Search Word(s) in Title, Keywords, Authors, and Abstract: Applications

IoT and Smart City Technology: Challenges, Opportunities, and Solutions
Young-Sik Jeong and Jong Hyuk Park
Page: 233~238, Vol. 15, No.2, 2019
Keywords: Internet of Things, Smart City
Show / Hide Abstract

A Block-based Adaptive Data Hiding Approach using Pixel value difference and LSB Substitution to Secure E-Governance Documents
Tanmoy Halder, Sunil Karforma and Rupali Mandal
Page: 261~270, Vol. 15, No.2, 2019
Keywords: Block, E-Governance, Pixel Value Difference, Steganography
Show / Hide Abstract

Compression and Enhancement of Medical Images using Opposition Based Harmony Search Algorithm
Rekha Haridoss and Samundiswary Punniyakodi
Page: 288~304, Vol. 15, No.2, 2019
Keywords: Entropy, Harmony Search Algorithm, Image Compression, Multi-Thresholding, Optimization
Show / Hide Abstract

Block Sparse Signals Recovery Algorithm for Distributed Compressed Sensing Reconstruction
Xingyi Chen, Yujie Zhang and Rui Qi
Page: 410~421, Vol. 15, No.2, 2019
Keywords: Block Sparse Signals, Compressed Sensing, Distributed Compressed Sensing, Iteration Algorithm
Show / Hide Abstract

S-mote: SMART Home Framework for Common Household Appliances in IoT Network
Dong-Min Park, Seong-Kyu Kim and Yeong-Seok Seo
Page: 449~456, Vol. 15, No.2, 2019
Keywords: Infrared Module, Infrared Signal, IoT (Internet of Things), Radio Frequency Module, Remote Control, SMART Home, S-mote
Show / Hide Abstract

[EDITORIAL] Practical Approaches Based on Deep Learning and Social Computing
Jong Hyuk Park
Page: 1~5, Vol. 14, No.1, 2018
Show / Hide Abstract

A Comparative Analysis of Music Similarity Measures in Music Information Retrieval Systems
Kuldeep Gurjar and Yang-Sae Moon
Page: 32~55, Vol. 14, No.1, 2018
Keywords: Content-Based Music Retrieval, MIR System, Music Information Retrieval Survey, Music Similarity Measures
Show / Hide Abstract

A Survey about Consensus Algorithms Used in Blockchain
Giang-Truong Nguyen and Kyungbaek Kim
Page: 101~128, Vol. 14, No.1, 2018
Keywords: Blockchain, Consensus Algorithm
Show / Hide Abstract

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment
Ruirui Zhang and Xin Xiao
Page: 239~251, Vol. 14, No.1, 2018
Keywords: Artificial Immune, Cloud Computing, Danger Theory, Intrusion Detection, Virtual Machine
Show / Hide Abstract

[EDITORIAL] Enhanced Integrated Algorithm & Software Architecture
Jong Hyuk Park
Page: 281~285, Vol. 14, No.2, 2018
Show / Hide Abstract

Formulating Analytical Solution of Network ODE Systems Based on Input Excitations
Susmit Bagchi
Page: 455~468, Vol. 14, No.2, 2018
Keywords: Computer Networks, Convergent Functions, Dynamic Networks, Ordinary Differential Equations
Show / Hide Abstract

Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment
Yeon-Woo Jang, Moon-Hwan Kang and Jae-Woo Chang
Page: 499~509, Vol. 14, No.2, 2018
Keywords: Bloom Filter, Concurrency Control, Hybrid Transactional Memory, Multi-core in-Memory Databases
Show / Hide Abstract

Information Technology Infrastructure for Agriculture Genotyping Studies
Bens Pardamean, James W. Baurley, Anzaludin S. Perbangsa, Dwinita Utami, Habib Rijzaani and Dani Satyawan
Page: 655~665, Vol. 14, No.3, 2018
Keywords: Agriculture Biotechnology, Big Data, Genotyping, Infrastructure, IT
Show / Hide Abstract

