default search action
The Journal of Information Processing Systems, Volume 14
Volume 14, Number 1, 2018
- Jong Hyuk Park:
Practical Approaches Based on Deep Learning and Social Computing. 1-5 - Zhi Zhang, Chengyou Wang, Xiao Zhou:
A Survey on Passive Image Copy-Move Forgery Detection. 6-31 - Kuldeep Gurjar, Yang-Sae Moon:
A Comparative Analysis of Music Similarity Measures in Music Information Retrieval Systems. 32-55 - Fan-Hsun Tseng, Hua-Pei Chiang, Han-Chieh Chao:
Black Hole along with Other Attacks in MANETs: A Survey. 56-78 - Dwijen Rudrapal, Amitava Das, Baby Bhattacharya:
A Survey on Automatic Twitter Event Summarization. 79-100 - Giang-Truong Nguyen, Kyungbaek Kim:
A Survey about Consensus Algorithms Used in Blockchain. 101-128 - Tunio Muhammad Zahid, Haiyong Luo, Cong Wang, Fang Zhao:
Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning. 129-139 - Kiejin Park, Limei Peng:
A Development of LDA Topic Association Systems Based on Spark-Hadoop Framework. 140-149 - Yeongtaek Song, Incheol Kim:
DeepAct: A Deep Neural Network Model for Activity Detection in Untrimmed Videos. 150-161 - Wei Song, Ning Feng, Yifei Tian, Simon Fong, Kyungeun Cho:
A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform. 162-175 - Hui Zeng, Yanrong Liu, Siqi Li, JianYong Che, Xiuqing Wang:
Convolutional Neural Network Based Multi-feature Fusion for Non-rigid 3D Model Retrieval. 176-190 - Chen Li, Shuai Zhao, Ke Xiao, Yanjie Wang:
Face Recognition Based on the Combination of Enhanced Local Texture Feature and DBN under Complex Illumination Conditions. 191-204 - Sang-Geol Lee, Yunsick Sung, Yeon-Gyu Kim, Eui-Young Cha:
Variations of AlexNet and GoogLeNet to Improve Korean Character Recognition Performance. 205-217 - Hao Chao, Bao-Yun Lu, Yongli Liu, Hui-Lai Zhi:
Vocal Effort Detection Based on Spectral Information Entropy Feature and Model Fusion. 218-227 - Nambong Ha, Namgi Kim:
Efficient Flow Table Management Scheme in SDN-Based Cloud Computing Networks. 228-238 - Ruirui Zhang, Xin Xiao:
Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment. 239-251 - Shafaq Salam, Jianqiu Zeng, Zulfiqar Hussain Pathan, Zahid Latif, Aliya Shaheen:
Impediments to the Integration of ICT in Public Schools of Contemporary Societies: A Review of Literature. 252-269 - Kyungmo Koo, Junglok Yu, Sangwan Kim, Min Choi, Kwangho Cha:
Implementation of Multipurpose PCI Express Adapter Cards with On-Board Optical Module. 270-279
Volume 14, Number 2, 2018
- Jong Hyuk Park:
Enhanced Integrated Algorithm & Software Architecture. 281-285 - Alfredo J. Perez, Sherali Zeadally, Nafaâ Jabeur:
Security and Privacy in Ubiquitous Sensor Networks. 286-308 - Hyong-Soon Kim, Eunyoung Lee:
Verifying Code toward Trustworthy Software. 309-321 - Asma Zubedi, Jianqiu Zeng, Qasim Ali Arain, Imran Memon, Sehrish Khan, Muhammad Saad Khan, Ying Zhang:
Sustaining Low-Carbon Emission Development: An Energy Efficient Transportation Plan for CPEC. 322-345 - Humaira Arshad, Aman Bin Jantan, Oludare Isaac Abiodun:
Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence. 346-376 - Jiao-Hong Qiang, Ding-Wan Ning, Tian-Jun Feng, Li-Wei Ping:
Dynamic Cloud Resource Reservation Model Based on Trust. 377-398 - Jeong-Joon Kim:
Routing Techniques for Data Aggregation in Sensor Networks. 396-417 - Fatiha Barigou:
Impact of Instance Selection on kNN-Based Text Categorization. 418-434 - Meryam El Mouhtadi, Sanaa El Fkihi, Driss Aboutajdine:
Fingerprint Identification Based on Hierarchical Triangulation. 435-447 - Zhanxiang Ye, Min Zhu, Jin Wang:
On Modification and Application of the Artificial Bee Colony Algorithm. 448-454 - Susmit Bagchi:
Formulating Analytical Solution of Network ODE Systems Based on Input Excitations. 455-468 - Salah Bougueroua, Bachir Boucheham:
GLIBP: Gradual Locality Integration of Binary Patterns for Scene Images Retrieval. 469-486 - Xiaowei Hai, Chanchan Zhao:
Optimization of Train Working Plan based on Multiobjective Bi-level Programming Model. 487-498 - Yeon-Woo Jang, Moon-Hwan Kang, Jae-Woo Chang:
Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment. 499-509 - Chengyou Wang, Heng Zhang, Xiao Zhou:
Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery. 510-522 - Sung-Hoon Lee, Jong-Hyuk Roh, Soohyung Kim, Seung-Hun Jin:
Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment. 523-538 - Lin Lin:
An Effective Denoising Method for Images Contaminated with Mixed Noise Based on Adaptive Median Filtering and Wavelet Threshold Denoising. 539-551 - Shunfeng Wang, Jiacen Xie, Yuhui Zheng, Jin Wang, Tao Jiang:
A Method of Coupling Expected Patch Log Likelihood and Guided Filtering for Image Denoising. 552-562
Volume 14, Number 3, 2018
- Young-Sik Jeong, Jong Hyuk Park:
Novel Solutions and Approaches to Effective Data Processing. 563-568 - Youssef Fahim, Hamza Rahhali, Mohamed Hanine, El Habib Benlahmar, El Houssine Labriji, Mostafa Hanoune, Ahmed Eddaoui:
Load Balancing in Cloud Computing Using Meta-Heuristic Algorithm. 569-589 - Jianwei Zhang, Tao Jiang, Yuhui Zheng, Jin Wang, Jiacen Xie:
A New Operator Extracting Image Patch Based on EPLL. 590-599 - Xiaoli Wang, Shilin Wang, Baochen Jiang:
A Method of Image Identification in Instrumentation. 600-606 - Jin-Wook Jang:
Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model. 607-620 - Tunio Muhammad Zahid, Haiyong Luo, Cong Wang, Fang Zhao, Abdul Rehman Gilal, Wenhua Shao:
Task Assignment Model for Crowdsourcing Software Development: TAM. 621-630 - Jeong-Joon Kim:
Development of Flash Memory Page Management Techniques. 631-644 - Jin Hua, Zahid Latif, Tiyan Shen, Zulfiqar Hussain Pathan, Muhammad Zahid Tunio, Shafaq Salam, Ximei Liu:
Shift in the Regional Balance of Power From Europe to Asia: A Case Study of ICT Industry. 645-654 - Bens Pardamean, James W. Baurley, Anzaludin S. Perbangsa, Dwinita Utami, Habib Rijzaani, Dani Satyawan:
Information Technology Infrastructure for Agriculture Genotyping Studies. 655-665 - Chengyou Wang, Heng Zhang, Xiao Zhou:
LBP and DWT Based Fragile Watermarking for Image Authentication. 666-679 - Jung Hyun Ryu, Nam Yong Kim, Byoung Wook Kwon, Sang Ki Suk, Jin Ho Park, Jong Hyuk Park:
Analysis of a Third-Party Application for Mobile Forensic Investigation. 680-693 - Chanchan Zhao, Feng Liu, Xiaowei Hai:
A New Approach for Hierarchical Dividing to Passenger Nodes in Passenger Dedicated Line. 694-708 - Salim Miloudi, Sid Ahmed Rahal, Salim Khiat:
Contribution to Improve Database Classification Algorithms for Multi-Database Mining. 709-726 - Shi Dong, Xingang Zhang, Ya Li:
Microblog Sentiment Analysis Method Based on Spectral Clustering. 727-739 - Sarang Na, Taeeun Kim, Hwankuk Kim:
Service Identification of Internet-Connected Devices Based on Common Platform Enumeration. 740-750 - Ruchika Malhotra, Anjali Sharma:
Analyzing Machine Learning Techniques for Fault Prediction Using Web Applications. 751-770 - Dinesh Pandey, BeomHun Kim, Hui-Seon Gang, Goo-Rak Kwon, Jae-Young Pyun:
Maximizing Network Utilization in IEEE 802.21 Assisted Vertical Handover over Wireless Heterogeneous Networks. 771-789 - Chunfang Liu:
New Similarity Measures of Simplified Neutrosophic Sets and Their Applications. 790-800
Volume 14, Number 4, 2018
- Young-Sik Jeong, Jong Hyuk Park:
Algorithms, Processes, and Frameworks for User-oriented Applications. 801-806 - Thyamagondlu Renukamurthy Jayanthi Kumari, Haradagere Siddaramaiah Jayanna:
Speaker Verification with the Constraint of Limited Data. 807-823 - Alim Murat, Azharjan Yusup, Zulkar Iskandar, Azragul Yusup, Yusup Abaydulla:
Applying Lexical Semantics to Automatic Extraction of Temporal Expressions in Uyghur. 824-836 - Ubaidullah Rajput, Fizza Abbas, Heekuck Oh:
A Solution towards Eliminating Transaction Malleability in Bitcoin. 837-850 - Imen Boulnemour, Bachir Boucheham:
QP-DTW: Upgrading Dynamic Time Warping to Handle Quasi Periodic Time Series Alignment. 851-876 - MinhPhuoc Hong, Kyoungsu Oh:
Motion-Blurred Shadows Utilizing a Depth-Time Ranges Shadow Map. 877-891 - Jun Huang, Xiuhui Wang, Jun Wang:
Gait Recognition Algorithm Based on Feature Fusion of GEI Dynamic Region and Gabor Wavelets. 892-903 - Pum-Mo Ryu:
Predicting the Unemployment Rate Using Social Media Analysis. 904-915 - Mingyue Zhang, Jin Shi, Jin Wang, Chang Liu:
Analysis of Academic Evaluation Indicators Based on Citation Quality. 916-925 - Boseon Yu, Wonik Choi, Taikjin Lee, Hyunduk Kim:
Clustering Algorithm Considering Sensor Node Distribution in Wireless Sensor Networks. 926-940 - Feng Liu, Shuangbao Ma:
An Improved Spin Echo Train De-noising Algorithm in NMRL. 941-947 - Muhammad Fiqri Muthohar, I Gde Dharma Nugraha, Deokjai Choi:
Significant Motion-Based Adaptive Sampling Module for Mobile Sensing Framework. 948-960 - Aniket Bhatnagar, Varun Gambhir, Manish Kumar Thakur:
A New Perspective to Stable Marriage Problem in Profit Maximization of Matrimonial Websites. 961-979 - Yunsick Sung, Ryong Choi, Young-Sik Jeong:
Arm Orientation Estimation Method with Multiple Devices for NUI/NUX. 980-988 - Kathiravan Srinivasan, Chuan-Yu Chang, Chao-Hsi Huang, Min-Hao Chang, Anant Sharma, Avinash Ankur:
An Efficient Implementation of Mobile Raspberry Pi Hadoop Clusters for Robust and Augmented Computing Performance. 989-1009 - Sheik Mohammad Mostakim Fattah, Ilyoung Chong:
Restful Web Services Composition Using Semantic Ontology for Elderly Living Assistance Services. 1010-1032 - Maman Abdurohman, Aji Gautama Putrada, Sidik Prabowo, Catur Wirawan Wijiutomo, Asma Elmangoush:
Integrated Lighting Enabler System Using M2M Platforms for Enhancing Energy Efficiency. 1033-1048 - Nam-Ho Keum, Taek Lee, Jung-Been Lee, Hoh Peter In:
Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device. 1049-1061
Volume 14, Number 5, 2018
- Young-Sik Jeong, Jong Hyuk Park:
Advanced Data Processing, Optimization & Software Engineering. 1063-1067 - QianQian Chu, Yuanfeng Jin:
The Three-Dimensional Partial Differential Equation with Constant Coefficients of Time-Delay of Alternating Direction Implicit Format. 1068-1074 - Abdelhadi Lotfi, Abdelkader Benyettou:
Cross-Validation Probabilistic Neural Network Based Face Identification. 1075-1086 - Hyunjo Lee, Youngho Song, Jae-Woo Chang:
GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data. 1087-1101 - Shaowei Chu, Keying Zhu:
Designing a Vibrotactile Reading System for Mobile Phones. 1102-1113 - Sumana Kundu, Goutam Sarker:
A Multi-Level Integrator with Programming Based Boosting for Person Authentication Using Different Biometrics. 1114-1135 - Qiang Tong, Jianping Qi, Yanling Wang, Likai Liang, Xiangxing Meng, Qiang Zhang:
Power Cable Ampacity and Influential Factors Analysis under Operation. 1136-1149 - Jung-A. Lee, Jong-Hak Lee:
A Physical Storage Design Method for Access Structures of Image Information Systems. 1150-1166 - Husna Aydadenta, Adiwijaya:
A Clustering Approach for Feature Selection in Microarray Data Classification Using Random Forest. 1167-1175 - Muhammad Aamir, Yi-Fei Pu, Ziaur Rahman, Waheed Ahmed Abro, Hamad Naeem, Farhan Ullah, Aymen Mudheher Badr:
A Hybrid Proposed Framework for Object Detection and Classification. 1176-1194 - Chantana Chantrapornchai, Netnapa Bunlaw, Chidchanok Choksuchat:
Semantic Image Search: Case Study for Western Region Tourism in Thailand. 1195-1214 - Chunfang Liu:
Multi-Attribute Decision-Making Method Applying A Novel Correlation Coefficient of Interval-Valued Neutrosophic Hesitant Fuzzy Sets. 1215-1224 - Hui-Su Gong, Sunghyun Weon, Jun-Ho Huh:
A Study on the Design of Humane Animal Care System and Java Implementation. 1225-1236 - Zhongda Tian, Chao Zhang:
An Improved Harmony Search Algorithm and Its Application in Function Optimization. 1237-1253 - Khuyagbaatar Batsuren, Erdenebileg Batbaatar, Tsendsuren Munkhdalai, Meijing Li, Oyun-Erdene Namsrai, Keun Ho Ryu:
A Dependency Graph-Based Keyphrase Extraction Method Using Anti-patterns. 1254-1271 - Jun Huang, Haibing Yin:
An Embedded Multifunctional Media System for Mobile Devices in Terrestrial DTV Relaying. 1272-1285 - Hyesun Lee, Sang Gi Hong, Kang Bok Lee:
An Internet of Things System Architecture for Aiding Firefighters in the Scene of Disaster. 1286-1292 - Kaiqun Hu, Xin Feng:
Research on the Multi-Focus Image Fusion Method Based on the Lifting Stationary Wavelet Transform. 1293-1300
Volume 14, Number 6, 2018
- Young-Sik Jeong, Jong Hyuk Park:
Artificial Intelligence for the Fourth Industrial Revolution. 1301-1306 - Hua Zhang, Lijia Wang:
Object tracking with the multi-templates regression model based MS algorithm. 1307-1317 - Sujin Lee, Incheol Kim:
Video Captioning with Visual and Semantic Features. 1318-1330 - Zhonghua Wang, Faliang Huang:
Triqubit-state Measurement-based Image Edge Detection Algorithm. 1331-1346 - Santhosha Rao, Kumara Shama, Pavan Kumar:
Energy efficient Cross Layer Multipath Routing for Image Delivery in Wireless Sensor Networks. 1347-1360 - Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park, Jong Hyuk Park:
A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions. 1361-1384 - Yanling Wang, Xing Zhou, Likai Liang, Mingjun Zhang, Qiang Zhang, Zhiqiang Niu:
Short-Term Wind Speed Forecast Based on Least Squares Support Vector Machine. 1385-1397 - Chan Ho Yong, Ga-Won Lee, Eui-Nam Huh:
Proposal of Container-Based HPC Structures and Performance Analysis. 1398-1404 - Xin Feng:
Infrared and Visible Image Fusion Based on NSCT and Deep Learning. 1405-1419 - Tae-Woo Kim, Sun-Yi Park, Jeong-Mo Yeo:
A Study on Business-Based Screen Design Techniques for Designing Efficient Applications. 1420-1430 - Vera Suryani, Selo Sulistyo, Widyawan:
Two-Phase Security Protection for the Internet of Things Object. 1431-1437 - Jee-Uk Heu:
Semantic-Based K-Means Clustering for Microblogs Exploiting Folksonomy. 1438-1444 - Wei Song, Shuanghui Zou, Yifei Tian, Su Sun, Simon Fong, Kyungeun Cho, Lvyang Qiu:
A CPU-GPU Hybrid System of Environment Perception and 3D Terrain Reconstruction for Unmanned Ground Vehicle. 1445-1456 - Jeonghoon Kwak, Yunsick Sung:
Path Generation Method of UAV Autopilots using Max-Min Algorithm. 1457-1463 - Jianming Zhang, Xiaokang Jin, Yukai Liu, Arun Kumar Sangaiah, Jin Wang:
Small Sample Face Recognition Algorithm based on Novel Siamese Network. 1464-1479 - JongBeom Lim, HeonChang Yu, Joon-Min Gil:
An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments. 1480-1493 - Chen Li, Mengti Liang, Wei Song, Ke Xiao:
A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information. 1494-1507 - Kerang Cao, Hangyung Kim, Chulhyun Hwang, Hoekyung Jung:
CNN-LSTM Coupled Model for Prediction of Waterworks Operation Data. 1508-1520
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.