


default search action
The Journal of Information Processing Systems, Volume 13
Volume 13, Number 1, 2017
- Jong Hyuk Park:

Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016. 1-7 - Ramin Tadayon, Troy McDaniel, Sethuraman Panchanathan:

A Survey of Multimodal Systems and Techniques for Motor Learning. 8-25 - Olivier Deschambault, Abdelouahed Gherbi

, Christian Légaré:
Efficient Implementation of the MQTT Protocol for Embedded Systems. 26-39 - Sid Ahmed Elhannachi, Nacéra Benamrane, Abdelmalik Taleb-Ahmed:

Adaptive Medical Image Compression Based on Lossy and Lossless Embedded Zerotree Methods. 40-56 - Mukta Goyal

, Divakar Yadav
, Alka Tripathi
:
An Intuitionistic Fuzzy Approach to Classify the User Based on an Assessment of the Learner's Knowledge Level in E-Learning Decision-Making. 57-67 - Bang Nguyen Van, Suk-Hwan Lee, Ki-Ryong Kwon:

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map. 68-82 - Han Cui, Wenjuan Peng:

Joint Estimation of Near-Field Source Parameters and Array Response. 83-94 - Min Choi, Jong Hyuk Park:

Feasibility and Performance Analysis of RDMA Transfer through PCI Express. 95-103 - V. Anand

, N. Sairam:
Parallel and Sequential Implementation to Minimize the Time for Data Transmission Using Steiner Trees. 104-113 - Xiaoyan Wang, Cheng-You Wang

, Xiao Zhou
, Zhiqiang Yang:
Color Image Coding Based on Shape-Adaptive All Phase Biorthogonal Transform. 114-127 - Moustafa Kouider Elouahed, Hafid Haffaf:

Self-Identification of Boundary's Nodes in Wireless Sensor Networks. 128-140 - Dengao Li, Gang Wu, Jumin Zhao, Wen-Hui Niu, Qi Liu:

Wireless Channel Identification Algorithm Based on Feature Extraction and BP Neural Network. 141-151 - Ghazli Abdelkader, Naima Hadj-Said, Ali Pacha Adda:

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication. 152-173 - Tusar Kanti Mishra

, Banshidhar Majhi, Ratnakar Dash:
A Contour Descriptors-Based Generalized Scheme for Handwritten Odia Numerals Recognition. 174-183 - Pradip Kumar Sharma

, Seo Yeon Moon, Jong Hyuk Park:
Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City. 184-195
Volume 13, Number 2, 2017
- Jong Hyuk Park:

Advances in Algorithm, Multimedia, and Network for Future IT. 197-203 - Ning Yu, Zeng Yu, Feng Gu

, Tianrui Li
, Xinmin Tian, Yi Pan
:
Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches. 204-214 - Amghar Yasmina Teldja, Fizazi Hadria

:
A Hybrid Bacterial Foraging Optimization Algorithm and a Radial Basic Function Network for Image Classification. 215-235 - Syed Mushhad Mustuzhar Gilani

, Tang Hong, Qiqi Cai, Guofeng Zhao:
Mobility Scenarios into Future Wireless Access Network. 236-255 - Ingyu Lee, Byungin Moon

:
An Improved Stereo Matching Algorithm with Robustness to Noise Based on Adaptive Support Weight. 256-267 - Sarah Hachemi Benziane, Abdelkader Benyettou

:
Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization. 268-283 - Wonhee Cho, Eunmi Choi:

DTG Big Data Analysis for Fuel Consumption Estimation. 285-304 - Wenzhuo Zhang, Rong Zhou, Yuan-Wen Zou:

Self-adaptive and Bidirectional Dynamic Subset Selection Algorithm for Digital Image Correlation. 305-320 - Wafaa Benhabib, Fizazi Hadria

:
A Multi-Objective TRIBES/OC-SVM Approach for the Extraction of Areas of Interest from Satellite Images. 321-339 - Salima Lalani, Dharmapal Dronacharya Doye:

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System. 340-347 - Sungheo Kim, Kwang-il Hwang:

Design of Real-Time CAN Framework Based on Plug and Play Functionality. 348-359 - Rui Qi, Yujie Zhang, Hongwei Li:

Block Sparse Signals Recovery via Block BacktrackingBased Matching Pursuit Method. 360-369 - Amel Tehami, Fizazi Hadria

:
Unsupervised Segmentation of Images Based on Shuffled Frog-Leaping Algorithm. 370-384 - Heng Zhang

, Cheng-You Wang
, Xiao Zhou
:
Fragile Watermarking Based on LBP for Blind Tamper Detection in Images. 385-399 - Babu Kaji Baniya

