


default search action
KSII Transactions on Internet and Information Systems, Volume 14
Volume 14, Number 1, January 2020
- Xiaorong Xu, Andi Hu, Yingbiao Yao, Wei Feng:

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks. 1-19 - Longqi Wang, Ding Xu

:
Resource allocation in downlink SWIPT-based cooperative NOMA systems. 20-39 - Bangwon Seo:

SLNR-based Precoder Design in Multiuser Interference Channel with Channel Estimation Error. 40-52 - Huanan Yu, Yongxin Li, Yao Du:

Dynamic Synchronous Phasor Measurement Algorithm Based on Compressed Sensing. 53-76 - Jing Zhang, Jianhan Pan, Zhicheng Cai, Min Li, Lin Cui:

Knowledge Transfer Using User-Generated Data within Real-Time Cloud Services. 77-92 - Jin Xu, Hanqing Ding, Zeqi Yu, Zhe Zhang, Weihua Liu, Xueyan Chen:

Joint Space-time Coding and Power Domain Non-orthogonal Multiple Access for Future Wireless System. 93-113 - I Made Sukarsa, Putu Wira Buana

, Urip Yogantara:
Multi Parameter Design in AIML Framework for Balinese Calendar Knowledge Access. 114-130 - Gaoli Liang, Ran Liu, Yulu Fu, Hua Zhang, Heng Wang, Shafiq ur Réhman, Mingming Guo:

An Innovative Approach to Track Moving Object based on RFID and Laser Ranging Information. 131-147 - Syed W. Haider

, Guijun Zhuang, Amir Ikram, Bilal Anwar
:
Consumers' Device Choice in E-Retail: Do Regulatory Focus and Chronotype Matter? 148-167
- Lang Lin, Rangding Wang, Diqun Yan

, Li Dong:
A Robust Method for Speech Replay Attack Detection. 168-182 - Chuanyan Hao, Zilong Jin, Zhixin Yang

, Yadang Chen:
An Interactive Perspective Scene Completion Framework Guided by Complanate Mesh. 183-200 - Zhaoyun Chen

, Dafei Huang, Lei Luo, Mei Wen, Chunyuan Zhang:
Efficient Parallel TLD on CPU-GPU Platform for Real-Time Tracking. 201-220
- Shiuh-Ku Weng, Jung-Yi Tu:

A Visualization Jump Lists tool for Digital Forensics of Windows. 221-239 - Yongxin Feng, Yingyun Kang, Hao Zhang, Wenbo Zhang:

FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection. 240-259 - Kyungho Son, Byungik Kim, Taejin Lee:

Cyber-attack group analysis method based on association of cyber-attack information. 260-280 - Wenyi Tang, Bo Qin, Yanan Li, Qianhong Wu:

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing. 281-298 - Nur Fadhilah Mohd Shari

, Amizah Malip, Wan Ainun Mior Othman
:
Revocation Protocol for Group Signatures in VANETs: A Secure Construction. 299-322 - Yingying Wang, Chengsong Yang, Na Ren, Changqing Zhu, Ting Rui, Dong Wang:

An Adaptive Watermark Detection Algorithm for Vector Geographic Data. 323-343 - Anuj Kumar Singh, B. D. K. Patro

:
Elliptic Curve Signcryption Based Security Protocol for RFID. 344-365 - Beijing Chen, Jiaxin Wang, Yingyue Chen, Zilong Jin, Hiuk Jae Shim, Yun-Qing Shi:

High-Capacity Robust Image Steganography via Adversarial Network. 366-381 - Khulood Abu Maria, Mohammad Ahmad Alia

, Maher A. Alsarayreh, Eman M. Abu Maria:
UN-Substituted Video Steganography. 382-403 - Mingming Zhang, Quan Zhou, Yan-lang Hu:

A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation. 404-421 - Gangcan Sun, Mengge Liu, Zhuo Han, Chuanyong Zhao:

Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation. 422-436 - Quy-Anh Bui

, Wei-Bin Lee, Jung-San Lee, Hsiao-Ling Wu, Jo-Yun Liu:
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations. 437-454 - Negalign Wake Hundera

, Qian Mei, Hu Xiong, Dagmawit Mesfin Geressu:
A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing. 455-472
Volume 14, Number 2, February 2020
- Sohail Ahmed, Malik Muhammad Asim, Nadeem Qaisar Mehmood

, Mubashir Ali, Babar Shahzaad
:
Implementation of Class-Based Low Latency Fair Queueing (CBLLFQ) Packet Scheduling Algorithm for HSDPA Core Network. 473-494 - Qiaodan Zhang, Kaixue Hao, Mei Li:

Improved Correlation Identification of Subsurface Using All Phase FFT Algorithm. 495-513 - Di Wu, Shaojin Geng, Xingjuan Cai, Guoyou Zhang, Fei Xue:

A many-objective optimization WSN energy balance model. 514-537 - K. U. Kala

, M. Nandhini:
Gated Recurrent Unit Architecture for Context-Aware Recommendations with improved Similarity Measures. 538-561 - Shenghua Zhai, Jianping An:

Improving Physical-Layer Security for Full-duplex Radio aided Two-Way Relay Networks. 562-576 - Dan Li, Julong Lan, Yuxiang Hu:

Central Control over Distributed Service Function Path. 577-594 - Youngho Kwon

, Jun Hwang:
Mathematical modeling for flocking flight of autonomous multi-UAV system, including environmental factors. 595-609
- QuanMeng Ma, Guang Jiang, DianZhi Lai, Hua Cui, Huansheng Song:

Fast, Accurate Vehicle Detection and Distance Estimation. 610-630 - Rahib H. Abiyev, Murat Arslan, Idoko John Bush:

Sign Language Translation Using Deep Convolutional Neural Networks. 631-653 - Changwon Wang

