Search Word(s) in Title, Keywords, Authors, and Abstract: SEA

[EDITORIAL] Practical Approaches Based on Deep Learning and Social Computing
Jong Hyuk Park
Page: 1~5, Vol. 14, No.1, 2018
Show / Hide Abstract

A Survey on Passive Image Copy-Move Forgery Detection
Zhi Zhang, Chengyou Wang and Xiao Zhou
Page: 6~31, Vol. 14, No.1, 2018
Keywords: Copy-Move Forgery Detection (CMFD), Image Forensics, Image Tamper Detection, Passive Forgery Detection
Show / Hide Abstract

A Comparative Analysis of Music Similarity Measures in Music Information Retrieval Systems
Kuldeep Gurjar and Yang-Sae Moon
Page: 32~55, Vol. 14, No.1, 2018
Keywords: Content-Based Music Retrieval, MIR System, Music Information Retrieval Survey, Music Similarity Measures
Show / Hide Abstract

Black Hole along with Other Attacks in MANETs: A Survey
Fan-Hsun Tseng, Hua-Pei Chiang and Han-Chieh Chao
Page: 56~78, Vol. 14, No.1, 2018
Keywords: Collaborative Black Hole Attack, Flooding Attack, Mobile Ad Hoc Network, Non-cooperative Black Hole Attack, Wormhole Attack
Show / Hide Abstract

A Survey on Automatic Twitter Event Summarization
Dwijen Rudrapal, Amitava Das and Baby Bhattacharya
Page: 79~100, Vol. 14, No.1, 2018
Keywords: ROUGE, Social Media Text, Tweet Stream, Tweet Summarization
Show / Hide Abstract

A Survey about Consensus Algorithms Used in Blockchain
Giang-Truong Nguyen and Kyungbaek Kim
Page: 101~128, Vol. 14, No.1, 2018
Keywords: Blockchain, Consensus Algorithm
Show / Hide Abstract

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang and Fang Zhao
Page: 129~139, Vol. 14, No.1, 2018
Keywords: AI, Crowdsourcing, Personality, Planning Language, Software Development, Task
Show / Hide Abstract

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform
Wei Song, Ning Feng, Yifei Tian, Simon Fong and Kyungeun Cho
Page: 162~175, Vol. 14, No.1, 2018
Keywords: Cloud Computing, Deep Belief Network, IoT, Power Conservation, Smart Metre
Show / Hide Abstract

Efficient Flow Table Management Scheme in SDN-Based Cloud Computing Networks
Nambong Ha and Namgi Kim
Page: 228~238, Vol. 14, No.1, 2018
Keywords: Cloud Computing Network, Cloud Service, Flow Table, SDN
Show / Hide Abstract

[EDITORIAL] Enhanced Integrated Algorithm & Software Architecture
Jong Hyuk Park
Page: 281~285, Vol. 14, No.2, 2018
Show / Hide Abstract

Verifying Code toward Trustworthy Software
Hyong-Soon Kim and Eunyoung Lee
Page: 309~321, Vol. 14, No.2, 2018
Keywords: Certified Compiler, Formal Verification, Language Semantics, Program Verification
Show / Hide Abstract

Sustaining Low-Carbon Emission Development: An Energy Efficient Transportation Plan for CPEC
Asma Zubedi, Zeng Jianqiu, Qasim Ali Arain, Imran Memon, Sehrish Khan, Muhammad Saad Khan and Ying Zhang
Page: 322~345, Vol. 14, No.2, 2018
Keywords: Carbon Emission, Climate Change, CPEC, Green ICT, ITS
Show / Hide Abstract

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence
Humaira Arshad, Aman Bin Jantan and Oludare Isaac Abiodun
Page: 346~376, Vol. 14, No.2, 2018
Keywords: Criminal Investigation, Data, Digital Forensics, Electronic Evidence, Reliability, Validation, Verification
Show / Hide Abstract

On Modification and Application of the Artificial Bee Colony Algorithm
Zhanxiang Ye, Min Zhu and Jin Wang
Page: 448~454, Vol. 14, No.2, 2018
Keywords: Artificial Bee Colony, Bees’ Number Reallocation, Search Equation
Show / Hide Abstract

Optimization of Train Working Plan based on Multiobjective Bi-level Programming Model
Xiaowei HAI and Chanchan ZHAO
Page: 487~498, Vol. 14, No.2, 2018
Keywords: Bi-Level Programming, Genetic Algorithm, Multiobjective, Train Working Plan
Show / Hide Abstract

Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment
Yeon-Woo Jang, Moon-Hwan Kang and Jae-Woo Chang
Page: 499~509, Vol. 14, No.2, 2018
Keywords: Bloom Filter, Concurrency Control, Hybrid Transactional Memory, Multi-core in-Memory Databases
Show / Hide Abstract

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery
Chengyou Wang, Heng Zhang and Xiao Zhou
Page: 510~522, Vol. 14, No.2, 2018
Keywords: Image Authentication and Self-recovery, Least Significant Bit (LSB), Peak Signal-to-Noise Ratio (PSNR), Self-embedding Fragile Watermarking
Show / Hide Abstract

Load Balancing in Cloud Computing Using Meta-Heuristic Algorithm
Youssef Fahim, Hamza Rahhali, Mohamed Hanine, El-Habib Benlahmar, El-Houssine Labriji, Mostafa Hanoune and Ahmed Eddaoui
Page: 569~589, Vol. 14, No.3, 2018
Keywords: Bat-Algorithm, Cloud Computing, Load Balancing, Pre-scheduling, Virtual Machines
Show / Hide Abstract

Information Technology Infrastructure for Agriculture Genotyping Studies
Bens Pardamean, James W. Baurley, Anzaludin S. Perbangsa, Dwinita Utami, Habib Rijzaani and Dani Satyawan
Page: 655~665, Vol. 14, No.3, 2018
Keywords: Agriculture Biotechnology, Big Data, Genotyping, Infrastructure, IT
Show / Hide Abstract

A New Approach for Hierarchical Dividing to Passenger Nodes in Passenger Dedicated Line
Chanchan Zhao, Feng Liu and Xiaowei Hai
Page: 694~708, Vol. 14, No.3, 2018
Keywords: Hierarchical Dividing, K-Means, Passenger Nodes, Passenger Dedicated line, Self-Organizing Map
Show / Hide Abstract

