


default search action
KSII Transactions on Internet and Information Systems, Volume 14
Volume 14, Number 1, January 2020
- Xiaorong Xu, Andi Hu, Yingbiao Yao, Wei Feng:
Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks. 1-19 - Longqi Wang, Ding Xu
:
Resource allocation in downlink SWIPT-based cooperative NOMA systems. 20-39 - Bangwon Seo:
SLNR-based Precoder Design in Multiuser Interference Channel with Channel Estimation Error. 40-52 - Huanan Yu, Yongxin Li, Yao Du:
Dynamic Synchronous Phasor Measurement Algorithm Based on Compressed Sensing. 53-76 - Jing Zhang, Jianhan Pan, Zhicheng Cai, Min Li, Lin Cui:
Knowledge Transfer Using User-Generated Data within Real-Time Cloud Services. 77-92 - Jin Xu, Hanqing Ding, Zeqi Yu, Zhe Zhang, Weihua Liu, Xueyan Chen:
Joint Space-time Coding and Power Domain Non-orthogonal Multiple Access for Future Wireless System. 93-113 - I Made Sukarsa, Putu Wira Buana
, Urip Yogantara:
Multi Parameter Design in AIML Framework for Balinese Calendar Knowledge Access. 114-130 - Gaoli Liang, Ran Liu, Yulu Fu, Hua Zhang, Heng Wang, Shafiq ur Réhman, Mingming Guo:
An Innovative Approach to Track Moving Object based on RFID and Laser Ranging Information. 131-147 - Syed W. Haider
, Guijun Zhuang, Amir Ikram, Bilal Anwar
:
Consumers' Device Choice in E-Retail: Do Regulatory Focus and Chronotype Matter? 148-167
- Lang Lin, Rangding Wang, Diqun Yan
, Li Dong:
A Robust Method for Speech Replay Attack Detection. 168-182 - Chuanyan Hao, Zilong Jin, Zhixin Yang
, Yadang Chen:
An Interactive Perspective Scene Completion Framework Guided by Complanate Mesh. 183-200 - Zhaoyun Chen, Dafei Huang, Lei Luo, Mei Wen, Chunyuan Zhang:
Efficient Parallel TLD on CPU-GPU Platform for Real-Time Tracking. 201-220
- Shiuh-Ku Weng, Jung-Yi Tu:
A Visualization Jump Lists tool for Digital Forensics of Windows. 221-239 - Yongxin Feng, Yingyun Kang, Hao Zhang, Wenbo Zhang:
FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection. 240-259 - Kyungho Son, Byungik Kim, Taejin Lee:
Cyber-attack group analysis method based on association of cyber-attack information. 260-280 - Wenyi Tang, Bo Qin, Yanan Li, Qianhong Wu:
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing. 281-298 - Nur Fadhilah Mohd Shari
, Amizah Malip, Wan Ainun Mior Othman
:
Revocation Protocol for Group Signatures in VANETs: A Secure Construction. 299-322 - Yingying Wang, Chengsong Yang, Na Ren, Changqing Zhu, Ting Rui, Dong Wang:
An Adaptive Watermark Detection Algorithm for Vector Geographic Data. 323-343 - Anuj Kumar Singh, B. D. K. Patro:
Elliptic Curve Signcryption Based Security Protocol for RFID. 344-365 - Beijing Chen, Jiaxin Wang, Yingyue Chen, Zilong Jin, Hiuk Jae Shim, Yun-Qing Shi:
High-Capacity Robust Image Steganography via Adversarial Network. 366-381 - Khulood Abu Maria, Mohammad Ahmad Alia
, Maher A. Alsarayreh, Eman M. Abu Maria:
UN-Substituted Video Steganography. 382-403 - Mingming Zhang, Quan Zhou, Yan-lang Hu:
A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation. 404-421 - Gangcan Sun, Mengge Liu, Zhuo Han, Chuanyong Zhao:
Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation. 422-436 - Quy-Anh Bui
, Wei-Bin Lee, Jung-San Lee, Hsiao-Ling Wu, Jo-Yun Liu:
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations. 437-454 - Negalign Wake Hundera
, Qian Mei, Hu Xiong, Dagmawit Mesfin Geressu:
A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing. 455-472
Volume 14, Number 2, February 2020
- Sohail Ahmed, Malik Muhammad Asim, Nadeem Qaisar Mehmood
, Mubashir Ali, Babar Shahzaad
:
Implementation of Class-Based Low Latency Fair Queueing (CBLLFQ) Packet Scheduling Algorithm for HSDPA Core Network. 473-494 - Qiaodan Zhang, Kaixue Hao, Mei Li:
Improved Correlation Identification of Subsurface Using All Phase FFT Algorithm. 495-513 - Di Wu, Shaojin Geng, Xingjuan Cai, Guoyou Zhang, Fei Xue:
A many-objective optimization WSN energy balance model. 514-537 - K. U. Kala
, M. Nandhini:
Gated Recurrent Unit Architecture for Context-Aware Recommendations with improved Similarity Measures. 538-561 - Shenghua Zhai, Jianping An:
Improving Physical-Layer Security for Full-duplex Radio aided Two-Way Relay Networks. 562-576 - Dan Li, Julong Lan, Yuxiang Hu:
Central Control over Distributed Service Function Path. 577-594 - Youngho Kwon
, Jun Hwang:
Mathematical modeling for flocking flight of autonomous multi-UAV system, including environmental factors. 595-609
- QuanMeng Ma, Guang Jiang, DianZhi Lai, Hua Cui, Huansheng Song:
Fast, Accurate Vehicle Detection and Distance Estimation. 610-630 - Rahib H. Abiyev, Murat Arslan, Idoko John Bush:
Sign Language Translation Using Deep Convolutional Neural Networks. 631-653 - Changwon Wang
, Young Kim, Seung Hyun Lee, Nak-Jun Sung, Se Dong Min
, Min-Hyung Choi:
Activity and Safety Recognition using Smart Work Shoes for Construction Worksite. 654-670 - Xiaorui Zhang, Xuefeng Yu, Wei Sun, Aiguo Song:
An Optimized Model for the Local Compression Deformation of Soft Tissue. 671-686 - Jielin Jiang, Zilong Jin, Boheng Wang, Li Ma, Yan Cui:
A Sobel Operator Combined with Patch Statistics Algorithm for Fabric Defect Detection. 687-701
- Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection. 702-723 - Hyeopgoo Yeo, Seung-il Sonh, Min-goo Kang:
IP Design of Corrected Block TEA Cipher with Variable-Length Message for Smart IoT. 724-737 - Tingting Zhang, Junru Zhu, Yang Liu, Fulong Chen:
The Novel Efficient Dual-field FIPS Modular Multiplication. 738-756
- Sangyub Lee, Jaekyu Lee, Hyeonjoong Cho:
A Hand Gesture Recognition Method using Inertial Sensor for Rapid Operation on Embedded Device. 757-770 - Hyeseung Park
, Seungchul Park, Young-Bok Joo:
Robust Real-time Detection of Abandoned Objects using a Dual Background Model. 771-788 - Sangwoo Hahm:
A Study of the Roles of Leadership Styles and Attitudes with Social Responsibility for the 4th Industrial Revolution. 789-806 - Deuk Kyu Kum:
Extended CEP Model for Effective Enterprise Systems Service Monitoring. 807-825 - Sungjin Lee, Min Hong, Sungyeup Kim, Seong Jun Choi:
Effect Analysis of Virtual-reality Vestibular Rehabilitation based on Eye-tracking. 826-840 - Dalyapraz Dauletbak, Jongwook Woo:
Big Data Analysis and Prediction of Traffic in Los Angeles. 841-854 - Wenguang Ma, Wei Ma:
Deep Window Detection in Street Scenes. 855-870 - Sungtae Lee, Kwanho Park, Hyungwoo Park
:
Sound Quality Enhancement by using the Single Core Exciter in OLED Panel. 871-888 - Gi-Myeong Ryu, Jaesung Kim, Jongsuk Ruth Lee:
Analysis of Computational Science and Engineering SW Data Format for Multi-physics and Visualization. 889-906 - Xiaoli Li, Shan Zhang, Kang Wang:
PM2.5 Estimation Based on Image Analysis. 907-923
Volume 14, Number 3, March 2020