, Young Kim, Seung Hyun Lee, Nak-Jun Sung, Se Dong Min
, Min-Hyung Choi
:
Activity and Safety Recognition using Smart Work Shoes for Construction Worksite. 654-670 - Xiaorui Zhang, Xuefeng Yu, Wei Sun, Aiguo Song:

An Optimized Model for the Local Compression Deformation of Soft Tissue. 671-686 - Jielin Jiang, Zilong Jin, Boheng Wang, Li Ma, Yan Cui:

A Sobel Operator Combined with Patch Statistics Algorithm for Fabric Defect Detection. 687-701
- Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:

A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection. 702-723 - Hyeopgoo Yeo, Seung-il Sonh, Min-goo Kang:

IP Design of Corrected Block TEA Cipher with Variable-Length Message for Smart IoT. 724-737 - Tingting Zhang, Junru Zhu, Yang Liu, Fulong Chen:

The Novel Efficient Dual-field FIPS Modular Multiplication. 738-756
- Sangyub Lee, Jaekyu Lee, Hyeonjoong Cho:

A Hand Gesture Recognition Method using Inertial Sensor for Rapid Operation on Embedded Device. 757-770 - Hyeseung Park

, Seungchul Park, Young-Bok Joo:
Robust Real-time Detection of Abandoned Objects using a Dual Background Model. 771-788 - Sangwoo Hahm:

A Study of the Roles of Leadership Styles and Attitudes with Social Responsibility for the 4th Industrial Revolution. 789-806 - Deuk Kyu Kum:

Extended CEP Model for Effective Enterprise Systems Service Monitoring. 807-825 - Sungjin Lee, Min Hong, Sungyeup Kim, Seong Jun Choi:

Effect Analysis of Virtual-reality Vestibular Rehabilitation based on Eye-tracking. 826-840 - Dalyapraz Dauletbak, Jongwook Woo:

Big Data Analysis and Prediction of Traffic in Los Angeles. 841-854 - Wenguang Ma, Wei Ma:

Deep Window Detection in Street Scenes. 855-870 - Sungtae Lee, Kwanho Park, Hyungwoo Park

:
Sound Quality Enhancement by using the Single Core Exciter in OLED Panel. 871-888 - Gi-Myeong Ryu, Jaesung Kim, Jongsuk Ruth Lee:

Analysis of Computational Science and Engineering SW Data Format for Multi-physics and Visualization. 889-906 - Xiaoli Li, Shan Zhang, Kang Wang:

PM2.5 Estimation Based on Image Analysis. 907-923
Volume 14, Number 3, March 2020
- Xibin Jia, Weiting Li, Yuechen Wang, Sung-Chan Hong, Xing Su:

An Action Unit co-occurrence constraint 3DCNN based Action Unit recognition approach. 924-942 - Ahreum Shin, Intae Ryoo, Seokhoon Kim:

Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing. 943-961 - Yunjie Chen, Yuhang Qin, Zilong Jin, Zhiyong Fan, Mao Cai:

A Triple Residual Multiscale Fully Convolutional Network Model for Multimodal Infant Brain MRI Segmentation. 962-975
- Jung-Jae Kim, Min-Woo Ryu, Si-Ho Cha:

Approximate k values using Repulsive Force without Domain Knowledge in k-means. 976-990
- Sang-Kon Kim, Taekon Kim, Jinhwan Koh:

Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device. 991-1013
- Mohemmed Sha, Mohamudha Parveen Rahamathulla

:
Cloud-based Healthcare data management Framework. 1014-1025
- Weilong Ding, Xiao Ding, Kai Chen, Zang-xin Wan, Yan Xu, Yuanjing Feng:

A Computer Model for Simulating the Bicycle Rider's Behavior in a Virtual Riding System. 1026-1042 - Haoting Liu, Ming Lv, Weiqun Yu, Zhenhui Guo, Xin Li:

Subjective Imaging Effect Assessment for Intelligent Imaging Terminal Design: a Method for Engineering Site. 1043-1064
- Can Zhang, Dan Wu, Liang Ao, Meng Wang, Yueming Cai:

Social-Aware Collaborative Caching Based on User Preferences for D2D Content Sharing. 1065-1085
- Jiaze Shang

, Weipeng An, Yu Liu, Bang Han, Yaodan Guo:
Oil Pipeline Weld Defect Identification System Based on Convolutional Neural Network. 1086-1103 - Sejin Park, Woojin Jeong, Young Shik Moon:

X-ray Image Segmentation using Multi-task Learning. 1104-1120 - Sung-Jun Park, Md. Mahbubul Islam, Joong-Hwan Baek:

Visual Object Tracking Fusing CNN and Color Histogram based Tracker and Depth Estimation for Automatic Immersive Audio Mixing. 1121-1141 - Huanlong Zhang, Junfeng Liu, Zhicheng Nie, Jie Zhang, Jianwei Zhang:

A new visual tracking approach based on salp swarm algorithm for abrupt motion tracking. 1142-1166 - Zhenzhen Yang, Nan Kuang, Yongpeng Yang, Bin Kang:

Brain MR Multimodal Medical Image Registration Based on Image Segmentation and Symmetric Self-similarity. 1167-1187 - Guangzhe Zhao, Hanting Yang, Yong Tao, Lei Zhang, Chunxiao Zhao:

Lightweight CNN-based Expression Recognition on Humanoid Robot. 1188-1203
- Jian Zhang, Jian Tang, Zhonghui Wang, Feng Wang, Gang Yu:

Load-Balancing Rendezvous Approach for Mobility-Enabled Adaptive Energy-Efficient Data Collection in WSNs. 1204-1227
- Israr Hussain, Jishen Zeng, Xinhong, Shunquan Tan:

A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis. 1228-1248 - Taek-Young Youn, Nam-Su Jho:

Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption. 1249-1262 - Gang Liu, Runnan Zhang, Bo Wan, Shaomin Ji, Yumin Tian:

Extended Role-Based Access Control with Context-Based Role Filtering. 1263-1279 - Ju-Seong Ko, Jin Kwak

