Search Word(s) in Title, Keywords, Authors, and Abstract: Using

Advanced Big Data Analysis, Artificial Intelligence & Communication Systems
Young-Sik Jeong and Jong Hyuk Park
Page: 1~6, Vol. 15, No.1, 2019
Keywords: Artificial Intelligence, Big Data, Communication System
Show / Hide Abstract

An Improved Level Set Method to Image Segmentation Based on Saliency
Yan Wang and Xianfa Xu
Page: 7~21, Vol. 15, No.1, 2019
Keywords: Canny Operator, Edge Energy, Level Set Method, Local Renyi Entropy, Saliency Map
Show / Hide Abstract

An Efficient Fingerprint Matching by Multiple Reference Points
Kittiya Khongkraphan
Page: 22~33, Vol. 15, No.1, 2019
Keywords: Fingerprint Matching, Matching Score, Multiple Reference Points, Non-linear Distortion
Show / Hide Abstract

A Study on an Automatic Multi-Focus System for Cell Observation
Jaeyoung Park and Sangjoon Lee
Page: 47~54, Vol. 15, No.1, 2019
Keywords: Automatic Multi-Focus, Cell Observation, Cubic Spline Interpolation, Peak Detection
Show / Hide Abstract

Hierarchical Graph based Segmentation and Consensus based Human Tracking Technique
Sunitha Madasi Ramachandra, Haradagere Siddaramaiah Jayanna and Ramegowda
Page: 67~90, Vol. 15, No.1, 2019
Keywords: Consensus Based Framework, Hierarchical Graph Based Segmentation, SIFT Keypoint Descriptor
Show / Hide Abstract

Automated Link Tracing for Classification of Malicious Websites in Malware Distribution Networks
Sang-Yong Choi, Chang Gyoon Lim and Yong-Min Kim
Page: 100~115, Vol. 15, No.1, 2019
Keywords: Auto Link Tracer, Drive-by Download, Malicious Website, MDN, Real Browser and Forward Proxy
Show / Hide Abstract

A Simple and Effective Combination of User-Based and Item-Based Recommendation Methods
Se-Chang Oh and Min Choi
Page: 127~136, Vol. 15, No.1, 2019
Keywords: Collaborative Filtering, Electronic Commerce, Recommender System, Sparsity
Show / Hide Abstract

MBS-LVM: A High-Performance Logical Volume Manager for Memory Bus-connected Storages over NUMA Servers
Yongseob Lee and Sungyong Park
Page: 151~158, Vol. 15, No.1, 2019
Keywords: Logical Volume Manager, Memory Bus Connected Storage, Non-volatile Memory, NUMA, NVDIMM
Show / Hide Abstract

Forest fire detection and identification using image processing and SVM
Mubarak Adam Ishag Mahmoud and Honge Ren
Page: 159~168, Vol. 15, No.1, 2019
Keywords: Background Subtraction, CIE L?a?b? Color Space, Forest Fire, SVM, Wavelet
Show / Hide Abstract

Wavelet-based Digital Image Watermarking by using Lorenz Chaotic Signal Localization
Jantana Panyavaraporn and Paramate Horkaew
Page: 169~180, Vol. 15, No.1, 2019
Keywords: Binary Image, Chaotic Signal, QR Code, Watermarking, Wavelet Analysis
Show / Hide Abstract

Enhanced Security Framework for E-Health Systems using Blockchain
Mohan Kubendiran, Satyapal Singh and Arun Kumar Sangaiah
Page: 239~250, Vol. 15, No.2, 2019
Keywords: Blockchain, Cloud Computing, Data Integrity, Data Provenance, E-Health System
Show / Hide Abstract

A Block-based Adaptive Data Hiding Approach using Pixel value difference and LSB Substitution to Secure E-Governance Documents
Tanmoy Halder, Sunil Karforma and Rupali Mandal
Page: 261~270, Vol. 15, No.2, 2019
Keywords: Block, E-Governance, Pixel Value Difference, Steganography
Show / Hide Abstract

Compression and Enhancement of Medical Images using Opposition Based Harmony Search Algorithm
Rekha Haridoss and Samundiswary Punniyakodi
Page: 288~304, Vol. 15, No.2, 2019
Keywords: Entropy, Harmony Search Algorithm, Image Compression, Multi-Thresholding, Optimization
Show / Hide Abstract

Multi-person tracking using SURF and background subtraction for surveillance
Juhee Yu and Kyoung-Mi Lee
Page: 344~358, Vol. 15, No.2, 2019
Keywords: Background Subtraction, Feature Detection, SURF, Tracking, Video Surveillance
Show / Hide Abstract

Optimization of Pipelined Discrete Wavelet Packet Transform Based on an Efficient Transpose Form and an Advanced Functional Sharing Technique
Hung-Ngoc Nguyen, Cheol-Hong Kim and Jong-Myon Kim
Page: 374~385, Vol. 15, No.2, 2019
Keywords: AFS Technique, CSDBE, Daubechies, DWPT, FIR Filter, FPGA, Pipelined Architecture
Show / Hide Abstract

Dynamic Thermal Rating of Transmission Line Based on Environmental Parameter Estimation
Zidan Sun, Zhijie Yan, Likai Liang, Ran Wei and Wei Wang
Page: 386~398, Vol. 15, No.2, 2019
Keywords: Dynamic Thermal Rating, Environmental Parameters, Ordinary Kriging Interpolation Method, Transmission Line
Show / Hide Abstract

S-mote: SMART Home Framework for Common Household Appliances in IoT Network
Dong-Min Park, Seong-Kyu Kim and Yeong-Seok Seo
Page: 449~456, Vol. 15, No.2, 2019
Keywords: Infrared Module, Infrared Signal, IoT (Internet of Things), Radio Frequency Module, Remote Control, SMART Home, S-mote
Show / Hide Abstract

Health and Wellness Monitoring Using Intelligent Sensing Technique
Yao Meng, Sang-Hoon Yi and Hee-Cheol Kim
Page: 478~491, Vol. 15, No.3, 2019
Keywords: Accelerometer, Electrocardiogram, Healthcare, Persuasive Technology, Real-Time Monitoring
Show / Hide Abstract

A System for Improving Data Leakage Detection based on Association Relationship between Data Leakage Patterns
Min-Ji Seo and Myung-Ho Kim
Page: 520~537, Vol. 15, No.3, 2019
Keywords: Apriori Algorithm, Associated Abnormal Behavior List, Comprehensive Leakage Detection Scenario, Convolutional Neural Network, Data Leakage Detection
Show / Hide Abstract

A Secure Cloud Computing System by Using Encryption and Access Control Model
Ghassan Sabeeh Mahmood, Dong Jun Huang and Baidaa Abdulrahman Jaleel
Page: 538~549, Vol. 15, No.3, 2019
Keywords: Access Control, Cloud Storage, Encryption, Security
Show / Hide Abstract

An Adaptive Transmission Power Control Algorithm for Wearable Healthcare Systems Based on Variations in the Body Conditions
Woosik Lee, Namgi Kim and Byoung-Dai Lee
Page: 593~603, Vol. 15, No.3, 2019
Keywords: Healthcare System, Transmission Power Control, Wireless Body Sensor Network
Show / Hide Abstract

Movie Recommendation Algorithm Using Social Network Analysis to Alleviate Cold-Start Problem
Khamphaphone Xinchang, Phonexay Vilakone and Doo-Soon Park
Page: 616~631, Vol. 15, No.3, 2019
Keywords: Cold Start Problem, Collaborative Filtering (CF), Movie Recommendation System, Social Network Analysis
Show / Hide Abstract

User Modeling Using User Preference and User Life Pattern Based on Personal Bio Data and SNS Data
Hyejin Song, Kihoon Lee and Nammee Moon
Page: 645~654, Vol. 15, No.3, 2019
Keywords: Bio Data, Data Tracking, Life Pattern, Machine Learning, Social Behavior Analysis, User Modeling
Show / Hide Abstract

Implementation of Low Complexity FFT, ADC and DAC Blocks of an OFDM Transmitter Receiver Using Verilog
Alok Joshi, Dewansh Aditya Gupta and Pravriti Jaipuriyar
Page: 670~681, Vol. 15, No.3, 2019
Keywords: ADC, DAC, DFT, FFT, OFDM, Verilog
Show / Hide Abstract

Time Series Classification of Cryptocurrency Price Trend Based on a Recurrent LSTM Neural Network
Do-Hyung Kwon, Ju-Bong Kim, Ju-Sung Heo, Chan-Myung Kim and Youn-Hee Han
Page: 694~706, Vol. 15, No.3, 2019
Keywords: Classification, Gradient Boosting, Long Short-Term Memory, Time Series Analysis
Show / Hide Abstract

Design of Recruitment Management Platform Using Digital Certificate on Blockchain
Won-Yong Jeong and Min Choi
Page: 707~716, Vol. 15, No.3, 2019
Keywords: Applicants Capability Verification, Blockchain, Digital Certificate, Recruitment Platform
Show / Hide Abstract

Dynamic Thermal Rating of Overhead Transmission Lines Based on GRAPES Numerical Weather Forecast
Hongbo Yan, Yanling Wang, Xiaofeng Zhou, Likai Liang, Zhijun Yin and Wei Wang
Page: 724~736, Vol. 15, No.4, 2019
Keywords: Dynamic Thermal Rating, Global/Regional Assimilation and Prediction System (GRAPES), Meteorological Data, Power Grids, Thermal Load Capacity, Transmission Line
Show / Hide Abstract

Shape Description and Retrieval Using Included-Angular Ternary Pattern
Guoqing Xu, Ke Xiao and Chen Li
Page: 737~747, Vol. 15, No.4, 2019
Keywords: Image Retrieval, Included-Angular Ternary Pattern, Multiscale, Shape Description
Show / Hide Abstract

Research on Noise Reduction Algorithm Based on Combination of LMS Filter and Spectral Subtraction
Danyang Cao, Zhixin Chen and Xue Gao
Page: 748~764, Vol. 15, No.4, 2019
Keywords: Least Mean Square Adaptive Filter, Spectral Subtraction, Speech Signal Processing, Signal-to-Noise Ratio
Show / Hide Abstract

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions
Khusanbek Gafurov and Tai-Myoung Chung
Page: 797~819, Vol. 15, No.4, 2019
Keywords: Cloud, Edge, IoT, IoT Security, MEC/MCC, RFID, WSN, 5G
Show / Hide Abstract

Robust Ultrasound Multigate Blood Volume Flow Estimation
Yi Zhang, Jinkai Li, Xin Liu and Dong Chyuan Liu
Page: 820~832, Vol. 15, No.4, 2019
Keywords: Blood Volume Flow Estimation, Flow Velocity Estimation, Ultrasound
Show / Hide Abstract

CCTV-Based Multi-Factor Authentication System
Byoung-Wook Kwon, Pradip Kumar Sharma and Jong-Hyuk Park
Page: 904~919, Vol. 15, No.4, 2019
Keywords: Argon2, Convolutional Neural Network, Deep Reinforcement Learning, Physically Unclonable Functions
Show / Hide Abstract

Survey of Temporal Information Extraction
Chae-Gyun Lim, Young-Seob Jeong and Ho-Jin Choi
Page: 931~956, Vol. 15, No.4, 2019
Keywords: Annotation Language, Temporal Information, Temporal Information Extraction
Show / Hide Abstract

