Search Word(s) in Title, Keywords, Authors, and Abstract: Actor

A Power Allocation Algorithm Based on Variational Inequality Problem for Cognitive Radio Networks
Ming-Yue Zhou and Xiao-Hui Zhao
Page: 417~427, Vol. 13, No.2, 2017

Keywords: Cognitive Radio, Power Allocation, Variational Inequality
Show / Hide Abstract

Fire Detection Using Multi-Channel Information and Gray Level Co-occurrence Matrix Image Features
Jae-Hyun Jun, Min-Jun Kim, Yong-Suk Jang and Sung-Ho Kim
Page: 590~598, Vol. 13, No.3, 2017

Keywords: Color Features, Fire Detection, Texture Features
Show / Hide Abstract

Interactive Experience Room Using Infrared Sensors and User’s Poses
Green Bang, Jinsuk Yang, Kyoungsu Oh and Ilju Ko
Page: 876~892, Vol. 13, No.4, 2017

Keywords: Human Pose Recognition, Infrared Sensor, Interactive Experience Room, Virtual Reality
Show / Hide Abstract

Identifying Influential People Based on Interaction Strength
Muhammad Azam Zia, Zhongbao Zhang, Liutong Chen, Haseeb Ahmad and Sen Su
Page: 987~999, Vol. 13, No.4, 2017

Keywords: Influence, Interaction, IPRank, Micro-Blog, Online Social Network
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016

Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Page: 338~357, Vol. 12, No.3, 2016

Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis
Leila Boussaad, Mohamed Benmohammed and Redha Benzid
Page: 392~409, Vol. 12, No.3, 2016

Keywords: Active Appearance Model, Age-Invariant, Face Recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016

Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization
Seung-Shik Kang
Page: 573~582, Vol. 11, No.4, 2015

Keywords: Consonant Normalization, Edit Distance, Korean Character, Normalization Factor
Show / Hide Abstract

Uniform Fractional Band CAC Scheme for QoS Provisioning in Wireless Networks
Md. Asadur Rahman, Mostafa Zaman Chowdhury and Yeong Min Jang
Page: 583~600, Vol. 11, No.4, 2015

Keywords: Acceptance Factor, Call Admission Control (CAC), Call Blocking Probability (CBP), Call Dropping Probability (CDP), Channel Utilization, Uniform Fractional Band (UFB), Quality of Service (QoS)
Show / Hide Abstract

Improved Dynamic Subjective Logic Model with Evidence Driven
Jiao-Hong Qiang, Wang-Xin Xin and Tian-Jun Feng
Page: 630~642, Vol. 11, No.4, 2015

Keywords: Dynamic Weight, Evidence Driven, Subjective Logic
Show / Hide Abstract

Push-N-Scheme with Timeout for Content Delivery of Social Networking Services
Kyungkoo Jun
Page: 81~92, Vol. 10, No.1, 2014
Keywords: Push Scheme, Content Delivery, SNS, Wait Time
Show / Hide Abstract

How to Manage Cloud Risks Based on the BMIS Model
Youjin Song and Yasheng Pang
Page: 132~144, Vol. 10, No.1, 2014
Keywords: Cloud Risk, Risk Control, Cloud Computing, BMIS, CSFs
Show / Hide Abstract

Optical Image Encryption and Decryption Considering Wireless Communication Channels
Myungjin Cho and In-Ho Lee
Page: 215~222, Vol. 10, No.2, 2014
Keywords: Optical Encryption and Decryption, Wireless Communication Channels
Show / Hide Abstract

Leveraged BMIS Model for Cloud Risk Control
YouJin Song and Yasheng Pang
Page: 240~255, Vol. 10, No.2, 2014
Keywords: Cloud risk, CSFs, BMIS, Risk control, Leverage point, Effective model
Show / Hide Abstract

Spectrum Sensing and Data Transmission in a Cognitive Relay Network Considering Spatial False Alarms
Tasnina A. Tishita, Sumiya Akhter, Md. Imdadul Islam and M. R. Amin
Page: 459~470, Vol. 10, No.3, 2014
Keywords: Cognitive Network, Conventional False Alarms, Probability of Symbol Error Rate, Spatial False Alarms, Spectrum Sensing
Show / Hide Abstract

