Pattern to Enhance the Flexibility of Software Artifacts Reuse. 654-659 - Jae Sung Choi, Hyun Lee:
Deep Analysis of Tag Interference by Tag to Tag Relative Angles with Passive Far Field UHF RFID System. 660-664 - In-Jae Jo, Joohun Lee, Yoo-Joo Choi:
Simple Method of Video Mapping of Multiple Targets. 665-673 - Seungchan Back, Hyorin Choi, Jung-Won Lee, Byungjeong Lee:
Evolutionary Test Case Generation from UML-Diagram with Concurrency. 674-679 - Jung-Hoon Shin, Mesfin Abebe, Cheol-Jung Yoo, Suntae Kim, Jeong-Hyu Lee, Hee-Kyung Yoo:
Evaluating the Effectiveness of the Vector Space Retrieval Model Indexing. 680-685 - Sangjin Hong, Nammee Moon:
Active Tracking Strategy with Multiple Cameras in Large Areas. 686-693 - Yeongpil Cho, Yunheung Paek, Ejaz Ahmed, Kwangman Ko:
A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It's Applications. 694-698 - JinSoo Park, Dong Hag Choi, You-Boo Jeon, Se Dong Min, Doo-Soon Park:
Network Anomaly Detection Based on Probabilistic Analysis. 699-704 - Bo-Ram Kim, Man-Soo Chung, Yong-Ik Yoon:
Hedonic Model Study for Retargeting Advertising Based on Space-Centered Internet of Things. 705-711 - Jae Sung Choi, Moon Jong Choi, Jung-Min Lee, Hyun Lee:
A New Automated Cell Counting Program by Using Hough Transform-Based Double Edge. 712-716 - Euiri An, Kyungrak Lee, Jaewon Lee, Inwhee Joe:
An Approach for Interworking Heterogeneous Networks with DTN and IP Routing in Space Internet. 717-722 - Jeong-Dong Kim, Bongjae Kim
, Jeong-Ho Park:
Implementation of Recommender System Based on Personalized Search Using Intimacy in SNS. 723-729 - Fei Hao
, Dae-Soo Sim, Doo-Soon Park:
Measuring Similarity Between Graphs Based on Formal Concept Analysis. 730-735 - Sangwon Hwang, Yongseok Lee, Youngkwang Nam:
TEXAS2: A System for Extracting Domain Topic Using Link Analysis and Searching for Relevant Features. 736-741 - DongBum Seo, Keun-Ho Lee, You-Boo Jeon:
Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT Environment. 742-749 - Kyung Yeul Kim, Yong Kim:
What Are Learning Satisfaction Factors in Flipped Learning? 750-755 - Myung In Kim, Yong Kim:
Development of UI Guideline for Senior Citizens' e-Learning Content. 756-761 - Junsu Kim
, Doo-Hee Jung
, Jeho Lee, Su Min Kim
:
Full Duplex Relaying with Buffer Based on Cognitive Radio Technique. 762-767 - Beck Jong-Hwan, Pak Myeong-Suk, Kim Sang-Hoon:
Design of Docking Drone System Using P-PID Flight Controller. 768-773 - Sun-Ho Yeom, Jung-Il Namgung, Soo Young Shin, Soo-Hyun Park:
Lightweight Security for Underwater IoT. 774-778 - Changseok Bae, Yuk Ying Chung, Jeun Woo Lee:
Image Based Video Querying Algorithm Using 3-Level Haar Wavelet Transform Features. 779-785 - Ji-Hye Bae, Hyun Lee:
Design and Implementation of the Mobile Learning App for Creative Problem Solving Activities. 786-792 - Ji-Hye Bae, In-Hwan Kim, Yong-Tae Jeon, Hyun Lee:
IoT-Based Smart Photo Frame. 793-798 - Yong-Hwan Kim, Buseung Cho, Dongkyun Kim:
A Fast Algorithm for Generating Virtual Dedicate Network Based on Software-Defined Wide Area Network. 799-805 - Noo-Ri Kim, YunSeok Choi