The ADS-B Protection Method for Next-Generation Air Traffic Management System (English)
- New search for: Lee, Seoung-Hyeon
- New search for: Han, Jong-Wook
- New search for: Lee, Deok-Gyu
- New search for: Park, James J. (Jong Hyuk)
- New search for: Pan, Yi
- New search for: Chao, Han-Chieh
- New search for: Yi, Gangman
- New search for: Lee, Seoung-Hyeon
- New search for: Han, Jong-Wook
- New search for: Lee, Deok-Gyu
In:
Ubiquitous Computing Application and Wireless Sensor
: UCAWSN-14
;
Chapter: 10
;
105-113
;
2015
- Article/Chapter (Book) / Electronic Resource
-
Title:The ADS-B Protection Method for Next-Generation Air Traffic Management System
-
Additional title:Lect. Notes Electrical Eng.
-
Contributors:Park, James J. (Jong Hyuk) ( editor ) / Pan, Yi ( editor ) / Chao, Han-Chieh ( editor ) / Yi, Gangman ( editor ) / Lee, Seoung-Hyeon ( author ) / Han, Jong-Wook ( author ) / Lee, Deok-Gyu ( author )
-
Published in:Ubiquitous Computing Application and Wireless Sensor : UCAWSN-14 ; Chapter: 10 ; 105-113Lecture Notes in Electrical Engineering ; 331 ; 105-113
-
Publisher:
- New search for: Springer Netherlands
-
Place of publication:Dordrecht
-
Publication date:2015-03-05
-
Size:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Voronoi Diagram and Microstructure of WeldmentCho, Jungho / Choi, Min et al. | 2015
- 2
-
High-SNR Approximate Closed-Form Formulas for the Average Error Probability of M-ary Modulation Schemes Over Nakagami-q Fading ChannelsLee, Hoojin et al. | 2015
- 3
-
Performance Evaluation of IEEE 802.15.6 MAC with User Priorities for Medical ApplicationsYang, Li / Li, Changle / Song, Yueyang / Yuan, Xiaoming / Lei, Yanle et al. | 2015
- 4
-
Using Dead Reckoning, GPS and Fingerprinting for Ubiquitous PositioningChiu, Hsiao-Hsien / Tang, Yi-Jiun / Wang, Ming-Shi et al. | 2015
- 5
-
Multi-core Scheduling Scheme for Wireless Sensor Nodes with NVRAM-Based Hybrid MemoryOh, Seokho / Ryu, Yeonseung et al. | 2015
- 6
-
Security Scheme for LTE Initial AttachJang, Uijin / Lim, Hyungmin / Kim, Hyungjoo et al. | 2015
- 7
-
ASiPEC: An Application Specific Instruction-Set Processor for High Performance Entropy CodingChoi, Seung-Hyun / Park, Neungsoo / Song, Yong Ho / Lee, Seong-Won et al. | 2015
- 8
-
An Enhanced Cooperative Spectrum Sensing Scheme Based on New Rule of Combining Evidences in Cognitive RadioKhan, Muhammad Sajjad / Koo, Insoo et al. | 2015
- 9
-
Trajectory Prediction for Using Real Data and Real Meteorological DataKim, Yong Kyun / Han, Jong Wook / Park, Hyodal et al. | 2015
- 10
-
The ADS-B Protection Method for Next-Generation Air Traffic Management SystemLee, Seoung-Hyeon / Han, Jong-Wook / Lee, Deok-Gyu et al. | 2015
- 11
-
Interactive Drawing Based on Hand GestureKim, Tae-Eun et al. | 2015
- 12
-
Nullifying Malicious Users for Cooperative Spectrum Sensing in Cognitive Radio Networks Using Outlier Detection MethodsPrasain, Prakash / Choi, Dong-You et al. | 2015
- 13
-
A Study on Electronic-Money Technology Using Near Field CommunicationJung, Min-Soo et al. | 2015
- 14
-
