Search Word(s) in Title, Keywords, Authors, and Abstract: Data

A Survey on Passive Image Copy-Move Forgery Detection
Zhi Zhang, Chengyou Wang and Xiao Zhou
Page: 6~31, Vol. 14, No.1, 2018

Keywords: Copy-Move Forgery Detection (CMFD), Image Forensics, Image Tamper Detection, Passive Forgery Detection
Show / Hide Abstract

A Comparative Analysis of Music Similarity Measures in Music Information Retrieval Systems
Kuldeep Gurjar and Yang-Sae Moon
Page: 32~55, Vol. 14, No.1, 2018

Keywords: Content-Based Music Retrieval, MIR System, Music Information Retrieval Survey, Music Similarity Measures
Show / Hide Abstract

A Development of LDA Topic Association Systems Based on Spark-Hadoop Framework
Kiejin Park and Limei Peng
Page: 140~149, Vol. 14, No.1, 2018

Keywords: Association Analysis, Hadoop, LDA (Latent Dirichlet Allocation), Spark, Topic Model
Show / Hide Abstract

DeepAct: A Deep Neural Network Model for Activity Detection in Untrimmed Videos
Yeongtaek Song and Incheol Kim
Page: 150~161, Vol. 14, No.1, 2018

Keywords: Activity Detection, Bi-directional LSTM, Deep Neural Networks, Untrimmed Video
Show / Hide Abstract

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform
Wei Song, Ning Feng, Yifei Tian, Simon Fong and Kyungeun Cho
Page: 162~175, Vol. 14, No.1, 2018

Keywords: Cloud Computing, Deep Belief Network, IoT, Power Conservation, Smart Metre
Show / Hide Abstract

Face Recognition Based on the Combination of Enhanced Local Texture Feature and DBN under Complex Illumination Conditions
Chen Li, Shuai Zhao, Ke Xiao and Yanjie Wang
Page: 191~204, Vol. 14, No.1, 2018

Keywords: Deep Belief Network, Enhanced Local Texture Feature, Face Recognition, Illumination Variation
Show / Hide Abstract

Variations of AlexNet and GoogLeNet to Improve Korean Character Recognition Performance
Sang-Geol Lee, Yunsick Sung, Yeon-Gyu Kim and Eui-Young Cha
Page: 205~217, Vol. 14, No.1, 2018

Keywords: Classification, CNN, Deep Learning, Korean Character Recognition
Show / Hide Abstract

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment
Ruirui Zhang and Xin Xiao
Page: 239~251, Vol. 14, No.1, 2018

Keywords: Artificial Immune, Cloud Computing, Danger Theory, Intrusion Detection, Virtual Machine
Show / Hide Abstract

Enhanced Integrated Algorithm & Software Architecture
Jong Hyuk Park
Page: 281~285, Vol. 14, No.2, 2018

Show / Hide Abstract

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence
Humaira Arshad, Aman Bin Jantan and Oludare Isaac Abiodun
Page: 346~376, Vol. 14, No.2, 2018

Keywords: Criminal Investigation, Data, Digital Forensics, Electronic Evidence, Reliability, Validation, Verification
Show / Hide Abstract

Routing Techniques for Data Aggregation in Sensor Networks
Jeong-Joon Kim
Page: 396~417, Vol. 14, No.2, 2018

Keywords: Itinerary, R-tree, Routing, Sensor Networks, Spatio-temporal Data
Show / Hide Abstract

Impact of Instance Selection on kNN-Based Text Categorization
Fatiha Barigou
Page: 418~434, Vol. 14, No.2, 2018

Keywords: Classification Accuracy, Classification Efficiency, Data Reduction, Instance Selection, k-Nearest Neighbors, Text Categorization
Show / Hide Abstract

Fingerprint Identification Based on Hierarchical Triangulation
Meryam Elmouhtadi, Sanaa El fkihi and Driss Aboutajdine
Page: 435~447, Vol. 14, No.2, 2018

Keywords: Biometric, Fingerprint Identification, Delaunay Triangulation, Fingerprint Matching, Minutiae Extraction
Show / Hide Abstract

GLIBP: Gradual Locality Integration of Binary Patterns for Scene Images Retrieval
Salah Bougueroua and Bachir Boucheham
Page: 469~486, Vol. 14, No.2, 2018

Keywords: CBIR, Elliptic-Region, Global Information, LBP, Local Information, Texture
Show / Hide Abstract

Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment
Yeon-Woo Jang, Moon-Hwan Kang and Jae-Woo Chang
Page: 499~509, Vol. 14, No.2, 2018

Keywords: Bloom Filter, Concurrency Control, Hybrid Transactional Memory, Multi-core in-Memory Databases
Show / Hide Abstract

A Mixed Co-clustering Algorithm Based on Information Bottleneck
Yongli Liu, Tianyi Duan, Xing Wan and Hao Chao
Page: 1467~1486, Vol. 13, No.6, 2017

Keywords: Co-clustering, F-Measure, Fuzzy Clustering, Information Bottleneck, Objective Function
Show / Hide Abstract

miRNA Pattern Discovery from Sequence Alignment
Xiaohan Sun and Junying Zhang
Page: 1527~1543, Vol. 13, No.6, 2017

Keywords: Deep Sequencing Data, miRNA, Pattern Discovery
Show / Hide Abstract

A Network Coding-Aware Routing Mechanism for Time-Sensitive Data Delivery in Multi-Hop Wireless Networks
Minho Jeong and Sanghyun
Page: 1544~1553, Vol. 13, No.6, 2017

Keywords: Coding-Aware Routing, Link Quality, Multi-Hop Wireless Network, Network Coding, Traffic Load Distribution
Show / Hide Abstract

Transaction Processing Method for NoSQL Based Column
Jeong-Joon Kim
Page: 1575~1584, Vol. 13, No.6, 2017

Keywords: Bigdata, HBase, Multi-Row Transaction, NoSQL
Show / Hide Abstract

Internet of Things (IoT) Framework for Granting Trust among Objects
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1613~1627, Vol. 13, No.6, 2017

Keywords: Framework, Internet of Things, Privacy, Security, Trust
Show / Hide Abstract

Texture Image Retrieval Using DTCWT-SVD and Local Binary Pattern Features
Dayou Jiang and Jongweon Kim
Page: 1628~1639, Vol. 13, No.6, 2017

Keywords: Dual-Tree Complex Wavelet Transform, Image Retrieval, Local Binary Pattern, SVD, Texture Feature
Show / Hide Abstract

A Contour Descriptors-Based Generalized Scheme for Handwritten Odia Numerals Recognition
Tusar Kanti Mishra, Banshidhar Majhi and Ratnakar Dash
Page: 174~183, Vol. 13, No.1, 2017

Keywords: Contour Features, Handwritten Character, Neural Classifier, Numeral Recognition, OCR, Odia
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017

Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017

Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script
Rajiv Kumar, Kiran Kumar Ravulakollu and Rajesh Bhat
Page: 893~913, Vol. 13, No.4, 2017

Keywords: CPAR-2012, Devnagari, Fuzzy Membership, Handwritten Script, Writer Identification
Show / Hide Abstract

Fingerprint Matching Based on Dimension Reduced DCT Feature Vectors
Sangita Bharkad and Manesh Kokare
Page: 852~862, Vol. 13, No.4, 2017

Keywords: Biometric, Discrete Cosine Transform, Fingerprint Identification, Similarity Measure
Show / Hide Abstract

An Improved Cat Swarm Optimization Algorithm Based on Opposition-Based Learning and Cauchy Operator for Clustering
Yugal Kumar and G. Sahoo
Page: 1000~1013, Vol. 13, No.4, 2017

Keywords: Cat Swarm Optimization, Cauchy Mutation Operator, Clustering, Opposition-Based Learning, Particle Swarm Optimization
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017

Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017

Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

A Joint Channel Estimation and Data Detection for a MIMO Wireless Communication System via Sphere Decoding
Gajanan R. Patil and Vishwanath K. Kokate
Page: 1029~1042, Vol. 13, No.4, 2017

Keywords: Maximum Likelihood Decoding, Multiple Input Multiple Output, Normalized Mean Square Error, Training Based Channel Estimation, Semi-Blind Channel Estimation, Spatial Multiplexing, Sphere Decoding
Show / Hide Abstract

