![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Asynchronous Classification of Error-Related Potentials in Human-Robot Interaction
The use of implicit evaluations of humans such as electroencephalogram (EEG)-based human feedback is relevant for robot applications, e.g., robot learning or corrections of robot’s actions. In the presented st...
-
Chapter and Conference Paper
A Design of Improvement Method of Central Patch Controlled Security Platform Using Blockchain
The enterprise patch management system is highly dependent upon a central management server and typically suffers a single point of failure. This study suggests a hyperledger fabric blockchain-based distribute...
-
Chapter and Conference Paper
CoolPath: An Application for Recommending Pedestrian Routes with Reduced Heatstroke Risk
Global warming and urbanization have made heatstroke a serious emergency disease especially for large cities in summer daytime. Although a lot of studies have focused on the heat-related analysis or on develop...
-
Chapter and Conference Paper
Implementation of Automatic Adjustment of Font Size System on Smartphone
Adjusting the font size is a function of the smartphone for improving readability. This smartphone is easier to use than other function but is less useful due to the psychological factors experienced by users,...
-
Chapter and Conference Paper
How to Extend IndoorGML for Points of Interest
Nowadays, the interest in spatial information services is growing and moving towards indoor spaces. Indoor spatial data is fundamental as the demand for expressing complex urban environments, in the context of...
-
Chapter and Conference Paper
Mobile Atmospheric Quality Measurement and Monitoring System
Recently, IoT (Internet of Things) technology is applied in various fields to increase convenience and usability. In this paper, we propose a mobile atmospheric pollution monitoring system as an IoT applicatio...
-
Chapter and Conference Paper
How to Extend IndoorGML for Seamless Navigation Between Indoor and Outdoor Space
Navigation and tracking systems became a traditional tool of positioning determination and route guidance for moving objects such as vehicles and pedestrians. Position techniques like Global Positioning System...
-
Chapter and Conference Paper
Task-Aware Image Downscaling
Image downscaling is one of the most classical problems in computer vision that aims to preserve the visual appearance of the original image when it is resized to a smaller scale. Upscaling a small image back ...
-
Chapter and Conference Paper
Security Validation for Data Diode with Reverse Channel
Hardware-based data diode is a powerful security method that removes the reverse channel for network intrusion. However, simple removal leads to data unreliability and user inconvenience. A reverse channel is ...
-
Chapter and Conference Paper
Implementation of the Block2 Option Transfer for Resource Observing with the CoAPthon Library
Utilization of the Constrained Application Protocol (CoAP) that is an important protocol of the Internet of Things (IoT) has increased. So the many associated libraries related with CoAP are also emerging. Amo...
-
Chapter and Conference Paper
A Novel on Automatic K Value for Efficiency Improvement of K-means Clustering
The development of H/W and S/W has shortened the repetition cycle of new data generation and produced various categories of data. Machine learning, in particular, attracts explosive interest as it categorizes...
-
Chapter and Conference Paper
A Simple Fatigue Condition Detection Method by using Heart Rate Variability Analysis
The traffic accident statistics show that fatigue (drowsiness) and drunk driving are the major causes of traffic accidents. Therefore, it is important to detect and prevent driving in fatigue condition. The co...
-
Chapter and Conference Paper
Implementation of MCA Rule Mapper for Cloud Computing Environments
The client-server system in the old finance and banking circle was operated in such a way as to respond to a relatively small number of devices, such as ATMs (automated teller machines) and personal computers....
-
Chapter and Conference Paper
Implementation of Intelligent Decision-Based Smart Group Scheduler
Unlike in the past, where diaries and paper calendars were mostly used, the rapid increase in the use of computers and smartphones of late has demanded a function with which the users can confirm and attach th...
-
Chapter and Conference Paper
A Distributed Mobility Support in SDN-Based LTE/EPC Architecture
As smart phone has rapidly proliferated over the past few years, LTE operators endeavor to cope with large mobile data traffic volumes. To solve such problems, we propose a new SDN-based distributed mobility m...
-
Chapter and Conference Paper
Thermal Image-Based Disc Pads Diagnosis System in Grab Crane
Grab cranes are used for multi-purpose when the sand and soil are deposited into harbor wharf or the undersea construction is performed. Among the components of crane grab, the wire drum and disc brake pad are...
-
Chapter and Conference Paper
Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network
ICS (Industrial Control System) is a computer-controlled system that monitors and controls distributed field devices for power grid, water treatment and other industrial areas. Because ICS components fulfill t...
-
Chapter and Conference Paper
Whitelist Generation Technique for Industrial Firewall in SCADA Networks
The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. But, they are becoming more and more vulnerable to cyber-atta...
-
Chapter and Conference Paper
A Study on Management System Design of Swimming Exercise Prescription by Using Fussy ANP
It has become general common sense through numerous researches that exercise provides positive impacts on physical and mental health. And it has been reported that regular exercise adjusts obesity by reducing ...
-
Chapter and Conference Paper
A Detection Mechanism for SMS Flooding Attacks in Cellular Networks
In recent years, cellular networks have been reported to be susceptible targets for Distributed Denial of Service (DDoS) attacks due to their limited resources. One potential powerful DDoS attack in cellular n...