:
Private Key Recovery on Bitcoin with Duplicated Signatures. 1280-1300
- Kaili Xia, Xianyang Jiang, Yingbiao Yao, Xianghong Tang:

Optimization Algorithm for Spectrum Sensing Delay Time in Cognitive Radio Networks Using Decoding Forward Relay. 1301-1312 - Zongyi Liu, Guomei Zhang, Wei Meng, Xiaohui Ma, Guobing Li

:
Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks. 1313-1336 - Ridha Ouni

, Monji Zaidi
, Maazen Alsabaan, Wadood Abdul
, Amr Alasaad:
Mobile geolocation techniques for indoor environment monitoring. 1337-1362 - Li Li, Zhenghui Feng, Yanzhi Tang, Zhangjie Peng, Lisen Wang, Weilu Shao:

User Clustering Scheme for Downlink of NOMA System. 1363-1376 - Shiji Li, Guyu Hu, Youwei Ding, Yun Zhou:

Delay Tolerant Packet Forwarding Algorithm Based on Location Estimation for Micro Aerial Vehicle Networks. 1377-1399
Volume 14, Number 4, April 2020
- Jie Zhang, Jianing Zhang, Shuhao Ma, Jie Yang, Guan Gui:

Chatbot Design Method Using Hybrid Word Vector Expression Model Based on Real Telemarketing Data. 1400-1418 - Yujia Ge, Yurong Nan, Yi Chen:

Maximizing Information Transmission for Energy Harvesting Sensor Networks by an Uneven Clustering Protocol and Energy Management. 1419-1436 - Wuzhao Li, Yechuang Wang, Youqiang Sun, Jie Ma:

Research on Low-energy Adaptive Clustering Hierarchy Protocol based on Multi-objective Coupling Algorithm. 1437-1459 - Xiaolin Jia, Yuhao Feng, Yajun Gu:

A Simple and Fast Anti-collision Protocol for Large-scale RFID Tags Identification. 1460-1478 - Hazim Jarrah

, Peter Han Joo Chong, Nurul I. Sarkar
, Jairo A. Gutiérrez
:
Network Coding-Based Fault Diagnosis Protocol for Dynamic Networks. 1479-1501 - Mahmut Durgun

, Levent Gökrem:
VLC4WoT : Visible Light Communication for Web of Things. 1502-1519
- Jing Chen

, Honghua Yan, Chunxiao Wang, Xuyan Liu:
A Hybrid Cloud Testing System Based on Virtual Machines and Networks. 1520-1542
- Raheel Zafar, Muhammad Noman Malik, Huma Hayat Khan, Aamir Saeed Malik:

Decoding Brain Patterns for Colored and Grayscale Images using Multivariate Pattern Analysis. 1543-1561 - Xiaofei Wang, Wei Yang, Yan Liu, Rui Sun, Jun Hu, Longcheng Yang, Boyang Hou:

Segmented Douglas-Peucker Algorithm Based on the Node Importance. 1562-1578 - Jianguo Duan, Nan Xie, Lianhui Li:

Optimal Buffer Allocation in Multi-Product Repairable Production Lines Based on Multi-State Reliability and Structural Complexity. 1579-1602 - Qianhui Dong, Yibing Li, Qian Sun, Yuan Tian:

An A2CL Algorithm based on Information Optimization Strategy for MMRS. 1603-1623
- Alireza Amirshahi

, Morteza Romoozi, Mohammad Ali Raayatpanah
, Seyyed Amir Asghari
:
Modeling Geographical Anycasting Routing in Vehicular Networks. 1624-1647
- Byeong-Chun Shin, Jeong-Kweon Seo

:
Experimental Optimal Choice Of Initial Candidate Inliers Of The Feature Pairs With Well-Ordering Property For The Sample Consensus Method In The Stitching Of Drone-based Aerial Images. 1648-1672 - Xiaoyun Duan, Shin-Jin Kang, Jong-In Choi, Soo Kyun Kim

:
Mixed Reality System for Virtual Chemistry Lab. 1673-1688 - Lili Meng, Hongfei Li, Jia Zhang, Yanyan Tan, Yuwei Ren, Huaxiang Zhang:

Convolutional auto-encoder based multiple description coding network. 1689-1703 - Heekyung Yang, Sungyong Kang, Chanung Park, Jeongwook Lee, Kyungmin Yu, Kyungha Min:

A Hierarchical deep model for food classification from photographs. 1704-1720 - Qing Tian, Heyang Sun, Chuang Ma, Meng Cao

, Yi Chu:
Age Estimation via Selecting Discriminated Features and Preserving Geometry. 1721-1737 - Xiaorui Zhang, Hailun Wu, Wei Sun, Chengsheng Yuan:

An Optimized Mass-spring Model with Shape Restoration Ability Based on Volume Conservation. 1738-1756
- Jeong Ho Kwak:

A study on the evolution of post-smartphone technologies in the 5G technology environment. 1757-1772
- Jingxian Zhou, Zengqi Wang:

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network. 1773-1795 - Sasan Saqaeeyan, Hamid Haj Seyyed Javadi, Hossein Amirkhani:

Anomaly Detection in Smart Homes Using Bayesian Networks. 1796-1816
- Mostafa Zaman Chowdhury

, Md. Tashikur Rahman, Yeong Min Jang:
An Analytical Hierarchy Process Combined with Game Theory for Interface Selection in 5G Heterogeneous Networks. 1817-1836 - Jingpu Wang, Xin Song, Li Dong:

Resource Allocation and EE-SE Tradeoff for H-CRAN with NOMA-Based D2D Communications. 1837-1860
Volume 14, Number 5, May 2020
- Muhammad Hasnain, Imran Ghani, Muhammad Fermi Pasha

, Chern Hong Lim
, Seung Ryul Jeong:
A Comprehensive Review on Regression Test Case Prioritization Techniques for Web Services. 1861-1885 - Hemn Barzan Abdalla