Mobile User Interface Pattern Clustering Using Improved Semi-Supervised Kernel Fuzzy Clustering Method
Wei Jia, Qingyi Hua, Minjun Zhang, Rui Chen, Xiang Ji and Bo Wang
Page: 986~1016, Vol. 15, No.4, 2019
Keywords: Intuitionistic Fuzzy Entropy Measure, Mobile User Interface Pattern, Particle Swarm Optimization, Population Search Strategy, Semi-Supervised Kernel Fuzzy C-Means
Show / Hide Abstract

A Tracking-by-Detection System for Pedestrian Tracking Using Deep Learning Technique and Color Information
Mai Thanh Nhat Truong and Sanghoon Kim
Page: 1017~1028, Vol. 15, No.4, 2019
Keywords: Color Distribution, Convolutional Neural Network, Pedestrian Tracking, Tracking-by-Detection
Show / Hide Abstract

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang and Fang Zhao
Page: 129~139, Vol. 14, No.1, 2018
Keywords: AI, Crowdsourcing, Personality, Planning Language, Software Development, Task
Show / Hide Abstract

A Development of LDA Topic Association Systems Based on Spark-Hadoop Framework
Kiejin Park and Limei Peng
Page: 140~149, Vol. 14, No.1, 2018
Keywords: Association Analysis, Hadoop, LDA (Latent Dirichlet Allocation), Spark, Topic Model
Show / Hide Abstract

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform
Wei Song, Ning Feng, Yifei Tian, Simon Fong and Kyungeun Cho
Page: 162~175, Vol. 14, No.1, 2018
Keywords: Cloud Computing, Deep Belief Network, IoT, Power Conservation, Smart Metre
Show / Hide Abstract

Variations of AlexNet and GoogLeNet to Improve Korean Character Recognition Performance
Sang-Geol Lee, Yunsick Sung, Yeon-Gyu Kim and Eui-Young Cha
Page: 205~217, Vol. 14, No.1, 2018
Keywords: Classification, CNN, Deep Learning, Korean Character Recognition
Show / Hide Abstract

Verifying Code toward Trustworthy Software
Hyong-Soon Kim and Eunyoung Lee
Page: 309~321, Vol. 14, No.2, 2018
Keywords: Certified Compiler, Formal Verification, Language Semantics, Program Verification
Show / Hide Abstract

Routing Techniques for Data Aggregation in Sensor Networks
Jeong-Joon Kim
Page: 396~417, Vol. 14, No.2, 2018
Keywords: Itinerary, R-tree, Routing, Sensor Networks, Spatio-temporal Data
Show / Hide Abstract

Fingerprint Identification Based on Hierarchical Triangulation
Meryam Elmouhtadi, Sanaa El fkihi and Driss Aboutajdine
Page: 435~447, Vol. 14, No.2, 2018
Keywords: Biometric, Fingerprint Identification, Delaunay Triangulation, Fingerprint Matching, Minutiae Extraction
Show / Hide Abstract

Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment
Yeon-Woo Jang, Moon-Hwan Kang and Jae-Woo Chang
Page: 499~509, Vol. 14, No.2, 2018
Keywords: Bloom Filter, Concurrency Control, Hybrid Transactional Memory, Multi-core in-Memory Databases
Show / Hide Abstract

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery
Chengyou Wang, Heng Zhang and Xiao Zhou
Page: 510~522, Vol. 14, No.2, 2018
Keywords: Image Authentication and Self-recovery, Least Significant Bit (LSB), Peak Signal-to-Noise Ratio (PSNR), Self-embedding Fragile Watermarking
Show / Hide Abstract

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment
Sung-Hoon Lee, Jong-hyuk Roh, SooHyung Kim and Seung-Hun Jin
Page: 523~538, Vol. 14, No.2, 2018
Keywords: Feature Subset, Keystroke Dynamics, Smartphone Sensor
Show / Hide Abstract

Load Balancing in Cloud Computing Using Meta-Heuristic Algorithm
Youssef Fahim, Hamza Rahhali, Mohamed Hanine, El-Habib Benlahmar, El-Houssine Labriji, Mostafa Hanoune and Ahmed Eddaoui
Page: 569~589, Vol. 14, No.3, 2018
Keywords: Bat-Algorithm, Cloud Computing, Load Balancing, Pre-scheduling, Virtual Machines
Show / Hide Abstract

A Method of Image Identification in Instrumentation
Xiaoli Wang, Shilin Wang and Baochen Jiang
Page: 600~606, Vol. 14, No.3, 2018
Keywords: Code Wheel Instrument, Image Identification, IoT, Smart City, Template Matching
Show / Hide Abstract

Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model
Jin-Wook Jang
Page: 607~620, Vol. 14, No.3, 2018
Keywords: Automobile Control Software, Risk-based Test, Software Testing Process, Test Design, Test Planning, Test Policy and Strategy, TMMi Assessment
Show / Hide Abstract

Information Technology Infrastructure for Agriculture Genotyping Studies
Bens Pardamean, James W. Baurley, Anzaludin S. Perbangsa, Dwinita Utami, Habib Rijzaani and Dani Satyawan
Page: 655~665, Vol. 14, No.3, 2018
Keywords: Agriculture Biotechnology, Big Data, Genotyping, Infrastructure, IT
Show / Hide Abstract

Microblog Sentiment Analysis Method Based on Spectral Clustering
Shi Dong, Xingang Zhang and Ya Li
Page: 727~739, Vol. 14, No.3, 2018
Keywords: Machine Learning, RDM, Sentiment Analysis, Spectral Cluster
Show / Hide Abstract

Analyzing Machine Learning Techniques for Fault Prediction Using Web Applications
Ruchika Malhotra and Anjali Sharma
Page: 751~770, Vol. 14, No.3, 2018
Keywords: Empirical Validation, Fault prediction, Machine Learning, Object-Oriented Metrics, Web Application Quality
Show / Hide Abstract

Maximizing Network Utilization in IEEE 802.21 Assisted Vertical Handover over Wireless Heterogeneous Networks
Dinesh Pandey, Beom Hun Kim, Hui-Seon Gang, Goo-Rak Kwon and Jae-Young Pyun
Page: 771~789, Vol. 14, No.3, 2018
Keywords: Handover Decision, IEEE 802.21, Occupied Bandwidth, SINR, Vertical Handover
Show / Hide Abstract

Speaker Verification with the Constraint of Limited Data
Thyamagondlu Renukamurthy Jayanthi Kumari and Haradagere Siddaramaiah Jayanna
Page: 807~823, Vol. 14, No.4, 2018
Keywords: Gaussian Mixture Model (GMM), GMM-UBM, Multiple Frame Rate (MFR), Multiple Frame Size (MFS), MFSR, SFSR
Show / Hide Abstract

A Solution towards Eliminating Transaction Malleability in Bitcoin
Ubaidullah Rajput, Fizza Abbas and Heekuck Oh
Page: 837~850, Vol. 14, No.4, 2018
Keywords: Crypto-currency, Bitcoin, Transaction Malleability
Show / Hide Abstract

Predicting the Unemployment Rate Using Social Media Analysis
Pum-Mo Ryu
Page: 904~915, Vol. 14, No.4, 2018
Keywords: Google Index, Prediction, Sentiment Analysis, Social Media, Unemployment Rate
Show / Hide Abstract

Analysis of Academic Evaluation Indicators Based on Citation Quality
Mingyue Zhang, Jin Shi, Jin Wang and Chang Liu
Page: 916~925, Vol. 14, No.4, 2018
Keywords: Academic Evaluation Indicators, Citation Analysis, Citation Impact, Citation Quality
Show / Hide Abstract

An Efficient Implementation of Mobile Raspberry Pi Hadoop Clusters for Robust and Augmented Computing Performance
Kathiravan Srinivasan, Chuan-Yu Chang, Chao-Hsi Huang, Min-Hao Chang, Anant Sharma and Avinash Ankur
Page: 989~1009, Vol. 14, No.4, 2018
Keywords: Clusters, Hadoop, MapReduce, Mobile Raspberry Pi, Single-board Computer
Show / Hide Abstract

Restful Web Services Composition Using Semantic Ontology for Elderly Living Assistance Services
Sheik Mohammad Mostakim Fattah and Ilyoung Chong
Page: 1010~1032, Vol. 14, No.4, 2018
Keywords: Internet of Things, Service Composition, Web of Objects
Show / Hide Abstract

Integrated Lighting Enabler System Using M2M Platforms for Enhancing Energy Efficiency
Maman Abdurohman, Aji Gautama Putrada, Sidik Prabowo, Catur Wirawan Wijiutomo and Asma Elmangoush
Page: 1033~1048, Vol. 14, No.4, 2018
Keywords: M2M, Platform, OpenMTC, Sensor and Lighting
Show / Hide Abstract

Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device
Nam-Ho Keum, Taek Lee, Jung-Been Lee and Hoh Peter In
Page: 1049~1061, Vol. 14, No.4, 2018
Keywords: Automated Collection, BCI, Measurement of Immersion, Noise Filtering, Non-experimental Environment, Portable EEG
Show / Hide Abstract

Cross-Validation Probabilistic Neural Network Based Face Identification
Abdelhadi Lotfi and Abdelkader Benyettou
Page: 1075~1086, Vol. 14, No.5, 2018
Keywords: Biometrics, Classification, Cross-Validation, Face Identification, Optimization, Probabilistic Neural Networks
Show / Hide Abstract

Designing a Vibrotactile Reading System for Mobile Phones
Shaowei Chu and Keying Zhu
Page: 1102~1113, Vol. 14, No.5, 2018
Keywords: Blind Use, Mobile Accessibility, Tactile Reading, User Study, Vibrotactile Interface
Show / Hide Abstract

A Multi-Level Integrator with Programming Based Boosting for Person Authentication Using Different Biometrics
Sumana Kundu and Goutam Sarker
Page: 1114~1135, Vol. 14, No.5, 2018
Keywords: Accuracy, Back Propagation Learning, Biometrics, HBC, F-score, Malsburg Learning, Mega-Super-Classifier, MOCA, Multiple Classification System, OCA, Person Identification, Precision, Recall, RBFN, SOM, Super- Classifier
Show / Hide Abstract

A Physical Storage Design Method for Access Structures of Image Information Systems
Jung-A Lee and Jong-Hak Lee
Page: 1150~1166, Vol. 14, No.5, 2018
Keywords: Image Access Structure, Image Retrieval Query, Multidimensional File Organizations, Physical Storage Design
Show / Hide Abstract

A Clustering Approach for Feature Selection in Microarray Data Classification Using Random Forest
Husna Aydadenta and Adiwijaya
Page: 1167~1175, Vol. 14, No.5, 2018
Keywords: Classification, Clustering, Dimensional Reduction, Microarray, Random Forest
Show / Hide Abstract

A Hybrid Proposed Framework for Object Detection and Classification
Muhammad Aamir, Yi-Fei Pu, Ziaur Rahman, Waheed Ahmed Abro, Hamad Naeem, Farhan Ullah and Aymen Mudheher Badr
Page: 1176~1194, Vol. 14, No.5, 2018
Keywords: Image Proposals, Feature Extraction, Object Classification, Object Detection, Segmentation
Show / Hide Abstract

Semantic Image Search: Case Study for Western Region Tourism in Thailand
Chantana Chantrapornchai, Netnapa Bunlaw and Chidchanok Choksuchat
Page: 1195~1214, Vol. 14, No.5, 2018
Keywords: Image Search, Ontology, Semantic Web, Tourism, Western Thailand
Show / Hide Abstract

