|
Part I Computer Science and its Applications |
|
|
|
Utilizing TPM Functionalities on Remote Server |
|
|
3 | (10) |
|
|
|
Security and QoS relationships in Mobile Platforms |
|
|
13 | (10) |
|
|
|
A Hybrid Natural Computing Approach for the VRP Problem Based on PSO, GA and Quantum Computation |
|
|
23 | (6) |
|
|
|
|
|
|
Finger Triggered Virtual Musical Instruments |
|
|
29 | (10) |
|
|
|
|
A Low Complexity Multi-Layered Space Frequency Coding Detection Algorithm for MIMO-OFDM |
|
|
39 | (10) |
|
|
|
|
|
Dynamic Transmit Antenna Shuffling Scheme for MIMO Wireless Communication Systems |
|
|
49 | (10) |
|
|
|
|
|
A Low Complexity V-BLAST/STBC Detection Algorithm for MIMO System |
|
|
59 | (10) |
|
|
|
|
|
A Grid-Based Cloaking Scheme for Continuous Location-Based Services In Distributed Systems |
|
|
69 | (10) |
|
|
|
Occluded and Low Resolution Face Detection with Hierarchical Deformable Model |
|
|
79 | (8) |
|
|
|
|
|
Negotiated Economic Grid Brokering for Quality of Service |
|
|
87 | (10) |
|
|
|
Differential Fault Analysis on HAS-160 Compression Function |
|
|
97 | (10) |
|
|
|
|
|
A New Energy-Efficient Routing Protocol Based on Clusters for Wireless Sensor Networks |
|
|
107 | (14) |
|
|
|
MIDI-to-Singing Online Karaoke for English M-Learning |
|
|
121 | (8) |
|
|
|
A New Cloaking Method Based on Weighted Adjacency Graph for Preserving User Location Privacy in LBS |
|
|
129 | (10) |
|
|
|
Simulation Videos for Understanding Occlusion Effects on Kernel Based Object Tracking |
|
|
139 | (10) |
|
|
|
|
|
Originator Recognition (or) Path Recovery Mechanism for Load-Based Routing Protocol |
|
|
149 | (10) |
|
|
|
|
|
|
Analysis of Correlation Peak Position Modulation |
|
|
159 | (10) |
|
|
|
Simulation Study on Distribution of Control Points for Aerial Images Rectification |
|
|
169 | (10) |
|
|
|
|
|
A Secure Image Watermarking Using Visual Cryptography |
|
|
179 | (10) |
|
|
|
Bit Error Rate Analysis of Partial Packets in Ad hoc Wireless Networks |
|
|
189 | (8) |
|
|
|
|
|
|
An Interaction System Architecture and Design between Smart Computing and Cloud Computing |
|
|
197 | (10) |
|
|
|
|
A Virtual Machine Scheduling Algorithm for Resource Cooperation in a Private Cloud |
|
|
207 | (10) |
|
|
|
|
Heterogeneous Core Network Architecture for Next-Generation Mobile Communication Networks |
|
|
217 | (14) |
|
|
A Novel Learning Algorithm Based on a Multi-Agent Structure for Solving Multi-Mode Resource-Constrained Project Scheduling Problem |
|
|
231 | (12) |
|
|
|
|
Security Analysis of the Keyschedule of ARIA-128 |
|
|
243 | (10) |
|
|
|
|
|
|
Estimating Number of Columns in Mixing Matrix for Under-Determined ICA Using Observed Signal Clustering and Exponential Filtering |
|
|
253 | (8) |
|
|
|
Realization of Coordinative Control Between Multi Readers and Multi RF-SIM Cards Under Mobile RF-SIM Mode |
|
|
261 | (10) |
|
|
|
|
Effects of Smart Home Dataset Characteristics on Classifiers Performance for Human Activity Recognition |
|
|
271 | (12) |
|
|
|
|
|
Activity Recognition Based on SVM Kernel Fusion in Smart Home |
|
|
283 | (8) |
|
|
|
|
|
Secure Anonymous Conditional Purchase Order Payment Mechanism |
|
|
291 | (10) |
|
|
|
Trustworthiness Inference of Multi-tenant Component Services in Service Compositions |
|
|
301 | (12) |
|
|
|
Enhanced Middleware for Collaborative Privacy in Community Based Recommendations Services |
|
|
313 | (16) |
|
|
|
|
|
A New k-NN Query Processing Algorithm Using a Grid Structure for Mobile Objects in Location-Based Services |
|
|
329 | (10) |
|
|
|
An Immune System-Inspired Byte Permutation Function to Improve Confusion Performance of Round Transformation in Symmetric Encryption Scheme |