, Awder M. Ahmed, Mustafa A. Al Sibahee:
Optimization Driven MapReduce Framework for Indexing and Retrieval of Big Data. 1886-1908 - Jianwei Chen, Jianbo Li, Manzoor Ahmed, Junjie Pang, MinChao Lu, Xiufang Sun:

Next Location Prediction with a Graph Convolutional Network Based on a Seq2seq Framework. 1909-1928
- Chaya Shivalingagowda, P. V. Y. Jayasree, Dinesh K. Sah:

Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks. 1929-1950 - Ha Yoon Song, Seongjin Park:

An Analysis of Correlation between Personality and Visiting Place using Spearman's Rank Correlation Coefficient. 1951-1966 - Phat Nguyen Huu

, Quang Tran Minh, Hoang Lai The:
An ANN-based gesture recognition algorithm for smart-home applications. 1967-1983 - Wenqin Zhuang, Mingkai Chen, Xin Wei, Haibo Li:

Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks. 1984-2002 - Junke Li

, Bing Guo, Yan Shen, Deguang Li
:
Low-power Scheduling Framework for Heterogeneous Architecture under Performance Constraint. 2003-2021
- Vesna S. Ruzicic, Zivadin M. Micic:

Knowledge Management Assessment Using PDCA based in Global and Local Standards: in the Case of Technics and Informatics Studies. 2022-2042
- Guoyu Wang, Hongsheng Zhang:

DMB+, a General Data Transmission Technique. 2043-2060
- Shahbaz Hussain

, Ying Li, Wenli Li:
Psychological contract-based Consumer Repurchase behavior On Social commerce platform: An Empirical study. 2061-2083 - Longlong Jiao, Senlin Luo, Wangtong Liu, Limin Pan:

AIT: A method for operating system kernel function call graph generation with a virtualization technique. 2084-2100 - Sahar Yassine

, Seifedine Kadry, Miguel-Ángel Sicilia
:
Statistical Profiles of Users' Interactions with Videos in Large Repositories: Mining of Khan Academy Repository. 2101-2121 - Mohammed Maree, Rami Hodrob, Mohammed Belkhatir, Saadat M. Alhashmi:

A Knowledge-based Model for Semantic Oriented Contextual Advertising. 2122-2140 - Shufang Li, Zhengping Hu, Mengyao Zhao:

Moving Object Detection Using Sparse Approximation and Sparse Coding Migration. 2141-2155
- Soo-Young Jeong, Won-Ho Kim:

Thermal Imaging Fire Detection Algorithm with Minimal False Detection. 2156-2170 - Chunhe Shi, Chengdong Wu

:
Vehicle Face Recognition Algorithm Based on Weighted Nonnegative Matrix Factorization with Double Regularization Terms. 2171-2185 - Jiyeon Kim, Hyung-Jong Kim:

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective. 2186-2203
- SeulKi Choi, Jin Kwak

:
Feature Analysis and Detection Techniques for Piracy Sites. 2204-2220 - Ji Woong Jang, SungMoon Kwon, SungJin Kim, Jungtaek Seo, Junhyoung Oh, Kyungho Lee:

Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid. 2221-2235 - Yahye Abukar Ahmed

, Baris Koçer, Bander Ali Saleh Al-rimy:
Automated Analysis Approach for the Detection of High Survivable Ransomware. 2236-2257 - Nguyen Huy Truong:

A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption. 2258-2274
- Xin Bian, Jinfeng Tian, Hong Wang, Mingqi Li, Rongfang Song:

A Simplified Zero-Forcing Receiver for Multi-User Uplink Systems Based on CB-OSFB Modulation. 2275-2293 - Jian Su

, Ruoyu Xu, Shiming Yu, Baowei Wang, Jiuru Wang:
Idle Slots Skipped Mechanism based Tag Identification Algorithm with Enhanced Collision Detection. 2294-2309
Volume 14, Number 6, June 2020
- Ruihui Mu, Xiaoqin Zeng:

Auxiliary Stacked Denoising Autoencoder based Collaborative Filtering Recommendation. 2310-2332
- Changsu Jung:

Prioritized Data Transmission Mechanism for IoT. 2333-2353 - Byeong-Mo Chang, Janine Cassandra Son, Kwanghoon Choi:

A GQM Approach to Evaluation of the Quality of SmartThings Applications Using Static Analysis. 2354-2376 - Enjie Ding, Yue Zhang, Yun Xin, Lei Zhang, Yu Huo, Yafeng Liu:

A Robust and Device-Free Daily Activities Recognition System using Wi-Fi Signals. 2377-2397
- Sheeraz Ahmed

, Ali Raza, Shahryar Shafique Qurashi, Mukhtar Ahmad, Muhammad Yousaf Ali Khan, Asif Nawaz
, Rohi Tariq:
RPSMDSM: Residential Power Scheduling and Modelling for Demand Side Management. 2398-2421
- Yang Li

, Gaochao Xu, Jiaqi Ge, Peng Liu, Xiaodong Fu:
Energy-Efficient Resource Allocation for Application Including Dependent Tasks in Mobile Edge Computing. 2422-2443
- Yang Chi

, Jinjiang Li:
Video Saliency Detection Using Bi-directional LSTM. 2444-2463 - Tariq Rahim, Soo Young Shin:

Subjective Evaluation of Ultra-high Definition (UHD) Videos. 2464-2479 - Jun Ming, Benshun Yi, Yungang Zhang, Huixin Li:

Low-dose CT Image Denoising Using Classification Densely Connected Residual Network. 2480-2496 - Cunbo Lu, Wengu Chen, Haibo Xu:

Deterministic Bipolar Compressed Sensing Matrices from Binary Sequence Family. 2497-2517
- Jin Myoung Kim, Hae Young Lee

:
An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks. 2518-2533 - Lunzhi Deng, Tian Xia, Xiuru He:

Provably secure certificateless encryption scheme in the standard model. 2534-2553 - Chin-Feng Lee, Chin-Chen Chang, Guanlong Li:

A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images. 2554-2575 - Chengwan He, Yue He:

A Reusable SQL Injection Detection Method for Java Web Applications. 2576-2590 - Shahid Anwar, Mohamad Fadli Zolkipli, Vitaliy Mezhuyev

, Zakira Inayat:
A Smart Framework for Mobile Botnet Detection Using Static Analysis. 2591-2611 - Qiu-yu Zhang, Yu-zhou Li

, Yingjie Hu:
An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing. 2612-2633 - Xiucai Ding, Xianyi Chen, Mengling Zou, Guangxing Zhang:

ASSVD: Adaptive Sparse Singular Value Decomposition for High Dimensional Matrices. 2634-2648
- Jiangfeng Sun, Hongxia Bie, Xingwang Li

:
Security performance analysis of SIMO relay systems over Composite Fading Channels. 2649-2669 - Ali Raza, Muhammad Fahad Khan

, Muazzam Maqsood
, Bilal Haider Bukhari, Farhan Aadil:
Adaptive k-means clustering for Flying Ad-hoc Networks. 2670-2685 - Siyang Xu, Xin Song, Lin Xia, Zhigang Xie:

Energy Efficiency Maximization for Energy Harvesting Bidirectional Cooperative Sensor Networks with AF Mode. 2686-2708 - Fadhil Mukhlif

, Kamarul Ariffin Bin Noordin
, Omar B. Abdul-Ghafoor:
Energy Harvesting Technique for Efficient Wireless Cognitive Sensor Networks Based on SWIPT Game Theory. 2709-2734 - Jian Su

, Ruoyu Xu, Shimin Yu, Baowei Wang, Jiuru Wang:
Redundant rule Detection for Software-Defined Networking. 2735-2751
Volume 14, Number 7, July 2020
- Abdullah Al-Alyan, Saad Al-Ahmadi

:
Robust URL Phishing Detection Based on Deep Learning. 2752-2768 - Rui Liang, Hanwen Guo, Jiayu Liu, Ziyang Liu:

Scenic Image Research Based on Big Data Analysis - Take China's Four Ancient Cities as an Example. 2769-2784 - Minsoo Kim, Gil-Jin Jang, Ji-Hwan Kim, Minho Lee:

Speaker Adaptation Using i-Vector Based Clustering. 2785-2799
- Junyan Wang:

Pareto fronts-driven Multi-Objective Cuckoo Search for 5G Network Optimization. 2800-2814 - Adnan Abid, Muhammad Faraz Manzoor

, Muhammad Shoaib Farooq
, Uzma Farooq, Muzammil Hussain
:
Challenges and Issues of Resource Allocation Techniques in Cloud Computing. 2815-2839
- Yiltan Bitirim, Duygu Çelik Ertugrul

:
An analysis of user behaviors on the search engine results pages based on the demographic characteristics. 2840-2861
- N. Rajesh Kumar

, R. Bala Krishnan
, Manikandan Ganesan
, N. R. Raajan:
An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission. 2862-2878 - Qingzhu Wang, Dan Yu, Yihai Zhu:

Angle-Range-Polarization Estimation for Polarization Sensitive Bistatic FDA-MIMO Radar via PARAFAC Algorithm. 2879-2890 - Changbo Hou, Shuai Guo:

Automatic carrier phase delay synchronization of PGC demodulation algorithm in fiber-optic interferometric sensors. 2891-2903 - Hyeonseung Im, Dohyung Kim:

An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction. 2904-2918
- Aeyoung Kim, Changda Wang, Seung-Hyun Seo

:
PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation. 2919-2937 - Zhisen Tang, Yuanlin Zheng, Wei Wang, Kaiyang Liao:

Image Quality Assessment by Combining Masking Texture and Perceptual Color Difference Model. 2938-2956 - Tuoqia Cao, Dongxia Chang, Yao Zhao:

A new Ensemble Clustering Algorithm using a Reconstructed Mapping Coefficient. 2957-2980 - Jinwei Wang, Renfeng Liu, Hao Wang, Bin Wu, Yun-Qing Shi:

Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform. 2981-2996 - Ankit Garg

, Ashish Negi:
A Survey on Content Aware Image Resizing Methods. 2997-3017 - Hongan Wei, Binqian Zhou, Ying Fang, Yiwen Xu, Tiesong Zhao

:
Fast Depth Video Coding with Intra Prediction on VVC. 3018-3038 - Gun-Yoon Shin, Sung-Sam Hong, Dong-Wook Kim, Cheol-Hun Hwang, Myung-Mook Han, Hwayoung Kim, Young Jae Kim:

A framework of Multi Linear Regression based on Fuzzy Theory and Situation Awareness and its application to Beach Risk Assessment. 3039-3056
- Wei Meng, Laichun Li:

Matrix completion based adaptive sampling for measuring network delay with online support. 3057-3075
- Hui Wang

, Chengjie Wang, Zihao Shen
, Dengwei Lin:
IKPCA-ELM-based Intrusion Detection Method. 3076-3092 - Xinqian Liu, Jiadong Ren, Haitao He, Qian Wang, Shengting Sun:

A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition. 3093-3115 - Xue-Yang Li

, Yan Chang, Shibin Zhang:
Quantum Secret Sharing Scheme with Credible Authentication based on Quantum Walk. 3116-3133
- Junyi Liu, Hongbing Huang, Yijun Zhong, Jiale He, Tiancong Huang, Qian Xiao, Weiheng Jiang:

Joint wireless and computational resource allocation for ultra-dense mobile-edge computing networks. 3134-3155 - Rui Guo, Yingjie Wu:

Polar Code Design for Nakagami-m Channel. 3156-3167
Volume 14, Number 8, August 2020
- Fuqiang Lin, Xingkong Ma, Yaofeng Chen, Jiajun Zhou, Bo Liu:

PC-SAN: Pretraining-Based Contextual Self-Attention Model for Topic Essay Generation. 3168-3186 - Meijuan Yin, Xiaonan Liu, Gongzhen He, Jing Chen, Ziqi Tang, Bo Zhao

:
A Method of Finding Hidden Key Users Based on Transfer Entropy in Microblog Network. 3187-3200
- Manjunath G. Asuti, Prabhugoud I. Basarkod:

TLSA: A Two Level Scheduling Algorithm for Multiple packets Arrival in TSCH Networks. 3201-3223 - Seungcheol Lee, Jaehyun Lee, Sengphil Hong, Jae-Hoon Kim:

Lightweight End-to-End Blockchain for IoT Applications. 3224-3242
- Usama Mir:

Bitcoin and Its Energy Usage: Existing Approaches, Important Opinions, Current Trends, and Future Challenges. 3243-3256 - Keonsoo Lee, Yunyoung Nam:

A Method of Evaluating Korean Articulation Quality for Rehabilitation of Articulation Disorder in Children. 3257-3269 - Waqas Nawaz

, Kifayat Ullah Khan, Khalid Bashir:
A Review on Path Selection and Navigation Approaches Towards an Assisted Mobility of Visually Impaired People. 3270-3294
- Fuquan Zhu, Huajun Wang, Liping Yang, Changguo Li, Sen Wang:

Lossless Compression for Hyperspectral Images based on Adaptive Band Selection and Adaptive Predictor Selection. 3295-3311 - Wakeel Ahmad, Syed Muhammad Adnan Shah, Aun Irtaza:

Plants Disease Phenotyping using Quinary Patterns as Texture Descriptor. 3312-3327
- Xianming Li, Guangzhong Sun:

A Solution to Privacy Preservation in Publishing Human Trajectories. 3328-3349
- Jing Zhang, Changzhen Li, Luyao Du, Wei Chen:

Research on Ship to Ship Channel Characteristics Based on Effect of Antenna Location in Inland Waterway at 5.9 GHz. 3350-3365 - Yonghong Chen, Jie Yang, Xuehong Cao, Shibing Zhang:

Energy Efficiency Analysis and Optimization of Multiantenna Heterogeneous Cellular Networks Modeled by Matérn Hard-core Point Process. 3366-3383
- Chung-Il Kim, Yongjang Cho, Seungwon Jung, Jehyeok Rew, Eenjun Hwang:

Animal Sounds Classification Scheme Based on Multi-Feature Network with Mixed Datasets. 3384-3398 - Zilong Jin

, Yuxin Xu, Xiaorui Zhang, Jin Wang, Lejun Zhang:
Trajectory-prediction based relay scheme for time-sensitive data communication in VANETs. 3399-3419 - Jungsoo Park, Long Nguyen-Vu, George Bencivengo, Souhwan Jung:

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence. 3420-3436 - Noo Ri On, Gi-Myeong Ryu, Myoung-Ju Koh, Jongsuk Ruth Lee, Nam-Gyu Kim:

An Empirical Study on the Intention to Reuse Computational Science and Engineering Platforms: A Case Study of EDISON. 3437-3456 - Chul Hwan Kwon, Dong Hyuk Jo, Hugo Guimarães Mariano:

Exploring the Determinants of Relationship Quality in Retail Banking Services. 3457-3472 - Wonseok Chae, Yejin Kim:

Text-driven Speech Animation with Emotion Control. 3473-3487 - Wei Fang

, Weinan Yi, Lin Pang, Shuonan Hou
:
A Method of License Plate Location and Character Recognition based on CNN. 3488-3500 - Shuang Li, Sha-sha Du, Wenfeng Huang, Siyu Liang, Jinxi Deng, Le Wang, Huiwu Huang, Xinhai Liao, Shen Su:

A Light-weighted Data Collection Method for DNS Simulation on the Cyber Range. 3501-3518 - Jian Liu, Yidi Huang:

Comparison of Different CNN Models in Tuberculosis Detecting. 3519-3533 - Jingwen Liu, Junshan Tan, Jiaohua Qin, Xuyu Xiang:

Smoke Image Recognition Method Based on the optimization of SVM parameters with Improved Fruit Fly Algorithm. 3534-3549 - Shuhua Huang, Weiwei Liu, Guangjie Liu, Yuewei Dai, Wen Tian:

Exploiting Correlation Characteristics to Detect Covert digital communication. 3550-3566 - Ling Tan, Dawei Xuan, Jingming Xia, Chao Wang:

Weather Recognition Based on 3C-CNN. 3567-3582
Volume 14, Number 9, September 2020
- Husnu Baris Baydargil, Jangsik Park, Do-Young Kang, Hyun Kang, Kook Cho:

A Parallel Deep Convolutional Neural Network for Alzheimer's disease classification on PET/CT brain images. 3583-3597 - Xiufang Sun, Jianbo Li, Zhiqiang Lv

, Chuanhao Dong:
Traffic Flow Prediction Model Based on Spatio-Temporal Dilated Graph Convolution. 3598-3614
- Shiqiang Zhang, Yang Cao, Zhenhu Ning, Fei Xue, Dongzhi Cao, Yongli Yang:

A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value. 3615-3638 - Sohail Abbas, Muhammad Haqdad, Muhammad Zahid Khan

, Haseeb Ur Rehman, Ajab Khan, Atta ur Rehman Khan
:
Survivability Analysis of MANET Routing Protocols under DOS Attacks. 3639-3662
- K. Devi

, D. Paulraj, Balasubramanian Muthusenthil:
Deep Learning Based Security Model for Cloud based Task Scheduling. 3663-3679
- Pei Li, Zi Yang Liu:

E-customized Product: User-centered Co-design Experiences. 3680-3692
- Karthika Veeramani

