Search Word(s) in Title, Keywords, Authors, and Abstract: Design

A Development of LDA Topic Association Systems Based on Spark-Hadoop Framework
Kiejin Park and Limei Peng
Page: 140~149, Vol. 14, No.1, 2018
Keywords: Association Analysis, Hadoop, LDA (Latent Dirichlet Allocation), Spark, Topic Model
Show / Hide Abstract

Convolutional Neural Network Based Multi-feature Fusion for Non-rigid 3D Model Retrieval
Hui Zeng, Yanrong Liu, Siqi Li, JianYong Che and Xiuqing Wang
Page: 176~190, Vol. 14, No.1, 2018
Keywords: Convolutional Neural Network, HKS, Multi-Feature Fusion, Non-rigid 3D Model, WKS
Show / Hide Abstract

Security and Privacy in Ubiquitous Sensor Networks
Alfredo J. Perez, Sherali Zeadally and Nafaa Jabeur
Page: 286~308, Vol. 14, No.2, 2018
Keywords: Human-Centric Sensing, Internet of Things, Opportunistic Sensing, Participatory Sensing, Privacy, Security, Ubiquitous Sensing
Show / Hide Abstract

Dynamic Cloud Resource Reservation Model Based on Trust
Jiao-Hong Qiang, Ding-Wan Ning, Tian-Jun Feng and Li-Wei Ping
Page: 377~398, Vol. 14, No.2, 2018
Keywords: Cloud-Domain-Based Management Architecture, Decision of Candidate Resources, Dynamic Resource Reservation, Two-Way Trust Evaluation Mechanism
Show / Hide Abstract

Optimization of Train Working Plan based on Multiobjective Bi-level Programming Model
Xiaowei HAI and Chanchan ZHAO
Page: 487~498, Vol. 14, No.2, 2018
Keywords: Bi-Level Programming, Genetic Algorithm, Multiobjective, Train Working Plan
Show / Hide Abstract

An Effective Denoising Method for Images Contaminated with Mixed Noise Based on Adaptive Median Filtering and Wavelet Threshold Denoising
Lin Lin
Page: 539~551, Vol. 14, No.2, 2018
Keywords: Adaptive Median Filter (AMF), Gaussian Mixture Model (GMM), Image Denoising, Mixed Noise, Wavelet Threshold Denoising
Show / Hide Abstract

Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model
Jin-Wook Jang
Page: 607~620, Vol. 14, No.3, 2018
Keywords: Automobile Control Software, Risk-based Test, Software Testing Process, Test Design, Test Planning, Test Policy and Strategy, TMMi Assessment
Show / Hide Abstract

New Similarity Measures of Simplified Neutrosophic Sets and Their Applications
Chunfang Liu
Page: 790~800, Vol. 14, No.3, 2018
Keywords: Multi-Criteria Decision-Making, Pattern Recognition, Similarity Measure, Simplified Neutrosophic Sets
Show / Hide Abstract

An Improved Spin Echo Train De-noising Algorithm in NMRL
Feng Liu and Shuangbao Ma
Page: 941~947, Vol. 14, No.4, 2018
Keywords: Nuclear Magnetic Resonance Logging, Signal to Noise Ratio, Spin Echo Train, Wavelet Transform
Show / Hide Abstract

Significant Motion-Based Adaptive Sampling Module for Mobile Sensing Framework
Muhammad Fiqri Muthohar, I Gde Dharma Nugraha and Deokjai Choi
Page: 948~960, Vol. 14, No.4, 2018
Keywords: Adaptive Sampling, Android Mobile Sensing Framework, Significant Motion Sensor
Show / Hide Abstract

Designing a Vibrotactile Reading System for Mobile Phones
Shaowei Chu and Keying Zhu
Page: 1102~1113, Vol. 14, No.5, 2018
Keywords: Blind Use, Mobile Accessibility, Tactile Reading, User Study, Vibrotactile Interface
Show / Hide Abstract

A Physical Storage Design Method for Access Structures of Image Information Systems
Jung-A Lee and Jong-Hak Lee
Page: 1150~1166, Vol. 14, No.5, 2018
Keywords: Image Access Structure, Image Retrieval Query, Multidimensional File Organizations, Physical Storage Design
Show / Hide Abstract

