3,257 Hits in 3.4 sec

Enhanced VLAD

2016 KSII Transactions on Internet and Information Systems  
Experimental results show that our method can make significant improvement on both VLAD image representation and non-exhaustive search.  ...  Recently, Vector of Locally Aggregated Descriptors (VLAD) has been proposed to index image by compact representations, which encodes powerful local descriptors and makes significant improvement on search  ...  There are two problems that all practical system must be solved, which are search time and storage size.  ... 
doi:10.3837/tiis.2016.07.022 fatcat:n7kg67dyszhxbhovs4kxihq4hu

Internet Information Orientation: The Link to National Competitiveness on Internet

2015 KSII Transactions on Internet and Information Systems  
The study aims to propose the framework, named "Internet Information Orientation" that illustrates the relationship between Internet capabilities and national competitiveness on Internet.  ...  Korea also has been on the top in the field of Internet penetration rate, in terms of both high-speed broadband and wireless Internet.  ...  , and mistakes on Internet Information (C-3) Behaviors & Information Integrity Use of information on Internet in a trustful and principled Values On Internet manner on Internet on Internet (C-4) Information  ... 
doi:10.3837/tiis.2015.08.015 fatcat:tc3ckgscgrc5vh2dghfmd72p3a

Multiuser Heterogeneous-SNR MIMO Systems

2014 KSII Transactions on Internet and Information Systems  
We develop a new analytical expression for the sum throughput of the multiuser MIMO system.  ...  Previous studies on multiuser multiple-input multiple-output (MIMO) mostly assume a homogeneous signal-to-noise ratio (SNR), where each user has the same average SNR.  ...  This has led to extensive research on multiple-input multiple-output (MIMO) systems.  ... 
doi:10.3837/tiis.2014.08.002 fatcat:3zualmcbsvfdbnudxgpbg3wak4

Video-based Stained Glass

2022 KSII Transactions on Internet and Information Systems  
color and texture to the region.  ...  The subdividing must be coherent between adjacent frames to prevent temporal artefacts, such as flickering and the shower door effect.  ...  Acknowledgement This study was supported by the Research Program funded by the SeoulTech (Seoul National University of Science and Technology).  ... 
doi:10.3837/tiis.2022.07.012 fatcat:l62tckfvcne25jqfqajzkiqjye

Structure-Preserving Mesh Simplification

2020 KSII Transactions on Internet and Information Systems  
are extracted by exploiting image information and planar structures jointly; finally we simplify the mesh model with plane constraint QEM and linear feature preserving strategies.  ...  Our experimental results demonstrate that the proposed method, compared to other simplification algorithms, can effectively improve the quality of mesh and yield an increased robustness on noisy input  ...  and provide good boundary information.  ... 
doi:10.3837/tiis.2020.11.012 fatcat:lwuyci47dnftvjleskg2ggs4uu

Improving JPEG-LS Performance Using Location Information

2016 KSII Transactions on Internet and Information Systems  
The proposed method replaces a set of long codewords with a set of shorter location map information.  ...  This paper shows how efficiently the location map guarantees reversibility and enhances the compression rate in terms of performance.  ...  Acknowledgement This work was supported in part by a National Research Foundation of Korea (NRF) grant funded by the Korean Government (MEST) (NRF-2015R1A2A2A01004587), and Korea University.  ... 
doi:10.3837/tiis.2016.11.019 fatcat:f7s25cxu3bb5rdhqunxffpu2u4

Structurally Enhanced Correlation Tracking

2017 KSII Transactions on Internet and Information Systems  
The proposed structural enhancement is tested on VTBv1.0 benchmark for its accuracy and robustness.  ...  In visual object tracking, Correlation Filter-based Tracking (CFT) systems have arouse recently to be the most accurate and efficient methods.  ...  The experiments were conducted on Intel(R) Core(TM)i7-4770 CPU @ 3.4GHz with 32GB RAM system.  ... 
doi:10.3837/tiis.2017.10.013 fatcat:wqwa3oa62vg2dptocttqghk4fe

