default search action
KSII Transactions on Internet and Information Systems, Volume 11
Volume 11, Number 1, January 2017
- Guangwei Xu, Zhifeng Sun, Cairong Yan, Xiujin Shi, Yue Li:
Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage. 1-17 - Huioon Kim, Hyounggyu Kim, Kyungwon Chun, Youngjoo Chung:
Experience in Practical Implementation of Abstraction Interface for Integrated Cloud Resource Management on Multi-Clouds. 18-38 - Yongsheng Hao, Mandan Xia, Na Wen, Rongtao Hou, Hua Deng, Lina Wang, Qin Wang:
Parallel task scheduling under multi-Clouds. 39-60 - Doan Perdana, Ray-Guang Cheng, Riri Fitri Sari:
Analytical Study of the Impact of the Mobility Node on the Multi-channel MAC Coordination Scheme of the IEEE 1609.4 Standard. 61-77 - Jintao Wang, Xi Jin, Peng Zeng, Zhaowei Wang, Ming Wan:
Phase Switching Mechanism for WiFi-based Long Distance Networks in Industrial Real-Time Applications. 78-101 - A. Chaminda J. Samarasekera, Hyundong Shin:
Outage Probability for Cooperative Nano Communication in the THz Gap Frequency Range. 102-122 - Sang-Jo Yoo, Ju-Tae Jang, Myunghwan Seo, Hyung-Weon Cho:
Secondary System Initialization Protocol Using FFT-based Correlation Matching for Cognitive Radio Ad-hoc Networks. 123-145 - Omar M. Zakaria, Aisha Hassan Abdalla Hashim, Wan Haslina Hassan, Othman Omran Khalifa, Mohammad Azram, Shidrokh Goudarzi, Lalitha Bhavani Jivanadham, Mahdi Zareei:
State-Aware Re-configuration Model for Multi-Radio Wireless Mesh Networks. 146-170 - Ye Shen, Jing Feng, Weijun Ma, Lei Jiang, Min Yin:
Overlay Multicast Update Strategy Based on Perturbation Theory. 171-192 - Tao Wang, Zheng Yao, Baoxian Zhang, Cheng Li:
Utility Bounds of Joint Congestion and Medium Access Control for CSMA based Wireless Networks. 193-214 - Yuan Liu, Junjie Chen, Zhenfeng Xu:
Improved DV-Hop Localization Algorithm Based on Bat Algorithm in Wireless Sensor Networks. 215-236 - Wen Liu, Zhigang Wang, Yanming Shen:
Job-aware Network Scheduling for Hadoop Cluster. 237-252 - WeiYe Xu, Min Lin:
Downlink Capacity Analysis of Distributed Antenna Systems with Imperfect Channel State Information. 253-271
- Hainan Wang, Baochang Zhang, Hong Zheng, Yao Cao, Zhenhua Guo, Chengshan Qian:
The Robust Derivative Code for Object Recognition. 272-287 - Jianjun Li, Susu Fan, Zhihui Wang, Haojie Li, Chin-Chen Chang:
An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification. 288-301 - Hai-Gen Min, Xiangmo Zhao, Zhigang Xu, Licheng Zhang:
Robust Features and Accurate Inliers Detection Framework: Application to Stereo Ego-motion Estimation. 302-320 - Vahid Ghasemi, Ali Akbar Pouyan, Mohsen Sharifi:
Human Activity Recognition in Smart Homes Based on a Difference of Convex Programming Problem. 321-344 - Jun Lee, Jeong-Sik Park, Chung-Pyo Hong, Yong-Ho Seo:
Illumination-Robust Foreground Extraction for Text Area Detection in Outdoor Environment. 345-359 - Yuting Su, Fan Yu, Chengqian Zhang:
Digital Video Steganalysis Based on a Spatial Temporal Detector. 360-373 - Arkadiusz Biernacki:
Improving Video Quality by Diversification of Adaptive Streaming Strategies. 374-395 - LiPing Liu, Linlin Ci, Wei Liu, Hui Yang:
Control Flow Checking at Virtual Edges. 396-413 - Sunghee Lee, Kwangsue Chung:
A Multipath Congestion Control Scheme for High-Quality Multimedia Streaming. 414-435 - Jimin Yu, Lijian Tan, Shangbo Zhou, Liping Wang, Chaomei Wang:
Image Denoising Based on Adaptive Fractional Order Anisotropic Diffusion. 436-450 - Zhihui Wang, Sook Yoon, Dong Sun Park:
A novel visual tracking system with adaptive incremental extreme learning machine. 451-465
- Lihui Lin, Kaizhi Chen, Shangping Zhong:
Enhancing the Session Security of Zen Cart based on HMAC-SHA256. 466-483 - Yixun Hu, Kangfeng Zheng, Xu Wang, Yixian Yang:
WORM-HUNTER: A Worm Guard System using Software-defined Networking. 484-510 - Sirapat Boonkrong:
Internet Banking Login with Multi-Factor Authentication. 511-535 - Wei Li, Zhiyong Gao, Dawu Gu, Chenyu Ge, Linfeng Liao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Whirlpool Hash Function in the Cloud of Things. 536-551 - Xiaofeng Song, Fenlin Liu, Liju Chen, Chunfang Yang, Xiangyang Luo:
Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography. 552-569 - Lahouari Ghouti:
A Perceptually-Adaptive High-Capacity Color Image Watermarking System. 570-595 - Il-Hwan Kim, KyungLyul Lee, Jaehyoun Kim:
Role and Function of the Information Public Law. 596-611
Volume 11, Number 2, February 2017
- Guang Yang, Yewen Cao, Deqiang Wang, Jian Xu, Changlei Wu:
Collaborative Sub-channel Allocation with Power Control in Small Cell Networks. 611-627 - Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Lu Xia, Xiaohui Qi:
Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets. 628-649 - Wen'an Zhou, Jianlong Liu, Yiyu Zhang, Cheng-Yi Yang, Xuhui Yang:
A Novel Resource Scheduling Scheme for CoMP Systems. 650-669 - Qi Liu, Weidong Cai, Qiang Liu, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment. 670-686 - Nannan Sui, Cong Wang, Wei Xie, Youyun Xu:
Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic. 687-708 - Guolin Sun, Sebakara Samuel Rene Adolphe, Hangming Zhang, Guisong Liu, Wei Jiang:
User Bandwidth Demand Centric Soft-Association Control in Wi-Fi Networks. 709-730 - Muhammad Zahid Abbas, Kamalrulnizam Abu Bakar, Muhammad Ayaz, Muhammad Hafiz Mohammed, Moeenuddin Tariq:
Hop-by-Hop Dynamic Addressing Based Routing Protocol for Monitoring of long range Underwater Pipeline. 731-763 - Taekon Kim, Hyungkeun Lee:
Performance Evaluation of the RIX-MAC Protocol for Wireless Sensor Networks. 764-784
- Zheyi Fan, Shuqin Weng, Yajun Zeng, Jiao Jiang, Fengqian Pang, Zhiwen Liu:
Misclassified Samples based Hierarchical Cascaded Classifier for Video Face Recognition. 785-804 - Xiaozhou Zhu, Xin Song, Xiaoqian Chen, Yuzhu Bai, Huimin Lu:
Size Aware Correlation Filter Tracking with Adaptive Aspect Ratio Estimation. 805-825