Semantic Image Search: Case Study for Western Region Tourism in Thailand
Chantana Chantrapornchai, Netnapa Bunlaw and Chidchanok Choksuchat
Page: 1195~1214, Vol. 14, No.5, 2018
Keywords: Image Search, Ontology, Semantic Web, Tourism, Western Thailand
Show / Hide Abstract

A Study on the Design of Humane Animal Care System and Java Implementation
Hui-Su Gong, Sunghyun Weon and Jun-Ho Huh
Page: 1225~1236, Vol. 14, No.5, 2018
Keywords: Animal Care, Artificial Intelligence, BPM, Design, Humane Animal Care, Intelligent Agent, Software Engineering
Show / Hide Abstract

Artificial Intelligence for the Fourth Industrial Revolution
Young-Sik Jeong and Jong Hyuk Park
Page: 1301~1306, Vol. 14, No.6, 2018
Keywords: Artificial Intelligence, Super intelligence, Superconnection
Show / Hide Abstract

Energy efficient Cross Layer Multipath Routing for Image Delivery in Wireless Sensor Networks
Santhosha Rao, Kumara Shama and Pavan Kumar Rao
Page: 1347~1360, Vol. 14, No.6, 2018
Keywords: Castalia for OMNET++, Cross Layer Multimedia, Magick++, Sink-Based MMRE AOMDV
Show / Hide Abstract

A Study on Business-Based Screen Design Techniques for Designing Efficient Applications
Tae-Woo Kim, Sun-Yi Park and Jeong-Mo Yeo
Page: 1420~1430, Vol. 14, No.6, 2018
Keywords: Applications, Business Processes, DFD, Screen Design, Screens
Show / Hide Abstract

Small Sample Face Recognition Algorithm based on Novel Siamese Network
Jianming Zhang, Xiaokang Jin, Yukai Liu, Arun Kumar Sangaiah and Jin Wang
Page: 1464~1479, Vol. 14, No.6, 2018
Keywords: Convolutional Neural Network, Face Recognition, Loss Function, Siamese Network, Small Sample
Show / Hide Abstract

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments
JongBeom Lim, HeonChang Yu and Joon-Min Gil
Page: 1480~1493, Vol. 14, No.6, 2018
Keywords: Cloud Computing, Clustering, Computational Intelligence, Resource Monitoring
Show / Hide Abstract

An Embedded Multifunctional Media System for Mobile Devices in Terrestrial DTV Relaying
Jun Huang and Haibing Yin
Page: 1272~1285, Vol. 14, No.5, 2018
Keywords: DTV, Media Relaying, Media Server, Mobile Devices, Terrestrial Broadcasting
Show / Hide Abstract

Designing Test Methods for IT-Enabled Energy Storage System to Evaluate Energy Dynamics
Young Gon Kim, Dong Hoon Kim and Eun-Kyu Lee
Page: 1487~1495, Vol. 13, No.6, 2017
Keywords: Converged IT Service, Cyber-Physical System, Energy Dynamics, Energy Storage System, Microgrid, Test Method, Smart Grid
Show / Hide Abstract

A Network Coding-Aware Routing Mechanism for Time-Sensitive Data Delivery in Multi-Hop Wireless Networks
Minho Jeong and Sanghyun
Page: 1544~1553, Vol. 13, No.6, 2017
Keywords: Coding-Aware Routing, Link Quality, Multi-Hop Wireless Network, Network Coding, Traffic Load Distribution
Show / Hide Abstract

Transaction Processing Method for NoSQL Based Column
Jeong-Joon Kim
Page: 1575~1584, Vol. 13, No.6, 2017
Keywords: Bigdata, HBase, Multi-Row Transaction, NoSQL
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017
Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script
Rajiv Kumar, Kiran Kumar Ravulakollu and Rajesh Bhat
Page: 893~913, Vol. 13, No.4, 2017
Keywords: CPAR-2012, Devnagari, Fuzzy Membership, Handwritten Script, Writer Identification
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017
Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

Adaptive Medical Image Compression Based on Lossy and Lossless Embedded Zerotree Methods
Sid Ahmed Elhannachi, Nacéra Benamrane and Taleb-Ahmed Abdelmalik
Page: 40~56, Vol. 13, No.1, 2017
Keywords: LEZW, Medical Images, ROI, RDCT, SPIHT
Show / Hide Abstract