An Improved Harmony Search Algorithm and Its Application in Function Optimization
Zhongda Tian and Chao Zhang
Page: 1237~1253, Vol. 14, No.5, 2018
Keywords: Complex Functions, Harmony Search, Intelligent Algorithm, Optimization
Show / Hide Abstract

A Dependency Graph-Based Keyphrase Extraction Method Using Anti-patterns
Khuyagbaatar Batsuren, Erdenebileg Batbaatar, Tsendsuren Munkhdalai, Meijing Li, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 1254~1271, Vol. 14, No.5, 2018
Keywords: Dependency Graph, Keyphrase Extraction
Show / Hide Abstract

Video Captioning with Visual and Semantic Features
Sujin Lee and Incheol Kim
Page: 1318~1330, Vol. 14, No.6, 2018
Keywords: Attention-Based Caption Generation, Deep Neural Networks, Semantic Feature, Video Captioning
Show / Hide Abstract

Triqubit-state Measurement-based Image Edge Detection Algorithm
Zhonghua Wang and Faliang Huang
Page: 1331~1346, Vol. 14, No.6, 2018
Keywords: Edge Detection, Partial Differential Equation, Pixel Saliency, Qubit State, Quantum Measurement
Show / Hide Abstract

Energy efficient Cross Layer Multipath Routing for Image Delivery in Wireless Sensor Networks
Santhosha Rao, Kumara Shama and Pavan Kumar Rao
Page: 1347~1360, Vol. 14, No.6, 2018
Keywords: Castalia for OMNET++, Cross Layer Multimedia, Magick++, Sink-Based MMRE AOMDV
Show / Hide Abstract

A CPU-GPU Hybrid System of Environment Perception and 3D Terrain Reconstruction for Unmanned Ground Vehicle
Wei Song, Shuanghui Zou, Yifei Tian, Su Sun, Simon Fong, Kyungeun Cho and Lvyang Qiu
Page: 1445~1456, Vol. 14, No.6, 2018
Keywords: Driving Awareness, Environment Perception, Unmanned Ground Vehicle, 3D Reconstruction
Show / Hide Abstract

Path Generation Method of UAV Autopilots using Max-Min Algorithm
Jeonghoon Kwak and Yunsick Sung
Page: 1457~1463, Vol. 14, No.6, 2018
Keywords: Autopilot, Max-Min Algorithm, Path Generation, Unmanned Aerial Vehicle
Show / Hide Abstract

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments
JongBeom Lim, HeonChang Yu and Joon-Min Gil
Page: 1480~1493, Vol. 14, No.6, 2018
Keywords: Cloud Computing, Clustering, Computational Intelligence, Resource Monitoring
Show / Hide Abstract

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information
Chen Li, Mengti Liang, Wei Song and Ke Xiao
Page: 1494~1507, Vol. 14, No.6, 2018
Keywords: Face Recognition, Intelligent Human Identification, MP-CNN, Robust Feature
Show / Hide Abstract

Power Cable Ampacity and Influential Factors Analysis under Operation
Qiang Tong, Jianping Qi, Yanling Wang, Likai Liang, Xiangxing Meng and Qiang Zhang
Page: 1136~1149, Vol. 14, No.5, 2018
Keywords: Conductor Temperature, Influential Factors, Power Cable, Static Thermal Rating, Transient Temperature
Show / Hide Abstract

LBP and DWT Based Fragile Watermarking for Image Authentication
Chengyou Wang, Heng Zhang and Xiao Zhou
Page: 666~679, Vol. 14, No.3, 2018
Keywords: Discrete Wavelet Transform (DWT), Fragile Watermarking, Image Authentication, Local Binary Pattern (LBP), Semi-blind Detection
Show / Hide Abstract

Combining Multi-Criteria Analysis with CBR for Medical Decision Support
Mansoul Abdelhak and Atmani Baghdad
Page: 1496~1515, Vol. 13, No.6, 2017
Keywords: Case-Based Reasoning (CBR), Decision Support, Medical Diagnosis, Multi-Criteria Analysis (MCA), Multimodal Reasoning
Show / Hide Abstract

Patch Integrity Verification Method Using Dual Electronic Signatures
JunHee Kim and Yoojae Won
Page: 1516~1526, Vol. 13, No.6, 2017
Keywords: Digital Signature, Electronic Signature, Integrity, Patch Distribution, Patch Management
Show / Hide Abstract

Internet of Things (IoT) Framework for Granting Trust among Objects
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1613~1627, Vol. 13, No.6, 2017
Keywords: Framework, Internet of Things, Privacy, Security, Trust
Show / Hide Abstract

Texture Image Retrieval Using DTCWT-SVD and Local Binary Pattern Features
Dayou Jiang and Jongweon Kim
Page: 1628~1639, Vol. 13, No.6, 2017
Keywords: Dual-Tree Complex Wavelet Transform, Image Retrieval, Local Binary Pattern, SVD, Texture Feature
Show / Hide Abstract

Beacon-Based Indoor Location Measurement Method to Enhanced Common Chord-Based Trilateration
Jeonghoon Kwak and Yunsick Sung
Page: 1640~1651, Vol. 13, No.6, 2017
Keywords: Beacon, Chord-Based Trilateration, Indoor Location, Trilateration, Unmanned Aerial Vehicle
Show / Hide Abstract

A Contour Descriptors-Based Generalized Scheme for Handwritten Odia Numerals Recognition
Tusar Kanti Mishra, Banshidhar Majhi and Ratnakar Dash
Page: 174~183, Vol. 13, No.1, 2017
Keywords: Contour Features, Handwritten Character, Neural Classifier, Numeral Recognition, OCR, Odia
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017
Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

Fingerprint Matching Based on Dimension Reduced DCT Feature Vectors
Sangita Bharkad and Manesh Kokare
Page: 852~862, Vol. 13, No.4, 2017
Keywords: Biometric, Discrete Cosine Transform, Fingerprint Identification, Similarity Measure
Show / Hide Abstract

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Page: 8~25, Vol. 13, No.1, 2017
Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

An Improved Cat Swarm Optimization Algorithm Based on Opposition-Based Learning and Cauchy Operator for Clustering
Yugal Kumar and G. Sahoo
Page: 1000~1013, Vol. 13, No.4, 2017
Keywords: Cat Swarm Optimization, Cauchy Mutation Operator, Clustering, Opposition-Based Learning, Particle Swarm Optimization
Show / Hide Abstract

Adaptive Medical Image Compression Based on Lossy and Lossless Embedded Zerotree Methods
Sid Ahmed Elhannachi, Nacéra Benamrane and Taleb-Ahmed Abdelmalik
Page: 40~56, Vol. 13, No.1, 2017
Keywords: LEZW, Medical Images, ROI, RDCT, SPIHT
Show / Hide Abstract

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017
Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

Joint Estimation of Near-Field Source Parameters and Array Response
Han Cui and Wenjuan Peng
Page: 83~94, Vol. 13, No.1, 2017
Keywords: Array Calibration, Gain/Phase Response, Near-Field Source Localization
Show / Hide Abstract

Feasibility and Performance Analysis of RDMA Transfer through PCI Express
Min Choi and Jong Hyuk Park
Page: 95~103, Vol. 13, No.1, 2017
Keywords: Interconnection Network, Non-transparent Bridge, PCI Express, RDMA
Show / Hide Abstract

Combination of Classifiers Decisions for Multilingual Speaker Identification
B. G. Nagaraja and H. S. Jayanna
Page: 928~940, Vol. 13, No.4, 2017
Keywords: Classifier Combination, Cross-lingual, Monolingual, Multilingual, Speaker Identification
Show / Hide Abstract

Parallel and Sequential Implementation to Minimize the Time for Data Transmission Using Steiner Trees
V. Anand and N. Sairam
Page: 104~113, Vol. 13, No.1, 2017
Keywords: Least-Cost Path, Non-terminal Nodes, Parallel, Sequential, Steiner Vertices, Terminals, Time Complexity
Show / Hide Abstract

Detection of Microcalcification Using the Wavelet Based Adaptive Sigmoid Function and Neural Network
Sanjeev Kumar and Mahesh Chandra
Page: 703~715, Vol. 13, No.4, 2017
Keywords: Cascade-Forward Back Propagation Technique, Computer-Aided Diagnosis (CAD), Contrast Limited Adaptive Histogram Equalization (CLAHE), Gray-Level Co-Occurrence Matrix (GLCM), Mammographic Image Analysis Society (MIAS) Database, Modified Sigmoid Function
Show / Hide Abstract

Color Image Coding Based on Shape-Adaptive All Phase Biorthogonal Transform
Xiaoyan Wang, Chengyou Wang, Xiao Zhou and Zhiqiang Yang
Page: 114~127, Vol. 13, No.1, 2017
Keywords: Color Image Coding, Shape-Adaptive All Phase Biorthogonal Transform (SA-APBT), Color Space Conversion, Chain Code
Show / Hide Abstract

Test Set Generation for Pairwise Testing Using Genetic Algorithms
Sangeeta Sabharwal and Manuj Aggarwal
Page: 1089~1102, Vol. 13, No.5, 2017
Keywords: Combinatorial Testing, Genetic Algorithm, Mixed Covering Arrays, Pairwise Testing, Test Set, t-way Testing
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017
Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

A Hybrid Bacterial Foraging Optimization Algorithm and a Radial Basic Function Network for Image Classification
Yasmina Teldja Amghar and Hadria Fizazi
Page: 215~235, Vol. 13, No.2, 2017
Keywords: Bacterial Foraging Optimization Algorithm, Hybrid, Image Classification, Radial Basic Function
Show / Hide Abstract

Mobility Scenarios into Future Wireless Access Network
Syed Mushhad Mustuzhar Gilani, Tang Hong, Qiqi Cai and Guofeng Zhao
Page: 236~255, Vol. 13, No.2, 2017
Keywords: Access Point (AP), Internet Architecture, Network Function Virtualization (NFV), Seamless Handover, Software-Defined Network (SDN)
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 1229~1242, Vol. 13, No.5, 2017
Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization
Sarah Hachemi Benziane and Abdelkader Benyettou
Page: 268~283, Vol. 13, No.2, 2017
Keywords: Biometrics, BPSO, GPU, Hand Vein, Identification, OTSU
Show / Hide Abstract

DTG Big Data Analysis for Fuel Consumption Estimation
Wonhee Cho and Eunmi Choi
Page: 285~304, Vol. 13, No.2, 2017
Keywords: Big Data Analysis, DTG, Eco-Driving, Fuel Economy, Fuel Consumption Estimation, MapReduce
Show / Hide Abstract

A Multi-Objective TRIBES/OC-SVM Approach for the Extraction of Areas of Interest from Satellite Images
Wafaa Benhabib and Hadria Fizazi
Page: 321~339, Vol. 13, No.2, 2017
Keywords: Image Classification, MO-TRIBES, OC-SVM, Remote Sensing
Show / Hide Abstract

Image Restoration and Object Removal Using Prioritized Adaptive Patch-Based Inpainting in a Wavelet Domain
Rajesh P. Borole and Sanjiv V. Bonde
Page: 1183~1202, Vol. 13, No.5, 2017
Keywords: Image Inpainting, Object Removal, Region Filling, Texture and Structure Propagation, Wavelet Inpainting
Show / Hide Abstract