Analysis of a Third-Party Application for Mobile Forensic Investigation
Jung Hyun Ryu, Nam Yong Kim, Byoung Wook Kwon, Sang Ki Suk, Jin Ho Park and Jong Hyuk Park
Page: 680~693, Vol. 14, No.3, 2018
Keywords: Digital Investigation, Mobile, Forensics, Third-Party Applications
Show / Hide Abstract

Analyzing Machine Learning Techniques for Fault Prediction Using Web Applications
Ruchika Malhotra and Anjali Sharma
Page: 751~770, Vol. 14, No.3, 2018
Keywords: Empirical Validation, Fault prediction, Machine Learning, Object-Oriented Metrics, Web Application Quality
Show / Hide Abstract

New Similarity Measures of Simplified Neutrosophic Sets and Their Applications
Chunfang Liu
Page: 790~800, Vol. 14, No.3, 2018
Keywords: Multi-Criteria Decision-Making, Pattern Recognition, Similarity Measure, Simplified Neutrosophic Sets
Show / Hide Abstract

[EDITORIAL] Algorithms, Processes, and Frameworks for User-oriented Applications
Young-Sik Jeong and Jong Hyuk Park
Page: 801~806, Vol. 14, No.4, 2018
Show / Hide Abstract

QP-DTW: Upgrading Dynamic Time Warping to Handle Quasi Periodic Time Series Alignment
Imen Boulnemour and Bachir Boucheham
Page: 851~876, Vol. 14, No.4, 2018
Keywords: Alignment, Comparison, Diagnosis, DTW, Motif Discovery, Pattern Recognition, SEA, Similarity Search, Time Series
Show / Hide Abstract

A New Perspective to Stable Marriage Problem in Profit Maximization of Matrimonial Websites
Aniket Bhatnagar, Varun Gambhir and Manish Kumar Thakur
Page: 961~979, Vol. 14, No.4, 2018
Keywords: Bipartite Matching, Combinatorial Optimization, Evolutionary Computing, Genetic Algorithm, Matrimonial Websites, Stable Marriage Problem
Show / Hide Abstract

Restful Web Services Composition Using Semantic Ontology for Elderly Living Assistance Services
Sheik Mohammad Mostakim Fattah and Ilyoung Chong
Page: 1010~1032, Vol. 14, No.4, 2018
Keywords: Internet of Things, Service Composition, Web of Objects
Show / Hide Abstract

Cross-Validation Probabilistic Neural Network Based Face Identification
Abdelhadi Lotfi and Abdelkader Benyettou
Page: 1075~1086, Vol. 14, No.5, 2018
Keywords: Biometrics, Classification, Cross-Validation, Face Identification, Optimization, Probabilistic Neural Networks
Show / Hide Abstract

A Dependency Graph-Based Keyphrase Extraction Method Using Anti-patterns
Khuyagbaatar Batsuren, Erdenebileg Batbaatar, Tsendsuren Munkhdalai, Meijing Li, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 1254~1271, Vol. 14, No.5, 2018
Keywords: Dependency Graph, Keyphrase Extraction
Show / Hide Abstract

Artificial Intelligence for the Fourth Industrial Revolution
Young-Sik Jeong and Jong Hyuk Park
Page: 1301~1306, Vol. 14, No.6, 2018
Keywords: Artificial Intelligence, Super intelligence, Superconnection
Show / Hide Abstract

Proposal of Container-Based HPC Structures and Performance Analysis
Chanho Yong, Ga-Won Lee and Eui-Nam Huh
Page: 1398~1404, Vol. 14, No.6, 2018
Keywords: Container, Docker, High-Performance Computing, Singularity
Show / Hide Abstract

A Study on Business-Based Screen Design Techniques for Designing Efficient Applications
Tae-Woo Kim, Sun-Yi Park and Jeong-Mo Yeo
Page: 1420~1430, Vol. 14, No.6, 2018
Keywords: Applications, Business Processes, DFD, Screen Design, Screens
Show / Hide Abstract