Combination of Classifiers Decisions for Multilingual Speaker Identification
B. G. Nagaraja and H. S. Jayanna
Page: 928~940, Vol. 13, No.4, 2017

Keywords: Classifier Combination, Cross-lingual, Monolingual, Multilingual, Speaker Identification
Show / Hide Abstract

Parallel and Sequential Implementation to Minimize the Time for Data Transmission Using Steiner Trees
V. Anand and N. Sairam
Page: 104~113, Vol. 13, No.1, 2017

Keywords: Least-Cost Path, Non-terminal Nodes, Parallel, Sequential, Steiner Vertices, Terminals, Time Complexity
Show / Hide Abstract

Detection of Microcalcification Using the Wavelet Based Adaptive Sigmoid Function and Neural Network
Sanjeev Kumar and Mahesh Chandra
Page: 703~715, Vol. 13, No.4, 2017

Keywords: Cascade-Forward Back Propagation Technique, Computer-Aided Diagnosis (CAD), Contrast Limited Adaptive Histogram Equalization (CLAHE), Gray-Level Co-Occurrence Matrix (GLCM), Mammographic Image Analysis Society (MIAS) Database, Modified Sigmoid Function
Show / Hide Abstract

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017

Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017

Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

An Improved Stereo Matching Algorithm with Robustness to Noise Based on Adaptive Support Weight
Ingyu Lee and Byungin Moon
Page: 256~267, Vol. 13, No.2, 2017

Keywords: Adaptive Census Transform, Adaptive Support Weight, Local Matching, Multiple Sparse Windows, Stereo Matching
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 1229~1242, Vol. 13, No.5, 2017

Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

DTG Big Data Analysis for Fuel Consumption Estimation
Wonhee Cho and Eunmi Choi
Page: 285~304, Vol. 13, No.2, 2017

Keywords: Big Data Analysis, DTG, Eco-Driving, Fuel Economy, Fuel Consumption Estimation, MapReduce
Show / Hide Abstract

A Multi-Objective TRIBES/OC-SVM Approach for the Extraction of Areas of Interest from Satellite Images
Wafaa Benhabib and Hadria Fizazi
Page: 321~339, Vol. 13, No.2, 2017

Keywords: Image Classification, MO-TRIBES, OC-SVM, Remote Sensing
Show / Hide Abstract

Design of Real-Time CAN Framework Based on Plug and Play Functionality
Sungheo Kim and Kwang-il Hwang
Page: 348~359, Vol. 13, No.2, 2017

Keywords: Controller Area Networks, Plug and Play, Real-Time
Show / Hide Abstract

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 385~399, Vol. 13, No.2, 2017

Keywords: Fragile Watermarking, Local Binary Pattern (LBP), Least Significant Bit (LSB), Tamper Detection and Localization
Show / Hide Abstract

Rough Set-Based Approach for Automatic Emotion Classification of Music
Babu Kaji Baniya and Joonwhoan Lee
Page: 400~416, Vol. 13, No.2, 2017

Keywords: Attributes, Covariance, Discretize, Rough Set, Rules
Show / Hide Abstract

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform
Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia
Page: 1331~1344, Vol. 13, No.5, 2017

Keywords: Arnold Transform, DWT, JPEG, JPEG2000, PSNR, SIM
Show / Hide Abstract

Blind Image Quality Assessment on Gaussian Blur Images
Liping Wang, Chengyou Wang and Xiao Zhou
Page: 448~463, Vol. 13, No.3, 2017

Keywords: Blind Image Quality Assessment (BIQA), Gaussian Blur Image, Saliency Map, Structure Tensor, Structural Similarity (SSIM)
Show / Hide Abstract

NDynamic Framework for Secure VM Migration over Cloud Computing
Suresh B. Rathod and V. Krishna Reddy
Page: 476~490, Vol. 13, No.3, 2017

Keywords: Cloud Computing, Datacenter (DC), Host Controller, Physical Host, Virtual Machine (VM)
Show / Hide Abstract

An Improved Zone-Based Routing Protocol for Heterogeneous Wireless Sensor Networks
Liquan Zhao and Nan Chen
Page: 500~517, Vol. 13, No.3, 2017

Keywords: Energy Consumption, Heterogeneous Wireless Sensor Networks, Stable Election Protocol, Zone-Based
Show / Hide Abstract

Development of a CUBRID-Based Distributed Parallel Query Processing System
Hyeong-Il Kim, HyeonSik Yang, Min Yoon and Jae-Woo Chang
Page: 518~532, Vol. 13, No.3, 2017

Keywords: CUBRID, Distributed Parallel Environment, Query Processing
Show / Hide Abstract

Improvement of OPW-TR Algorithm for Compressing GPS Trajectory Data
Qingbin Meng, Xiaoqiang Yu, Chunlong Yao, Xu Li, Peng Li and Xin Zhao
Page: 533~545, Vol. 13, No.3, 2017

Keywords: ASED, GPS Trajectory, SED, Trajectory Compression
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017

Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017

Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

Hadoop Based Wavelet Histogram for Big Data in Cloud
Jeong-Joon Kim
Page: 668~676, Vol. 13, No.4, 2017

Keywords: Big Data, Histogram, MapReduce, Wavelet
Show / Hide Abstract

Using Semantic Knowledge in the Uyghur-Chinese Person Name Transliteration
Alim Murat, Turghun Osman, Yating Yang, Xi Zhou, Lei Wang and Xiao Li
Page: 716~730, Vol. 13, No.4, 2017

Keywords: Gender, Language Origin, Semantic Knowledge-based Model, Transliteration of Person Name
Show / Hide Abstract

Weighted Local Naive Bayes Link Prediction
JieHua Wu, GuoJi Zhang, YaZhou Ren, XiaYan Zhang and Qiao Yang
Page: 914~927, Vol. 13, No.4, 2017

Keywords: Complex Network, Link Prediction, Naive Bayes Model, Weighted Network
Show / Hide Abstract

Traffic Information Service Model Considering Personal Driving Trajectories
Homin Han and Soyoung Park
Page: 951~969, Vol. 13, No.4, 2017

Keywords: GPS-to-Road Mapping Strategy, Personal Trajectory, Traffic Information System, Trajectory Estimation
Show / Hide Abstract

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs
Shailendra Rathore, Pradip Kumar Sharma and Jong Hyuk Park
Page: 1014~1028, Vol. 13, No.4, 2017

Keywords: Cross-Site Scripting Attack Detection, Dataset, JavaScript, Machine Learning Classifier, Social Networking Services
Show / Hide Abstract

A CTR Prediction Approach for Text Advertising Based on the SAE-LR Deep Neural Network
Zilong Jiang, Shu Gao and Wei Dai
Page: 1052~1070, Vol. 13, No.5, 2017

Keywords: Deep Neural Network, Machine Learning, Text Advertising, SAE-LR
Show / Hide Abstract

3D Segmentation for High-Resolution Image Datasets Using a Commercial Editing Tool in the IoT Environment
Koojoo Kwon and Byeong-Seok Shin
Page: 1126~1134, Vol. 13, No.5, 2017

Keywords: Segmentation, Large-Scale Image, Photo Editing, Visible Korean, Volume Rendering
Show / Hide Abstract

A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network
Bayu Adhi Tama and Kyung-Hyune Rhee
Page: 1203~1212, Vol. 13, No.5, 2017

Keywords: Classifier Ensembles, Classifier’s Significance, Intrusion Detection Systems (IDSs), Wireless Network
Show / Hide Abstract

Spatio-temporal Sensor Data Processing Techniques
Jeong-Joon Kim
Page: 1259~1276, Vol. 13, No.5, 2017

Keywords: Multi-dimensional Operator, Multi-dimensional Spatio-temporal Data Type, Sensor Networks, Sensor Query Processing System
Show / Hide Abstract

Efficiently Processing Skyline Query on Multi-Instance Data
Shu-I Chiu and Kuo-Wei Hsu
Page: 1277~1298, Vol. 13, No.5, 2017

Keywords: Multi-Instance Data, Product Search, Ranking, Recommendation, Skyline Query Processing
Show / Hide Abstract

Nearest Neighbor Based Prototype Classification Preserving Class Regions
Doosung Hwang and Daewon Kim
Page: 1345~1357, Vol. 13, No.5, 2017