, Joonwhoan Lee:
Rough Set-Based Approach for Automatic Emotion Classification of Music. 400-416 - Mingyue Zhou, Xiaohui Zhao:

A Power Allocation Algorithm Based on Variational Inequality Problem for Cognitive Radio Networks. 417-427
Volume 13, Number 3, 2017
- Jong Hyuk Park:

New Approaches to Advanced Network and Image Processing. 429-434 - Witold Pedrycz:

Granular Bidirectional and Multidirectional Associative Memories: Towards a Collaborative Buildup of Granular Mappings. 435-447 - Liping Wang

, Cheng-You Wang
, Xiao Zhou
:
Blind Image Quality Assessment on Gaussian Blur Images. 448-463 - Hee-Hyung Bu, Namchul Kim, Chae-Joo Moon, Jong-Hwa Kim:

Content-Based Image Retrieval Using Combined Color and Texture Features Extracted by Multi-resolution Multi-direction Filtering. 464-475 - Suresh B. Rathod

, Vuyyuru Krishna Reddy
:
NDynamic Framework for Secure VM Migration over Cloud Computing. 476-490 - Phuong Chu, Seoungjae Cho, Sungdae Sim, Kiho Kwak, Kyungeun Cho:

A Fast Ground Segmentation Method for 3D Point Cloud. 491-499 - Liquan Zhao, Nan Chen:

An Improved Zone-Based Routing Protocol for Heterogeneous Wireless Sensor Networks. 500-517 - Hyeong-Il Kim, HyeonSik Yang, Min Yoon, Jae-Woo Chang:

Development of a CUBRID-Based Distributed Parallel Query Processing System. 518-532 - Qingbin Meng, Xiaoqiang Yu, Chunlong Yao, Xu Li, Peng Li, Xin Zhao:

Improvement of OPW-TR Algorithm for Compressing GPS Trajectory Data. 533-545 - Hoejung Jung, Namgi Kim:

Multicast Tree Construction with User-Experienced Quality for Multimedia Mobile Networks. 546-558 - Manmeet Mahinderjit Singh

, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin
, Nurul Hashimah Ahamed Hassain Malim
:
Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution. 559-572 - Taipeng Zhu, Xianxia Zou, Jiuhui Pan:

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud. 573-589 - Jae-Hyun Jun, Min-Jun Kim, Yong-Suk Jang, Sung-Ho Kim:

Fire Detection Using Multi-Channel Information and Gray Level Co-occurrence Matrix Image Features. 590-598 - Suhad A. Ali

, Majid Jabbar Jawad, Mohammed Abdullah Naser
:
Copyright Protection for Digital Image by Watermarking Technique. 599-617 - Shunyi Gan, Jipeng Zhou, Kaimin Wei:

HESnW: History Encounters-Based Spray-and-Wait Routing Protocol for Delay Tolerant Networks. 618-629 - In-Ho Lee, Howon Lee:

Achievable Rate Analysis for Opportunistic Non-orthogonal Multiple Access-Based Cooperative Relaying Systems. 630-642
Volume 13, Number 4, 2017
- Jong Hyuk Park:

Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning. 643-652 - Carlos Porcel, Alberto Ching-López, Juan Bernabé-Moreno, Álvaro Tejeda-Lorente

, Enrique Herrera-Viedma:
Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries. 653-667 - Jeong-Joon Kim:

Hadoop Based Wavelet Histogram for Big Data in Cloud. 668-676 - Huamei Zhang, Dongdong Li, Jinlong Zhao, Haitao Wang:

Time-Delay and Amplitude Modified BP Imaging Algorithm of Multiple Targets for UWB Through-the-Wall Radar Imaging. 677-688 - Bharti Nagpal, Naresh Chauhan

, Nanhay Singh
:
A Survey on the Detection of SQL Injection Attacks and Their Countermeasures. 689-702 - Sanjeev Kumar, Mahesh Chandra

:
Detection of Microcalcification Using the Wavelet Based Adaptive Sigmoid Function and Neural Network. 703-715 - Alim Murat, Osman Turghun, Yating Yang, Xi Zhou, Lei Wang, Xiao Li:

Using Semantic Knowledge in the Uyghur-Chinese Person Name Transliteration. 716-730 - Daewon Kim:

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications. 731-751 - Md. Majharul Haque, Suraiya Pervin, Zerina Begum:

An Innovative Approach of Bangla Text Summarization by Introducing Pronoun Replacement and Improved Sentence Ranking. 752-777 - Ruchika Malhotra, Ravi Jangra:

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques. 778-804 - Peili Tang, Jing Zhao, Zhengtao Yu, Zhuo Wang, Yantuan Xian:

A Method of Chinese and Thai Cross-Lingual Query Expansion Based on Comparable Corpus. 805-817 - MinhPhuoc Hong, Kyoungsu Oh:

Real-Time Motion Blur Using Triangular Motion Paths. 818-833 - Abderrahmane Khiat, Moussa Benaissa:

Boosting the Reasoning-Based Approach by Applying Structural Metrics for Ontology Alignment. 834-851 - Sangita D. Bharkad, Manesh Kokare:

Fingerprint Matching Based on Dimension Reduced DCT Feature Vectors. 852-862 - Xu Li, Chunlong Yao, Fenglong Fan, Xiaoqiang Yu:

A Text Similarity Measurement Method Based on Singular Value Decomposition and Semantic Relevance. 863-875 - Green Bang, Jinsuk Yang, Kyoungsu Oh, IlJu Ko:

Interactive Experience Room Using Infrared Sensors and User's Poses. 876-892 - Rajiv Kumar

, Kiran Kumar Ravulakollu, Rajesh Bhat:
Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script. 893-913 - Jiehua Wu, Guoji Zhang, Ya-Zhou Ren

, Xia-Yan Zhang, Qiao Yang:
Weighted Local Naive Bayes Link Prediction. 914-927 - B. G. Nagaraja

, Haradagere Siddaramaiah Jayanna:
Combination of Classifiers Decisions for Multilingual Speaker Identification. 928-940 - Mohammad M. Tajwar, Md. Nuruddin Pathan, Latifa Hussaini, Adamu I. Abubakar:

CPU Scheduling with a Round Robin Algorithm Based on an Effective Time Slice. 941-950 - Homin Han, Soyoung Park:

Traffic Information Service Model Considering Personal Driving Trajectories. 951-969 - Sanjeet Kumar Nayak

, Sujata Mohanty
, Banshidhar Majhi:
CLB-ECC: Certificateless Blind Signature Using ECC. 970-986 - Muhammad Azam Zia, Zhongbao Zhang, Liutong Chen, Haseeb Ahmad, Sen Su:

Identifying Influential People Based on Interaction Strength. 987-999 - Yugal Kumar

, Gadadhar Sahoo
:
An Improved Cat Swarm Optimization Algorithm Based on Opposition-Based Learning and Cauchy Operator for Clustering. 1000-1013 - Shailendra Rathore, Pradip Kumar Sharma

, Jong Hyuk Park:
XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs. 1014-1028 - Gajanan R. Patil, Vishwanath K. Kokate:

A Joint Channel Estimation and Data Detection for a MIMO Wireless Communication System via Sphere Decoding. 1029-1042
Volume 13, Number 5, 2017
- Jong Hyuk Park:

Efficient Approaches to Computer Vision and Pattern Recognition. 1043-1051 - Zilong Jiang, Shu Gao, Wei Dai:

A CTR Prediction Approach for Text Advertising Based on the SAE-LR Deep Neural Network. 1052-1070 - In-Ho Lee, Hyun-Ho Choi, Howon Lee:

Outage Performance of Selective Dual-Hop MIMO Relaying with OSTBC and Transmit Antenna Selection in Rayleigh Fading Channels. 1071-1088 - Sangeeta Sabharwal, Manuj Aggarwal

:
Test Set Generation for Pairwise Testing Using Genetic Algorithms. 1089-1102 - Chaveevan Pechsiri, Sumran Painuall, Rapepun Piriyakul:

Extraction of ObjectProperty-UsageMethod Relation from Web Documents. 1103-1125 - Koo-Joo Kwon, Byeong-Seok Shin:

3D Segmentation for High-Resolution Image Datasets Using a Commercial Editing Tool in the IoT Environment. 1126-1134 - P. Iswarya

, V. Radha
:
Speech Query Recognition for Tamil Language Using Wavelet and Wavelet Packets. 1135-1148 - Youjun Xu:

An Algorithm Solving SAT Problem Based on Splitting Rule and Extension Rule. 1149-1157 - Fei Hao

, Dae-Soo Sim, Doo-Soon Park, Hyung-Seok Seo:
Similarity Evalution between Graphs: A Formal Concept Analysis Approach. 1158-1167 - Yuhui Zheng, Kai Ma, Qiqiong Yu, Jianwei Zhang, Jin Wang

:
Regularization Parameter Selection for Total Variation Model Based on Local Spectral Response. 1168-1182 - Rajesh Pandurang Borole, Sanjiv Vedu Bonde:

Image Restoration and Object Removal Using Prioritized Adaptive Patch-Based Inpainting in a Wavelet Domain. 1183-1202 - Bayu Adhi Tama

, Kyung Hyune Rhee:
A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network. 1203-1212 - Pheerasut Boonmatham

