default search action
KSII Transactions on Internet and Information Systems, Volume 15
Volume 15, Number 1, January 2021
- Jianli Zhao, Qinzhi Zhang, Qiuxia Sun, Huan Huo, Yu Xiao, Maoguo Gong:
FolkRank++: An Optimization of FolkRank Tag Recommendation Algorithm Integrating User and Item Information. 1-19
- Hyunchul Jung, Hyungeun Jo, Heejo Lee:
UDP-Based Active Scan for IoT Security (UAIS). 20-34 - Waqar Saeed, Zulfiqar Ahmad, Ali Imran Jehangiri, Nader Mohamed, Arif Iqbal Umar, Jamil Ahmad:
A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing. 35-57
- Masnida Hussin, Siti Fajar Jalal, Rohaya Latip:
Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging. 58-73
- Weilong Ding, Xiaojie Zhu, Bin Xu, Yan Xu, Kai Chen, Zang-xin Wan:
The Interactive Modeling Method of Virtual City Scene Based on Building Codes. 74-89 - Muaadh Mukred, Zawiyah Mohammad Yusof, Umi Asma' Mokhtar, Ali Safa Sadiq, Burkan Hawash, Waleed Abdulkafi Ahmed:
Improving the Decision-Making Process in the Higher Learning Institutions via Electronic Records Management System Adoption. 90-113
- Zhigang Li, Xin Wang, Junsong Zhang, Wei Huang, Ye Tian:
Temporal and Spatial Traffic Analysis Based on Human Mobility for Energy Efficient Cellular Network. 114-130
- Zhen Zhong, Wanlin Gao, Minjuan Wang:
A Multimodal Fusion Method Based on a Rotation Invariant Hierarchical Model for Finger-based Recognition. 131-146 - Francis Jesmar P. Montalbo, Alvin S. Alon:
Empirical Analysis of a Fine-Tuned Deep Convolutional Model in Classifying and Detecting Malaria Parasites from Blood Smears. 147-165 - Hoseung Kim, Seong-Soo Han, Chang-Sung Jeong:
Location-Based Saliency Maps from a Fully Connected Layer using Multi-Shapes. 166-179 - Ruoxin Ma, Shengjie Zhao, Samuel Cheng:
Self-Supervised Rigid Registration for Small Images. 180-194
- Zulfiqar Ali Arain, Xuesong Qiu, Lujie Zhong, Mu Wang, Xingyan Chen, Yongping Xiong, Kiran Nahida, Changqiao Xu:
Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network. 195-215 - Guisheng Wang, Yequn Wang, Shufu Dong, Guoce Huang, Qilu Sun:
Optimization Methods for Power Allocation and Interference Coordination Simultaneously with MIMO and Full Duplex for Multi-Robot Networks. 216-239
- Rajeev Kumar, Md Tarique Jamal Ansari, Abdullah Baz, Hosam Alhakami, Alka Agrawal, Raees Ahmad Khan:
A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods. 240-263 - Weichen Lian, Zhaobin Li, Chao Guo, Zhanzhen Wei, Xingyuan Peng:
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN. 264-284 - Eui-Jin Kim, Jin Kwak:
Intelligent Piracy Site Detection Technique with High Accuracy. 285-301 - Wei Zhang, Yi Wu, Hu Xiong, Zhiguang Qin:
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System. 302-322 - Zhenhua Liu, Jiaqi Ji, Fangfang Yin, Baocang Wang:
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. 323-342
- Yuexia Zhang, Jiacheng Jin, Chong Liu, Pengfei Jia:
Indoor 3D Dynamic Reconstruction Fingerprint Matching Algorithm in 5G Ultra-Dense Network. 343-364 - Guosheng Li:
A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays. 365-382
Volume 15, Number 2, February 2021
- Zilong Jin, Chengbo Zhang, Guanzhe Zhao, Yuanfeng Jin, Lejun Zhang:
A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems. 383-403
- C. C. Lee, Degang Xu, George Chan:
Low-cost System with Handheld Analyzer for Optimizing the Position of Indoor Base Stations. 404-420 - Li Zhang, Yan-zhao Ren, Sha Tao, Jingdun Jia, Wanlin Gao:
High-Quality Coarse-to-Fine Fruit Detector for Harvesting Robot in Open Environment. 421-441 - Zhaoming Hu, Yang Lan, Zhixia Zhang, Xingjuan Cai:
A Many-objective Particle Swarm Optimization Algorithm Based on Multiple Criteria for Hybrid Recommendation System. 442-460
- Meng Wang, Zhen-Hu Ning, Jing Yu, Chuang-Bai Xiao:
Adaptive Algorithm in Image Reconstruction Based on Information Geometry. 461-484
- Kyeong-Bin Park, Ki-Seok Chung:
Selection-based Low-cost Check Node Operation for Extended Min-Sum Algorithm. 485-499
- Zi Ye, Yogan Jaya Kumar, Goh Ong Sing, Fengyan Song, Xianda Ni, Jin Wang:
Artificial Intelligence-based Echocardiogram Video Classification by Aggregating Dynamic Information. 500-521 - Qiu-yu Zhang, Fu-jiu Xu, Jian Bai:
Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination. 522-539
- Weihua Gong, Rong Jin, Yanjun Li, Lianghuai Yang, Jianping Mei:
Privacy Protection Method for Sensitive Weighted Edges in Social Networks. 540-557 - Guangwei Xu, Miaolin Lai, Xiangyang Feng, Qiubo Huang, Xin Luo, Li Li, Shan Li:
Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges. 558-579 - Wenbin Zhang, Zehui Wu, Qiang Wei, Huijie Yuan:
A Systematic Treat Model for Software-Defined Networking. 580-599 - Wenqiang Tian, Bin Hu:
Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON. 600-616 - Yueyu Zhang, Jie Chen, Hua Zhou, Lanjun Dang:
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid. 617-636
- Joongjin Kook:
The Design, Implementation, Demonstration of the Architecture, Service Framework, and Applications for a Connected Car. 637-657 - Wenwu Xie, Jian Xiao, Jinxia Yang, Ji Wang, Xin Peng, Chao Yu, Peng Zhu:
Deep Learning-Based Modulation Detection for NOMA Systems. 658-672 - WeiYe Xu, Junya Chu, Xiangbin Yu, Huiyu Zhou:
Energy-efficiency Optimization Schemes Based on SWIPT in Distributed Antenna Systems. 673-694
- Byung-Duck Lee, Keun-Ho Lee, Seong-Soo Han, Chang-Sung Jeong:
Reproduction based Multi-Contents Distribution Platform. 695-712 - Jong-In Choi, Sang-Hun Nam:
Creating Deep Learning-based Acrobatic Videos Using Imitation Videos. 713-728 - Shingchern D. You, Chien-Hung Liu, Jia-Wei Lin:
Improvement of Vocal Detection Accuracy Using Convolutional Neural Networks. 729-748 - Jaepil Youn, Haengrok Oh, Jiwon Kang, Dongkyoo Shin:
Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness. 749-766 - Hua Wang, Yuxin Zhu, Mengyu Wang, Jiqiang Niu, Xueye Chen, Yang Zhang:
Spatial Characteristics and Driving Forces of Cultivated Land Changes by Coupling Spatial Autocorrelation Model and Spatial-temporal Big Data. 767-785 - Junru Yin, Jiantao Qu, Wei Huang, Qiqiang Chen:
Road Damage Detection and Classification based on Multi-level Feature Pyramids. 786-799 - Zhigang Li, Xin Wang, Xinan Yue, Yingli Ji, Hua Wang:
Exploring the Influence of Vehicle Mobility on Information Spreading in VANETs. 800-813
Volume 15, Number 3, March 2021
- Junho Ahn, Akshay Mysore, Kati Zybko, Caroline Krumm, Dohyeon Lee, Da-Hyeon Kim, Richard Han, Shivakant Mishra, Thompson Hobbs:
Intelligent Robust Base-Station Research in Harsh Outdoor Wilderness Environments for Wildsense. 814-836 - Donghyun Lee, Hosung Park, Soonshin Seo, Hyunsoo Son, Gyujin Kim, Ji-Hwan Kim:
Robustness of Differentiable Neural Computer Using Limited Retention Vector-based Memory Deallocation in Language Model. 837-852 - Dewen Seng, Jiaming Zhang, Xiaoying Shi:
Visual Analysis of Deep Q-network. 853-873 - Prohim Tam, Sa Math, Seokhoon Kim:
Intelligent Massive Traffic Handling Scheme in 5G Bottleneck Backhaul Networks. 874-890
- Xiaozhu Wu:
A Dynamic QoS Adjustment Enabled and Load-balancing-aware Service Composition Method for Multiple Requests. 891-910
- Hyeonseong Choi, Youngrang Kim, Jaehwan Lee, Yoonhee Kim:
Empirical Performance Evaluation of Communication Libraries for Multi-GPU based Distributed Deep Learning in a Container Environment. 911-931 - Rabatul Aduni Sulaiman, Dayang N. A. Jawawi, Shahliza Abd Halim:
A Dissimilarity with Dice-Jaro-Winkler Test Case Prioritization Approach for Model-Based Testing in Software Product Line. 932-951
- Manal M. Alqarni, Asma Cherif, Entisar S. Alkayal:
A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges. 952-973
- Hyun Yoo, Roy C. Park, Kyungyong Chung:
IoT-Based Health Big-Data Process Technologies: A Survey. 974-992 - Mingzhu Zhang:
A New Three-dimensional Integrated Multi-index Method for CBIR System. 993-1014 - Kalaphath Kounlaxay, YoonSik Shim, Shin-Jin Kang, Ho-Young Kwak, Soo Kyun Kim:
Learning Media on Mathematical Education based on Augmented Reality. 1015-1029
- Wanchang Jiang, Yanhui Liu, Shengda Wang, Jian Guo:
Bridge-edges Mining in Complex Power Optical Cable Network based on Minimum Connected Chain Attenuation Topological Potential. 1030-1050
- Ali Hamza, Danish Shehzad, Muhammad Shahzad Sarfraz, Usman Habib, Numan Shafi:
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching. 1051-1077 - Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance. 1078-1099 - Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, Naoko Nitta, Noboru Babaguchi:
Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System. 1100-1118 - Francisco Montes, Javier Bermejo Higuera, Luís Enrique Sanchez, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia:
Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey. 1119-1139
- Guowei Lei, Hailan Chen, Yuanan Liu:
Analysis of Antenna Selection in Two-way Relaying MIMO Systems with CPM Modulation. 1140-1155 - Insoo Hwang, Inseok Kang, Intae Hwang, Cheolwoo You:
Equal Gain Block Decomposition Methods for Multiuser MIMO Networks. 1156-1173 - Fangcheng Xu, Xiangbin Yu, WeiYe Xu, Jiali Cai:
Performance Analysis and Power Allocation for NOMA-assisted Cloud Radio Access Network. 1174-1192
Volume 15, Number 4, April 2021
- Ying Tian, Yuting Zhu:
Quality Variable Prediction for Dynamic Process Based on Adaptive Principal Component Regression with Selective Integration of Multiple Local Models. 1193-1215 - Weiwei Liu, Fu Wang, Chennan Zhang, Jingyu Zhang, Lei Wang:
A Simulation Study of Urban Public Transport Transfer Station Based on Anylogic. 1216-1231 - Jun-Ki Hong:
LSTM-based Sales Forecasting Model. 1232-1245 - Le Chang, Fan Zhang, Biao Li:
Fast and Accurate Single Image Super- Resolution via Enhanced U-Net. 1246-1262 - Bolun Chen, Yiyun Shen, Min Ji, Ji-Wei Liu, Yongtao Yu, Yue Zhang:
Competitive Influence Maximization on Online Social Networks under Cost Constraint. 1263-1274 - Yu Deng, Hang Lei, Xiaoyu Li, Yiou Lin, Wangchi Cheng, Shan Yang:
Attention Capsule Network for Aspect-Level Sentiment Classification. 1275-1292
- Jianrui Fan, Xinru Zhao, Wencan Wang, Shengsuo Cai, Lijuan Zhang:
Towards the Saturation Throughput Disparity of Flows in Directional CSMA/CA Networks: An Analytical Model. 1293-1316 - Aditya Tandon, Pramod Kumar, Vinay Rishiwal, Mano Yadav, Preeti Yadav:
A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT. 1317-1341
- Manogar Ellappan, Abirami S:
Dynamic Prime Chunking Algorithm for Data Deduplication in Cloud Storage. 1342-1359
- Yumei Wu, Zhen Li, LanJie Zhao, Zhengwei Yu, Hong Miao:
Safety Ontology Modeling and Verification on MIS of Ship-Building and Repairing Enterprise. 1360-1388 - Bin Yu, Xiaofeng Li, He Zhao:
PoW-BC: A PoW Consensus Protocol Based on Block Compression. 1389-1408 - Jamal A. Nasir, Zia Ud Din:
Syntactic Structured Framework for Resolving Reflexive Anaphora in Urdu Discourse Using Multilingual NLP. 1409-1425
- Guosheng Zhao, Dongmei Liu, Jian Wang:
The Game Selection Model for the Payoff Strategy Optimization of Mobile CrowdSensing Task. 1426-1447
- Lu Chen, Feng Xiang, Zhixin Sun:
Image Deduplication Based on Hashing and Clustering in Cloud Storage. 1448-1463 - Baixi Xing, Jian Dou, Qing Huang, Huahao Si:
Stylized Image Generation based on Music-image Synesthesia Emotional Style Transfer using CNN Network. 1464-1485 - Shinjin Kang, Teasung Hahn:
Eyeglass Remover Network based on a Synthetic Image Dataset. 1486-1501 - Jaekwan Jeong, Kahui Park, Yaewon Hyun, Daewon Kim:
Measuring Psychological Support for the Unemployed: The Case of Kakao NEET Project. 1502-1520
- Teng Li, Yu Zhang, Sha Wang, Junjie Sun:
High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation. 1521-1537 - Yongkang Gong, Diqun Yan, Terui Mao, Donghua Wang, Rangding Wang:
Defending and Detecting Audio Adversarial Example using Frame Offsets. 1538-1552 - Yuling Liu, Jiao Wu, Xianyi Chen:
An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS. 1553-1567
- Zhengyu Kong, Duanpo Wu, Xinyu Jin, Shuwei Cen, Fang Dong:
Improved AP Deployment Optimization Scheme Based on Multi-objective Particle Swarm Optimization Algorithm. 1568-1589
Volume 15, Number 5, May 2021
- Nadia Mansouri, Zied Lachiri:
Human Laughter Generation using Hybrid Generative Models. 1590-1609 - Xiaorui Shao, Lijiang Wang, Chang Soo Kim, Ilkyeun Ra:
Fault Diagnosis of Bearing Based on Convolutional Neural Network Using Multi-Domain Features. 1610-1629 - Jang Hyun Kim, Min Hyung Park, Yerin Kim, Dongyan Nan, Fernando Travieso:
Relation Between News Topics and Variations in Pharmaceutical Indices During COVID-19 Using a Generalized Dirichlet-Multinomial Regression (g-DMR) Model. 1630-1648 - Xiaochen Yue, Qicheng Liu:
Parallel Algorithm of Improved FunkSVD Based on Spark. 1649-1665 - Hua Wang, Mengyu Wang, Yuxin Zhu, Jiqiang Niu, Xueye Chen, Yang Zhang:
Zoning Permanent Basic Farmland Based on Artificial Immune System coupling with spatial constraints. 1666-1689 - Tao Li, Wenduo Xu, Lina Wang, Ningpeng Li, Yongjun Ren, Jinyue Xia:
An Integrated Artificial Neural Network-based Precipitation Revision Model. 1690-1707
- Amith M. Weerasinghe, Rupasingha A. H. M. Rupasingha:
Improving Web Service Recommendation using Clustering with K-NN and SVD Algorithms. 1708-1727
- Tao Yan, In-Ho Ra, Deyang Liu, Qian Zhang:
A Bit Allocation Method Based on Proportional-Integral-Derivative Algorithm for 3DTV. 1728-1743 - Yuhao Wang, Jun Ma:
Visual Object Tracking using Surface Fitting for Scale and Rotation Estimation. 1744-1760 - Juan Wang, Cong Ke, Minghu Wu, Min Liu, Chunyan Zeng:
Infrared and visible image fusion based on Laplacian pyramid and generative adversarial network. 1761-1777 - Wei Xiong, Xiuhong Jia, Dichun Yang, Meihui Ai, Lirong Li, Song Wang:
DP-LinkNet: A convolutional network for historical document image binarization. 1778-1797 - Chunmao Wu, Huayuan Xu, Ziyang Liu:
The Approaches of Positive Experience Design on IoT Intelligent Products. 1798-1813 - Yan Liu, Bingxue Lv, Jingwen Wang, Wei Huang, Tiantian Qiu, Yunzhong Chen:
Single Low-Light Ghost-Free Image Enhancement via Deep Retinex Model. 1814-1828
- Wei Liu, Linlin Ci, LiPing Liu:
A Configurable Software-based Approach for Detecting CFEs Caused by Transient Faults. 1829-1846 - Wenchao Li, Hu Xiong:
Efficient Proxy Re-encryption Scheme for E-Voting System. 1847-1870 - Young Lee, Sang Geun Hahn:
State of the Art of Anti-Screen Capture Protection Techniques. 1871-1890 - Huanruo Li, Yunfei Guo, Shumin Huo, Yuehang Ding:
EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception. 1891-1908 - Alejandro Enciso Bernal, Sergio Mauricio Martínez Monterrubio, Javier Parra Fuente, Rubén González Crespo, Elena Verdú:
Methodology for Computer Security Incident Response Teams into IoT Strategy. 1909-1928
- Sangmi Moon, Hyeonsung Kim, Young-Hwan You, Cheol Hong Kim, Intae Hwang:
Coordinated Millimeter Wave Beam Selection Using Fingerprint for Cellular-Connected Unmanned Aerial Vehicle. 1929-1943 - Guosheng Li:
Sum-Rate Performance of A NOMA-based Two-Way Relay Approach for A Two-User Cellular Network. 1944-1956
Volume 15, Number 6, June 2021
- K. Balachander, D. Paulraj:
Building Energy Time Series Data Mining for Behavior Analytics and Forecasting Energy consumption. 1957-1980 - Wei Xu, Hao Zheng, Zhongxue Yang, Yingjie Yang:
Micro-Expression Recognition Base on Optical Flow Features and Improved MobileNetV2. 1981-1995 - Younghan Lee, Mi-Lyang Kim, Seoyoun Hong:
Big-data Analytics: Exploring the Well-being Trend in South Korea Through Inductive Reasoning. 1996-2011 - Jieren Cheng, Jingxin Liu, Xinbin Xu, Dongwan Xia, Le Liu, Victor S. Sheng:
A review of Chinese named entity recognition. 2012-2030
- Fangfang Gu, Keshen Jiang, Fangdong Cao:
Machine Learning Aided Tracking Analysis of Haze Pollution and Regional Heterogeneity. 2031-2048
- Farah Younas, Jumana Nadir, Muhammad Usman, Muhammad Attique Khan, Sajid Ali Khan, Seifedine Kadry, Yunyoung Nam:
An Artificial Intelligence Approach for Word Semantic Similarity Measure of Hindi Language. 2049-2068 - Ping Ji, Hui Huang, Xueliang Liu, Xue-You Hu:
Product Adoption Maximization Leveraging Social Influence and User Interest Mining. 2069-2085
- ByongKwon Lee, Soo Kyun Kim, Seokhun Kim:
A Study on Pagoda Image Search Using Artificial Intelligence (AI) Technology for Restoration of Cultural Properties. 2086-2097 - Na Ma, Tingxin Wen:
Vehicle Face Re-identification Based on Nonnegative Matrix Factorization with Time Difference Constraint. 2098-2114 - Meng Xu, Rize Jin, Liangfu Lu, Tae-Sun Chung:
A Novel Cross Channel Self-Attention based Approach for Facial Attribute Editing. 2115-2127
- Appala Raju Uppala, C. Venkata Narasimhulu, K. Satya Prasad:
Improved Convolutional Neural Network Based Cooperative Spectrum Sensing For Cognitive Radio. 2128-2147
- Dat Phuc Tran Song, Yong-Hyeon Shin, Changhoon Lee:
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks. 2148-2167 - Prasanna Srinivasan V., Balasubadra K., Saravanan K., Arjun V. S., Malarkodi S.:
Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid. 2168-2187 - Qing Yang, Xiaoliang Wang, Jing Zheng, Wenqi Ge, Ming Bai, Frank Jiang:
LSTM Android Malicious Behavior Analysis Based on Feature Weighting. 2188-2203
- Xiaochen Liu, Yuanyuan Gao, Nan Sha, Guozhen Zang, Shijie Wang:
Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers. 2204-2224 - Ranida Hamidouche, Zibouda Aliouat, Ado Adamou Abba Ari, Abdelhak Guéroui:
Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme. 2225-2239 - Hui Dun, Fang Ye, Shuhong Jiao:
Fast Channel Allocation for Ultra-dense D2D-enabled Cellular Network with Interference Constraint in Underlaying Mode. 2240-2254 - Qiuhua Wang, Mingyang Kang, Lifeng Yuan, Yunlu Wang, Gongxun Miao, Kim-Kwang Raymond Choo:
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks. 2255-2281 - Xin Song, Yue Wang, Zhigang Xie, Lin Xia:
A Cloud-Edge Collaborative Computing Task Scheduling and Resource Allocation Algorithm for Energy Internet Environment. 2282-2303
Volume 15, Number 7, July 2021
- Yilin Wang, Le Sun, Sudha Subramani:
CAB: Classifying Arrhythmias based on Imbalanced Sensor Data. 2304-2320 - Zhiqiang Lv, Jianbo Li, Chuanhao Dong, Yue Wang, Haoran Li, Zhihao Xu:
DeepPTP: A Deep Pedestrian Trajectory Prediction Model for Traffic Intersection. 2321-2338 - Hao Jiao, Yunxue Liu, Hui Yu, Ke Li, Feiyuan Long, Yingjie Cui:
A Novel Algorithm of Joint Probability Data Association Based on Loss Function. 2339-2355
- Hongyuan Gao, Shihao Wang, Yumeng Su, Helin Sun, Zhiwei Zhang:
Evolutionary Neural Network based on Quantum Elephant Herding Algorithm for Modulation Recognition in Impulse Noise. 2356-2376 - K. Manikanda Kumaran, M. Chinnadurai, S. Manikandan, S. Palani Murugan, E. Elakiya:
An IoT based Green Home Architecture for Green Score Calculation towards Smart Sustainable Cities. 2377-2398
- Li Duan, Weiping Wang, Baijing Han:
A Hybrid Recommendation System based on Fuzzy C-Means Clustering and Supervised Learning. 2399-2413
- Pravin Kshirsagar, Hariprasath Manoharan, Vineet Tirth, Mohd Naved, Ahmad Tasnim Siddiqui, Arvind K. Sharma:
Automation Monitoring With Sensors For Detecting Covid Using Backpropagation Algorithm. 2414-2433 - Jong-Yih Kuo, Hui-Chi Lin, Chien-Hung Liu:
A Study of Resource Utilization Improvement on Cloud Testing Platform. 2434-2454 - Afifah M. Ashari, Shahliza Abd Halim, Dayang N. A. Jawawi, Ushananthiny Suvelayutnan, Mohd Adham Isa:
Quality Driven Approach for Product Line Architecture Customization in Patient Navigation Program Software Product Line. 2455-2475 - Zhan Shi, Xiaoqin Zeng, Tingting Zhang, Lei Han, Ying Qian:
UML diagram-driven test scenarios generation based on the temporal graph grammar. 2476-2495
- Siyuan Sun, Ying Zheng, Junhua Zhou, Jiuxing Xing, Yifei Wei, Xiaojun Wang:
Resource Allocation for Heterogeneous Service in Green Mobile Edge Networks Using Deep Reinforcement Learning. 2496-2512
- Ying Fang, Weiling Chen, Tiesong Zhao, Yiwen Xu, Jing Chen:
Video Quality Assessment Based on Short-Term Memory. 2513-2530 - Yeongil Ryu, Eun-Seok Ryu:
Overview of Motion-to-Photon Latency Reduction for Mitigating VR Sickness. 2531-2546 - Abdul Jabbar, Xi Li, M. Munawwar Iqbal, Arif Jamal Malik:
FD-StackGAN: Face De-occlusion Using Stacked Generative Adversarial Networks. 2547-2567
- Choong-Hee Cho:
Trade-off between Resource Efficiency and Fast Protection for Shared Mesh Protection. 2568-2588 - Zengwei Zheng, Chenwei Zhao, Jianwei Zhang, Jianping Cai:
Traffic Engineering with Segment Routing under Uncertain Failures. 2589-2609
- Kritsanapong Somsuk:
The alternative Method to Finish Modular Exponentiation and Point Multiplication Processes. 2610-2630
- Abdu Saif, Kamarul Ariffin Bin Noordin, Kaharudin Dimyati, Nor Shahida Mohd Shah, Yousef Ali Al-Gumaei, Qazwan Abdullah, Kamal Ali Alezabi:
An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks. 2631-2649 - Jun Zhang, Qi Zhu:
Joint Optimization Algorithm Based on DCA for Three-tier Caching in Heterogeneous Cellular Networks. 2650-2667 - Yi-Feng Huang, Hsiao-Hwa Chen:
Applications of Intelligent Radio Technologies in Unlicensed Cellular Networks - A Survey. 2668-2717
Volume 15, Number 8, August 2021
- Yajie Sun, Tao Yin, Jian Yang, Zhiyu Cai, Shaoen Wu:
Impact Force Reconstruction of Composite materials based on Improved Regularization Technology. 2718-2731
- Mingzi Chen, Xin Wei, Liang Zhou:
Integrated Media Platform-based Virtual Office Hours Implementation for Online Teaching in Post-COVID-19 Pandemic Era. 2732-2748
- Yan Gu, Feng Yang, Weijun Zhao, Yiliang Guo, Chaobo Min:
Reflectance estimation for infrared and visible image fusion. 2749-2763
- Zhiyuan Tao, Fenlin Liu, Yan Liu, Xiangyang Luo:
A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching. 2764-2782 - Xiaoyang Han, Xiangru Meng, Zhenhua Yu, Dong Zhai:
A Dynamic Adjustment Method of Service Function Chain Resource Configuration. 2783-2804 - Rongbo Zhang, Xin Li, Yan Zhan:
Polymorphic Path Transferring for Secure Flow Delivery. 2805-2826
- Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert H. Deng:
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. 2827-2848 - Dehao Tao, Zhen Yang, Xuanmei Qin, Qi Li, Yongfeng Huang, Yubo Luo:
UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments. 2849-2864 - Guojia Li, Lin You, Gengran Hu, Liqin Hu:
Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing. 2865-2878
- Yongpeng Shi, Yujie Xia, Ya Gao, Jianhua Cui:
Cyclic Shift Based Tone Reservation PAPR Reduction Scheme with Embedding Side Information for FBMC-OQAM Systems. 2879-2899 - Zheng Niu, Yuzhong Jiang, Shuyang Jia, Zhi Huang, Wenliang Zou, Gang Liu, Yu Li:
Mathematical Analysis Power Spectrum of M-ary MSK and Detection with Optimum Maximum Likelihood. 2900-2922 - Jialin Xie, Qiang Liu, Kun Yang, Lin Lin:
Channel Capacity Analysis of DNA-based Molecular Communication with Length Encoding Mechanism. 2923-2943
- Xiu Jin, Sangwoo Hahm:
Using Online Information Support to Decrease Stress, Anxiety, and Depression. 2944-2958 - Yamin Han, Heejung Byun, Liangliang Zhang:
Prolonging Network Lifetime by Optimizing Actuators Deployment with Probabilistic Mutation Multi-layer Particle Swarm Optimization. 2959-2973 - Zainab Umair Kamangar, Isma Farah Siddiqui, Qasim Ali Arain, Umair Ayaz Kamangar, Nawab Muhammad Faseeh Qureshi:
Personality Characteristic-based Enhanced Software Testing Levels for Crowd Outsourcing Environment. 2974-2992 - Xiaorui Shao, Chang Soo Kim:
Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem. 2993-3010 - Sukwoo Jung, Seho Park, KyungTaek Lee:
Pose Tracking of Moving Sensor using Monocular Camera and IMU Sensor. 3011-3024 - Byoungman An, Youngseop Kim:
Real-time Camera and Video Streaming Through Optimized Settings of Ethernet AVB in Vehicle Network System. 3025-3047 - Nayoung Ko, Myeonggi Hong, Jeeseon Hwang, Jeonghyeon Chang, EuiGab Hwang:
Are Online and Offline Delinquency Mutually Exclusive? Blurred Boundaries between Cyber Space and the Real-World. 3048-3067 - Chuanrong Wu, Ning Tan, Zhi Lu, Xiaoming Yang, Mark E. McMurtrey:
Strategies of Knowledge Pricing and the Impact on Firms' New Product Development Performance. 3068-3085 - Baoshu Li, Xin Zhou, Ping Dong:
Power Failure Sensitivity Analysis via Grouped ?1/2 Sparsity Constrained Logistic Regression. 3086-3101
Volume 15, Number 9, September 2021
- B. Selvalakshmi, M. Subramaniam, Sathiyasekar Kumarasamy:
Semantic Conceptual Relational Similarity Based Web Document Clustering for Efficient Information Retrieval Using Semantic Ontology. 3102-3119 - Moonseong Kim, Woochan Lee:
Adaptive Success Rate-based Sensor Relocation for IoT Applications. 3120-3137 - Jihun Chae, Namgi Kim:
Multicast Tree Generation using Meta Reinforcement Learning in SDN-based Smart Network Platforms. 3138-3150
- K. R. Remesh Babu, Preetha K. G., S. Saritha, Rinil K. R.:
An Energy Efficient Intelligent Method for Sensor Node Selection to Improve the Data Reliability in Internet of Things Networks. 3151-3168
- Hazwani Nordin, Dalbir Singh, Zulkefli Mansor:
Interface Design for E-Learning: Investigating Design Characteristics of Colour and Graphic Elements for Generation Z. 3169-3185
- Weijia Huang, Weixing Zhu, Zhengyan Zhang, Yizheng Guo:
Multi-scale Local Difference Directional Number Pattern for Group-housed Pigs Recognition. 3186-3203 - Chuanyan Hao, Yuqi Wang, Bo Jiang, Sijiang Liu, Zhi-Xin Yang:
Higher-Order Conditional Random Field established with CNNs for Video Object Segmentation. 3204-3220 - Eunji Lee, Jikyung Jang:
Research Trend Analysis for Sustainable QR code use - Focus on Big Data Analysis. 3221-3242
- Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers. 3243-3257 - Shanxi Li, Qingguo Zhou, Wei Wei:
Malware Detection with Directed Cyclic Graph and Weight Merging. 3258-3273 - Jiajie Du, Nurmamat Helil:
Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption. 3274-3297 - Ji-Hwei Horng, Chin-Chen Chang, Kun-Sheng Sun:
A Two-Layer Steganography for Mosaic Images. 3298-3321 - S. Mary Virgil Nithya, V. Rhymend Uthariaraj:
Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation. 3322-3347 - Hua Wu, Ji-Hwei Horng, Chin-Chen Chang:
Adaptive data hiding scheme based on magic matrix of flexible dimension. 3348-3364 - Shufen Niu, Lizhi Fang, Mi Song, Fei Yu, Song Han:
An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid. 3365-3383 - Sixu Guo, Shen He, Li Su, Xinyue Zhang, Huizheng Geng, Yang Sun:
A data corruption detection scheme based on ciphertexts in cloud environment. 3384-3400 - Guangbo Wang, Feng Li, Pengcheng Wang, Yixiao Hu:
Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption. 3401-3420
- Da-Chun Wu, Ping-Yu Hsieh:
Copyright Protection of E-books by Data Hiding Based on Integer Factorization. 3421-3443 - Yifan Wang, Xin Liu, Mei Wang, Yu Yu:
A hidden anti-jamming method based on deep reinforcement learning. 3444-3457 - Qian Liu, Hao Zhang, Peidong Yu, Gang Wang, Zhaoyang Qiu:
A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field. 3458-3481
Volume 15, Number 10, October 2021
- Woochan Lee, Moonseong Kim, Jaeyoung Park:
Speed-up of the Matrix Computation on the Ridge Regression. 3482-3497 - Hye-Yeon Yu, Yun-Gyung Cheong, Byung-Chull Bae:
Extracting and Clustering of Story Events from a Story Corpus. 3498-3512 - Jeong Kwan Park, Soo Kyung Park, Bong Gyou Lee:
Priority of Challenges for Activation of MyData Business: K-MyData Case. 3513-3533
- Ling-Wu Qian, Bingjie Yuan:
An indoor fusion positioning algorithm of Bluetooth and PDR based on particle filter with dynamic adjustment of weights calculation strategy. 3534-3553
- Tao Tao, Jianfeng Yang, Wei Wei, Marcin Wozniak, Rafal Scherer, Robertas Damasevicius:
Design of a MEMS sensor array for dam subsidence monitoring based on dual-sensor cooperative measurements. 3554-3570 - HeeJeong Jasmine Lee, In Kim:
A Comparative Study of Social Network Tools for Analysing Chinese Elites. 3571-3587 - Cemal Aktürk, Ceren Çubukçu:
A Decision Making Model Proposal for Firewall Selection. 3588-3607
- Xiaodong Gu, Ji Ding:
Cascade Network Based Bolt Inspection In High-Speed Train. 3608-3626 - Sangmin Lee:
Determining Personal Credit Rating through Voice Analysis: Case of P2P loan borrowers. 3627-3641 - Huaming Liu, Guanming Lu, Xuehui Bi, Weilan Wang:
Patch size adaptive image inpainting. 3642-3667 - Han Qiao, Shuang Liu, Qingzhen Xu, Shouqiang Liu, Wanggan Yang:
Two-Stream Convolutional Neural Network for Video Action Recognition. 3668-3684 - Hyeon Seok Yang, Jeong Hoon Han, Young Shik Moon:
Semi-Supervised Spatial Attention Method for Facial Attribute Editing. 3685-3707 - I. Kiruba Raji, K. K. Thyagharajan, T. Vignesh, G. Kalaiarasi:
Classifying Indian Medicinal Leaf Species Using LCFN-BRNN Model. 3708-3728 - Xialu Li, Ziguan Cui, Zongliang Gan, Guijin Tang, Feng Liu:
AANet: Adjacency auxiliary network for salient object detection. 3729-3749
- Nurul Atiqah Abu Talib, Kyung-Goo Doh:
Assessment of Dynamic Open-source Cross-site Scripting Filters for Web Application. 3750-3770 - Jee-Tae Park, Ui-Jun Baek, Min-Seong Lee, Young-Hoon Goo, Sung-Ho Lee, Myung-Sup Kim:
Flow based Sequential Grouping System for Malicious Traffic Detection. 3771-3792 - Zhe Wei, Shuyan Yu:
Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey. 3793-3814 - Xiaonian Wu, Jiaxu Yan, Lingchen Li, Runlian Zhang, Pinghai Yuan, Yujue Wang:
Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model. 3815-3833
- S. Sudha Mercy, J. M. Mathana, J. S. Leena Jasmine:
An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network. 3834-3857 - Xuting Duan, Hang Jiang, Daxin Tian, Jianshan Zhou, Gang Zhou, Wenjuan E, Yafu Sun, Shudong Xia:
Traffic Flow Sensing Using Wireless Signals. 3858-3874
Volume 15, Number 11, November 2021
- Jong Gab Ho, Dae-Gyeom Kim, Young Kim, Seung-wan Jang, Se Dong Min:
Development of Plantar Pressure Measurement System and Personal Classification Study based on Plantar Pressure Image. 3875-3891 - Yanpei Liu, Wei Huang, Li Han, Liping Wang:
A cache placement algorithm based on comprehensive utility in big data multi-access edge computing. 3892-3912 - Jinsheng Hao, Guoping Su, Xiaofeng Han, Wei Nie:
An expanded Matrix Factorization model for real-time Web service QoS prediction. 3913-3934 - Chang Liu, Ruilin Hu:
Hot Topic Discovery across Social Networks Based on Improved LDA Model. 3935-3949
- Dian Zhang, Rujun Zhang, Haizhou Guo, Peng Xiang, Xiaonan Guo:
Cross-Technology Localization: Leveraging Commodity WiFi to Localize Non-WiFi Device. 3950-3969 - Qiuyan Cai, Xuwen Jing, Yu Chen, Jinfeng Liu, Chao Kang, Bingqiang Li:
Online Monitoring of Ship Block Construction Equipment Based on the Internet of Things and Public Cloud: Take the Intelligent Tire Frame as an Example. 3970-3990
- Han Zhou, Xuchao Guo, Chengqi Liu, Zhan Tang, Shuhan Lu, Lin Li:
Question Similarity Measurement of Chinese Crop Diseases and Insect Pests Based on Mixed Information Extraction. 3991-4010 - N. P. Ponnuviji, M. Vigilson Prem:
An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm. 4011-4027 - Fanqi Meng, Wenying Cheng, Jingdong Wang:
Semi-supervised Software Defect Prediction Model Based on Tri-training. 4028-4042
- Shuyan Xiao, Weige Tao, Yu Wang, Ye Jiang, Minqian Qian:
Blind Quality Metric via Measurement of Contrast, Texture, and Colour in Night-Time Scenario. 4043-4064 - Jin Wang, Yiming Wu, Shiming He, Pradip Kumar Sharma, Xiaofeng Yu, Osama Alfarraj, Amr Tolba:
Lightweight Single Image Super-Resolution Convolution Neural Network in Portable Device. 4065-4083 - Yutian Chen, Wenyan Gan, Yi Zhu, Hui Tian, Cong Wang, Wenfeng Ma, Yunbo Li, Dong Wang, Jixian He:
Efficient Visual Place Recognition by Adaptive CNN Landmark Matching. 4084-4104
- Mingu Kang, HyeungKyeom Kim, Suchul Lee, Seokmin Han:
Resilience against Adversarial Examples: Data-Augmentation Exploiting Generative Adversarial Networks. 4105-4121 - Siddhartha Roy, Saptarshi Roy, Arpita Biswas, Krishna Lal Baishnab:
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications. 4122-4144 - Yanji Piao, Dongyue Cui:
Privacy Analysis and Comparison of Pandemic Contact Tracing Apps. 4145-4162 - Man Yong Choi, Jin Kwak:
Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19. 4163-4183 - Boya Yang, Wanli Peng, Yiming Xue, Ping Zhong:
A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution. 4184-4202
- Wei Yang, Xiaojun Jing, Hai Huang, Chunsheng Zhu, Qiaojie Jiang, Dongliang Xie:
An Efficient Markov Chain Based Channel Model for 6G Enabled Massive Internet of Things. 4203-4223 - Jipeng Gan, Jun Wu, Jia Zhang, Zehao Chen, Ze Chen:
Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective. 4224-4243 - Xiulin Qiu, Yongsheng Xie, Yinyin Wang, Lei Ye, Yuwang Yang:
QLGR: A Q-learning-based Geographic FANET Routing Algorithm Based on Multi-agent Reinforcement Learning. 4244-4274
Volume 15, Number 12, December 2021
- Mengli Zhang, Gang Zhou, Wanting Yu, Wenfen Liu:
KI-HABS: Key Information Guided Hierarchical Abstractive Summarization. 4275-4291 - Zhiqiang Feng, Xiaogang Wang, Zhongfan Yang, Shaojie Guo, Xingzhong Xiong:
An Improved ViBe Algorithm of Moving Target Extraction for Night Infrared Surveillance Video. 4292-4307 - Jaewoong Moon, Subin Kim, Jaeseung Song, Kyung-shin Kim:
Study on Machine Learning Techniques for Malware Classification and Detection. 4308-4325 - Liquan Zhao, Yupeng Zhang:
Generative Adversarial Networks for single image with high quality image. 4326-4344 - Yanan Bai, Yong Feng, Wenyuan Wu:
Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing. 4345-4363
- Xiulei Wang, Bo Xu, Fenglin Jin:
An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing. 4364-4384 - Haoru Su, Xiaoming Yuan, Yujie Tang, Rui Tian, Enchang Sun, Hairong Yan:
A Learning-based Power Control Scheme for Edge-based eHealth IoT Systems. 4385-4399
- Heongkyun Kim, Sangmin Lee, Hyunwoo Kwon, Eunmin Kim:
Design and Implementation of a Personal Health Record Platform Based on Patient-consent Blockchain Technology. 4400-4419
- Juan Wang, Chang Ding, Minghu Wu, Yuanyuan Liu, Guanhai Chen:
Lightweight multiple scale-patch dehazing network for real-world hazy image. 4420-4438 - Xiang Dong, Feng Li, Huihui Bai, Yao Zhao:
Dual Attention Based Image Pyramid Network for Object Detection. 4439-4455 - V. Manimaran, K. G. Srinivasagan, S. Gokul, Israel Jeena Jacob, S. Baburenagarajan:
A new framework for Person Re-identification: Integrated level feature pattern (ILEP). 4456-4475 - Zhenwei Yang, Liquan Shen:
A Multi-category Task for Bitrate Interval Prediction with the Target Perceptual Quality. 4476-4491
- Zhimin Liu, Guiyan Jiang:
Sensor Density for Full-View Problem in Heterogeneous Deployed Camera Sensor Networks. 4492-4507
- Keshav Sinha, Partha Paul, Amritanjali:
Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server. 4508-4530 - Weiwei Lin, Chaofan Yang, Zeqing Zhang, Xingsi Xue, Reiko Haga:
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data. 4531-4544 - Seham Alnefaie, Asma Cherif, Suhair Alshehri:
A Distributed Fog-based Access Control Architecture for IoT. 4545-4566
- Shanshan Wu, Guobing Hu, Li Yang, Bin Gu:
Analytical Approximation Algorithm for the Inverse of the Power of the Incomplete Gamma Function Based on Extreme Value Theory. 4567-4583 - Sungmook Lim, Gi-Hoon Ryu, Kyunbyoung Ko:
ODPM Channel Estimation Method using Multiple MRC and New Reliability Test in IEEE 802.11p Systems with Receive Diversity. 4584-4599 - Sungtae Kim, Sungmook Lim:
Advanced Energy Detector with Correlated Multiple Antennas. 4600-4616 - Deqing Zhu, Shenji Luan:
Spatial Reuse in IEEE 802.11ax: Whether and How to Use in Practice. 4617-4632
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.