Multifactor Authentication Using a QR Code and a One-Time Password
Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya and G. Sainarayanan
Page: 483~490, Vol. 10, No.3, 2014
Keywords: Authentication, One-Time Password, Personal Assurance Message, Quick Response Code
Show / Hide Abstract

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering
Woon-hae Jeong, Se-jun Kim, Doo-soon Park and Jin Kwak
Page: 157~172, Vol. 9, No.1, 2013
Keywords: Collaborative Filtering, Movie Recommendation System, Personal Propensity, Security, Push Stack
Show / Hide Abstract

Agile Software Development Framework in a Small Project Environment
Seiyoung Lee and Hwan-Seung Yong
Page: 69~88, Vol. 9, No.1, 2013
Keywords: Agile Methods, Small Software Projects, Industrial Case Study
Show / Hide Abstract

A Dual Modeling Method for a Real-Time Palpation Simulator
Sang-Youn Kim, Sekil Park and Jinah Park
Page: 55~66, Vol. 8, No.1, 2012
Keywords: Haptic Feedback, Dual Model, Palpation, Real-Time Simulation, S-chain Model
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

Efficient and General PVSS Based on ElGamal Encryption
Kun Peng
Page: 375~388, Vol. 8, No.2, 2012
Keywords: ElGamal, PVSS
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20
Mouhamed Abdulla and Yousef R. Shayan
Page: 43~52, Vol. 7, No.1, 2011
Keywords: MBWA, IEEE 802.20, Interference, Mobility, Degradation
Show / Hide Abstract

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances
Ivy Ong and Hyotaek Lim
Page: 53~62, Vol. 7, No.1, 2011
Keywords: iATA Protocol, Load Balancing, Network Monitoring, Storage Network Solution, Write Replication
Show / Hide Abstract

Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits
Haiqing Nan, Kyung Ki Kim, Wei Wang and Ken Choi
Page: 93~102, Vol. 7, No.1, 2011
Keywords: PVT Variation sensors, Yield, Voltage Scaling, Frequency Scaling
Show / Hide Abstract

A Method of Risk Assessment for Multi-Factor Authentication
Jae-Jung Kim and Seng-Phil Hong
Page: 187~198, Vol. 7, No.1, 2011
Keywords: Multi-factor Authentication, PKI, User Authentication, Biometric Authentication
Show / Hide Abstract

A Cultural Dimensions Model based on Smart Phone Applications
Jung-Min Oh and Nammee Moon
Page: 209~220, Vol. 7, No.1, 2011
Keywords: Smart Phone, Culture, Cultural Dimensions Model, MDS, Mobile Application Analysis
Show / Hide Abstract

Analysis of Generalized Impact Factors and the Indices of Journals
Ash Mohammad Abbas
Page: 341~354, Vol. 7, No.2, 2011
Keywords: Information Systems, Quality of Research, Impact factor, h-index, g-index
Show / Hide Abstract

Analysis of Business Attributes in Information Technology Environments
Hong Joo Lee
Page: 385~396, Vol. 7, No.2, 2011
Keywords: Business Attributes, Information Technology, Value Chain, Business System
Show / Hide Abstract

Wavelet-based Feature Extraction Algorithm for an Iris Recognition System
Ayra Panganiban, Noel Linsangan and Felicito Caluyo
Page: 425~434, Vol. 7, No.3, 2011
Keywords: Biometrics, Degrees of Freedom, Iris Recognition, Wavelet
Show / Hide Abstract

Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach
Jagat Sesh Challa, Arindam Paul, Yogesh Dada, Venkatesh Nerella, Praveen Ranjan Srivastava and Ajit Pratap Singh
Page: 473~518, Vol. 7, No.3, 2011
Keywords: Software Quality Parameters, ISO/IEC 9126, Fuzzy Software Quality Quantification Tool (FSQQT), Fuzzy Membership Function, Triangular Fuzzy Sets, KLOC, GUI, CUI
Show / Hide Abstract

A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game
Hiroshi Kutsuna and Satoshi Fujita
Page: 531~542, Vol. 7, No.3, 2011
Keywords: Congestion Control, AIMD, Minority Game
Show / Hide Abstract