- Ling Zhao, Mingwu Zhang, Hua Shen, Yudi Zhang, Jian Shen:
Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server. 826-845 - Zehui Wu, Qiang Wei, Kailei Ren, Qingxian Wang:
A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks. 846-864 - Dong Hee Kim, Seungjo Baek, Jongin Lim:
Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle. 865-882 - Muhammad Imran, Bruce A. Harvey:
Block Based Blind & Secure Gray Image Watermarking Technique Based on Discrete Wavelet Transform and Singular Value Decomposition. 883-900 - Abderrahmen Guermazi, Abdelfettah Belghith, Mohamed Abid, Sofien Gannouni:
KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks. 901-923 - Xiaoxue Liu, Yanping Li, Juan Qu, Yong Ding:
A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS. 924-944 - Zhenxing Qian, Shu Dai, Boyang Chen:
Reversible Data Hiding in JPEG Images Using Ordered Embedding. 945-958 - Yilin Ye, Lifa Wu, Zheng Hong, Kangyu Huang:
A Risk Classification Based Approach for Android Malware Detection. 959-981
- Soo Kyun Kim, Shin-Jin Kang, Yoo-Joo Choi, Min-Hyung Choi, Min Hong:
Augmented-Reality Survey: from Concept to Application. 982-1004 - YiNa Jeong, Eun-Hee Jeong, Byung kwan Lee:
An App Visualization design based on IoT Self-diagnosis Micro Control Unit for car accident prevention. 1005-1018 - Jong-Hyun Kim, Jung Lee, Chang-Hun Kim, Sun-Jeong Kim:
Realistic Visual Simulation of Water Effects in Response to Human Motion using a Depth Camera. 1019-1031 - Ha Sung Hwang:
The Influence of personality traits on the Facebook Addiction. 1032-1042 - Tae-young Kim, Suntae Kim, Sangchul Choi, Jeong-Ah Kim, Jae-Young Choi, Jong-Won Ko, Jee-Huong Lee, YoungWha Cho:
A Machine-Learning Based Approach for Extracting Logical Structure of a Styled Document. 1043-1056 - Murad Khan, Bhagya Nathali Silva, Changsu Jung, Kijun Han:
A context-Aware Smart Home Control System based on ZigBee Sensor Network. 1057-1069 - Tsung-Han Lee, Lin-Huang Chang, Wei-Chung Cheng:
Design and Implementation of SDN-based 6LBR with QoS Mechanism over Heterogeneous WSN and Internet. 1070-1088 - Jin Ma, Jongsuk Ruth Lee, Kumwon Cho, Minjae Park:
Design and Implementation of Information Management Tools for the EDISON Open Platform. 1089-1104 - Sangmin Lee:
Evaluation of Mobile Application in User's Perspective: Case of P2P Lending Apps in FinTech Industry. 1105-1117 - Md. Zia Uddin, Jaehyoun Kim:
A Robust Approach for Human Activity Recognition Using 3-D Body Joint Motion Features with Deep Belief Network. 1118-1133 - Se Dong Min, Jiyoung Heo, Youngsun Kong, Yunyoung Nam, Preap Ley, Bong-Keun Jung, Dongik Oh, Wonhan Shin:
Thermal Infrared Image Analysis for Breast Cancer Detection. 1134-1147 - Kyoungsook Kim, Moonsuk Yeon, Byeong-Soo Jeong, Kwanghoon Pio Kim:
A Conceptual Approach for Discovering Proportions of Disjunctive Routing Patterns in a Business Process Model. 1148-1161 - Jae-Gu Lee, Jin Kim, Seonwoo Lee, Young Woong Ko:
A Location Tracking System using BLE Beacon Exploiting a Double-Gaussian Filter. 1162-1179 - Sung-Wook Park, Im-Yeong Lee:
Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment. 1180-1200 - Jung-Yeon Kim, Ye-Rin Cha, Sang-Heon Lee, Bong-Keun Jung:
Development and Evaluation of Tip Pinch Strength Measurement on a Paretic hand Rehabilitation Device. 1201-1216 - Amarmend Dashbalbar, Sang-Min Song, Jung-Won Lee, Byungjeong Lee:
Towards Enacting a SPEM-based Test Process with Maturity Levels. 1217-1233 - Jaekwon Lee, Kisub Kim, Yonghyeon Lee, Jang-Eui Hong, Young-Hoon Seo, Byung-Do Yang, Woosung Jung:
Extracting the Source Code Context to Predict Import Changes using GPES. 1234-1249 - Younghan Kim, Hyunseok Ahn, Changseok Yoon, Yongseok Lim, Seung-ok Lim, Myung-Hyun Yoon:
Implementation of Bistatic Backscatter Wireless Communication System Using Ambient Wi-Fi Signals. 1250-1264
Volume 11, Number 3, March 2017
- Bin Hu, Ning Xie, Tingting Zhao, Xiaotong Zhang:
Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing. 1265-1278 - Yuan Gao, Changping Zhu, Zhixiang Deng, Yibin Tang:
Adaptive Cooperation for Bidirectional Communication in Cognitive Radio Networks. 1279-1300 - Weizhi Zhong, Kunqi Chen, Xin Liu, Jianjiang Zhou:
Holistic Joint Optimal Cooperative Spectrum Sensing and Transmission Based on Cooperative Communication in Cognitive Radio. 1301-1318 - Jaewoo So:
Opportunistic Reporting-based Sensing-Reporting-Throughput Optimization Scheme for Cooperative Cognitive Radio Networks. 1319-1355 - Jing Cao, Junsheng Wu, Wenchao Yang:
Spectrum allocation strategy for heterogeneous wireless service based on bidding game. 1336-1356 - Guangjun Liang, Qi Zhu, Jianfang Xin, Ziyu Pan:
Joint Resource Allocation Scheme for OFDM Wireless-Powered Cooperative Communication Networks. 1357-1372 - Gul Zameen Khan, Ruben Gonzalez, Eun-Chan Park:
On the Design of a WiFi Direct 802.11ac WLAN under a TGn MIMO Multipath Fading Channel. 1373-1392 - Sungryoul Lee:
Sequential Hypothesis Testing based Polling Interval Adaptation in Wireless Sensor Networks for IoT Applications. 1393-1405 - Shaowei Liu, Weimin Lei, Wei Zhang, Xiaoshi Song:
MPMTP-AR: Multipath Message Transport Protocol Based on Application-Level Relay. 1406-1424 - Guowei Lei, Yuanan Liu, Xuefang Xiao:
Analysis of Joint Transmit and Receive Antenna Selection in CPM MIMO Systems. 1425-1440 - Van-Huy Vu, Ibrahim Mashal, Tein-Yaw Chung:
A Novel Bandwidth Estimation Method Based on MACD for DASH. 1441-1461 - Pervez Khan, Niamat Ullah, Hoon Kim:
WBAN MAC Protocols - Non-Saturation Modeling and Performance Analysis. 1462-1476 - Weilong Li, De-Wei Wu, Jia Du, Yang Zhou:
A biologically inspired model based on a multi-scale spatial representation for goal-directed navigation. 1477-1491 - Kwangsoo Kim, Seung-Hun Shin, Byeong-Hee Roh:
Firing Offset Adjustment of Bio-Inspired DESYNC-TDMA to Improve Slot Utilization Performances in Wireless Sensor Networks. 1492-1509 - Shiming He, Weini Zeng, Kun Xie, Hongming Yang, Mingyong Lai, Xin Su:
PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid. 1510-1532 - Tahani Gazdar, Abdelfettah Belghith, Ahmad S. Al-Mogren:
DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks. 1533-1556 - Suchul Lee, Sungil Lee, Jun-Rak Lee:
SPaRe: Efficient SQLite Recovery Using Database Schema Patterns. 1557-1569 - Kyoungsoo Bok, Jinkyung Yun, Yeonwoo Kim, Jongtae Lim, Jaesoo Yoo:
User Reputation computation Method Based on Implicit Ratings on Social Media. 1570-1594
- Yue Ming, Guangchao Wang, Xiaopeng Hong:
Spatial-temporal texture features for 3D human activity recognition using laser-based RGB-D videos. 1595-1613 - Huiwu Luo, Fei Zhao, Shangfeng Chen, Huan-zhang Lu:
A Tree Regularized Classifier - Exploiting Hierarchical Structure Information in Feature Vector for Human Action Recognition. 1614-1632 - Chao Deng, Zhiheng Wang, Xingwang Li, Hui-na Li, Charles Casimiro Cavalcante:
An Improved Remote Sensing Image Fusion Algorithm Based on IHS Transformation. 1633-1649 - Ching-Liang Su:
Ear Recognition by Major Axis and Complex Vector Manipulation. 1650-1669 - Jinghui Chu, Hailan Liang, Zheng Tong, Wei Lu:
Slow Feature Analysis for Mitotic Event Recognition. 1670-1683 - Haiwei Lei, Wenyi Liu, Anhong Wang:
Parallel Deblocking Filter Based on Modified Order of Accessing the Coding Tree Units for HEVC on Multicore Processor. 1684-1699 - Liping Wang, Xiao Zhou, Cheng-You Wang, Baochen Jiang:
Post-Processing for JPEG-Coded Image Deblocking via Sparse Representation and Adaptive Residual Threshold. 1700-1721
- Chaoyuan Cui, Yun Wu, Yonggang Li, Bingyu Sun:
Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism. 1722-1741 - ZahidMehmood, Gongliang Chen, Jianhua Li, Aiiad Albeshri:
An Untraceable ECC-Based Remote User Authentication Scheme. 1742-1760 - Zhengwei Zhang, Lifa Wu, Yunyang Yan, Shaozhang Xiao, Shangbing Gao:
Adaptive reversible image watermarking algorithm based on DE. 1761-1784 - Xiao Zhang, Chengqi Wang, Zhiming Zheng:
An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism. 1785-1801 - Danhui Wang, An Wang:
Bitwise Collision Attack Based on Second-Order Distance. 1802-1819
Volume 11, Number 4, April 2017
- Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong:
A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing. 1820-1840 - Yujin Nam, Jaewoo So, Jinsung Kim:
Interference Mitigation Scheme for Device-to-Device MIMO Communications Underlaying a Cellular Network. 1841-1865 - Sukhwinder Sharma, Rakesh Kumar Bansal, Savina Bansal:
Heterogeneity-aware Energy-efficient Clustering (HEC) Technique for WSNs. 1866-1888 - Xuan-Xinh Nguyen, Dinh-Thuan Do:
An Adaptive-Harvest-Then-Transmit Protocol for Wireless Powered Communications: Multiple Antennas System and Performance Analysis. 1889-1910 - Shengwen Tian, Jianxin Liao, Tonghong Li, Jingyu Wang, Guanghai Cui:
Resilient Routing Overlay Network Construction with Super-Relay Nodes. 1911-1930 - Bo Yin, Siwang Zhou, Shiwen Zhang, Ke Gu, Fei Yu:
On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks. 1931-1953 - Jin Xu, Kai Zhang:
A Low-Complexity CLSIC-LMMSE-Based Multi-User Detection Algorithm for Coded MIMO Systems with High Order Modulation. 1954-1971 - Hao Xu, Li-Ning Xing, Lan Huang:
Regional Science and Technology Resource Allocation Optimization Based on Improved Genetic Algorithm. 1972-1986 - Keol Cho, Ki-Seok Chung:
Self-Adaptive Termination Check of Min-Sum Algorithm for LDPC Decoders Using the First Two Minima. 1987-2001 - M. Ali Lodhi, Abdul Rehman, Meer M. Khan, Muhammad Asfand-e-yar, Faisal Bashir Hussain:
Transient Multipath routing protocol for low power and lossy networks. 2002-2019 - Feng Zhang, Xiaoming Wang, Lichen Zhang, Peng Li, Liang Wang, Wangyang Yu:
Dynamic Adjustment Strategy of n-Epidemic Routing Protocol for Opportunistic Networks: A Learning Automata Approach. 2020-2037 - Jia Zhao, Li Lv, Hui Wang, Hui Sun, Runxiu Wu, Jugen Nie, Zhifeng Xie:
Particle Swarm Optimization based on Vector Gaussian Learning. 2038-2057 - Gongchao Su, Bin Chen, Xiaohui Lin, Hui Wang, Lemin Li:
User Association and Base Station Sleep Management in Dense Heterogeneous Cellular Networks. 2058-2074
- Jeonghwan Gwak, Geunpyo Park, Moongu Jeon:
Viewpoint Invariant Person Re-Identification for Global Multi-Object Tracking with Non-Overlapping Cameras. 2075-2092 - Jia Liu:
Recognizing Actions from Different Views by Topic Transfer. 2093-2108 - Yiling Shen, Ningzhong Liu, Han Sun:
Sparse Representation based Two-dimensional Bar Code Image Super-resolution. 2109-2123 - Ying Tong, Yuehong Shen, Bin Gao, Fenggang Sun, Rui Chen, Yefeng Xu:
A Noisy-Robust Approach for Facial Expression Recognition. 2124-2148
- Chuyu She, Wushao Wen, Quanqi Ye, Kesong Zheng:
Vulnerable Path Attack and its Detection. 2149-2170 - Hyun-Kyo Oh, Sang-Wook Kim:
Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems. 2171-2195 - Zheng Zhao, Fenlin Liu, Daofu Gong:
An SDN based hopping multicast communication against DoS attack. 2196-2218 - Dongmin Kim, Ik Rae Jeong:
Provably-Secure Public Auditing with Deduplication. 2219-2236 - Feng Wang, Bo Han, Lei Niu, Ya Wang:
An Improved Cancelable Fingerprint Template Encryption System Research. 2237-2253 - Ya Liu, Hongbing Wang, Chunlu Wang:
Efficient and Secure Certificateless Proxy Re-Encryption. 2254-2275 - Yong Cheng, Jun Ma, Jiangchun Ren, Songzhu Mei, Zhiying Wang:
UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk. 2276-2291 - Zehong Chen, Peng Zhang, Fangguo Zhang, Jiwu Huang:
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE. 2292-2309
Volume 11, Number 5, May 2017
- Adnan Khalid, Muhammad Shahbaz:
Service Architecture Models For Fog Computing: A Remedy for Latency Issues in Data Access from Clouds. 2310-2345 - Nahid Hamzehee Nia, Sepideh Adabi, Majid Nikougoftar Nategh:
A Coordinated Heuristic Approach for Virtual Network Embedding in Cloud Infrastructure. 2346-2361 - Jiping Liu, Wenxiao Shi, Pengxia Wu:
Joint Routing and Channel Assignment in Multi-rate Wireless Mesh Networks. 2362-2378 - Lei Yang, Chaowei Tang, Heng Wang, Hui Tang:
Multi-path Routing Policy for Content Distribution in Content Network. 2379-2397 - Xi Luo, Ying An:
Neighbor Cooperation Based In-Network Caching for Content-Centric Networking. 2398-2415 - Huan Zhang, Hongjiang Lei, Imran Shafique Ansari, Gaofeng Pan, Khalid A. Qaraqe:
Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels. 2416-2432 - Ngoc Minh Nguyen, Myung Kyun Kim:
Reduced-Pipelined Duty Cycle MAC Protocol (RP-MAC) for Wireless Sensor Network. 2433-2452 - Yahia Zakaria, Lubomir Ivanek, Ivan Glesk:
Propagation Measurements and Estimation of Channel Propagation Models in Urban Environment. 2453-2467 - Lei Quan, Song Xiao, Xiao Xue, Cunbo Lu:
Semi-deterministic Sparse Matrix for Low Complexity Compressive Sampling. 2468-2483 - Lin Li, Yunyi Yan, Libin Jia, Jun Ma:
Constructing Negative Links from Multi-facet of Social Media. 2484-2498 - Sajid M. Sheikh, Riaan Wolhuter, Herman A. Engelbrecht:
A Model for Analyzing the Performance of Wireless Multi-Hop Networks using a Contention-based CSMA/CA Strategy. 2499-2522
- Zhonghua Liu, Gang Liu, Jiexin Pu, Shigang Liu:
Noisy label based discriminative least squares regression and its kernel extension for object identification. 2523-2538 - Kang Qiu, Benshun Yi, Weizhong Li, Taiqi Huang:
Hierarchical Regression for Single Image Super Resolution via Clustering and Sparse Representation. 2539-2554 - Yong Seok Heo, Soochahn Lee, Ho Yub Jung:
Dual Exposure Fusion with Entropy-based Residual Filtering. 2555-2575 - Zhaofeng Zhang, Zemin Wu, Qingzhu Jiang, Lin Du, Lei Hu:
Co-saliency Detection Based on Superpixel Matching and Cellular Automata. 2576-2589 - Xu Zhang, Xiaofeng Wang, Yue Du, Xiaoyan Qin:
Domain Adaptation Image Classification Based on Multi-sparse Representation. 2590-2606 - Jing Sun, Xibiao Cai, Fuming Sun, Richang Hong:
Dual graph-regularized Constrained Nonnegative Matrix Factorization for Image Clustering. 2607-2627
- Md. Abdullah Al Rahat Kutubi, Kazi Md. Rokibul Alam, Rafaf Tahsin, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto:
An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme. 2628-2645 - Hanshu Hong, Yunhao Xia, Zhixin Sun, Ximeng Liu:
Provably secure attribute based signcryption with delegated computation and efficient key updating. 2646-2659 - Jingyi Cui, Jiansheng Guo, Yanyan Huang, Yipeng Liu:
Improved Meet-in-the-Middle Attacks on Crypton and mCrypton. 2660-2679 - Sudha Ellison Mathe, Lakshmi Boppana:
Design and Implementation of a Sequential Polynomial Basis Multiplier over GF(2m). 2680-2700 - Furui Zhan, Nianmin Yao:
Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform. 2701-2722 - Yi Sun, Guangming Tang, Yuan Bian, Xiaoyu Xu:
An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs. 2723-2740 - Weiwei Zhang, Xin Li, Yuzhao Zhang, Ru Zhang, Lixin Zheng:
Robust video watermarking algorithm for H.264/AVC based on JND model. 2741-2761 - Xiaojun Zhang, Chunxiang Xu, Yuan Zhang:
Fuzzy identity-based signature scheme from lattice and its application in biometric authentication. 2762-2777 - Yonghao Gu, Yongfei Wang, Zhen Yang, Yimu Gao:
A Distributed Privacy-Utility Tradeoff Method Using Distributed Lossy Source Coding with Side Information. 2778-2791 - Xiangsong Zhang, Zhenhua Liu:
Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update. 2792-2810
Volume 11, Number 6, June 2017
- Gang Wang, Zhao Yang, Cangzhou Yuan, Peizhen Liu:
Combinatorial Auction-Based Two-Stage Matching Mechanism for Mobile Data Offloading. 2811-2830 - Yanan Tang, Hui Gao, Xin Su, Tiejun Lv:
Joint Destination-Relay Selection and Antenna Mode Selection in Full-Duplex Relay Network. 2831-2847 - Joaquín Aparicio, Juan José Echevarria, Jon Legarda:
A Software Defined Networking Approach to Improve the Energy Efficiency of Mobile Wireless Sensor Networks. 2848-2869 - Qinglei Qi, Wendong Wang, Xiangyang Gong, Xirong Que:
Rules Placement with Delay Guarantee in Combined SDN Forwarding Element. 2870-2888 - Wenjie Yu, Xunbo Li, Xiang Li, Zhi Zeng:
Constrained Relay Node Deployment using an improved multi-objective Artificial Bee Colony in Wireless Sensor Networks. 2889-2909 - Faisal Rehman, Osman Khalid, Nuhman ul Haq, Atta ur Rehman Khan, Kashif Bilal, Sajjad Ahmad Madani:
Diet-Right: A Smart Food Recommendation System. 2910-2925 - Zhiqing Wei, Huici Wu, Zhiyong Feng:
Polygon Approximation Based Cognitive Information Delivery in Geo-location Database Oriented Spectrum Sharing. 2926-2945 - Ying Zhou, Lihua Yang, Longxiang Yang:
Improved Compressed Network Coding Scheme for Energy-Efficient Data Communication in Wireless Sensor Networks. 2946-2962 - Youwei Yuan, Weixin Chen, Guangjie Han, Gangyong Jia:
OLAP4R: A Top-K Recommendation System for OLAP Sessions. 2963-2978 - Xiong Yang, Decai Huang, Zi-Ke Zhang:
Neighborhood coreness algorithm for identifying a set of influential spreaders in complex networks. 2979-2995 - Junseok Song, Kyung Tae Kim, Byung Jun Lee, Sang-Young Kim, Hee Yong Youn:
A novel classification approach based on Naïve Bayes for Twitter sentiment analysis. 2996-3011 - Qin Yu, Kesi Lv, Jie Hu, Kun Yang, Xuemin Hong:
Joint Uplink and Downlink Resource Allocation in Data and Energy Integrated Communication Networks. 3012-3028 - Zhi-Ling Tang, Si-Min Li:
Deep Recurrent Neural Network for Multiple Time Slot Frequency Spectrum Predictions of Cognitive Radio. 3029-3045 - Hamid Reza Boveiri, Raouf Khayami:
Static Homogeneous Multiprocessor Task Graph Scheduling Using Ant Colony Optimization. 3046-3070
- Yesool Cha, Jinman Kim, Byoung-Ha Park, Young-Choong Park, Seong-Dong Kim:
Development of an ICT Car Service Applying a Human-Centered Design. 3071-3085 - Jing-Ying Xiong, Ming Dai, Chunlei Zhao, Ruo-Qiu Wang:
Antiblurry Dejitter Image Stabilization Method of Fuzzy Video for Driving Recorders. 3086-3103 - Thanh Binh Nguyen, Ashish Khare, Nguyen Chi Thanh:
Human Tracking Based On Context Awareness In Outdoor Environment. 3104-3120 - Wenjuan Ma, Shusen Sun:
Deformable Surface 3D Reconstruction from a Single Image by Linear Programming. 3121-3142 - Heekyung Yang, Kyungha Min:
A Multi-Layered Framework for color pastel painting. 3143-3165 - Jiahui Chen, Shaohua Tang, Xinglin Zhang:
HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere. 3166-3187 - Jong-Ho Yun, Myung-Ryul Choi, Sang-Sun Lee:
An image enhancement Method for extracting multi-license plate region. 3188-3207 - Hyeon-Sik Son, Byungin Moon:
A Multi-Level Accumulation-Based Rectification Method and Its Circuit Implementation. 3208-3229
- Xin Su, Xuchong Liu, Jiuchuan Lin, Shiming He, Zhangjie Fu, Wenjia Li:
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining. 3230-3253 - Zhiyuan Zhao, Jianhua Wang:
Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing. 3254-3272 - Jingru Li, Li Yu, Jia Zhao, Chao Luo, Jun Zheng:
TSTE: A Time-variant Stochastic Trust Evaluation Model in Social Networks. 3273-3308
Volume 11, Number 7, July 2017
- Guolin Sun, Guohui Wang, Prince Clement Addo, Guisong Liu, Wei Jiang:
Dynamic Resource Reservation for Ultra-low Latency IoT Air-Interface Slice. 3309-3328 - Jiping Jiao, Lingyu Chen, Xuemin Hong, Jianghong Shi:
A Heuristic Algorithm for Optimal Facility Placement in Mobile Edge Networks. 3329-3350 - Mohammad Z. Masoud, Yousef Jaradat, Ismael Jannoud, Hong Huang:
DRA: Duplication Resolver Algorithm for Power Conservation Utilizing Software Defined Network (SDN). 3351-3369 - Sani Umar Abdullahi, Jian Liu, Seyed Alireza Mohadeskasaei:
Analytical Evaluation of FFR-aided Heterogeneous Cellular Networks with Optimal Double Threshold. 3370-3392 - Zhiyuan Zhao, Xiangru Meng, Yuze Su, Zhentao Li:
Virtual Network Embedding based on Node Connectivity Awareness and Path Integration Evaluation. 3393-3412 - Sungwook Kim:
Repeated Overlapping Coalition Game Model for Mobile Crowd Sensing Mechanism. 3413-3430 - Jing Wang, Mingsheng Ouyang, Wei Liang, Jun Hou, Xiangyang Liu:
Device-to-Device Relay Cooperative Transmission Based on Network Coding. 3431-3445 - Bo Zheng, Hengyang Zhang, Kun Zhuo, Huaxin Wu:
A Multi-Priority Service Differentiated and Adaptive Backoff Mechanism over IEEE 802.11 DCF for Wireless Mobile Networks. 3446-3464 - Longzhe Han, Xuecai Bao, Wenfeng Wang, Xiangsheng Feng, Zuhan Liu, Wenqun Tan:
A Receiver-Driven Loss Recovery Mechanism for Video Dissemination over Information-Centric VANET. 3465-3479 - Yuan Liu, Junjie Chen:
A Collaborative and Predictive Localization Algorithm for Wireless Sensor Networks. 3480-3500 - Hongyuan Gao, Shibo Zhang, Yanan Du, Yu Wang, Ming Diao:
Relay Selection Scheme Based on Quantum Differential Evolution Algorithm in Relay Networks. 3501-3523 - Jianrong Bao, Bin Jiang, Chao Liu, Xianyang Jiang, Minhong Sun:
Optimized Relay Selection and Power Allocation by an Exclusive Method in Multi-Relay AF Cooperative Networks. 3524-3542
- Changguo Li:
Parallel Implementation of the Recursive Least Square for Hyperspectral Image Compression on GPUs. 3543-3557 - Zhaotian Li, Yuesheng Zhu, Guibo Luo, Biao Guo:
A New Copyright Protection Scheme for Depth Map in 3D Video. 3558-3577 - Yiming Xiang, Yi Zhuang, Nan Jiang:
An Efficient Block Index Scheme with Segmentation for Spatio-Textual Similarity Join. 3578-3593 - Minghua Wan, Zhihui Lai:
Feature Extraction via Sparse Difference Embedding (SDE). 3594-3607
- Aly Mohamed El-Semary, Mohamed Mostafa A. Azim, Hossam Diab:
SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map. 3608-3628 - Yang Lu, Gang Wang, Jiguo Li, Jian Shen:
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks. 3629-3647 - Min Dong, Yanli Ren, Xinpeng Zhang:
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing. 3648-3663 - Sanghyun Park, Sang-ug Kang:
Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique. 3664-3677 - Mu Han, Lei Hua, Shidian Ma:
A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET. 3678-3698 - Zhiyuan Zhao, Jianhua Wang:
Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions. 3699-3719 - Jaewook Jung, Jongho Moon, Dongho Won:
Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. 3720-3746 - Jing Yang, Xinsheng Ji, Kaizhi Huang, Ming Yi, Yajun Chen:
AKA-PLA: Enhanced AKA Based on Physical Layer Authentication. 3747-3765
Volume 11, Number 8, August 2017
- Jiao Li, Gongqian Liang, Tianshi Liu:
A Novel Multi-link Integrated Factor Algorithm Considering Node Trust Degree for Blockchain-based Communication. 3766-3788 - Guiguo Feng, Wangmei Guo, Jingliang Gao:
Achievable Rate of Beamforming Dual-hop Multi-antenna Relay Network in the Presence of a Jammer. 3789-3808 - Beakcheol Jang, Wonyong Yoon:
CCDC: A Congestion Control Technique for Duty Cycling WSN MAC Protocols. 3809-3822 - Xiong Gan, Hong Lu, Guangyou Yang:
Energy-Efficient Cooperative Beamforming based CMISO Transmission with Optimal Nodes Deployment in Wireless Sensor Networks. 3823-3840 - Yulun Cheng, Longxiang Yang, Hongbo Zhu:
Virtual Resource Allocation in Virtualized Small Cell Networks with Physical-Layer Network Coding Aided Self-Backhauls. 3841-3861 - Xing Hu, Linhua Ma, Shaocheng Huang, Jinke Huang, Kangning Sun, Tianyu Huang:
Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model. 3862-3888 - Dan Li, Xianbin Wen:
A Range-Based Monte Carlo Box Algorithm for Mobile Nodes Localization in WSNs. 3889-3903 - Shaowei Liu, Weimin Lei, Wei Zhang, Hao Li:
Integration of Multipath Transmission into the IMS Framework. 3904-3917
- Imjae Hwang, Hyuck-Joo Kwon, Ji-Hye Chang, Yeong-Kyu Lim, Cheong Ghil Kim, Woo-Chan Park:
An Effective Viewport Resolution Scaling Technique to Reduce the Power Consumption in Mobile GPUs. 3918-3934 - Jingxiu Zong, Lili Meng, Huaxiang Zhang, Wenbo Wan:
JND-based Multiple Description Image Coding. 3935-3949 - Yiyu Hong, Jongweon Kim:
Retrieval of Non-rigid 3D Models Based on Approximated Topological Structure and Local Volume. 3950-3964 - Sungsoo Lim, Daeho Lee:
Real-Time Eye Tracking Using IR Stereo Camera for Indoor and Outdoor Environments. 3965-3983 - Bin Wang, Chuanjiang Li, Qian Zhang, Jifeng Huang:
An Extended Generative Feature Learning Algorithm for Image Recognition. 3984-4005
- Muhammad Tausif, Javed Ferzund, Sohail Jabbar, Raheela Shahzadi:
Towards Designing Efficient Lightweight Ciphers for Internet of Things. 4006-4024 - Libing Wu, Jing Fan, Yong Xie, Jing Wang:
An Improved Authentication and Key Agreement scheme for Session Initial Protocol. 4025-4042 - Yufei Liu, Dechang Pi:
A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection. 4043-4060
- Hanbyeog Cho, Donghyuk Han, Sungjin Shin, Hyoung Jun Cho, Changsung Lee, Goeun Lim, Mingoo Kang, Jong-Moon Chung:
Handover based on Maximum Cell Residence Time and Adaptive TTT for LTE-R High-Speed Railways. 4061-4076 - Yejin Sohn, Minju Cho, Jongho Paik:
Design of 8K Broadcasting System based on MMT over Heterogeneous Networks. 4077-4091 - Young-Su Ryu, Kyung Won Park, Jungwook Wee, Ki-Won Kwon:
An Efficient 4K and 8K UHD Transmission Scheme on Convergence Networks with Broadcasting and LTE by using Coordinated Multi-Point Transmission System. 4092-4104 - Sangwoo Hahm:
Information Sharing and Creativity in a Virtual Team: Roles of Authentic Leadership, Sharing Team Climate and Psychological Empowerment. 4105-4119 - Nak-Jun Sung, Min Hong, Seung-Hyun Lee, Yoo-Joo Choi:
Simulation of Deformable Objects using GLSL 4.3. 4120-4132 - Yoosin Kim, Yeonjin Ju, SeongGwan Hong, Seung Ryul Jeong:
Practical Text Mining for Trend Analysis: Ontology to visualization in Aerospace Technology. 4133-4145 - Dong Hyuk Jo, Jong Woo Park:
The Determinants of Technology Commercialization Performance of Technology-based SMEs. 4146-4161 - Suhwang Seol, DaeSun Ko, InSung Yeo:
UX Analysis based on TR and UTAUT of Sports Smart Wearable Devices. 4162-4179
Volume 11, Number 9, September 2017
- Weidong Guo, Houyuan Tian, Qing Wang:
Energy Harvesting in Multi-relay Multiuser Networks based on Two-step Selection Scheme. 4180-4196 - Yunhao Xia, Hanshu Hong, Guofeng Lin, Zhixin Sun:
A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction. 4197-4219 - Jiamin Chen, Qi Zhu, Su Zhao:
Interference Management Algorithm Based on Coalitional Game for Energy-Harvesting Small Cells. 4220-4241 - Kui Liu, Changle Li, Chao Guo, Rui Chen:
An Efficient Downlink MAC Protocol for Multi-User MIMO WLANs. 4242-4263 - Donghyun Lee, Jae-Hyun Park, Kwang-Ho Kim, Jeong-Sik Park, Ji-Hwan Kim, Gil-Jin Jang, Unsang Park:
Maximum Likelihood-based Automatic Lexicon Generation for AI Assistant-based Interaction with Mobile Devices. 4264-4279 - Amin Keshavarzi, Abolfazl Toroghi Haghighat, Mahdi Bohlouli:
Adaptive Resource Management and Provisioning in the Cloud Computing: A Survey of Definitions, Standards and Research Roadmaps. 4280-4300 - Sadam M. Alkhalidi, Dong Wang, Zaid A. Al-Marhabi:
Sector-based Charging Schedule in Rechargeable Wireless Sensor Networks. 4301-4319 - Jiawei Nie, Juan Luo, Luxiu Yin:
Energy-aware Multi-dimensional Resource Allocation Algorithm in Cloud Data Center. 4320-4333 - Yao Nie, Chunyan Feng, Fangfang Liu, Caili Guo, Wen Zhao:
Phase Noise Self-Cancellation Scheme Based on Orthogonal Polarization for OFDM System. 4334-4356 - Qiang Ji, Shifeng Zhang, Haoguang Zhao, Tiankui Zhang, Jinlong Cao:
Quantum Bee Colony Optimization and Non-dominated Sorting Quantum Bee Colony Optimization Based Multi-relay Selection Scheme. 4357-4378 - Xiao Yang, Zheng Qin, Binhua Wan, Renwei Zhang, Huihui Wang:
The Improved Velocity-based Models for Pedestrian Dynamics. 4379-4397 - Zhaoshu Tang, Zhenquan Qin, Ming Zhu, Jian Fang, Lei Wang, Honglian Ma:
TOUSE: A Fair User Selection Mechanism Based on Dynamic Time Warping for MU-MIMO Networks. 4398-4417 - Jun Yan, Kegen Yu, Yangqin Cao, Liang Chen:
Attack-Resistant Received Signal Strength based Compressive Sensing Wireless Localization. 4418-4437
- Huanlong Zhang, Jianwei Zhang, Qinge Wu, Xiaoliang Qian, Tong Zhou, Hengcheng Fu:
Extended kernel correlation filter for abrupt motion tracking. 4438-4460 - Sung-Jong Eun, Eun-Young Jung, Dong-Kyun Park, Taeg Keun Whangbo:
Robust Image Similarity Measurement based on MR Physical Information. 4461-4475 - Qian Ji, Liyan Zhang, Zechao Li:
KNN-based Image Annotation by Collectively Mining Visual and Semantic Similarities. 4476-4490 - Min Yuan, Heng Yao, Chuan Qin, Ying Tian:
A Dynamic Hand Gesture Recognition System Incorporating Orientation-based Linear Extrapolation Predictor and Velocity-assisted Longest Common Subsequence Algorithm. 4491-4509 - Ning Sun, Hang Guo, Jixin Liu, Guang Han:
Facial Gender Recognition via Low-rank and Collaborative Representation in An Unconstrained Environment. 4510-4526 - Minwoo Kim, Jonghoon Chun, Sang-Kyun Kim:
Study on 3 DoF Image and Video Stitching Using Sensed Data. 4527-4548 - Zhengyan Zhang, Jingjie Yan, Guanming Lu, Haibo Li, Ning Sun, Qi Ge:
Multiscale Adaptive Local Directional Texture Pattern for Facial Expression Recognition. 4549-4566 - Zhi Zhang, Dongyan Wang, Cheng-You Wang, Xiao Zhou:
Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors. 4567-4587
- Hwankuk Kim, Kyungho Lee, Jongin Lim:
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. 4588-4608 - Bangyi Sun, Jianfeng Chu, Liang Hu, Hongtu Li, Guangkun Shi:
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management. 4609-4623 - Lei Xu, Chungen Xu, Xing Zhang:
A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform. 4624-4640 - Kai Wang, Wei Bao, Yingjie Wang, Xiangrong Tong:
Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking. 4641-4657 - Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Tianling Lu:
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. 4658-4679
Volume 11, Number 10, October 2017