Contribution to Improve Database Classification Algorithms for Multi-Database Mining
Salim Miloudi, Sid Ahmed Rahal and Salim Khiat
Page: 709~726, Vol. 14, No.3, 2018
Keywords: Connected Components, Database Classification, Graph-Based Algorithm, Multi-Database Mining
Show / Hide Abstract

Microblog Sentiment Analysis Method Based on Spectral Clustering
Shi Dong, Xingang Zhang and Ya Li
Page: 727~739, Vol. 14, No.3, 2018
Keywords: Machine Learning, RDM, Sentiment Analysis, Spectral Cluster
Show / Hide Abstract

Maximizing Network Utilization in IEEE 802.21 Assisted Vertical Handover over Wireless Heterogeneous Networks
Dinesh Pandey, Beom Hun Kim, Hui-Seon Gang, Goo-Rak Kwon and Jae-Young Pyun
Page: 771~789, Vol. 14, No.3, 2018
Keywords: Handover Decision, IEEE 802.21, Occupied Bandwidth, SINR, Vertical Handover
Show / Hide Abstract

QP-DTW: Upgrading Dynamic Time Warping to Handle Quasi Periodic Time Series Alignment
Imen Boulnemour and Bachir Boucheham
Page: 851~876, Vol. 14, No.4, 2018
Keywords: Alignment, Comparison, Diagnosis, DTW, Motif Discovery, Pattern Recognition, SEA, Similarity Search, Time Series
Show / Hide Abstract

Analysis of Academic Evaluation Indicators Based on Citation Quality
Mingyue Zhang, Jin Shi, Jin Wang and Chang Liu
Page: 916~925, Vol. 14, No.4, 2018
Keywords: Academic Evaluation Indicators, Citation Analysis, Citation Impact, Citation Quality
Show / Hide Abstract

Significant Motion-Based Adaptive Sampling Module for Mobile Sensing Framework
Muhammad Fiqri Muthohar, I Gde Dharma Nugraha and Deokjai Choi
Page: 948~960, Vol. 14, No.4, 2018
Keywords: Adaptive Sampling, Android Mobile Sensing Framework, Significant Motion Sensor
Show / Hide Abstract

Restful Web Services Composition Using Semantic Ontology for Elderly Living Assistance Services
Sheik Mohammad Mostakim Fattah and Ilyoung Chong
Page: 1010~1032, Vol. 14, No.4, 2018
Keywords: Internet of Things, Service Composition, Web of Objects
Show / Hide Abstract

Semantic Image Search: Case Study for Western Region Tourism in Thailand
Chantana Chantrapornchai, Netnapa Bunlaw and Chidchanok Choksuchat
Page: 1195~1214, Vol. 14, No.5, 2018
Keywords: Image Search, Ontology, Semantic Web, Tourism, Western Thailand
Show / Hide Abstract

A Study on the Design of Humane Animal Care System and Java Implementation
Hui-Su Gong, Sunghyun Weon and Jun-Ho Huh
Page: 1225~1236, Vol. 14, No.5, 2018
Keywords: Animal Care, Artificial Intelligence, BPM, Design, Humane Animal Care, Intelligent Agent, Software Engineering
Show / Hide Abstract

An Improved Harmony Search Algorithm and Its Application in Function Optimization
Zhongda Tian and Chao Zhang
Page: 1237~1253, Vol. 14, No.5, 2018
Keywords: Complex Functions, Harmony Search, Intelligent Algorithm, Optimization
Show / Hide Abstract

An Internet of Things System Architecture for Aiding Firefighters in the Scene of Disaster
Hyesun Lee, Sang Gi Hong and Kang Bok Lee
Page: 1286~1292, Vol. 14, No.5, 2018
Keywords: Disaster and Safety, Internet of Things, Reference Architecture
Show / Hide Abstract

Research on the Multi-Focus Image Fusion Method Based on the Lifting Stationary Wavelet Transform
Kaiqun Hu and Xin Feng
Page: 1293~1300, Vol. 14, No.5, 2018
Keywords: Image Fusion, Lifting Stationary Wavelet Transform, Normalized Cut, Transform of NSCT
Show / Hide Abstract

Artificial Intelligence for the Fourth Industrial Revolution
Young-Sik Jeong and Jong Hyuk Park
Page: 1301~1306, Vol. 14, No.6, 2018
Keywords: Artificial Intelligence, Super intelligence, Superconnection
Show / Hide Abstract

Video Captioning with Visual and Semantic Features
Sujin Lee and Incheol Kim
Page: 1318~1330, Vol. 14, No.6, 2018
Keywords: Attention-Based Caption Generation, Deep Neural Networks, Semantic Feature, Video Captioning
Show / Hide Abstract

Triqubit-state Measurement-based Image Edge Detection Algorithm
Zhonghua Wang and Faliang Huang
Page: 1331~1346, Vol. 14, No.6, 2018
Keywords: Edge Detection, Partial Differential Equation, Pixel Saliency, Qubit State, Quantum Measurement
Show / Hide Abstract

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions
Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park and Jong Hyuk Park
Page: 1361~1384, Vol. 14, No.6, 2018
Keywords: Cyber Physical System, Internet of Things, Security Analysis, Security Threats
Show / Hide Abstract

Proposal of Container-Based HPC Structures and Performance Analysis
Chanho Yong, Ga-Won Lee and Eui-Nam Huh
Page: 1398~1404, Vol. 14, No.6, 2018
Keywords: Container, Docker, High-Performance Computing, Singularity
Show / Hide Abstract

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments
JongBeom Lim, HeonChang Yu and Joon-Min Gil
Page: 1480~1493, Vol. 14, No.6, 2018
Keywords: Cloud Computing, Clustering, Computational Intelligence, Resource Monitoring
Show / Hide Abstract

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information
Chen Li, Mengti Liang, Wei Song and Ke Xiao
Page: 1494~1507, Vol. 14, No.6, 2018
Keywords: Face Recognition, Intelligent Human Identification, MP-CNN, Robust Feature
Show / Hide Abstract

