


default search action
KSII Transactions on Internet and Information Systems, Volume 15
Volume 15, Number 1, January 2021
- Jianli Zhao, Qinzhi Zhang, Qiuxia Sun, Huan Huo

, Yu Xiao, Maoguo Gong:
FolkRank++: An Optimization of FolkRank Tag Recommendation Algorithm Integrating User and Item Information. 1-19
- Hyunchul Jung, Hyungeun Jo, Heejo Lee:

UDP-Based Active Scan for IoT Security (UAIS). 20-34 - Waqar Saeed, Zulfiqar Ahmad

, Ali Imran Jehangiri, Nader Mohamed, Arif Iqbal Umar, Jamil Ahmad:
A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing. 35-57
- Masnida Hussin, Siti Fajar Jalal

, Rohaya Latip:
Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging. 58-73
- Weilong Ding, Xiaojie Zhu, Bin Xu, Yan Xu, Kai Chen, Zang-xin Wan:

The Interactive Modeling Method of Virtual City Scene Based on Building Codes. 74-89 - Muaadh Mukred

, Zawiyah Mohammad Yusof, Umi Asma' Mokhtar, Ali Safa Sadiq, Burkan Hawash, Waleed Abdulkafi Ahmed:
Improving the Decision-Making Process in the Higher Learning Institutions via Electronic Records Management System Adoption. 90-113
- Zhigang Li, Xin Wang, Junsong Zhang, Wei Huang, Ye Tian:

Temporal and Spatial Traffic Analysis Based on Human Mobility for Energy Efficient Cellular Network. 114-130
- Zhen Zhong, Wanlin Gao, Minjuan Wang:

A Multimodal Fusion Method Based on a Rotation Invariant Hierarchical Model for Finger-based Recognition. 131-146 - Francis Jesmar P. Montalbo

, Alvin S. Alon
:
Empirical Analysis of a Fine-Tuned Deep Convolutional Model in Classifying and Detecting Malaria Parasites from Blood Smears. 147-165 - Hoseung Kim, Seong-Soo Han, Chang-Sung Jeong:

Location-Based Saliency Maps from a Fully Connected Layer using Multi-Shapes. 166-179 - Ruoxin Ma, Shengjie Zhao, Samuel Cheng:

Self-Supervised Rigid Registration for Small Images. 180-194
- Zulfiqar Ali Arain

, Xuesong Qiu, Lujie Zhong, Mu Wang, Xingyan Chen
, Yongping Xiong, Kiran Nahida, Changqiao Xu:
Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network. 195-215 - Guisheng Wang

, Yequn Wang, Shufu Dong, Guoce Huang, Qilu Sun:
Optimization Methods for Power Allocation and Interference Coordination Simultaneously with MIMO and Full Duplex for Multi-Robot Networks. 216-239
- Rajeev Kumar

, Md Tarique Jamal Ansari, Abdullah Baz, Hosam Alhakami, Alka Agrawal, Raees Ahmad Khan:
A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods. 240-263 - Weichen Lian

, Zhaobin Li, Chao Guo, Zhanzhen Wei, Xingyuan Peng:
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN. 264-284 - Eui-Jin Kim, Jin Kwak

:
Intelligent Piracy Site Detection Technique with High Accuracy. 285-301 - Wei Zhang, Yi Wu, Hu Xiong, Zhiguang Qin:

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System. 302-322 - Zhenhua Liu, Jiaqi Ji, Fangfang Yin, Baocang Wang:

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. 323-342
- Yuexia Zhang, Jiacheng Jin, Chong Liu, Pengfei Jia:

Indoor 3D Dynamic Reconstruction Fingerprint Matching Algorithm in 5G Ultra-Dense Network. 343-364 - Guosheng Li:

A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays. 365-382
Volume 15, Number 2, February 2021
- Zilong Jin

, Chengbo Zhang, Guanzhe Zhao, Yuanfeng Jin, Lejun Zhang:
A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems. 383-403
- C. C. Lee

, Degang Xu, George Chan
:
Low-cost System with Handheld Analyzer for Optimizing the Position of Indoor Base Stations. 404-420 - Li Zhang, Yan-zhao Ren, Sha Tao, Jingdun Jia, Wanlin Gao:

High-Quality Coarse-to-Fine Fruit Detector for Harvesting Robot in Open Environment. 421-441 - Zhaoming Hu, Yang Lan, Zhixia Zhang, Xingjuan Cai:

A Many-objective Particle Swarm Optimization Algorithm Based on Multiple Criteria for Hybrid Recommendation System. 442-460
- Meng Wang, Zhen-Hu Ning, Jing Yu, Chuang-Bai Xiao:

Adaptive Algorithm in Image Reconstruction Based on Information Geometry. 461-484
- Kyeong-Bin Park, Ki-Seok Chung:

Selection-based Low-cost Check Node Operation for Extended Min-Sum Algorithm. 485-499
- Zi Ye

, Yogan Jaya Kumar, Goh Ong Sing, Fengyan Song, Xianda Ni, Jin Wang:
Artificial Intelligence-based Echocardiogram Video Classification by Aggregating Dynamic Information. 500-521 - Qiu-yu Zhang

, Fu-jiu Xu
, Jian Bai:
Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination. 522-539
- Weihua Gong, Rong Jin, Yanjun Li, Lianghuai Yang, Jianping Mei:

Privacy Protection Method for Sensitive Weighted Edges in Social Networks. 540-557 - Guangwei Xu, Miaolin Lai, Xiangyang Feng, Qiubo Huang, Xin Luo, Li Li, Shan Li:

Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges. 558-579 - Wenbin Zhang, Zehui Wu, Qiang Wei, Huijie Yuan:

A Systematic Treat Model for Software-Defined Networking. 580-599 - Wenqiang Tian

, Bin Hu:
Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON. 600-616 - Yueyu Zhang, Jie Chen, Hua Zhou, Lanjun Dang:

A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid. 617-636
- Joongjin Kook:

The Design, Implementation, Demonstration of the Architecture, Service Framework, and Applications for a Connected Car. 637-657 - Wenwu Xie, Jian Xiao, Jinxia Yang, Ji Wang, Xin Peng, Chao Yu, Peng Zhu:

Deep Learning-Based Modulation Detection for NOMA Systems. 658-672 - WeiYe Xu, Junya Chu, Xiangbin Yu

, Huiyu Zhou:
Energy-efficiency Optimization Schemes Based on SWIPT in Distributed Antenna Systems. 673-694
- Byung-Duck Lee, Keun-Ho Lee, Seong-Soo Han, Chang-Sung Jeong:

Reproduction based Multi-Contents Distribution Platform. 695-712 - Jong-In Choi, Sang-Hun Nam

:
Creating Deep Learning-based Acrobatic Videos Using Imitation Videos. 713-728 - Shingchern D. You

, Chien-Hung Liu, Jia-Wei Lin:
Improvement of Vocal Detection Accuracy Using Convolutional Neural Networks. 729-748 - Jaepil Youn

, Haengrok Oh, Jiwon Kang, Dongkyoo Shin:
Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness. 749-766 - Hua Wang

, Yuxin Zhu, Mengyu Wang, Jiqiang Niu, Xueye Chen, Yang Zhang:
Spatial Characteristics and Driving Forces of Cultivated Land Changes by Coupling Spatial Autocorrelation Model and Spatial-temporal Big Data. 767-785 - Junru Yin, Jiantao Qu, Wei Huang, Qiqiang Chen:

Road Damage Detection and Classification based on Multi-level Feature Pyramids. 786-799 - Zhigang Li, Xin Wang, Xinan Yue, Yingli Ji, Hua Wang:

Exploring the Influence of Vehicle Mobility on Information Spreading in VANETs. 800-813
Volume 15, Number 3, March 2021
- Junho Ahn, Akshay Mysore, Kati Zybko, Caroline Krumm, Dohyeon Lee, Da-Hyeon Kim, Richard Han, Shivakant Mishra, Thompson Hobbs:

Intelligent Robust Base-Station Research in Harsh Outdoor Wilderness Environments for Wildsense. 814-836 - Donghyun Lee, Hosung Park, Soonshin Seo, Hyunsoo Son, Gyujin Kim, Ji-Hwan Kim:

Robustness of Differentiable Neural Computer Using Limited Retention Vector-based Memory Deallocation in Language Model. 837-852 - Dewen Seng, Jiaming Zhang, Xiaoying Shi:

Visual Analysis of Deep Q-network. 853-873 - Prohim Tam

, Sa Math
, Seokhoon Kim:
Intelligent Massive Traffic Handling Scheme in 5G Bottleneck Backhaul Networks. 874-890
- Xiaozhu Wu

:
A Dynamic QoS Adjustment Enabled and Load-balancing-aware Service Composition Method for Multiple Requests. 891-910
- Hyeonseong Choi, Youngrang Kim, Jaehwan Lee, Yoonhee Kim

:
Empirical Performance Evaluation of Communication Libraries for Multi-GPU based Distributed Deep Learning in a Container Environment. 911-931 - Rabatul Aduni Sulaiman

, Dayang N. A. Jawawi, Shahliza Abd Halim:
A Dissimilarity with Dice-Jaro-Winkler Test Case Prioritization Approach for Model-Based Testing in Software Product Line. 932-951
- Manal M. Alqarni, Asma Cherif, Entisar S. Alkayal

:
A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges. 952-973
- Hyun Yoo, Roy C. Park, Kyungyong Chung:

IoT-Based Health Big-Data Process Technologies: A Survey. 974-992 - Mingzhu Zhang:

A New Three-dimensional Integrated Multi-index Method for CBIR System. 993-1014 - Kalaphath Kounlaxay, YoonSik Shim, Shin-Jin Kang, Ho-Young Kwak, Soo Kyun Kim

:
Learning Media on Mathematical Education based on Augmented Reality. 1015-1029
- Wanchang Jiang, Yanhui Liu, Shengda Wang, Jian Guo:

Bridge-edges Mining in Complex Power Optical Cable Network based on Minimum Connected Chain Attenuation Topological Potential. 1030-1050
- Ali Hamza

, Danish Shehzad
, Muhammad Shahzad Sarfraz, Usman Habib
, Numan Shafi
:
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching. 1051-1077 - Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:

Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance. 1078-1099 - Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, Naoko Nitta, Noboru Babaguchi:

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System. 1100-1118 - Francisco Montes, Javier Bermejo Higuera, Luis Enrique Sánchez

, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia
:
Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey. 1119-1139
- Guowei Lei, Hailan Chen, Yuanan Liu:

Analysis of Antenna Selection in Two-way Relaying MIMO Systems with CPM Modulation. 1140-1155 - Insoo Hwang, Inseok Kang, Intae Hwang, Cheolwoo You:

Equal Gain Block Decomposition Methods for Multiuser MIMO Networks. 1156-1173 - Fangcheng Xu, Xiangbin Yu