Feasibility and Performance Analysis of RDMA Transfer through PCI Express
Min Choi and Jong Hyuk Park
Page: 95~103, Vol. 13, No.1, 2017
Keywords: Interconnection Network, Non-transparent Bridge, PCI Express, RDMA
Show / Hide Abstract

Self-Identification of Boundary’s Nodes in Wireless Sensor Networks
Kouider Elouahed Moustafa and Haffaf Hafid
Page: 128~140, Vol. 13, No.1, 2017
Keywords: Boundary Recognition, Military Applications, Military Surveillance, Wireless Sensor Network
Show / Hide Abstract

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City
Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Page: 184~195, Vol. 13, No.1, 2017
Keywords: Blockchain, Internet of Things, Security, Vehicular Network
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017
Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System
Salima Lalani and D. D. Doye
Page: 340~347, Vol. 13, No.2, 2017
Keywords: DWT, Fuzzy, SVD, Watermarking
Show / Hide Abstract

Design of Real-Time CAN Framework Based on Plug and Play Functionality
Sungheo Kim and Kwang-il Hwang
Page: 348~359, Vol. 13, No.2, 2017
Keywords: Controller Area Networks, Plug and Play, Real-Time
Show / Hide Abstract

Granular Bidirectional and Multidirectional Associative Memories: Towards a Collaborative Buildup of Granular Mappings
Witold Pedrycz
Page: 435~447, Vol. 13, No.3, 2017
Keywords: Allocation of Information Granularity and Optimization, Bidirectional Associative Memory, Collaborative Clustering, Granular Computing, Multi-directional Associative Memory, Prototypes
Show / Hide Abstract

HESnW: History Encounters-Based Spray-and-Wait Routing Protocol for Delay Tolerant Networks
Shunyi Gan, Jipeng Zhou and Kaimin Wei
Page: 618~629, Vol. 13, No.3, 2017
Keywords: Delivery Cost, DTNs, History Node, Multiple Probability, Spray-and-Wait
Show / Hide Abstract

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 1382~1396, Vol. 13, No.5, 2017
Keywords: Digital Image Watermarking, Semi-fragile Watermarking, False Detection, Local Binary Pattern (LBP), Arnold Transform
Show / Hide Abstract

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications
Daewon Kim
Page: 731~751, Vol. 13, No.4, 2017
Keywords: Cloud, HTML5, JavaScript, Mobile
Show / Hide Abstract

Identifying Influential People Based on Interaction Strength
Muhammad Azam Zia, Zhongbao Zhang, Liutong Chen, Haseeb Ahmad and Sen Su
Page: 987~999, Vol. 13, No.4, 2017
Keywords: Influence, Interaction, IPRank, Micro-Blog, Online Social Network
Show / Hide Abstract

Sector Based Multiple Camera Collaboration for Active Tracking Applications
Sangjin Hong, Kyungrog Kim and Nammee Moon
Page: 1299~1319, Vol. 13, No.5, 2017
Keywords: Active Tracking, Master-Slave, Object Dynamics, Sector-Based Representation
Show / Hide Abstract

A Tier-Based Duty-Cycling Scheme for Forest Monitoring
Fuquan Zhang, Deming Gao and In-Whee Joe
Page: 1320~1330, Vol. 13, No.5, 2017
Keywords: Link Redundancy, Rechargeable Dynamic Duty Cycle, Tier, Wireless Sensor Networks
Show / Hide Abstract

Analysis on Ampacity of Overhead Transmission Lines Being Operated
Zhijie Yan, Yanling Wang and Likai Liang
Page: 1358~1371, Vol. 13, No.5, 2017
Keywords: Ampacity, Dynamic Thermal Rating, Rating Scales, Risk Level, Transmission Line
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016
Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016
Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation
Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee and Hong-Woo Chun
Page: 248~265, Vol. 11, No.2, 2015
Keywords: Bioinformatics, Event Extraction, Maximum Entropy, Text-Mining
Show / Hide Abstract