A Study on the Business Strategy of Smart Devices for Multimedia Contents
Hong Joo Lee
Page: 543~548, Vol. 7, No.3, 2011
Keywords: Smart Device, Business Strategy, Business Value Chain
Show / Hide Abstract

Stream-based Biomedical Classification Algorithms for Analyzing Biosignals
Simon Fong, Yang Hang, Sabah Mohammed and Jinan Fiaidhi
Page: 717~732, Vol. 7, No.4, 2011
Keywords: Data Stream Mining, VFDT, OVFDT, C4.5 and Biomedical Domain
Show / Hide Abstract

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments
Mohammad S. Obaidat, Sanjay K. Dhurandher, Deepank Gupta, Nidhi Gupta and Anupriya Asthana
Page: 269~294, Vol. 6, No.3, 2010
Keywords: Sensor Network, Security, Energy Efficiency, Routing, Dynamic Trust Factor
Show / Hide Abstract

Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol
R. Padmavathy and Chakravarthy Bhagvati
Page: 335~346, Vol. 6, No.3, 2010
Keywords: Ephemeral Key, Pohlig-Hellman Method, Van-Oorschot Method, Index Calculus Method, Chang-Chang Password Key Exchange Protocol
Show / Hide Abstract

An Experiment of Traceability-Driven System Testing
Eun Man Choi and Kwang-Ik Seo
Page: 33~40, Vol. 4, No.1, 2008
Keywords: Software Engineering, Software Testing, Traceability, UML-based Testing
Show / Hide Abstract

Decision of Abnormal Quality Unit Lists from Claim Database
Sang-Hyun Lee, Sang-joon Lee, Kyung-li Moon and Byung-Ki Kim
Page: 113~120, Vol. 4, No.3, 2008
Keywords: Claim, Production, Abnormal Quality, Decision Support
Show / Hide Abstract

Use of Mobile Devices in the Performance of Group Decision-Making under Contextual Pressure
Oh Byung Kwon, Tae Kyung Kim and Choong Rhyun Kim
Page: 64~72, Vol. 3, No.2, 2007
Keywords: Group Decision Making, Mobile Technology, Mobile Devices, Group Decision Support
Show / Hide Abstract

An Evaluation of Multimedia Data Downstream with PDA in an Infrastructure Network
Youn-Sik Hong and Hye-Sun Hur
Page: 76~81, Vol. 2, No.2, 2006
Keywords: Multimedia data, downstream, PDA, TCP window size, inter-packet delay
Show / Hide Abstract

Data-Hiding Method using Digital Watermark in the Public Multimedia Network
Jung-Hee Seo and Hung-Bog Park
Page: 82~87, Vol. 2, No.2, 2006
Keywords: Digital Watermark, Scalable, Wavelet, Public Multimedia Network
Show / Hide Abstract

Metaphor and Typeface Based on Children’s Sensibilities for e-Learning
Miheon Jo and Jeonghye Han
Page: 178~182, Vol. 2, No.3, 2006
Keywords: e-Learning, Sensibility Factor, Metaphor, Typeface, Collaborative Recommending
Show / Hide Abstract

A Multiple Instance Learning Problem Approach Model to Anomaly Network Intrusion Detection
Ill-Young Weon, Doo-Heon Song, Sung-Bum Ko and Chang-Hoon Lee
Page: 14~21, Vol. 1, No.1, 2005
Keywords: Multiple Instance Learning Problem, Network Intrusion Detection, Anomaly Detection
Show / Hide Abstract

Simulation of the Digital Image Processing Algorithm for the Coating Thickness Automatic Measurement of the TRISO-coated Fuel Particle
Woong-Ki Kim, Young-Woo Lee and Sung-Woong Ra
Page: 36~40, Vol. 1, No.1, 2005
Keywords: TRISO-coated Fuel Particle, Coating Thickness, X-ray CT, Computed Tomography, Filtered Backprojection, Automatic Measurement
Show / Hide Abstract

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation
Jung-Ho Eom, Seon-Ho Park, Tae-Kyung Kim and Tai-Myoung Chung
Page: 79~85, Vol. 1, No.1, 2005
Keywords: Risk management, Risk Analysis, Asset analysis, 2-dimensional qualitative analysis
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 0~0, Vol. 0, No.0, 0
Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract