


default search action
MUE/FutureTech 2017: Seoul, Korea
- James Jong Hyuk Park, Shu-Ching Chen, Kim-Kwang Raymond Choo:

Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2017, Seoul, Korea, 22-24 May 2017. Lecture Notes in Electrical Engineering 448, 2017, ISBN 978-981-10-5040-4 - Pramote Kuacharoen:

Single Password Authentication Protocol. 1-6 - Yi-Yen Chen, Yu-Chee Tseng, Jyh-Cheng Chen:

Performance Analysis of Congestion Control for Massive MTC Networks. 7-11 - Agata Niescieruk, Bogdan Ksiezopolski

, Radoslaw Nielek, Adam Wierzbicki
:
How to Train People to Increase Their Security Awareness in IT. 12-17 - Jae-Yun Jeong, Jae Woong Jeong:

Advanced Data Communication Framework for Cloud Computing from CDMI. 18-23 - Min-Gyu Shim, Jae Woong Jeong:

A Study of AI Based E-learning System and Application. 24-30 - Junhak Lee, Jae Woong Jeong:

A Study on the Serious Issues in the Practice of Information Security in IT: With a Focus on Ransomware. 31-36 - Hyeonsang Hwang, Daejune Ko, Mincheol Whang, Eui Chul Lee:

Mobile App for Analyzing Environmental Visual Parameters with Life Logging Camera. 37-42 - Yosep Park, Unsoo Jang, Jiwon Im, Woohyuk Jang, Daejune Ko, Eui Chul Lee:

Fake Fingerprint Detection Based on Statistical Moments. 43-48 - Hyeok Kim, Jeonghoon Kwak, Guichang Sim, Yunsick Sung:

Path Planning Method for Collision Avoidance of Multiple UAVs. 49-55 - Guichang Sim, Jaehwa Chung, Yunsick Sung:

3D UAV Flying Path Optimization Method Based on the Douglas-Peucker Algorithm. 56-60 - Jihoon Yoon, Kangsik Shin, Yoojae Won

:
Encrypted Network Traffic Analysis Method via Secure Socket Layer Handshake Control. 61-66 - Manki Baek, Youngkyung Lee, Yoojae Won

:
Property Analysis of SMS Spam Using Text Mining. 67-73 - JunHee Kim, MinSeok Sohn, Yoojae Won

:
An Automatic Patch Management System with Improved Security. 74-80 - Wonjin Jung, HyungRok Yim:

An Empirical Study on the Relationship Between User Interface Design Attributes in Smartphone Applications and Intention to Use. 81-84 - Naeun Lim, Daejune Ko, Kun Ha Suh, Eui Chul Lee:

Thumb Biometric Using Scale Invariant Feature Transform. 85-90 - Min-Woo Park, Daejune Ko, Hyeonsang Hwang, Jiyeon Moon, Eui Chul Lee:

Image Classification Using Color and Spatial Frequency in Terms of Human Emotion. 91-96 - Jae Hyun Han, Woohyuk Jang, Dojoon Jung, Eui Chul Lee:

Human Robot Interaction Method by Using Hand Gesture Recognition. 97-102 - Jeonghoon Kwak, Yunsick Sung:

A Beacon-Based User Direction Estimating Method in Indoor Environments. 103-108 - Hanju Park, Sukho Lee:

User Selection Based Backpropagation for Siamese Neural Networks in Visual Filters. 109-115 - Sung Jun Park:

Methodological Route to Designing Optimized Bedroom Environment for Active-Aging. 116-121 - Myunghwan Byun:

Grayscale and Halftone Gel Lithography as Promising Techniques for Swelling-Induced Deformation of Smart Polymer Hydrogel Films. 122-125 - Jeyoun Dong, Myunghwan Byun:

Methodology for Improving Usability Model of Multiple Devices. 126-129 - Chunho Chang, Sangyoung Shin:

Development of SMART Base Isolation Using Linear Motion Guide. 130-133 - Oh Hoon Kwon, Je Jin Park

