


Остановите войну!
for scientists:


default search action
KSII Transactions on Internet and Information Systems, Volume 13
Volume 13, Number 1, January 2019
- Junliang Chen, Gang Wang, Fuxiang Wang:
A Chinese Restaurant Game for Distributed Cooperative Caching in Small Cell Networks. 0 - Il-Yeup Ahn, Nak-Myoung Sung, Jae-Hyun Lim, Jeongwook Seo, Il Dong Yun:
Development of an oneM2M-compliant IoT Platform for Wearable Data Collection. 1-15 - Song Li, Shuo Li, Yanjing Sun:
Power allocation for full-duplex NOMA relaying based underlay D2D communications. 16-33 - Cao Tho Phan, Duy Duong Pham, Hoang Vu Tran, Trung Viet Tran
, Phat Nguyen Huu
:
Applying the IoT platform and green wave theory to control intelligent traffic lights system for urban areas in Vietnam. 34-51 - Yun Zhong, Peiyang Yao, Lujun Wan, Yeming Xiong:
Optimal Placement of CRNs in Manned/ Unmanned Aerial Vehicle Cooperative Engagement System. 52-68 - Lina Wang, Linlin Li, Rui Qiu:
Edge Computing-based Differential Positioning Method for BeiDou Navigation Satellite System. 69-85 - Ismail Hababeh
, Anton Thabain, Sahel Alouneh
:
An Effective Multivariate Control Framework for Monitoring Cloud Systems Performance. 86-109 - Yunjia Xu, Kaizhi Huang, Xin Hu, Yi Zou, Yajun Chen, Wenyu Jiang:
CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI. 110-132 - Seung Chul Han, Ki Won Nam:
An Optimal Peer Selection Algorithm for Mesh-based Peer-to-Peer Networks. 133-151 - Li Li, Xiaoxiong Zhong
, Yong Jiang:
IAR-GT: An Incentive Aware Routing based on Game Theory for Selfish Opportunistic Networks. 152-171 - Jie Yang, Ehsan Mostafapour
, Amir Aminfar, Jie Wang, Hao Huang, Afsaneh Akhbari:
Channel Fading Effect Analysis on Diffusion Cooperation Strategies over Adaptive Networks. 172-185 - Yi-Kang Kim, Choong-Ho Cho, Seok-Ho Yoon, Seung-Yeon Kim:
Performance Analysis of S-SFR-based OFDMA Cellular Systems. 186-205 - Shan Lu, Jun Zhang, Xianmin Ma, Changju Kan:
Efficient Kernel Based 3-D Source Localization via Tensor Completion. 206-221 - Pengxiang Li, Yuehong Gao, Zhidu Li
, Dacheng Yang:
Pilot Sequence Assignment for Spatially Correlated Massive MIMO Circumstances. 237-253 - Kamal Al-Sabahi, Zuping Zhang, Kang Yang:
Latent Semantic Analysis Approach for Document Summarization Based on Word Embeddings. 254-276 - Yuexia Zhang, Hang Chen, Shuang Chen, Jiacheng Jin:
Surface Centroid TOA Location Algorithm for VLC System. 277-290
- Jongmin Lee, Joohyung Lee, Jeongyeon Lim, Maro Kim:
Bandwidth-Efficient Live Virtual Reality Streaming Scheme for Reducing View Adaptation Delay. 291-304 - Benxuan Wang, Jun Kong, Min Jiang, Jianyu Shen, Tianshan Liu, Xiaofeng Gu:
Adaptive Weight Collaborative Complementary Learning for Robust Visual Tracking. 305-326 - Wenqian Dong, Song Xiao:
An Adaptive Weighted Regression and Guided Filter Hybrid Method for Hyperspectral Pansharpening. 327-346 - Rui Hao, Yan Qiang, Xiaolei Liao, Xiaofei Yan, Guo-hua Ji:
An automatic detection method for lung nodules based on multi-scale enhancement filters and 3D shape features. 347-370 - Shuai Li, Xiaoguang Fan, Yuelei Xu, Jinke Huang:
Adaptive V1-MT model for motion perception. 371-384 - Daehyeok Gwon, Haechul Choi:
Relative SATD-based Minimum Risk Bayesian Framework for Fast Intra Decision of HEVC. 385-405
- Muhammad Imran Tariq
:
Agent Based Information Security Framework for Hybrid Cloud Computing. 406-434 - Guoyong Han, Wenying Zhang, Hongluan Zhao:
An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers. 435-451 - Jinhua Liu, Yunbo Rao:
Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain. 452-472
Volume 13, Number 2, February 2019
- Shikuan Li, Zipeng Li, Xiaohu Ge, Yonghui Li:
Uplinks Analysis and Optimization of Hybrid Vehicular Networks. 473-493 - Xucheng Zhu, Yuhua Xu, Xin Liu, Yuli Zhang, Youming Sun:
Hypergraph Game Theoretic Solutions for Load Aware Dynamic Access of Ultra-dense Small Cell Networks. 494-513 - Guolin Sun, Hisham Al-Ward
, Gordon Owusu Boateng
, Wei Jiang:
Content-Aware D2D Caching for Reducing Visiting Latency in Virtualized Cellular Networks. 514-535 - Amna Zafar, Ali Hammad Akbar, Beenish Ayesha Akram:
Inter-Process Correlation Model based Hybrid Framework for Fault Diagnosis in Wireless Sensor Networks. 536-564 - Xiaofei Di:
Achievable Rate Region Bounds and Resource Allocation for Wireless Powered Two Way Relay Networks. 565-581 - Yue Zhao, Bo Tian, Zhouguo Chen, Jin Yang, Saifei Li:
A Relay-assisted Secure Handover Mechanism for High-speed Trains. 582-596 - Jian Yang
, Chongchong Zhao, Chao Li, Chunxiao Xing
:
An Efficient Indexing Structure for Multidimensional Categorical Range Aggregation Query. 597-618 - Xiaojian He, Ximeng Chen, Kangzi Li:
A Decentralized and Non-reversible Traceability System for Storing Commodity Data. 619-634 - Hongbing Huang, Junyi Liu, Yi Zhang, Qing Cai, Bowei Zhang, Fengwen Jiang:
Degrees of Freedom of Multi-Cell MIMO Interference Broadcast Channels With Distributed Base Stations. 635-656 - Tingping Zhang, Shangang Fan, Yunyi Li
, Guan Gui, Yimu Ji:
Tucker Modeling based Kronecker Constrained Block Sparse Algorithm. 657-667 - Almetwally M. Mostafa
, Ahmed E. Youssef
, Yazeed Ali Aljarbua:
Bidirectional Chain Replication for Higher Throughput Provision. 668-685 - José Márquez, Ismael Gutiérrez, Sebastián Valle, Melanis Falco:
Packet Output and Input Configuration in a Multicasting Session Using Network Coding. 686-710 - Qian Zeng, Wei Huangfu, Tong Liu:
Power Allocation and Mode Selection in Unmanned Aerial Vehicle Relay Based Wireless Networks. 711-732 - Piyawad Kasabai, Karim Djemame
, Somnuk Puangpronpitag
:
Priority-based Scheduling Policy for OpenFlow Control Plane. 733-750
- Minhaz Uddin Ahmed, Kim Yeong Hyeon, Kim Jin Woo, Md. Rezaul Bashar, Phill-Kyu Rhee:
Two person Interaction Recognition Based on Effective Hybrid Learning. 751-770 - Jun Kong, Jinhua Sun, Min Jiang, Jian Hou:
A Novel Text Sample Selection Model for Scene Text Detection via Bootstrap Learning. 771-789 - Jae-Yung Lee, Sung-Jun Yoon, Jae-Gon Kim, Jong-Ki Han
:
Weighted DCT-IF for Image up Scaling. 790-809 - Xia Li, Guanming Lu, Jingjie Yan, Haibo Li, Zhengyan Zhang, Ning Sun, Shipeng Xie:
Incomplete Cholesky Decomposition based Kernel Cross Modal Factor Analysis for Audiovisual Continuous Dimensional Emotion Recognition. 810-831 - Lijun Li, Shuling Dai:
Action Recognition with deep network features and dimension reduction. 832-854 - Hancheng Yu, Wenkai Wang, Wenshi Fan:
An Adaptive Iterative Algorithm for Motion Deblurring Based on Salient Intensity Prior. 855-870 - Xianyou Zeng, Long Xu, Shaohai Hu, Ruizhen Zhao, Wanli Feng:
Object Tracking Based on Weighted Local Sub-space Reconstruction Error. 871-891 - Zahid Ali, Unsang Park:
Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor. 892-911 - Wong Pei Voon
, Norwati Mustapha, Lilly Suriani Affendey, Fatimah Khalid
:
Collective Interaction Filtering Approach for Detection of Group in Diverse Crowded Scenes. 912-928 - Muhammad Alhammami
, Samir Marwan Hammami
, Chee-Pun Ooi
, Wooi-Haw Tan:
Optimised ML-based System Model for Adult-Child Actions Recognition. 929-944 - Weixia Liu, Jinmei Hu, Zuoyong Li, Zuchang Zhang, Zhongli Ma, Daoqiang Zhang:
Tongue Image Segmentation via Thresholding and Gray Projection. 945-961 - Hyungwoo Park
:
Signal Enhancement of a Variable Rate Vocoder with a Hybrid domain SNR Estimator. 962-977
- Shuming Qiu
, Guosheng Xu, Haseeb Ahmad, Guoai Xu, Xinping Qiu, Hong Xu:
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. 978-1002 - Jiangshan Chen
, Yupu Hu, Wen Gao, Hong-Liang Li:
Lattice-based Threshold Ring Signature with Message Block Sharing. 1003-1019 - Chih-Wei Shiu
, Yu-Chi Chen
, Wien Hong:
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. 1020-1042 - Jining Zhao, Chunxiang Xu, Kefei Chen:
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. 1043-1063 - Ge Jiao, Xiaojiang Peng, Kaiwen Duan:
Image Encryption with The Cross Diffusion of Two Chaotic Maps. 1064-1079 - Chun-Xing Wang, Meiling Xu, Wenbo Wan, Jian Wang, Lili Meng, Jing Li, Jiande Sun:
Robust Image Watermarking via Perceptual Structural Regularity-based JND Model. 1080-1099 - Mu Han, Yunwen Wang, Shidian Ma, Ailan Wan, Shuai Liu:
Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code. 1100-1123
Volume 13, Number 3, March 2019
- Shenji Luan, Jianrong Bao, Chao Liu, Jie Li, Deqing Zhu:
Power Saving Scheme by Distinguishing Traffic Patterns for Event-Driven IoT Applications. 1123-1140 - Linh Manh Pham
, Truong-Thang Nguyen:
Flexible deployment of component-based distributed applications on the Cloud and beyond. 1141-1163 - Shuaibing Lu, Zhiyi Fang, Jie Wu:
High-revenue Online Provisioning for Virtual Clusters in Multi-tenant Cloud Data Center Network. 1164-1183 - Yonghee Kim, Youngju Park, Gwangsuk Song:
Interpretive Structural Modeling in the Adoption of IoT Services. 1184-1198 - Qi Zhao, Wei Qiu, Boxue Zhang, Bingqian Wang:
Quickest Spectrum Sensing Approaches for Wideband Cognitive Radio Based On STFT and CS. 1199-1212 - Mohammad Syfullah, Joanne Mun-Yee Lim, Fei Lu Siaw:
Mobility-Based Clustering Algorithm for Multimedia Broadcasting over IEEE 802.11p-LTE-enabled VANET. 1213-1237 - Zhihong Chen, Hai Lin, Lusheng Wang, Bo Zhao:
Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks. 1238-1259 - Dawei Yan, Peng You, Cong Liu, Shaowei Yong, Dongfang Guan:
Constellation Multi-Objective Optimization Design Based on QoS and Network Stability in LEO Satellite Broadband Networks. 1260-1283 - Kyu-Seok Shim, Young-Hoon Goo, Dongcheul Lee, Myung-Sup Kim:
Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications. 1284-1297 - Baolin Sun, Chao Gui, Ying Song, Hua Chen:
Network Coding-based Maximum Lifetime Algorithm for Sliding Window in WSNs. 1298-1310 - Hui Dun, Fang Ye, Shuhong Jiao:
Power Allocation for Half-duplex Relay-based D2D Communication with QoS guarantee. 1311-1324 - Xiaoge Huang, Dongyu Zhang, Weipeng Dai, She Tang:
Energy-Efficiency of Distributed Antenna Systems Relying on Resource Allocation. 1325-1344 - Liangrui Tang, Yaomu Tan:
Adaptive Queue Management Based On the Change Trend of Queue Size. 1345-1362 - Abbas MoshrefRazavi, Mohd Hairul Nizam Md. Nasir, Norizan Binti Mohd. Yasin, Rodina Ahmad:
Cultural Issues in Offshore Teams: A Categorization based on Existing Studies. 1363-1384 - Jianhua Wang, Yubin Lan, Shilei Lu, Lianglun Cheng:
An Efficient Complex Event Processing Algorithm based on Multipattern Sharing for Massive Manufacturing Event Streams. 1385-1402
- Zhikai Zong, Aili Han, Qing Gong:
Semi-supervised Cross-media Feature Learning via Efficient L2, q Norm. 1403-1417 - Yiyu Hong, Jongweon Kim:
3D Mesh Model Exterior Salient Part Segmentation Using Prominent Feature Points and Marching Plane. 1418-1433 - Yikun Zhang
, Rui Yao, Qingnan Jiang, Changbin Zhang, Shi Wang:
Video Object Segmentation with Weakly Temporal Information. 1434-1449 - Hao Nan, Min Li, Lvyuan Fan, Minglei Tong:
3D Res-Inception Network Transfer Learning for Multiple Label Crowd Behavior Recognition. 1450-1463 - Xin Wang, Lingling Xu, Chen Ning:
Multi-feature local sparse representation for infrared pedestrian tracking. 1464-1480
- Hao-tian Wang, Zhi-gang Chen, Jia Wu
, Leilei Wang:
Node Incentive Mechanism in Selfish Opportunistic Network. 1481-1501 - Yang Lu, Jiguo Li:
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. 1502-1522 - Liqing Chen, Jiguo Li, Yichen Zhang:
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. 1523-1545 - An Braeken
:
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. 1546-1565 - LiPing Liu, Linlin Ci, Wei Liu, Hui Yang:
Identifying SDC-Causing Instructions Based on Random Forests Algorithm. 1566-1582
- Geunseok Yang, Kyeongsic Min, Jung-Won Lee, Byungjeong Lee:
Applying Topic Modeling and Similarity for Predicting Bug Severity in Cross Projects. 1583-1598 - Dae-Young Kim
, Seokhoon Kim
:
Gateway Channel Hopping to Improve Transmission Efficiency in Long-range IoT Networks. 1599-1610 - SeulKi Choi, TaeJin Lee, Jin Kwak
:
A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments. 1611-1625 - Ha Sung Hwnag:
Why Social Comparison on Instagram Matters: Its impact on Depression. 1626-1638 - Sangwon Hwang, Jang-Eui Hong, Young-Kwang Nam:
Towards Effective Entity Extraction of Scientific Documents using Discriminative Linguistic Features. 1639-1658 - Heeyoul Kim:
A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service. 1659-1673 - Tae Uk Chang, Young-Su Ryu, Seulki Song, Ki-Won Kwon, Jong-Ho Paik:
Design and Implementation of Distributed Charge Signal Processing Software for Smart Slow and Quick Electric Vehicle Charge. 1674-1688 - Giseok Choe, Seungbin Lee, Jongho Nang:
CNN-based Visual/Auditory Feature Fusion Method with Frame Selection for Classifying Video Events. 1689-1701 - Kwanghoon Pio Kim
:
An XPDL-Based Workflow Control-Structure and Data-Sequence Analyzer. 1702-1721 - Junhyoung Oh, Tae Ho Kim, Kyung Ho Lee:
Advanced insider threat detection model to apply periodic work atmosphere. 1722-1737
Volume 13, Number 4, April 2019
- Ruihui Mu, Xiaoqin Zeng:
A Review of Deep Learning Research. 1738-1764 - Milad Taleby Ahvanooey
, Qianmu Li, Ming Wu, Shuo Wang:
A Survey of Genetic Programming and Its Applications. 1765-1794 - Guang Han, Jinpeng Su, Chengwei Zhang:
A method based on Multi-Convolution layers Joint and Generative Adversarial Networks for Vehicle Detection. 1795-1811 - Shengwei Lin, Ziqiang Ying, Kan Zheng
