Login

Kim, Kuinam J.

Information Science and Applications

Kim, Kuinam J. - Information Science and Applications, ebook

352,10€

Ebook, PDF with Adobe DRM
ISBN: 9783662465783
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. .

1. QoS-aware Mapping and Scheduling for Integrated CWDM-PON and WiMAX Network
Siti H. Mohammad, Nadiatulhuda Zulkifli, Sevia M. Idrus

2. Resource Management Scheme Based on Position and Direction for Handoff Control in Micro/Pico-Cellular Networks
Dong Chun Lee, Kuinam J. Kim, Jong Chan Lee

3. A Pilot Study of Embedding Android Apps with Arduino for Monitoring Rehabilitation Process
Safyzan Salim, Wan Nurshazwani Wan Zakaria, M. Mahadi Abdul Jamil

4. A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network
Ndibanje Bruce, YoungJin Kang, Hyeong Rag Kim, SuHyun Park, Hoon-Jae Lee

5. A Noninvasive Sensor System for Discriminating Mobility Pattern on a Bed
Seung Ho Cho, Seokhyang Cho

6. A Fault-Tolerant Multi-Path Multi-Channel Routing Protocol for Cognitive Radio Ad Hoc Networks
Zamree Che-aron, Aisha Hassan Abdalla, Khaizuran Abdullah, Wan Haslina Hassan, Md. Arafatur Rahman

7. Study of Sound and Haptic Feedback in Smart Wearable Devices to Improve Driving Performance of Elders
Chularas Natpratan, Nagul Cooharojananone

8. Indoor WIFI localization on embedded systems
Anya Apavatjrut, Ekkawit Boonyasiwapong

9. Bacterial Foraging-based Power Allocation for Cooperative Wireless Sensor Networks
Mohammad Abdul Azim, Zeyar Aung, Mario E. Rivero-Angeles

Part II. .

10. Maintaining a Trajectory Data Warehouse Under Schema Changes with the Mobile Agent View Adaptation Technique
Wided Oueslati, Jalel Akaichi

11. Traffic Analysis in Concurrent Multi-Channel Viewing on P2PTV
Koki Mizutani, Takumi Miyoshi, Olivier Fourmaux

12. Evaluation Method of MANET over Next Generation Optical Wireless Access Network
M. A. Wong, N. Zulkifli, S. M. Idrus, M. Elshaikh

13. A Feedback Mechanism Based on Randomly Suppressed Timer for ForCES Protocol
Lijie Cen, Chuanhuang Li, Weiming Wang

14. Operational Analysis of Interarrival Rate-based Queuing Management Mechanism for High-speed Networks
Mohammed M. Kadhum, Selvakumar Manickam

15. E-Government project enquiry framework for a continuous improvement process, status in Malaysia and Comoros
Said Abdou Mfoihaya, Mokhtar Mohd Yusof

16. Objective Non-intrusive Conversational VoIP Quality Prediction using Data mining methods
Sake Valaisathien, Vajirasak Vanijja

17. A Hybrid Incentive-based Peer Selection Scheme for Unstructured Peer-to-Peer Media Streaming Systems
Victor Romero, Cedric Angelo Festin

18. A Transmission Method to Improve the Quality of Multimedia in Hybrid Broadcast/Mobile Networks
Hyung-Yoon Seo, Byungjun Bae, Jong-Deok Kim

19. A Failureless Pipelined Aho-Corasick Algorithm for FPGA-based Parallel String Matching Engine
Hyun Jin Kim

20. Revised P2P Data Sharing Scheme over Distributed Cloud Networks
Wonhyuk Lee, TaeYeon Kim, Seungae Kang, HyunCheol Kim

21. LQDV Routing Protocol Implementation on Arduino Platform and Xbee module
Ho Sy Khanh, Myung Kyun Kim

22. A Virtualization and Management Architecture of Micro-Datacenter
Byungyeon Park, Wonhyuk Lee, TaeYeon Kim, HyunCheol Kim

23. Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks
Baidaa Hamza Khudayer, Mohammed M. Kadhum, Wan Tat Chee

24. Passive Network Monitoring using REAMS
Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel

25. Low Latency Video Transmission Device
Chanho Park, Hagyoung Kim

Part III. .

26. Comparative Investigation of Medical Contents using Desktop and Tabletop Technologies
Tahir Mustafa Madni, Yunus Nayan, Suziah Sulaiman, Muhammad Tahir

27. Dynamic-Time-Warping Analysis of Feature-Vector Reliability for Cognitive Stimulation Therapy Assessment
Tuan D. Pham

28. An Algorithm for Rock Pore Image Segmentation
Zhang Jiqun, Hu Chungjin, Liu Xin, He Dongmei, Li Hua

29. Action Recognition by Extracting Pyramidal Motion Features from Skeleton Sequences
Guoliang LU, Yiqi ZHOU, Xueyong LI, Chen LV

30. P-PCC: Parallel Pearson Correlation Condition for Robust Cosmetic Makeup Face Recognitions
Kanokmon Rujirakul, Chakchai So-In

31. Flight Simulator for Serious Gaming
Aruni Nisansala, Maheshya Weerasinghe, G. K. A. Dias, Damitha Sandaruwan, Chamath Keppitiyagama, Nihal Kodikara, Chamal Perera, Prabhath Samarasinghe

32. Potential Z-Fighting Conflict Detection System in 3D Level Design Tools
Pisal Setthawong

33. Efficient Motion Estimation Algorithms for HEVC/H.265 Video Coding
Edward Jaja, Zaid Omar, Ab Al-Hadi Ab Rahman, Muhammad Mun’im Zabidi

34. A Synthesis of 2D Mammographic Image Using Super- Resolution Technique: A Phantom Study
Surangkana Kantharak, Thanarat H. Chalidabhongse, Jenjeera Prueksadee

35. Using complex events to represent domain concepts in graphs
Riley T Perry, Cat Kutay, Fethi Rabhi

36. Unequal Loss Protection Mechanism for Wi-Fi based Broadcasting system using a Video Quality Prediction Model
Dong Hyun Kim, Hyung-Yoon Seo, Byungjun Bae, Jong-Deok Kim

37. An Approximate Matching Preprocessing for Efficient Phase-Only Correlation-Based Image Retrieval
Honghang Wang, Masayoshi Aritsugi

38. Pixel Art Color Palette Synthesis
Ming-Rong Huang, Ruen-Rone Lee

39. Introducing a New Radiation Detection Device Calibration Method and Estimating 3D Distance to Radiation Sources
Pathum Rathnayaka, Seung-Hae Baek, Soon-Yong Park

40. Integrating Feature Descriptors to Scanpath-based Decoding of Deformed Barcode Images
Poonna Yospanya, Yachai Limpiyakorn

41. Detecting and extracting text in video via sparse representation based classification method
Bo Sun, Yang Wu, Feng Xu, Yongkang Xiao, Jun He, Chen Chao

Part IV. .

42. A Cost Model for Client-Side CaaS
Chaturong Sriwiroj, Thepparit Banditwattanawong

43. A Reliability Analysis of Cascaded TMR Systems
Hyun Joo Yi, Tae-Sun Chung, Sungsoo Kim

44. Availability Analysis for A Data Center Cooling System with (n,k)-way CRACs
Sohyun Koo, Tae-Sun Chung, Sungsoo Kim

45. A Recovery Model for Improving Reliability of PCM WL-Reviver System
Taehoon Roh, Tae-Sun Chung, Sungsoo Kim

46. Real-time Sitting Posture Monitoring System for Functional Scoliosis Patients
Ji-Yong Jung, Soo-Kyung Bok, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim

Part V. .

47. Decreasing Size of Parameter for Computing Greatest Common Divisor to Speed up New Factorization Algorithm Based on Pollard Rho
Kritsanapong Somsuk

48. Network Security Situation Assessment: A Review and Discussion
Yu-Beng Leau, Selvakumar Manickam, Yung-Wey Chong

49. Protecting Binary Files from Stack-Based Buffer Overflow
Sahel Alouneh, Heba Bsoul, Mazen Kharbutli

50. Meet-in-the-middle Attack with Splice-and-Cut Technique on the 19-round Variant of Block Cipher HIGHT
Yasutaka Igarashi, Ryutaro Sueyoshi, Toshinobu Kaneko, Takayasu Fuchida

51. Nonintrusive SSL/TLS Proxy with JSON-Based Policy
Suhairi Mohd Jawi, Fakariah Hani Mohd Ali, Nurul Huda Nik Zulkipli

52. Secure Problem Solving by Encrypted Computing
Hiroshi Yamaguchi, Phillip C.-Y. Sheu, Shigeo Tsujii

53. Anomaly Detection from Log Files Using Data Mining Techniques
Jakub Breier, Jana Branišová

54. Improved Remote User Trust Evaluation Scheme to apply to Social Network Services
Youngwoong Kim, Younsung Choi, Dongho Won

55. Threat assessment model for mobile malware
Thanh Do, Fredrik B. Lyche, Jørgen H. Lytskjold, Do Thuan

56. Performance Evaluation of System Resources Utilization with Sandboxing Applications
Tarek Helmy, Ismail Keshta, Abdallah Rashed

57. Fault Attacks by using Voltage and Temperature Variations: An Investigation and Analysis of Experimental Environment
Young Sil Lee, Non Thiranant, HyeongRag Kim, JungBok Jo, HoonJae Lee

58. Pseudoinverse Matrix over Finite Field and Its Applications
Dang Hai Van, Nguyen Dinh Thuc

59. Multi-Agent based Framework for Time-correlated Alert Detection of Volume Attacks
Abimbola Olabelurin, Georgios Kallos, Suresh Veluru, Muttukrishnan Rajarajan

60. Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis
HyunHo Kim, Ndibanje Bruce, Hoon-Jae Lee, YongJe Choi, Dooho Choi

61. Exploring Bad Behaviors from Email Logs
Supachai Kanchanapokin, Sirapat Boonkrong

62. Using PKI to Provide Credential Delegation in non Web-based Federations
Daniel Kouřil, Marcel Poul, Michal Procházka

63. Modeling and Simulation of Identification Protocol for Wireless Medical Devices in Healthcare System Communication
Hyun Ho Kim, Ndibanje Bruce, SuHyun Park, JungBok Jo, Hoon-Jae Lee

64. A Method for Web Security Context Patterns Development from User Interface Guidelines Based on Structural and Textual Analysis
Pattariya Singpant, Nakornthip Prompoon

65. A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography
Mohammed Salem Atoum

66. Review of Digital Forensic Investigation Frameworks
Ritu Agarwal, Suvarna Kothari

Part VI. .

67. Knowledge Discovery in Dynamic Data Using Neural Networks
Eva Volna, Martin Kotyrba, Michal Janosek

68. Data Mining for Industrial System Identification: A Turning Process
Karin Kandananond

69. Investigating the Effectiveness of E-mail Spam Image Data for Phone Spam Image Detection Using Scale Invariant Feature Transform Image Descriptor
So Yeon Kim, Yenewondim Biadgie, Kyung-Ah Sohn

70. Features extraction for classification of focal and non-focal EEG signals
Khushnandan Rai, Varun Bajaj, Anil Kumar

71. Relations on Intuitionistic Fuzzy Soft Multi Sets
Anjan Mukherjee, Ajoy Kanti Das

72. Towards Automatically Retrieving Discoveries and Generating Ontologies
Kenneth Cosh

73. Improving process models discovery using AXOR clustering algorithm
Hanane Ariouat, Kamel Barkaoui, Jacky Akoka

74. Simple Approaches of Sentiment Analysis via Ensemble Learning
Tawunrat Chalothom, Jeremy Ellman

75. Effective Trajectory Similarity Measure for Moving Objects in Real-World Scene
Moonsoo Ra, Chiawei Lim, Yong Ho Song, Jechang Jung, Whoi-Yul Kim

76. A Prediction of Engineering Students Performance from Core Engineering Course Using Classification
Nachirat Rachburee, Wattana Punlumjeak, Sitti Rugtanom, Deachrut Jaithavil, Manoch Pracha

77. Evolutionary Circular-ELM for the Reduced-Reference Assessment of Perceived Image Quality
Sarutte Atsawaraungsuk, Punyaphol Horata

78. Enhanced Web Page Cleaning for Constructing Social Media Text Corpora
Melanie Neunerdt, Eva Reimer, Michael Reyer, Rudolf Mathar

79. Finding Knee Solutions in Multi-Objective Optimization Using Extended Angle Dominance Approach
Sufian Sudeng, Naruemon Wattanapongsakorn

80. Affective Learning Analysis of Children in a Card Sorting Game
Marini Othman, Abdul Wahab, Abdul Qayoom, Mohd Syarqawy Hamzah, Muhamad Sadry Abu Seman

81. Application of Mean and Median Frequency Methods for Identification of Human Joint Angles Using EMG Signal
Sirinee Thongpanja, Angkoon Phinyomark, Chusak Limsakul, Pomchai Phukpattaranont

82. A Study of Big Data Solution Using Hadoop to Process Connected Vehicle’s Diagnostics Data
Lionel Nkenyereye, Jong-Wook Jang