- Xibin Jia, Weiting Li, Yuechen Wang, Sung-Chan Hong, Xing Su:
An Action Unit co-occurrence constraint 3DCNN based Action Unit recognition approach. 924-942 - Ahreum Shin, Intae Ryoo, Seokhoon Kim:
Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing. 943-961 - Yunjie Chen, Yuhang Qin, Zilong Jin, Zhiyong Fan, Mao Cai:
A Triple Residual Multiscale Fully Convolutional Network Model for Multimodal Infant Brain MRI Segmentation. 962-975
- Jung-Jae Kim, Min-Woo Ryu, Si-Ho Cha:
Approximate k values using Repulsive Force without Domain Knowledge in k-means. 976-990
- Sang-Kon Kim, Taekon Kim, Jinhwan Koh:
Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device. 991-1013
- Mohemmed Sha, Mohamudha Parveen Rahamathulla:
Cloud-based Healthcare data management Framework. 1014-1025
- Weilong Ding, Xiao Ding, Kai Chen, Zang-xin Wan, Yan Xu, Yuanjing Feng:
A Computer Model for Simulating the Bicycle Rider's Behavior in a Virtual Riding System. 1026-1042 - Haoting Liu, Ming Lv, Weiqun Yu, Zhenhui Guo, Xin Li:
Subjective Imaging Effect Assessment for Intelligent Imaging Terminal Design: a Method for Engineering Site. 1043-1064
- Can Zhang, Dan Wu, Liang Ao, Meng Wang, Yueming Cai:
Social-Aware Collaborative Caching Based on User Preferences for D2D Content Sharing. 1065-1085
- Jiaze Shang
, Weipeng An, Yu Liu, Bang Han, Yaodan Guo:
Oil Pipeline Weld Defect Identification System Based on Convolutional Neural Network. 1086-1103 - Sejin Park, Woojin Jeong, Young Shik Moon:
X-ray Image Segmentation using Multi-task Learning. 1104-1120 - Sung-Jun Park, Md. Mahbubul Islam, Joong-Hwan Baek:
Visual Object Tracking Fusing CNN and Color Histogram based Tracker and Depth Estimation for Automatic Immersive Audio Mixing. 1121-1141 - Huanlong Zhang, Junfeng Liu, Zhicheng Nie, Jie Zhang, Jianwei Zhang:
A new visual tracking approach based on salp swarm algorithm for abrupt motion tracking. 1142-1166 - Zhenzhen Yang, Nan Kuang, Yongpeng Yang, Bin Kang:
Brain MR Multimodal Medical Image Registration Based on Image Segmentation and Symmetric Self-similarity. 1167-1187 - Guangzhe Zhao, Hanting Yang, Yong Tao, Lei Zhang, Chunxiao Zhao:
Lightweight CNN-based Expression Recognition on Humanoid Robot. 1188-1203
- Jian Zhang, Jian Tang, Zhonghui Wang, Feng Wang, Gang Yu:
Load-Balancing Rendezvous Approach for Mobility-Enabled Adaptive Energy-Efficient Data Collection in WSNs. 1204-1227
- Israr Hussain, Jishen Zeng, Xinhong, Shunquan Tan:
A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis. 1228-1248 - Taek-Young Youn, Nam-Su Jho:
Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption. 1249-1262 - Gang Liu, Runnan Zhang, Bo Wan, Shaomin Ji, Yumin Tian:
Extended Role-Based Access Control with Context-Based Role Filtering. 1263-1279 - Ju-Seong Ko, Jin Kwak
:
Private Key Recovery on Bitcoin with Duplicated Signatures. 1280-1300
- Kaili Xia, Xianyang Jiang, Yingbiao Yao, Xianghong Tang:
Optimization Algorithm for Spectrum Sensing Delay Time in Cognitive Radio Networks Using Decoding Forward Relay. 1301-1312 - Zongyi Liu, Guomei Zhang, Wei Meng, Xiaohui Ma, Guobing Li
:
Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks. 1313-1336 - Ridha Ouni
, Monji Zaidi
, Maazen Alsabaan, Wadood Abdul
, Amr Alasaad:
Mobile geolocation techniques for indoor environment monitoring. 1337-1362 - Li Li, Zhenghui Feng, Yanzhi Tang, Zhangjie Peng, Lisen Wang, Weilu Shao:
User Clustering Scheme for Downlink of NOMA System. 1363-1376 - Shiji Li, Guyu Hu, Youwei Ding, Yun Zhou:
Delay Tolerant Packet Forwarding Algorithm Based on Location Estimation for Micro Aerial Vehicle Networks. 1377-1399
Volume 14, Number 4, April 2020
- Jie Zhang, Jianing Zhang, Shuhao Ma, Jie Yang, Guan Gui:
Chatbot Design Method Using Hybrid Word Vector Expression Model Based on Real Telemarketing Data. 1400-1418 - Yujia Ge, Yurong Nan, Yi Chen:
Maximizing Information Transmission for Energy Harvesting Sensor Networks by an Uneven Clustering Protocol and Energy Management. 1419-1436 - Wuzhao Li, Yechuang Wang, Youqiang Sun, Jie Ma:
Research on Low-energy Adaptive Clustering Hierarchy Protocol based on Multi-objective Coupling Algorithm. 1437-1459 - Xiaolin Jia, Yuhao Feng, Yajun Gu:
A Simple and Fast Anti-collision Protocol for Large-scale RFID Tags Identification. 1460-1478 - Hazim Jarrah
, Peter Han Joo Chong, Nurul I. Sarkar
, Jairo A. Gutiérrez
:
Network Coding-Based Fault Diagnosis Protocol for Dynamic Networks. 1479-1501 - Mahmut Durgun
, Levent Gökrem:
VLC4WoT : Visible Light Communication for Web of Things. 1502-1519
- Jing Chen, Honghua Yan, Chunxiao Wang, Xuyan Liu:
A Hybrid Cloud Testing System Based on Virtual Machines and Networks. 1520-1542
- Raheel Zafar, Muhammad Noman Malik, Huma Hayat Khan, Aamir Saeed Malik:
Decoding Brain Patterns for Colored and Grayscale Images using Multivariate Pattern Analysis. 1543-1561 - Xiaofei Wang, Wei Yang, Yan Liu, Rui Sun, Jun Hu, Longcheng Yang, Boyang Hou:
Segmented Douglas-Peucker Algorithm Based on the Node Importance. 1562-1578 - Jianguo Duan, Nan Xie, Lianhui Li:
Optimal Buffer Allocation in Multi-Product Repairable Production Lines Based on Multi-State Reliability and Structural Complexity. 1579-1602 - Qianhui Dong, Yibing Li, Qian Sun, Yuan Tian:
An A2CL Algorithm based on Information Optimization Strategy for MMRS. 1603-1623
- Alireza Amirshahi
, Morteza Romoozi, Mohammad Ali Raayatpanah
, Seyyed Amir Asghari
:
Modeling Geographical Anycasting Routing in Vehicular Networks. 1624-1647
- Byeong-Chun Shin, Jeong-Kweon Seo:
Experimental Optimal Choice Of Initial Candidate Inliers Of The Feature Pairs With Well-Ordering Property For The Sample Consensus Method In The Stitching Of Drone-based Aerial Images. 1648-1672 - Xiaoyun Duan, Shin-Jin Kang, Jong-In Choi, Soo Kyun Kim
:
Mixed Reality System for Virtual Chemistry Lab. 1673-1688 - Lili Meng, Hongfei Li, Jia Zhang, Yanyan Tan, Yuwei Ren, Huaxiang Zhang:
Convolutional auto-encoder based multiple description coding network. 1689-1703 - Heekyung Yang, Sungyong Kang, Chanung Park, Jeongwook Lee, Kyungmin Yu, Kyungha Min:
A Hierarchical deep model for food classification from photographs. 1704-1720 - Qing Tian, Heyang Sun, Chuang Ma, Meng Cao, Yi Chu:
Age Estimation via Selecting Discriminated Features and Preserving Geometry. 1721-1737 - Xiaorui Zhang, Hailun Wu, Wei Sun, Chengsheng Yuan:
An Optimized Mass-spring Model with Shape Restoration Ability Based on Volume Conservation. 1738-1756
- Jeong Ho Kwak:
A study on the evolution of post-smartphone technologies in the 5G technology environment. 1757-1772
- Jingxian Zhou, Zengqi Wang:
Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network. 1773-1795 - Sasan Saqaeeyan, Hamid Haj Seyyed Javadi, Hossein Amirkhani:
Anomaly Detection in Smart Homes Using Bayesian Networks. 1796-1816