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments
JongBeom Lim, HeonChang Yu and Joon-Min Gil
Page: 1480~1493, Vol. 14, No.6, 2018
Keywords: Cloud Computing, Clustering, Computational Intelligence, Resource Monitoring
Show / Hide Abstract

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information
Chen Li, Mengti Liang, Wei Song and Ke Xiao
Page: 1494~1507, Vol. 14, No.6, 2018
Keywords: Face Recognition, Intelligent Human Identification, MP-CNN, Robust Feature
Show / Hide Abstract

A Distributed Coexistence Mitigation Scheme for IoT-Based Smart Medical Systems
BeomSeok Kim
Page: 1602~1612, Vol. 13, No.6, 2017
Keywords: Channel Access, Channel Planning, Coexistence Mitigation, IoT, Smart Medical System
Show / Hide Abstract

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

[EDITORIAL] Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016
Jong Hyuk Park
Page: 1~7, Vol. 13, No.1, 2017
Show / Hide Abstract

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017
Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

Self-Identification of Boundary’s Nodes in Wireless Sensor Networks
Kouider Elouahed Moustafa and Haffaf Hafid
Page: 128~140, Vol. 13, No.1, 2017
Keywords: Boundary Recognition, Military Applications, Military Surveillance, Wireless Sensor Network
Show / Hide Abstract

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City
Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Page: 184~195, Vol. 13, No.1, 2017
Keywords: Blockchain, Internet of Things, Security, Vehicular Network
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017
Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

DTG Big Data Analysis for Fuel Consumption Estimation
Wonhee Cho and Eunmi Choi
Page: 285~304, Vol. 13, No.2, 2017
Keywords: Big Data Analysis, DTG, Eco-Driving, Fuel Economy, Fuel Consumption Estimation, MapReduce
Show / Hide Abstract

[EDITORIAL] New Approaches to Advanced Network and Image Processing
Jong Hyuk Park
Page: 429~434, Vol. 13, No.3, 2017
Show / Hide Abstract

Granular Bidirectional and Multidirectional Associative Memories: Towards a Collaborative Buildup of Granular Mappings
Witold Pedrycz
Page: 435~447, Vol. 13, No.3, 2017
Keywords: Allocation of Information Granularity and Optimization, Bidirectional Associative Memory, Collaborative Clustering, Granular Computing, Multi-directional Associative Memory, Prototypes
Show / Hide Abstract

Blind Image Quality Assessment on Gaussian Blur Images
Liping Wang, Chengyou Wang and Xiao Zhou
Page: 448~463, Vol. 13, No.3, 2017
Keywords: Blind Image Quality Assessment (BIQA), Gaussian Blur Image, Saliency Map, Structure Tensor, Structural Similarity (SSIM)
Show / Hide Abstract

[EDITORIAL] Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning
Jong Hyuk Park
Page: 643~652, Vol. 13, No.4, 2017
Show / Hide Abstract

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications
Daewon Kim
Page: 731~751, Vol. 13, No.4, 2017
Keywords: Cloud, HTML5, JavaScript, Mobile
Show / Hide Abstract

[EDITORIAL] Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1043~1051, Vol. 13, No.5, 2017
Show / Hide Abstract

3D Segmentation for High-Resolution Image Datasets Using a Commercial Editing Tool in the IoT Environment
Koojoo Kwon and Byeong-Seok Shin
Page: 1126~1134, Vol. 13, No.5, 2017
Keywords: Segmentation, Large-Scale Image, Photo Editing, Visible Korean, Volume Rendering
Show / Hide Abstract

Similarity Evalution between Graphs: A Formal Concept Analysis Approach
Fei Hao, Dae-Soo Sim, Doo-Soon Park and Hyung-Seok Seo
Page: 1158~1167, Vol. 13, No.5, 2017
Keywords: Formal Concept Analysis, Graph, Social Networks, Similarity Evaluation
Show / Hide Abstract