Biological Infectious Watermarking Model for Video Copyright Protection
Bong-Joo Jang, Suk-Hwan Lee, SangHun Lim and Ki-Ryong Kwon
Page: 280~294, Vol. 11, No.2, 2015
Keywords: Biological Virus Modeling, Copyright Protection, Infectious Watermarking, Video Watermarking
Show / Hide Abstract

Sparse Channel Estimation of Single Carrier Frequency Division Multiple Access Based on Compressive Sensing
Yuan-Hong Zhong, Zhi-Yong Huang, Bin Zhu and Hua Wu
Page: 342~353, Vol. 11, No.3, 2015
Keywords: Compressive Sensing, Random Pilot Pattern, SC-FDMA, Sparse Channel Estimation
Show / Hide Abstract

Uniform Fractional Band CAC Scheme for QoS Provisioning in Wireless Networks
Md. Asadur Rahman, Mostafa Zaman Chowdhury and Yeong Min Jang
Page: 583~600, Vol. 11, No.4, 2015
Keywords: Acceptance Factor, Call Admission Control (CAC), Call Blocking Probability (CBP), Call Dropping Probability (CDP), Channel Utilization, Uniform Fractional Band (UFB), Quality of Service (QoS)
Show / Hide Abstract

The Construction and Viterbi Decoding of New (2k, k, l) Convolutional Codes
Wanquan Peng and Chengchang Zhang
Page: 69~80, Vol. 10, No.1, 2014
Keywords: Convolutional Codes, Block Codes, Double Loop Cyclic Codes, Matrix Decoding, Viterbi Algorithm
Show / Hide Abstract

The Design of the IIR Differintegrator and its Application in Edge Detection
Madhu Jain, Maneesha Gupta and N. K. Jain
Page: 223~239, Vol. 10, No.2, 2014
Keywords: Digital integrator, digital differentiator, edge detection and image processing
Show / Hide Abstract

A Novel Framework for Defining and Submitting Workflows to Service-Oriented Systems
Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Page: 365~383, Vol. 10, No.3, 2014
Keywords: Service Composition, Service-Oriented Computing, Service-Oriented Workflow, UML2BPEL, Workflow
Show / Hide Abstract

Design and Implementation of a Content Model for m-Learning
Jin Gon Shon and Byoung Wook Kim
Page: 543~554, Vol. 10, No.4, 2014
Keywords: Content Model, M-Learning, Requirement Analysis of M-Learning Environment, Segment Content, Supplement Content
Show / Hide Abstract

Optical Character Recognition for Hindi Language Using a Neural-network Approach
Divakar Yadav, Sonia Sánchez-Cuadrado and Jorge Morato
Page: 117~140, Vol. 9, No.1, 2013
Keywords: OCR, Pre-processing, Segmentation, Feature Vector, Classification, Artificial Neural Network (ANN)
Show / Hide Abstract

A Secure Network for Mobile Wireless Service
Kun Peng
Page: 247~258, Vol. 9, No.2, 2013
Keywords: Mobile Wireless Network, Security
Show / Hide Abstract

Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine
Young Sup Hwang, Jin Baek Kwon, Jae Chan Moon and Seong Je Cho
Page: 395~404, Vol. 9, No.3, 2013
Keywords: adaptive classification, malicious web pages, support vector machine
Show / Hide Abstract

A Simulation Model of Object Movement for Evaluating the Communication Load in Networked Virtual Environments
Mingyu Lim and Yunjin Lee
Page: 489~498, Vol. 9, No.3, 2013
Keywords: Networked Virtual Environments, Simulation Model, Load Distribution, Interest Management
Show / Hide Abstract

Developing a Dynamic Materialized View Index for Efficiently Discovering Usable Views for Progressive Queries
Chao Zhu, Qiang Zhu, Calisto Zuzarte and Wenbin Ma
Page: 511~537, Vol. 9, No.4, 2013
Keywords: Database, query processing, query optimization, progressive query, materialized view, index
Show / Hide Abstract

A Cross-Layer Unequal Error Protection Scheme for Prioritized H.264 Video using RCPC Codes and Hierarchical QAM
Wei-Ho Chung, Sunil Kumar, Seethal Paluri, Santosh Nagaraj, Annamalai Annamalai Jr. and John D. Matyjas
Page: 53~68, Vol. 9, No.1, 2013
Keywords: Wireless Transmission, Unequal Error Protection (UEP), Rate-Compatible Punctured Convolutional (RCPC) Code, Hierarchical Modulation, H.264/AVC Video Coding
Show / Hide Abstract