- Mostafa Zaman Chowdhury
, Md. Tashikur Rahman, Yeong Min Jang:
An Analytical Hierarchy Process Combined with Game Theory for Interface Selection in 5G Heterogeneous Networks. 1817-1836 - Jingpu Wang, Xin Song, Li Dong:
Resource Allocation and EE-SE Tradeoff for H-CRAN with NOMA-Based D2D Communications. 1837-1860
Volume 14, Number 5, May 2020
- Muhammad Hasnain, Imran Ghani, Muhammad Fermi Pasha
, Chern Hong Lim, Seung Ryul Jeong:
A Comprehensive Review on Regression Test Case Prioritization Techniques for Web Services. 1861-1885 - Hemn Barzan Abdalla
, Awder M. Ahmed, Mustafa A. Al Sibahee:
Optimization Driven MapReduce Framework for Indexing and Retrieval of Big Data. 1886-1908 - Jianwei Chen, Jianbo Li, Manzoor Ahmed, Junjie Pang, MinChao Lu, Xiufang Sun:
Next Location Prediction with a Graph Convolutional Network Based on a Seq2seq Framework. 1909-1928
- Chaya Shivalingagowda, P. V. Y. Jayasree, Dinesh K. Sah:
Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks. 1929-1950 - Ha Yoon Song, Seongjin Park:
An Analysis of Correlation between Personality and Visiting Place using Spearman's Rank Correlation Coefficient. 1951-1966 - Phat Nguyen Huu
, Quang Tran Minh, Hoang Lai The:
An ANN-based gesture recognition algorithm for smart-home applications. 1967-1983 - Wenqin Zhuang, Mingkai Chen, Xin Wei, Haibo Li:
Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks. 1984-2002 - Junke Li
, Bing Guo, Yan Shen, Deguang Li:
Low-power Scheduling Framework for Heterogeneous Architecture under Performance Constraint. 2003-2021
- Vesna S. Ruzicic, Zivadin M. Micic:
Knowledge Management Assessment Using PDCA based in Global and Local Standards: in the Case of Technics and Informatics Studies. 2022-2042
- Guoyu Wang, Hongsheng Zhang:
DMB+, a General Data Transmission Technique. 2043-2060
- Shahbaz Hussain, Ying Li, Wenli Li:
Psychological contract-based Consumer Repurchase behavior On Social commerce platform: An Empirical study. 2061-2083 - Longlong Jiao, Senlin Luo, Wangtong Liu, Limin Pan:
AIT: A method for operating system kernel function call graph generation with a virtualization technique. 2084-2100 - Sahar Yassine
, Seifedine Kadry, Miguel-Ángel Sicilia
:
Statistical Profiles of Users' Interactions with Videos in Large Repositories: Mining of Khan Academy Repository. 2101-2121 - Mohammed Maree, Rami Hodrob, Mohammed Belkhatir, Saadat M. Alhashmi:
A Knowledge-based Model for Semantic Oriented Contextual Advertising. 2122-2140 - Shufang Li, Zhengping Hu, Mengyao Zhao:
Moving Object Detection Using Sparse Approximation and Sparse Coding Migration. 2141-2155
- Soo-Young Jeong, Won-Ho Kim:
Thermal Imaging Fire Detection Algorithm with Minimal False Detection. 2156-2170 - Chunhe Shi, Chengdong Wu:
Vehicle Face Recognition Algorithm Based on Weighted Nonnegative Matrix Factorization with Double Regularization Terms. 2171-2185 - Jiyeon Kim, Hyung-Jong Kim:
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective. 2186-2203
- SeulKi Choi, Jin Kwak
:
Feature Analysis and Detection Techniques for Piracy Sites. 2204-2220 - Ji Woong Jang, SungMoon Kwon, SungJin Kim, Jungtaek Seo, Junhyoung Oh, Kyungho Lee:
Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid. 2221-2235 - Yahye Abukar Ahmed
, Baris Koçer, Bander Ali Saleh Al-rimy:
Automated Analysis Approach for the Detection of High Survivable Ransomware. 2236-2257