Modeling and Simulation of Scheduling Medical Materials Using Graph Model for Complex Rescue
Ming Lv, Jingchen Zheng, Qingying Tong, Jinhong Chen, Haoting Liu and Yun Gao
Page: 1243~1258, Vol. 13, No.5, 2017
Keywords: Bipartite Graph, BSCS, Drug Scheduling, Medical Rescue, Optimization Matching
Show / Hide Abstract

Sector Based Multiple Camera Collaboration for Active Tracking Applications
Sangjin Hong, Kyungrog Kim and Nammee Moon
Page: 1299~1319, Vol. 13, No.5, 2017
Keywords: Active Tracking, Master-Slave, Object Dynamics, Sector-Based Representation
Show / Hide Abstract

[EDITORIAL] Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1431~1435, Vol. 13, No.6, 2017
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016
Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

[Editorial] Advanced Technologies and Applications for Security and Multimedia Computing
Jong Hyuk Park
Page: 333~337, Vol. 12, No.3, 2016
Show / Hide Abstract

Interactive Authoring Tool for Mobile Augmented Reality Content
Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim and Yoo-Joo Cho
Page: 612~630, Vol. 12, No.4, 2016
Keywords: Augmented Reality, Authoring Tool, Interactive Mobile, Mobile App
Show / Hide Abstract

Treatment Planning in Smart Medical: A Sustainable Strategy
Fei Hao, Doo-Soon Park, Sang Yeon Woo, Se Dong Min and Sewon Park
Page: 711~723, Vol. 12, No.4, 2016
Keywords: Degree of Membership, Fuzzy Evaluation, Smart Medical, Sustainable, Treatment Plan
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016
Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

Penetration Testing and Network Auditing: Linux
Deris Stiawan, Mohd. Yazid Idris and Abdul Hanan Abdullah
Page: 104~115, Vol. 11, No.1, 2015
Keywords: Network attack, network auditing, network forensic
Show / Hide Abstract

Spatial Interpolation of Meteorologic Variables in Vietnam using the Kriging Method
Xuan Thanh Nguyen, Ba Tung Nguyen, Khac Phong Do, Quang Hung Bui, Thi Nhat Thanh Nguyen, Van Quynh Vuong and Thanh Ha Le
Page: 134~147, Vol. 11, No.1, 2015
Keywords: Interpolation, Meteorologic Variables, Kriging
Show / Hide Abstract

Biological Infectious Watermarking Model for Video Copyright Protection
Bong-Joo Jang, Suk-Hwan Lee, SangHun Lim and Ki-Ryong Kwon
Page: 280~294, Vol. 11, No.2, 2015
Keywords: Biological Virus Modeling, Copyright Protection, Infectious Watermarking, Video Watermarking
Show / Hide Abstract

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Siti Nurmaini and Ahmad Zarkasi
Page: 370~388, Vol. 11, No.3, 2015
Keywords: Localization Process, RAM-Based Neural Network, Swarm Robots
Show / Hide Abstract

A Lightweight and Effective Music Score Recognition on Mobile Phones
Tam Nguyen and Gueesang Lee
Page: 438~449, Vol. 11, No.3, 2015
Keywords: Mobile Camera, Music Score, SVM, Symbol Classification
Show / Hide Abstract

Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments
Maheshi B. Dissanayake and Dilanga L. B. Abeyrathna
Page: 483~494, Vol. 11, No.3, 2015
Keywords: Complexity, Compression Efficiency, HEVC, H.264/AVC, Latency
Show / Hide Abstract

Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage
Nawel Bendimerad and Bouabdellah Kechar
Page: 509~527, Vol. 11, No.4, 2015
Keywords: Coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015
Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization
Seung-Shik Kang
Page: 573~582, Vol. 11, No.4, 2015
Keywords: Consonant Normalization, Edit Distance, Korean Character, Normalization Factor
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

Skin Segmentation Using YUV and RGB Color Spaces
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan and Puteri Suhaiza Sulaiman
Page: 283~299, Vol. 10, No.2, 2014
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space
Show / Hide Abstract

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
Shi-Kyu Bae
Page: 300~313, Vol. 10, No.2, 2014
Keywords: Wireless Sensor Networks, Time Synchronization, Energy Efficiency, Power Consumption, Performance, Analysis
Show / Hide Abstract