An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units
Sangpil Lee, Deokho Kim, Jaeyoung Yi and Won Woo Ro
Page: 159~174, Vol. 8, No.1, 2012
Keywords: General-Purpose Computation on a Graphics Processing Unit, SEED Block Cipher, Parallelism, Multi-Core Processors
Show / Hide Abstract

Attack and Correction: How to Design a Secure and Efficient Mix Network
Kun Peng
Page: 175~190, Vol. 8, No.1, 2012
Keywords: Mix Network, Correction
Show / Hide Abstract

A Novel Approach for Deriving Test Scenarios and Test Cases from Events
Sandeep K. Singh, Sangeeta Sabharwal and J.P.Gupta
Page: 213~240, Vol. 8, No.2, 2012
Keywords: Events, Event Meta Model, Testing, Test cases, Test scenarios, Event Based Systems, Software Engineering
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

Design and Development of m-Learning Service Based on 3G Cellular Phones
Kwang Sik Chung and Jeong Eun Lee
Page: 521~538, Vol. 8, No.3, 2012
Keywords: m-Learning, e-Learning Service Platform, Mobile Education Device, Cellular Phone, 3G Networks, H.264
Show / Hide Abstract

Evaluation of an Abstract Component Model for Embedded Systems Development
Christian Bunse, Yunja Choi and Hans Gerhard Gross
Page: 539~554, Vol. 8, No.4, 2012
Keywords: Software Development Management, Software Reusability, Modeling
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

An Active Co-Training Algorithm for Biomedical Named-Entity Recognition
Tsendsuren Munkhdalai, Meijing Li, Unil Yun, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 575~588, Vol. 8, No.4, 2012
Keywords: Biomedical Named-Entity Recognition, Co-Training, Semi-Supervised Learning, Feature Processing, Text Mining
Show / Hide Abstract

A Survey of QoS Based Routing Protocols for Wireless Sensor Networks
R.Sumathi and M.G.Srinivas
Page: 589~602, Vol. 8, No.4, 2012
Keywords: Wireless Sensor Networks, Quality of Service, Reliability, Energy Efficiency, End-To-End Delay, Critical Data
Show / Hide Abstract

Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6
Hyon-Young Choi, Sung-Gi Min, Youn-Hee Han and Rajeev Koodli
Page: 603~620, Vol. 8, No.4, 2012
Keywords: Flow Mobility, Proxy Mobile IPv6
Show / Hide Abstract

Proactive: Comprehensive Access to Job Information
Danielle Lee and Peter Brusilovsky
Page: 721~738, Vol. 8, No.4, 2012
Keywords: Job recommendation, explicit preference, implicit preference, personalized information retrieval
Show / Hide Abstract

A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network
Jiehui Chen, Mariam B.Salim and Mitsuji Matsumoto
Page: 17~28, Vol. 7, No.1, 2011
Keywords: Mobile Target Tracking, Sensor Network, Clustering, Voronoi Diagram
Show / Hide Abstract

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances
Ivy Ong and Hyotaek Lim
Page: 53~62, Vol. 7, No.1, 2011
Keywords: iATA Protocol, Load Balancing, Network Monitoring, Storage Network Solution, Write Replication
Show / Hide Abstract

Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits
Haiqing Nan, Kyung Ki Kim, Wei Wang and Ken Choi
Page: 93~102, Vol. 7, No.1, 2011
Keywords: PVT Variation sensors, Yield, Voltage Scaling, Frequency Scaling
Show / Hide Abstract

Generic Constructions for Strong Designated Verifier Signature
Deng-Guo Feng, Jing Xu and Wei-Dong Chen
Page: 159~172, Vol. 7, No.1, 2011
Keywords: Strong Designated Verifier Signature, Ring Signature, Deniable Authenticated Key Exchange, Provable security
Show / Hide Abstract

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks
Mohammad S. Obaidat, Sanjay K. Dhurandher and Khushboo Diwakar
Page: 241~260, Vol. 7, No.2, 2011
Keywords: Routing, Multimedia Networks, Congestion-aware Selection, MANET, CASPER, Performance Evaluation
Show / Hide Abstract