|
|
339 | (14) |
|
|
|
|
|
|
New Bilateral Error Concealment Method of Entire Depth Frame Loss for 3DTV and Virtual 3D Videoconferencing Systems |
|
|
353 | (8) |
|
|
|
|
|
|
|
A REST Open API for Preventing Income Tax Over-Payment by Auditing Year-End Tax Settlement |
|
|
361 | (10) |
|
|
|
BAT: Bimodal Cryptographic Algorithm Suitable for Various Environments |
|
|
371 | (18) |
|
|
|
|
|
|
|
|
Applying Forensic Approach to Live Investigation Using XeBag |
|
|
389 | (10) |
|
|
|
The Development of an Internet-Based Knowledge Management System for Adapted Physical Education Service Delivery |
|
|
399 | (10) |
|
|
|
|
|
Intangible Capital, Opportunity Exploitation and Institutional Endorsement in Emerging IT Industry |
|
|
409 | (12) |
|
|
A Virtualization Security Framework for Public Cloud Computing |
|
|
421 | (8) |
|
|
Environmental Awareness in Green Supply Chain and Green Business Practices: Application to Small and Medium-Sized Enterprises |
|
|
429 | (8) |
|
|
|
|
Computational Analysis of the Bargaining Power and Channel Strategies in Supply Chain Relationship |
|
|
437 | (8) |
|
|
New Hybrid Data Model for XML Document Management in Electronic Commerce |
|
|
445 | (8) |
|
|
|
A Study on Advanced Penetration Testing and Defensive Schemes for Web Service Vulnerability Analyses |
|
|
453 | (8) |
|
|
|
|
|
Orthogonal Unified Buffer with Memory Efficiency |
|
|
461 | (8) |
|
|
|
The Study on Smart Sensor Network Based Production Management Service Design |
|
|
469 | (8) |
|
|
R&D Intensity and Productivity: Evidence from IT Firms versus Non-IT Firms in KOSDAQ Market |
|
|
477 | (8) |
|
|
An Improved CRT-Based Broadcast Authentication Scheme in WSNs |
|
|
485 | (8) |
|
|
|
Evaluation and Exploration of Optimal Deployment for RFID Services in Smart Campus Framework |
|
|
493 | (10) |
|
|
Towards Analyzing Family Misconfiguration in Tor Network |
|
|
503 | (12) |
|
|
|
|
Intelligent Heterogeneous Network Worms Propagation Modeling and Analysis |
|
|
515 | (10) |
|
|
|
|
|
The Design of Remote Control Car Using Smartphone for Intrusion Detection |
|
|
525 | (12) |
|
|
Part II Computerized Applications for the Sustainable Development of Aviation Industry |
|
|
|
The Impact of Systems Engineering on Program Performance: A Case Study of the Boeing Company |
|
|
537 | (10) |
|
|
|
IT Framework and User Requirement Analysis for Smart Airports |
|
|
547 | (10) |
|
|
|
|
The Framework Development of a RFID-Based Baggage Handling System for Airports |
|
|
557 | (10) |
|
|
|
|
A Modified Carbon Calculator for Enhanced Accuracy, Reliability and Understandability |
|
|
567 | (10) |
|
|
|
|
|
A Framework for Developing Internet-Based Global Integrated Logistics Management System |
|
|
577 | (10) |
|
|
|
|
|
The Implication of Environmental Costs on Air Passenger Demand for Airline Networks |
|
|
587 | (8) |
|
|
|
An Empirical Study on the Design Peak Hourly Traffic at a Major International Airport |
|
|
595 | (10) |
|
|
|
|
Review of CRS in the Airline Industry; New Categorization with Previous Literatures |
|
|
605 | (8) |
|
|
|
|
|
Simulation Analysis for the Design of the Airport Security System |
|
|
613 | (10) |
|
|
|
|
Measuring Asia Airport Productivity Considering the Undesirable Output |
|
|
623 | (10) |
|
|
|
A Study on Aviation Technology Forecast for Sustainable (Green) Aviation Using Patent Analysis |
|
|
633 | (12) |
|
|
|
Part III Signal Processing for Image, Video, and Networking |
|
|
|
A Vision-Based Universal Control System for Home Appliances |
|
|
645 | (10) |
|
|
|
|
|
|
|
An IMU-Based Positioning System Using QR-Code Assisting for Indoor Navigation |
|
|
655 | (12) |