Keywords: Class Prototype, Dissimilarity, Greedy Method, Nearest-Neighbor Rule, Set Cover Optimization
Show / Hide Abstract

Analysis on Ampacity of Overhead Transmission Lines Being Operated
Zhijie Yan, Yanling Wang and Likai Liang
Page: 1358~1371, Vol. 13, No.5, 2017

Keywords: Ampacity, Dynamic Thermal Rating, Rating Scales, Risk Level, Transmission Line
Show / Hide Abstract

Content-based Image Retrieval Using Texture Features Extracted from Local Energy and Local Correlation of Gabor Transformed Images
Hee-Hyung Bu, Nam-Chul Kim, Bae-Ho Lee and Sung-Ho Kim
Page: 1372~1381, Vol. 13, No.5, 2017

Keywords: Content-based Image Retrieval, Gabor Transformation, Local Energy, Local Correlation, Texture Feature
Show / Hide Abstract

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things
Youn-Hee Han, Hyun-Kyo Lim and Joon-Min Gil
Page: 1410~1429, Vol. 13, No.5, 2017

Keywords: Internet of Things, Location Caching Scheme, Location Tracking, Mobile Computing, Mobile Object
Show / Hide Abstract

Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model
Moulkheir Naoui, Saïd Mahmoudi and Ghalem Belalem
Page: 149~168, Vol. 12, No.1, 2016

Keywords: Active Appearance Model, Data Parallelism, Deformable Model, Distributed Image Processing, Parallel Image Processing, Segmentation
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016

Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 196~213, Vol. 12, No.2, 2016

Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE
Show / Hide Abstract

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance
Kuldeep Gurjar and Yang-Sae Moon
Page: 234~248, Vol. 12, No.2, 2016

Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016

Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016

Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks
Muhammad Sajjad Khan and Insoo Koo
Page: 295~309, Vol. 12, No.2, 2016

Keywords: Cognitive Radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion
Show / Hide Abstract

An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping
Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa and Hasan Al-Shalabi
Page: 322~331, Vol. 12, No.2, 2016

Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Page: 338~357, Vol. 12, No.3, 2016

Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

Two-Dimensional Joint Bayesian Method for Face Verification
Sunghyu Han, Il-Yong Lee and Jung-Ho Ahn
Page: 381~391, Vol. 12, No.3, 2016

Keywords: Face Verification, Joint Bayesian Method, LBP, LFW Database, Two-Dimensional Joint Bayesian Method
Show / Hide Abstract

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis
Leila Boussaad, Mohamed Benmohammed and Redha Benzid
Page: 392~409, Vol. 12, No.3, 2016

Keywords: Active Appearance Model, Age-Invariant, Face Recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016

Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification
Chouchane Ammar*, Belahcene Mebarka, Ouamane Abdelmalik and Bourennane Salah
Page: 468~488, Vol. 12, No.3, 2016

Keywords: 3D Face Verification, Depth Image, Dimensionality Reduction, Histograms Local Features, Local Descriptors, Support Vector Machine
Show / Hide Abstract

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016

Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

A Security Protection Framework for Cloud Computing
Wenzheng Zhu and Changhoon Lee
Page: 538~547, Vol. 12, No.3, 2016

Keywords: Cloud Computing, Collusive Worker, Malicious Worker, MapReduce, Non-collusive Worker
Show / Hide Abstract

A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform
Ibtissem Bekkouche and Hadria Fizazi
Page: 555~576, Vol. 12, No.4, 2016

Keywords: Fourier Transform, Fuzzy Clustering, Harmony Search, Processing Image, Remote Sensing
Show / Hide Abstract

Community Model for Smart TV over the Top Services
Suman Pandey, Young Joon Won, Mi-Jung Choi and Joon-Min Gil
Page: 577~590, Vol. 12, No.4, 2016

Keywords: Community Formation, Datamining, HbbTV, Smart TV
Show / Hide Abstract

Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images
Arif Muntasa
Page: 591~611, Vol. 12, No.4, 2016

Keywords: Eigenspaces, Feature Extraction, Homogeneous, Non-homogeneous
Show / Hide Abstract

Treatment Planning in Smart Medical: A Sustainable Strategy
Fei Hao, Doo-Soon Park, Sang Yeon Woo, Se Dong Min and Sewon Park
Page: 711~723, Vol. 12, No.4, 2016

Keywords: Degree of Membership, Fuzzy Evaluation, Smart Medical, Sustainable, Treatment Plan
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016

Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

A Robust Fingerprint Matching System Using Orientation Features
Ravinder Kumar, Pravin Chandra and Madasu Hanmandlu
Page: 83~99, Vol. 12, No.1, 2016

Keywords: Circular ROI, Core Point Detection, Image-Based Fingerprint Matching, Orientation Features
Show / Hide Abstract

Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke
Meeyeon Lee, Ye-Seul Park and Jung-Won Lee
Page: 741~753, Vol. 12, No.4, 2016

Keywords: Acute Myocardial Infarction, Data Model, Hospital Information System, Ischemic Stroke, Medical Image, Medical Information, Ontology
Show / Hide Abstract

Soft Set Theory Oriented Forecast Combination Method for Business Failure Prediction
Wei Xu and Zhi Xiao
Page: 109~128, Vol. 12, No.1, 2016

Keywords: Business Failure Prediction, Combined Forecasting Method, Qualitative Analysis, Quantitative Analysis, Receiver Operating Characteristic Curve, Soft Set Theory
Show / Hide Abstract

Analysis of Semantic Relations Between Multimodal Medical Images Based on Coronary Anatomy for Acute Myocardial Infarction
Yeseul Park, Meeyeon Lee, Myung-Hee Kim and Jung-Won Lee
Page: 129~148, Vol. 12, No.1, 2016

Keywords: Acute Myocardial Infarction, Coronary Anatomy, Coronary Angiography, Data Model, Echocardiography, Medical Images, Multimodality, Semantic Features
Show / Hide Abstract

Personalizing Information Using Users’ Online Social Networks: A Case Study of CiteULike
Danielle Lee
Page: 1~21, Vol. 11, No.1, 2015

Keywords: CiteULike, Homophily, Information Personalization, Online Social Networks, Social Network-based Recommendations
Show / Hide Abstract

A Real-Time Integrated Hierarchical Temporal Memory Network for the Real-Time Continuous Multi-Interval Prediction of Data Streams
Hyun-Syug Kang
Page: 39~56, Vol. 11, No.1, 2015

Keywords: Data Streams, Hierarchical Temporal Memory, Multiple Interval Prediction, Real-Time Prediction
Show / Hide Abstract

A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags
Haejae Jung
Page: 95~103, Vol. 11, No.1, 2015

Keywords: RFID tag identification, anti-collision protocol, data structure, query tree
Show / Hide Abstract

Spatial Interpolation of Meteorologic Variables in Vietnam using the Kriging Method
Xuan Thanh Nguyen, Ba Tung Nguyen, Khac Phong Do, Quang Hung Bui, Thi Nhat Thanh Nguyen, Van Quynh Vuong and Thanh Ha Le
Page: 134~147, Vol. 11, No.1, 2015

Keywords: Interpolation, Meteorologic Variables, Kriging
Show / Hide Abstract

An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks
Govind P. Gupta, Manoj Misra and Kumkum Garg
Page: 148~164, Vol. 11, No.1, 2015

Keywords: Agent Migration Protocol, Data Aggregation, Mobile Agent, WSN
Show / Hide Abstract

Learning to Prevent Inactive Student of Indonesia Open University
Bayu Adhi Tama
Page: 165~172, Vol. 11, No.2, 2015

Keywords: Educational Data Mining, Ensemble Techniques, Inactive Student, Open University
Show / Hide Abstract

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang and Kimoon Jeong
Page: 229~238, Vol. 11, No.2, 2015

Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Show / Hide Abstract

Genetic Symmetric Key Generation for IDEA
Nandini Malhotra and Geeta Nagpal
Page: 239~247, Vol. 11, No.2, 2015

Keywords: Crossover, IDEA, Genetic Algorithm, Mutation, Symmetric Key Generation
Show / Hide Abstract

A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation
Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee and Hong-Woo Chun
Page: 248~265, Vol. 11, No.2, 2015