Evaluating Service Description to Guarantee Quality of U-service Ontology
Meeyeon Lee, Jung-Won Lee, Kyung-Ah Kim and Seung Soo Park
Page: 287~298, Vol. 7, No.2, 2011
Keywords: Quality Model, Quality Metric, Dynamic Service Composition, U-service (Ubiquitous-Service) Ontology, U-service Description Specification
Show / Hide Abstract

Batch Resizing Policies and Techniques for Fine-Grain Grid Tasks: The Nuts and Bolts
Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan and Rajkumar Buyya
Page: 299~320, Vol. 7, No.2, 2011
Keywords: Batch Resizing, Task Granularity, Global Grid, Application Turnaround Time
Show / Hide Abstract

Development of an OPC Client-Server Framework for Monitoring and Control Systems
Vu Van Tan and Myeong-Jae Yi
Page: 321~340, Vol. 7, No.2, 2011
Keywords: OPC, OPC UA SDK, Monitoring and Control, Redundancy, Unified Architecture
Show / Hide Abstract

Design of Multi-dimensional Contents Retrieval UI for Mobile IPTV
Jaehee Byeon, Ju-Hong Song and Nammee Moon
Page: 355~362, Vol. 7, No.2, 2011
Keywords: Mobile IPTV, UI(User Interface), Contents Browser, EPG, Personalized Content, Interactive Service
Show / Hide Abstract

The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing
Witold Pedrycz
Page: 397~412, Vol. 7, No.3, 2011
Keywords: Information Granularity, Principle of Justifiable Granularity, Knowledge Management, Optimal Granularity Allocation
Show / Hide Abstract

A Novel Similarity Measure for Sequence Data
Mohammad. H. Pandi, Omid Kashefi and Behrouz Minaei
Page: 413~424, Vol. 7, No.3, 2011
Keywords: Sequence Data, Similarity Measure, Sequence Mining
Show / Hide Abstract

Grobner Basis Attacks on Lightweight RFID Authentication Protocols
Daewan Han
Page: 691~706, Vol. 7, No.4, 2011
Keywords: RFID, Authentication Protocol, Algebraic Attack, Grobner Basis
Show / Hide Abstract

A Hexagon Tessellation Approach for the Transmission Energy Efficiency in Underwater Wireless Sensor Networks
Sungun Kim, Hyunsoo Cheon, Sangbo Seo, Seungmi Song and Seonyeong Park
Page: 53~66, Vol. 6, No.1, 2010
Keywords: UWSN, Hexagon Tessellation, Energy Efficiency, Hybrid
Show / Hide Abstract

The ISDF Framework: Towards Secure Software Development
Abdulaziz Alkussayer and William H Allen
Page: 91~106, Vol. 6, No.1, 2010
Keywords: Security Patterns, Secure Development, Security Framework
Show / Hide Abstract

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif and Munir Ahmed
Page: 177~184, Vol. 6, No.2, 2010
Keywords: Secure Routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Show / Hide Abstract

Access Control to Objects and their Description in the Future Network of Information
Eric Renault, Ahmad Ahmad and Mohamed Abid
Page: 359~374, Vol. 6, No.3, 2010
Keywords: Future Internet, Network of Information, Security, Storage Space, Access Rights
Show / Hide Abstract

Speed-Sensitive Handover Scheme over IEEE 802.16 Multi-Relay Networks
DongHo Kim, SoonSeok Kim and YongHee Lee
Page: 403~412, Vol. 6, No.3, 2010
Keywords: Multi-Relay Networks, Handover
Show / Hide Abstract

Security Properties of Domain Extenders for Cryptographic Hash Functions
Elena Andreeva, Bart Mennink and Bart Preneel
Page: 453~480, Vol. 6, No.4, 2010
Keywords: Hash Functions, Domain Extenders, Security Properties
Show / Hide Abstract

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Dae-Suk Yoo and Seung Sik Choi
Page: 501~510, Vol. 6, No.4, 2010
Keywords: Sensor Networks, Energy-Efficient MAC, S-MAC
Show / Hide Abstract

Intercepting Filter Approach to Injection Flaws
Ahmed Salem
Page: 563~574, Vol. 6, No.4, 2010
Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
Show / Hide Abstract

