Kim, Kuinam J.
Information Science and Applications
Part I. .
1. QoS-aware Mapping and Scheduling for Integrated CWDM-PON and WiMAX Network
Siti H. Mohammad, Nadiatulhuda Zulkifli, Sevia M. Idrus
2. Resource Management Scheme Based on Position and Direction for Handoff Control in Micro/Pico-Cellular Networks
Dong Chun Lee, Kuinam J. Kim, Jong Chan Lee
3. A Pilot Study of Embedding Android Apps with Arduino for Monitoring Rehabilitation Process
Safyzan Salim, Wan Nurshazwani Wan Zakaria, M. Mahadi Abdul Jamil
4. A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network
Ndibanje Bruce, YoungJin Kang, Hyeong Rag Kim, SuHyun Park, Hoon-Jae Lee
5. A Noninvasive Sensor System for Discriminating Mobility Pattern on a Bed
Seung Ho Cho, Seokhyang Cho
6. A Fault-Tolerant Multi-Path Multi-Channel Routing Protocol for Cognitive Radio Ad Hoc Networks
Zamree Che-aron, Aisha Hassan Abdalla, Khaizuran Abdullah, Wan Haslina Hassan, Md. Arafatur Rahman
7. Study of Sound and Haptic Feedback in Smart Wearable Devices to Improve Driving Performance of Elders
Chularas Natpratan, Nagul Cooharojananone
8. Indoor WIFI localization on embedded systems
Anya Apavatjrut, Ekkawit Boonyasiwapong
9. Bacterial Foraging-based Power Allocation for Cooperative Wireless Sensor Networks
Mohammad Abdul Azim, Zeyar Aung, Mario E. Rivero-Angeles
Part II. .
10. Maintaining a Trajectory Data Warehouse Under Schema Changes with the Mobile Agent View Adaptation Technique
Wided Oueslati, Jalel Akaichi
11. Traffic Analysis in Concurrent Multi-Channel Viewing on P2PTV
Koki Mizutani, Takumi Miyoshi, Olivier Fourmaux
12. Evaluation Method of MANET over Next Generation Optical Wireless Access Network
M. A. Wong, N. Zulkifli, S. M. Idrus, M. Elshaikh
13. A Feedback Mechanism Based on Randomly Suppressed Timer for ForCES Protocol
Lijie Cen, Chuanhuang Li, Weiming Wang
14. Operational Analysis of Interarrival Rate-based Queuing Management Mechanism for High-speed Networks
Mohammed M. Kadhum, Selvakumar Manickam
15. E-Government project enquiry framework for a continuous improvement process, status in Malaysia and Comoros
Said Abdou Mfoihaya, Mokhtar Mohd Yusof
16. Objective Non-intrusive Conversational VoIP Quality Prediction using Data mining methods
Sake Valaisathien, Vajirasak Vanijja
17. A Hybrid Incentive-based Peer Selection Scheme for Unstructured Peer-to-Peer Media Streaming Systems
Victor Romero, Cedric Angelo Festin
18. A Transmission Method to Improve the Quality of Multimedia in Hybrid Broadcast/Mobile Networks
Hyung-Yoon Seo, Byungjun Bae, Jong-Deok Kim
19. A Failureless Pipelined Aho-Corasick Algorithm for FPGA-based Parallel String Matching Engine
Hyun Jin Kim
20. Revised P2P Data Sharing Scheme over Distributed Cloud Networks
Wonhyuk Lee, TaeYeon Kim, Seungae Kang, HyunCheol Kim
21. LQDV Routing Protocol Implementation on Arduino Platform and Xbee module
Ho Sy Khanh, Myung Kyun Kim
22. A Virtualization and Management Architecture of Micro-Datacenter
Byungyeon Park, Wonhyuk Lee, TaeYeon Kim, HyunCheol Kim
23. Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks
Baidaa Hamza Khudayer, Mohammed M. Kadhum, Wan Tat Chee
24. Passive Network Monitoring using REAMS
Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel
25. Low Latency Video Transmission Device
Chanho Park, Hagyoung Kim
Part III. .