Keywords: Bioinformatics, Event Extraction, Maximum Entropy, Text-Mining
Show / Hide Abstract

Counter Chain: A New Block Cipher Mode of Operation
Aly Mohamed El-Semary and Mohamed Mostafa A. Azim
Page: 266~279, Vol. 11, No.2, 2015

Keywords: Authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
Show / Hide Abstract

A Dataset of Online Handwritten Assamese Characters
Udayan Baruah and Shyamanta M. Hazarika
Page: 325~341, Vol. 11, No.3, 2015

Keywords: Assamese, Character Recognition, Dataset Collection, Data Verification, Online Handwriting, Support Vector Machine
Show / Hide Abstract

A Review of Fixed-Complexity Vector Perturbation for MU-MIMO
Manar Mohaisen
Page: 354~369, Vol. 11, No.3, 2015

Keywords: Block Diagonalization, MU-MIMO, Perfect and Imperfect Channel Knowledge, Quantization, Vector Perturbation
Show / Hide Abstract

A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases
Si-Woo Byun and Seok-Woo Jang
Page: 389~405, Vol. 11, No.3, 2015

Keywords: Column-Aware Index Management, Column-Oriented Databases, Flash Memory Storage, Game Database, Network Database
Show / Hide Abstract

Classification of Textured Images Based on Discrete Wavelet Transform and Information Fusion
Chaimae Anibou, Mohammed Nabil Saidi and Driss Aboutajdine
Page: 421~437, Vol. 11, No.3, 2015

Keywords: Discrete Wavelet Transform, Feature Extraction, Fuzzy Set Theory, Information Fusion, Probability Theory, Segmentation, Supervised Classification
Show / Hide Abstract

Text Detection in Scene Images Based on Interest Points
Minh Hieu Nguyen and Gueesang Lee
Page: 528~537, Vol. 11, No.4, 2015

Keywords: Connected Component, Interest Point, Tensor Voting, Text Detection
Show / Hide Abstract

Event Detection on Motion Activities Using a Dynamic Grid
Jitdumrong Preechasuk and Punpiti Piamsa-nga
Page: 538~555, Vol. 11, No.4, 2015

Keywords: Dynamic Grid Feature, Event Detection, Event Patterns, Pedestrian Activities
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015

Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Viewpoint Unconstrained Face Recognition Based on Affine Local Descriptors and Probabilistic Similarity
Yongbin Gao and Hyo Jong Lee
Page: 643~654, Vol. 11, No.4, 2015

Keywords: Affine Scale Invariant Feature Transform, Face Recognition, Probabilistic Similarity
Show / Hide Abstract

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia and Farnoush Banaei-Kashani
Page: 1~22, Vol. 10, No.1, 2014
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety
Show / Hide Abstract

Trivariate B-spline Approximation of Spherical Solid Objects
Junho Kim, Seung-Hyun Yoon and Yunjin Lee
Page: 23~35, Vol. 10, No.1, 2014
Keywords: Trivariate B-spline Approximation, Volume Mesh Parameterization, Topological Sphere Model, Harmonic Mapping
Show / Hide Abstract

Gesture Input as an Out-of-band Channel
Oyuntungalag Chagnaadorj and Jiro Tanaka
Page: 92~102, Vol. 10, No.1, 2014
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

Probabilistic Models for Local Patterns Analysis
Khiat Salim, Belbachir Hafida and Rahal Sid Ahmed
Page: 145~161, Vol. 10, No.1, 2014
Keywords: Global Pattern, Maximum Entropy Method, Non-derivable Itemset, Itemset Inclusion-exclusion Model
Show / Hide Abstract

Prioritized Multipath Video Forwarding in WSN
Syed Muhammad Asad Zaidi, Jieun Jung and Byunghun Song
Page: 176~192, Vol. 10, No.2, 2014
Keywords: WMSN, H.264, Multiple Paths, Quality of Service
Show / Hide Abstract

Optical Image Encryption and Decryption Considering Wireless Communication Channels
Myungjin Cho and In-Ho Lee
Page: 215~222, Vol. 10, No.2, 2014
Keywords: Optical Encryption and Decryption, Wireless Communication Channels
Show / Hide Abstract

A High Quality Steganographic Method Using Morphing
Anant M.Bagade and Sanjay N.Talbar
Page: 256~270, Vol. 10, No.2, 2014
Keywords: Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality
Show / Hide Abstract

Default Prediction for Real Estate Companies with Imbalanced Dataset
Yuan-Xiang Dong , Zhi Xiao and Xue Xiao
Page: 314~333, Vol. 10, No.2, 2014
Keywords: Default prediction, Imbalanced dataset, Real estate listed companies, Minoritysample generation approach
Show / Hide Abstract

Training-Free Fuzzy Logic Based Human Activity Recognition
Eunju Kim and Sumi Helal
Page: 335~354, Vol. 10, No.3, 2014
Keywords: Activity Semantic Knowledge, Fuzzy Logic, Human Activity Recognition, Multi-Layer Neural Network
Show / Hide Abstract

Improving Database System Performance by Applying NoSQL
Yong-Lak Choi, Woo-Seong Jeon and Seok-Hwan Yoon
Page: 355~364, Vol. 10, No.3, 2014
Keywords: Database System Performance, NoSQL, NoSQL Practical Use
Show / Hide Abstract

Imputation of Medical Data Using Subspace Condition Order Degree Polynomials
Klaokanlaya Silachan and Panjai Tantatsanawong
Page: 395~411, Vol. 10, No.3, 2014
Keywords: Imputation, Personal Temporal Data, Polynomial Interpolation
Show / Hide Abstract

Ultra Low Power Data Aggregation for Request Oriented Sensor Networks
Kwang-il Hwang and In Jang
Page: 412~428, Vol. 10, No.3, 2014
Keywords: Data Aggregation, Energy Efficient, Low Power Listening, Medium Access Control, Request Oriented, Sensor Networks
Show / Hide Abstract

Fault Detection in the Semiconductor Etch Process Using the Seasonal Autoregressive Integrated Moving Average Modeling
Muhammad Zeeshan Arshad, Javeria Muhammad Nawaz and Sang Jeen Hong
Page: 429~442, Vol. 10, No.3, 2014
Keywords: Autoregressive Integrated Moving Average, Dynamic Time Warping, Fault Detection, Seasonal Autoregressive Integrated Moving Average, Semiconductor Process, Time Series Modeling
Show / Hide Abstract

Extreme Learning Machine Ensemble Using Bagging for Facial Expression Recognition
Deepak Ghimire and Joonwhoan Lee
Page: 443~458, Vol. 10, No.3, 2014
Keywords: Bagging, Ensemble Learning, Extreme Learning Machine, Facial Expression Recognition, Histogram of Orientation Gradient
Show / Hide Abstract

Spectrum Sensing and Data Transmission in a Cognitive Relay Network Considering Spatial False Alarms
Tasnina A. Tishita, Sumiya Akhter, Md. Imdadul Islam and M. R. Amin
Page: 459~470, Vol. 10, No.3, 2014
Keywords: Cognitive Network, Conventional False Alarms, Probability of Symbol Error Rate, Spatial False Alarms, Spectrum Sensing
Show / Hide Abstract

Efficient Greedy Algorithms for Influence Maximization in Social Networks
Jiaguo Lv, Jingfeng Guo and Huixiao Ren
Page: 471~482, Vol. 10, No.3, 2014
Keywords: Greedy Algorithm, Influence Maximization, Social Network
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Page: 491~502, Vol. 10, No.4, 2014
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

The Accuracy of the Non-continuous I Test for One- Dimensional Arrays with References Created by Induction Variables
Qing Zhang
Page: 523~542, Vol. 10, No.4, 2014
Keywords: Data Dependence Analysis, Loop Parallelization, Loop Vectorization, Parallelizing/Vectorizing Compilers
Show / Hide Abstract

A Step towards User Privacy while Using Location-Based Services
Fizza Abbas and Heekuck Oh
Page: 618~627, Vol. 10, No.4, 2014
Keywords: Location Based Services, Location Privacy, Point of Interests
Show / Hide Abstract