A Novel Android Memory Management Policy Focused on Periodic Habits of a UserKim, Jang Hyun / Sung, Junghwan / Hwang, Sang Yun / Suh, Hyo-Joong et al. | 2015
- 15
-
Care Record Summary Validation Tool with Social Network ServiceSin, Jae Woo / Song, Joon Hyun / Lee, Do Yun / Kim, Il Kon et al. | 2015
- 16
-
Performance Study of an Adaptive Trickle Scheme for Wireless Sensor NetworksLin, Yen-Wen / Wang, Po-Hsiang et al. | 2015
- 17
-
A New Distributed Grid Scheme Utilizing Node-based Preprocessing Technique for Supporting k-NN Queries in Location-based ServicesLee, Hyunjo / Yoon, Min / Chang, Jae-Woo et al. | 2015
- 18
-
A Centroid-GPS Model to Improving Positioning Accuracy for a Sensitive Location-Based SystemIslam, Md. Rashedul / Kim, Jong-Myon et al. | 2015
- 19
-
Intelligent Evaluation Models Based on Different Routing Protocols in Wireless Sensor NetworksCao, Ning / Higgs, Russell / O’Hare, Gregory M. P. et al. | 2015
- 20
-
Implementation of Personalized Wellness ServiceKim, Marie / Park, Namje / Bang, Hyo-Chan et al. | 2015
- 21
-
SOM Clustering Method Using User’s Features to Classify Profitable Customer for Recommender Service in u-CommerceCho, Young Sung / Moon, Song Chul / Ryu, Keun Ho et al. | 2015
- 22
-
A Performance Improvement Scheme for Discovery ServiceLiu, Peng / Kong, Ning / Tian, Ye / Lee, Xiaodong / Yan, Baoping et al. | 2015
- 23
-
A Cross Cloud Authorization Mechanism Using NFC and RBAC TechnologyChan, Jun-Fu / Yang, Ta-Chih / Liaw, Horng Twu et al. | 2015
- 24
-
A Study on High Security Authentication Mechanism for 3G/WLAN NetworksWu, Wei-Chen / Liaw, Horng-Twu et al. | 2015
- 25
-
A Simple Authentication Scheme and Access Control Protocol for VANETsWu, Wei-Chen / Chen, Yi-Ming et al. | 2015
- 26
-
Decision Tree Approach to Predict Lung Cancer the Data Mining TechnologyKao, Jui-Hung / Chen, Hui-I / Lai, Feipei / Hsu, Li-Min / Liaw, Horng-Twu et al. | 2015
- 27
-
Study of Customer Value and Supplier Dependence with the RFM ModelKao, Jui-Hung / Lai, Feipei / Liaw, Horng-Twu / Hsieh, Pei-hua et al. | 2015
- 28
-
Feature Selection for Support Vector Machines Base on Modified Artificial Fish Swarm AlgorithmLin, Kuan-Cheng / Chen, Sih-Yang / Hung, Jason C. et al. | 2015
- 29
-
A New Remote Desktop Approach with Mobile Devices: Design and ImplementationHuang, Teng-Yao / Wang, Hai-Hui / Peng, Chun-Lung / Huang, Hsin-Mao et al. | 2015
- 30
-
Implementation of Low Power LED Display Controller Using Adiabatic OperationLee, Kyung-Ryang / Yeo, Sung-Dae / Cho, Seung-il / Kim, Seong-Kweon et al. | 2015
- 31
-
Hand Gesture Recognition Using 8-Directional Vector Chains in Quantization SpaceLee, Seongjo / Sim, Sohyun / Um, Kyhyun / Jeong, Young-Sik / Cho, Kyungeun et al. | 2015
- 32
-
Forensic Artifacts in Network Surveillance SystemsLim, Kyung-Soo / Kim, Jeong-Nye / Lee, Deok-Gyu et al. | 2015
- 33
-
Routing Protocol for Hierarchical Clustering Wireless Sensor NetworksOmar, Alghanmi Ali / Yu, ChunGun / Kim, ChongGun et al. | 2015
- 34
-
