![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
106 Result(s)
-
Chapter and Conference Paper
Seismic Fragility Evaluation of Retrofitted Low-Rise RC Structures
In this research, a seismic fragility evaluation is used to assess the seismic performance of low-rise RC structures retrofitted with self-centering post-tensioned pre-cast concrete (SC-PC) frame with enlarged...
-
Chapter and Conference Paper
Implementation of 1:N Communication Model Using Serial Communication in an RF-Based Environment
The most important thing in the Internet of Things (IoT) is data transmission and reception between devices. Accordingly, various types of communication modules have been introduced. Currently, Bluetooth modul...
-
Chapter and Conference Paper
Correcting Misspelled Words in Twitter Text
The SNS became popularized by computer, mobile devices, and tablets that are accessible to the Internet. Among SNS, Twitter posts the words of short texts and, it shares information. Twitter texts are the opti...
-
Chapter and Conference Paper
The Automatic Text Summarization Using Semantic Relevance And Hierarchical Structure Of Wordnet
In recent years, rapid development and spread of smart devices has resulted in increase in data of online documents on the Internet day by day. Growing information overload of web texts leaves users facing dif...
-
Chapter and Conference Paper
A Study of Interference Cancellation for NOMA Downlink Near-Far Effect to Support Big Data
Non-orthogonal Multiple Access (NOMA) is proposed as a new multiple access for 5G communication. However, one of the crucial constraints is near-far effect that occurs to the NOMA downlink and serial interfere...
-
Chapter and Conference Paper
Korean spelling error correction using a Hangul similarity algorithm
Increasingly people use computers for word processing. This helps reduce word processing time and fatigue of hands, but may increase the possibility of occurrence of spelling errors. Although spelling errors a...
-
Chapter and Conference Paper
Travel Destination Recommendation Based on Probabilistic Spatio-temporal Inference
Recently, a lot of users are increasing for searching travel information through smart devices such as, tourist attractions, accommodation, entertainment, local gourmet food and so on. A general method for rec...
-
Chapter and Conference Paper
A Design of Sensor Data Ontology for a Large Scale Crop Growth Environment System
The development of various sensor and sensor network made it possible to collect environmental date from specific area, however, there is a lack of practical application to share useful information and knowled...
-
Chapter and Conference Paper
Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning
SCADA systems have been upgraded from the standard serial bus systems to modern TCP/IP based systems. The Modbus protocol is one of the most widely used protocols in SCADA networks. However, it provides no inh...
-
Chapter and Conference Paper
An automatic dosimetric and geometric tracking system for head and neck adaptive radiotherapy
The ability to track changes in tumors and organs at risk over a course of radiotherapy is essential for successful adaptive radiation therapy (ART). To that end, we have developed a software suite that helps ...
-
Chapter and Conference Paper
Low Ambiguity First Algorithm: A New Approach to Knowledge-Based Word Sense Disambiguation
The Word Sense Disambiguation (WSD) problem has been considered as one of the most important challenging task in Natural Language Processing (NLP) research area. Even though, many of scientists applied the rob...
-
Chapter and Conference Paper
A Method for Normalizing Non-standard Words in Online Social Network Services: A Case Study on Twitter
Due to the big developments of Smartphone devices and on-line social network services, people can share diverse information about what they have been experienced during a day with no constrain to time or locat...
-
Chapter and Conference Paper
Design of Industrial Firewall System Based on Multiple Access Control Filter
Although existing control systems have been developed and operated independently, the development of information technology has made access to control systems easier. Note, however, that such advancement of co...
-
Chapter and Conference Paper
A Design of Web Log Integration Framework Using NoSQL
Webservice is a software technology as the representative method of information communication currently used to create a dynamic system environment that is configured to fulfill its users’ needs. Therefore, an...
-
Chapter and Conference Paper
Whitelist Generation Technique for Industrial Firewall in SCADA Networks
The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. But, they are becoming more and more vulnerable to cyber-atta...
-
Chapter and Conference Paper
Sentiment Analysis for Tracking Breaking Events: A Case Study on Twitter
Social media such as Twitter and Facebook can be considered as a new media different from the typical media group. The information on social media spread much faster than any other traditional news media due t...
-
Chapter and Conference Paper
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on Twitter
Social network services such as Twitter and Facebook can be considered as a new media different from the typical media group. The information on social media spread much faster than any other traditional news ...
-
Chapter and Conference Paper
Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding
Socially and economically, the distributed denial-of-service (DDoS) attacks have been serious threats in the cyber world. Despite of many researches, current defense methods can be vulnerable to the DDoS attac...
-
Chapter and Conference Paper
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks
Distributed Denial-of-Service (DDoS) attacks are made in such a way that a plurality of zombie computers infected with malicious code simultaneously makes Denial-of-Service (DoS) attacks. These DDoS attacks st...
-
Chapter and Conference Paper
A Term Normalization Method for Better Performance of Terminology Construction
The importance of research on knowledge management is growing due to recent issues with big data. The most fundamental steps in knowledge management are the extraction and construction of terminologies. Terms ...