UN-Substituted Video Steganography

2020 KSII Transactions on Internet and Information Systems  
Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness.  ...  The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values.  ...  Introduction In our everyday routine, ensuring the confidentiality of digital information is essential. As the use of the Internet grows, secret information is also required to be secured [1] .  ... 
doi:10.3837/tiis.2020.01.021 fatcat:mbsz43qx5jbjperajc2zvfvmf4

Internet Banking Login with Multi-Factor Authentication

2016 KSII Transactions on Internet and Information Systems  
Internet banking is one of many services provided by financial institutions that have become very popular with an increasing trend.  ...  Due to the increased amount of usage of the service, Internet banking has become a target from adversaries. One of the points that are at risk of an attack is the login process.  ...  This is in accordance with the proof and analysis by the logic of GNY as well as the OWASP-AT-900 criteria.  ... 
doi:10.3837/tiis.2017.01.027 fatcat:2xzgovwv25gejlml2tpwycsdau

RSA-type Algebra Structures

2016 KSII Transactions on Internet and Information Systems  
RSA is a public key cryptosystem that is currently the most popularly used in information security.  ...  The usefulness of the proposed structure is then proved by showing that, following the structure we can construct a RSA variant based on the Bergman ring.  ...  The operation on is identically defined to that on . The orders of and are denoted by and , respectively.  ... 
doi:10.3837/tiis.2016.06.021 fatcat:v4jdfx7dqvc5hlgulzpgqbhfmy

Mitigating Cache Pollution Attack in Information Centric Mobile Internet

2019 KSII Transactions on Internet and Information Systems  
Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense.  ...  Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge.  ...  System Model and General Design System Model and Assumptions Fig. 1 depicts the system model of the LTE-based information centric mobile Internet.  ... 
doi:10.3837/tiis.2019.11.022 fatcat:6kfey3mpv5agbe3sdio4oyulgy

Constructive Steganography by Tangles

2018 KSII Transactions on Internet and Information Systems  
Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages.  ...  During data hiding, we create a cell library to establish the relationships between cells and secret data.  ...  As there are many tangle images on internet and state-of-the-art steganalysis tools cannot identify whether they are clean or not, the proposed constructive steganography by tangle is therefore secure.  ... 
doi:10.3837/tiis.2018.08.020 fatcat:gh2my2zkuza4thjnknetfkshdu

A Novel System for Detecting Adult Images on the Internet

Jae-Yong Park
2010 KSII Transactions on Internet and Information Systems  
As Internet usage has increased, the risk of adolescents being exposed to adult content and harmful information on the Internet has also risen.  ...  And, the textural features are identified using a gray level co-occurrence matrix.  ...  the Internet (Fig. 8 ).  ... 
doi:10.3837/tiis.2010.10.012 fatcat:q7zhrbi2vveb7glhywyqdtnedy

Digital Tourism Security System for Nepal

2020 KSII Transactions on Internet and Information Systems  
As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.  ...  The research supplements as a knowledge document for design and implementation of digital tourism security system in practice.  ...  The rise of social networks and internet based information systems have introduced crowdsourcing as a news source of data which works with geo tagged tweets, live data streams, text based data and other  ... 
doi:10.3837/tiis.2020.11.005 fatcat:phxi52mulnbqvp32roubiytaqm

Drug distribution management system based on IoT

2022 KSII Transactions on Internet and Information Systems  
This article proposes a drug distribution management scheme based on the Internet of Things technology.  ...  The use of a drug distribution management system combined with RFID readers can identify drug information and effectively prevent the occurrence of erroneous, missed, counterfeit, and expired drugs.  ...  It is proposed on the basis of the concept of the Internet, which is mainly to extend the network to items and to allow information exchange between items and items.  ... 
doi:10.3837/tiis.2022.02.004 fatcat:fg4npw3uzzgbtkcmp2rxzjp77y
« Previous Showing results 1 — 15 out of 3,257 results