A Novel Framework for Defining and Submitting Workflows to Service-Oriented Systems
Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Page: 365~383, Vol. 10, No.3, 2014
Keywords: Service Composition, Service-Oriented Computing, Service-Oriented Workflow, UML2BPEL, Workflow
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Page: 491~502, Vol. 10, No.4, 2014
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

Graphemes Segmentation for Arabic Online Handwriting Modeling
Houcine Boubaker, Najiba Tagougui, Haikal El Abed, Monji Kherallah and Adel M. Alimi
Page: 503~522, Vol. 10, No.4, 2014
Keywords: Baseline Detection, Diacritic Features, Fourier Descriptors, Geometric Parameters, Grapheme Segmentation, Online Arabic Handwriting Modeling
Show / Hide Abstract

An Unified Representation of Context Knowledge Base for Mobile Context-Aware System
Jang-Seop Jeong and Dae-Wook Bang
Page: 581~588, Vol. 10, No.4, 2014
Keywords: Context-Awareness, Knowledge Base, Unified Context Information
Show / Hide Abstract

A Secure Network for Mobile Wireless Service
Kun Peng
Page: 247~258, Vol. 9, No.2, 2013
Keywords: Mobile Wireless Network, Security
Show / Hide Abstract

A Regularity-Based Preprocessing Method for Collaborative Recommender Systems
Raciel Yera Toledo, Yailé Caballero Mota and Milton García Borroto
Page: 435~460, Vol. 9, No.3, 2013
Keywords: Collaborative Recommender Systems, Inconsistencies, Rating Regularities
Show / Hide Abstract

Developing a Dynamic Materialized View Index for Efficiently Discovering Usable Views for Progressive Queries
Chao Zhu, Qiang Zhu, Calisto Zuzarte and Wenbin Ma
Page: 511~537, Vol. 9, No.4, 2013
Keywords: Database, query processing, query optimization, progressive query, materialized view, index
Show / Hide Abstract

A Computational Intelligence Based Online Data Imputation Method: An Application For Banking
Kancherla Jonah Nishanth and Vadlamani Ravi
Page: 633~650, Vol. 9, No.4, 2013
Keywords: Data Imputation, General Regression Neural Network (GRNN), Evolving Clustering Method (ECM), Imputation, K-Medoids clustering, K-Means clustering, MLP
Show / Hide Abstract

A Dynamic Zigbee Protocol for Reducing Power Consumption
Do-keun Kwon, Ki hyun Chung and Kyunghee Choi
Page: 41~52, Vol. 9, No.1, 2013
Keywords: Zigbee, Low Power Protocol, Beacon, Power Consumption
Show / Hide Abstract

Using a Cellular Automaton to Extract Medical Information from Clinical Reports
Fatiha Barigou, Baghdad Atmani and Bouziane Beldjilali
Page: 67~84, Vol. 8, No.1, 2012
Keywords: Clinical Reports, Information Extraction, Cellular Automaton, Boolean Inference Engine
Show / Hide Abstract

An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units
Sangpil Lee, Deokho Kim, Jaeyoung Yi and Won Woo Ro
Page: 159~174, Vol. 8, No.1, 2012
Keywords: General-Purpose Computation on a Graphics Processing Unit, SEED Block Cipher, Parallelism, Multi-Core Processors
Show / Hide Abstract

Attack and Correction: How to Design a Secure and Efficient Mix Network
Kun Peng
Page: 175~190, Vol. 8, No.1, 2012
Keywords: Mix Network, Correction
Show / Hide Abstract

An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators
B. John Oommen, Anis Yazidi and Ole-Christoffer Granmo
Page: 191~212, Vol. 8, No.2, 2012
Keywords: Weak es timators, User's Profiling, Time Varying Preferences
Show / Hide Abstract