The Design of a New Virtualization-Based Server Cluster System Targeting for Ubiquitous IT SystemsLim, Jungmin / Song, Sihoo / Lee, Soojin / Doo, Seokjoo / Yoon, Hyunsoo et al. | 2015
- 35
-
A Conceptualisation of a Strategy to Shiftwork Scheduling Optimisation in an Emergency DepartmentAzhar, Muhaimin Noor / Bustam, Aida / Ahmad, Rashidi / Manikam, Rishya / Halim, Shamimi A. et al. | 2015
- 36
-
The Evaluation of Pen Gestures in a Digital Painting EnvironmentKo, Chih-Hsiang et al. | 2015
- 37
-
Disease Pattern Analysis Using Electronic Discharge Summary of EMR in HL7 for Computerized Treatment Plan of Cancer Patients in KoreaCho, Young Sung / Moon, Song Chul / Ryu, Kwang Sun / Ryu, Keun Ho et al. | 2015
- 38
-
Research on the Network Assisted Teaching System of College Physics ExperimentsDu, Yanling / Bu, Hongxia / Fang, Xiaonan et al. | 2015
- 39
-
Scheduling Model and Algorithm of Vertical ReplenishmentLiu, Shufen / Li, Bin et al. | 2015
- 40
-
Assisted Lung Ventilation Control System as a Human Centered Application: The Project and Its Educational Impact on the Course of Embedded SystemsCabezas, Diego / Vassiliev, Alexei / Pyshkin, Evgeny et al. | 2015
- 41
-
Research of SSO Based on the Fingerprint Key in Cloud ComputingZhang, Yong-Sheng / Zou, Jia-Shun / Gao, Yan et al. | 2015
- 42
-
Study of Local Monitoring System Based on SMS Under the Cloud EnvironmentZhang, Yong-sheng / Zou, Jia-shun / Gao, Yan et al. | 2015
- 43
-
Effects of Meal Size on the SDA of the TaimenYang, Guiqiang / Wang, Zhanquan / Yuan, Ding / Xu, Shaogang / Ma, Junfeng et al. | 2015
- 44
-
Management Information SystemsOgiela, Lidia / Ogiela, Marek R. et al. | 2015
- 45
-
Security in Management of Distributed InformationOgiela, Marek R. / Ogiela, Lidia / Ogiela, Urszula et al. | 2015
- 46
-
Research of ABAC Mechanism Based on the Improved Encryption Algorithm Under Cloud EnvironmentZhang, Long-xiang / Zou, Jia-shun et al. | 2015
- 47
-
A Novel Design of Education Video Personalized Recommendation System Based on Collaborative Filtering Recommendation TechnologyJun, Xiao / Min, Wang et al. | 2015
- 48
-
The Design of a Medical Rules Synchronization SystemChang, Yi-Hsing / Chien, Leng-Kang Chang / Fang, Rong-Jyue et al. | 2015
- 49
-
Associative Recommendation of Learning Contents Aided by Eye-Tracking in a Social Media Enhanced EnvironmentPiao, Guangyu / Zhou, Xiaokang / Jin, Qun et al. | 2015
- 50
-
A Novel Strategy for Colonies Recognition and Classification in Super-Resolution ImagesZhang, Qi / Li, Xueqing / Dong, Xianlun et al. | 2015
- 51
-
Study on Intelligent Course Scheduling SystemLi, Teng / Li, Xuqing et al. | 2015
- 52
-
The Study and Research on Chinese Sports Network Marketing StrategyYong, Jiang et al. | 2015
- 53
-
Interactive Visualization of Enrollment Data Using Parallel CoordinatesXinglei, Wei / Xueqing, Li et al. | 2015
- 54
-
The Effect of Peer’s Progress on Learning Achievement in e-Learning: A Social Facilitation PerspectiveChiu, Po-Sheng / Wu, Ting-Ting / Huang, Yueh-Ming / Ho, Hong-Leok et al. | 2015
- 55
-