83. Wiki SaGa: An Interactive Timeline to Visualize Historical Documents
Daniel Yong Wen Tan, Bali Ranaivo-Malançon, Narayanan Kulathuramaiyer

84. Discovering genomic associations on cancer datasets by applying sparse regression methods
Reddy Rani Vangimalla, Kyung-Ah Sohn

85. The Adaptive Dynamic Clustering Neuro-Fuzzy System for Classification
Phichit Napook, Narissara Eiamkanitchat

86. A Hybrid Approach of Neural Network and Level-2 Fuzzy set
Jirawat Teyakome, Narissara Eiamkanitchat

87. Developing Term Weighting Scheme Based on Term Occurrence Ratio for Sentiment Analysis
Nivet Chirawichitchai

88. A Comparison of Artificial Neural Network and Regression Model for Predicting the Rice Production in Lower Northern Thailand
Anamai Na-udom, Jaratsri Rungrattanaubol

89. Study on Local Path Planning for Collision Avoidance in Vehicle-to-Vehicle Communication Environment
Gyoungeun Kim, Byeongwoo Kim

90. Vehicle Position Estimation using Tire Model
Jaewoo Yoon, Byeongwoo Kim

91. I know when you are happy - Emotion Detection
Abhishek Singh Kilak, Namita Mittal

92. Interconnection Learning between Economic Indicators in Indonesia Optimized by Genetic Algorithm
S Saadah, G. S. Wulandari

93. Classification Prediction of the Foot Disease Pattern Using Decision Tree Model
Jung-Kyu Choi, Yonggwan Won, Jung-Ja Kim

94. Non-Preference Based Pruning Algorithm for Multi-Objective Redundancy Allocation Problem
Tipwimol Sooktip, Naruemon Wattanapongsakorn, Sanan Srakaew

95. A Combined AdaBoost and NEWFM Technique for Medical Data Classification
Khaled A. Abuhasel, Abdullah M. Iliyasu, Chastine Fatichah

96. On sentence length distribution as an authorship attribute
Miro Lehtonen

97. Learning models for activity recognition in smart homes
Labiba Gillani Fahad, Arshad Ali, Muttukrishnan Rajarajan

98. Tackling Class Imbalance Problem in Binary Classification using Augmented Neighborhood Cleaning Algorithm
Nadyah Obaid Al Abdouli, Zeyar Aung, Wei Lee Woon, Davor Svetinovic

Part VII. .

99. Software Effective Risk Management: An Evaluation of Risk Management Process Models and Standards
Jafreezal Jaafar, Uzair Iqbal Janjua, Fong Woon Lai

100. Validating Reusability of Software Projects using Object-Oriented Design Metrics
Zhamri Che Ani, Shuib Basri, Aliza Sarlan

101. Plasticine Scrum: An Alternative Solution for Simulating Scrum Software Development
Sakgasit Ramingwong, Lachana Ramingwong

102. Understanding of Project Manager Competency in Agile Software Development Project: The Taxonomy
Kamalrufadillah Sutling, Zulkefli Mansor, Setyawan Widyarto, Sukumar Lecthmunan, Noor Habibah Arshad

103. The Design and Implementation of Around-View System using Android-based Image Processing
Gyu-Hyun Kim, Jong-Wook Jang

104. Identification of Opportunities for Move Method Refactoring Using Decision Theory
Siriwan Boonkwan, Pornsiri Muenchaisri

105. Requirements Engineering for Cloud Computing in University Using i*(iStar) Hierarchy Method
Sandfreni, Nabila Rizky Oktadimi, Kridanto Surendro

106. Power Consumption Profiling Method based on Android Application Usage
Hiroki Furusho, Kenji Hisazumi, Takeshi Kamiyama, Hiroshi Inamura, Tsuneo Nakanishi, Akira Fukuda

107. Evergreen Software Preservation: The Conceptual Framework of Anti-Ageing Model
Jamaiah H. Yahaya, Aziz Deraman, Zuriani Hayati Abdullah

108. A Framework Analysis for Distributed Interactive Multimedia System on Location-based Service
Shan Liu, Jianping Chai

109. An Empirical Validation of Coupling and Cohesion Metrics as Testability Indicators
Amos Orenyi Bajeh, Shuib Basri, Low Tang Jung

110. Software Defect Prediction in Imbalanced Data Sets Using Unbiased Support Vector Machine
Teerawit Choeikiwong, Peerapon Vateekul

111. Evaluation of Separated Concerns in Web-based Delivery of User Interfaces
Tomas Cerny, Lubos Matl, Karel Cemus, Michael J. Donahoo

112. Separating out Platform-independent Particles of User Interfaces
Tomas Cerny, Michael J. Donahoo

113. Implementing Personal Software Process in Undergraduate Course to Improve Model-View-Controller Software Construction
Wacharapong Nachiengmai, Sakgasit Ramingwong

Part VIII. .