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering
Woon-hae Jeong, Se-jun Kim, Doo-soon Park and Jin Kwak
Page: 157~172, Vol. 9, No.1, 2013
Keywords: Collaborative Filtering, Movie Recommendation System, Personal Propensity, Security, Push Stack
Show / Hide Abstract

Region-Based Facial Expression Recognition in Still Images
Gawed M. Nagi, Rahmita Rahmat, Fatimah Khalid and Muhamad Taufik
Page: 173~188, Vol. 9, No.1, 2013
Keywords: Facial Expression Recognition (FER), Facial Features Detection, Facial Features Extraction, Cascade Classifier, LBP, One-Vs-Rest SVM
Show / Hide Abstract

An Analysis of Replication Enhancement for a High Availability Cluster
Sehoon Park, Im Y. Jung, Heonsang Eom and Heon Y. Yeom
Page: 205~216, Vol. 9, No.2, 2013
Keywords: High-Availability Cluster, Replication Enhancement, SRM, DRBD
Show / Hide Abstract

An Improved Approach to Ranking Web Documents
Pooja Gupta, Sandeep K. Singh, Divakar Yadav and A. K. Sharma
Page: 217~236, Vol. 9, No.2, 2013
Keywords: Ranking, Ordering, WWW, Information Retrieval, Contextual Relevance, Contextual Sense, Web Documents
Show / Hide Abstract

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance
Hoo-Rock Lee, Kyung-Yul Chung and Kyoung-Son Jhang
Page: 237~246, Vol. 9, No.2, 2013
Keywords: Maintenance Hatch, Underground Facilities, WSN, Routing Protocol, ns-2
Show / Hide Abstract

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Sun-Ho Lee and Im-Yeong Lee
Page: 287~300, Vol. 9, No.2, 2013
Keywords: Searchable Encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage
Show / Hide Abstract

An Improvement Video Search Method for VP-Tree by using a Trigonometric Inequality
Samuel Sangkon Lee, Masami Shishibori and Chia Y. Han
Page: 315~332, Vol. 9, No.2, 2013
Keywords: Vantage Point; VP-Tree; Trigonometric Inequality; Search Algorithm; Range Search; Nearest Neighbor Search; AESA algorithm; Multimedia Database
Show / Hide Abstract

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do and Deokjai Choi
Page: 333~348, Vol. 9, No.2, 2013
Keywords: Gait Recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, Identification, Signal Processing
Show / Hide Abstract

Interactive Semantic Image Retrieval
Pushpa B. Patil and Manesh B. Kokare
Page: 349~364, Vol. 9, No.3, 2013
Keywords: Content-based Image Retrieval (CBIR), Relevance Feedback (RF), Rotated Complex Wavelet Filt ers (RCWFs), Dual Tree Complex Wavelet, and Image retrieval
Show / Hide Abstract

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
Komal Mahajan, Ansuyia Makroo and Deepak Dahiya
Page: 379~394, Vol. 9, No.3, 2013
Keywords: Virtual Machine (VM), Server affinity, VM load balancer, CloudAnalyst, Data center, Cloudlet
Show / Hide Abstract

Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine
Young Sup Hwang, Jin Baek Kwon, Jae Chan Moon and Seong Je Cho
Page: 395~404, Vol. 9, No.3, 2013
Keywords: adaptive classification, malicious web pages, support vector machine
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

A Regularity-Based Preprocessing Method for Collaborative Recommender Systems
Raciel Yera Toledo, Yailé Caballero Mota and Milton García Borroto
Page: 435~460, Vol. 9, No.3, 2013
Keywords: Collaborative Recommender Systems, Inconsistencies, Rating Regularities
Show / Hide Abstract

Self-Localized Packet Forwarding in Wireless Sensor Networks
Tarun Dubey and O. P. Sahu
Page: 477~488, Vol. 9, No.3, 2013
Keywords: Localization, Node Density, Packet Forwarding, Redundancy, WSNs
Show / Hide Abstract

Developing a Dynamic Materialized View Index for Efficiently Discovering Usable Views for Progressive Queries
Chao Zhu, Qiang Zhu, Calisto Zuzarte and Wenbin Ma
Page: 511~537, Vol. 9, No.4, 2013
Keywords: Database, query processing, query optimization, progressive query, materialized view, index
Show / Hide Abstract

The Architectural Pattern of a Highly Extensible System for the Asynchronous Processing of a Large Amount of Data
Ro Man Hwang, Soo Kyun Kim, Syungog An and Dong-Won Park
Page: 567~574, Vol. 9, No.4, 2013
Keywords: Large data, UML Diagram, Object-Oriented Software
Show / Hide Abstract

Simple Fuzzy Rule Based Edge Detection
O.P. Verma, Veni Jain and Rajni Gumber
Page: 575~591, Vol. 9, No.4, 2013
Keywords: Edge detection, Edge improvement, Fuzzy rules, Membership function
Show / Hide Abstract

A Computational Intelligence Based Online Data Imputation Method: An Application For Banking
Kancherla Jonah Nishanth and Vadlamani Ravi
Page: 633~650, Vol. 9, No.4, 2013
Keywords: Data Imputation, General Regression Neural Network (GRNN), Evolving Clustering Method (ECM), Imputation, K-Medoids clustering, K-Means clustering, MLP
Show / Hide Abstract

A Network-Based Handover Scheme in HIP-Based Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 651~659, Vol. 9, No.4, 2013
Keywords: HIP, network-based, handover, simulations
Show / Hide Abstract

Dynamic knowledge mapping guided by data mining: Application on Healthcare
Menaouer Brahami, Baghdad Atmani and Nada Matta
Page: 1~30, Vol. 9, No.1, 2013
Keywords: Knowledge Management, Knowledge Mapping (Knowledge Cartography), Knowledge Representation, Boolean Modeling, Cellular Machine, Data Mining, Boolean Inference Engine
Show / Hide Abstract

A Feature Selection-based Ensemble Method for Arrhythmia Classification
Erdenetuya Namsrai, Tsendsuren Munkhdalai, Meijing Li, Jung-Hoon Shin, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 31~40, Vol. 9, No.1, 2013
Keywords: Data Mining, Ensemble Method, Feature Selection, Arrhythmia Classification
Show / Hide Abstract

Using a Cellular Automaton to Extract Medical Information from Clinical Reports
Fatiha Barigou, Baghdad Atmani and Bouziane Beldjilali
Page: 67~84, Vol. 8, No.1, 2012
Keywords: Clinical Reports, Information Extraction, Cellular Automaton, Boolean Inference Engine
Show / Hide Abstract

Hartley Transform Based Fingerprint Matching
Sangita Bharkad and Manesh Kokare
Page: 85~100, Vol. 8, No.1, 2012
Keywords: Biometrics, Feature Extraction, Hartley Transform, Discrete Wavelet Transform, Fingerprint Matching
Show / Hide Abstract

Fault Prediction Using Statistical and Machine Learning Methods for Improving Software Quality
Ruchika Malhotra and Ankita Jain
Page: 241~262, Vol. 8, No.2, 2012
Keywords: Empirical Validation, Object Oriented, Receiver Operating Characteristics, Statistical Methods, Machine Learning, Fault Prediction
Show / Hide Abstract

Dynamic Replication Based on Availability and Popularity in the Presence of Failures
Bakhta Meroufel and Ghalem Belalem
Page: 263~278, Vol. 8, No.2, 2012
Keywords: Data Grid, Dynamic Replication, Availability, Failures, Best Client, Best Responsible, Data Management
Show / Hide Abstract

The Use of MSVM and HMM for Sentence Alignment
Mohamed Abdel Fattah
Page: 301~314, Vol. 8, No.2, 2012
Keywords: Sentence Alignment, English/ Arabic Parallel Corpus, Parallel Corpora, Machine Translation, Multi-Class Support Vector Machine, Hidden Markov model
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

Texture Comparison with an Orientation Matching Scheme
Nguyen Cao Truong Hai, Do-Yeon Kim and Hyuk-Ro Park
Page: 389~398, Vol. 8, No.3, 2012
Keywords: Orientation Matching, Texture Analysis, Texture Comparison, K-means Clustering
Show / Hide Abstract