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System
Hyung-Min Lim, Kun-Won Jang and Byung-Gi Kim
Page: 609~620, Vol. 6, No.4, 2010
Keywords: u-Learning, e-Learning, Event Hooking, Content packing
Show / Hide Abstract

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster
Junaid Ahsenali Chaudhry
Page: 69~76, Vol. 5, No.2, 2009
Keywords: Self Healing Systems, Load Estimation and Balancing, OKKAM, Entity Naming System
Show / Hide Abstract

Differentiated Services Based Admission Control and Multi Path Routing Algorithm for IPv6
Muhammad Omer Farooq and Sadia Aziz
Page: 97~104, Vol. 5, No.2, 2009
Keywords: Differentiated Services (DiffServ), Admission Control, IPv6, QoS Routing, QoS Architecture
Show / Hide Abstract

Design of Cryptographic Hardware Architecture for Mobile Computing
Mooseop Kim, Youngsae Kim and Hyunsook Cho
Page: 187~196, Vol. 5, No.4, 2009
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing
Show / Hide Abstract

Fault-tolerant ZigBee-based Automatic Meter Reading Infrastructure
Kwang-il Hwang
Page: 221~228, Vol. 5, No.4, 2009
Keywords: AMR, AMI, Fault Tolerance, ZigBee
Show / Hide Abstract

Two-Tier Storage DBMS for High-Performance Query Processing
Sang-Hun Eo, Yan Li, Ho-Seok Kim and Hae-Young Bae
Page: 9~16, Vol. 4, No.1, 2008
Keywords: DBMS, Storage Management, Query Processing
Show / Hide Abstract

Developing Protege Plug-in: OWL Ontology Visualization using Social Network
Minsoo Kim and Minkoo Kim
Page: 61~66, Vol. 4, No.2, 2008
Keywords: OWL visualization, Protege, Protege plug-in
Show / Hide Abstract

Mobility Management Survey for Home-eNB Based 3GPP LTE Systems
Hyoungwon Kwak, Poongup Lee, Yohan Kim, Navrati Saxena and Jitae Shin
Page: 145~152, Vol. 4, No.4, 2008
Keywords: Home-eNB, 3GPP LTE (Long Term Evolution), Mobility Management
Show / Hide Abstract

A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks
Kap-Dong Kim, Kwangil Lee, Jun-Hee Park and Sang-Ha Kim
Page: 1~7, Vol. 3, No.1, 2007
Keywords: MANET Multicast Protocol, Overlay Multicast, Group Mobility
Show / Hide Abstract

Use of Mobile Devices in the Performance of Group Decision-Making under Contextual Pressure
Oh Byung Kwon, Tae Kyung Kim and Choong Rhyun Kim
Page: 64~72, Vol. 3, No.2, 2007
Keywords: Group Decision Making, Mobile Technology, Mobile Devices, Group Decision Support
Show / Hide Abstract

Scenario-based 3D Objects Synthesizing System Design
Ji-Seung Nam, Hui Gao, Mi-Young Kang, Kyoung-Tae Kim, Seung-Chul Son, Chung-Ung Pom and Kwon Heo
Page: 18~22, Vol. 2, No.1, 2006
Keywords: 3D Editing, 3D Synthesizing, 3D Object Reuse
Show / Hide Abstract

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing
Yixin Jing, Jinhyung Kim and Dongwon Jeong
Page: 28~33, Vol. 2, No.1, 2006
Keywords: Access control, Ubiquitous computing, Task computing, Context-awareness
Show / Hide Abstract

Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks
In Huh, Jae Yong Lee and Byung Chul Kim
Page: 34~38, Vol. 2, No.1, 2006
Keywords: wireless multi-hop network, TCP, congestion window
Show / Hide Abstract

TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network
Yuan Yang, Fu Zhen, Tae-Seok Lee and Myong-Soon Park
Page: 39~43, Vol. 2, No.1, 2006
Keywords: Wireless Sensor Network, MAC protocol, traffic aware, sleep/wake mechanism
Show / Hide Abstract

Distance Functions to Detect Changes in Data Streams
Ulziitugs Bud and JongTae Lim
Page: 44~47, Vol. 2, No.1, 2006
Keywords: change detection, distance functions.
Show / Hide Abstract