, Shin Hyoung Park
:
Analysis on Work Zone Characteristics in South Korean Expressways Using Text Mining Technique. 134-139 - Chunho Chang, Sung Jig Kim, Shin Hyoung Park

:
Seismic Performance Evaluation of a Prestressed I-Type Girder Bridge in Daegu for ICT Based Disaster Management in Daegu Metropolitan City. 140-143 - Dong-Jun Shin, Minsang Kim, Wook Song, Se Dong Min, Min Hong:

Implementation of Sitting Posture Monitoring System with Kinect. 144-150 - Hoyeong Yun, Yongjoon Joe

, Byung-Ok Jung, Hyoguen Bang, Dongmyung Shin:
Solving the Subgraph Isomorphism Problem Using Harmony Search. 151-158 - Keonsoo Lee, Yunyoung Nam:

Persuading Recommendations Using Customized Content Curation. 159-163 - Viet-Ngu Huynh Cong, Kang-Woo Lee, In-Hak Joo, Oh-Heum Kwon, Ha-Joo Song:

Improving the Quality of an R-Tree Using the Map-Reduce Framework. 164-170 - Zamree Che-aron:

An Energy-Efficient and Reliable Routing Protocol for Cognitive Radio Sensor Networks. 171-180 - Se-Hoon Jung, Kyoung-Jong Kim, Eun-Cheon Lim, Chun-Bo Sim:

A Novel on Automatic K Value for Efficiency Improvement of K-means Clustering. 181-186 - Jeongmin An, Sangmoon Jung, Yoojae Won

:
Study on Integrity Verification and Compatibility-Conflict Analysis for Safe Patching. 187-192 - Dong-Su Koo, Young Bom Park:

OFART: OpenFlow-Switch Adaptive Random Testing. 193-198 - Jaegeun Oh, Chaeho Cho, Yoojae Won

:
Patch Alarm and Collecting System. 199-204 - Kisu Kim, Jongsoo Lee, Wonkang Jung:

Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices. 205-210 - Jong Won Lee, JiSu Park, Heung-Keun Kim, Jin Gon Shon

:
A Cluster Head Selection Method by Restricting Selection Area in Wireless Sensor Networks. 211-217 - Pyeong-Kang Kim, Hyung-Heon Kim, Tae-Woo Kim:

An Improved Pedestrian Detection System that Utilizes the HOG-UDP Algorithm. 218-225 - Onur Soyer, Kwan-Young Park, Nomota Hiongun Kim, Tae-soo Kim:

An Approach to Fast Protocol Information Retrieval from IoT Systems. 226-232 - Taeho Seo:

IoT Vulnerability Information Sharing System. 233-236 - Sarang Na, Taeeun Kim, Hwankuk Kim

:
A Study on the Service Identification of Internet-Connected Devices Using Common Platform Enumeration. 237-241 - Dae-il Jang, Taeeun Kim, Hwankuk Kim

:
A Design of IoT Protocol Fuzzer. 242-246 - Eunhye Ko, Taeeun Kim, Hwankuk Kim

:
A Study on the Management Structure of Vulnerability Information in IoT Environment. 247-251 - Yungee Lee, Wangkwang Lee, Giwon Shin, Kyungbaek Kim

:
Assessing the Impact of DoS Attacks on IoT Gateway. 252-257 - Youngsun Kong

, Hyeonsoo Lee, Namik Kim, Seungyeon Lee, Jihwan Park, Tae-Yang Han, Yunyoung Nam:
Low-Cost Infrared Video-Oculography for Measuring Rapid Eye Movements. 258-262 - Sangwook Han, MinSoo Chae, Hwa-Min Lee

:
VM Relocation Method for Increase the Resource Utilization in Cloud Computing. 263-268 - Seung-Kyu Park, Kwang-il Hwang, Hyo-Seong Kim, Byoung-Sup Shim:

Challenges and Experiment with LoRaWAN. 269-276 - Takefumi Hosoda, Hongsik J. Cheon:

Consumer's Behavioral System of Approach and Avoidance Investigating Generic Medicine Distribution and Logistics in Japan. 277-282 - Jae-Young Ahn, Eunjun Rhee, Hyun-Woo Lee, Dae-Joon Hwang:

Cross-Conforming Approaches of ICT Functionality Design for Smart City. 283-288 - Minju Son, Gyeongjae Gwon, Geunho Jeong, Jaeyoung Choi:

GUI-Based Korean Font Editing System Using Font Parameterization Technique. 289-295 - Wonhee Cho, Eunmi Choi:

Spatial Big Data Analysis System for Vehicle-Driving GPS Trajectory. 296-302 - Saurabh Singh, Pradip Kumar Sharma

, Seo Yeon Moon, Jong Hyuk Park:
i-SHSS: An IoT Based Smart Home Security System. 303-306 - Mohan Krishna Varma Nandimandalam

, Eunmi Choi:
The VM Weighted Filter Scheduling Algorithm for OpenStack Cloud. 307-313 - Hyo-Sun Yoon, Mi-Young Kim:

A Hierarchical Motion Estimation Based on the Properties of Motion Vectors for Low Complexity in Video Coding. 314-320 - Liang Chen, Xiao-ping Lei, Guancan Yang

, Jing Zhang:
Research on Method of Technological Evolution Analysis Based on HLDA. 321-330 - Guan-Can Yang

, Cheng Liang, Jing Zhang, Dao-Ren Wang, Hai-Chao Zhang:
A Mixture Record Linkage Approach for US Patent Inventor Disambiguation. 331-338 - Hongqi Han, Changqing Yao, Maoxiang Peng, Yongsheng Yu:

The LTC Framework for Competitive Analysis on Industrial Technology. 339-346 - Shuo Xu

, Yan Li, Zheng Wang:
Bayesian Multinomial Naïve Bayes Classifier to Text Classification. 347-352 - Yingjie Zhang, Na Qi:

CERIF: A Research Information Model for Electric Vehicles Decision Support System. 353-360 - Jin Baek Kwon:

On Bypassing Page Cache for Block Devices on Storage Class Memory. 361-366 - Hoang Huu Duc, Keechul Jung:

Applying Tensorflow with Convolutional Neural Networks to Train Data and Recognize National Flags. 367-373 - Wonjin Jung, HyungRok Yim:

An Empirical Study on the Effect of the Interpretability of Metaphors in UI on the Learnability of Mobile Apps. 374-378 - Moon-Hwan Kang, Min Yoon, Jae-Woo Chang:

A Density-Aware Data Encryption Scheme with Query Auditing Index for Secure Mobile Services. 379-385 - Yulong Qiao, Wei Xi:

A Kernel Density Estimation Model for Moving Object Detection. 386-392 - Fei Hao

, Doo-Soon Park, Zheng Pei:
Detecting Bases of Maximal Cliques in a Graph. 393-398 - Yoo-Jin Moon, Won Whee Cho, Jieun Oh, Jeong Mok Kim, Sang Yub Han, Kee Hwan Kim, Sungkap Cho:

Forecasting Cultivable Region-Specific Crops Based on Future Climate Change Utilizing Public Big Data. 399-404 - Young-Ho Hwang, Yoo-Jin Moon:

Statistical Analysis of Determinants of Intention to Use Virtual Reality Services and Moderating Effects. 405-411 - Dong-Min Shin, Yunjin Nam, Dongil Shin, Dongkyoo Shin:

Real-Time Human Depression Diagnosis System Using Brain Wave Analysis. 412-418 - Xiao-li Hao, Miao Tian:

Deep Belief Network Based on Double Weber Local Descriptor in Micro-expression Recognition. 419-425 - Aonan Zhai, Fei Xu, Haiqing Pan, Junzheng Shi, Gang Xiong

:
Design for Network File Forensics System Based on Approximate Matching. 426-431 - Jaehee Jung:

The Comparative Analysis of the Repeat Regions from the Assembled Contigs. 432-439 - Blanka Klímová:

Senior Tourism and Information and Communication Technologies. 440-445 - Blanka Klímová, Petra Maresová:

Wearable and Portable Monitoring Devices for Older People. 446-451 - Bayu Adhi Tama

, Kyung-Hyune Rhee:
A Novel Anomaly Detection Method in Wireless Network Using Multi-level Classifier Ensembles. 452-458 - Kwang-Sik Chung

:
Learning Reaction Analysis Engine for Interactive Digital Textbook Platform. 459-465 - Yunwan Jeon, Chanho Cho, Jongwoo Seo, Kyunglag Kwon, Hansaem Park, In-Jeong Chung:

Rule-Based Topic Trend Analysis by Using Data Mining Techniques. 466-473 - Daehui Jeong, Anit Thapaliya, Gihwon Kwon:

A Case Study of Hierarchical Safety Analysis for Eliciting Traceable Safety Requirements. 474-480 - Blanka Klímová, Petra Maresová, Ondrej Krejcar

:
Smart Home Technology and Energy Savings with a Special Focus on Europe. 481-486 - Petra Maresová, Jaroslav Kacetl:

Senior Citizens' Views of Using Medical Technologies - Case Study in Central Europe. 487-492 - Zhitong Su, Jun Lan, Wei Song, Simon Fong

, Yifei Tian:
Audiences Counting in Cinema by Detecting Occupied Chairs. 493-498 - Yeon-Woo Jang, Hyunjo Lee

, Jae-Woo Chang:
Efficient Distributed Index Structure and Encrypted Query Processing Scheme for Cloud Computing Environment. 499-505 - Hyunjo Lee

, Youngho Song, Jae-Woo Chang:
A Data Encryption Scheme Using Periodic Functions for Efficient Query Processing on Encrypted Data. 506-512 - Jeong Ah Kim, JinSeok Yang:

Software Product Line Lifecycle Management-Integration Engineering and Management Process. 513-520 - Yan Jiao, Wenyu Li

, Inwhee Joe:
OLSR Improvement with Link Live Time for FANETs. 521-527 - Miyoung Jang, Archana B. Lokhande, Naeun Baek, Jae-Woo Chang:

An Efficient Partition-Based Filtering for Similarity Joins on MapReduce Framework. 528-533 - JongMin Lee, Young B. Park:

A Study of Algorithm Replacement Mechanism for Environment Adaptive Load Balancer. 534-538 - Chen Li, Shuai Zhao, Ke Xiao, Yanjie Wang:

Face Recognition Based on Enhanced CSLBP. 539-544 - Jingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, Jingde Cheng:

A Supporting Environment for Formal Analysis of Cryptographic Protocols. 545-550 - Andrew D. Jun, Seokjoon Hong, Wooyeob Lee, Kyungrak Lee, Inwhee Joe, Kyeseon Lee, Tae-Joon Park:

Modeling and Simulation of LoRa in OPNET. 551-559 - Jihun Kim, Jonghee M. Youn:

Dynamic Analysis Bypassing Malware Detection Method Utilizing Malicious Behavior Visualization and Similarity. 560-565 - Bulganmaa Togookhuu

, Junxing Zhang, Wuyungerile Li:
Mongolian Internet Consumers' Attitude Towards Web Advertising. 566-572 - Gyungchang Lee, Kyoil Chung, Cheong Youn

:
A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism. 573-579 - Ji Hun An, Heemang Song, Hyun-Chool Shin:

Progressive Motion Artifact Removal in PPG Signal for Accurate Heart Rate Estimation. 580-587 - Jeong-Hyeon Moon, Chae-Young Yun, Seon-Joo Park, Kyung-Ah Sohn:

A Case Study on How to Predict Café Profit: A Dimension Reduction via Factor Analysis. 588-593 - MinhPhuoc Hong, Kyoungsu Oh:

Motion Blurred Shadows Using a Hybrid Approach. 594-600 - Jae-Sung Shim, Seung-Su Yang, Young-Hwan Jang, Yong-Wan Ju, Seok-Cheon Park:

Design of ECG Data Compression Algorithm for Efficient M2M-Based Mass Biometric Data Transmission. 601-606 - Seung-Su Yang, Jae-Sung Shim, Young-Hwan Jang, Yong-Wan Ju, Seok-Cheon Park:

Design of Clustering Algorithm for Efficient Energy Management in Wireless Sensor Network Environments. 607-612 - Kiyoung Jang, Suhong Shin, Byoungsoo Koh:

Design of a Framework for Security Enhancement in Telematics Control Units (TCUs). 613-619 - Chunyong Yin, Sun Zhang

, Jin Wang
:
Improved Data Stream Clustering Algorithm for Anomaly Detection. 620-625 - Chunyong Yin, Lian Xia, Jin Wang

:
Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection System. 626-632 - Chunyong Yin, Lingfeng Shi, Jin Wang

:
Short Text Classification Technology Based on KNN+Hierarchy SVM. 633-639 - Yuhui Zheng, Min Li, Kai Ma, Shunfeng Wang, Jin Wang

:
Spectral Response Based Regularization Parameter Selection for Total Variation Image Restoration. 640-645 - Seon Ho Oh, Geon Woo Kim:

Face Recognition for Mobile Self-authentication with Online Model Update. 646-648 - Seon Ho Oh, Seung-Wan Han, Beom-Seok Choi, Geon Woo Kim:

Prototype System Design for Large-Scale Person Re-identification. 649-651 - Kyungrog Kim, Hyejin Song, Nammee Moon:

Topic Modeling for Learner Question and Answer Analytics. 652-655 - Svetlana Kim

, Yong-Ik Yoon:
A Model of Energy-Awareness Predictor to Improve the Energy Efficiency. 656-662 - Yin Yu, Kai Ma, Yuhui Zheng, Jin Wang

:
A Novel Structure Tensor Using Nonlocal Total Variation Operator. 663-669 - Min Li, Yuhui Zheng, Shunfeng Wang, Jin Wang

:
Gaussian Mixture Model Based Image Denoising Method with Local Constraints. 670-675 - Byoungsoo Koh, Suhong Shin:

A Study on Secure Protocol Techniques Supporting TCUs in a Telematics Environment. 676-682 - Seoung-Hyeon Lee, Jung-Chan Na:

Development of Test Agents for Automated Dynamic Testing of UNIWAY. 683-688 - Mingji Zhou, Jin Liu

, Fei Li, Jin Wang
:
Multi-step Prediction for Time Series with Factor Mining and Neural Network. 689-695 - Jiachen Pu, Jin Liu

, Jin Wang
:
A Vision-Based Approach for Deep Web Form Extraction. 696-702 - Yunlu Liaozheng, Jin Liu

, Jin Wang
:
Questions Classification with Attention Machine. 703-708 - Seongyoung Sohn, Jungchan Na, Kyung-Soo Lim:

Development of Unidirectional Security Gateway Satisfying Security Functional Requirements. 709-714 - MiYoung Nam, Jun-Young Lee, Sung Youb Kim, YoungGiu Jung:

Context Based Multiple Players Identification in Sports Images. 715-719 - Gwang-il Ju, Jinhyung Park, Wanyoung Heo, Joon-Min Gil, Hark-Soo Park:

A Study of the Factors Influencing Information Security Policy Compliance: Focusing on the Case of 'K' Institute. 720-728 - Byoung Wook Kwon, Kyung Yeob Park, Seo Yeon Moon, Jong Hyuk Park:

Safe-Driving Aid System Using Bi-directional Cameras. 729-732 - Jung Hyun Ryu, Nam Yong Kim, Seo Yeon Moon, Jong Hyuk Park:

Telling Computer and Human Apart: Image-Sound Based CAPTCHA System. 733-736

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