- Shiyu Ji, Liangrui Tang, Chen Xu, Shimo Du, Jiajia Zhu, Hailin Hu:
QoE-aware Energy Efficiency Maximization Based Joint User Access Selection and Power Allocation for Heterogeneous Network. 4680-4697 - Ehsan Mostajeran, Rafidah Md Noor, Mohammad Hossein Anisi, Ismail Ahmedy, Fawad Ali Khan:
A Realistic Path Loss Model for Real-time Communication in the Urban Grid Environment for Vehicular Ad hoc Networks. 4698-4716 - Guolin Sun, Bruce Mareri, Guisong Liu, Xiufen Fang, Wei Jiang:
Big Data Based Dynamic Flow Aggregation over 5G Network Slicing. 4717-4737 - Jing Mao, Chen Chen, Lin Bai, Haige Xiang, Jinho Choi:
Subcarrier and Power Allocation for Multiuser MIMO-OFDM Systems with Various Detectors. 4738-4758 - Abubakari Alidu, Raymond Sabogu-Sumah, Han-Shin Jo:
Optimal Inter-Element Spacing of FD-MIMO Planar Array in Urban Macrocell with Elevation Channel Modelling. 4759-4780 - Tareq Alhmiedat:
Low-power Environmental Monitoring System for ZigBee Wireless Sensor Network. 4781-4803 - Zhimin Liu, Zhangdong Ouyang:
A Learning Automata-based Algorithm for Area Coverage Problem in Directional Sensor Networks. 4807-4822 - Fang Ye, Chunxia Su, Yibing Li, Xu Zhang:
Cross-layer Dynamic Subcarrier Allocation with Adaptive Service Rate Control in SC-FDMA System. 4823-4843 - Anwar Khan, Nadeem Javaid, Ihsan Ali, Mohammad Hossein Anisi, Atiq Ur Rahman, Naeem Bhatti, Muhammad Zia, Hasan Mahmood:
An Energy Efficient Interference-aware Routing Protocol for Underwater WSNs. 4844-4864 - Xiaolin Wu, Bin Zhu, Yang Wang, Yue Rong:
Optimization for Relay-Assisted Broadband Power Line Communication Systems with QoS Requirements Under Time-varying Channel Conditions. 4865-4886 - Zhangguo Shen, Wanliang Wang, Qing Shen, Zechao Li:
Hybrid CSA optimization with seasonal RVR in traffic flow forecasting. 4887-4907 - DonHee Lee, Kyoungro Yoon:
An efficient spatio-temporal index for spatio-temporal query in wireless sensor networks. 4908-4928
- Mayur Rajaram Parate, Kishor M. Bhurchandi:
Structurally Enhanced Correlation Tracking. 4929-4947 - Aram Baek, Kang-Woon Lee, Jae-Gon Kim, Haechul Choi:
Analysis of Implementing Mobile Heterogeneous Computing for Image Sequence Processing. 4948-4967 - Yuesheng Zhu, Yifeng Jiang, Zhuandi Huang, Guibo Luo:
SuperDepthTransfer: Depth Extraction from Image Using Instance-Based Learning with Superpixels. 4968-4986 - Bae-Muu Chang:
Design of Solving Similarity Recognition for Cloth Products Based on Fuzzy Logic and Particle Swarm Optimization Algorithm. 4987-5005 - Xin Wang, Lingling Xu, Yuzhen Zhang, Chen Ning:
A novel hybrid method for robust infrared target detection. 5006-5022 - Fidalcastro A., E. Baburaj:
Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data. 5023-5038
- Haiyang Yu, Yongquan Cai, Shanshan Kong, Zhenhu Ning, Fei Xue, Han Zhong:
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. 5039-5061 - Janghyuk Kauh, Wongi Lim, Koohyung Kwon, Jong-Eon Lee, Jung-Jae Kim, Min-Woo Ryu, Si-Ho Cha:
Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems. 5062-5079 - Qiuhua Wang, Qiuyun Lyu, Xiaojun Wang, Jianrong Bao:
A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation. 5080-5097
- Pusik Park, Rustam Rakhimov Igorevich, Jongho Yoon:
Performance Evaluation of a Method to Improve Fairness in In-Vehicle Non-Destructive Arbitration Using ID Rotation. 5098-5115 - Chao Deng, Kaibin Huang, Yik-Chung Wu, Minghua Xia:
Analysis of RF-DC Conversion Efficiency of Composite Multi-Antenna Rectifiers for Wireless Power Transfer. 5116-5131 - Jin-Lee Lee, Doo-Ho Park, Changhoon Lee:
Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier. 5132-5148 - Kang-Woo Choi, Kang Yi, Chong-Min Kyung:
Lifetime Maximization of Wireless Video Sensor Network Node by Dynamically Resizing Communication Buffer. 5149-5167 - Jong-Moon Chung, Taeyoung Ha, Sung-Woong Jo, Taehyun Kyong, So-Yun Park:
Augmented Reality based Low Power Consuming Smartphone Control Scheme. 5168-5181
Volume 11, Number 11, November 2017
- Sang-Kyun Kim, Nevadita Sahu, Marius Preda:
Beginning of a New Standard: Internet of Media Things. 5182-5199 - Liaoruo Huang, Qingguo Shen, Wenjuan Shao:
Congestion Aware Fast Link Failure Recovery of SDN Network Based on Source Routing. 5200-5222 - Yunong Han, Kun Yang:
Load Aware Automatic Channel Switching for Software-Defined Enterprise WLANs. 5223-5242 - Wentao Wang, Lingxia Wang, Fang Zheng:
An Improved Adaptive Scheduling Strategy Utilizing Simulated Annealing Genetic Algorithm for Data Center Networks. 5243-5263 - Taejoon Kim, Kwanghoon An, Heejung Yu:
Optimal Resource Planning with Interference Coordination for Relay-Based Cellular Networks. 5264-5281 - Huijun Dai, Xiaolin Gui, Zhaosheng Dai, Dewang Ren, Yingjie Gu:
A Bi-Target Based Mobile Relay Selection Algorithm for MCNs. 5282-5300 - Xianling Wang, Min Xiao, Hongyi Zhang, Sida Song:
Modeling and SINR Analysis of Dual Connectivity in Downlink Heterogeneous Cellular Networks. 5301-5323 - Hua Chen, Shan Wu, Ping Hu, Zhudi Xu:
On the Feasibility of Interference Alignment in the Cellular Network. 5324-5337 - Haiwei Zuo, Yanjing Sun, Song Li, Qiang Ni, Xiaolin Wang, Xiaoguang Zhang:
A Medium Access Control Mechanism for Distributed In-band Full-Duplex Wireless Networks. 5338-5359 - Xiaohui Ma, Guobing Li, Guomei Zhang:
A New Dynamic Transmission-Mode Selection Scheme for AMC/HARQ-Based Wireless Networks. 5360-5376 - Yuan Liang, Xinyu Da, Shu Wang:
On Narrowband Interference Suppression in OFDM-based Systems with CDMA and Weighted-type Fractional Fourier Transform Domain Preprocessing. 5377-5391
- Debajyoti Pal, Vajirasak Vanijja:
Model for Mobile Online Video viewed on Samsung Galaxy Note 5. 5392-5418 - Murodjon Abdukholikov, TaegKeun Whangbo:
Fast image stitching method for handling dynamic object problems in Panoramic Images. 5419-5434 - Tahmina Khanam, Kaushik Deb:
Baggage Recognition in Occluded Environment using Boosting Technique. 5436-5458 - Wanli Feng, Yigang Cen, Xianyou Zeng, Zhetao Li, Ming Zeng, Viacheslav V. Voronin:
Object tracking based on adaptive updating of a spatial-temporal context model. 5459-5473 - Waled Hussein Al-Arashi, Wuh Shing Chai, Shahrel Azmin Suandi:
RowAMD Distance: A Novel 2DPCA-Based Distance Computation with Texture-Based Technique for Face Recognition. 5474-5490 - Peng Li, Hongwei Ge, Jinlong Yang:
Novel Partitioning Algorithm for a Gaussian Inverse Wishart PHD Filter for Extended Target Tracking. 5491-5505 - Ningning Hu, Yao Zhao, Huihui Bai:
3D View Synthesis with Feature-Based Warping. 5506-5521 - Gaohua Lin, Yongming Zhang, Qixing Zhang, Yang Jia, Gao Xu, Jinjun Wang:
Smoke detection in video sequences based on dynamic texture using volume local binary patterns. 5522-5536
- Pin-Chang Su, Chien-Hua Tsai:
New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography. 5537-5555 - Jiping Li, Yaoming Ding, Zenggang Xiong, Shouyin Liu:
An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks. 5556-5573 - Weipeng Guo, Yonghong Chen, Yiqiao Cai, Tian Wang, Hui Tian:
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. 5574-5591 - Xiaofeng Ma, Yi Zhang, Xiaofeng Song, Chao Fan:
Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection. 5592-5609 - Zhangkai Luo, Huali Wang, Kaijie Zhou:
Physical Layer Security Scheme Based on Polarization Modulation and WFRFT Processing for Dual-polarized Satellite Systems. 5610-5624 - Lunzhi Deng, Yixian Yang, Yuling Chen:
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group. 5625-5641 - Hongwei Tang, Shengzhong Feng, Xiaofang Zhao, Yan Jin:
VirtAV: an Agentless Runtime Antivirus System for Virtual Machines. 5642-5670 - Zhuolin Mei, Bin Wu, Shengli Tian, Yonghui Ruan, Zongmin Cui:
Fuzzy Keyword Search Method over Ciphertexts supporting Access Control. 5671-5693
Volume 11, Number 12, December 2017
- Walaa Hashem, Heba Nashaat, Rawya Rizk:
Honey Bee Based Load Balancing in Cloud Computing. 5694-5711 - Qingyong Deng, Xueming Li, Zhetao Li, Anfeng Liu, Young-June Choi:
Electricity Cost Minimization for Delay-tolerant Basestation Powered by Heterogeneous Energy Source. 5712-5728 - Cheng Wu, Lujie Wang, Yiming Wang:
A Competition-based Algorithm for Routing Discovery and Repair in Large-scale VANET. 5729-5744 - Wonwoo Lee, Hyungkyu Yang, Beakcheol Jang:
A High Isolation 4 by 4 MIMO Antenna for LTE Mobile Phones using Coupling Elements. 5745-5758 - Yingmo Jie, Mingchu Li, Tingting Tang, Cheng Guo:
Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network. 5759-5779 - Frederic Nzanywayingoma, Yang Yang:
Effective Task Scheduling and Dynamic Resource Optimization based on Heuristic Algorithms in Cloud Computing Environment. 5780-5802 - Weidang Lu, Chenxin He, Yuanrong Lin, Hong Peng, Xin Liu:
Contract Theory Based Cooperative Spectrum Sharing with Joint Power and Bandwidth Optimization. 5803-5819 - Yuli Zhang, Yuhua Xu, Qihui Wu:
Opportunistic Spectrum Access with Dynamic Users: Directional Graphical Game and Stochastic Learning. 5820-5834 - Fasee Ullah, Abdul Hanan Abdullah, Gaddafi Abdul-Salaam, Marina Md Arshad:
CDASA-CSMA/CA: Contention Differentiated Adaptive Slot Allocation CSMA-CA for Heterogeneous Data in Wireless Body Area Networks. 5835-5854 - Sang-Kon Kim, Taekon Kim, Hyungkeun Lee:
A Novel Transmission Scheme for Compressed Health Data Using ISO/IEEE11073-20601. 5855-5877 - Taeyeun Kim, Sanghyun Bae:
Designing an Intelligent Rehabilitation Wheelchair Vehicle System Using Neural Network-based Torque Control Algorithm. 5878-5904 - Yongheng Chen, Yaojin Lin, Wanli Zuo:
Phrase-based Topic and Sentiment Detection and Tracking Model using Incremental HDP. 5905-5926 - Narisa Zhao, Xiaojun Liu:
Information Propagation in Social Networks with Overlapping Community Structure. 5927-5942 - Zhenwei Xie, Qi Zhu, Su Zhao:
Resource Allocation Algorithm Based on Simultaneous Wireless Information and Power Transfer for OFDM Relay Networks. 5943-5962
- Siqi Zhou, Feng Xu, Ping Ping, Zaipeng Xie, Xin Lyu:
Non-square colour image scrambling based on two-dimensional Sine-Logistic and Hénon map. 5963-5980 - Jeonho Kang, Dongjin Kang, Kyuheon Kim:
Method of DASH segments into a MMTP stream for switching contents under a hybrid broadcasting environment. 5981-5997 - Jeong-Chan Jin, Young-Jin Kim:
Human Visual System-aware Dimming Method Combining Pixel Compensation and Histogram Specification. 5998-6016 - Yenewondim Biadgie, Minsung Kim, Kyung-Ah Sohn:
Multi-resolution Lossless Image Compression for Progressive Transmission and Multiple Decoding Using an Enhanced Edge Adaptive Hierarchical Interpolation. 6017-6037 - Jong-Seol Lee, Dalwon Jang, Kyoungro Yoon:
Automatic melody extraction algorithm using a convolutional neural network. 6038-6053 - Hoon Ko, Chang-Hoon Lee, Kwanmoon Jeong, Myeung Su Lee, Yunyoung Nam, Kwon-Ha Yoon, Jinseok Lee:
A Pilot Study on Hip Bone Mineral Densities Estimation from Forearm CBCT images. 6054-6068 - Zahid Mahmood, Tauseef Ali, Muhammad Nazeer, Nargis Bibi, Imran Shahzad, Shoaib Azmat:
EAR: Enhanced Augmented Reality System for Sports Entertainment Applications. 6069-6091
- Reinhard Behrens, Ali Ahmed:
A Security Architecture for the Internet of Things. 6092-6115 - Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Ping Zheng:
Identity Based Proxy Re-encryption Scheme under LWE. 6116-6132 - Zahid Ali, Unsang Park, Jongho Nang, Jeong-Seon Park, Taehwa Hong, Sungjoo Park:
Periocular Recognition Using uMLBP and Attribute Features. 6133-6151 - Sungju Lee, Jaewon Sa, Hyeonjoong Cho, Daihee Park:
Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application. 6152-6168 - Ling Xiong, Daiyuan Peng, Tu Peng, Hongbin Liang:
An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. 6169-6187 - Hongfeng Zhu:
A Novel Two-party Scheme against Off-line Password Guessing Attacks using New Theorem of Chaotic maps. 6187-6204
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.