본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

권호기사

권호기사 목록 테이블로 기사명, 저자명, 페이지, 원문, 기사목차 순으로 되어있습니다.
기사명 저자명 페이지 원문 목차
Semantic conceptual relational similarity based web document clustering for efficient information retrieval using semantic ontology Selvalakshmi B, Subramaniam M, Sathiyasekar K p. 3102-3119
Adaptive success rate-based sensor relocation for IoT applications Moonseong Kim, Woochan Lee p. 3120-3137
Multicast tree generation using meta reinforcement learning in SDN-based smart network platforms Jihun Chae, Namgi Kim p. 3138-3150
(An) energy efficient intelligent method for sensor node selection to improve the data reliability in Internet of things networks Remesh Babu K R, Preetha K G, Saritha S, Rinil K R p. 3151-3168
Interface design for e-learning : investigating design characteristics of colour and graphic elements for generation Z Hazwani Nordin, Dalbir Singh, Zulkefli Mansor p. 3169-3185
Multi-scale local difference directional number pattern for group-housed pigs recognition Weijia Huang, Weixing Zhu, Zhengyan Zhang, Yizheng Guo p. 3186-3203
Higher-order conditional random field established with CNNs for video object segmentation Chuanyan Hao, Yuqi Wang, Bo Jiang, Sijiang Liu, Zhi-Xin Yang p. 3204-3220
Research trend analysis for sustainable QR code use : focus on big data analysis Eunji Lee, Jikyung Jang p. 3221-3242
Data correction for enhancing classification accuracy by unknown deep neural network classifiers Hyun Kwon, Hyunsoo Yoon, Daeseon Choi p. 3243-3257
Malware detection with directed cyclic graph and weight merging Shanxi Li, Qingguo Zhou, Wei Wei p. 3258-3273
Fine-grained and traceable key delegation for ciphertext-policy attribute-based encryption Jiajie Du, Nurmamat HelIl p. 3274-3297
(A) two-layer steganography for mosaic images Ji-Hwei Horng, Chin-Chen Chang, Kun-Sheng Sun p. 3298-3321
Identity-based provable data possession for multicloud storage with parallel key-insulation S. Mary V. Nithya, V. Rhymend Uthariaraj p. 3322-3347
Adaptive data hiding scheme based on magic matrix of flexible dimension Hua Wu, Ji-Hwei Horng, Chin-Chen Chang p. 3348-3364
(An) ID-based broadcast encryption scheme for cloud-network integration in smart grid Shufen Niu, Lizhi Fang, Mi Song, Fei Yu, Song Han p. 3365-3383
(A) data corruption detection scheme based on ciphertexts in cloud environment Sixu Guo, Shen He, Li Su, Xinyue Zhang, Huizheng Geng, Yang Sun p. 3384-3400
Traceable ciphertet-policy attribute-based encryption with constant decryption Guangbo Wang, Feng Li, Pengcheng Wang, Yixiao Hu p. 3401-3420
Copyright protection of e-books by data hiding based on integer factorization Da-Chun Wu, Ping-Yu Hsieh p. 3421-3443
(A) hidden anti-jamming method based on deep reinforcement learning Yifan Wang, Xin Liu, Mei Wang, Yu Yu p. 3444-3457
(A) two-step screening algorithm to solve linear error equations for blind identification of block codes based on binary galois field Qian Liu, Hao Zhang, Peidong Yu, Gang Wang, Zhaoyang Qiu p. 3458-3481

참고문헌 (25건) : 자료제공( 네이버학술정보 )