A Method for Learning Macro-Actions for Virtual Characters Using Programming by Demonstration and Reinforcement Learning
Yunsick Sung and Kyungeun Cho
Page: 409~420, Vol. 8, No.3, 2012
Keywords: Reinforcement Learning, Monte Carlo Method, Behavior Generation Model, Programming B y Demonstration, Macro-Action, Multi-Step Action
Show / Hide Abstract

Iris Recognition Using Ridgelets
Lenina Birgale and Manesh Kokare
Page: 445~458, Vol. 8, No.3, 2012
Keywords: Ridgelets, Texture, Wavelets, Biometrics, Features, Database
Show / Hide Abstract

Web-Based Computational System for Protein- Protein Interaction Inference
Ki-Bong Kim
Page: 459~470, Vol. 8, No.3, 2012
Keywords: Protein-Protein Interactions (PPIs), WASPI (Web-based Assistant System for Protein-protein interaction Inference), InterPro, InterProScan, BLAST
Show / Hide Abstract

Performance Evaluation of Multi-Hop Communication Based on a Mobile Multi-Robot System in a Subterranean Laneway
Qing-Ling Liu and Duk-Hwan Oh
Page: 471~482, Vol. 8, No.3, 2012
Keywords: Multi-hop Communication, Wireless Sensor Network, Multi-Robot System, Disaster Exploration, ZigBee Technology, Underground Environment
Show / Hide Abstract

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face
M.P. Satone and Dr. G.K. Kharate
Page: 483~494, Vol. 8, No.3, 2012
Keywords: Face Recognition, Princ ipal Component Analysis, Subband, Wavelet Transform
Show / Hide Abstract

An Adaptive Workflow Scheduling Scheme Based on an Estimated Data Processing Rate for Next Generation Sequencing in Cloud Computing
Byungsang Kim, Chan-Hyun Youn, Yong-Sung Park, Yonggyu Lee and Wan Choi
Page: 555~566, Vol. 8, No.4, 2012
Keywords: Resource-Provisioning, Bio-Workflow Broker, Next-Generation Sequencing
Show / Hide Abstract

An Active Co-Training Algorithm for Biomedical Named-Entity Recognition
Tsendsuren Munkhdalai, Meijing Li, Unil Yun, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 575~588, Vol. 8, No.4, 2012
Keywords: Biomedical Named-Entity Recognition, Co-Training, Semi-Supervised Learning, Feature Processing, Text Mining
Show / Hide Abstract

A Survey of QoS Based Routing Protocols for Wireless Sensor Networks
R.Sumathi and M.G.Srinivas
Page: 589~602, Vol. 8, No.4, 2012
Keywords: Wireless Sensor Networks, Quality of Service, Reliability, Energy Efficiency, End-To-End Delay, Critical Data
Show / Hide Abstract

Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6
Hyon-Young Choi, Sung-Gi Min, Youn-Hee Han and Rajeev Koodli
Page: 603~620, Vol. 8, No.4, 2012
Keywords: Flow Mobility, Proxy Mobile IPv6
Show / Hide Abstract

A Comparative Study of Estimation by Analogy using Data Mining Techniques
Geeta Nagpal, Moin Uddin and Arvinder Kaur
Page: 621~652, Vol. 8, No.4, 2012
Keywords: Software Estimations, Estimation by Analogy, Grey Relational Analysis, Robust Regression, Data Mining Techniques
Show / Hide Abstract

ECG Denoising by Modeling Wavelet Sub-Band Coefficients using Kernel Density Estimation
Shubhada Ardhapurkar, Ramchandra Manthalkar and Suhas Gajre
Page: 669~684, Vol. 8, No.4, 2012
Keywords: Kernel Density Estimation, Discrete Wavelet Transform, Probability Density Function (PDF), Signal to Noise Ratio
Show / Hide Abstract

A Clustering Protocol with Mode Selection for Wireless Sensor Network
Aries Kusdaryono and Kyung Oh Lee
Page: 29~42, Vol. 7, No.1, 2011
Keywords: Ad Hoc Network, Wireless Sensor Networks, Clustering, Routing Protocol
Show / Hide Abstract

Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20
Mouhamed Abdulla and Yousef R. Shayan
Page: 43~52, Vol. 7, No.1, 2011
Keywords: MBWA, IEEE 802.20, Interference, Mobility, Degradation
Show / Hide Abstract

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances
Ivy Ong and Hyotaek Lim
Page: 53~62, Vol. 7, No.1, 2011
Keywords: iATA Protocol, Load Balancing, Network Monitoring, Storage Network Solution, Write Replication
Show / Hide Abstract

Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits
Haiqing Nan, Kyung Ki Kim, Wei Wang and Ken Choi
Page: 93~102, Vol. 7, No.1, 2011
Keywords: PVT Variation sensors, Yield, Voltage Scaling, Frequency Scaling
Show / Hide Abstract

Lifting a Metadata Model to the Semantic Multimedia World
Gaetan Martens, Ruben Verborgh, Chris Poppe and Rik Van de Walle
Page: 199~208, Vol. 7, No.1, 2011
Keywords: Multimedia, Metadata Annotation, Semantic Web Technologies
Show / Hide Abstract

An Efficient Broadcast Technique for Vehicular Networks
Ai Hua Ho, Yao H. Ho, Kien A. Hua, Roy Villafane and Han-Chieh Chao
Page: 221~240, Vol. 7, No.2, 2011
Keywords: V2V Communication Protocols, Vehicular Network, Ad Hoc Network, Broadcast, Broadcasting Storm, Routing
Show / Hide Abstract

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks
Mohammad S. Obaidat, Sanjay K. Dhurandher and Khushboo Diwakar
Page: 241~260, Vol. 7, No.2, 2011
Keywords: Routing, Multimedia Networks, Congestion-aware Selection, MANET, CASPER, Performance Evaluation
Show / Hide Abstract

Parallel Prefix Computation and Sorting on a Recursive Dual-Net
Yamin Li, Shietung Peng and Wanming Chu
Page: 271~286, Vol. 7, No.2, 2011
Keywords: Interconnection Networks, Algorithm, Parallel Prefix Computation, Sorting
Show / Hide Abstract

Analysis of Generalized Impact Factors and the Indices of Journals
Ash Mohammad Abbas
Page: 341~354, Vol. 7, No.2, 2011
Keywords: Information Systems, Quality of Research, Impact factor, h-index, g-index
Show / Hide Abstract

An Adequacy Based Test Data Generation Technique Using Genetic Algorithms
Ruchika Malhotra and Mohit Garg
Page: 363~384, Vol. 7, No.2, 2011
Keywords: Software Testing, Adequacy Based Testing Criteria, Reliability Based Testing Criteria, Genetic Algorithms, Mutation Analysis
Show / Hide Abstract

A Novel Similarity Measure for Sequence Data
Mohammad. H. Pandi, Omid Kashefi and Behrouz Minaei
Page: 413~424, Vol. 7, No.3, 2011
Keywords: Sequence Data, Similarity Measure, Sequence Mining
Show / Hide Abstract

Wavelet-based Feature Extraction Algorithm for an Iris Recognition System
Ayra Panganiban, Noel Linsangan and Felicito Caluyo
Page: 425~434, Vol. 7, No.3, 2011
Keywords: Biometrics, Degrees of Freedom, Iris Recognition, Wavelet
Show / Hide Abstract

An Approach to Art Collections Management and Content-based Recovery
Concepcion Perez de Celis Herrero, Jaime Lara Alvarez, Gustavo Cossio Aguilar and Maria J. Somodevilla Garcia
Page: 447~458, Vol. 7, No.3, 2011
Keywords: Search by Content, Faceted Classification, IT, Collections Management, Metadata, Information Retrieval
Show / Hide Abstract

A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments
Yuki Fujiwara, Susumu Date, Kohei Ichikawa and Haruo Takemura
Page: 581~594, Vol. 7, No.4, 2011
Keywords: T iled Display Wall, SAGE, Multiple Application Control
Show / Hide Abstract

A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal
Amartya Neogi, Abhoy Chand Mondal and Soumitra Kumar Mandal
Page: 595~612, Vol. 7, No.4, 2011
Keywords: Performance Appraisal, Cascaded Fuzzy Inference System, University Non-Teaching Staff, Sensitivity Analysis, Gaussian MF, Fuzzy Rules
Show / Hide Abstract