|
|
|
|
|
A Visual-Audio Assisting System for Senior Citizen Reading |
|
|
667 | (10) |
|
|
|
|
|
|
|
|
Automated Text Detection and Text-Line Construction in Natural Images |
|
|
677 | (10) |
|
|
|
|
|
Part IV Science, Technology and Society |
|
|
|
Security Weakness of a Dynamic ID-Based User Authentication Scheme with Key Agreement |
|
|
687 | (6) |
|
|
|
|
Development and Application of STEAM Teaching Model Based on the Rube Goldberg's Invention |
|
|
693 | (6) |
|
|
|
Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System |
|
|
699 | (8) |
|
|
|
|
|
|
Weakness of Tan's Two-Factor User Authentication Scheme in Wireless Sensor Networks |
|
|
707 | (8) |
|
|
|
|
Design of Mobile NFC Extension Protocol for Various Ubiquitous Sensor Network Environments |
|
|
715 | (8) |
|
|
|
|
Experimentation and Validation of Web Application's Vulnerability Using Security Testing Method |
|
|
723 | (10) |
|
|
|
|
|
|
Teaching-Learning Methodology of STS Based on Computer and CAI in Information Science Education |
|
|
733 | (6) |
|
|
|
Encryption Scheme Supporting Range Queries on Encrypted Privacy Databases in Big Data Service Era |
|
|
739 | (10) |
|
|
|
Part V New Technology Convergence, Cloud, Culture and Art |
|
|
|
A Congested Route Discrimination Scheme Through the Analysis of Moving Object Trajectories |
|
|
749 | (8) |
|
|
|
|
|
|
An Efficient Hierarchical Multi-Hop Clustering Scheme in Non-uniform Large Wireless Sensor Networks |
|
|
757 | (10) |
|
|
|
|
|
|
An Energy-Efficient Data Compression and Transmission Scheme in Wireless Multimedia Sensor Networks |
|
|
767 | (6) |
|
|
|
|
|
A Sensor Positioning Scheme in Irregular Wireless Sensor Networks |
|
|
773 | (8) |
|
|
|
|
|
|
Secure Multipath Routing for WMSN |
|
|
781 | (10) |
|
|
|
|
|
Dynamic TDMA Scheduling for Data Compression in Wireless Sensor Networks |
|
|
791 | (8) |
|
|
|
A Study of Forest Fire Correlation to Based on Meteorological Factors |
|
|
799 | (6) |
|
|
|
|
A Study on the Improvement of Interoperability in Rok C4I System for Future Warfare |
|
|
805 | (8) |
|
|
|
|
|
Development Direction for Information Security in Network-Centric Warfare |
|
|
813 | (8) |
|
|
|
|
|
Part VI Smart Grid Security and Communications |
|
|
|
An IHD Authentication Protocol in Smart Grid |
|
|
821 | (10) |
|
|
|
|
|
|
|
Flexible Network Design for Wide Area Measurement Protection and Control |
|
|
831 | (12) |
|
|
|
|
|
Green Communication and Corporate Sustainability of Computer Aided Audit Techniques and Fraud Detection |
|
|
843 | (20) |
|
|
|
|
Green Communication and Consumer Electronics Sustainability in Delivering Cost Benefit Business Federation in Professional Service Firms |
|
|
863 | (28) |
|
|
|
|
SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory 875 |
|
|
|
|
|
|
|
Part VII Computer Convergence |
|
|
|
Design of a Structured Plug-in Smart Education System |
|
|
891 | (12) |
|
|
|
|
Impact of Background Utilization and Background Traffic on the Foreground Applications in a Wide Area Network |
|
|
903 | (14) |
|
|
|
Load Balancing in Grid Computing Using AI Techniques |
|
|
917 | (12) |
|
|
|
|
LiQR: A QR Code-Based Smart Phone Application Supporting Digital Marketing |
|
|
929 | (14) |
|
|
|
|
Ensuring Minimal Communication Overhead in Low Bandwidth Network File |
|
|
943 | (10) |
|
|
|
|
|
Preventing Blackhole Attack in DSR-Based Wireless Ad Hoc Networks |
|
|
953 | (18) |
|
|
|
|
Fundamental Tradeoffs for Ubiquitous Wireless Service: A QoE, Energy and Spectral Perspective |
|
|
971 | (10) |
|
|
|
|
|
|
Multi-Policy Collaborative Access Control Model for Composite Services |
|
|
981 | (12) |
|
|
|
|
|
|
Author Index |
|
993 | |