26. Comparative Investigation of Medical Contents using Desktop and Tabletop Technologies
Tahir Mustafa Madni, Yunus Nayan, Suziah Sulaiman, Muhammad Tahir
27. Dynamic-Time-Warping Analysis of Feature-Vector Reliability for Cognitive Stimulation Therapy Assessment
Tuan D. Pham
28. An Algorithm for Rock Pore Image Segmentation
Zhang Jiqun, Hu Chungjin, Liu Xin, He Dongmei, Li Hua
29. Action Recognition by Extracting Pyramidal Motion Features from Skeleton Sequences
Guoliang LU, Yiqi ZHOU, Xueyong LI, Chen LV
30. P-PCC: Parallel Pearson Correlation Condition for Robust Cosmetic Makeup Face Recognitions
Kanokmon Rujirakul, Chakchai So-In
31. Flight Simulator for Serious Gaming
Aruni Nisansala, Maheshya Weerasinghe, G. K. A. Dias, Damitha Sandaruwan, Chamath Keppitiyagama, Nihal Kodikara, Chamal Perera, Prabhath Samarasinghe
32. Potential Z-Fighting Conflict Detection System in 3D Level Design Tools
Pisal Setthawong
33. Efficient Motion Estimation Algorithms for HEVC/H.265 Video Coding
Edward Jaja, Zaid Omar, Ab Al-Hadi Ab Rahman, Muhammad Mun’im Zabidi
34. A Synthesis of 2D Mammographic Image Using Super- Resolution Technique: A Phantom Study
Surangkana Kantharak, Thanarat H. Chalidabhongse, Jenjeera Prueksadee
35. Using complex events to represent domain concepts in graphs
Riley T Perry, Cat Kutay, Fethi Rabhi
36. Unequal Loss Protection Mechanism for Wi-Fi based Broadcasting system using a Video Quality Prediction Model
Dong Hyun Kim, Hyung-Yoon Seo, Byungjun Bae, Jong-Deok Kim
37. An Approximate Matching Preprocessing for Efficient Phase-Only Correlation-Based Image Retrieval
Honghang Wang, Masayoshi Aritsugi
38. Pixel Art Color Palette Synthesis
Ming-Rong Huang, Ruen-Rone Lee
39. Introducing a New Radiation Detection Device Calibration Method and Estimating 3D Distance to Radiation Sources
Pathum Rathnayaka, Seung-Hae Baek, Soon-Yong Park
40. Integrating Feature Descriptors to Scanpath-based Decoding of Deformed Barcode Images
Poonna Yospanya, Yachai Limpiyakorn
41. Detecting and extracting text in video via sparse representation based classification method
Bo Sun, Yang Wu, Feng Xu, Yongkang Xiao, Jun He, Chen Chao
Part IV. .
42. A Cost Model for Client-Side CaaS
Chaturong Sriwiroj, Thepparit Banditwattanawong
43. A Reliability Analysis of Cascaded TMR Systems
Hyun Joo Yi, Tae-Sun Chung, Sungsoo Kim
44. Availability Analysis for A Data Center Cooling System with (n,k)-way CRACs
Sohyun Koo, Tae-Sun Chung, Sungsoo Kim
45. A Recovery Model for Improving Reliability of PCM WL-Reviver System
Taehoon Roh, Tae-Sun Chung, Sungsoo Kim
46. Real-time Sitting Posture Monitoring System for Functional Scoliosis Patients
Ji-Yong Jung, Soo-Kyung Bok, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim
Part V. .
47. Decreasing Size of Parameter for Computing Greatest Common Divisor to Speed up New Factorization Algorithm Based on Pollard Rho
Kritsanapong Somsuk
48. Network Security Situation Assessment: A Review and Discussion
Yu-Beng Leau, Selvakumar Manickam, Yung-Wey Chong
49. Protecting Binary Files from Stack-Based Buffer Overflow
Sahel Alouneh, Heba Bsoul, Mazen Kharbutli
50. Meet-in-the-middle Attack with Splice-and-Cut Technique on the 19-round Variant of Block Cipher HIGHT
Yasutaka Igarashi, Ryutaro Sueyoshi, Toshinobu Kaneko, Takayasu Fuchida
51. Nonintrusive SSL/TLS Proxy with JSON-Based Policy
Suhairi Mohd Jawi, Fakariah Hani Mohd Ali, Nurul Huda Nik Zulkipli
52. Secure Problem Solving by Encrypted Computing
Hiroshi Yamaguchi, Phillip C.-Y. Sheu, Shigeo Tsujii
53. Anomaly Detection from Log Files Using Data Mining Techniques
Jakub Breier, Jana Branišová
54. Improved Remote User Trust Evaluation Scheme to apply to Social Network Services
Youngwoong Kim, Younsung Choi, Dongho Won
55. Threat assessment model for mobile malware
Thanh Do, Fredrik B. Lyche, Jørgen H. Lytskjold, Do Thuan