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks
Ji-In Kim and Seok-Joo Koh
Page: 627~634, Vol. 7, No.4, 2011
Keywords: Proxy Mobile IPv6, Handover, Partial Bicasting, Buffering, Simulation Analysis
Show / Hide Abstract

A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study
Seo-Young Noh and Shashi K. Gadia
Page: 635~652, Vol. 7, No.4, 2011
Keywords: Parametric Data Model, Model Comparison, ParaSQL, Spatiotemporal Data
Show / Hide Abstract

A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Joon-Min Gil and Mihye Kim
Page: 707~716, Vol. 7, No.4, 2011
Keywords: Desktop Grids, Execution Behavior, Log Analysis System, REST Web Services, Resource Group-based Task Scheduling
Show / Hide Abstract

Stream-based Biomedical Classification Algorithms for Analyzing Biosignals
Simon Fong, Yang Hang, Sabah Mohammed and Jinan Fiaidhi
Page: 717~732, Vol. 7, No.4, 2011
Keywords: Data Stream Mining, VFDT, OVFDT, C4.5 and Biomedical Domain
Show / Hide Abstract

TOSS: Telecom Operations Support Systems for Broadband Services
Yuan-Kai Chen, Chang-Ping Hsu, Chung-Hua Hu, Rong-Syh Lin, Yi-Bing Lin, Jian-Zhi Lyu, Wudy Wu and Heychyi Young
Page: 1~20, Vol. 6, No.1, 2010
Keywords: Operations Support System (OSS), New Generation Operations Systems and Software (NGOSS), enhanced Telecom Operations Map (eTOM), Internet Protocol Television (IPTV), IP-Virtual Private Network (IP-VPN)
Show / Hide Abstract

GML Map Visualization on Mobile Devices
Eun-Ha Song and Young-Sik Jeong
Page: 33~42, Vol. 6, No.1, 2010
Keywords: Map Visualization, DXF, DWG, SHP, GML, POI, Trace Monitoring
Show / Hide Abstract

A Hexagon Tessellation Approach for the Transmission Energy Efficiency in Underwater Wireless Sensor Networks
Sungun Kim, Hyunsoo Cheon, Sangbo Seo, Seungmi Song and Seonyeong Park
Page: 53~66, Vol. 6, No.1, 2010
Keywords: UWSN, Hexagon Tessellation, Energy Efficiency, Hybrid
Show / Hide Abstract

Approximate Clustering on Data Streams Using Discrete Cosine Transform
Feng Yu, Damalie Oyana, Wen-Chi Hou and Michael Wainer
Page: 67~78, Vol. 6, No.1, 2010
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression
Show / Hide Abstract

Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams
Younghee Kim, Wonyoung Kim and Ungmo Kim
Page: 79~90, Vol. 6, No.1, 2010
Keywords: Frequent Itemsets, Weighted Support, Window Sliding, Weighted Support FP-Tree, Data Stream, WSFI-Mine
Show / Hide Abstract

IMTAR: Incremental Mining of General Temporal Association Rules
Anour F.A. Dafa-Alla, Ho Sun Shon, Khalid E.K. Saeed, Minghao Piao, Un-il Yun, Kyung Joo Cheoi and Keun Ho Ryu
Page: 163~176, Vol. 6, No.2, 2010
Keywords: Incremental Mining of General Temporal Association Rules, Incremental TFP-Tree
Show / Hide Abstract

Fast Fuzzy Control of Warranty Claims System
Sang-Hyun Lee, Sung Eui Cho and Kyung-li Moon
Page: 209~218, Vol. 6, No.2, 2010
Keywords: Warranty Claims, Age, Usage, Fuzzy Logic
Show / Hide Abstract

Recognition of Human Facial Expression in a Video Image using the Active Appearance Model
Gyeong-Sic Jo and Yong-Guk Kim
Page: 261~268, Vol. 6, No.2, 2010
Keywords: Active Appearance Model, Facial Expression Recognition, Image Alignment Method
Show / Hide Abstract

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks
Mohamed Mostafa A. Azim
Page: 295~306, Vol. 6, No.3, 2010
Keywords: Wireless Sensor Network(WSN), Energy Efficient Routing
Show / Hide Abstract

Stakeholders Driven Requirements Engineering Approach for Data Warehouse Development
Manoj Kumar, Anjana Gosain and Yogesh Singh
Page: 385~402, Vol. 6, No.3, 2010
Keywords: Agent, Dependencies Among Agents, Stakeholders of the Organization, Data Warehouse Requirements Engineering, Early Requirements Engineering, Late Requirements Engineering
Show / Hide Abstract

Hiding Secret Data in an Image Using Codeword Imitation
Zhi-Hui Wang, Chin-Chen Chang and Pei-Yu Tsai
Page: 435~452, Vol. 6, No.4, 2010
Keywords: Data Hiding, Steganography, Vector Quantization
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Mining Spatio-Temporal Patterns in Trajectory Data
Juyoung Kang and Hwan-Seung Yong
Page: 521~536, Vol. 6, No.4, 2010
Keywords: Data Mining, Spatio-Temporal Data Mining, Trajectory Data, Frequent Spatio-Temporal Patterns
Show / Hide Abstract

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System
Hyung-Min Lim, Kun-Won Jang and Byung-Gi Kim
Page: 609~620, Vol. 6, No.4, 2010
Keywords: u-Learning, e-Learning, Event Hooking, Content packing
Show / Hide Abstract

SVD-LDA: A Combined Model for Text Classification
Nguyen Cao Truong Hai, Kyung-Im Kim and Hyuk-Ro Park
Page: 5~10, Vol. 5, No.1, 2009
Keywords: Latent Dirichlet Allocation, Singular Value Decomposition, Input Filtering, Text Classification, Data Preprocessing.
Show / Hide Abstract

A Survey of Face Recognition Techniques
Rabia Jafri and Hamid R Arabnia
Page: 41~68, Vol. 5, No.2, 2009
Keywords: Face Recognition, Person Identification, Biometrics
Show / Hide Abstract

A Scalable Wireless Body Area Network for Bio-Telemetry
Adnan Saeed, Miad Faezipour, Mehrdad Nourani, Subhash Banerjee, Gil Lee, Gopal Gupta and Lakshman Tamil
Page: 77~86, Vol. 5, No.2, 2009
Keywords: Body Area Network, Plug-and-Play Biosensors, Telemedicine, Ubiquitous Computing, ECG Monitoring, ECG Feature Extraction
Show / Hide Abstract

Utility-based Rate Allocation Scheme for Mobile Video Streaming over Femtocell Networks
Shan Guo Quan, Jian Xu and Young Yong Kim
Page: 151~158, Vol. 5, No.3, 2009
Keywords: Utility, femtocell network, backhaul, cross-talk, video streaming
Show / Hide Abstract

On Effective Slack Reclamation in Task Scheduling for Energy Reduction
Young Choon Lee and Albert Y Zomaya
Page: 175~186, Vol. 5, No.4, 2009
Keywords: Scheduling, Energy Awareness, Green Computing, Dynamic Voltage and Frequency Scaling, Data Centers
Show / Hide Abstract

Dynamic Reservation Scheme of Physical Cell Identity for 3GPP LTE Femtocell Systems
Poongup Lee, Jangkeun Jeong, Navrati Saxena and Jitae Shin
Page: 207~220, Vol. 5, No.4, 2009
Keywords: Femtocell, Physical Cell Identity (PCI), Access Control, Long Term Evolution (LTE)
Show / Hide Abstract

Spatial Query Processing Based on Minimum Bounding in Wireless Sensor Networks
Sun Ok Yang and SungSuk Kim
Page: 229~236, Vol. 5, No.4, 2009
Keywords: Notification Message, Parent Selection Message, Spatial Query Process, Minimum Bounding Area
Show / Hide Abstract

Two-Tier Storage DBMS for High-Performance Query Processing
Sang-Hun Eo, Yan Li, Ho-Seok Kim and Hae-Young Bae
Page: 9~16, Vol. 4, No.1, 2008
Keywords: DBMS, Storage Management, Query Processing
Show / Hide Abstract

Inverted Index based Modified Version of KNN for Text Categorization
Taeho Jo
Page: 17~26, Vol. 4, No.1, 2008
Keywords: String Vector, K- Nearest Neighbor, Text Categorization
Show / Hide Abstract