Monitoring Systems for Embedded Equipment in Ubiquitous Environments
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park and Jung-Ho Park
Page: 58~66, Vol. 2, No.1, 2006
Keywords: Ubiquitous Computing, Monitoring System, Sensor Network
Show / Hide Abstract

The Design and Implementation of an Available Bandwidth Measurement Scheme in the KGrid System
Seong-il Hahm, Seongho Cho, Han Choi, Chong-kwon Kim and Pillwoo Lee
Page: 101~106, Vol. 2, No.2, 2006
Keywords: KGrid, Globus Toolkit, Available Bandwidth Measurement, XML schema
Show / Hide Abstract

Automatic Hardware/Software Interface Generation for Embedded System
Choonho Son, Jeong-Han Yun, Hyun-Goo Kang and Taisook Han
Page: 137~142, Vol. 2, No.3, 2006
Keywords: Embedded System, Hardware Controller, Device Driver, Code Generation, Co-design
Show / Hide Abstract

Digital Controller of a Diesel Generator using an Embedded System
Kwang Seon Ahn
Page: 143~146, Vol. 2, No.3, 2006
Keywords: Diesel Generator, Embedded Controller, Remote Control
Show / Hide Abstract

Design of a NAND Flash Memory File System to Improve System Boot Time
Song-Hwa Park, Tae-Hoon Lee and Ki-Dong Chung
Page: 147~152, Vol. 2, No.3, 2006
Keywords: Fast Mounting, Flash File System, NAND Flash Memory
Show / Hide Abstract

Design of an Image Interpolator for Low Computation Complexity
Young-Hyun Jun, Jong-Ho Yun, Jin-Sung Park and Myung-Ryul Choi
Page: 153~158, Vol. 2, No.3, 2006
Keywords: Interpolation, Interpolator, Cubic convolution , Linear function
Show / Hide Abstract

Selection of a Competent Wireless Access Point for High Wireless Bandwidth
Ji Yeon Park and Kitae Hwang
Page: 159~162, Vol. 2, No.3, 2006
Keywords: WLAN, AP, SNMP, Network Utilization
Show / Hide Abstract

A Quality Assurance Process Model on Fault Management
Hyo-Soo Kim and Cheong Ho Baek
Page: 163~169, Vol. 2, No.3, 2006
Keywords: TMN, fault management, ERP, UML, RUP
Show / Hide Abstract

Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos
Kyuhee An, Kiyeal Lee and Mokdong Chung
Page: 170~177, Vol. 2, No.3, 2006
Keywords: RFID, EPCglobal Network, Framework, Business Process, Computer Security
Show / Hide Abstract

Metaphor and Typeface Based on Children’s Sensibilities for e-Learning
Miheon Jo and Jeonghye Han
Page: 178~182, Vol. 2, No.3, 2006
Keywords: e-Learning, Sensibility Factor, Metaphor, Typeface, Collaborative Recommending
Show / Hide Abstract

A Light-weight and Dynamically Reconfigurable RMON Agent System
Jun-Hyung Lee, Zin-Won Park and Myung-Kyun Kim
Page: 183~188, Vol. 2, No.3, 2006
Keywords: Network management, RMON agent system, Dynamic reconfiguration.
Show / Hide Abstract

A Study on the Design of the Monitoring Architecture for Embedded Kernels based on LTT
Ji-Hye Bae, Yoon-Young Park and Jung-Ho Park
Page: 1~8, Vol. 1, No.1, 2005
Keywords: Monitoring tool, NFS, LTT, MONETA 2.0
Show / Hide Abstract

A Hardware/Software Codesign for Image Processing in a Processor Based Embedded System for Vehicle Detection
Hosun Moon, Sunghwan Moon, Youngbin Seo and Yongdeak Kim
Page: 27~31, Vol. 1, No.1, 2005
Keywords: Embedded System, ITS, Image Processing, Vehicle Detect
Show / Hide Abstract

The Plan and Tools for Vulnerability Testing in Information Software-Based System
Injung Kim, Younggyo Lee and Dongho Won
Page: 75~78, Vol. 1, No.1, 2005
Keywords: Risk Analysis, Vulnerability, Asset, Threat
Show / Hide Abstract