Articles from KSII Transactions on Internet and Information Systems (February 1, 2017)
1-36 out of 36 article(s)
|A conceptual approach for discovering proportions of disjunctive routing patterns in a business process model.
||Kim, Kyoungsook; Yeon, Moonsuk; Jeong, Byeongsoo; Kim, Kwanghoon
|A context-aware smart home control system based on ZigBee sensor network.
||Khan, Murad; Silva, Bhagya Nathali; Jung, Changsu; Han, Kijun
|A dynamic defense using client puzzle for identity-forgery attack on the south-bound of software defined networks.
||Wu, Zehui; Wei, Qiang; Ren, Kailei; Wang, Qingxian
|A lightweight pseudonym authentication and key agreement protocol for multi-medical server architecture in TMIS.
||Liu, Xiaoxue; Li, Yanping; Qu, Juan; Ding, Yong
|A location tracking system using BLE beacon exploiting a Double-Gaussian Filter.
||Lee, Jae Gu; Kim, Jin; Lee, Seon Woo; Ko, Young Woong
|A machine-learning based approach for extracting logical structure of a styled document.
||Kim, Tae-young; Kim, Suntae; Choi, Sangchul; Kim, Jeong-Ah; Choi, Jae-Young; Ko, Jong-Won; Lee, Jee-
|A novel resource scheduling scheme for comp systems.
||Zhou, Wen'an; Liu, Jianlong; Zhang, Yiyu; Yang, Chengyi; Yang, Xuhui
|A risk classification based approach for Android malware detection.
||Ye, Yilin; Wu, Lifa; Hong, Zheng; Huang, Kangyu
|A robust approach for human activity recognition using 3-D body joint motion features with deep belief network.
||Uddin, Md. Zia; Kim, Jaehyoun
|An adaptively speculative execution strategy based on real-time resource awareness in a multi-job heterogeneous environment.
||Liu, Qi; Cai, Weidong; Liu, Qiang; Shen, Jian; Fu, Zhangjie; Liu, Xiaodong; Linge, Nigel
|An App Visualization design based on IoT self-diagnosis Micro Control Unit for car accident prevention.
||Jeong, YiNa; Jeong, EunHee; Lee, ByungKwan
|Augmented-reality survey: from concept to application.
||Kim, Soo Kyun; Kang, Shin-Jin; Choi, Yoo-Joo; Choi, Min-Hyung; Hong, Min
|Block based blind & secure gray image watermarking technique based on discrete wavelet transform and singular value decomposition.
||Imran, Muhammad; Harvey, Bruce A.
|Collaborative sub-channel allocation with power control in small cell networks.
||Yang, Guang; Cao, Yewen; Wang, Deqiang; Xu, Jian; Wu, Changlei
|Design and implementation of information management tools for the EDISON open platform.
||Ma, Jin; Lee, Jongsuk Ruth; Cho, Kumwon; Park, Minjae
|Design and implementation of SDN-based 6LBR with QoS mechanism over heterogeneous WSN and internet.
||Lee, Tsung-Han; Chang, Lin-Huang; Cheng, Wei-Chung
|Development and evaluation of tip pinch strength measurement on a paretic hand rehabilitation device.
||Kim, Jung-Yeon; Cha, Ye-Rin; Lee, Sang-Heon; Jung, Bong-Keun
|Enhanced mutual authentication scheme based on chaotic map for PCM in NFC service environment.
||Park, Sung-Wook; Lee, Im-Yeong
|Evaluation of mobile application in user's perspective: Case of P2P lending apps in FinTech industry.
|Extracting the source code context to predict import changes using GPES.
||Lee, Jaekwon; Kim, Kisub; Lee, Yong-Hyeon; Hong, Jang-Eui; Seo, Young-Hoon; Yang, Byung-Do; Jung, Wo
|Hop-by-hop dynamic addressing based routing protocol for monitoring of long range underwater pipeline.
||Abbas, Muhammad Zahid; Bakar, Kamalrulnizam Abu; Ayaz, Muhammad; Mohamed, Mohammad Hafiz; Tariq, Moe
|Hybrid S-ALOHA/TDMA protocol for LTE/LTE-A networks with coexistence of H2H and M2M traffic.
||Sui, Nannan; Wang, Cong; Xie, Wei; Xu, Youyun
|Implementation of bistatic backscatter wireless communication system using ambient Wi-Fi signals.
||Kim, Young-Han; Ahn, Hyun-Seok; Yoon, Changseok; Lim, Yongseok; Lim, Seung-ok; Yoon, Myung-Hyun
|KMMR: An efficient and scalable key management protocol to secure multi-hop communications in large scale wireless sensor networks.
||Guermazi, Abderrahmen; Belghith, Abdelfettah; Abid, Mohamed; Gannouni, Sofien
|Measures for automaker's legal risks from security threats in connected car development lifecycle.
||Kim, Dong Hee; Baek, Seung Jo; Lim, Jongin
|Misclassified samples based hierarchical cascaded classifier for video face recognition.
||Fan, Zheyi; Weng, Shuqin; Zeng, Yajun; Jiang, Jiao; Pang, Fengqian; Liu, Zhiwen
|Performance evaluation of the RIX-MAC protocol for wireless sensor networks.
||Kim, Taekon; Lee, Hyungkeun
|Privacy-preserving outsourcing schemes of modular exponentiations using single untrusted cloud server.
||Zhao, Ling; Zhang, Mingwu; Shen, Hua; Zhang, Yudi; Shen, Jian
|Realistic visual simulation of water effects in response to human motion using a depth camera.
||Kim, Jong-Hyun; Lee, Jung; Kim, Chang-Hun; Kim, Sun-Jeong
|Reversible data hiding in JPEG images using ordered embedding.
||Qian, Zhenxing; Dai, Shu; Chen, Boyang
|Secrecy spectrum and secrecy energy efficiency in massive MIMO enabled HetNets.
||Zhong, Zhihao; Peng, Jianhua; Huang, Kaizhi; Xia, Lu; Qi, Xiaohui
|Size aware correlation filter tracking with adaptive aspect ratio estimation.
||Zhu, Xiaozhou; Song, Xin; Chen, Xiaoqian; Bai, Yuzhu; Lu, Huimin
|The influence of personality traits on the Facebook addiction.
||Hwang, Ha Sung
|Thermal infrared image analysis for breast cancer detection.
||Min, Sedong; Heo, Jiyoung; Kong, Youngsun; Nam, Yunyoung; Ley, Preap; Jung, Bong-Keun; Oh, Dongik; S
|Towards enacting a spem-based test process with maturity levels.
||Dashbalbar, Amarmend; Song, Sang-Min; Lee, Jung-Won; Lee, Byungjeong
|User bandwidth demand centric soft-association control in Wi-Fi networks.
||Sun, Guolin; Adolphe, Sebakara Samuel Rene; Zhang, Hangming; Liu, Guisong; Jiang, Wei