CNN-LSTM Coupled Model for Prediction of Waterworks Operation Data
Kerang Cao, Hangyung Kim, Chulhyun Hwang and Hoekyung Jung
Page: 1508~1520, Vol. 14, No.6, 2018
Keywords: Big Data, CNN, Correlation Analysis, Deep-Learning, LSTM
Show / Hide Abstract

Task Assignment Model for Crowdsourcing Software Development: TAM
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang, Fang Zhao, Abdul Rehman Gilal and Wenhua Shao
Page: 621~630, Vol. 14, No.3, 2018
Keywords: Crowdsourced, Human Factor, Personality Type, Software Development, Task Assignment
Show / Hide Abstract

Shift in the Regional Balance of Power From Europe to Asia: A Case Study of ICT Industry
Jin Hua, Zahid Latif, Shen Tiyan, Zulfiqar Hussain Pathan, Muhammad Zahid Tunio, Shafaq Salam and Liu Ximei
Page: 645~654, Vol. 14, No.3, 2018
Keywords: Digital Power, European Union (EU), Game Changer, Information and Communication Technology (ICT), One Belt, One Road
Show / Hide Abstract

An Embedded Multifunctional Media System for Mobile Devices in Terrestrial DTV Relaying
Jun Huang and Haibing Yin
Page: 1272~1285, Vol. 14, No.5, 2018
Keywords: DTV, Media Relaying, Media Server, Mobile Devices, Terrestrial Broadcasting
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017
Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

[EDITORIAL] Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016
Jong Hyuk Park
Page: 1~7, Vol. 13, No.1, 2017
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017
Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

[EDITORIAL] Advances in Algorithm, Multimedia, and Network for Future IT
Jong Hyuk Park
Page: 197~203, Vol. 13, No.2, 2017
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017
Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

A Hybrid Bacterial Foraging Optimization Algorithm and a Radial Basic Function Network for Image Classification
Yasmina Teldja Amghar and Hadria Fizazi
Page: 215~235, Vol. 13, No.2, 2017
Keywords: Bacterial Foraging Optimization Algorithm, Hybrid, Image Classification, Radial Basic Function
Show / Hide Abstract

Mobility Scenarios into Future Wireless Access Network
Syed Mushhad Mustuzhar Gilani, Tang Hong, Qiqi Cai and Guofeng Zhao
Page: 236~255, Vol. 13, No.2, 2017
Keywords: Access Point (AP), Internet Architecture, Network Function Virtualization (NFV), Seamless Handover, Software-Defined Network (SDN)
Show / Hide Abstract

An Improved Stereo Matching Algorithm with Robustness to Noise Based on Adaptive Support Weight
Ingyu Lee and Byungin Moon
Page: 256~267, Vol. 13, No.2, 2017
Keywords: Adaptive Census Transform, Adaptive Support Weight, Local Matching, Multiple Sparse Windows, Stereo Matching
Show / Hide Abstract

A Multi-Objective TRIBES/OC-SVM Approach for the Extraction of Areas of Interest from Satellite Images
Wafaa Benhabib and Hadria Fizazi
Page: 321~339, Vol. 13, No.2, 2017
Keywords: Image Classification, MO-TRIBES, OC-SVM, Remote Sensing
Show / Hide Abstract

Unsupervised Segmentation of Images Based on Shuffled Frog-Leaping Algorithm
Amel Tehami* and Hadria Fizazi
Page: 370~384, Vol. 13, No.2, 2017
Keywords: Image, K-means, Meta-Heuristic, Optimization, SFLA, Unsupervised Segmentation
Show / Hide Abstract

Speech Query Recognition for Tamil Language Using Wavelet and Wavelet Packets
P. Iswarya and V. Radha
Page: 1135~1148, Vol. 13, No.5, 2017
Keywords: De-noising, Feature Extraction, Speech Recognition, Support Vector Machine, Wavelet Packet
Show / Hide Abstract

[EDITORIAL] New Approaches to Advanced Network and Image Processing
Jong Hyuk Park
Page: 429~434, Vol. 13, No.3, 2017
Show / Hide Abstract

A Fast Ground Segmentation Method for 3D Point Cloud
Phuong Chu, Seoungjae Cho, Sungdae Sim, Kiho Kwak and Kyungeun Cho
Page: 491~499, Vol. 13, No.3, 2017
Keywords: 3D Point Cloud, Ground Segmentation, Light Detection and Ranging, Start-Ground Point, Threshold Point
Show / Hide Abstract

Development of a CUBRID-Based Distributed Parallel Query Processing System
Hyeong-Il Kim, HyeonSik Yang, Min Yoon and Jae-Woo Chang
Page: 518~532, Vol. 13, No.3, 2017
Keywords: CUBRID, Distributed Parallel Environment, Query Processing
Show / Hide Abstract

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution
Manmeet Mahinderjit Singh, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin and Nurul Hashimah Ahamed Hassain Malim
Page: 559~572, Vol. 13, No.3, 2017
Keywords: Cyberbullying, Digital Etiquette, Intrusion Detection System, Mobile Application, Social Network
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017
Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

[EDITORIAL] Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning
Jong Hyuk Park
Page: 643~652, Vol. 13, No.4, 2017
Show / Hide Abstract

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries
Carlos Porcel, Alberto Ching-López, Juan Bernabé-Moreno, Alvaro Tejeda-Lorente and Enrique Herrera-Viedma
Page: 653~667, Vol. 13, No.4, 2017
Keywords: Digital Libraries, Dissemination of Information, Fuzzy Linguistic Modeling, Recommender Systems
Show / Hide Abstract

Hadoop Based Wavelet Histogram for Big Data in Cloud
Jeong-Joon Kim
Page: 668~676, Vol. 13, No.4, 2017
Keywords: Big Data, Histogram, MapReduce, Wavelet
Show / Hide Abstract

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications
Daewon Kim
Page: 731~751, Vol. 13, No.4, 2017
Keywords: Cloud, HTML5, JavaScript, Mobile
Show / Hide Abstract

[EDITORIAL] Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1043~1051, Vol. 13, No.5, 2017
Show / Hide Abstract