56. Performance Evaluation of System Resources Utilization with Sandboxing Applications
Tarek Helmy, Ismail Keshta, Abdallah Rashed
57. Fault Attacks by using Voltage and Temperature Variations: An Investigation and Analysis of Experimental Environment
Young Sil Lee, Non Thiranant, HyeongRag Kim, JungBok Jo, HoonJae Lee
58. Pseudoinverse Matrix over Finite Field and Its Applications
Dang Hai Van, Nguyen Dinh Thuc
59. Multi-Agent based Framework for Time-correlated Alert Detection of Volume Attacks
Abimbola Olabelurin, Georgios Kallos, Suresh Veluru, Muttukrishnan Rajarajan
60. Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis
HyunHo Kim, Ndibanje Bruce, Hoon-Jae Lee, YongJe Choi, Dooho Choi
61. Exploring Bad Behaviors from Email Logs
Supachai Kanchanapokin, Sirapat Boonkrong
62. Using PKI to Provide Credential Delegation in non Web-based Federations
Daniel Kouřil, Marcel Poul, Michal Procházka
63. Modeling and Simulation of Identification Protocol for Wireless Medical Devices in Healthcare System Communication
Hyun Ho Kim, Ndibanje Bruce, SuHyun Park, JungBok Jo, Hoon-Jae Lee
64. A Method for Web Security Context Patterns Development from User Interface Guidelines Based on Structural and Textual Analysis
Pattariya Singpant, Nakornthip Prompoon
65. A Comparative Study of Combination with Different LSB Techniques in MP3 Steganography
Mohammed Salem Atoum
66. Review of Digital Forensic Investigation Frameworks
Ritu Agarwal, Suvarna Kothari
Part VI. .
67. Knowledge Discovery in Dynamic Data Using Neural Networks
Eva Volna, Martin Kotyrba, Michal Janosek
68. Data Mining for Industrial System Identification: A Turning Process
Karin Kandananond
69. Investigating the Effectiveness of E-mail Spam Image Data for Phone Spam Image Detection Using Scale Invariant Feature Transform Image Descriptor
So Yeon Kim, Yenewondim Biadgie, Kyung-Ah Sohn
70. Features extraction for classification of focal and non-focal EEG signals
Khushnandan Rai, Varun Bajaj, Anil Kumar
71. Relations on Intuitionistic Fuzzy Soft Multi Sets
Anjan Mukherjee, Ajoy Kanti Das
72. Towards Automatically Retrieving Discoveries and Generating Ontologies
Kenneth Cosh
73. Improving process models discovery using AXOR clustering algorithm
Hanane Ariouat, Kamel Barkaoui, Jacky Akoka
74. Simple Approaches of Sentiment Analysis via Ensemble Learning
Tawunrat Chalothom, Jeremy Ellman
75. Effective Trajectory Similarity Measure for Moving Objects in Real-World Scene
Moonsoo Ra, Chiawei Lim, Yong Ho Song, Jechang Jung, Whoi-Yul Kim
76. A Prediction of Engineering Students Performance from Core Engineering Course Using Classification
Nachirat Rachburee, Wattana Punlumjeak, Sitti Rugtanom, Deachrut Jaithavil, Manoch Pracha
77. Evolutionary Circular-ELM for the Reduced-Reference Assessment of Perceived Image Quality
Sarutte Atsawaraungsuk, Punyaphol Horata
78. Enhanced Web Page Cleaning for Constructing Social Media Text Corpora
Melanie Neunerdt, Eva Reimer, Michael Reyer, Rudolf Mathar
79. Finding Knee Solutions in Multi-Objective Optimization Using Extended Angle Dominance Approach
Sufian Sudeng, Naruemon Wattanapongsakorn
80. Affective Learning Analysis of Children in a Card Sorting Game
Marini Othman, Abdul Wahab, Abdul Qayoom, Mohd Syarqawy Hamzah, Muhamad Sadry Abu Seman
81. Application of Mean and Median Frequency Methods for Identification of Human Joint Angles Using EMG Signal
Sirinee Thongpanja, Angkoon Phinyomark, Chusak Limsakul, Pomchai Phukpattaranont
82. A Study of Big Data Solution Using Hadoop to Process Connected Vehicle’s Diagnostics Data
Lionel Nkenyereye, Jong-Wook Jang
83. Wiki SaGa: An Interactive Timeline to Visualize Historical Documents
Daniel Yong Wen Tan, Bali Ranaivo-Malançon, Narayanan Kulathuramaiyer
84. Discovering genomic associations on cancer datasets by applying sparse regression methods
Reddy Rani Vangimalla, Kyung-Ah Sohn