참고문헌 목록에 대한 테이블로 번호, 참고문헌, 국회도서관 소장유무로 구성되어 있습니다.
번호 참고문헌 국회도서관 소장유무
1 YouTube, http://www.youtube.com/ 미소장
2 Netflix, http://www.netflix.com/ 미소장
3 Amazon Prime Video, http://www.primevideo.com/ 미소장
4 Hulu, http://www.hulu.com 미소장
5 N. Kim and B.-D. Lee, “Analysis and Improvement of MPEG-DASH-based Internet Live Broadcasting Services in Real-world Environments,” KSII Transactions on Internet and Information Systems, Vol. 13, No. 5, pp. 2544-2557, May 2019. 미소장
6 P. Pragyansmita and S. V. Raghavan, “Survey of Multicast Routing Algorithms and Protocols,” in Proc. of the international conference on computer communication, Vol. 15, No. 3, p. 902. 2002. 미소장
7 Jim Esch, “Software-Defined Networking: A Comprehensive Survey,” Proc. of the IEEE, Vol. 103, No. 1, pp. 10-13, Jan. 2015. 미소장
8 F. K. Hwang and D. S. Richards, “Steiner tree problems,” Networks, Vol. 22, No. 1, pp. 55-89, 1992. 미소장
9 C. Ren, S. Wang, J. Ren and X. Wang, “Traffic Engineering and Manageability for Multicast Traffic in Hybrid SDN,” KSII Transactions on Internet and Information Systems, Vol. 12, No. 6, pp. 2492-2512, June 29, 2018. 미소장
10 X. Chen, J. Wu and T. Wu, “The Top-K QoS-aware Paths Discovery for Source Routing in SDN,”KSII Transactions on Internet and Information Systems, Vol. 12, No. 6, pp. 2534-2553, June 29, 2018. 미소장
11 Z. Zhao, X. Meng, S. Lu and Y. Su, “Different QoS Constraint Virtual SDN Embedding under Multiple Controllers,” KSII Transactions on Internet and Information Systems, Vol. 12, No. 9, pp. 4144-4165, September 29, 2018. 미소장
12 T. Lee, L. Chang, W. Cheng, “Design and Implementation of SDN-based 6LBR with QoS Mechanism over Heterogeneous WSN and Internet,” KSII Transactions on Internet and Information Systems, Vol. 11, No. 2, pp. 1070-1088, February 27, 2017. 미소장
13 H. Takahashi and A. Matsuyama, “An Approximate Solution for the Steiner Problem in Graphs,”Math. Japonica, Vol. 24, No. 6, pp. 573-577, 1980. 미소장
14 A. Z. Zelikovsky, “An 11/6-Approximation Algorithm for the Network Steiner Problem,”Algorithmica, Vol. 9, No. 5, pp. 463-470, 1993. 미소장
15 P. Berman and V. Ramajyer, “Improved Approximations for the Steiner Tree Problem,” Journal of Algorithms, Vol. 17, No. 3, pp. 381-408, 1994. 미소장
16 H. J. Prömel and A. Steger, “RNC-Approximation Algorithms for the Steiner Problem,” in Proc. of Annual Symposium on Theoretical Aspects of Computer Science, Springer, Berlin, Heidelberg, pp. 559-570, 1997. 미소장
17 M. Karpinski and A. Zelikovsky, “New Approximation Algorithms for the Steiner Tree Problems,”Journal of Combinatorial Optimization, Vol. 1, No. 1, pp. 47-65, 1997. 미소장
18 S.-C. Lin, I. F. Akyildiz, P. Wang and M. Luo, “QoS-Aware Adaptive Routing in Multi-Layer Hierarchical Software Defined Networks: A Reinforcement Learning Approach,” in Proc. of IEEE International Conference on Services Computing (SCC), 2016. 미소장
19 T. Hendriks, M. Camelo and S. Latré, “Q2-Routing: A QoS-Aware Q-Routing Algorithm for Wireless Ad Hoc Networks,” in Proc. of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 108-115, 2018. 미소장
20 S. Sendra, A. Rego, J. Lloret, J. M. Jimenez and O. Romero, “Including Artificial Intelligence in a Routing Protocol using Software Defined Networks,” in Proc. of IEEE International Conference on Communications Workshops (ICC Workshops), pp. 670-674, 2017. 미소장
21 H.-J. Heo, N. Kim and B.-D. Lee, “Multicast Tree Generation Technique using Reinforcement Learning in SDN Environments,” IEEE SmartWorld, 2018. 미소장
22 C. Yu, J. Lan, Z. Guo and Y. Hu, “DROM: Optimizing the Routing in Software-Defined Networks with Deep Reinforcement Learning,” IEEE Access, Vol. 6, pp. 64533-64539, 2018. 미소장
23 Z. Yuan, P. Zhou, S. Wang and X. Zhang, “Research on Routing Optimization of SDN Network using Reinforcement Learning Method,” in Proc. of IEEE International Conference on Safety Produce Information (IICSPI), pp. 443-445, 2019. 미소장
24 Y.-R. Chen, A. Rezapour, W. G. Tzeng and S. C. Tsai, “RL-Routing: An SDN Routing Algorithm based on Deep Reinforcement Learning,” IEEE Transactions on Network Science and Engineering, Vol. 7, No. 4, pp. 3185-3199, 2020. 미소장
25 J. X. Wang, Z. Kurth-Nelson, D. Tirumala, H. Soyer, J. Z. Leibo, R. Munos, C. Blundell, D. Kumaran and M. Botvinick, “Learning to Reinforcement Learn,” arXiv preprint arXiv:1611.05763, 2016. 미소장