Design of Real-Time CAN Framework Based on Plug and Play Functionality
Sungheo Kim and Kwang-il Hwang
Page: 348~359, Vol. 13, No.2, 2017
Keywords: Controller Area Networks, Plug and Play, Real-Time
Show / Hide Abstract

Block Sparse Signals Recovery via Block BacktrackingBased Matching Pursuit Method
Rui Qi, Yujie Zhang and Hongwei Li
Page: 360~369, Vol. 13, No.2, 2017
Keywords: Block Sparse Signal, Compressed Sensing, Sparse Signal Reconstruction
Show / Hide Abstract

Speech Query Recognition for Tamil Language Using Wavelet and Wavelet Packets
P. Iswarya and V. Radha
Page: 1135~1148, Vol. 13, No.5, 2017
Keywords: De-noising, Feature Extraction, Speech Recognition, Support Vector Machine, Wavelet Packet
Show / Hide Abstract

Boosting the Reasoning-Based Approach by Applying Structural Metrics for Ontology Alignment
Abderrahmane Khiat and Moussa Benaissa
Page: 834~851, Vol. 13, No.4, 2017
Keywords: Description Logics Inference, Intra-Taxonomy Measures, Ontology Alignment, Semantic Interoperability, Semantic Web, Structural Similarity
Show / Hide Abstract

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform
Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia
Page: 1331~1344, Vol. 13, No.5, 2017
Keywords: Arnold Transform, DWT, JPEG, JPEG2000, PSNR, SIM
Show / Hide Abstract

Content-Based Image Retrieval Using Combined Color and Texture Features Extracted by Multi-resolution Multi-direction Filtering
Hee-Hyung Bu, Nam-Chul Kim, Chae-Joo Moon and Jong-Hwa Kim
Page: 464~475, Vol. 13, No.3, 2017
Keywords: Color and Texture Feature, Content-Based Image Retrieval, HSV Color Space, Multi-resolution Multi-direction Filtering
Show / Hide Abstract

Fire Detection Using Multi-Channel Information and Gray Level Co-occurrence Matrix Image Features
Jae-Hyun Jun, Min-Jun Kim, Yong-Suk Jang and Sung-Ho Kim
Page: 590~598, Vol. 13, No.3, 2017
Keywords: Color Features, Fire Detection, Texture Features
Show / Hide Abstract

Achievable Rate Analysis for Opportunistic Non-orthogonal Multiple Access-Based Cooperative Relaying Systems
In-Ho Lee and Howon Lee
Page: 630~642, Vol. 13, No.3, 2017
Keywords: Achievable Rate Analysis, Decode-and-Forward Relaying, Non-orthogonal Multiple Access, Opportunistic Transmission, Rayleigh Fading Channels, Superposition Coding
Show / Hide Abstract

Using Semantic Knowledge in the Uyghur-Chinese Person Name Transliteration
Alim Murat, Turghun Osman, Yating Yang, Xi Zhou, Lei Wang and Xiao Li
Page: 716~730, Vol. 13, No.4, 2017
Keywords: Gender, Language Origin, Semantic Knowledge-based Model, Transliteration of Person Name
Show / Hide Abstract

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications
Daewon Kim
Page: 731~751, Vol. 13, No.4, 2017
Keywords: Cloud, HTML5, JavaScript, Mobile
Show / Hide Abstract

An Innovative Approach of Bangla Text Summarization by Introducing Pronoun Replacement and Improved Sentence Ranking
Md. Majharul Haque, Suraiya Pervin and Zerina Begum
Page: 752~777, Vol. 13, No.4, 2017
Keywords: Bangla News Document, Cosine Similarity, Dangling Pronoun, Pronoun Replacement, Sentence Frequency
Show / Hide Abstract

A Method of Chinese and Thai Cross-Lingual Query Expansion Based on Comparable Corpus
Peili Tang, Jing Zhao, Zhengtao Yu, Zhuo Wang and Yantuan Xian
Page: 805~817, Vol. 13, No.4, 2017
Keywords: Comparable Corpus, Cross-Language Query Expansion, Cross-Language Information Retrieval, Words Relationship
Show / Hide Abstract

Real-Time Motion Blur Using Triangular Motion Paths
MinhPhuoc Hong and Kyoungsu Oh
Page: 818~833, Vol. 13, No.4, 2017
Keywords: Motion Blur, Real-Time Rendering, Visibility
Show / Hide Abstract

Interactive Experience Room Using Infrared Sensors and User’s Poses
Green Bang, Jinsuk Yang, Kyoungsu Oh and Ilju Ko
Page: 876~892, Vol. 13, No.4, 2017
Keywords: Human Pose Recognition, Infrared Sensor, Interactive Experience Room, Virtual Reality
Show / Hide Abstract

Traffic Information Service Model Considering Personal Driving Trajectories
Homin Han and Soyoung Park
Page: 951~969, Vol. 13, No.4, 2017
Keywords: GPS-to-Road Mapping Strategy, Personal Trajectory, Traffic Information System, Trajectory Estimation
Show / Hide Abstract

Extraction of ObjectProperty-UsageMethod Relation from Web Documents
Chaveevan Pechsiri, Sumran Phainoun and Rapeepun Piriyakul
Page: 1103~1125, Vol. 13, No.5, 2017
Keywords: Medicinal Property, N-Word-Co, Semantic Relation, Usage-Method
Show / Hide Abstract

3D Segmentation for High-Resolution Image Datasets Using a Commercial Editing Tool in the IoT Environment
Koojoo Kwon and Byeong-Seok Shin
Page: 1126~1134, Vol. 13, No.5, 2017
Keywords: Segmentation, Large-Scale Image, Photo Editing, Visible Korean, Volume Rendering
Show / Hide Abstract

Similarity Evalution between Graphs: A Formal Concept Analysis Approach
Fei Hao, Dae-Soo Sim, Doo-Soon Park and Hyung-Seok Seo
Page: 1158~1167, Vol. 13, No.5, 2017
Keywords: Formal Concept Analysis, Graph, Social Networks, Similarity Evaluation
Show / Hide Abstract

Regularization Parameter Selection for Total Variation Model Based on Local Spectral Response
Yuhui Zheng, Kai Ma, Qiqiong Yu, Jianwei Zhang and Jin Wang
Page: 1168~1182, Vol. 13, No.5, 2017
Keywords: Image Denoising, Local Spectral Response, Regularization Parameter Selection
Show / Hide Abstract

A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network
Bayu Adhi Tama and Kyung-Hyune Rhee
Page: 1203~1212, Vol. 13, No.5, 2017
Keywords: Classifier Ensembles, Classifier’s Significance, Intrusion Detection Systems (IDSs), Wireless Network
Show / Hide Abstract

Thai Classical Music Matching using t-Distribution on Instantaneous Robust Algorithm for Pitch Tracking Framework
Pheerasut Boonmatham, Sunee Pongpinigpinyo and Tasanawan Soonklang
Page: 1213~1228, Vol. 13, No.5, 2017
Keywords: Pitch Tracking Algorithm, Instantaneous Robust Algorithm for Pitch Tracking, T-Distribution, Shortest Query Sample
Show / Hide Abstract

Modeling and Simulation of Scheduling Medical Materials Using Graph Model for Complex Rescue
Ming Lv, Jingchen Zheng, Qingying Tong, Jinhong Chen, Haoting Liu and Yun Gao
Page: 1243~1258, Vol. 13, No.5, 2017
Keywords: Bipartite Graph, BSCS, Drug Scheduling, Medical Rescue, Optimization Matching
Show / Hide Abstract

Analysis on Ampacity of Overhead Transmission Lines Being Operated
Zhijie Yan, Yanling Wang and Likai Liang
Page: 1358~1371, Vol. 13, No.5, 2017
Keywords: Ampacity, Dynamic Thermal Rating, Rating Scales, Risk Level, Transmission Line
Show / Hide Abstract

Content-based Image Retrieval Using Texture Features Extracted from Local Energy and Local Correlation of Gabor Transformed Images
Hee-Hyung Bu, Nam-Chul Kim, Bae-Ho Lee and Sung-Ho Kim
Page: 1372~1381, Vol. 13, No.5, 2017
Keywords: Content-based Image Retrieval, Gabor Transformation, Local Energy, Local Correlation, Texture Feature
Show / Hide Abstract

An Improved Algorithm for Redundancy Detection Using Global Value Numbering
Nabizath Saleena and Vineeth Paleri
Page: 214~225, Vol. 12, No.2, 2016
Keywords: Equivalent Expression, Global Value Numbering, Herbrand Equivalence, Strong Equivalence Dag
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016
Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016
Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks
Muhammad Sajjad Khan and Insoo Koo
Page: 295~309, Vol. 12, No.2, 2016
Keywords: Cognitive Radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion
Show / Hide Abstract

An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping
Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa and Hasan Al-Shalabi
Page: 322~331, Vol. 12, No.2, 2016
Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding
Show / Hide Abstract

Two-Dimensional Joint Bayesian Method for Face Verification
Sunghyu Han, Il-Yong Lee and Jung-Ho Ahn
Page: 381~391, Vol. 12, No.3, 2016
Keywords: Face Verification, Joint Bayesian Method, LBP, LFW Database, Two-Dimensional Joint Bayesian Method
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification
Chouchane Ammar*, Belahcene Mebarka, Ouamane Abdelmalik and Bourennane Salah
Page: 468~488, Vol. 12, No.3, 2016
Keywords: 3D Face Verification, Depth Image, Dimensionality Reduction, Histograms Local Features, Local Descriptors, Support Vector Machine
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016
Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016
Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

Community Model for Smart TV over the Top Services
Suman Pandey, Young Joon Won, Mi-Jung Choi and Joon-Min Gil
Page: 577~590, Vol. 12, No.4, 2016
Keywords: Community Formation, Datamining, HbbTV, Smart TV
Show / Hide Abstract

Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images
Arif Muntasa
Page: 591~611, Vol. 12, No.4, 2016
Keywords: Eigenspaces, Feature Extraction, Homogeneous, Non-homogeneous
Show / Hide Abstract

Interactive Authoring Tool for Mobile Augmented Reality Content
Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim and Yoo-Joo Cho
Page: 612~630, Vol. 12, No.4, 2016
Keywords: Augmented Reality, Authoring Tool, Interactive Mobile, Mobile App
Show / Hide Abstract

Image Deblocking Scheme for JPEG Compressed Images Using an Adaptive-Weighted Bilateral Filter
Liping Wang, Chengyou Wang, Wei Huang and Xiao Zhou
Page: 631~643, Vol. 12, No.4, 2016
Keywords: Image Deblocking, Adaptive-Weighted Bilateral Filter, Blind Image Quality Assessment (BIQA), Local Entropy
Show / Hide Abstract

A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features
Mohamed Belaoued and Smaine Mazouzi
Page: 644~660, Vol. 12, No.4, 2016
Keywords: Chi-Square Test, Malware Analysis, PE-Optional Header, Real-Time Detection Windows API
Show / Hide Abstract

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique
Salima Lalani and D. D. Doye
Page: 681~687, Vol. 12, No.4, 2016
Keywords: DWT, Image Watermarking, Torus
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016
Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

A Robust Fingerprint Matching System Using Orientation Features
Ravinder Kumar, Pravin Chandra and Madasu Hanmandlu
Page: 83~99, Vol. 12, No.1, 2016
Keywords: Circular ROI, Core Point Detection, Image-Based Fingerprint Matching, Orientation Features
Show / Hide Abstract

Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke
Meeyeon Lee, Ye-Seul Park and Jung-Won Lee
Page: 741~753, Vol. 12, No.4, 2016
Keywords: Acute Myocardial Infarction, Data Model, Hospital Information System, Ischemic Stroke, Medical Image, Medical Information, Ontology
Show / Hide Abstract

Sparsification of Digital Images Using Discrete Rajan Transform
Kethepalli Mallikarjuna, Kodati Satya Prasad and M. V. Subramanyam
Page: 754~764, Vol. 12, No.4, 2016
Keywords: Degree of Sparsity, Discrete Rajan Transform, Sparsification
Show / Hide Abstract

X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach
Sajid Ullah Khan, Wang Yin Chai, Chai Soo See and Amjad Khan
Page: 35~45, Vol. 12, No.1, 2016
Keywords: Image Enhancement, Image Fusion, Poisson/Impulse Noise, Sharpening, Wavelet Transform
Show / Hide Abstract

Personalizing Information Using Users’ Online Social Networks: A Case Study of CiteULike
Danielle Lee
Page: 1~21, Vol. 11, No.1, 2015
Keywords: CiteULike, Homophily, Information Personalization, Online Social Networks, Social Network-based Recommendations
Show / Hide Abstract

A Real-Time Integrated Hierarchical Temporal Memory Network for the Real-Time Continuous Multi-Interval Prediction of Data Streams
Hyun-Syug Kang
Page: 39~56, Vol. 11, No.1, 2015
Keywords: Data Streams, Hierarchical Temporal Memory, Multiple Interval Prediction, Real-Time Prediction
Show / Hide Abstract

Energy Consumption Scheduling in a Smart Grid Including Renewable Energy
Nadia Boumkheld, Mounir Ghogho and Mohammed El Koutbi
Page: 116~124, Vol. 11, No.1, 2015
Keywords: Demand Response, Energy Management, Energy Scheduling, Optimization
Show / Hide Abstract

Fast Device Discovery for Remote Device Management in Lighting Control Networks
Sang-Il Choi, Sanghun Lee, Seok-Joo Koh, Sang-Kyu Lim, Insu Kim and Tae-Gyu Kang
Page: 125~133, Vol. 11, No.1, 2015
Keywords: Device Discovery, Partition-Based, RDM
Show / Hide Abstract

Spatial Interpolation of Meteorologic Variables in Vietnam using the Kriging Method
Xuan Thanh Nguyen, Ba Tung Nguyen, Khac Phong Do, Quang Hung Bui, Thi Nhat Thanh Nguyen, Van Quynh Vuong and Thanh Ha Le
Page: 134~147, Vol. 11, No.1, 2015
Keywords: Interpolation, Meteorologic Variables, Kriging
Show / Hide Abstract

Research on the E-Commerce Credit Scoring Model Using the Gaussian Density Function
Xiao Qiang, He Rui-chun and Zhang Wei
Page: 173~183, Vol. 11, No.2, 2015
Keywords: Abnormal Point, Credit Scoring, Density, E-commerce
Show / Hide Abstract

A Note on Computing the Crisp Order Context of a Fuzzy Formal Context for Knowledge Reduction
Prem Kumar Singh and Ch. Aswani Kumar
Page: 184~204, Vol. 11, No.2, 2015
Keywords: Crisp Context, Concept Lattice, Formal Concept Analysis, Fuzzy Formal Concept, Fuzzy Relation, Knowledge Reduction
Show / Hide Abstract

A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation
Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee and Hong-Woo Chun
Page: 248~265, Vol. 11, No.2, 2015
Keywords: Bioinformatics, Event Extraction, Maximum Entropy, Text-Mining
Show / Hide Abstract

Biological Infectious Watermarking Model for Video Copyright Protection
Bong-Joo Jang, Suk-Hwan Lee, SangHun Lim and Ki-Ryong Kwon
Page: 280~294, Vol. 11, No.2, 2015
Keywords: Biological Virus Modeling, Copyright Protection, Infectious Watermarking, Video Watermarking
Show / Hide Abstract

A Dataset of Online Handwritten Assamese Characters
Udayan Baruah and Shyamanta M. Hazarika
Page: 325~341, Vol. 11, No.3, 2015
Keywords: Assamese, Character Recognition, Dataset Collection, Data Verification, Online Handwriting, Support Vector Machine
Show / Hide Abstract

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Siti Nurmaini and Ahmad Zarkasi
Page: 370~388, Vol. 11, No.3, 2015
Keywords: Localization Process, RAM-Based Neural Network, Swarm Robots
Show / Hide Abstract

A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases
Si-Woo Byun and Seok-Woo Jang
Page: 389~405, Vol. 11, No.3, 2015
Keywords: Column-Aware Index Management, Column-Oriented Databases, Flash Memory Storage, Game Database, Network Database
Show / Hide Abstract

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Souad Bekkouch and Kamel Mohamed Faraoun
Page: 406~420, Vol. 11, No.3, 2015
Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform
Show / Hide Abstract

Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments
Maheshi B. Dissanayake and Dilanga L. B. Abeyrathna
Page: 483~494, Vol. 11, No.3, 2015
Keywords: Complexity, Compression Efficiency, HEVC, H.264/AVC, Latency
Show / Hide Abstract

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki and Driss Aboutajdine
Page: 495~508, Vol. 11, No.4, 2015
Keywords: Copyright Protection, Mammograms, Medical Image, Robust Watermarking, Visual Cryptography
Show / Hide Abstract

Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage
Nawel Bendimerad and Bouabdellah Kechar
Page: 509~527, Vol. 11, No.4, 2015
Keywords: Coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks
Show / Hide Abstract

Text Detection in Scene Images Based on Interest Points
Minh Hieu Nguyen and Gueesang Lee
Page: 528~537, Vol. 11, No.4, 2015
Keywords: Connected Component, Interest Point, Tensor Voting, Text Detection
Show / Hide Abstract

Event Detection on Motion Activities Using a Dynamic Grid
Jitdumrong Preechasuk and Punpiti Piamsa-nga
Page: 538~555, Vol. 11, No.4, 2015
Keywords: Dynamic Grid Feature, Event Detection, Event Patterns, Pedestrian Activities
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015
Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization
Seung-Shik Kang
Page: 573~582, Vol. 11, No.4, 2015
Keywords: Consonant Normalization, Edit Distance, Korean Character, Normalization Factor
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015
Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

Viewpoint Unconstrained Face Recognition Based on Affine Local Descriptors and Probabilistic Similarity
Yongbin Gao and Hyo Jong Lee
Page: 643~654, Vol. 11, No.4, 2015
Keywords: Affine Scale Invariant Feature Transform, Face Recognition, Probabilistic Similarity
Show / Hide Abstract

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia and Farnoush Banaei-Kashani
Page: 1~22, Vol. 10, No.1, 2014
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety
Show / Hide Abstract

Gesture Input as an Out-of-band Channel
Oyuntungalag Chagnaadorj and Jiro Tanaka
Page: 92~102, Vol. 10, No.1, 2014
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer
Show / Hide Abstract

Non-iterative Bit Loading Algorithm for OFDM in Independent and Correlated fading
John W. Manry and Santosh Nagaraj
Page: 163~175, Vol. 10, No.2, 2014
Keywords: Adaptive Modulation, Orthogonal Frequency Division Multiplexing (OFDM), FadingAdaptive Modulation, Orthogonal Frequency Division Multiplexing (OFDM), Fading
Show / Hide Abstract

Prioritized Multipath Video Forwarding in WSN
Syed Muhammad Asad Zaidi, Jieun Jung and Byunghun Song
Page: 176~192, Vol. 10, No.2, 2014
Keywords: WMSN, H.264, Multiple Paths, Quality of Service
Show / Hide Abstract

Optical Image Encryption and Decryption Considering Wireless Communication Channels
Myungjin Cho and In-Ho Lee
Page: 215~222, Vol. 10, No.2, 2014
Keywords: Optical Encryption and Decryption, Wireless Communication Channels
Show / Hide Abstract

Leveraged BMIS Model for Cloud Risk Control
YouJin Song and Yasheng Pang
Page: 240~255, Vol. 10, No.2, 2014
Keywords: Cloud risk, CSFs, BMIS, Risk control, Leverage point, Effective model
Show / Hide Abstract

A High Quality Steganographic Method Using Morphing
Anant M.Bagade and Sanjay N.Talbar
Page: 256~270, Vol. 10, No.2, 2014
Keywords: Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality
Show / Hide Abstract

Skin Segmentation Using YUV and RGB Color Spaces
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan and Puteri Suhaiza Sulaiman
Page: 283~299, Vol. 10, No.2, 2014
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space
Show / Hide Abstract

Default Prediction for Real Estate Companies with Imbalanced Dataset
Yuan-Xiang Dong , Zhi Xiao and Xue Xiao
Page: 314~333, Vol. 10, No.2, 2014
Keywords: Default prediction, Imbalanced dataset, Real estate listed companies, Minoritysample generation approach
Show / Hide Abstract

Imputation of Medical Data Using Subspace Condition Order Degree Polynomials
Klaokanlaya Silachan and Panjai Tantatsanawong
Page: 395~411, Vol. 10, No.3, 2014
Keywords: Imputation, Personal Temporal Data, Polynomial Interpolation
Show / Hide Abstract

Fault Detection in the Semiconductor Etch Process Using the Seasonal Autoregressive Integrated Moving Average Modeling
Muhammad Zeeshan Arshad, Javeria Muhammad Nawaz and Sang Jeen Hong
Page: 429~442, Vol. 10, No.3, 2014
Keywords: Autoregressive Integrated Moving Average, Dynamic Time Warping, Fault Detection, Seasonal Autoregressive Integrated Moving Average, Semiconductor Process, Time Series Modeling
Show / Hide Abstract

Extreme Learning Machine Ensemble Using Bagging for Facial Expression Recognition
Deepak Ghimire and Joonwhoan Lee
Page: 443~458, Vol. 10, No.3, 2014
Keywords: Bagging, Ensemble Learning, Extreme Learning Machine, Facial Expression Recognition, Histogram of Orientation Gradient
Show / Hide Abstract

Multifactor Authentication Using a QR Code and a One-Time Password
Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya and G. Sainarayanan
Page: 483~490, Vol. 10, No.3, 2014
Keywords: Authentication, One-Time Password, Personal Assurance Message, Quick Response Code
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Page: 491~502, Vol. 10, No.4, 2014
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

Multimodal Biometric Using a Hierarchical Fusion of a Person’s Face, Voice, and Online Signature
Youssef Elmir, Zakaria Elberrichi and Réda Adjoudj
Page: 555~567, Vol. 10, No.4, 2014
Keywords: Hierarchical Fusion, LDA, Multimodal Biometric Fusion, PCA
Show / Hide Abstract

An Efficient Color Edge Detection Using the Mahalanobis Distance
Kittiya Khongkraphan
Page: 589~601, Vol. 10, No.4, 2014
Keywords: Color Image, Edge Detection, Mahalanobis Distance
Show / Hide Abstract

A Step towards User Privacy while Using Location-Based Services
Fizza Abbas and Heekuck Oh
Page: 618~627, Vol. 10, No.4, 2014
Keywords: Location Based Services, Location Privacy, Point of Interests
Show / Hide Abstract

A TRUS Prostate Segmentation using Gabor Texture Features and Snake-like Contour
Sung Gyun Kim and Yeong Geon Seo
Page: 103~116, Vol. 9, No.1, 2013
Keywords: Gabor Filter Bank, Support Vector Machines, Prostate Segmentation
Show / Hide Abstract