A Novel Approach for Deriving Test Scenarios and Test Cases from Events
Sandeep K. Singh, Sangeeta Sabharwal and J.P.Gupta
Page: 213~240, Vol. 8, No.2, 2012
Keywords: Events, Event Meta Model, Testing, Test cases, Test scenarios, Event Based Systems, Software Engineering
Show / Hide Abstract

Dynamic Replication Based on Availability and Popularity in the Presence of Failures
Bakhta Meroufel and Ghalem Belalem
Page: 263~278, Vol. 8, No.2, 2012
Keywords: Data Grid, Dynamic Replication, Availability, Failures, Best Client, Best Responsible, Data Management
Show / Hide Abstract

Expressive Exceptions for Safe Pervasive Spaces
Eun-Sun Cho and Sumi Helal
Page: 279~300, Vol. 8, No.2, 2012
Keywords: Exceptions, Safety, Programming models for Pervasive Systems, Pervasive Computing, Contexts, Situations
Show / Hide Abstract

Efficient and General PVSS Based on ElGamal Encryption
Kun Peng
Page: 375~388, Vol. 8, No.2, 2012
Keywords: ElGamal, PVSS
Show / Hide Abstract

Texture Comparison with an Orientation Matching Scheme
Nguyen Cao Truong Hai, Do-Yeon Kim and Hyuk-Ro Park
Page: 389~398, Vol. 8, No.3, 2012
Keywords: Orientation Matching, Texture Analysis, Texture Comparison, K-means Clustering
Show / Hide Abstract

An Adaptive Workflow Scheduling Scheme Based on an Estimated Data Processing Rate for Next Generation Sequencing in Cloud Computing
Byungsang Kim, Chan-Hyun Youn, Yong-Sung Park, Yonggyu Lee and Wan Choi
Page: 555~566, Vol. 8, No.4, 2012
Keywords: Resource-Provisioning, Bio-Workflow Broker, Next-Generation Sequencing
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

A Survey of QoS Based Routing Protocols for Wireless Sensor Networks
R.Sumathi and M.G.Srinivas
Page: 589~602, Vol. 8, No.4, 2012
Keywords: Wireless Sensor Networks, Quality of Service, Reliability, Energy Efficiency, End-To-End Delay, Critical Data
Show / Hide Abstract

Enhanced FFD-AABB Collision Algorithm for Deformable Objects
JaeHong Jeon, Min-Hyung Choi and Min Hong
Page: 713~720, Vol. 8, No.4, 2012
Keywords: FFD-AABB Algorithm, Physically-Based Simulation, Deformable Objects, Collision Detection, Bounding Sphere
Show / Hide Abstract

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances
Ivy Ong and Hyotaek Lim
Page: 53~62, Vol. 7, No.1, 2011
Keywords: iATA Protocol, Load Balancing, Network Monitoring, Storage Network Solution, Write Replication
Show / Hide Abstract

Accelerating the Sweep3D for a Graphic Processor Unit
Chunye Gong, Jie Liu, Haitao Chen, Jing Xie and Zhenghu Gong
Page: 63~74, Vol. 7, No.1, 2011
Keywords: Sweep3D, Neutron Transport, GPU, CUDA
Show / Hide Abstract

Security Framework for RFID-based Applications in Smart Home Environment
Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee
Page: 111~120, Vol. 7, No.1, 2011
Keywords: RFID, Smart Home, Home Network System, Home Server, Secure RFIDBased Applications, RFID Reader-Enabled Devices, RFID Tagged Consumer Items, EPCglobal Architecture Framework
Show / Hide Abstract

A Cultural Dimensions Model based on Smart Phone Applications
Jung-Min Oh and Nammee Moon
Page: 209~220, Vol. 7, No.1, 2011
Keywords: Smart Phone, Culture, Cultural Dimensions Model, MDS, Mobile Application Analysis
Show / Hide Abstract

Development of an OPC Client-Server Framework for Monitoring and Control Systems
Vu Van Tan and Myeong-Jae Yi
Page: 321~340, Vol. 7, No.2, 2011
Keywords: OPC, OPC UA SDK, Monitoring and Control, Redundancy, Unified Architecture
Show / Hide Abstract