An Integration Framework for Clinical Decision Support ApplicationsZheng, Xiang / Zhang, Yin-sheng / Huang, Zhen-zhen / Jia, Zheng / Duan, Hui-long / Li, Hao-min et al. | 2015
- 56
-
Method of Generating Intelligent Group Animation by Fusing Motion Capture DataSong, Jie / Zheng, Xiang-wei / Zhang, Gui-juan et al. | 2015
- 57
-
Histogram-Based Masking Technique for Retinal Fundus ImagesChong, Rachel M. / Suniel, Jeziel C. et al. | 2015
- 58
-
Effect of Electronic Scoring System for Scenario Group Tutorial Implementation for Supporting Medical Student StudiesKhumrin, Piyapong / Supajatura, Volaluck et al. | 2015
- 59
-
Perceived Risk of Anti-corruption e-Learning, Email Phishing Literacy, and AnomiaAbraham, Juneman / Sharron et al. | 2015
- 60
-
A Model of Business Intelligence Systems for School: A Case Study (Perception Applications and Benefits)Chandra, Adhi Nugroho / Kurniawan, Yohannes et al. | 2015
- 61
-
A Surveillance Platform of Antimicrobial Use in Hospital Based on Defined Daily DoseLiang, Guowei / Zhang, Yinsheng / Li, Haomin / Chen, Weihong / Duan, Huilong et al. | 2015
- 62
-
Identification of Adverse Drug Events in Chinese Clinical Narrative TextGe, Caixia / Zhang, Yinsheng / Duan, Huilong / Li, Haomin et al. | 2015
- 63
-
Control System and Control Method for Automatic Adjustment of Outdoor LED Display BrightnessYang, Feng / Qin, Xu-fei / Zhai, Lin-bo et al. | 2015
- 64
-
A Novel Quantitative Evaluation Metric of 3D Mesh SegmentationSun, Xiao-peng / Wang, Lu / Wang, Xingyue / Zhao, Xiaona et al. | 2015
- 65
-
A Survey Analysis of Chinese Virtues Questionnaire in Medical PostgraduatesYu, Miao / Wang, Wei / Hu, Zhilei / Ji, Huibin / Xing, Wei et al. | 2015
- 66
-
Practice and Exploration of All-in-English Teaching of Compiler PrinciplesLiu, Xinxin / Xu, Hongyun et al. | 2015
- 67
-
An Application of Ant Colony Optimization Clustering Approach for Primary Headache DiagnosisYanping, Wu / Huilong, Duan et al. | 2015
- 68
-
Comparisons of Iterative Closest Point AlgorithmsWang, Lu / Sun, Xiaopeng et al. | 2015
- 69
-
Study on the Effectiveness of Distance Education in the Judicial Examination TrainingZhang, Rongxia / Wang, Weisheng et al. | 2015
- 70
-
Greedy Strategy Based Self-adaption Ant Colony Algorithm for 0/1 Knapsack ProblemDu, De-peng / Zu, Yue-ran et al. | 2015
- 71
-
Non-Chinese Students Speak: Sectional and Clinical Anatomy Learning in a Chinese Medical SchoolHe, Xu / Liu, Fu-Xiang / Pan, Aihua et al. | 2015
- 72
-
Dynamic and Efficient Search System for Digital Encyclopedia of Intangible Cultural Heritage: The Case Study of ICHPEDIALee, Jung Song / Park, Soon Cheol / Hahm, Han Heeh et al. | 2015
- 73
-
On the Performance of Quasi-orthogonal Space Time Block Coded Massive MIMO with up to 16 AntennasWinn, Khin Zar Chi / Han, Phyu Phyu / Bandara, Kasun / Chung, Yeon-Ho et al. | 2015
- 74
-
Encrypted Data Group Authentication for Outsourced DatabasesJang, Miyoung / Jo, Ara / Chang, Jae-Woo et al. | 2015
- 75
-
De-Word Classification Algorithm Based on the Electric Power of Large Data Library RetrievalGuo, Xiaoli / Sun, Huiyu / Wang, Ling / Qu, Zhaoyang / Ding, Wei et al. | 2015