Optical Character Recognition for Hindi Language Using a Neural-network Approach
Divakar Yadav, Sonia Sánchez-Cuadrado and Jorge Morato
Page: 117~140, Vol. 9, No.1, 2013
Keywords: OCR, Pre-processing, Segmentation, Feature Vector, Classification, Artificial Neural Network (ANN)
Show / Hide Abstract

A Robust Face Detection Method Based on Skin Color and Edges
Deepak Ghimire and Joonwhoan Lee
Page: 141~156, Vol. 9, No.1, 2013
Keywords: Face Detection, Image Enhancement, Skin Tone Percentage Index, Canny Edge, Facial Features
Show / Hide Abstract

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering
Woon-hae Jeong, Se-jun Kim, Doo-soon Park and Jin Kwak
Page: 157~172, Vol. 9, No.1, 2013
Keywords: Collaborative Filtering, Movie Recommendation System, Personal Propensity, Security, Push Stack
Show / Hide Abstract

Region-Based Facial Expression Recognition in Still Images
Gawed M. Nagi, Rahmita Rahmat, Fatimah Khalid and Muhamad Taufik
Page: 173~188, Vol. 9, No.1, 2013
Keywords: Facial Expression Recognition (FER), Facial Features Detection, Facial Features Extraction, Cascade Classifier, LBP, One-Vs-Rest SVM
Show / Hide Abstract

An Analysis of Replication Enhancement for a High Availability Cluster
Sehoon Park, Im Y. Jung, Heonsang Eom and Heon Y. Yeom
Page: 205~216, Vol. 9, No.2, 2013
Keywords: High-Availability Cluster, Replication Enhancement, SRM, DRBD
Show / Hide Abstract

An Improved Approach to Ranking Web Documents
Pooja Gupta, Sandeep K. Singh, Divakar Yadav and A. K. Sharma
Page: 217~236, Vol. 9, No.2, 2013
Keywords: Ranking, Ordering, WWW, Information Retrieval, Contextual Relevance, Contextual Sense, Web Documents
Show / Hide Abstract

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance
Hoo-Rock Lee, Kyung-Yul Chung and Kyoung-Son Jhang
Page: 237~246, Vol. 9, No.2, 2013
Keywords: Maintenance Hatch, Underground Facilities, WSN, Routing Protocol, ns-2
Show / Hide Abstract

A Secure Network for Mobile Wireless Service
Kun Peng
Page: 247~258, Vol. 9, No.2, 2013
Keywords: Mobile Wireless Network, Security
Show / Hide Abstract

An Integrated Neural Network Model for Domain Action Determination in Goal-Oriented Dialogues
Hyunjung Lee, Harksoo Kim and Jungyun Seo
Page: 259~270, Vol. 9, No.2, 2013
Keywords: Domain Action, Speech Act, Concept Sequence, Neural Network
Show / Hide Abstract

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Om Prakash Verma, Munazza Nizam and Musheer Ahmad
Page: 271~286, Vol. 9, No.2, 2013
Keywords: Chaotic Systems, Number of Pixel Change Rate, Unified Average Changed Intensity, Correlation Coefficient, Entropy
Show / Hide Abstract

An Improvement Video Search Method for VP-Tree by using a Trigonometric Inequality
Samuel Sangkon Lee, Masami Shishibori and Chia Y. Han
Page: 315~332, Vol. 9, No.2, 2013
Keywords: Vantage Point; VP-Tree; Trigonometric Inequality; Search Algorithm; Range Search; Nearest Neighbor Search; AESA algorithm; Multimedia Database
Show / Hide Abstract

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do and Deokjai Choi
Page: 333~348, Vol. 9, No.2, 2013
Keywords: Gait Recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, Identification, Signal Processing
Show / Hide Abstract

Interactive Semantic Image Retrieval
Pushpa B. Patil and Manesh B. Kokare
Page: 349~364, Vol. 9, No.3, 2013
Keywords: Content-based Image Retrieval (CBIR), Relevance Feedback (RF), Rotated Complex Wavelet Filt ers (RCWFs), Dual Tree Complex Wavelet, and Image retrieval
Show / Hide Abstract

An Efficient Load Balancing Scheme for Multi-Gateways in Wireless Mesh Networks
Junping Liu and Sang-Hwa Chung
Page: 365~378, Vol. 9, No.3, 2013
Keywords: Wireless Mesh Network, Internet Gateway, Multi-Gateway Multi-Root, Load Balancing
Show / Hide Abstract

Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine
Young Sup Hwang, Jin Baek Kwon, Jae Chan Moon and Seong Je Cho
Page: 395~404, Vol. 9, No.3, 2013
Keywords: adaptive classification, malicious web pages, support vector machine
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment
Sung-Wook Park and Im-Yeong Lee
Page: 461~476, Vol. 9, No.3, 2013
Keywords: NFC Mobile Payment, Zero Knowledge Proof, NTRU, Ring Signature
Show / Hide Abstract

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator
Panduranga H T, Dr. Naveen Kumar S K and Sharath Kumar H S
Page: 499~510, Vol. 9, No.3, 2013
Keywords: Image Encryption, Latin Square
Show / Hide Abstract

Opinion Bias Detection Based on Social Opinions for Twitter
A-Rong Kwon and Kyung-Soon Lee
Page: 538~547, Vol. 9, No.4, 2013
Keywords: Social opinion, Personal opinion, Bias detection, Sentiment, Target
Show / Hide Abstract

Small Object Segmentation Based on Visual Saliency in Natural Images
Huynh Trung Manh and Gueesang Lee
Page: 592~601, Vol. 9, No.4, 2013
Keywords: Gaussian Mixture Model (GMM), Visual Saliency, Segmentation, Object Detection.
Show / Hide Abstract

Automatic Single Document Text Summarization Using Key Concepts in Documents
Kamal Sarkar
Page: 602~620, Vol. 9, No.4, 2013
Keywords: Automatic Text Summarization, Key Concepts, Keyphrase Extraction
Show / Hide Abstract

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model
Seok-Hwan Yoon and Joonyoung Min
Page: 621~632, Vol. 9, No.4, 2013
Keywords: Forest Fire Detection, Gaussian Mixture Models, HSL Color Space, Smoke Signature
Show / Hide Abstract

A Computational Intelligence Based Online Data Imputation Method: An Application For Banking
Kancherla Jonah Nishanth and Vadlamani Ravi
Page: 633~650, Vol. 9, No.4, 2013
Keywords: Data Imputation, General Regression Neural Network (GRNN), Evolving Clustering Method (ECM), Imputation, K-Medoids clustering, K-Means clustering, MLP
Show / Hide Abstract

A Feature Selection-based Ensemble Method for Arrhythmia Classification
Erdenetuya Namsrai, Tsendsuren Munkhdalai, Meijing Li, Jung-Hoon Shin, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 31~40, Vol. 9, No.1, 2013
Keywords: Data Mining, Ensemble Method, Feature Selection, Arrhythmia Classification
Show / Hide Abstract

A Dynamic Zigbee Protocol for Reducing Power Consumption
Do-keun Kwon, Ki hyun Chung and Kyunghee Choi
Page: 41~52, Vol. 9, No.1, 2013
Keywords: Zigbee, Low Power Protocol, Beacon, Power Consumption
Show / Hide Abstract

A Cross-Layer Unequal Error Protection Scheme for Prioritized H.264 Video using RCPC Codes and Hierarchical QAM
Wei-Ho Chung, Sunil Kumar, Seethal Paluri, Santosh Nagaraj, Annamalai Annamalai Jr. and John D. Matyjas
Page: 53~68, Vol. 9, No.1, 2013
Keywords: Wireless Transmission, Unequal Error Protection (UEP), Rate-Compatible Punctured Convolutional (RCPC) Code, Hierarchical Modulation, H.264/AVC Video Coding
Show / Hide Abstract

Optimal Software Release Using Time and Cost Benefits via Fuzzy Multi-Criteria and Fault Tolerance
Praveen Ranjan Srivastava
Page: 21~54, Vol. 8, No.1, 2012
Keywords: Software Testing, Fuzzy Multi-Criteria Approach, Fuzzy Logic, Fuzzy Rules Based, Confidence, Centre of Gravity, Fault Tolerance, Kilo Line of Code (KLOC), Software Development Effort (SDE), Software Test Effort (STE), Decision Makers (DM)
Show / Hide Abstract

Using a Cellular Automaton to Extract Medical Information from Clinical Reports
Fatiha Barigou, Baghdad Atmani and Bouziane Beldjilali
Page: 67~84, Vol. 8, No.1, 2012
Keywords: Clinical Reports, Information Extraction, Cellular Automaton, Boolean Inference Engine
Show / Hide Abstract

Supporting Java Components in the SID Simulation System
Hasrul Ma'ruf, Hidayat Febiansyah and Jin Baek Kwon
Page: 101~118, Vol. 8, No.1, 2012
Keywords: Embedded System, Simulation System, SID Simulator
Show / Hide Abstract

An Improved Fast and Secure Hash Algorithm
Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar and Nipun Rajan
Page: 119~132, Vol. 8, No.1, 2012
Keywords: SHA-256, SFHA-256, Improved SFHA-256
Show / Hide Abstract

Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components
Chen Liu, Omar Granados, Rolando Duarte and Jean Andrian
Page: 133~144, Vol. 8, No.1, 2012
Keywords: Software Communication Architecture, Software Defined Radio, Energy Efficiency, FPGA, Cognitive Radio
Show / Hide Abstract

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
Daya Gupta, Asok De and Kakali Chatterjee
Page: 145~158, Vol. 8, No.1, 2012
Keywords: Hyperelliptic Curve Cryptosystem(HECC), Secure Hyperelliptic Curve, Hyperelliptic Curve Deffie-Hellman(HECDH), Hyperelliptic Curve Digital Signature Algorithm (HECDSA)
Show / Hide Abstract

An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators
B. John Oommen, Anis Yazidi and Ole-Christoffer Granmo
Page: 191~212, Vol. 8, No.2, 2012
Keywords: Weak es timators, User's Profiling, Time Varying Preferences
Show / Hide Abstract

A Novel Approach for Deriving Test Scenarios and Test Cases from Events
Sandeep K. Singh, Sangeeta Sabharwal and J.P.Gupta
Page: 213~240, Vol. 8, No.2, 2012
Keywords: Events, Event Meta Model, Testing, Test cases, Test scenarios, Event Based Systems, Software Engineering
Show / Hide Abstract

Fault Prediction Using Statistical and Machine Learning Methods for Improving Software Quality
Ruchika Malhotra and Ankita Jain
Page: 241~262, Vol. 8, No.2, 2012
Keywords: Empirical Validation, Object Oriented, Receiver Operating Characteristics, Statistical Methods, Machine Learning, Fault Prediction
Show / Hide Abstract

A Framework for Processing Brain Waves Used in a Brain-computer Interface
Yunsick Sung, Kyungeun Cho and Kyhyun Um
Page: 315~330, Vol. 8, No.2, 2012
Keywords: Brain-Computer Interface, BCI Toolkit, BCI Framework, EEG, Brain Wave
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

Automatic Detection of Texture-defects using Texture-periodicity and Jensen-Shannon Divergence
V. Asha, N.U. Bhajantri and P. Nagabhushan
Page: 359~374, Vol. 8, No.2, 2012
Keywords: Periodicity, Jensen-Shannon Divergence, Cluster, Defect
Show / Hide Abstract