Extraction of ObjectProperty-UsageMethod Relation from Web Documents
Chaveevan Pechsiri, Sumran Phainoun and Rapeepun Piriyakul
Page: 1103~1125, Vol. 13, No.5, 2017
Keywords: Medicinal Property, N-Word-Co, Semantic Relation, Usage-Method
Show / Hide Abstract

Similarity Evalution between Graphs: A Formal Concept Analysis Approach
Fei Hao, Dae-Soo Sim, Doo-Soon Park and Hyung-Seok Seo
Page: 1158~1167, Vol. 13, No.5, 2017
Keywords: Formal Concept Analysis, Graph, Social Networks, Similarity Evaluation
Show / Hide Abstract

Thai Classical Music Matching using t-Distribution on Instantaneous Robust Algorithm for Pitch Tracking Framework
Pheerasut Boonmatham, Sunee Pongpinigpinyo and Tasanawan Soonklang
Page: 1213~1228, Vol. 13, No.5, 2017
Keywords: Pitch Tracking Algorithm, Instantaneous Robust Algorithm for Pitch Tracking, T-Distribution, Shortest Query Sample
Show / Hide Abstract

Efficiently Processing Skyline Query on Multi-Instance Data
Shu-I Chiu and Kuo-Wei Hsu
Page: 1277~1298, Vol. 13, No.5, 2017
Keywords: Multi-Instance Data, Product Search, Ranking, Recommendation, Skyline Query Processing
Show / Hide Abstract

Analysis on Ampacity of Overhead Transmission Lines Being Operated
Zhijie Yan, Yanling Wang and Likai Liang
Page: 1358~1371, Vol. 13, No.5, 2017
Keywords: Ampacity, Dynamic Thermal Rating, Rating Scales, Risk Level, Transmission Line
Show / Hide Abstract

[EDITORIAL] Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1431~1435, Vol. 13, No.6, 2017
Show / Hide Abstract

A Comprehensive Review of Emerging Computational Methods for Gene Identification
Ning Yu, Zeng Yu, Bing Li, Feng Gu and Yi Pan
Page: 1~34, Vol. 12, No.1, 2016
Keywords: Cloud Computing, Comparative Methods, Deep Learning, Fourier Transform, Gene Identification, Gene Prediction, Hidden Markov Model, Machine Learning, Protein-Coding Region, Support Vector Machine
Show / Hide Abstract

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance
Kuldeep Gurjar and Yang-Sae Moon
Page: 234~248, Vol. 12, No.2, 2016
Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016
Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016
Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks
Muhammad Sajjad Khan and Insoo Koo
Page: 295~309, Vol. 12, No.2, 2016
Keywords: Cognitive Radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Page: 338~357, Vol. 12, No.3, 2016
Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet
Jeong Kyu Lee, Seo Yeon Moon and Jong Hyuk Park
Page: 489~501, Vol. 12, No.3, 2016
Keywords: Future Internet, Human Behavior, Intrusion Prevention, Malware Detection
Show / Hide Abstract

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016
Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform
Ibtissem Bekkouche and Hadria Fizazi
Page: 555~576, Vol. 12, No.4, 2016
Keywords: Fourier Transform, Fuzzy Clustering, Harmony Search, Processing Image, Remote Sensing
Show / Hide Abstract

Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images
Arif Muntasa
Page: 591~611, Vol. 12, No.4, 2016
Keywords: Eigenspaces, Feature Extraction, Homogeneous, Non-homogeneous
Show / Hide Abstract

Treatment Planning in Smart Medical: A Sustainable Strategy
Fei Hao, Doo-Soon Park, Sang Yeon Woo, Se Dong Min and Sewon Park
Page: 711~723, Vol. 12, No.4, 2016
Keywords: Degree of Membership, Fuzzy Evaluation, Smart Medical, Sustainable, Treatment Plan
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016
Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

A Robust Fingerprint Matching System Using Orientation Features
Ravinder Kumar, Pravin Chandra and Madasu Hanmandlu
Page: 83~99, Vol. 12, No.1, 2016
Keywords: Circular ROI, Core Point Detection, Image-Based Fingerprint Matching, Orientation Features
Show / Hide Abstract

Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke
Meeyeon Lee, Ye-Seul Park and Jung-Won Lee
Page: 741~753, Vol. 12, No.4, 2016
Keywords: Acute Myocardial Infarction, Data Model, Hospital Information System, Ischemic Stroke, Medical Image, Medical Information, Ontology
Show / Hide Abstract

Analysis of Semantic Relations Between Multimodal Medical Images Based on Coronary Anatomy for Acute Myocardial Infarction
Yeseul Park, Meeyeon Lee, Myung-Hee Kim and Jung-Won Lee
Page: 129~148, Vol. 12, No.1, 2016
Keywords: Acute Myocardial Infarction, Coronary Anatomy, Coronary Angiography, Data Model, Echocardiography, Medical Images, Multimodality, Semantic Features
Show / Hide Abstract

Fast Device Discovery for Remote Device Management in Lighting Control Networks
Sang-Il Choi, Sanghun Lee, Seok-Joo Koh, Sang-Kyu Lim, Insu Kim and Tae-Gyu Kang
Page: 125~133, Vol. 11, No.1, 2015
Keywords: Device Discovery, Partition-Based, RDM
Show / Hide Abstract

Research on the E-Commerce Credit Scoring Model Using the Gaussian Density Function
Xiao Qiang, He Rui-chun and Zhang Wei
Page: 173~183, Vol. 11, No.2, 2015
Keywords: Abnormal Point, Credit Scoring, Density, E-commerce
Show / Hide Abstract

A Dataset of Online Handwritten Assamese Characters
Udayan Baruah and Shyamanta M. Hazarika
Page: 325~341, Vol. 11, No.3, 2015
Keywords: Assamese, Character Recognition, Dataset Collection, Data Verification, Online Handwriting, Support Vector Machine
Show / Hide Abstract

A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases
Si-Woo Byun and Seok-Woo Jang
Page: 389~405, Vol. 11, No.3, 2015
Keywords: Column-Aware Index Management, Column-Oriented Databases, Flash Memory Storage, Game Database, Network Database
Show / Hide Abstract

A Lightweight and Effective Music Score Recognition on Mobile Phones
Tam Nguyen and Gueesang Lee
Page: 438~449, Vol. 11, No.3, 2015
Keywords: Mobile Camera, Music Score, SVM, Symbol Classification
Show / Hide Abstract

Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage
Nawel Bendimerad and Bouabdellah Kechar
Page: 509~527, Vol. 11, No.4, 2015
Keywords: Coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks
Show / Hide Abstract

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process
G. A. Preethi and C. Chandrasekar
Page: 616~629, Vol. 11, No.4, 2015
Keywords: Action, Heterogeneous Handoff, MDP, Policy Iteration, State
Show / Hide Abstract

Improved Dynamic Subjective Logic Model with Evidence Driven
Jiao-Hong Qiang, Wang-Xin Xin and Tian-Jun Feng
Page: 630~642, Vol. 11, No.4, 2015
Keywords: Dynamic Weight, Evidence Driven, Subjective Logic
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

A High Quality Steganographic Method Using Morphing
Anant M.Bagade and Sanjay N.Talbar
Page: 256~270, Vol. 10, No.2, 2014
Keywords: Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality
Show / Hide Abstract

Fault Detection in the Semiconductor Etch Process Using the Seasonal Autoregressive Integrated Moving Average Modeling
Muhammad Zeeshan Arshad, Javeria Muhammad Nawaz and Sang Jeen Hong
Page: 429~442, Vol. 10, No.3, 2014
Keywords: Autoregressive Integrated Moving Average, Dynamic Time Warping, Fault Detection, Seasonal Autoregressive Integrated Moving Average, Semiconductor Process, Time Series Modeling
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Page: 491~502, Vol. 10, No.4, 2014
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

An Unified Representation of Context Knowledge Base for Mobile Context-Aware System
Jang-Seop Jeong and Dae-Wook Bang
Page: 581~588, Vol. 10, No.4, 2014
Keywords: Context-Awareness, Knowledge Base, Unified Context Information
Show / Hide Abstract

A Step towards User Privacy while Using Location-Based Services
Fizza Abbas and Heekuck Oh
Page: 618~627, Vol. 10, No.4, 2014
Keywords: Location Based Services, Location Privacy, Point of Interests
Show / Hide Abstract

Cost-Effective Replication Schemes for Query Load Balancing in DHT-Based Peer-to-Peer File Searches
Qi Cao and Satoshi Fujita
Page: 628~645, Vol. 10, No.4, 2014
Keywords: DHT, Load Balancing, Load Reduction, Multi-Keyword Search, Replication
Show / Hide Abstract

A TRUS Prostate Segmentation using Gabor Texture Features and Snake-like Contour
Sung Gyun Kim and Yeong Geon Seo
Page: 103~116, Vol. 9, No.1, 2013
Keywords: Gabor Filter Bank, Support Vector Machines, Prostate Segmentation
Show / Hide Abstract

An Improved Approach to Ranking Web Documents
Pooja Gupta, Sandeep K. Singh, Divakar Yadav and A. K. Sharma
Page: 217~236, Vol. 9, No.2, 2013
Keywords: Ranking, Ordering, WWW, Information Retrieval, Contextual Relevance, Contextual Sense, Web Documents
Show / Hide Abstract

A Secure Network for Mobile Wireless Service
Kun Peng
Page: 247~258, Vol. 9, No.2, 2013
Keywords: Mobile Wireless Network, Security
Show / Hide Abstract

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Sun-Ho Lee and Im-Yeong Lee
Page: 287~300, Vol. 9, No.2, 2013
Keywords: Searchable Encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage
Show / Hide Abstract

An Improvement Video Search Method for VP-Tree by using a Trigonometric Inequality
Samuel Sangkon Lee, Masami Shishibori and Chia Y. Han
Page: 315~332, Vol. 9, No.2, 2013
Keywords: Vantage Point; VP-Tree; Trigonometric Inequality; Search Algorithm; Range Search; Nearest Neighbor Search; AESA algorithm; Multimedia Database
Show / Hide Abstract

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
Komal Mahajan, Ansuyia Makroo and Deepak Dahiya
Page: 379~394, Vol. 9, No.3, 2013
Keywords: Virtual Machine (VM), Server affinity, VM load balancer, CloudAnalyst, Data center, Cloudlet
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

A Regularity-Based Preprocessing Method for Collaborative Recommender Systems
Raciel Yera Toledo, Yailé Caballero Mota and Milton García Borroto
Page: 435~460, Vol. 9, No.3, 2013
Keywords: Collaborative Recommender Systems, Inconsistencies, Rating Regularities
Show / Hide Abstract

Developing a Dynamic Materialized View Index for Efficiently Discovering Usable Views for Progressive Queries
Chao Zhu, Qiang Zhu, Calisto Zuzarte and Wenbin Ma
Page: 511~537, Vol. 9, No.4, 2013
Keywords: Database, query processing, query optimization, progressive query, materialized view, index
Show / Hide Abstract

Developing a Web-Based Knowledge Product Outsourcing System at a University
Mark B. Onte and Dave E. Marcial
Page: 548~566, Vol. 9, No.4, 2013
Keywords: Knowledge Product Outsourcing, Management, Web 2.0, IT in Education
Show / Hide Abstract

Small Object Segmentation Based on Visual Saliency in Natural Images
Huynh Trung Manh and Gueesang Lee
Page: 592~601, Vol. 9, No.4, 2013
Keywords: Gaussian Mixture Model (GMM), Visual Saliency, Segmentation, Object Detection.
Show / Hide Abstract

Automatic Single Document Text Summarization Using Key Concepts in Documents
Kamal Sarkar
Page: 602~620, Vol. 9, No.4, 2013
Keywords: Automatic Text Summarization, Key Concepts, Keyphrase Extraction
Show / Hide Abstract

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model
Seok-Hwan Yoon and Joonyoung Min
Page: 621~632, Vol. 9, No.4, 2013
Keywords: Forest Fire Detection, Gaussian Mixture Models, HSL Color Space, Smoke Signature
Show / Hide Abstract

Discriminatory Projection of Camouflaged Texture Through Line Masks
Nagappa Bhajantri, Pradeep Kumar R and Nagabhushan P
Page: 660~677, Vol. 9, No.4, 2013
Keywords: Camouflage, Line mask, Enhancement, Texture analysis, Distribution pattern, Histogram, Regression line
Show / Hide Abstract