, Suresh Jaganathan:
Land Registration: Use-case of e-Governance using Blockchain Technology. 3693-3711
- Tong Liu, Jianghua Cheng, Zhimin Yuan, Honghu Hua, Kangcheng Zhao:

Video smoke detection with block DNCNN and visual change image. 3712-3729 - Hyun Yoo, Kyungyong Chung:

Deep Learning-based Evolutionary Recommendation Model for Heterogeneous Big Data Integration. 3730-3744 - Rui Gao, Deqiang Cheng, Jie Yao, Liangliang Chen:

Low-Rank Representation-Based Image Super-Resolution Reconstruction with Edge-Preserving. 3745-3761 - Xin Wang, Xin Zhang, Chen Ning:

Infrared Target Recognition using Heterogeneous Features with Multi-kernel Transfer Learning. 3762-3781 - Jangseok Oh, Hyung Gil Hong, Yongjun Cho, Haeyong Yun, Kap-Ho Seo, Hochul Kim, Mingi Kim, Onseok Lee:

A reliable quasi-dense corresponding points for structure from motion. 3782-3796 - Jeong Hoon Han, In Soo Kim, Cheol Hee Lee, Young Shik Moon:

Crack Detection Method for Tunnel Lining Surfaces using Ternary Classifier. 3797-3822 - Yifan He, Feng Li, Huihui Bai, Yao Zhao:

Adaptive Importance Channel Selection for Perceptual Image Compression. 3823-3840
- Kritsanapong Somsuk:

The new Weakness of RSA and The Algorithm to Solve this Problem. 3841-3857 - Jongkwan Lee:

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems. 3858-0 - E. Nirmala, S. Muthurajkumar:

A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge. 3870-3884 - Yunchao Wang, Zehui Wu, Qiang Wei, Qingxian Wang:

EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization. 3885-3906
- Jingrui Su, Guangliang Ren, Bo Zhao, Jian Ding:

Enhancing Irregular Repetition Slotted ALOHA with Polarization Diversity in LEO Satellite Networks. 3907-3923 - Nhu-Tai Do

, In Seop Na
, Soo-Hyung Kim:
HSFE Network and Fusion Model based Dynamic Hand Gesture Recognition. 3924-3940
Volume 14, Number 10, October 2020
- Wenzheng Yu, Hanxiaoya Zhang, Tianliang Chen, Jing Liu, Yanbo Shen:

The Analysis of Climate Change in Haiyan County. 3941-3954 - Juho Jung, Manbok Park, Kuk Cho, Cheol Mun, Junho Ahn:

Intelligent Hybrid Fusion Algorithm with Vision Patterns for Generation of Precise Digital Road Maps in Self-driving Vehicles. 3955-3971 - Hechan Tian, Fenlin Liu, Xiangyang Luo, Fan Zhang, Yaqiong Qiao:

Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection. 3972-3988
- Xue-Yong Yu, Xin-Hui Guo:

Data anomaly detection and Data fusion based on Incremental Principal Component Analysis in Fog Computing. 3989-4006
- Mohammad Azad:

Knowledge Representation Using Decision Trees Constructed Based on Binary Splits. 4007-4024
- Zhi Li, Qi Zhu:

An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene. 4025-4041
- Modigari Narendra, M. L. Valarmathi

, L. Jani Anbarasi
:
Optimization of 3D Triangular Mesh Watermarking Using ACO-Weber's Law. 4042-4059 - Chenchen Sun, Ziguan Cui, Zongliang Gan, Feng Liu:

No-reference Image Blur Assessment Based on Multi-scale Spatial Local Features. 4060-4079 - Shuaihui Qi, Jungang Yang, Xiaofeng Song, Chen Jian:

Multi-Task FaceBoxes: A Lightweight Face Detector Based on Channel Attention and Context Information. 4080-4097 - Suwon Lee:

Real-time Object Recognition with Pose Initialization for Large-scale Standalone Mobile Augmented Reality. 4098-4116 - Bin Jiang, Qiang Ren, Fei Dai, Tian Zhou, Guan Gui:

Parallel Multi-task Cascade Convolution Neural Network Optimization Algorithm for Real-time Dynamic Face Recognition. 4117-4135
- Yong-Woon Hwang, Im-Yeong Lee:

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud. 4136-4156 - Hao Hu, Jing Liu, Jinglei Tan, Jiang Liu:

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game. 4157-4175 - Dandy Pramana Hostiadi

, Waskitho Wibisono, Tohari Ahmad
:
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis. 4176-4197 - Shahrzad Azizi, Davud Mohammadpur:

Searchable Encrypted String for Query Support on Different Encrypted Data Types. 4198-4213
- Kwihoon Kim, Joo-Hyung Lee:

Deep CNN based Pilot Allocation Scheme in Massive MIMO systems. 4214-4230 - Xianbin Xie

, Yan Bi, Xi Nie:
Capacity Analysis of an AF Relay Cooperative NOMA System Using MRC. 4231-4245
Volume 14, Number 11, November 2020
- Junwei Li, Zhisong Pan:

Network Traffic Classification Based on Deep Learning. 4246-4267 - Si Shen, Guojiang Shen, Yang Shen, Duanyang Liu, Xi Yang, Xiangjie Kong

:
PGA: An Efficient Adaptive Traffic Signal Timing Optimization Scheme Using Actor-Critic Reinforcement Learning Algorithm. 4268-4289 - Abdullah Ali Alshehri, Adam Lutz, Soundararajan Ezekiel, Larry Pearlstein, John Conlen:

DCNN Optimization Using Multi-Resolution Image Fusion. 4290-4309
- Young-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek, Myung-Sup Kim:

Two-Pathway Model for Enhancement of Protocol Reverse Engineering. 4310-4330 - Deepanjal Shrestha

, Wenan Tan, Adesh Khadka, Seung Ryul Jeong:
Digital Tourism Security System for Nepal. 4331-4354
- Zhuolei Xiao, Yerong Zhang, Jie Yang:

Large-Scale Phase Retrieval via Stochastic Reweighted Amplitude Flow. 4355-4371
- Jianlong Liu, Wen'an Zhou, Lixia Lin:

Socially Aware Device-to-multi-device User Grouping for Popular Content Distribution. 4372-4394
- Zhen Zhong, Minjuan Wang, Wanlin Gao:

A multisource image fusion method for multimodal pig-body feature detection. 4395-4412 - Weizhong Li, Honghua Ma:

Realistic Scenes Reproduction Based on Total Variation. 4413-4425 - Xiaopin Zhao, Weibin Liu, Weiwei Xing, Xiang Wei

:
DA-Res2Net: a novel Densely connected residual Attention network for image semantic segmentation. 4426-4442 - Zheng Hui, Quan Zhou:

A Reversible Data Hiding Method for AMBTC Compressed Image without Expansion inside Stego Format. 4443-4462 - Zhuo Chen, Xiaobin Zheng, Tao Guan:

Structure-Preserving Mesh Simplification. 4463-4482
- Haitao Xu, Weiguo Zhang, Zuozhang Zhuo:

A Network Partition Approach for MFD-Based Urban Transportation Network Model. 4483-4501
- Shiqiang Zhu, Gaoli Wang, Yu He, Haifeng Qian:

Integral Attacks on Some Lightweight Block Ciphers. 4502-4521 - M. Vedaraj

, P. Ezhumalai:
Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme. 4522-4536 - Hsing-Han Liu, Pin-Chang Su, Meng-Hua Hsu:

An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing. 4537-4556 - Ziling Zhou, Shunquan Tan, Jishen Zeng, Han Chen, Shaobin Hong:

Ensemble Deep Learning Features for Real-World Image Steganalysis. 4557-4572 - Nur Afiqah Suzelan Amir

, Amizah Malip, Wan Ainun Mior Othman
:
Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles. 4573-4594
- Xin Song, Li Dong, Xue Huang, Lei Qin, Xiuwei Han:

Energy-efficient Power Allocation based on worst-case performance optimization under channel uncertainties. 4595-4610 - Shasha Zhao, Fei Wang, Yueqiang Ning, Yi Xiao, Dengying Zhang:

Vertical Handoff Decision Algorithm combined Improved Entropy Weighting with GRA for Heterogeneous Wireless Networks. 4611-4624
Volume 14, Number 12, December 2020
- Jieren Cheng, Yue Yang, Xiangyan Tang, Naixue Xiong

, Yuan Zhang, Feifei Lei:
Generative Adversarial Networks: A Literature Review. 4625-4647 - Do Young Choi, Jung-Hwan Oh, Ji Kwang Kim, Seung Eun Lee

:
Energy Efficient and Low-Cost Server Architecture for Hadoop Storage Appliance. 4648-4663 - Qingfeng Jing, Huaxia Wang

, Liming Yang:
Study on Fast-Changing Mixed-Modulation Recognition Based on Neural Network Algorithms. 4664-4681
- Zhiwei Li, Yu Lu, Zengguang Wang, Wenxin Qiao, Donghao Zhao:

Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network. 4682-4705
- Hoon Jung

, Bong Gyou Lee:
The Impact of Transforming Unstructured Data into Structured Data on a Churn Prediction Model for Loan Customers. 4706-4724 - Junli Mao, Lishui Chen, Jiacong Li, Yi Ge:

Controller Backup and Replication for Reliable Multi-domain SDN. 4725-4747 - Ki Youn Kim, In Kuk Song:

Exploring Working Group's Psychological Subjectivity on Public Smart Work Services in a Cloud-based Social Networking. 4748-4762
- Hyeon-Ho Kim, Suchul Lee, Seokmin Han:

Railroad Surface Defect Segmentation Using a Modified Fully Convolutional Network. 4763-4775
- Minhaz Uddin Ahmed

, Kim Yeong Hyeon, Phill-Kyu Rhee:
EER-ASSL: Combining Rollback Learning and Deep Learning for Rapid Adaptive Object Detection. 4776-4794 - Han Sun

, Wen Geng, Jiaquan Shen
, Ningzhong Liu, Dong Liang
, Huiyu Zhou:
Deeper SSD: Simultaneous Up-sampling and Down-sampling for Drone Detection. 4795-4815 - Francis Jesmar P. Montalbo

:
A Computer-Aided Diagnosis of Brain Tumors Using a Fine-Tuned YOLO-based Model with Transfer Learning. 4816-4834 - Shinjin Kang:

Facial Feature Based Image-to-Image Translation Method. 4835-4848 - Sangwoo Hahm, Hyungwoo Park

:
An Interdisciplinary Study of A Leaders' Voice Characteristics: Acoustical Analysis and Members' Cognition. 4849-4865 - Ibrahim Aliyu

, Jonathan Gana Kolo, Aibinu Abiodun Musa, Mutiu Adesina Adegboye, Chang Gyoon Lim:
Incorporating Recognition in Catfish Counting Algorithm Using Artificial Neural Network and Geometry. 4866-4888
- Hae Seon Jeong, Jin Kwak

:
Automated Detection Technique for Suspected Copyright Infringement Sites. 4889-4908 - Chanwoong Hwang

, Doyeon Kim, Taejin Lee:
Semi-supervised based Unknown Attack Detection in EDR Environment. 4909-4926
- Shaharyar Kamal, Hojin Kang, Cesar A. Azurdia-Meza, Dong Seong Kim

:
Improved Dual Sinc Pulses to Reduce ICI Power and PAPR in OFDM-based Systems. 4927-4945 - Fangmin Xu, Pengkai Zou, Haiquan Wang, Haiyan Cao, Xin Fang, Zhirui Hu:

Resource Allocation for D2D Communication in Cellular Networks Based on Stochastic Geometry and Graph-coloring Theory. 4946-4960

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