Efficient and General PVSS Based on ElGamal Encryption
Kun Peng
Page: 375~388, Vol. 8, No.2, 2012
Keywords: ElGamal, PVSS
Show / Hide Abstract

Texture Comparison with an Orientation Matching Scheme
Nguyen Cao Truong Hai, Do-Yeon Kim and Hyuk-Ro Park
Page: 389~398, Vol. 8, No.3, 2012
Keywords: Orientation Matching, Texture Analysis, Texture Comparison, K-means Clustering
Show / Hide Abstract

A Vision-Based Method to Find Fingertips in a Closed Hand
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal and J.L. Raheja
Page: 399~408, Vol. 8, No.3, 2012
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner Detection
Show / Hide Abstract

A Method for Learning Macro-Actions for Virtual Characters Using Programming by Demonstration and Reinforcement Learning
Yunsick Sung and Kyungeun Cho
Page: 409~420, Vol. 8, No.3, 2012
Keywords: Reinforcement Learning, Monte Carlo Method, Behavior Generation Model, Programming B y Demonstration, Macro-Action, Multi-Step Action
Show / Hide Abstract

A New Approach to Fingerprint Detection Using a Combination of Minutiae Points and Invariant Moments Parameters
Sarnali Basak, Md. Imdadul Islam and M. R. Amin
Page: 421~436, Vol. 8, No.3, 2012
Keywords: Random Variable, Skewness, Kurtosis, Invariant Moment, Termination And Bifurcation Points, Virtual Core Point
Show / Hide Abstract

Using an Adaptive Search Tree to Predict User Location
Sechang Oh
Page: 437~444, Vol. 8, No.3, 2012
Keywords: Location Prediction, Learning System, Search Tree, Context-Awareness
Show / Hide Abstract

Iris Recognition Using Ridgelets
Lenina Birgale and Manesh Kokare
Page: 445~458, Vol. 8, No.3, 2012
Keywords: Ridgelets, Texture, Wavelets, Biometrics, Features, Database
Show / Hide Abstract

Performance Evaluation of Multi-Hop Communication Based on a Mobile Multi-Robot System in a Subterranean Laneway
Qing-Ling Liu and Duk-Hwan Oh
Page: 471~482, Vol. 8, No.3, 2012
Keywords: Multi-hop Communication, Wireless Sensor Network, Multi-Robot System, Disaster Exploration, ZigBee Technology, Underground Environment
Show / Hide Abstract

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face
M.P. Satone and Dr. G.K. Kharate
Page: 483~494, Vol. 8, No.3, 2012
Keywords: Face Recognition, Princ ipal Component Analysis, Subband, Wavelet Transform
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

Design and Development of m-Learning Service Based on 3G Cellular Phones
Kwang Sik Chung and Jeong Eun Lee
Page: 521~538, Vol. 8, No.3, 2012
Keywords: m-Learning, e-Learning Service Platform, Mobile Education Device, Cellular Phone, 3G Networks, H.264
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

A Survey of QoS Based Routing Protocols for Wireless Sensor Networks
R.Sumathi and M.G.Srinivas
Page: 589~602, Vol. 8, No.4, 2012
Keywords: Wireless Sensor Networks, Quality of Service, Reliability, Energy Efficiency, End-To-End Delay, Critical Data
Show / Hide Abstract

Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6
Hyon-Young Choi, Sung-Gi Min, Youn-Hee Han and Rajeev Koodli
Page: 603~620, Vol. 8, No.4, 2012
Keywords: Flow Mobility, Proxy Mobile IPv6
Show / Hide Abstract

A Comparative Study of Estimation by Analogy using Data Mining Techniques
Geeta Nagpal, Moin Uddin and Arvinder Kaur
Page: 621~652, Vol. 8, No.4, 2012
Keywords: Software Estimations, Estimation by Analogy, Grey Relational Analysis, Robust Regression, Data Mining Techniques
Show / Hide Abstract

ECG Denoising by Modeling Wavelet Sub-Band Coefficients using Kernel Density Estimation
Shubhada Ardhapurkar, Ramchandra Manthalkar and Suhas Gajre
Page: 669~684, Vol. 8, No.4, 2012
Keywords: Kernel Density Estimation, Discrete Wavelet Transform, Probability Density Function (PDF), Signal to Noise Ratio
Show / Hide Abstract

Proactive: Comprehensive Access to Job Information
Danielle Lee and Peter Brusilovsky
Page: 721~738, Vol. 8, No.4, 2012
Keywords: Job recommendation, explicit preference, implicit preference, personalized information retrieval
Show / Hide Abstract

A Clustering Protocol with Mode Selection for Wireless Sensor Network
Aries Kusdaryono and Kyung Oh Lee
Page: 29~42, Vol. 7, No.1, 2011
Keywords: Ad Hoc Network, Wireless Sensor Networks, Clustering, Routing Protocol
Show / Hide Abstract

Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits
Haiqing Nan, Kyung Ki Kim, Wei Wang and Ken Choi
Page: 93~102, Vol. 7, No.1, 2011
Keywords: PVT Variation sensors, Yield, Voltage Scaling, Frequency Scaling
Show / Hide Abstract

Ensuring Anonymity for LBSs in Smartphone Environment
Mohammed Alzaabi, Chan Yeob Yeun and Thomas Anthony Martin
Page: 121~136, Vol. 7, No.1, 2011
Keywords: Location Based Services, Anonymity, Location Information
Show / Hide Abstract

Guess and Determine Attack on Bivium
Neda Rohani, Zainab Noferesti, Javad Mohajeri and Mohammad Reza Aref
Page: 151~158, Vol. 7, No.1, 2011
Keywords: Bivium, Guess and Determine Attack, Stream Ciphers, Linear Approximations, Entropy
Show / Hide Abstract

A Method of Risk Assessment for Multi-Factor Authentication
Jae-Jung Kim and Seng-Phil Hong
Page: 187~198, Vol. 7, No.1, 2011
Keywords: Multi-factor Authentication, PKI, User Authentication, Biometric Authentication
Show / Hide Abstract

A Cultural Dimensions Model based on Smart Phone Applications
Jung-Min Oh and Nammee Moon
Page: 209~220, Vol. 7, No.1, 2011
Keywords: Smart Phone, Culture, Cultural Dimensions Model, MDS, Mobile Application Analysis
Show / Hide Abstract

Development of an OPC Client-Server Framework for Monitoring and Control Systems
Vu Van Tan and Myeong-Jae Yi
Page: 321~340, Vol. 7, No.2, 2011
Keywords: OPC, OPC UA SDK, Monitoring and Control, Redundancy, Unified Architecture
Show / Hide Abstract

Analysis of Generalized Impact Factors and the Indices of Journals
Ash Mohammad Abbas
Page: 341~354, Vol. 7, No.2, 2011
Keywords: Information Systems, Quality of Research, Impact factor, h-index, g-index
Show / Hide Abstract

An Adequacy Based Test Data Generation Technique Using Genetic Algorithms
Ruchika Malhotra and Mohit Garg
Page: 363~384, Vol. 7, No.2, 2011
Keywords: Software Testing, Adequacy Based Testing Criteria, Reliability Based Testing Criteria, Genetic Algorithms, Mutation Analysis
Show / Hide Abstract

Wavelet-based Feature Extraction Algorithm for an Iris Recognition System
Ayra Panganiban, Noel Linsangan and Felicito Caluyo
Page: 425~434, Vol. 7, No.3, 2011
Keywords: Biometrics, Degrees of Freedom, Iris Recognition, Wavelet
Show / Hide Abstract

An Approach to Art Collections Management and Content-based Recovery
Concepcion Perez de Celis Herrero, Jaime Lara Alvarez, Gustavo Cossio Aguilar and Maria J. Somodevilla Garcia
Page: 447~458, Vol. 7, No.3, 2011
Keywords: Search by Content, Faceted Classification, IT, Collections Management, Metadata, Information Retrieval
Show / Hide Abstract

Utilizing Various Natural Language Processing Techniques for Biomedical Interaction Extraction
Kyung-Mi Park, Han-Cheol Cho and Hae-Chang Rim
Page: 459~472, Vol. 7, No.3, 2011
Keywords: Biomedical Interaction Extraction, Natural Language Processing, Interaction Verb Extraction, Argument Relation Identification
Show / Hide Abstract

Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach
Jagat Sesh Challa, Arindam Paul, Yogesh Dada, Venkatesh Nerella, Praveen Ranjan Srivastava and Ajit Pratap Singh
Page: 473~518, Vol. 7, No.3, 2011
Keywords: Software Quality Parameters, ISO/IEC 9126, Fuzzy Software Quality Quantification Tool (FSQQT), Fuzzy Membership Function, Triangular Fuzzy Sets, KLOC, GUI, CUI
Show / Hide Abstract

A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game
Hiroshi Kutsuna and Satoshi Fujita
Page: 531~542, Vol. 7, No.3, 2011
Keywords: Congestion Control, AIMD, Minority Game
Show / Hide Abstract

A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal
Amartya Neogi, Abhoy Chand Mondal and Soumitra Kumar Mandal
Page: 595~612, Vol. 7, No.4, 2011
Keywords: Performance Appraisal, Cascaded Fuzzy Inference System, University Non-Teaching Staff, Sensitivity Analysis, Gaussian MF, Fuzzy Rules
Show / Hide Abstract

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks
Ji-In Kim and Seok-Joo Koh
Page: 627~634, Vol. 7, No.4, 2011
Keywords: Proxy Mobile IPv6, Handover, Partial Bicasting, Buffering, Simulation Analysis
Show / Hide Abstract

Grobner Basis Attacks on Lightweight RFID Authentication Protocols
Daewan Han
Page: 691~706, Vol. 7, No.4, 2011
Keywords: RFID, Authentication Protocol, Algebraic Attack, Grobner Basis
Show / Hide Abstract

Stream-based Biomedical Classification Algorithms for Analyzing Biosignals
Simon Fong, Yang Hang, Sabah Mohammed and Jinan Fiaidhi
Page: 717~732, Vol. 7, No.4, 2011
Keywords: Data Stream Mining, VFDT, OVFDT, C4.5 and Biomedical Domain
Show / Hide Abstract

A Hybrid Approach for Regression Testing in Interprocedural Program
Yogesh Singh, Arvinder Kaur and Bharti Suri
Page: 21~32, Vol. 6, No.1, 2010
Keywords: Regression Testing, Test Prioritization, Test Selection, Interprocedural
Show / Hide Abstract

Approximate Clustering on Data Streams Using Discrete Cosine Transform
Feng Yu, Damalie Oyana, Wen-Chi Hou and Michael Wainer
Page: 67~78, Vol. 6, No.1, 2010
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression
Show / Hide Abstract

IPv4 Address Trading Using Resource Certificate
Cheol-Soon Park, Jae-Cheol Ryou and Yong-Tae Park
Page: 107~120, Vol. 6, No.1, 2010
Keywords: IP Address Trading, Resource PKI, Routing Security, IP Address Management
Show / Hide Abstract

Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy
Abdisalam Issa-Salwe, Munir Ahmed, Khalid Aloufi and Muhammad Kabir
Page: 121~128, Vol. 6, No.1, 2010
Keywords: Information Systems, Information Systems, Business Planning, Planning Strategy, IT/IS Alignment.
Show / Hide Abstract