An Empirical Study of Qualities of Association Rules from a Statistical View Point
Maryann Dorn, Wen-Chi Hou, Dunren Che and Zhewei Jiang
Page: 27~32, Vol. 4, No.1, 2008
Keywords: Data Mining, Association Rule Mining, Rule Evaluation, Chi-square Test
Show / Hide Abstract

Inverted Index based Modified Version of K-Means Algorithm for Text Clustering
Taeho Jo
Page: 67~76, Vol. 4, No.2, 2008
Keywords: String Vector, K Means Algorithm, Text Clustering
Show / Hide Abstract

Decision of Abnormal Quality Unit Lists from Claim Database
Sang-Hyun Lee, Sang-joon Lee, Kyung-li Moon and Byung-Ki Kim
Page: 113~120, Vol. 4, No.3, 2008
Keywords: Claim, Production, Abnormal Quality, Decision Support
Show / Hide Abstract

Eager Data Transfer Mechanism for Reducing Communication Latency in User-Level Network Protocols
Chulho Won, Ben Lee, Kyoung Park and Myung-Joon Kim
Page: 133~144, Vol. 4, No.4, 2008
Keywords: Data Transfer, Cache Coherence, User-Level, Low-Latency, Network Protocols, Message, VIA
Show / Hide Abstract

A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks
Kap-Dong Kim, Kwangil Lee, Jun-Hee Park and Sang-Ha Kim
Page: 1~7, Vol. 3, No.1, 2007
Keywords: MANET Multicast Protocol, Overlay Multicast, Group Mobility
Show / Hide Abstract

Static Type Assignment for SSA Form in CTOC
Ki-Tae Kim and Weon-Hee Yoo
Page: 26~32, Vol. 3, No.1, 2007
Keywords: Bytecode, control flow graph, Static Single Assignment, Static Type Assignment
Show / Hide Abstract

Feature Extraction of Concepts by Independent Component Analysis
Altangerel Chagnaa, Cheol-Young Ock, Chang-Beom Lee and Purev Jaimai
Page: 33~37, Vol. 3, No.1, 2007
Keywords: Independent Component Analysis, Clustering, Latent Concepts.
Show / Hide Abstract

An Efficient Functional Analysis Method for Micro-array Data Using Gene Ontology
Dong-wan Hong, Jong-keun Lee, Sung-soo Park, Sang-kyoon Hong and Jee-hee Yoon
Page: 38~42, Vol. 3, No.1, 2007
Keywords: Micro-array data, Functional analysis, Gene Ontology, Informative genes.
Show / Hide Abstract

Addressing Mobile Agent Security through Agent Collaboration
Evens Jean, Yu Jiao and Ali R Hurson
Page: 43~53, Vol. 3, No.2, 2007
Keywords: Disk Striping, Multimedia System, Bandwidth
Show / Hide Abstract

An Efficient Audio Watermark Extraction in Time Domain
Heawon Kang and Sung-Hwan Jung
Page: 13~17, Vol. 2, No.1, 2006
Keywords: audio watermarking, blind detection Wavelet
Show / Hide Abstract

A Feature Selection Technique based on Distributional Differences
Sung-Dong Kim
Page: 23~27, Vol. 2, No.1, 2006
Keywords: Feature Selection, Distributional Differences
Show / Hide Abstract

TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network
Yuan Yang, Fu Zhen, Tae-Seok Lee and Myong-Soon Park
Page: 39~43, Vol. 2, No.1, 2006
Keywords: Wireless Sensor Network, MAC protocol, traffic aware, sleep/wake mechanism
Show / Hide Abstract

Distance Functions to Detect Changes in Data Streams
Ulziitugs Bud and JongTae Lim
Page: 44~47, Vol. 2, No.1, 2006
Keywords: change detection, distance functions.
Show / Hide Abstract

Monitoring Systems for Embedded Equipment in Ubiquitous Environments
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park and Jung-Ho Park
Page: 58~66, Vol. 2, No.1, 2006
Keywords: Ubiquitous Computing, Monitoring System, Sensor Network
Show / Hide Abstract

ASVMRT: Materialized View Selection Algorithm in Data Warehouse
Jin-Hyuk Yang and In-Jeong Chung
Page: 67~75, Vol. 2, No.2, 2006
Keywords: Materialized views, Data Warehouse, and Clustering
Show / Hide Abstract

An Evaluation of Multimedia Data Downstream with PDA in an Infrastructure Network
Youn-Sik Hong and Hye-Sun Hur
Page: 76~81, Vol. 2, No.2, 2006
Keywords: Multimedia data, downstream, PDA, TCP window size, inter-packet delay
Show / Hide Abstract

Data-Hiding Method using Digital Watermark in the Public Multimedia Network
Jung-Hee Seo and Hung-Bog Park
Page: 82~87, Vol. 2, No.2, 2006
Keywords: Digital Watermark, Scalable, Wavelet, Public Multimedia Network
Show / Hide Abstract

A New Fair Call Admission Control for Integrated Voice and Data Traffic in Wireless Mobile Networks
Young Ha Hwang, Sung-Kee Noh and Sang-Ha Kim
Page: 107~113, Vol. 2, No.2, 2006
Keywords: CAC, QoS, Fairness, Integrated service, Wireless mobile networks
Show / Hide Abstract

A Knowledge Discovery Framework for Spatiotemporal Data Mining
Jun-Wook Lee and Yong-Joon Lee
Page: 124~129, Vol. 2, No.2, 2006
Keywords: spatiotemporal data mining, spatiotemporal knowledge discovery, spatiotemporal moving pattern, discovery framework
Show / Hide Abstract

A Study of a Server Selection Model for Selecting a Replicated Server based on Downstream Measurement in the Server-side
Seung-Hae Kim, Won-Hyuk Lee and Gi-Hwan Cho
Page: 130~136, Vol. 2, No.2, 2006
Keywords: server selection, replicated server, measurement
Show / Hide Abstract

Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos
Kyuhee An, Kiyeal Lee and Mokdong Chung
Page: 170~177, Vol. 2, No.3, 2006
Keywords: RFID, EPCglobal Network, Framework, Business Process, Computer Security
Show / Hide Abstract

A Study on the Design of the Monitoring Architecture for Embedded Kernels based on LTT
Ji-Hye Bae, Yoon-Young Park and Jung-Ho Park
Page: 1~8, Vol. 1, No.1, 2005
Keywords: Monitoring tool, NFS, LTT, MONETA 2.0
Show / Hide Abstract

Robust Real-time Intrusion Detection System
Byung-Joo Kim and Il-Kon Kim
Page: 9~13, Vol. 1, No.1, 2005
Keywords: real-time IDS, kernel PCA. LS-SVM
Show / Hide Abstract

A Multiple Instance Learning Problem Approach Model to Anomaly Network Intrusion Detection
Ill-Young Weon, Doo-Heon Song, Sung-Bum Ko and Chang-Hoon Lee
Page: 14~21, Vol. 1, No.1, 2005
Keywords: Multiple Instance Learning Problem, Network Intrusion Detection, Anomaly Detection
Show / Hide Abstract

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation
Jung-Ho Eom, Seon-Ho Park, Tae-Kyung Kim and Tai-Myoung Chung
Page: 79~85, Vol. 1, No.1, 2005
Keywords: Risk management, Risk Analysis, Asset analysis, 2-dimensional qualitative analysis
Show / Hide Abstract

A Statistic Correlation Analysis Algorithm Between Land Surface Temperature and Vegetation Index
Hyung Moo Kim, Beob Kyun Kim and Kang Soo You
Page: 102~106, Vol. 1, No.1, 2005
Keywords: LST, NDVI, Correlation Analysis, Landsat ETM+
Show / Hide Abstract

Short-Term Wind Speed Forecast Based on Least Squares Support Vector Machine
Yanling Wang, Xing Zhou, Likai Liang, Mingjun Zhang, Qiang Zhang and Zhiqiang Niu
Page: 0~0, Vol. 0, No.0, 0
Keywords: Cluster Analysis, Least Squares, Least Squares Support Vector Regression (LSSVR), Particle Swarm Optimization (PSO), Short-Time Wind Speed Forecasting
Show / Hide Abstract