:
Design and Implementation of Location and Activity Monitoring System Based on LoRa. 1812-1824 - Sihyung Lee
:
Detection of Political Manipulation through Unsupervised Learning. 1825-1844 - Yuze Su, Xiangru Meng, Zhiyuan Zhao, Zhentao Li:
Cognitive Virtual Network Embedding Algorithm Based on Weighted Relative Entropy. 1845-1865 - Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. 1866-1883 - Liqun Zhao, Hongpeng Wang, Xiaoxiong Zhong
:
Interference-Aware Channel Assignment Algorithm in D2D overlaying Cellular Networks. 1884-1903 - Boyang Huang, Zhengmin Kong, Yanjun Fang, Xin Jin:
A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels. 1904-1921 - Junghwan Kim, Myeong-Cheol Ko, Moon Sun Shin, Jinsoo Kim:
IMT: A Memory-Efficient and Fast Updatable IP Lookup Architecture Using an Indexed Multibit Trie. 1922-1940 - Qian Zeng, Zhongshan Zhang:
The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle. 1941-1960 - Guo Li, Feng-Kui Gong, Xiang Chen:
Harmonic-Mean-Based Dual-Antenna Selection with Distributed Concatenated Alamouti Codes in Two-Way Relaying Networks. 1961-1974 - Fan Zhang, Jing Bai, Xiaoyu Li, Changxing Pei, Vincent Havyarimana:
An Ensemble Cascading Extremely Randomized Trees Framework for Short-Term Traffic Flow Prediction. 1975-1988
- Jiaquan Shen, Ningzhong Liu, Han Sun, Xiaoli Tao, Qiangyi Li
:
Vehicle Detection in Aerial Images Based on Hyper Feature Map in Deep Convolutional Network. 1989-2011 - Li Zhang, Jingdun Jia, Yue Li, Wanlin Gao, Minjuan Wang:
Deep Learning based Rapid Diagnosis System for Identifying Tomato Nutrition Disorders. 2012-2027 - Yangyang Li, Guiling Sun, Zhouzhou Li, Tianyu Geng:
An Efficient Model Based on Smoothed ℓ0 Norm for Sparse Signal Reconstruction. 2028-2041 - Shiguang Liu, Guoguang Hua, Yang Li:
2.5D human pose estimation for shadow puppet animation. 2042-2059 - Joo-Chang Kim, Kyungyong Chung:
Prediction Model of User Physical Activity using Data Characteristics-based Long Short-term Memory Recurrent Neural Networks. 2060-2077 - Feiniu Yuan, Tiantian Tang, Xue Xia, Jinting Shi, Shuying Li:
Dual-Encoded Features from Both Spatial and Curvelet Domains for Image Smoke Recognition. 2078-2093 - Yingping Huang, Chao Ju, Xing Hu, Wenyan Ci:
An Anti-occlusion and Scale Adaptive Kernel Correlation Filter for Visual Object Tracking. 2094-2112 - Sanli Yi, Guifang Zhang, Jianfeng He, Lirong Tong:
Entropic Image Thresholding Segmentation Based on Gabor Histogram. 2113-2128 - Arbia Soula, Salma Ben Said, Riadh Ksantini, Zied Lachiri:
An Adaptive Face Recognition System Based on a Novel Incremental Kernel Nonparametric Discriminant Analysis. 2129-2147 - Eui-Ju Heo, Sung-Jin Ahn, Kang-Sun Choi:
Real-Time Cattle Action Recognition for Estrus Detection. 2148-2161 - Shahid Hussain, Muhammad Rafiq Mufti, Mohammad Khalid Sohail, Humaira Afzal, Ghufran Ahmad, Arif Ali Khan
:
A Step towards the Improvement in the Performance of Text Classification. 2162-2179
- Tieming Chen, Qingyu Mao, Mingqi Lv, Hongbing Cheng, Yinglong Li:
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. 2180-2197 - Kuan Fan, Mingxi Liu, Wenbo Shi:
Improving efficiency of remote data audit for cloud storage. 2198-2222 - Jianpo Li, Dong Wang:
The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN. 2223-2242