default search action
Journal of Information Science and Engineering, Volume 34
Volume 34, Number 1, January 2018
- Balgeun Yoo, Seongjin Lee, Youjip Won:
Analyzing the Storage Defects From the Perspective of Synthetic Fault Injection. 1-20
- Chung-Chih Tsai, Chia-Wen Chang, Chin-Wang Tao:
Vision-Based Obstacle Detection for Mobile Robot in Outdoor Environment. 21-34 - Milad Riyahi, Marjan Kuchaki Rafsanjani, Rouzbeh Motevalli, Ahmad Hashemi:
A New Genetic Algorithm to Optimize Mobile Data Offloading in Smart Grids. 35-49 - Pei-Yin Chen, Shih-Hsiang Lin, Po-Chun Chen:
Hardware Implementation of an Image Interpolation Method with Controllable Sharpness. 51-64 - Maryam Azari Takami, Reza Sheikh, Shib Sankar Sana:
A Hesitant Fuzzy Set Theory Based Approach for Project Portfolio Selection with Interactions under Uncertainty. 65-79 - Shu-Chien Huang:
High-Quality Codebook Generation of Vector Quantization Using the HT-ABC-LBG Algorithm. 81-102 - Cheng-Hsuan Li, Pei-Jyun Hsien, Li-Hui Lin:
A Fast and Automatic Kernel-based Classification Scheme: GDA+SVM or KNWFE+SVM. 103-121
- Shin-Yan Chiou, Jiun-Ming Chen:
Design and Implementation of a Multiple-Choice E-voting Scheme on Mobile System using Novel t -out-of- n Oblivious Signature. 135-154 - Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks. 155-170 - Bao-Yuan Kang, Mu Wang, Dong-Ya Jing:
An Off-Line Payment Scheme for Digital Content via Subliminal Channel. 171-192 - Shi-Chun Tsai, Ming-Chuan Yang:
Representing Symmetric Boolean Functions with Polynomial over Composite Moduli. 193-203
- Shu-Ching Wang, Shun-Sheng Wang, Kuo-Qin Yan:
Reaching Optimal Interactive Consistency in a Fallible Cloud Computing Environment. 205-223 - Saad Allawi Nsaif, Nguyen Xuan Tien, Jong Myung Rhee:
A Novel Algorithm for Loop Prevention and Fast Recovery (LPFR) in Ethernet Rings. 225-242
- Jaejun Yoo, Ki-Hoon Lee, Young-Ho Jeon:
Migration from RDBMS to NoSQL Using Column-level Denormalization and Atomic Aggregates. 243-259 - Depeng Dang, Xue Jiang, Nan Wang, Yingting Yao, Wen-Bin Yao:
Concurrency Control of Real-Time Web Service Transactions. 261-287 - Chien-Liang Liu, Wen-Hoar Hsaio, Tao-Hsing Chang:
Locality Sensitive K-means Clustering. 289-305
Volume 34, Number 2, March
- Saehwa Kim:
Efficient Optimal Priority Assignment for Fixed Priority Preemption Threshold Scheduling. 319-335 - Cheng-Juei Yu, Yi-Hsin Wu, Sheng-De Wang:
An Approach to the Design of Specific Hardware Circuits from C Programs. 337-351
- Divya Kumar, K. K. Mishra:
Multi-Objective Optimization using Co-variance Guided Artificial Bee Colony. 353-369
- Chien-Ming Chen, Weicheng Fang, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, King-Hang Wang:
Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol. 371-390 - Jen-Chun Chang, Hsin-Lung Wu:
The Log-Rank Conjecture for Read- k XOR Functions. 391-399 - Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:
Phrase Search for Encrypted Cloud Storage. 401-417
- Baozhou Yu, Qi Zhu:
Energy Efficiency Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks. 419-433 - E. Murugavalli, S. J. Thiruvengadam:
A BER Analysis of mmWave Bidirectional Relay Network. 435-450 - Pei-Hsuan Tsai:
Building Coordinate System of Sensor Nodes Using Self-configurable Grid-based Approach. 451-468
- Mohsen Saadatpour, Sayyed Kamyar Izadi, Mohammad Nasirifar:
Priority-based Clustering in Weighted Graph Streams. 469-488 - Xiaoqing Lin, Zong-Min Ma, Li Yan:
RDF Keyword Search Using a Type-based Summary. 489-504 - Mohammadhossein Barkhordari, Mahdi Niamanesh:
Arvand: A Method to Integrate Multidimensional Data Sources Into Big Data Analytic Structures. 505-518 - Guan-Feng Li, Zong-Min Ma:
An Efficient Matching Algorithm for Fuzzy RDF Graph. 519-534 - Jing-Tao Sun, Qiu-Yu Zhang:
A Game Theory based Feature Word Selection Model for Chinese Texts. 535-550 - Chang-Sup Park:
Reducing Redundancy in Keyword Query Processing on Graph Databases. 551-574
Volume 34, Number 3, May
- Hsiu-Yu Lin, Yu-Ling Hsueh, Wen-Nung Lie:
Convolutional Recurrent Neural Networks for Posture Analysis in Fall Detection. 577-591 - Shin-Jie Lee, Wu-Chen Su, Chi-En Huang, Jie-Lin You:
Methods for Categorizing and Recommending API Usage Patterns Based on Degree Centralities and Pattern Distances. 593-610 - Shang-Pin Ma, Peng-Zhong Chen, Yang-Sheng Ma, Jheng-Shiun Jiang:
Building Mobile Apps by Ordinary Users: A Service-Brick-Based Approach. 611-629 - Shin-Jie Lee, You-Chen Lin, Kun-Hui Lin, Jie-Lin You:
A System for Composing and Delivering Heterogeneous Web Testing Software as a Composite Web Testing Service. 631-648 - Kuo-Hsun Hsu, Chang-Yen Tsai:
From Early Aspect to Aspect-Oriented Programming: A State-Based Join Point Model Approach. 649-670
- J. Praveen Kumar, S. Domnic:
Image Based Plant Phenotyping using Graph Based Method and Circular Hough Transform. 671-686 - S. Deivasigamani, Chinnaiyan Senthilpari, Wong Hin Yong:
Computer Aided Automatic Detection and Classification of EEG Signals for Screening Epilepsy Disorder. 687-700 - Hsueh-Yi Lin, Cheng-Jian Lin, Mei-Ling Huang:
Using a Hybrid of Morphological Operation and Neuro-fuzzy Filter for Transmission Map Refinement and Halation Elimination in Weather Degraded Images. 701-720
- Yunqi Dou, Jiang Weng, Chuangui Ma, Fushan Wei:
Revisiting the Expansion Length of Triple-base Number System for Elliptic Curve Scalar Multiplication. 721-732 - Jian Zou, Le Dong:
Cryptanalysis of the Round-Reduced Kupyna. 733-748 - Benhui Zhang, Yuan-Sheng Tang:
On the Construction and Analysis of Verifiable Multi-secret Sharing Based on Non-homogeneous Linear Recursion. 749-763
- Meng-Shu Chiang, Chung-Ming Huang, Duy-Tuan Dao, Binh-Chau Pham:
The Backward Fast Media Independent Handover for Proxy Mobile IPv6 Control Scheme (BFMIH-PMIPV6) over Heterogeneous Wireless Mobile Networks. 765-780
- Mingqi Lv, Tieming Chen, Yifan Li, Yinglong Li:
Urban Traffic Congestion Index Estimation With Open Ubiquitous Data. 781-799
Volume 34, Number 4, July
- Liang Zhu, Haiyong Xie, Yifeng Liu, Jianfeng Guan, Yang Liu, Yongping Xiong:
PTPP: Preference-Aware Trajectory Privacy-Preserving over Location-Based Social Networks. 803-820 - T. R. Reshmi, Krishnan Murugan:
Enhanced Passive Duplicate Address Detection (EPDAD) for Autoconfiguration in MANETs. 821-833 - Anuradha Pughat, Vidushi Sharma:
Integrated Fuzzy Control to Power Management on Event-based Sensor Node. 835-849 - Shanidul Hoque, Wasim Arif, Barati Sen, Srimanta Baishya:
Analysis of Spectrum Handoff under General Residual Time Distributions of Spectrum Holes in Cognitive Radio Networks. 851-867 - Yanping Li, Laifeng Lu, Kai Zhang:
Novel V2V Cross-domain Communications in Heterogeneous VANETs. 869-884 - Ashim Jyoti Gogoi, Naushad Manzoor Laskar, Ch. Lison Singh, Krishna Lal Baishnab, Koushik Guha:
Throughput Optimization in Multi-user Cognitive Radio Network using Swarm Intelligence Techniques. 885-902 - S. R. Barkunan, V. Bhanumathi:
An Efficient Deployment of Sensor Nodes in Wireless Sensor Networks for Agricultural Field. 903-918 - Shijie Jia, Ruiling Zhang, Tian-Yin Wang, Lujie Zhong, Mingchuan Zhang:
A Novel Mobility Similarity Measurement Method to Increase the Performance of Community-based Video Delivery in VANETs. 919-942 - Teng Li, Jianfeng Ma, Cong Sun, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. 943-960 - Shuangyuan Qiao, Yong Zeng, Lingjie Zhou, Hi-Hong Liu, Jianfeng Ma:
Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones. 961-976 - Iman M. Almomani, Mamdouh Alenezi:
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks. 977-1000 - Shujie Yang, Haiyong Xie, Yifeng Liu, Zhongbai Jiang, Lujie Zhong:
SKCFS: Stochastic Optimal Forwarding Strategy for Knowledge Centric Network. 1001-1014 - Yang Xu, Jia Liu, Ruo Ando, Norio Shiratori:
End-to-end Congestion Relief and Physical Layer Security-Aware Routing Design for Ad Hoc Networks in IoT Applications. 1015-1030 - Zhiwei Li, Jun Liu, Tao Wang, Boyan Ding:
EPEE 3.0: A Unified Host-FPGA Communication Library Framework for SDR Platforms. 1031-1046 - Runcong Ma, Gwo-Jong Yu, Shenghui Zhao, Bin Yang:
Hierarchical CSI-Fingerprint Classification for Passive Multiperson Localization. 1047-1061 - Xiang Ji, Qingyi Hua, Anwen Wang, Junsong Tang, Chunyu Li, Chen Feng, Dingyi Fang:
2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue. 1063-1077 - Tao Zhang:
Fairness Guaranteed Rating Decomposition in Service-oriented Reputation Systems. 1079-1094
Volume 34, Number 5, September
- Yi-Chung Chen, Heng-Yi Su:
A Distributed Neural Filter for Finding Depth- k Skyline Friends in Social Networks. 1097-1118 - Chien-Hung Liu, Woei-Kae Chen:
Coupling Analysis and Visualization of KDT Scripts. 1119-1139 - Yasuhiro Watanabe, Hironori Washizaki, Kiyoshi Honda, Yuki Noyori, Yoshiaki Fukazawa, Aoi Morizuki, Hiroyuki Shibata, Kentarou Ogawa, Mikako Ishigaki, Satiyo Shiizaki, Teppei Yamaguchi, Tomoaki Yagi:
ID3P: Iterative Data-Driven Development of Personas to Improve Business Goals, Strategies, and Measurements. 1141-1173 - Ming-Chi Liu, Chen-Hsiang Yu, Jungpin Wu, An-Chi Liu, Hsi-Min Chen:
Applying Learning Analytics to Deconstruct User Engagement by Using Log Data of MOOCs. 1175-1186 - Shang-Pin Ma, Ching-Ting Ho:
Modularized and Flow-Based Approach to Chatbot Design and Deployment. 1187-1201 - Hsi-Min Chen, Wei-Han Chen, Chi-Chen Lee:
An Automated Assessment System for Analysis of Coding Convention Violations in Java Programming Assignments. 1203-1221 - Yu-Chen Chiu, Hwai-Jung Hsu, Jungpin Wu, Don-Lin Yang:
Predicting Student Performance in MOOCs Using Learning Activity Data. 1223-1235 - Mahesh M. Goyani, Narendra M. Patel:
Robust Facial Expression Recognition using Local Haar Mean Binary Pattern. 1237-1249 - Zhi Zhao, Jiuchao Feng, Weiyu Yu, Ziliang Ren, Bao Peng, Zhili Zhou:
A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor Network. 1251-1272 - Pei-Chuan Zhou, Alan Liu, Ching-Jung Lee:
A Requirements Engineering Approach to Attribute Selection in a Recommendation System. 1273-1286 - Chien-Hung Liu, Woei-Kae Chen, Shu-Ling Chen:
A Concurrent Approach for Improving the Efficiency of Android CTS Testing. 1287-1306 - Mehmet Karaköse, Mehmet Baygin, Koray Sener Parlak, Nursena Baygin, Erhan Akin:
A Novel Reconfiguration Method Using Image Processing Based Moving Shadow Detection, Optimization, and Analysis for PV Arrays. 1307-1328 - Ming-Yen Lin, Sue-Chen Hsueh, Chih-Chen Chan:
Mining and Maintenance of Sequential Patterns using a Backward Generation Framework. 1329-1349
Volume 34, Number 6, November
- Yo Nishiyama, Yuko Sasaki, Yuki Hirai, Hironori Nakajo, Keiichi Kaneko:
Fault-tolerant Routing based on Routing Capabilities in a Hyper-Star Graph. 1353-1366 - Pilsung Kang:
Dynamic Algorithm Switching in Parallel Simulations using AOP. 1367-1382
- Yu-Ting Tsai, Wei-Jhih Wang, Tzu-Yuan Kao:
Cache-Aware Out-of-Core Tensor Decomposition on GPUs. 1383-1403 - Toan Bui, Tram Nguyen, Bay Vo, Thanh Nguyen, Witold Pedrycz, Václav Snásel:
Application of Particle Swarm Optimization to Create Multiple-Choice Tests. 1405-1423 - Gin-Der Wu, Zhen-Wei Zhu:
Linear-Discriminant-Analysis-Based Type-2 Fuzzy-Neural-Network for Speech Detection and Recognition. 1425-1440 - Mushtaq Ahmad Khan, Wen Chen, Zhoujia Fu, Asmat Ullah:
Meshfree Digital Total Variation Based Algorithm for Multiplicative Noise Removal. 1441-1468 - Hsin-Te Hwang, Yi-Chiao Wu, Syu-Siang Wang, Chin-Cheng Hsu, Yu Tsao, Hsin-Min Wang, Yih-Ru Wang, Sin-Horng Chen:
Locally Linear Embedding Based Post-Filtering for Speech Enhancement. 1469-1491 - Hsin-Te Hwang, Yi-Chiao Wu, Yu-Huai Peng, Chin-Cheng Hsu, Yu Tsao, Hsin-Min Wang, Yih-Ru Wang, Sin-Horng Chen:
Voice Conversion Based on Locally Linear Embedding. 1493-1516
- Yi-Fan Tseng, Chun-I Fan:
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption. 1517-1541
- Der-Rong Din, Yi-Fen Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu:
Spectrum Expansion/Contraction Problem for Multipath Routing with Time-Varying Traffic on Elastic Optical Networks. 1543-1559 - V. Rekha, V. Kavitha:
Efficient Low Bit Rate Image Coder for Fingerprint Image Compression. 1561-1578
- Ming-Hung Wang, Chin-Laung Lei:
SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events. 1579-1598 - Manojit Ghose, Aryabartta Sahu, Sushanta Karmakar:
Energy Efficient Online Scheduling of Real Time Tasks on Large Multi-threaded Multiprocessor Systems. 1599-1615 - P. Swathypriyadharsini, K. Premalatha:
TrioCuckoo: A Multi Objective Cuckoo Search Algorithm for Triclustering Microarray Gene Expression Data. 1617-1631 - Yi-Chung Chen, Chiang Lee:
An Efficient Mechanism for Compensating Vague Pattern Identification in Support of a Multi-Criteria Recommendation System. 1633-1653
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.