, WeiYe Xu, Jiali Cai:
Performance Analysis and Power Allocation for NOMA-assisted Cloud Radio Access Network. 1174-1192
Volume 15, Number 4, April 2021
- Ying Tian, Yuting Zhu:

Quality Variable Prediction for Dynamic Process Based on Adaptive Principal Component Regression with Selective Integration of Multiple Local Models. 1193-1215 - Weiwei Liu, Fu Wang, Chennan Zhang, Jingyu Zhang, Lei Wang:

A Simulation Study of Urban Public Transport Transfer Station Based on Anylogic. 1216-1231 - Jun-Ki Hong:

LSTM-based Sales Forecasting Model. 1232-1245 - Le Chang, Fan Zhang, Biao Li:

Fast and Accurate Single Image Super- Resolution via Enhanced U-Net. 1246-1262 - Bolun Chen

, Yiyun Shen, Min Ji, Ji-Wei Liu, Yongtao Yu, Yue Zhang:
Competitive Influence Maximization on Online Social Networks under Cost Constraint. 1263-1274 - Yu Deng, Hang Lei, Xiaoyu Li

, Yiou Lin, Wangchi Cheng, Shan Yang:
Attention Capsule Network for Aspect-Level Sentiment Classification. 1275-1292
- Jianrui Fan

, Xinru Zhao, Wencan Wang, Shengsuo Cai, Lijuan Zhang:
Towards the Saturation Throughput Disparity of Flows in Directional CSMA/CA Networks: An Analytical Model. 1293-1316 - Aditya Tandon

, Pramod Kumar, Vinay Rishiwal, Mano Yadav, Preeti Yadav
:
A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT. 1317-1341
- Manogar Ellappan, Abirami S:

Dynamic Prime Chunking Algorithm for Data Deduplication in Cloud Storage. 1342-1359
- Yumei Wu, Zhen Li

, LanJie Zhao, Zhengwei Yu, Hong Miao:
Safety Ontology Modeling and Verification on MIS of Ship-Building and Repairing Enterprise. 1360-1388 - Bin Yu

, Xiaofeng Li, He Zhao:
PoW-BC: A PoW Consensus Protocol Based on Block Compression. 1389-1408 - Jamal Abdul Nasir, Zia Ud Din:

Syntactic Structured Framework for Resolving Reflexive Anaphora in Urdu Discourse Using Multilingual NLP. 1409-1425
- Guosheng Zhao, Dongmei Liu, Jian Wang:

The Game Selection Model for the Payoff Strategy Optimization of Mobile CrowdSensing Task. 1426-1447
- Lu Chen, Feng Xiang, Zhixin Sun:

Image Deduplication Based on Hashing and Clustering in Cloud Storage. 1448-1463 - Baixi Xing, Jian Dou, Qing Huang, Huahao Si:

Stylized Image Generation based on Music-image Synesthesia Emotional Style Transfer using CNN Network. 1464-1485 - Shinjin Kang, Teasung Hahn:

Eyeglass Remover Network based on a Synthetic Image Dataset. 1486-1501 - Jaekwan Jeong, Kahui Park, Yaewon Hyun, Daewon Kim:

Measuring Psychological Support for the Unemployed: The Case of Kakao NEET Project. 1502-1520
- Teng Li, Yu Zhang, Sha Wang, Junjie Sun:

High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation. 1521-1537 - Yongkang Gong, Diqun Yan

, Terui Mao, Donghua Wang, Rangding Wang:
Defending and Detecting Audio Adversarial Example using Frame Offsets. 1538-1552 - Yuling Liu, Jiao Wu, Xianyi Chen:

An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS. 1553-1567
- Zhengyu Kong, Duanpo Wu, Xinyu Jin, Shuwei Cen, Fang Dong:

Improved AP Deployment Optimization Scheme Based on Multi-objective Particle Swarm Optimization Algorithm. 1568-1589
Volume 15, Number 5, May 2021
- Nadia Mansouri, Zied Lachiri:

Human Laughter Generation using Hybrid Generative Models. 1590-1609 - Xiaorui Shao

, Lijiang Wang, Chang Soo Kim, Ilkyeun Ra:
Fault Diagnosis of Bearing Based on Convolutional Neural Network Using Multi-Domain Features. 1610-1629 - Jang Hyun Kim, Min Hyung Park, Yerin Kim, Dongyan Nan

, Fernando Travieso:
Relation Between News Topics and Variations in Pharmaceutical Indices During COVID-19 Using a Generalized Dirichlet-Multinomial Regression (g-DMR) Model. 1630-1648 - Xiaochen Yue, Qicheng Liu:

Parallel Algorithm of Improved FunkSVD Based on Spark. 1649-1665 - Hua Wang

, Mengyu Wang, Yuxin Zhu, Jiqiang Niu, Xueye Chen, Yang Zhang:
Zoning Permanent Basic Farmland Based on Artificial Immune System coupling with spatial constraints. 1666-1689 - Tao Li, Wenduo Xu, Lina Wang, Ningpeng Li, Yongjun Ren, Jinyue Xia:

An Integrated Artificial Neural Network-based Precipitation Revision Model. 1690-1707
- Amith M. Weerasinghe, Rupasingha A. H. M. Rupasingha

:
Improving Web Service Recommendation using Clustering with K-NN and SVD Algorithms. 1708-1727
- Tao Yan, In-Ho Ra, Deyang Liu, Qian Zhang:

A Bit Allocation Method Based on Proportional-Integral-Derivative Algorithm for 3DTV. 1728-1743 - Yuhao Wang, Jun Ma:

Visual Object Tracking using Surface Fitting for Scale and Rotation Estimation. 1744-1760 - Juan Wang, Cong Ke, Minghu Wu, Min Liu, Chunyan Zeng