Using a Cellular Automaton to Extract Medical Information from Clinical Reports
Fatiha Barigou, Baghdad Atmani and Bouziane Beldjilali
Page: 67~84, Vol. 8, No.1, 2012
Keywords: Clinical Reports, Information Extraction, Cellular Automaton, Boolean Inference Engine
Show / Hide Abstract

The Use of MSVM and HMM for Sentence Alignment
Mohamed Abdel Fattah
Page: 301~314, Vol. 8, No.2, 2012
Keywords: Sentence Alignment, English/ Arabic Parallel Corpus, Parallel Corpora, Machine Translation, Multi-Class Support Vector Machine, Hidden Markov model
Show / Hide Abstract

A Framework for Processing Brain Waves Used in a Brain-computer Interface
Yunsick Sung, Kyungeun Cho and Kyhyun Um
Page: 315~330, Vol. 8, No.2, 2012
Keywords: Brain-Computer Interface, BCI Toolkit, BCI Framework, EEG, Brain Wave
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

A Vision-Based Method to Find Fingertips in a Closed Hand
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal and J.L. Raheja
Page: 399~408, Vol. 8, No.3, 2012
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner Detection
Show / Hide Abstract

A Method for Learning Macro-Actions for Virtual Characters Using Programming by Demonstration and Reinforcement Learning
Yunsick Sung and Kyungeun Cho
Page: 409~420, Vol. 8, No.3, 2012
Keywords: Reinforcement Learning, Monte Carlo Method, Behavior Generation Model, Programming B y Demonstration, Macro-Action, Multi-Step Action
Show / Hide Abstract

Using an Adaptive Search Tree to Predict User Location
Sechang Oh
Page: 437~444, Vol. 8, No.3, 2012
Keywords: Location Prediction, Learning System, Search Tree, Context-Awareness
Show / Hide Abstract

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face
M.P. Satone and Dr. G.K. Kharate
Page: 483~494, Vol. 8, No.3, 2012
Keywords: Face Recognition, Princ ipal Component Analysis, Subband, Wavelet Transform
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

An Active Co-Training Algorithm for Biomedical Named-Entity Recognition
Tsendsuren Munkhdalai, Meijing Li, Unil Yun, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 575~588, Vol. 8, No.4, 2012
Keywords: Biomedical Named-Entity Recognition, Co-Training, Semi-Supervised Learning, Feature Processing, Text Mining
Show / Hide Abstract

A Survey of QoS Based Routing Protocols for Wireless Sensor Networks
R.Sumathi and M.G.Srinivas
Page: 589~602, Vol. 8, No.4, 2012
Keywords: Wireless Sensor Networks, Quality of Service, Reliability, Energy Efficiency, End-To-End Delay, Critical Data
Show / Hide Abstract

A Comparative Study of Estimation by Analogy using Data Mining Techniques
Geeta Nagpal, Moin Uddin and Arvinder Kaur
Page: 621~652, Vol. 8, No.4, 2012
Keywords: Software Estimations, Estimation by Analogy, Grey Relational Analysis, Robust Regression, Data Mining Techniques
Show / Hide Abstract

Online Recognition of Handwritten Korean and English Characters
Ming Ma, Dong-Won Park, Soo Kyun Kim and Syungog An
Page: 653~668, Vol. 8, No.4, 2012
Keywords: Online Handwriting Recognition, Hidden Markov Model, Stochastic Grammar, Hierarchical Clustering, Position Verifier
Show / Hide Abstract

ECG Denoising by Modeling Wavelet Sub-Band Coefficients using Kernel Density Estimation
Shubhada Ardhapurkar, Ramchandra Manthalkar and Suhas Gajre
Page: 669~684, Vol. 8, No.4, 2012
Keywords: Kernel Density Estimation, Discrete Wavelet Transform, Probability Density Function (PDF), Signal to Noise Ratio
Show / Hide Abstract

Proactive: Comprehensive Access to Job Information
Danielle Lee and Peter Brusilovsky
Page: 721~738, Vol. 8, No.4, 2012
Keywords: Job recommendation, explicit preference, implicit preference, personalized information retrieval
Show / Hide Abstract

Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20
Mouhamed Abdulla and Yousef R. Shayan
Page: 43~52, Vol. 7, No.1, 2011
Keywords: MBWA, IEEE 802.20, Interference, Mobility, Degradation
Show / Hide Abstract

A Method of Risk Assessment for Multi-Factor Authentication
Jae-Jung Kim and Seng-Phil Hong
Page: 187~198, Vol. 7, No.1, 2011
Keywords: Multi-factor Authentication, PKI, User Authentication, Biometric Authentication
Show / Hide Abstract

Evaluating Service Description to Guarantee Quality of U-service Ontology
Meeyeon Lee, Jung-Won Lee, Kyung-Ah Kim and Seung Soo Park
Page: 287~298, Vol. 7, No.2, 2011
Keywords: Quality Model, Quality Metric, Dynamic Service Composition, U-service (Ubiquitous-Service) Ontology, U-service Description Specification
Show / Hide Abstract

Analysis of Generalized Impact Factors and the Indices of Journals
Ash Mohammad Abbas
Page: 341~354, Vol. 7, No.2, 2011
Keywords: Information Systems, Quality of Research, Impact factor, h-index, g-index
Show / Hide Abstract

Design of Multi-dimensional Contents Retrieval UI for Mobile IPTV
Jaehee Byeon, Ju-Hong Song and Nammee Moon
Page: 355~362, Vol. 7, No.2, 2011
Keywords: Mobile IPTV, UI(User Interface), Contents Browser, EPG, Personalized Content, Interactive Service
Show / Hide Abstract

Analysis of Business Attributes in Information Technology Environments
Hong Joo Lee
Page: 385~396, Vol. 7, No.2, 2011
Keywords: Business Attributes, Information Technology, Value Chain, Business System
Show / Hide Abstract

An Approach to Art Collections Management and Content-based Recovery
Concepcion Perez de Celis Herrero, Jaime Lara Alvarez, Gustavo Cossio Aguilar and Maria J. Somodevilla Garcia
Page: 447~458, Vol. 7, No.3, 2011
Keywords: Search by Content, Faceted Classification, IT, Collections Management, Metadata, Information Retrieval
Show / Hide Abstract

