


default search action
MUE/FutureTech 2018: Salerno, Italy
- James J. Park, Vincenzo Loia, Kim-Kwang Raymond Choo, Gangman Yi:

Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2018, Salerno, Italy, 23-25 April 2018. Lecture Notes in Electrical Engineering 518, Springer 2019, ISBN 978-981-13-1327-1 - Ales Berger

, Blanka Klímová:
Mobile Application for the Teaching of English. 1-6 - Blanka Klímová, Zuzana Bouckova, Josef Toman:

Mobile Phone Apps as Support Tools for People with Dementia. 7-12 - Petra Poulova, Blanka Klímová:

Optimization of Running a Personal Assistance Center - A Czech Case Study. 13-19 - Petra Poulova, Blanka Klímová, Jaroslava Mikulecká:

Data Science - A Future Educational Potential. 21-27 - Nawaf Alharbe

:
Load Predicting Algorithm Based on Improved Growing Self-organized Map. 29-39 - Jong-Won Ko, Seung-Hyuck Choi:

Superpixel Based ImageCut Using Object Detection. 41-47 - Ruizhi Wu

, Guangchun Luo, Qing Cai, Chunyu Wang:
Anomaly Detection via Trajectory Representation. 49-56 - Jong-Won Ko, Dong-Hyun Hwang:

Towards Unified Deep Learning Model for NSFW Image and Video Captioning. 57-63 - Lizong Zhang, Yinying Xie, Aiguo Chen

, Guiduo Duan:
A Forecasting Model Based on Enhanced Elman Neural Network for Air Quality Prediction. 65-74 - Jeong Ah Kim, JinSeok Yang:

Practice of Hybrid Approach to Develop State-Based Control Embedded Software Product Line. 75-82 - Aiguo Chen

, Yuanfan Chen, Guoming Lu, Lizong Zhang, Jiacheng Luo:
An Anomaly Detection Algorithm for Spatiotemporal Data Based on Attribute Correlation. 83-89 - Kaiyang Li, Guangchun Luo, Huaigu Wu, Chunyu Wang:

Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach. 91-100 - Chui Young Yoon:

Measurement of Firm E-business Capability to Manage and Improve Its E-business Applications. 101-107 - Ayesha Anzer, Mourad Elhadef

:
Deep Learning-Based Intrusion Detection Systems for Intelligent Vehicular Ad Hoc Networks. 109-116 - Sarah Hasan, Mourad Elhadef

:
A Citywide Distributed inVANETs-Based Protocol for Managing Traffic. 117-124 - Ling Tian, Chengzong Peng, Yimin Zhou, Hongyu Wang:

Quantization Parameter and Lagrange Multiplier Determination for Virtual Reality 360 Video Source Coding. 125-136 - Jae-Ho Choi, KyoungHwa Do:

GFramework: Implementation of the Gamification Framework for Web Applications. 137-143 - Soon-Ho Kim, Chi-Su Kim:

Verification of Stop-Motion Method Allowing the Shortest Moving Time in (sRd-Camera-pRd) Type. 145-151 - Guoming Lu, Jiaxin Li, Jian Chen, Aiguo Chen

, Jianbin Gu, Ruiting Pang:
A Long-Term Highway Traffic Flow Prediction Method for Holiday. 153-159 - Mohammed AbuTaha, Safwan El Assad, Audrey Queudet:

Parallel Generator of Discrete Chaotic Sequences Using Multi-threading Approach. 161-167 - Jeongcheol Lee, Sunil Ahn, Jaesung Kim, Sik Lee, Kumwon Cho:

Machine Learning Based Materials Properties Prediction Platform for Fast Discovery of Advanced Materials. 169-175 - Seungmin Kim, Moonwon Choi, Wooyeob Lee, Donguk Gye, Inwhee Joe:

A Secure Group Management Scheme for Join/Leave Procedures of UAV Squadrons. 177-183 - Jaesung Kim, Sunil Ahn, Jeongcheol Lee, Sik Lee, Kumwon Cho:

View Designer: Building Extensible and Customizable Presentation for Various Scientific Data. 185-191 - Wei Song, Shuanghui Zou, Yifei Tian, Simon Fong

:
A GPU-Based Training of BP Neural Network for Healthcare Data Analysis. 193-198 - Ying Jia:

Online Data Flow Prediction Using Generalized Inverse Based Extreme Learning Machine. 199-206 - Sunkyung Kim, JiSu Park, Kang Hyoun Kim, Jin Gon Shon

:
A Test Data Generation for Performance Testing in Massive Data Processing Systems. 207-213 - Seung Yong Choi, Jeong Ah Kim, Yeonghwa Cho:

A Study on the Variability Analysis Method with Cases for Process Tailoring. 215-220 - Karim Hammoudi, Mahmoud Melkemi, Fadi Dornaika

, Halim Benhabiles
, Féryal Windal, Oussama Taoufik:
A Comparative Study of 2 Resolution-Level LBP Descriptors and Compact Versions for Visual Analysis. 221-227 - Mengti Liang, Baocheng Wang, Chen Li, Linda Markowsky, Hui Zhou:

Local Feature Based CNN for Face Recognition. 229-235 - Xingquan Cai, Yuxin Tu, Xin He:

An Interactive Augmented Reality System Based on LeapMotion and Metaio. 237-244 - Chunyong Yin, Hongyi Wang, Jin Wang

:
Network Data Stream Classification by Deep Packet Inspection and Machine Learning. 245-251 - Chunyong Yin, Lingfeng Shi, Jin Wang

:
Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy Protection. 253-258 - Chunyong Yin, Shilei Ding, Jin Wang

:
Improved Personalized Recommendation Method Based on Preference-Aware and Time Factor. 259-265 - Youding Fan, Jiao Yao, Yuhui Zheng, Jin Wang

:
A Multi-objective Signal Transition Optimization Model for Urban Transportation Emergency Rescue. 267-273 - Tianyu Wang, Jiao Yao, Yuhui Zheng, Jin Wang

:
Modeling Analysis on the Influencing Factors of Taxi Driver's Illegal Behavior in Metropolis. 275-281 - Chenpeng Li, Jiao Yao, Yuhui Zheng, Jin Wang

:
Evaluation of Passenger Service Quality in Urban Rail Transit: Case Study in Shanghai. 283-289 - Weiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang

:
Research on the Mechanism of Value Creation and Capture Process for Mass Rail Transit Development. 291-297 - Weiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang

:
Transport Related Policies for Regional Balance in China. 299-305 - Weiwei Liu, Qian Wang, Yuhui Zheng, Jin Wang

:
Transportation Systems Damage and Emergency Recovery Based on SD Mechanism. 307-313 - Yihe Yang, Jin Liu

, Yunlu Liaozheng:
Chinese Question Classification Based on Deep Learning. 315-320 - Xiaohu Tian, Jin Liu

, Jiachen Pu, Jin Wang
:
A Domain Adaptation Method for Neural Machine Translation. 321-326 - Minjie Liu, Jin Liu

, Haoliang Ren:
Natural Answer Generation with QA Pairs Using Sequence to Sequence Model. 327-332 - Wedad Ahmed, Mourad Elhadef

:
DoS Attacks and Countermeasures in VANETs. 333-341 - Iman Saeed, Mourad Elhadef

:
A Distributed inVANETs-Based Intersection Traffic Control Algorithm. 343-351 - Juyoung Kim, Kwantae Cho, Yong-Kyun Kim, Kyung-Soo Lim, Sang Uk Shin:

A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange. 353-358 - Juyoung Kim, Kwantae Cho, Sang Uk Shin:

A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram. 359-365 - Phyoung Jung Kim, Sung Woong Hong:

Design of Readability Improvement Control System for Electric Signboard Based on Brightness Adjustment. 367-373 - Se-Hoon Jung, Won-Ho So, Kang-Soo You, Chun-Bo Sim:

A Novel on Altered K-Means Algorithm for Clustering Cost Decrease of Non-labeling Big-Data. 375-381 - Joongyong Choi, Seong-Il Jin:

Security Threats in Connected Car Environment and Proposal of In-Vehicle Infotainment-Based Access Control Mechanism. 383-388 - Lionel Nkenyereye

, Jong-Wook Jang:
Software Defined Cloud-Based Vehicular Framework for Lowering the Barriers of Applications of Cloud-Based Vehicular Network. 389-395 - Ki Woo Chun, Haedo Kim, Keonsoo Lee:

A Study on Research Trends of Technologies for Industry 4.0; 3D Printing, Artificial Intelligence, Big Data, Cloud Computing, and Internet of Things. 397-403 - Seungyong Park, Kwangki Ryoo:

Hardware Design of HEVC In-Loop Filter for Ultra-HD Video Encoding. 405-409 - Dennis Agyemanh Nana Gookyi

, Kwangki Ryoo:
Design of Cryptographic Core for Protecting Low Cost IoT Devices. 411-416 - Alexander O. A. Antwi, Kwangki Ryoo:

Efficient Integrated Circuit Design for High Throughput AES. 417-422 - Guard Kanda, Alexander O. A. Antwi, Kwangki Ryoo:

Hardware Architecture Design of AES Cryptosystem with 163-Bit Elliptic Curve. 423-429 - Richard Boateng Nti

, Kwangki Ryoo:
Area-Efficient Design of Modular Exponentiation Using Montgomery Multiplier for RSA Cryptosystem. 431-437 - Inhan Hwang, Kwangki Ryoo:

Efficient Hardware Architecture Design of Adaptive Search Range for Video Encoding. 439-443 - Won-hyun So, Ha-Kyun Kim:

Effect: Business Environment Factors on Business Strategy and Business Performance. 445-453 - Won-hyun So, Ha-Kyun Kim:

Economic Aspect: Corporate Social Responsibility and Its Effect on the Social Environment and Corporate Value. 455-462 - Won-geun So, Ha-Kyun Kim:

Effect: Information Welfare Policies on the Activation of Information Welfare and Information Satisfaction. 463-470 - Taewoo Kim, Sunyi Park, Jeongmo Yeo:

Study on the Design Process of Screen Using a Prototype Method. 471-478 - Sunyi Park, Taewoo Kim, Jeongmo Yeo:

Study on the Business Process Procedure Based on the Analysis of Requirements. 479-486 - Jeong-Min Lee, Jun-Ho Huh

, Hyun-Suk Kim
:
A Study on the Harmony of Music and TV Lighting Through Music Analysis. 487-495 - Kyeongseok Park, Sungkuk Kim, Sojeong Lee, Jun Lee

, Kyoung-Sook Kim, So-Young Hwang:
Mobile Atmospheric Quality Measurement and Monitoring System. 497-503 - Donghui Yu, Soyoung Hwang:

Design of Simulator for Time Comparison and Synchronization Method Between Ground Clock and Onboard Clock. 505-510 - Sooyoung Jung, Jun-Ho Huh

:
A Design of Demand Response Energy Optimization System for Micro Grid. 511-516 - Sooyoung Jung, Jun-Ho Huh

:
Demand Response Resource Energy Optimization System for Residential Buildings: Smart Grid Approach. 517-522 - Bok Gi Min, JiSu Park, Hyoung Geun Kim, Jin Gon Shon

:
Improvement of Multi-Chain PEGASIS Using Relative Distance. 523-529 - Hyun Cheon Hwang

, JiSu Park, Byeong Rae Lee, Jin Gon Shon
:
The Design and Implementation of an Enhanced Document Archive System Based on PDF. 531-537 - Won-Bin Kim, Im-Yeong Lee:

Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment. 539-545 - Aveen Muhamad, Mourad Elhadef

:
Sybil Attacks in Intelligent Vehicular Ad Hoc Networks: A Review. 547-555 - De Li, XianLong Dai

, Liang Chen, Lihua Cui:
A Zero-Watermarking Algorithm Based on Visual Cryptography and Matrix Norm in Order to Withstand Printing and Scanning. 557-563 - De Li, Shan Yang, YiAn Zuo, ZhiXun Zheng, Lihua Cui:

Animation Zero Watermarking Algorithm Based on Edge Feature. 565-571 - Haiqing Tan, Lei Zhang:

Separate Human Activity Recognition Model Based on Recognition-Weighted kNN Algorithm. 573-581 - Fei Hao

, Liang Wang, Yifei Sun, Doo-Soon Park:
Detecting (k, r)-Clique Communities from Social Networks. 583-590 - Seung-Su Yang, Hyung-Joon Kim, Seok-Cheon Park:

Design of Competency Evaluation System Using Type Matching Algorithm. 591-597 - Young-Hwan Jang, Hyung-Joon Kim, Seok-Cheon Park:

Design of Social Content Recommendation System Based on Influential Ranking Algorithm. 599-605 - Min-Hyung Park, Hyung-Joon Kim, Seok-Cheon Park:

Index Design for Efficient Ontological Data Management. 607-613 - Jinah Kim, Nammee Moon:

The Analysis of Consumption Behavior Pattern Cluster that Reflects Both On-Offline by Region. 615-622 - Dayou Jiang

, Jongweon Kim:
A Scene Change Detection Framework Based on Deep Learning and Image Matching. 623-629 - Shin Hyung Park, Shin Hyoung Park, Oh Hoon Kwon:

K-Means and CRP-Based Characteristic Investigating Method of Traffic Accidents with Automated Speed Enforcement Cameras. 631-637 - Ning Wang, Yanyan Tan, Shuyang Guo:

A Uniformed Evidence Process Model for Big Data Forensic Analysis. 639-645 - Zhihao Yuan, Hao Li, Xian Li:

Evidence Collection Agent Model Design for Big Data Forensic Analysis. 647-653 - Gioele Ciaparrone

, Angela Serra, Vito Covito, Paolo Finelli, Carlo Alberto Scarpato, Roberto Tagliaferri
:
A Deep Learning Approach for Road Damage Classification. 655-661 - Angelo Gaeta

, Francesco Orciuoli, Mimmo Parente, Minjuan Wang
:
A Framework for Situated Learning Scenarios Based on Learning Cells and Augmented Reality. 663-669 - Carmen De Maio, Stefania Boffa:

Discovery of Interesting Users in Twitter by Using Rough Sets. 671-677 - Sandi Rahmadika, Kyung-Hyune Rhee:

Preliminary of Selfish Mining Strategy on the Decentralized Model of Personal Health Information. 679-685 - Si-Wan Noh, Youngho Park, Kyung-Hyune Rhee:

A Blockchain-Based Access Control with Micropayment Channels. 687-692 - Byung Wook Kwon, Jungho Kang, Jong Hyuk Park:

A Fog Computing-Based Automotive Data Overload Protection System with Real-Time Analysis. 693-696 - Youngsoo Kim

, Jungtae Kim, Jonghyun Kim:
Intelligent Security Event Threat Ticket Management System on Secure Cloud Security Infrastructures Being Able to Dynamic Reconfiguration. 697-703 - Sokjoon Lee

, Byung-Ho Chung, Joongyong Choi, Hyeokchan Kwon:
Design and Implementation on the Access Control Scheme Against V2N Connected Car Attacks. 705-710 - Sokjoon Lee

, Hwajeong Seo, Byungho Chunng, Joongyong Choi, Hyeokchan Kwon, Hyunsoo Yoon:
OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication. 711-716 - Ying Yuan, Jun-Ho Huh

