![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Estimation of Greenhouse Gas Emissions in Cement Manufacturing Process Through Blockchain and SSL Based IoT Data Analysis
Recently, the Internet of Things (IoT) system, which supports human activities based on various types of real data, has attracted attention in various fields. However, the behavior of the system is determined ...
-
Chapter and Conference Paper
Design and Mobile Tracking Performance of a Retro-Directive Array (RDA) Antenna System
Beamforming is one of the most important technologies for wireless communication systems. A beamforming antenna system can control the radiation beam pattern and thus can reduce power consumption, compared wi...
-
Chapter and Conference Paper
Open Source Based Industrial IoT Platforms for Smart Factory: Concept, Comparison and Challenges
As Internet of Things (IoT) and Services are applied to manufacturing industries, Industry 4.0 is evolving. For Industry 4.0 to be realized in the factory, it is essential to implement horizontal integration o...
-
Chapter and Conference Paper
User Targeting SaaS Application Interworking Service Framework Using Complex Context and Rule-Matrix
This paper presents complex contexts, rule-matrix and SaaS application inter-working service framework for user targeting service. They are key components in order to decide what SaaS service are needed and ho...
-
Chapter and Conference Paper
Proposal of a Resource-Monitoring Improvement System Using Amazon Web Service API
Cloud computing uses virtualization technology to segment mass computing resources into various service types, such as Infrastructure as a Service, Platform as a Service, and Software as a Service. The system ...
-
Chapter and Conference Paper
Real-Time Dynamic Motion Capture Using Multiple Kinects
The present paper proposes a method of capturing real-time motions without any inconvenient suit by using several inexpensive sensors vulnerable to joint occlusion and body rotation. Depth data and ICP algori...
-
Chapter and Conference Paper
Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management
Memory bandwidth is a major resource which is shared among all CPU cores. The development speed of memory bandwidth cannot catch up with the increasing number of CPU cores. Thus, the contention for occupying m...
-
Chapter and Conference Paper
Run Away If You Can: Persistent Jamming Attacks against Channel Hop** Wi-Fi Devices in Dense Networks
Wireless local area networks (WLANs) can adopt channel hop** technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though ...
-
Chapter and Conference Paper
Mutual Private Set Intersection with Linear Complexity
A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables...
-
Chapter and Conference Paper
Data Dissemination Protocol Based on Home Agent and Access Node for Mobile Sink in Mobile Wireless Sensor Networks
Achieving efficient data dissemination to a mobile sink moving is one of the main challenges in wireless sensor networks. In this paper, we describe DHA, a data Dissemination protocol based on Home agent and A...
-
Chapter and Conference Paper
The DecoyPort: Redirecting Hackers to Honeypots
Most of computer security systems use the signatures of well-known attacks to detect hackers’ attacks. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible....
-
Chapter and Conference Paper
Consolidating with Media Streaming Server and Network Storage Card
Recently there have been a large number of multimedia demands of IP-based applications in tremendous Internet world. However, Internet-based multimedia services typically do not offer any quality of service be...
-
Chapter and Conference Paper
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provide enterprise level integrated...
-
Chapter and Conference Paper
Multi-level Independent Component Analysis
This paper presents a new method which uses multi-level density estimation technique to generate score function in ICA (independent Component Analysis). Score function is very closely related with density func...
-
Chapter and Conference Paper
Collaborative Filtering Based on Neural Networks Using Similarity
Recommendation is to offer information which fits user’s interests and tastes to provide better services and to reduce information overload. It recently draws attention upon Internet users and information prov...
-
Chapter and Conference Paper
Internet at a Crossroads of Education
The Internet has grown rapidly in the past few years to impact all aspects of modern life. While many areas of the Internet such as commerce has shown tremendous improvements in providing convenient and comple...
-
Chapter and Conference Paper
Link Layer Assisted Multicast-Based Mobile RSVP (LM-MRSVP)
Even though several RSVP extensions have been proposed to support QoS guarantee in mobile Internet, they still suffer from issues such as excessive advanced reservations or a nonoptimal path generated by Mobil...
-
Chapter and Conference Paper
Interoperability Testing Based on a Fault Model for a System of Communicating FSMs
This paper presents a fault model for interoperability testing of communication protocols that are modeled by communicating finite state machines, and proposes a technique that extends an initial interoperabil...
-
Chapter and Conference Paper
An XPATH Query Processor for a Decomposition Storage Scheme
XML is a markup language that is widely accepted as a standard way of information sharing and exchange, especially on the Web. One of the recent database research issues is to devise ways of storing XML docume...
-
Chapter and Conference Paper
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption
The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. Fingerprinting provides a means which a copyright owner can tra...