A Study on the Business Strategy of Smart Devices for Multimedia Contents
Hong Joo Lee
Page: 543~548, Vol. 7, No.3, 2011
Keywords: Smart Device, Business Strategy, Business Value Chain
Show / Hide Abstract

A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments
Yuki Fujiwara, Susumu Date, Kohei Ichikawa and Haruo Takemura
Page: 581~594, Vol. 7, No.4, 2011
Keywords: T iled Display Wall, SAGE, Multiple Application Control
Show / Hide Abstract

GML Map Visualization on Mobile Devices
Eun-Ha Song and Young-Sik Jeong
Page: 33~42, Vol. 6, No.1, 2010
Keywords: Map Visualization, DXF, DWG, SHP, GML, POI, Trace Monitoring
Show / Hide Abstract

Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy
Abdisalam Issa-Salwe, Munir Ahmed, Khalid Aloufi and Muhammad Kabir
Page: 121~128, Vol. 6, No.1, 2010
Keywords: Information Systems, Information Systems, Business Planning, Planning Strategy, IT/IS Alignment.
Show / Hide Abstract

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif and Munir Ahmed
Page: 177~184, Vol. 6, No.2, 2010
Keywords: Secure Routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Show / Hide Abstract

A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks
Akihiro Satoh, Toshiaki Osada, Toru Abe, Gen Kitagata, Norio Shiratori and Tetsuo Kinoshita
Page: 307~322, Vol. 6, No.3, 2010
Keywords: Mobile IP Network, Traffic Classification, Network Management, Traffic Engineering, Machine Learning
Show / Hide Abstract

Access Control to Objects and their Description in the Future Network of Information
Eric Renault, Ahmad Ahmad and Mohamed Abid
Page: 359~374, Vol. 6, No.3, 2010
Keywords: Future Internet, Network of Information, Security, Storage Space, Access Rights
Show / Hide Abstract

Generalized Proxy-Assisted Periodic Broadcasting (G-ProB) for Heterogeneous Clients in Video-on- Demand Service
Hidayat Febiansyah and Jin Baek Kwon
Page: 575~596, Vol. 6, No.4, 2010
Keywords: Proxy-Assisted, Periodic Broadcasting, Video-on-Demand
Show / Hide Abstract

SVD-LDA: A Combined Model for Text Classification
Nguyen Cao Truong Hai, Kyung-Im Kim and Hyuk-Ro Park
Page: 5~10, Vol. 5, No.1, 2009
Keywords: Latent Dirichlet Allocation, Singular Value Decomposition, Input Filtering, Text Classification, Data Preprocessing.
Show / Hide Abstract

Privacy-Aware Adaptable Web Services Using Petri Nets
You-Jin Song and Jae-Geol Yim
Page: 19~24, Vol. 5, No.1, 2009
Keywords: Privacy, Web Service, Petri Net, Context Framework
Show / Hide Abstract

Implementation of Advanced IP Network Technology for IPTV Service
Young-Do Joo
Page: 25~32, Vol. 5, No.1, 2009
Keywords: IPTV, Premium Backbone, QoS, Multicast, High Availability, Security
Show / Hide Abstract

GPU-based Stereo Matching Algorithm with the Strategy of Population-based Incremental Learning
Dong-Hu Nie, Kyu-Phil Han and Heng-Suk Lee
Page: 105~116, Vol. 5, No.2, 2009
Keywords: Image filtering, Performance Evaluation, General-Purpose Computation Based on GPU, GPU, Population-Based Incremental Learning
Show / Hide Abstract

Dynamic Reservation Scheme of Physical Cell Identity for 3GPP LTE Femtocell Systems
Poongup Lee, Jangkeun Jeong, Navrati Saxena and Jitae Shin
Page: 207~220, Vol. 5, No.4, 2009
Keywords: Femtocell, Physical Cell Identity (PCI), Access Control, Long Term Evolution (LTE)
Show / Hide Abstract

A Geometrical Center based Two-way Search Heuristic Algorithm for Vehicle Routing Problem with Pickups and Deliveries
Kwangcheol Shin
Page: 237~242, Vol. 5, No.4, 2009
Keywords: Vehicle Routing Problem, Heuristic Algorithm, Initial Solution
Show / Hide Abstract

Inverted Index based Modified Version of KNN for Text Categorization
Taeho Jo
Page: 17~26, Vol. 4, No.1, 2008
Keywords: String Vector, K- Nearest Neighbor, Text Categorization
Show / Hide Abstract

An Empirical Study of Qualities of Association Rules from a Statistical View Point
Maryann Dorn, Wen-Chi Hou, Dunren Che and Zhewei Jiang
Page: 27~32, Vol. 4, No.1, 2008
Keywords: Data Mining, Association Rule Mining, Rule Evaluation, Chi-square Test
Show / Hide Abstract

Developing Protege Plug-in: OWL Ontology Visualization using Social Network
Minsoo Kim and Minkoo Kim
Page: 61~66, Vol. 4, No.2, 2008
Keywords: OWL visualization, Protege, Protege plug-in
Show / Hide Abstract

Inverted Index based Modified Version of K-Means Algorithm for Text Clustering
Taeho Jo
Page: 67~76, Vol. 4, No.2, 2008
Keywords: String Vector, K Means Algorithm, Text Clustering
Show / Hide Abstract

Neural Text Categorizer for Exclusive Text Categorization
Taeho Jo
Page: 77~86, Vol. 4, No.2, 2008
Keywords: Disk Neural Text Categorizer, Text Categorization,
Show / Hide Abstract

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System
Shengzhong Deng, Chan-Hyun Youn, Qi Liu, Hoe Young Kim, Taoran Yu and Young Hun Kim
Page: 103~112, Vol. 4, No.3, 2008
Keywords: Grid Worfklow, Collaborative Healthcare Platform, SLA, Policy Adjuster
Show / Hide Abstract

Comparative Study on the Educational Use of Home Robots for Children
Jeonghye Han, Miheon Jo, Vicki Jones and Jun H Jo
Page: 159~168, Vol. 4, No.4, 2008
Keywords: Human-Computer Interaction, Human-Robot Interaction, e-Learning, Educational Media, r-Learning, Web-Based Instruction
Show / Hide Abstract