A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks
Kezhong Liu and Ji Xiong
Page: 147~162, Vol. 6, No.2, 2010
Keywords: Localization Algorithm, Mobile Beacon Node, Sensor Network, RS?
Show / Hide Abstract

IMTAR: Incremental Mining of General Temporal Association Rules
Anour F.A. Dafa-Alla, Ho Sun Shon, Khalid E.K. Saeed, Minghao Piao, Un-il Yun, Kyung Joo Cheoi and Keun Ho Ryu
Page: 163~176, Vol. 6, No.2, 2010
Keywords: Incremental Mining of General Temporal Association Rules, Incremental TFP-Tree
Show / Hide Abstract

Development of Personal Information Protection Model using a Mobile Agent
Seong-Hee Bae and Jaejoon Kim
Page: 185~196, Vol. 6, No.2, 2010
Keywords: Information Protect Model, Mobile Agent, Personal Information Protection, Privacy Protection Policy
Show / Hide Abstract

Recognition of Human Facial Expression in a Video Image using the Active Appearance Model
Gyeong-Sic Jo and Yong-Guk Kim
Page: 261~268, Vol. 6, No.2, 2010
Keywords: Active Appearance Model, Facial Expression Recognition, Image Alignment Method
Show / Hide Abstract

Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol
R. Padmavathy and Chakravarthy Bhagvati
Page: 335~346, Vol. 6, No.3, 2010
Keywords: Ephemeral Key, Pohlig-Hellman Method, Van-Oorschot Method, Index Calculus Method, Chang-Chang Password Key Exchange Protocol
Show / Hide Abstract

A Measurement System for 3D Hand-Drawn Gesture with a PHANToM™ Device
Seong Young Ko, Won-Chul Bang and Sang-Youn Kim
Page: 347~358, Vol. 6, No.3, 2010
Keywords: Hand-Drawn Gesture, Hand-Held Device, Inertial Measurement Unit, PHANToMTM , Calibration
Show / Hide Abstract

En-Route Trajectory calculation using Flight Plan Information for Effective Air Traffic Management
Yong-Kyun Kim, Yun-Hyun Jo, Jin-Won Yun, Taeck-Keun Oh, Hee-Chang Roh, Sang-Bang Choi and Hyo-Dal Park
Page: 375~384, Vol. 6, No.3, 2010
Keywords: ATC, ATM, Trajectory Prediction, ATFM
Show / Hide Abstract

Hiding Secret Data in an Image Using Codeword Imitation
Zhi-Hui Wang, Chin-Chen Chang and Pei-Yu Tsai
Page: 435~452, Vol. 6, No.4, 2010
Keywords: Data Hiding, Steganography, Vector Quantization
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Dae-Suk Yoo and Seung Sik Choi
Page: 501~510, Vol. 6, No.4, 2010
Keywords: Sensor Networks, Energy-Efficient MAC, S-MAC
Show / Hide Abstract

Fingerprint Detection Using Canny Filter and DWT, a New Approach
Md. Imdadul Islam, Nasima Begum, Mahbubul Alam and M. R. Amin
Page: 511~520, Vol. 6, No.4, 2010
Keywords: Canny Filter, Color Inversion, Skewness, Kurtosis and Convolution
Show / Hide Abstract

An Optimized Approach of Fault Distribution for Debugging in Parallel
Maneesha Srivasatav, Yogesh Singh and Durg Singh Chauhan
Page: 537~552, Vol. 6, No.4, 2010
Keywords: Clustering, Debugging, Fault Localization, Optimization, Software Testing
Show / Hide Abstract

Efficient Server Virtualization using Grid Service Infrastructure
Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song and Young-Sik Jeong
Page: 553~562, Vol. 6, No.4, 2010
Keywords: Server Virtualization, Grid Service, Grid Infrastructure, Power Efficiency, Cloud Computing
Show / Hide Abstract

Generalized Proxy-Assisted Periodic Broadcasting (G-ProB) for Heterogeneous Clients in Video-on- Demand Service
Hidayat Febiansyah and Jin Baek Kwon
Page: 575~596, Vol. 6, No.4, 2010
Keywords: Proxy-Assisted, Periodic Broadcasting, Video-on-Demand
Show / Hide Abstract

A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Chetna Gupta, Yogesh Singh and Durg Singh Chauhan
Page: 597~608, Vol. 6, No.4, 2010
Keywords: Change Impact Analysis, Regression Testing, Software Maintenance, Software Testing
Show / Hide Abstract

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System
Hyung-Min Lim, Kun-Won Jang and Byung-Gi Kim
Page: 609~620, Vol. 6, No.4, 2010
Keywords: u-Learning, e-Learning, Event Hooking, Content packing
Show / Hide Abstract

A New Variational Level Set Evolving Algorithm for Image Segmentation
Yang Fei and Jong Won Park
Page: 1~4, Vol. 5, No.1, 2009
Keywords: Level Set Methods, Evolving Algorithm, without Re-initialization, Image Segmentation
Show / Hide Abstract

An Efficient Web Ontology Storage Considering Hierarchical Knowledge for Jena-based Applications
Dongwon Jeong, Heeyoung Shin, Doo-Kwon Baik and Young-Sik Jeong
Page: 11~18, Vol. 5, No.1, 2009
Keywords: Ontology, Jena, OWL, Ontology, Storage, Hierarchical Structure
Show / Hide Abstract

Privacy-Aware Adaptable Web Services Using Petri Nets
You-Jin Song and Jae-Geol Yim
Page: 19~24, Vol. 5, No.1, 2009
Keywords: Privacy, Web Service, Petri Net, Context Framework
Show / Hide Abstract

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics
Byung-Gyu No, Doo-Soon Park, Min Hong, HwaMin Lee and Yoon Sok Park
Page: 33~40, Vol. 5, No.1, 2009
Keywords: Worm, Random Constant Spreading, Dynamic Network, Depth Distribution Characteristic, Bandwidth Control
Show / Hide Abstract

A Survey of Face Recognition Techniques
Rabia Jafri and Hamid R Arabnia
Page: 41~68, Vol. 5, No.2, 2009
Keywords: Face Recognition, Person Identification, Biometrics
Show / Hide Abstract

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression
Tin-Yu Wu, Han-Chieh Chao and Chi-Hsiang Lo
Page: 117~130, Vol. 5, No.3, 2009
10.3745/JIPS.2009.5.3. 117
Keywords: SAG, RoHC, MIPv6, Handoff Latency, Early Binding Update
Show / Hide Abstract

Utility-based Rate Allocation Scheme for Mobile Video Streaming over Femtocell Networks
Shan Guo Quan, Jian Xu and Young Yong Kim
Page: 151~158, Vol. 5, No.3, 2009
Keywords: Utility, femtocell network, backhaul, cross-talk, video streaming
Show / Hide Abstract

Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem
Minyi Guo, Yanqin Yang, Gongwei Zhang, Feilong Tang and Yao Shen
Page: 167~174, Vol. 5, No.4, 2009
Keywords: Bluetooth, Statternet Formation, Bluetooth Communication Protocol
Show / Hide Abstract

On Effective Slack Reclamation in Task Scheduling for Energy Reduction
Young Choon Lee and Albert Y Zomaya
Page: 175~186, Vol. 5, No.4, 2009
Keywords: Scheduling, Energy Awareness, Green Computing, Dynamic Voltage and Frequency Scaling, Data Centers
Show / Hide Abstract

Two-Tier Storage DBMS for High-Performance Query Processing
Sang-Hun Eo, Yan Li, Ho-Seok Kim and Hae-Young Bae
Page: 9~16, Vol. 4, No.1, 2008
Keywords: DBMS, Storage Management, Query Processing
Show / Hide Abstract

An Experiment of Traceability-Driven System Testing
Eun Man Choi and Kwang-Ik Seo
Page: 33~40, Vol. 4, No.1, 2008
Keywords: Software Engineering, Software Testing, Traceability, UML-based Testing
Show / Hide Abstract

Developing Protege Plug-in: OWL Ontology Visualization using Social Network
Minsoo Kim and Minkoo Kim
Page: 61~66, Vol. 4, No.2, 2008
Keywords: OWL visualization, Protege, Protege plug-in
Show / Hide Abstract

Neural Text Categorizer for Exclusive Text Categorization
Taeho Jo
Page: 77~86, Vol. 4, No.2, 2008
Keywords: Disk Neural Text Categorizer, Text Categorization,
Show / Hide Abstract

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System
Shengzhong Deng, Chan-Hyun Youn, Qi Liu, Hoe Young Kim, Taoran Yu and Young Hun Kim
Page: 103~112, Vol. 4, No.3, 2008
Keywords: Grid Worfklow, Collaborative Healthcare Platform, SLA, Policy Adjuster
Show / Hide Abstract

Tester Structure Expression Language and Its Application to the Environment for VLSI Tester Program Development
Masayuki Sato, Hiroki Wakamatsu, Masayuki Arai, Kenichi Ichino, Kazuhiko Iwasaki and Takeshi Asakawa
Page: 121~132, Vol. 4, No.4, 2008
Keywords: VLST test, VLSI tester, ATE, tester language, GTL, Tester selection tool
Show / Hide Abstract

Comparative Study on the Educational Use of Home Robots for Children
Jeonghye Han, Miheon Jo, Vicki Jones and Jun H Jo
Page: 159~168, Vol. 4, No.4, 2008
Keywords: Human-Computer Interaction, Human-Robot Interaction, e-Learning, Educational Media, r-Learning, Web-Based Instruction
Show / Hide Abstract

Interface Development for the Point-of-care device based on SOPC
Hong Bum Son, Sung Gun Song, Jae Wook Jung, Chang Su Lee and Seong Mo Park
Page: 16~20, Vol. 3, No.1, 2007
Keywords: Point-Of-Care, System-On-a-Programmable-Chip, Interface, Driver, Linux, ?C/OS-II
Show / Hide Abstract

Static Type Assignment for SSA Form in CTOC
Ki-Tae Kim and Weon-Hee Yoo
Page: 26~32, Vol. 3, No.1, 2007
Keywords: Bytecode, control flow graph, Static Single Assignment, Static Type Assignment
Show / Hide Abstract

An Efficient Functional Analysis Method for Micro-array Data Using Gene Ontology
Dong-wan Hong, Jong-keun Lee, Sung-soo Park, Sang-kyoon Hong and Jee-hee Yoon
Page: 38~42, Vol. 3, No.1, 2007
Keywords: Micro-array data, Functional analysis, Gene Ontology, Informative genes.
Show / Hide Abstract

Optimization of Domain-Independent Classification Framework for Mood Classification
Sung-Pil Choi, Yuchul Jung and Sung-Hyon Myaeng
Page: 73~81, Vol. 3, No.2, 2007
Keywords: Text Classification, Mood Categorization, Information Retrieval, Feature Selection, Text Classification Application
Show / Hide Abstract

A Feature Selection Technique based on Distributional Differences
Sung-Dong Kim
Page: 23~27, Vol. 2, No.1, 2006
Keywords: Feature Selection, Distributional Differences
Show / Hide Abstract

Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks
In Huh, Jae Yong Lee and Byung Chul Kim
Page: 34~38, Vol. 2, No.1, 2006
Keywords: wireless multi-hop network, TCP, congestion window
Show / Hide Abstract

Vehicle Classification by Road Lane Detection and Model Fitting Using a Surveillance Camera
Wook-Sun Shin, Doo-Heon Song and Chang-Hun Lee
Page: 52~57, Vol. 2, No.1, 2006