:
Infrared and visible image fusion based on Laplacian pyramid and generative adversarial network. 1761-1777 - Wei Xiong

, Xiuhong Jia, Dichun Yang, Meihui Ai, Lirong Li, Song Wang
:
DP-LinkNet: A convolutional network for historical document image binarization. 1778-1797 - Chunmao Wu, Huayuan Xu, Ziyang Liu:

The Approaches of Positive Experience Design on IoT Intelligent Products. 1798-1813 - Yan Liu, Bingxue Lv, Jingwen Wang

, Wei Huang, Tiantian Qiu, Yunzhong Chen:
Single Low-Light Ghost-Free Image Enhancement via Deep Retinex Model. 1814-1828
- Wei Liu, Linlin Ci, LiPing Liu:

A Configurable Software-based Approach for Detecting CFEs Caused by Transient Faults. 1829-1846 - Wenchao Li, Hu Xiong:

Efficient Proxy Re-encryption Scheme for E-Voting System. 1847-1870 - Young Lee, Sang Geun Hahn:

State of the Art of Anti-Screen Capture Protection Techniques. 1871-1890 - Huanruo Li, Yunfei Guo, Shumin Huo, Yuehang Ding:

EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception. 1891-1908 - Alejandro Enciso Bernal, Sergio Mauricio Martínez Monterrubio

, Javier Parra Fuente, Rubén González Crespo
, Elena Verdú
:
Methodology for Computer Security Incident Response Teams into IoT Strategy. 1909-1928
- Sangmi Moon, Hyeonsung Kim, Young-Hwan You, Cheol Hong Kim, Intae Hwang:

Coordinated Millimeter Wave Beam Selection Using Fingerprint for Cellular-Connected Unmanned Aerial Vehicle. 1929-1943 - Guosheng Li:

Sum-Rate Performance of A NOMA-based Two-Way Relay Approach for A Two-User Cellular Network. 1944-1956
Volume 15, Number 6, June 2021
- K. Balachander, D. Paulraj:

Building Energy Time Series Data Mining for Behavior Analytics and Forecasting Energy consumption. 1957-1980 - Wei Xu, Hao Zheng, Zhongxue Yang, Yingjie Yang:

Micro-Expression Recognition Base on Optical Flow Features and Improved MobileNetV2. 1981-1995 - Younghan Lee

, Mi-Lyang Kim, Seoyoun Hong:
Big-data Analytics: Exploring the Well-being Trend in South Korea Through Inductive Reasoning. 1996-2011 - Jieren Cheng, Jingxin Liu, Xinbin Xu, Dongwan Xia, Le Liu, Victor S. Sheng:

A review of Chinese named entity recognition. 2012-2030
- Fangfang Gu, Keshen Jiang, Fangdong Cao:

Machine Learning Aided Tracking Analysis of Haze Pollution and Regional Heterogeneity. 2031-2048
- Farah Younas, Jumana Nadir, Muhammad Usman, Muhammad Attique Khan

, Sajid Ali Khan, Seifedine Kadry, Yunyoung Nam:
An Artificial Intelligence Approach for Word Semantic Similarity Measure of Hindi Language. 2049-2068 - Ping Ji, Hui Huang, Xueliang Liu, Xue-You Hu:

Product Adoption Maximization Leveraging Social Influence and User Interest Mining. 2069-2085
- ByongKwon Lee, Soo Kyun Kim

, Seokhun Kim:
A Study on Pagoda Image Search Using Artificial Intelligence (AI) Technology for Restoration of Cultural Properties. 2086-2097 - Na Ma, Tingxin Wen:

Vehicle Face Re-identification Based on Nonnegative Matrix Factorization with Time Difference Constraint. 2098-2114 - Meng Xu

, Rize Jin, Liangfu Lu, Tae-Sun Chung:
A Novel Cross Channel Self-Attention based Approach for Facial Attribute Editing. 2115-2127
- Appala Raju Uppala

, C. Venkata Narasimhulu, K. Satya Prasad:
Improved Convolutional Neural Network Based Cooperative Spectrum Sensing For Cognitive Radio. 2128-2147
- Dat Phuc Tran Song, Yong-Hyeon Shin, Changhoon Lee

:
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks. 2148-2167 - Prasanna Srinivasan V., Balasubadra K., Saravanan K.

, Arjun V. S., Malarkodi S.:
Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid. 2168-2187 - Qing Yang, Xiaoliang Wang

, Jing Zheng, Wenqi Ge, Ming Bai, Frank Jiang:
LSTM Android Malicious Behavior Analysis Based on Feature Weighting. 2188-2203
- Xiaochen Liu, Yuanyuan Gao, Nan Sha, Guozhen Zang, Shijie Wang:

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers. 2204-2224 - Ranida Hamidouche, Zibouda Aliouat

, Ado Adamou Abba Ari
, Abdelhak Guéroui:
Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme. 2225-2239 - Hui Dun

, Fang Ye, Shuhong Jiao:
Fast Channel Allocation for Ultra-dense D2D-enabled Cellular Network with Interference Constraint in Underlaying Mode. 2240-2254 - Qiuhua Wang, Mingyang Kang, Lifeng Yuan

, Yunlu Wang, Gongxun Miao, Kim-Kwang Raymond Choo:
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks. 2255-2281 - Xin Song, Yue Wang, Zhigang Xie

, Lin Xia:
A Cloud-Edge Collaborative Computing Task Scheduling and Resource Allocation Algorithm for Energy Internet Environment. 2282-2303
Volume 15, Number 7, July 2021
- Yilin Wang, Le Sun, Sudha Subramani:

CAB: Classifying Arrhythmias based on Imbalanced Sensor Data. 2304-2320 - Zhiqiang Lv

, Jianbo Li, Chuanhao Dong, Yue Wang, Haoran Li, Zhihao Xu:
DeepPTP: A Deep Pedestrian Trajectory Prediction Model for Traffic Intersection. 2321-2338 - Hao Jiao, Yunxue Liu, Hui Yu, Ke Li, Feiyuan Long, Yingjie Cui:

A Novel Algorithm of Joint Probability Data Association Based on Loss Function. 2339-2355
- Hongyuan Gao

, Shihao Wang, Yumeng Su, Helin Sun, Zhiwei Zhang:
Evolutionary Neural Network based on Quantum Elephant Herding Algorithm for Modulation Recognition in Impulse Noise. 2356-2376 - K. Manikanda Kumaran

, M. Chinnadurai, S. Manikandan, S. Palani Murugan
, E. Elakiya:
An IoT based Green Home Architecture for Green Score Calculation towards Smart Sustainable Cities. 2377-2398
- Li Duan, Weiping Wang, Baijing Han:

A Hybrid Recommendation System based on Fuzzy C-Means Clustering and Supervised Learning. 2399-2413
- Pravin Kshirsagar, Hariprasath Manoharan, Vineet Tirth

, Mohd Naved
, Ahmad Tasnim Siddiqui
, Arvind K. Sharma
:
Automation Monitoring With Sensors For Detecting Covid Using Backpropagation Algorithm. 2414-2433 - Jong-Yih Kuo, Hui-Chi Lin, Chien-Hung Liu:

A Study of Resource Utilization Improvement on Cloud Testing Platform. 2434-2454 - Afifah M. Ashari, Shahliza Abd Halim, Dayang N. A. Jawawi, Ushananthiny Suvelayutnan, Mohd Adham Isa:

Quality Driven Approach for Product Line Architecture Customization in Patient Navigation Program Software Product Line. 2455-2475 - Zhan Shi, Xiaoqin Zeng, Tingting Zhang, Lei Han, Ying Qian:

UML diagram-driven test scenarios generation based on the temporal graph grammar. 2476-2495
- Siyuan Sun, Ying Zheng, Junhua Zhou, Jiuxing Xing, Yifei Wei, Xiaojun Wang:

Resource Allocation for Heterogeneous Service in Green Mobile Edge Networks Using Deep Reinforcement Learning. 2496-2512
- Ying Fang, Weiling Chen, Tiesong Zhao, Yiwen Xu, Jing Chen:

Video Quality Assessment Based on Short-Term Memory. 2513-2530 - Yeongil Ryu, Eun-Seok Ryu:

Overview of Motion-to-Photon Latency Reduction for Mitigating VR Sickness. 2531-2546 - Abdul Jabbar, Xi Li, M. Munawwar Iqbal, Arif Jamal Malik:

FD-StackGAN: Face De-occlusion Using Stacked Generative Adversarial Networks. 2547-2567
- Choong-Hee Cho

:
Trade-off between Resource Efficiency and Fast Protection for Shared Mesh Protection. 2568-2588 - Zengwei Zheng, Chenwei Zhao, Jianwei Zhang, Jianping Cai:

Traffic Engineering with Segment Routing under Uncertain Failures. 2589-2609
- Kritsanapong Somsuk:

The alternative Method to Finish Modular Exponentiation and Point Multiplication Processes. 2610-2630
- Abdu Saif, Kamarul Ariffin Bin Noordin

, Kaharudin Dimyati, Nor Shahida Mohd Shah, Yousef Ali Al-Gumaei, Qazwan Abdullah, Kamal Ali Alezabi:
An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks. 2631-2649 - Jun Zhang, Qi Zhu:

Joint Optimization Algorithm Based on DCA for Three-tier Caching in Heterogeneous Cellular Networks. 2650-2667 - Yi-Feng Huang, Hsiao-Hwa Chen:

Applications of Intelligent Radio Technologies in Unlicensed Cellular Networks - A Survey. 2668-2717
Volume 15, Number 8, August 2021
- Yajie Sun, Tao Yin, Jian Yang, Zhiyu Cai, Shaoen Wu:

Impact Force Reconstruction of Composite materials based on Improved Regularization Technology. 2718-2731
- Mingzi Chen, Xin Wei, Liang Zhou:

Integrated Media Platform-based Virtual Office Hours Implementation for Online Teaching in Post-COVID-19 Pandemic Era. 2732-2748
- Yan Gu, Feng Yang, Weijun Zhao, Yiliang Guo, Chaobo Min:

Reflectance estimation for infrared and visible image fusion. 2749-2763
- Zhiyuan Tao, Fenlin Liu, Yan Liu, Xiangyang Luo:

A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching. 2764-2782 - Xiaoyang Han, Xiangru Meng, Zhenhua Yu, Dong Zhai:

A Dynamic Adjustment Method of Service Function Chain Resource Configuration. 2783-2804 - Rongbo Zhang, Xin Li, Yan Zhan:

Polymorphic Path Transferring for Secure Flow Delivery. 2805-2826
- Yingling Dai, Jian Weng

, Anjia Yang, Shui Yu
, Robert H. Deng
:
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. 2827-2848 - Dehao Tao, Zhen Yang, Xuanmei Qin, Qi Li, Yongfeng Huang