Membership Management based on a Hierarchical Ring for Large Grid Environments
Tae-Wan Gu, Seong-Jun Hong, Saangyong Uhmn and Kwang-Mo Lee
Page: 8~15, Vol. 3, No.1, 2007
Keywords: P2P, Membership Overlay, Membership Management, Hierarchical Ring
Show / Hide Abstract

An Efficient Functional Analysis Method for Micro-array Data Using Gene Ontology
Dong-wan Hong, Jong-keun Lee, Sung-soo Park, Sang-kyoon Hong and Jee-hee Yoon
Page: 38~42, Vol. 3, No.1, 2007
Keywords: Micro-array data, Functional analysis, Gene Ontology, Informative genes.
Show / Hide Abstract

A Timing Constraint Search Technique for a TMO based Real-time Process
Yoon-Seok Jeong, Tae-Wan Kim, Sun Young Han and Chun-Hyon Chang
Page: 1~5, Vol. 2, No.1, 2006
Keywords: Timing Constraint Search Technique, TMO Real-Time Process Load Model, Network Load Model
Show / Hide Abstract

Server Selection Schemes Considering Node Status For a Fault-Tolerant Streaming Service on a Peer-to-Peer Network
Hyunjoo Kim, Sooyong Kang and Heon Y. Yeom
Page: 6~12, Vol. 2, No.1, 2006
Keywords: Peer-to-peer network, Fault-tolerant streaming services
Show / Hide Abstract

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing
Yixin Jing, Jinhyung Kim and Dongwon Jeong
Page: 28~33, Vol. 2, No.1, 2006
Keywords: Access control, Ubiquitous computing, Task computing, Context-awareness
Show / Hide Abstract

TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network
Yuan Yang, Fu Zhen, Tae-Seok Lee and Myong-Soon Park
Page: 39~43, Vol. 2, No.1, 2006
Keywords: Wireless Sensor Network, MAC protocol, traffic aware, sleep/wake mechanism
Show / Hide Abstract

Determination of Optimal Cell Capacity for Initial Cell Planning in Wireless Cellular Networks
Young Ha Hwang, Sung-Kee Noh and Sang-Ha Kim
Page: 88~94, Vol. 2, No.2, 2006
Keywords: QoS, optimal cell capacity, cell planning, wireless cellular networks
Show / Hide Abstract

The Design and Implementation of an Available Bandwidth Measurement Scheme in the KGrid System
Seong-il Hahm, Seongho Cho, Han Choi, Chong-kwon Kim and Pillwoo Lee
Page: 101~106, Vol. 2, No.2, 2006
Keywords: KGrid, Globus Toolkit, Available Bandwidth Measurement, XML schema
Show / Hide Abstract

A Knowledge Discovery Framework for Spatiotemporal Data Mining
Jun-Wook Lee and Yong-Joon Lee
Page: 124~129, Vol. 2, No.2, 2006
Keywords: spatiotemporal data mining, spatiotemporal knowledge discovery, spatiotemporal moving pattern, discovery framework
Show / Hide Abstract

A Quality Assurance Process Model on Fault Management
Hyo-Soo Kim and Cheong Ho Baek
Page: 163~169, Vol. 2, No.3, 2006
Keywords: TMN, fault management, ERP, UML, RUP
Show / Hide Abstract

Metaphor and Typeface Based on Children’s Sensibilities for e-Learning
Miheon Jo and Jeonghye Han
Page: 178~182, Vol. 2, No.3, 2006
Keywords: e-Learning, Sensibility Factor, Metaphor, Typeface, Collaborative Recommending
Show / Hide Abstract

Automatic Reading System for On-off Type DNA Chip
Munho Ryu, Jong Dae Kim and Jongwon Kim
Page: 189~193, Vol. 2, No.3, 2006
Keywords: DNA chip, Automatic Reading, Report Generation, Image Processing, HPV DNA chip
Show / Hide Abstract

Robust Real-time Intrusion Detection System
Byung-Joo Kim and Il-Kon Kim
Page: 9~13, Vol. 1, No.1, 2005
Keywords: real-time IDS, kernel PCA. LS-SVM
Show / Hide Abstract

A Multiple Instance Learning Problem Approach Model to Anomaly Network Intrusion Detection
Ill-Young Weon, Doo-Heon Song, Sung-Bum Ko and Chang-Hoon Lee
Page: 14~21, Vol. 1, No.1, 2005
Keywords: Multiple Instance Learning Problem, Network Intrusion Detection, Anomaly Detection
Show / Hide Abstract

A Cluster-Based Energy-Efficient Routing Protocol without Location Information for Sensor Networks
Giljae Lee, Jonguk Kong, Minsun Lee and Okhwan Byeon
Page: 49~54, Vol. 1, No.1, 2005
Keywords: Wireless sensor networks, ubiquitous sensor networks, cluster-based routing protocol, energy-efficient routing
Show / Hide Abstract

The Comparison of RBS and TDP for the Sensor Networks Synchronization
Hyojung Lee, Byungchul Kim and Youngmi Kwon
Page: 70~74, Vol. 1, No.1, 2005
Keywords: Sensor Network, RBS, TDP, Time Synchronization
Show / Hide Abstract

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation
Jung-Ho Eom, Seon-Ho Park, Tae-Kyung Kim and Tai-Myoung Chung
Page: 79~85, Vol. 1, No.1, 2005
Keywords: Risk management, Risk Analysis, Asset analysis, 2-dimensional qualitative analysis
Show / Hide Abstract

A Study on RFID System with Secure Service Availability for Ubiquitous Computing
Dae-Hee Seo and Im-Yeong Lee
Page: 96~101, Vol. 1, No.1, 2005
Keywords: RFID, Service Availability, Secure Communication, Network Management Ubiquitous Computing
Show / Hide Abstract

A Statistic Correlation Analysis Algorithm Between Land Surface Temperature and Vegetation Index
Hyung Moo Kim, Beob Kyun Kim and Kang Soo You
Page: 102~106, Vol. 1, No.1, 2005
Keywords: LST, NDVI, Correlation Analysis, Landsat ETM+
Show / Hide Abstract