114. Personalized Care Recommendation Approach for Diabetes patients Using Ontology and SWRL
Benjamas Hempo, Ngamnij Arch-int, Somjit Arch-int, Cherdpan Pattarapongsin

115. An Experimental Study for Neighbor Selection in Collaborative Filtering
Soojung Lee

116. Transforming e-Procurement Platforms for PEPPOL and WCAG 2.0 Compliance
José Martins, João Barroso, Ramiro Gonçalves, André Sousa, Miguel Bacelar, Hugo Paredes

117. Analyzing Developer Behavior and Community Structure in Software Crowdsourcing
Hui Zhang, Yuchuan Wu, Wenjun Wu

118. A Semantic Similarity Assessment Tool for Computer Science Subjects Using Extended Wu & Palmer’s Algorithm and Ontology
Chayan Nuntawong, Chakkrit Snae Namahoot, Michael Brückner

119. Comparison of Architecture-Centric Model-Driven Web Engineering and Abstract Behavioural Specification in Constructing Software Product Line for Web Applications
Daya Adianto, Maya Retno Ayu Setyautami, Salman El Farisi

120. Prediction of Query Satisfaction Based on CQA-Oriented Browsing Behaviors
Junxia Guo, Hao Han, Cheng Gao, Takashi Nakayama, Keizo Oyama

121. The Competition-based Information Propagation in Online Social Networks
Liyuan Sun, Yadong Zhou, Xiaohong Guan

122. e-Learning Recommender System for Teachers using Opinion Mining
Anand Shanker Tewari, Anita Saroj, Asim Gopal Barman

Part IX. IWICT

123. Evaluating Heuristic Optimization, Bio-Inspired and Graph-Theoretic Algorithms for the Generation of Fault-Tolerant Graphs with Minimal Costs
Matthias Becker, Markus Krömker, Helena Szczerbicka

Part X. ICWCIA

124. Real-time Night Visibility Enhancement Algorithm Using the Similarity of Inverted Night Image and Fog Image
Jae-Won Lee, Bae-Ho Lee, Yongkwan Won, Cheol-Hong Kim, Sung-Hoon Hong

125. A Service Protection mechanism Using VPN GW Hiding Techniques
PyungKoo Park, HoYong Ryu, GyungTae Hong, SeongMin Yoo, Jaehyung Park, JaeCheol Ryou

126. Networking Service Availability Analysis of 2N Redundancy Model with Non-stop Forwarding
Dong-Hyun Kim, Jae-Chan Shim, Ho-Yong Ryu, Jaehyung Park, Yutae Lee

127. Property Analysis of Classifiers for Sleep Snoring Detection
Tan Loc Nguyen, Young Y. Lee, Su-il Choi, Yonggwan Won

128. An Innovative Detection Method Integrating Hybrid Sensors for Motorized Wheelchairs
Sanghyun Park, Hyunyoung Kim, Jinsul Kim, Taeksoo Ji, Myoung Jin Lee

Part XI. IWSATA

129. Road Weather Information transmission method for digital multimedia broadcasting
SangWoon Lee

130. Color Overlapping Method of Projection System on LEDs
Yongseok Chi, Youngseop Kim, Je-Ho Park, Kyoungro Yoon, Cheong-Ghil Kim, Yong-Hwan Lee

131. A System Design for Audio Level Measurement based on ITU-R BS.1770-3
Sang Woon Lee, Hyun Woo Lee, Cheong Ghil Kim

132. A Prototype Implementation of Contents Sharing System on Networked Heterogeneous Devices
Cheong Ghil Kim, Dae Seung Park

133. Erratum to: Finding Knee Solutions in Multi-Objective Optimization Using Extended Angle Dominance Approach
Sufian Sudeng, Naruemon Wattanapongsakorn, Sanan Srakaew

Keywords: Engineering, Computational Intelligence, Information Systems and Communication Service, Artificial Intelligence (incl. Robotics)

Editor
Publisher
Springer
Publication year
2015
Language
en
Edition
2015
Series
Lecture Notes in Electrical Engineering
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9783662465783
Printed ISBN
978-3-662-46577-6

Similar titles