A Novel Similarity Measure for Sequence Data
Mohammad. H. Pandi, Omid Kashefi and Behrouz Minaei
Page: 413~424, Vol. 7, No.3, 2011
Keywords: Sequence Data, Similarity Measure, Sequence Mining
Show / Hide Abstract

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting
Kun Peng
Page: 549~560, Vol. 7, No.3, 2011
Keywords: Efficient Proof, E-Voting
Show / Hide Abstract

A Survey of RFID Deployment and Security Issues
Amit Grover and Hal Berghel
Page: 561~580, Vol. 7, No.4, 2011
Keywords: RFID, RFID Standards, RFID Protocols, RFID Security, EPC structure, RFID Applications, RFID Classification
Show / Hide Abstract

A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study
Seo-Young Noh and Shashi K. Gadia
Page: 635~652, Vol. 7, No.4, 2011
Keywords: Parametric Data Model, Model Comparison, ParaSQL, Spatiotemporal Data
Show / Hide Abstract

Stream-based Biomedical Classification Algorithms for Analyzing Biosignals
Simon Fong, Yang Hang, Sabah Mohammed and Jinan Fiaidhi
Page: 717~732, Vol. 7, No.4, 2011
Keywords: Data Stream Mining, VFDT, OVFDT, C4.5 and Biomedical Domain
Show / Hide Abstract

Approximate Clustering on Data Streams Using Discrete Cosine Transform
Feng Yu, Damalie Oyana, Wen-Chi Hou and Michael Wainer
Page: 67~78, Vol. 6, No.1, 2010
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression
Show / Hide Abstract

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif and Munir Ahmed
Page: 177~184, Vol. 6, No.2, 2010
Keywords: Secure Routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Show / Hide Abstract

Developing Digital Games through Software Reuse
Beatriz Neto, Lucia Fernandes, Claudia Werner and Jano Moreira de Souza
Page: 219~234, Vol. 6, No.2, 2010
Keywords: Games, Product Line, Software Reuse, Software Development
Show / Hide Abstract

Recognition of Human Facial Expression in a Video Image using the Active Appearance Model
Gyeong-Sic Jo and Yong-Guk Kim
Page: 261~268, Vol. 6, No.2, 2010
Keywords: Active Appearance Model, Facial Expression Recognition, Image Alignment Method
Show / Hide Abstract

A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks
Akihiro Satoh, Toshiaki Osada, Toru Abe, Gen Kitagata, Norio Shiratori and Tetsuo Kinoshita
Page: 307~322, Vol. 6, No.3, 2010
Keywords: Mobile IP Network, Traffic Classification, Network Management, Traffic Engineering, Machine Learning
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Intercepting Filter Approach to Injection Flaws
Ahmed Salem
Page: 563~574, Vol. 6, No.4, 2010
Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
Show / Hide Abstract

A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Chetna Gupta, Yogesh Singh and Durg Singh Chauhan
Page: 597~608, Vol. 6, No.4, 2010
Keywords: Change Impact Analysis, Regression Testing, Software Maintenance, Software Testing
Show / Hide Abstract

SVD-LDA: A Combined Model for Text Classification
Nguyen Cao Truong Hai, Kyung-Im Kim and Hyuk-Ro Park
Page: 5~10, Vol. 5, No.1, 2009
Keywords: Latent Dirichlet Allocation, Singular Value Decomposition, Input Filtering, Text Classification, Data Preprocessing.
Show / Hide Abstract

An Efficient Web Ontology Storage Considering Hierarchical Knowledge for Jena-based Applications
Dongwon Jeong, Heeyoung Shin, Doo-Kwon Baik and Young-Sik Jeong
Page: 11~18, Vol. 5, No.1, 2009
Keywords: Ontology, Jena, OWL, Ontology, Storage, Hierarchical Structure
Show / Hide Abstract

A Survey of Face Recognition Techniques
Rabia Jafri and Hamid R Arabnia
Page: 41~68, Vol. 5, No.2, 2009
Keywords: Face Recognition, Person Identification, Biometrics
Show / Hide Abstract

Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem
Minyi Guo, Yanqin Yang, Gongwei Zhang, Feilong Tang and Yao Shen
Page: 167~174, Vol. 5, No.4, 2009
Keywords: Bluetooth, Statternet Formation, Bluetooth Communication Protocol
Show / Hide Abstract

On Effective Slack Reclamation in Task Scheduling for Energy Reduction
Young Choon Lee and Albert Y Zomaya
Page: 175~186, Vol. 5, No.4, 2009
Keywords: Scheduling, Energy Awareness, Green Computing, Dynamic Voltage and Frequency Scaling, Data Centers
Show / Hide Abstract

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System
Shengzhong Deng, Chan-Hyun Youn, Qi Liu, Hoe Young Kim, Taoran Yu and Young Hun Kim
Page: 103~112, Vol. 4, No.3, 2008
Keywords: Grid Worfklow, Collaborative Healthcare Platform, SLA, Policy Adjuster
Show / Hide Abstract

Eager Data Transfer Mechanism for Reducing Communication Latency in User-Level Network Protocols
Chulho Won, Ben Lee, Kyoung Park and Myung-Joon Kim
Page: 133~144, Vol. 4, No.4, 2008
Keywords: Data Transfer, Cache Coherence, User-Level, Low-Latency, Network Protocols, Message, VIA
Show / Hide Abstract

A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks
Kap-Dong Kim, Kwangil Lee, Jun-Hee Park and Sang-Ha Kim
Page: 1~7, Vol. 3, No.1, 2007
Keywords: MANET Multicast Protocol, Overlay Multicast, Group Mobility
Show / Hide Abstract

Addressing Mobile Agent Security through Agent Collaboration
Evens Jean, Yu Jiao and Ali R Hurson
Page: 43~53, Vol. 3, No.2, 2007
Keywords: Disk Striping, Multimedia System, Bandwidth
Show / Hide Abstract

A Method for Automatic Generation of OWL-S Service Ontology
Jin-Hyuk Yang and In-Jeong Chung
Page: 114~123, Vol. 2, No.2, 2006
Keywords: Ontology, Semantic Web, OWL-S, State-chart, and UML
Show / Hide Abstract

A Knowledge Discovery Framework for Spatiotemporal Data Mining
Jun-Wook Lee and Yong-Joon Lee
Page: 124~129, Vol. 2, No.2, 2006
Keywords: spatiotemporal data mining, spatiotemporal knowledge discovery, spatiotemporal moving pattern, discovery framework
Show / Hide Abstract

A Quality Assurance Process Model on Fault Management
Hyo-Soo Kim and Cheong Ho Baek
Page: 163~169, Vol. 2, No.3, 2006
Keywords: TMN, fault management, ERP, UML, RUP
Show / Hide Abstract

A Hardware/Software Codesign for Image Processing in a Processor Based Embedded System for Vehicle Detection
Hosun Moon, Sunghwan Moon, Youngbin Seo and Yongdeak Kim
Page: 27~31, Vol. 1, No.1, 2005
Keywords: Embedded System, ITS, Image Processing, Vehicle Detect
Show / Hide Abstract

The Comparison of RBS and TDP for the Sensor Networks Synchronization
Hyojung Lee, Byungchul Kim and Youngmi Kwon
Page: 70~74, Vol. 1, No.1, 2005
Keywords: Sensor Network, RBS, TDP, Time Synchronization
Show / Hide Abstract

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services
Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn and Jaecheol Ryou
Page: 86~95, Vol. 1, No.1, 2005
Keywords: Location-based service, Open LBS security, XKMS, XML security, XML web services
Show / Hide Abstract

Prototyping a Student Model for Educational Games
YoungMee Choi, MoonWon Choo and SeongAh Chin
Page: 107~111, Vol. 1, No.1, 2005
Keywords: edutainment, pedagogical agents, emotion generation, student modeling, Intelligent Tutoring Systems, dynamic Bayesian networks
Show / Hide Abstract