85. The Adaptive Dynamic Clustering Neuro-Fuzzy System for Classification
Phichit Napook, Narissara Eiamkanitchat
86. A Hybrid Approach of Neural Network and Level-2 Fuzzy set
Jirawat Teyakome, Narissara Eiamkanitchat
87. Developing Term Weighting Scheme Based on Term Occurrence Ratio for Sentiment Analysis
Nivet Chirawichitchai
88. A Comparison of Artificial Neural Network and Regression Model for Predicting the Rice Production in Lower Northern Thailand
Anamai Na-udom, Jaratsri Rungrattanaubol
89. Study on Local Path Planning for Collision Avoidance in Vehicle-to-Vehicle Communication Environment
Gyoungeun Kim, Byeongwoo Kim
90. Vehicle Position Estimation using Tire Model
Jaewoo Yoon, Byeongwoo Kim
91. I know when you are happy - Emotion Detection
Abhishek Singh Kilak, Namita Mittal
92. Interconnection Learning between Economic Indicators in Indonesia Optimized by Genetic Algorithm
S Saadah, G. S. Wulandari
93. Classification Prediction of the Foot Disease Pattern Using Decision Tree Model
Jung-Kyu Choi, Yonggwan Won, Jung-Ja Kim
94. Non-Preference Based Pruning Algorithm for Multi-Objective Redundancy Allocation Problem
Tipwimol Sooktip, Naruemon Wattanapongsakorn, Sanan Srakaew
95. A Combined AdaBoost and NEWFM Technique for Medical Data Classification
Khaled A. Abuhasel, Abdullah M. Iliyasu, Chastine Fatichah
96. On sentence length distribution as an authorship attribute
Miro Lehtonen
97. Learning models for activity recognition in smart homes
Labiba Gillani Fahad, Arshad Ali, Muttukrishnan Rajarajan
98. Tackling Class Imbalance Problem in Binary Classification using Augmented Neighborhood Cleaning Algorithm
Nadyah Obaid Al Abdouli, Zeyar Aung, Wei Lee Woon, Davor Svetinovic
Part VII. .
99. Software Effective Risk Management: An Evaluation of Risk Management Process Models and Standards
Jafreezal Jaafar, Uzair Iqbal Janjua, Fong Woon Lai
100. Validating Reusability of Software Projects using Object-Oriented Design Metrics
Zhamri Che Ani, Shuib Basri, Aliza Sarlan
101. Plasticine Scrum: An Alternative Solution for Simulating Scrum Software Development
Sakgasit Ramingwong, Lachana Ramingwong
102. Understanding of Project Manager Competency in Agile Software Development Project: The Taxonomy
Kamalrufadillah Sutling, Zulkefli Mansor, Setyawan Widyarto, Sukumar Lecthmunan, Noor Habibah Arshad
103. The Design and Implementation of Around-View System using Android-based Image Processing
Gyu-Hyun Kim, Jong-Wook Jang
104. Identification of Opportunities for Move Method Refactoring Using Decision Theory
Siriwan Boonkwan, Pornsiri Muenchaisri
105. Requirements Engineering for Cloud Computing in University Using i*(iStar) Hierarchy Method
Sandfreni, Nabila Rizky Oktadimi, Kridanto Surendro
106. Power Consumption Profiling Method based on Android Application Usage
Hiroki Furusho, Kenji Hisazumi, Takeshi Kamiyama, Hiroshi Inamura, Tsuneo Nakanishi, Akira Fukuda
107. Evergreen Software Preservation: The Conceptual Framework of Anti-Ageing Model
Jamaiah H. Yahaya, Aziz Deraman, Zuriani Hayati Abdullah
108. A Framework Analysis for Distributed Interactive Multimedia System on Location-based Service
Shan Liu, Jianping Chai
109. An Empirical Validation of Coupling and Cohesion Metrics as Testability Indicators
Amos Orenyi Bajeh, Shuib Basri, Low Tang Jung
110. Software Defect Prediction in Imbalanced Data Sets Using Unbiased Support Vector Machine
Teerawit Choeikiwong, Peerapon Vateekul
111. Evaluation of Separated Concerns in Web-based Delivery of User Interfaces
Tomas Cerny, Lubos Matl, Karel Cemus, Michael J. Donahoo
112. Separating out Platform-independent Particles of User Interfaces
Tomas Cerny, Michael J. Donahoo
113. Implementing Personal Software Process in Undergraduate Course to Improve Model-View-Controller Software Construction
Wacharapong Nachiengmai, Sakgasit Ramingwong
Part VIII. .