, Sunee Pongpinigpinyo, Tasanawan Soonklang:
Thai Classical Music Matching using t-Distribution on Instantaneous Robust Algorithm for Pitch Tracking Framework. 1213-1228 - Jagadeesh Kakarla, Banshidhar Majhi, Ramesh Babu Battula

:
IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN. 1229-1242 - Ming Lv, Jingchen Zheng, Qingying Tong, Jinhong Chen, Haoting Liu, Yun Gao:

Modeling and Simulation of Scheduling Medical Materials Using Graph Model for Complex Rescue. 1243-1258 - Jeong-Joon Kim:

Spatio-temporal Sensor Data Processing Techniques. 1259-1276 - Shu-I Chiu, Kuo-Wei Hsu:

Efficiently Processing Skyline Query on Multi-Instance Data. 1277-1298 - Sangjin Hong, Kyungrog Kim, Nammee Moon:

Sector Based Multiple Camera Collaboration for Active Tracking Applications. 1299-1319 - Fuquan Zhang, Deming Gao, Inwhee Joe:

A Tier-Based Duty-Cycling Scheme for Forest Monitoring. 1320-1330 - Geeta Kasana

, Kulbir Singh
, Satvinder Singh Bhatia:
Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform. 1331-1344 - Doosung Hwang, Daewon Kim:

Nearest Neighbor Based Prototype Classification Preserving Class Regions. 1345-1357 - Zhijie Yan, Yanling Wang

, Likai Liang:
Analysis on Ampacity of Overhead Transmission Lines Being Operated. 1358-1371 - Hee-Hyung Bu, Namchul Kim, Bae-Ho Lee, Sung-Ho Kim:

Content-based Image Retrieval Using Texture Features Extracted from Local Energy and Local Correlation of Gabor Transformed Images. 1372-1381 - Heng Zhang

, Cheng-You Wang
, Xiao Zhou
:
An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform. 1382-1396 - Mohamed Abdel Fattah:

A Novel Statistical Feature Selection Approach for Text Categorization. 1397-1409 - Youn-Hee Han, Hyun-kyo Lim, Joon-Min Gil:

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things. 1410-1429
Volume 13, Number 6, 2017
- Jong Hyuk Park:

Efficient Approaches to Computer Vision and Pattern Recognition. 1431-1435 - Mehdi Imani

, Majid Joudaki
, Hamid R. Arabnia, Niloofar Mazhari:
A Survey on Asynchronous Quorum-Based Power Saving Protocols in Multi-Hop Networks. 1436-1458 - Kerang Cao, Hyunju Lee, Hoekyung Jung:

Task Management System According to Changes in the Situation Based on IoT. 1459-1466 - Yongli Liu, Tianyi Duan, Xing Wan, Hao Chao:

A Mixed Co-clustering Algorithm Based on Information Bottleneck. 1467-1486 - Young Gon Kim, Dong Hoon Kim, Eun-Kyu Lee:

Designing Test Methods for IT-Enabled Energy Storage System to Evaluate Energy Dynamics. 1487-1495 - Abdelhak Mansoul, Baghdad Atmani:

Combining Multi-Criteria Analysis with CBR for Medical Decision Support. 1496-1515 - JunHee Kim, Yoojae Won

:
Patch Integrity Verification Method Using Dual Electronic Signatures. 1516-1526 - Xiaohan Sun

, Junying Zhang:
miRNA Pattern Discovery from Sequence Alignment. 1527-1543 - Minho Jeong, Sanghyun:

A Network Coding-Aware Routing Mechanism for Time-Sensitive Data Delivery in Multi-Hop Wireless Networks. 1544-1553 - Paul S. Fisher, Nawaf Aljohani, Jinsuk Baek:

Generation of Finite Inductive, Pseudo Random, Binary Sequences. 1554-1574 - Jeong-Joon Kim:

Transaction Processing Method for NoSQL Based Column. 1575-1584 - Cheng-You Wang

, Yunpeng Zhang
, Xiao Zhou
:
Review on Digital Image Watermarking Based on Singular Value Decomposition. 1585-1601 - BeomSeok Kim:

A Distributed Coexistence Mitigation Scheme for IoT-Based Smart Medical Systems. 1602-1612 - Vera Suryani, Selo Sulistyo

, Widyawan:
Internet of Things (IoT) Framework for Granting Trust among Objects. 1613-1627 - Dayou Jiang

, Jongweon Kim:
Texture Image Retrieval Using DTCWT-SVD and Local Binary Pattern Features. 1628-1639 - Jeonghoon Kwak, Yunsick Sung:

Beacon-Based Indoor Location Measurement Method to Enhanced Common Chord-Based Trilateration. 1640-1651

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