, Yubo Luo:
UEPF:A blockchain based Uniform Encoding and Parsing Framework in multi-cloud environments. 2849-2864 - Guojia Li, Lin You, Gengran Hu, Liqin Hu:

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing. 2865-2878
- Yongpeng Shi, Yujie Xia, Ya Gao, Jianhua Cui:

Cyclic Shift Based Tone Reservation PAPR Reduction Scheme with Embedding Side Information for FBMC-OQAM Systems. 2879-2899 - Zheng Niu, Yuzhong Jiang, Shuyang Jia, Zhi Huang, Wenliang Zou, Gang Liu, Yu Li:

Mathematical Analysis Power Spectrum of M-ary MSK and Detection with Optimum Maximum Likelihood. 2900-2922 - Jialin Xie, Qiang Liu, Kun Yang, Lin Lin:

Channel Capacity Analysis of DNA-based Molecular Communication with Length Encoding Mechanism. 2923-2943
- Xiu Jin, Sangwoo Hahm:

Using Online Information Support to Decrease Stress, Anxiety, and Depression. 2944-2958 - Yamin Han, Heejung Byun, Liangliang Zhang:

Prolonging Network Lifetime by Optimizing Actuators Deployment with Probabilistic Mutation Multi-layer Particle Swarm Optimization. 2959-2973 - Zainab Umair Kamangar, Isma Farah Siddiqui

, Qasim Ali Arain
, Umair Ayaz Kamangar
, Nawab Muhammad Faseeh Qureshi
:
Personality Characteristic-based Enhanced Software Testing Levels for Crowd Outsourcing Environment. 2974-2992 - Xiaorui Shao

, Chang Soo Kim:
Self-Supervised Long-Short Term Memory Network for Solving Complex Job Shop Scheduling Problem. 2993-3010 - Sukwoo Jung, Seho Park, KyungTaek Lee:

Pose Tracking of Moving Sensor using Monocular Camera and IMU Sensor. 3011-3024 - Byoungman An, Youngseop Kim:

Real-time Camera and Video Streaming Through Optimized Settings of Ethernet AVB in Vehicle Network System. 3025-3047 - Nayoung Ko

, Myeonggi Hong
, Jeeseon Hwang, Jeonghyeon Chang, EuiGab Hwang:
Are Online and Offline Delinquency Mutually Exclusive? Blurred Boundaries between Cyber Space and the Real-World. 3048-3067 - Chuanrong Wu, Ning Tan, Zhi Lu, Xiaoming Yang, Mark E. McMurtrey:

Strategies of Knowledge Pricing and the Impact on Firms' New Product Development Performance. 3068-3085 - Baoshu Li, Xin Zhou, Ping Dong:

Power Failure Sensitivity Analysis via Grouped ?1/2 Sparsity Constrained Logistic Regression. 3086-3101
Volume 15, Number 9, September 2021
- B. Selvalakshmi, M. Subramaniam, Sathiyasekar Kumarasamy:

Semantic Conceptual Relational Similarity Based Web Document Clustering for Efficient Information Retrieval Using Semantic Ontology. 3102-3119 - Moonseong Kim, Woochan Lee:

Adaptive Success Rate-based Sensor Relocation for IoT Applications. 3120-3137 - Jihun Chae, Namgi Kim:

Multicast Tree Generation using Meta Reinforcement Learning in SDN-based Smart Network Platforms. 3138-3150
- K. R. Remesh Babu, Preetha K. G., S. Saritha

, Rinil K. R.:
An Energy Efficient Intelligent Method for Sensor Node Selection to Improve the Data Reliability in Internet of Things Networks. 3151-3168
- Hazwani Nordin, Dalbir Singh, Zulkefli Mansor:

Interface Design for E-Learning: Investigating Design Characteristics of Colour and Graphic Elements for Generation Z. 3169-3185
- Weijia Huang, Weixing Zhu, Zhengyan Zhang, Yizheng Guo:

Multi-scale Local Difference Directional Number Pattern for Group-housed Pigs Recognition. 3186-3203 - Chuanyan Hao, Yuqi Wang, Bo Jiang, Sijiang Liu, Zhi-Xin Yang:

Higher-Order Conditional Random Field established with CNNs for Video Object Segmentation. 3204-3220 - Eunji Lee, Jikyung Jang:

Research Trend Analysis for Sustainable QR code use - Focus on Big Data Analysis. 3221-3242
- Hyun Kwon

, Hyunsoo Yoon, Daeseon Choi:
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers. 3243-3257 - Shanxi Li, Qingguo Zhou, Wei Wei:

Malware Detection with Directed Cyclic Graph and Weight Merging. 3258-3273 - Jiajie Du, Nurmamat Helil:

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption. 3274-3297 - Ji-Hwei Horng

, Chin-Chen Chang, Kun-Sheng Sun:
A Two-Layer Steganography for Mosaic Images. 3298-3321 - S. Mary Virgil Nithya, V. Rhymend Uthariaraj:

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation. 3322-3347 - Hua Wu, Ji-Hwei Horng

, Chin-Chen Chang:
Adaptive data hiding scheme based on magic matrix of flexible dimension. 3348-3364 - Shufen Niu, Lizhi Fang, Mi Song, Fei Yu, Song Han:

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid. 3365-3383 - Sixu Guo, Shen He, Li Su, Xinyue Zhang, Huizheng Geng, Yang Sun:

A data corruption detection scheme based on ciphertexts in cloud environment. 3384-3400 - Guangbo Wang, Feng Li, Pengcheng Wang, Yixiao Hu:

Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption. 3401-3420
- Da-Chun Wu, Ping-Yu Hsieh:

Copyright Protection of E-books by Data Hiding Based on Integer Factorization. 3421-3443 - Yifan Wang, Xin Liu, Mei Wang, Yu Yu:

A hidden anti-jamming method based on deep reinforcement learning. 3444-3457 - Qian Liu, Hao Zhang, Peidong Yu, Gang Wang, Zhaoyang Qiu:

A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field. 3458-3481
Volume 15, Number 10, October 2021
- Woochan Lee, Moonseong Kim, Jaeyoung Park

:
Speed-up of the Matrix Computation on the Ridge Regression. 3482-3497 - Hye-Yeon Yu, Yun-Gyung Cheong, Byung-Chull Bae:

Extracting and Clustering of Story Events from a Story Corpus. 3498-3512 - Jeong Kwan Park, Soo Kyung Park, Bong Gyou Lee:

Priority of Challenges for Activation of MyData Business: K-MyData Case. 3513-3533
- Ling-Wu Qian, Bingjie Yuan:

An indoor fusion positioning algorithm of Bluetooth and PDR based on particle filter with dynamic adjustment of weights calculation strategy. 3534-3553
- Tao Tao, Jianfeng Yang, Wei Wei, Marcin Wozniak

, Rafal Scherer, Robertas Damasevicius:
Design of a MEMS sensor array for dam subsidence monitoring based on dual-sensor cooperative measurements. 3554-3570 - HeeJeong Jasmine Lee, In Kim:

A Comparative Study of Social Network Tools for Analysing Chinese Elites. 3571-3587 - Cemal Aktürk, Ceren Çubukçu:

A Decision Making Model Proposal for Firewall Selection. 3588-3607
- Xiaodong Gu, Ji Ding:

Cascade Network Based Bolt Inspection In High-Speed Train. 3608-3626 - Sangmin Lee:

Determining Personal Credit Rating through Voice Analysis: Case of P2P loan borrowers. 3627-3641 - Huaming Liu, Guanming Lu, Xuehui Bi, Weilan Wang:

Patch size adaptive image inpainting. 3642-3667 - Han Qiao, Shuang Liu, Qingzhen Xu, Shouqiang Liu, Wanggan Yang

:
Two-Stream Convolutional Neural Network for Video Action Recognition. 3668-3684 - Hyeon Seok Yang, Jeong Hoon Han, Young Shik Moon:

Semi-Supervised Spatial Attention Method for Facial Attribute Editing. 3685-3707 - I. Kiruba Raji, K. K. Thyagharajan

, T. Vignesh, G. Kalaiarasi
:
Classifying Indian Medicinal Leaf Species Using LCFN-BRNN Model. 3708-3728 - Xialu Li, Ziguan Cui, Zongliang Gan, Guijin Tang, Feng Liu:

AANet: Adjacency auxiliary network for salient object detection. 3729-3749
- Nurul Atiqah Abu Talib, Kyung-Goo Doh:

Assessment of Dynamic Open-source Cross-site Scripting Filters for Web Application. 3750-3770 - Jee-Tae Park, Ui-Jun Baek, Min-Seong Lee, Young-Hoon Goo, Sung-Ho Lee, Myung-Sup Kim:

Flow based Sequential Grouping System for Malicious Traffic Detection. 3771-3792 - Zhe Wei, Shuyan Yu:

Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey. 3793-3814 - Xiaonian Wu, Jiaxu Yan, Lingchen Li, Runlian Zhang, Pinghai Yuan, Yujue Wang:

Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model. 3815-3833
- S. Sudha Mercy

, J. M. Mathana
, J. S. Leena Jasmine:
An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network. 3834-3857 - Xuting Duan, Hang Jiang, Daxin Tian, Jianshan Zhou, Gang Zhou, Wenjuan E, Yafu Sun, Shudong Xia:

Traffic Flow Sensing Using Wireless Signals. 3858-3874
Volume 15, Number 11, November 2021
- Jong Gab Ho, Dae-Gyeom Kim, Young Kim, Seung-wan Jang, Se Dong Min:

Development of Plantar Pressure Measurement System and Personal Classification Study based on Plantar Pressure Image. 3875-3891 - Yanpei Liu, Wei Huang, Li Han, Liping Wang:

A cache placement algorithm based on comprehensive utility in big data multi-access edge computing. 3892-3912 - Jinsheng Hao, Guoping Su, Xiaofeng Han, Wei Nie:

An expanded Matrix Factorization model for real-time Web service QoS prediction. 3913-3934 - Chang Liu

, Ruilin Hu:
Hot Topic Discovery across Social Networks Based on Improved LDA Model. 3935-3949
- Dian Zhang, Rujun Zhang, Haizhou Guo, Peng Xiang, Xiaonan Guo:

Cross-Technology Localization: Leveraging Commodity WiFi to Localize Non-WiFi Device. 3950-3969 - Qiuyan Cai, Xuwen Jing, Yu Chen, Jinfeng Liu, Chao Kang, Bingqiang Li:

Online Monitoring of Ship Block Construction Equipment Based on the Internet of Things and Public Cloud: Take the Intelligent Tire Frame as an Example. 3970-3990
- Han Zhou, Xuchao Guo, Chengqi Liu, Zhan Tang

, Shuhan Lu, Lin Li:
Question Similarity Measurement of Chinese Crop Diseases and Insect Pests Based on Mixed Information Extraction. 3991-4010 - N. P. Ponnuviji

, M. Vigilson Prem
:
An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm. 4011-4027 - Fanqi Meng, Wenying Cheng, Jingdong Wang:

Semi-supervised Software Defect Prediction Model Based on Tri-training. 4028-4042
- Shuyan Xiao, Weige Tao, Yu Wang, Ye Jiang, Minqian Qian:

Blind Quality Metric via Measurement of Contrast, Texture, and Colour in Night-Time Scenario. 4043-4064 - Jin Wang, Yiming Wu

, Shiming He, Pradip Kumar Sharma
, Xiaofeng Yu, Osama Alfarraj, Amr Tolba
:
Lightweight Single Image Super-Resolution Convolution Neural Network in Portable Device. 4065-4083 - Yutian Chen

, Wenyan Gan, Yi Zhu, Hui Tian, Cong Wang, Wenfeng Ma, Yunbo Li, Dong Wang, Jixian He:
Efficient Visual Place Recognition by Adaptive CNN Landmark Matching. 4084-4104
- Mingu Kang, HyeungKyeom Kim, Suchul Lee, Seokmin Han:

Resilience against Adversarial Examples: Data-Augmentation Exploiting Generative Adversarial Networks. 4105-4121 - Siddhartha Roy

, Saptarshi Roy, Arpita Biswas, Krishna Lal Baishnab:
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications. 4122-4144 - Yanji Piao, Dongyue Cui:

Privacy Analysis and Comparison of Pandemic Contact Tracing Apps. 4145-4162 - Man Yong Choi, Jin Kwak

:
Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19. 4163-4183 - Boya Yang, Wanli Peng

, Yiming Xue, Ping Zhong:
A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution. 4184-4202
- Wei Yang, Xiaojun Jing, Hai Huang, Chunsheng Zhu, Qiaojie Jiang, Dongliang Xie:

An Efficient Markov Chain Based Channel Model for 6G Enabled Massive Internet of Things. 4203-4223 - Jipeng Gan, Jun Wu

, Jia Zhang, Zehao Chen, Ze Chen:
Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective. 4224-4243 - Xiulin Qiu

, Yongsheng Xie, Yinyin Wang, Lei Ye, Yuwang Yang:
QLGR: A Q-learning-based Geographic FANET Routing Algorithm Based on Multi-agent Reinforcement Learning. 4244-4274
Volume 15, Number 12, December 2021
- Mengli Zhang

, Gang Zhou, Wanting Yu, Wenfen Liu:
KI-HABS: Key Information Guided Hierarchical Abstractive Summarization. 4275-4291 - Zhiqiang Feng

, Xiaogang Wang, Zhongfan Yang, Shaojie Guo, Xingzhong Xiong:
An Improved ViBe Algorithm of Moving Target Extraction for Night Infrared Surveillance Video. 4292-4307 - Jaewoong Moon, Subin Kim, Jaeseung Song

, Kyung-shin Kim:
Study on Machine Learning Techniques for Malware Classification and Detection. 4308-4325 - Liquan Zhao, Yupeng Zhang

:
Generative Adversarial Networks for single image with high quality image. 4326-4344 - Yanan Bai, Yong Feng, Wenyuan Wu:

Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing. 4345-4363
- Xiulei Wang, Bo Xu, Fenglin Jin:

An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing. 4364-4384 - Haoru Su, Xiaoming Yuan, Yujie Tang

, Rui Tian, Enchang Sun, Hairong Yan:
A Learning-based Power Control Scheme for Edge-based eHealth IoT Systems. 4385-4399
- Heongkyun Kim, Sangmin Lee, Hyunwoo Kwon, Eunmin Kim:

Design and Implementation of a Personal Health Record Platform Based on Patient-consent Blockchain Technology. 4400-4419
- Juan Wang, Chang Ding, Minghu Wu, Yuanyuan Liu, Guanhai Chen:

Lightweight multiple scale-patch dehazing network for real-world hazy image. 4420-4438 - Xiang Dong, Feng Li, Huihui Bai, Yao Zhao:

Dual Attention Based Image Pyramid Network for Object Detection. 4439-4455 - V. Manimaran

, K. G. Srinivasagan, S. Gokul, Israel Jeena Jacob
, S. Baburenagarajan:
A new framework for Person Re-identification: Integrated level feature pattern (ILEP). 4456-4475 - Zhenwei Yang, Liquan Shen:

A Multi-category Task for Bitrate Interval Prediction with the Target Perceptual Quality. 4476-4491
- Zhimin Liu, Guiyan Jiang:

Sensor Density for Full-View Problem in Heterogeneous Deployed Camera Sensor Networks. 4492-4507
- Keshav Sinha

, Partha Paul
, Amritanjali
:
Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server. 4508-4530 - Weiwei Lin

, Chaofan Yang, Zeqing Zhang, Xingsi Xue, Reiko Haga:
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data. 4531-4544 - Seham Alnefaie, Asma Cherif, Suhair Alshehri:

A Distributed Fog-based Access Control Architecture for IoT. 4545-4566
- Shanshan Wu, Guobing Hu, Li Yang, Bin Gu:

Analytical Approximation Algorithm for the Inverse of the Power of the Incomplete Gamma Function Based on Extreme Value Theory. 4567-4583 - Sungmook Lim, Gi-Hoon Ryu, Kyunbyoung Ko:

ODPM Channel Estimation Method using Multiple MRC and New Reliability Test in IEEE 802.11p Systems with Receive Diversity. 4584-4599 - Sungtae Kim, Sungmook Lim:

Advanced Energy Detector with Correlated Multiple Antennas. 4600-4616 - Deqing Zhu

, Shenji Luan:
Spatial Reuse in IEEE 802.11ax: Whether and How to Use in Practice. 4617-4632

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