114. Personalized Care Recommendation Approach for Diabetes patients Using Ontology and SWRL
Benjamas Hempo, Ngamnij Arch-int, Somjit Arch-int, Cherdpan Pattarapongsin
115. An Experimental Study for Neighbor Selection in Collaborative Filtering
Soojung Lee
116. Transforming e-Procurement Platforms for PEPPOL and WCAG 2.0 Compliance
José Martins, João Barroso, Ramiro Gonçalves, André Sousa, Miguel Bacelar, Hugo Paredes
117. Analyzing Developer Behavior and Community Structure in Software Crowdsourcing
Hui Zhang, Yuchuan Wu, Wenjun Wu
118. A Semantic Similarity Assessment Tool for Computer Science Subjects Using Extended Wu & Palmer’s Algorithm and Ontology
Chayan Nuntawong, Chakkrit Snae Namahoot, Michael Brückner
119. Comparison of Architecture-Centric Model-Driven Web Engineering and Abstract Behavioural Specification in Constructing Software Product Line for Web Applications
Daya Adianto, Maya Retno Ayu Setyautami, Salman El Farisi
120. Prediction of Query Satisfaction Based on CQA-Oriented Browsing Behaviors
Junxia Guo, Hao Han, Cheng Gao, Takashi Nakayama, Keizo Oyama
121. The Competition-based Information Propagation in Online Social Networks
Liyuan Sun, Yadong Zhou, Xiaohong Guan
122. e-Learning Recommender System for Teachers using Opinion Mining
Anand Shanker Tewari, Anita Saroj, Asim Gopal Barman
Part IX. IWICT
123. Evaluating Heuristic Optimization, Bio-Inspired and Graph-Theoretic Algorithms for the Generation of Fault-Tolerant Graphs with Minimal Costs
Matthias Becker, Markus Krömker, Helena Szczerbicka
Part X. ICWCIA
124. Real-time Night Visibility Enhancement Algorithm Using the Similarity of Inverted Night Image and Fog Image
Jae-Won Lee, Bae-Ho Lee, Yongkwan Won, Cheol-Hong Kim, Sung-Hoon Hong
125. A Service Protection mechanism Using VPN GW Hiding Techniques
PyungKoo Park, HoYong Ryu, GyungTae Hong, SeongMin Yoo, Jaehyung Park, JaeCheol Ryou
126. Networking Service Availability Analysis of 2N Redundancy Model with Non-stop Forwarding
Dong-Hyun Kim, Jae-Chan Shim, Ho-Yong Ryu, Jaehyung Park, Yutae Lee
127. Property Analysis of Classifiers for Sleep Snoring Detection
Tan Loc Nguyen, Young Y. Lee, Su-il Choi, Yonggwan Won
128. An Innovative Detection Method Integrating Hybrid Sensors for Motorized Wheelchairs
Sanghyun Park, Hyunyoung Kim, Jinsul Kim, Taeksoo Ji, Myoung Jin Lee
Part XI. IWSATA
129. Road Weather Information transmission method for digital multimedia broadcasting
SangWoon Lee
130. Color Overlapping Method of Projection System on LEDs
Yongseok Chi, Youngseop Kim, Je-Ho Park, Kyoungro Yoon, Cheong-Ghil Kim, Yong-Hwan Lee
131. A System Design for Audio Level Measurement based on ITU-R BS.1770-3
Sang Woon Lee, Hyun Woo Lee, Cheong Ghil Kim
132. A Prototype Implementation of Contents Sharing System on Networked Heterogeneous Devices
Cheong Ghil Kim, Dae Seung Park
133. Erratum to: Finding Knee Solutions in Multi-Objective Optimization Using Extended Angle Dominance Approach
Sufian Sudeng, Naruemon Wattanapongsakorn, Sanan Srakaew
Keywords: Engineering, Computational Intelligence, Information Systems and Communication Service, Artificial Intelligence (incl. Robotics)
- Editor
- Kim, Kuinam J.
- Publisher
- Springer
- Publication year
- 2015
- Language
- en
- Edition
- 2015
- Series
- Lecture Notes in Electrical Engineering
- Page amount
- 18 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9783662465783
- Printed ISBN
- 978-3-662-46577-6