:
Developing Participatory Clothing Shopping Platform for Customer's Participation in Design. 717-723 - Ying Yuan, Jun-Ho Huh

:
Cloth Size Coding and Size Recommendation System Applicable for Personal Size Automatic Extraction and Cloth Shopping Mall. 725-731 - Ying Yuan, Jun-Ho Huh

, Myung-Ja Park:
Definition of Digital Printing Type Cloth Pattern Drawing for Mass Customizing. 733-739 - Ying Yuan, Jun-Ho Huh

:
A Case Study Analysis of Clothing Shopping Mall for Customer Design Participation Service and Development of Customer Editing User Interface with Solutions for Picture Works Copyright. 741-746 - Ying Yuan, Jun-Ho Huh

:
Development of Customer Design Responsive Automation Design Pattern Setting System. 747-753 - Ying Yuan, Jun-Ho Huh

, Myung-Ja Park:
A Development of Automation Position Processing Process and Pattern Grouping Technology Per Size for Automation Printing Pattern Image Generation. 755-761 - Emanuela Mattia Cafaro, Pietro Luise, Raffaele D'Alessio, Valerio Antonelli:

A Big Data Application in Renewable Energy Domain: The Wind Plant Case Contributions to MUE Proceedings. 763-771 - Seong-Kyu Kim, Jun-Ho Huh

:
A Study on the RFID and 2D Barcode, and NFC and Performance Improvement. 773-779 - Seong-Kyu Kim, Jun-Ho Huh

:
A Study on the LMS Platform Performance and Performance Improvement of K-MOOCs Platform from Learner's Perspective. 781-786 - Seong-Kyu Kim, Jun-Ho Huh

:
A Study on the Security Performance Improvement in BoT Perspective in Order to Overcome Security Weaknesses of IoT Devices. 787-792 - Seong-Kyu Kim, Jun-Ho Huh

:
A Study on the Rainbowchain Certificate in Order to Overcome Existing Certification System. 793-798 - Nak-Hwe Kim, Jun-Ho Huh

:
A Study on the Method of Propelling by Analyzing the Form of Bird's Movement. 799-804 - Nak-Hwe Kim, Jun-Ho Huh

:
A Method of Propelling with Many Whirlpools Used by Inland Birds. 805-810 - Nak-Hwe Kim, Jun-Ho Huh

:
Designing 3D Propeller by Applying Bird's Wing and Making a Test Product. 811-817 - Nak-Hwe Kim, Jun-Ho Huh

:
A Study on the Bumps at the Leading Edge of the Wing Used by Hovering Birds. 819-824 - Jun-Ho Huh

, Kyungryong Seo:
Artificial Intelligence Shoe Cabinet Using Deep Learning for Smart Home. 825-834 - Min Ji Kang, Oh Hoon Kwon, Shin Hyoung Park

:
Development of a Crash Risk Prediction Model Using the k-Nearest Neighbor Algorithm. 835-840 - Yong Woo Park, Oh Hoon Kwon, Shin Hyoung Park

:
Traffic Big Data Analysis for the Effect Evaluation of a Transportation Management Plan. 841-847 - Jeyoun Dong, Myunghwan Byun:

Enhanced Usability Assessment on User Satisfaction with Multiple Devices. 849-853 - Seungchul Kim, Mu He, Hyun-Woo Kim, Young-Sik Jeong:

Rapid Parallel Transcoding Scheme for Providing Multiple-Format of a Single Multimedia. 855-861 - Cheol Shim, Min Choi:

Design and Development of Android Application and Power Module for AWS Cloud like HPC Servers. 863-869 - Injun Ohk, Min Choi:

Development of Working History Monitoring and Electronic Approval on Android. 871-878 - Oh Hoon Kwon, Yongjin Park, Shin Hyoung Park

:
Density-Based Clustering Methodology for Estimating Fuel Consumption of Intracity Bus by Using DTG Data. 879-885

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














