


Остановите войну!
for scientists:


default search action
KSII Transactions on Internet and Information Systems, Volume 15
Volume 15, Number 1, January 2021
- Jianli Zhao, Qinzhi Zhang, Qiuxia Sun, Huan Huo, Yu Xiao, Maoguo Gong:
FolkRank++: An Optimization of FolkRank Tag Recommendation Algorithm Integrating User and Item Information. 1-19
- Hyunchul Jung, Hyungeun Jo, Heejo Lee:
UDP-Based Active Scan for IoT Security (UAIS). 20-34 - Waqar Saeed, Zulfiqar Ahmad, Ali Imran Jehangiri, Nader Mohamed, Arif Iqbal Umar, Jamil Ahmad:
A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing. 35-57
- Masnida Hussin, Siti Fajar Jalal, Rohaya Latip:
Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging. 58-73
- Weilong Ding, Xiaojie Zhu, Bin Xu, Yan Xu, Kai Chen, Zang-xin Wan:
The Interactive Modeling Method of Virtual City Scene Based on Building Codes. 74-89 - Muaadh Mukred
, Zawiyah Mohammad Yusof, Umi Asma' Mokhtar, Ali Safa Sadiq, Burkan Hawash, Waleed Abdulkafi Ahmed:
Improving the Decision-Making Process in the Higher Learning Institutions via Electronic Records Management System Adoption. 90-113
- Zhigang Li, Xin Wang, Junsong Zhang, Wei Huang, Ye Tian:
Temporal and Spatial Traffic Analysis Based on Human Mobility for Energy Efficient Cellular Network. 114-130
- Zhen Zhong, Wanlin Gao, Minjuan Wang:
A Multimodal Fusion Method Based on a Rotation Invariant Hierarchical Model for Finger-based Recognition. 131-146 - Francis Jesmar P. Montalbo
, Alvin S. Alon:
Empirical Analysis of a Fine-Tuned Deep Convolutional Model in Classifying and Detecting Malaria Parasites from Blood Smears. 147-165 - Hoseung Kim, Seong-Soo Han, Chang-Sung Jeong:
Location-Based Saliency Maps from a Fully Connected Layer using Multi-Shapes. 166-179 - Ruoxin Ma, Shengjie Zhao, Samuel Cheng:
Self-Supervised Rigid Registration for Small Images. 180-194
- Zulfiqar Ali Arain
, Xuesong Qiu, Lujie Zhong, Mu Wang, Xingyan Chen
, Yongping Xiong, Kiran Nahida, Changqiao Xu:
Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network. 195-215 - Guisheng Wang
, Yequn Wang, Shufu Dong, Guoce Huang, Qilu Sun:
Optimization Methods for Power Allocation and Interference Coordination Simultaneously with MIMO and Full Duplex for Multi-Robot Networks. 216-239
- Rajeev Kumar
, Md Tarique Jamal Ansari, Abdullah Baz, Hosam Alhakami, Alka Agrawal, Raees Ahmad Khan:
A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods. 240-263 - Weichen Lian, Zhaobin Li, Chao Guo, Zhanzhen Wei, Xingyuan Peng:
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN. 264-284 - Eui-Jin Kim, Jin Kwak
:
Intelligent Piracy Site Detection Technique with High Accuracy. 285-301 - Wei Zhang, Yi Wu, Hu Xiong, Zhiguang Qin:
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System. 302-322 - Zhenhua Liu, Jiaqi Ji, Fangfang Yin, Baocang Wang:
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. 323-342
- Yuexia Zhang, Jiacheng Jin, Chong Liu, Pengfei Jia:
Indoor 3D Dynamic Reconstruction Fingerprint Matching Algorithm in 5G Ultra-Dense Network. 343-364 - Guosheng Li:
A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays. 365-382
Volume 15, Number 2, February 2021
- Zilong Jin, Chengbo Zhang, Guanzhe Zhao, Yuanfeng Jin, Lejun Zhang:
A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems. 383-403
- C. C. Lee
, Degang Xu, George Chan
:
Low-cost System with Handheld Analyzer for Optimizing the Position of Indoor Base Stations. 404-420 - Li Zhang, Yan-zhao Ren, Sha Tao, Jingdun Jia, Wanlin Gao:
High-Quality Coarse-to-Fine Fruit Detector for Harvesting Robot in Open Environment. 421-441 - Zhaoming Hu, Yang Lan, Zhixia Zhang, Xingjuan Cai:
A Many-objective Particle Swarm Optimization Algorithm Based on Multiple Criteria for Hybrid Recommendation System. 442-460
- Meng Wang, Zhen-Hu Ning, Jing Yu, Chuang-Bai Xiao:
Adaptive Algorithm in Image Reconstruction Based on Information Geometry. 461-484
- Kyeong-Bin Park, Ki-Seok Chung:
Selection-based Low-cost Check Node Operation for Extended Min-Sum Algorithm. 485-499
- Zi Ye
, Yogan Jaya Kumar, Goh Ong Sing, Fengyan Song, Xianda Ni, Jin Wang:
Artificial Intelligence-based Echocardiogram Video Classification by Aggregating Dynamic Information. 500-521 - Qiu-yu Zhang, Fu-jiu Xu, Jian Bai:
Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination. 522-539
- Weihua Gong, Rong Jin, Yanjun Li, Lianghuai Yang, Jianping Mei:
Privacy Protection Method for Sensitive Weighted Edges in Social Networks. 540-557 - Guangwei Xu, Miaolin Lai, Xiangyang Feng, Qiubo Huang, Xin Luo, Li Li, Shan Li:
Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges. 558-579 - Wenbin Zhang, Zehui Wu, Qiang Wei, Huijie Yuan:
A Systematic Treat Model for Software-Defined Networking. 580-599 - Wenqiang Tian
, Bin Hu:
Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON. 600-616 - Yueyu Zhang, Jie Chen, Hua Zhou, Lanjun Dang:
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid. 617-636
- Joongjin Kook:
The Design, Implementation, Demonstration of the Architecture, Service Framework, and Applications for a Connected Car. 637-657 - Wenwu Xie, Jian Xiao, Jinxia Yang, Ji Wang, Xin Peng, Chao Yu, Peng Zhu:
Deep Learning-Based Modulation Detection for NOMA Systems. 658-672 - WeiYe Xu, Junya Chu, Xiangbin Yu, Huiyu Zhou:
Energy-efficiency Optimization Schemes Based on SWIPT in Distributed Antenna Systems. 673-694
- Byung-Duck Lee, Keun-Ho Lee, Seong-Soo Han, Chang-Sung Jeong:
Reproduction based Multi-Contents Distribution Platform. 695-712 - Jong-In Choi, Sang-Hun Nam
:
Creating Deep Learning-based Acrobatic Videos Using Imitation Videos. 713-728 - Shingchern D. You, Chien-Hung Liu, Jia-Wei Lin:
Improvement of Vocal Detection Accuracy Using Convolutional Neural Networks. 729-748 - Jaepil Youn, Haengrok Oh, Jiwon Kang, Dongkyoo Shin:
Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness. 749-766 - Hua Wang
, Yuxin Zhu, Mengyu Wang, Jiqiang Niu, Xueye Chen, Yang Zhang:
Spatial Characteristics and Driving Forces of Cultivated Land Changes by Coupling Spatial Autocorrelation Model and Spatial-temporal Big Data. 767-785 - Junru Yin, Jiantao Qu, Wei Huang, Qiqiang Chen:
Road Damage Detection and Classification based on Multi-level Feature Pyramids. 786-799 - Zhigang Li, Xin Wang, Xinan Yue, Yingli Ji, Hua Wang:
Exploring the Influence of Vehicle Mobility on Information Spreading in VANETs. 800-813
Volume 15, Number 3, March 2021
- Junho Ahn, Akshay Mysore, Kati Zybko, Caroline Krumm, Dohyeon Lee, Da-Hyeon Kim, Richard Han, Shivakant Mishra, Thompson Hobbs:
Intelligent Robust Base-Station Research in Harsh Outdoor Wilderness Environments for Wildsense. 814-836 - Donghyun Lee, Hosung Park, Soonshin Seo, Hyunsoo Son, Gyujin Kim, Ji-Hwan Kim:
Robustness of Differentiable Neural Computer Using Limited Retention Vector-based Memory Deallocation in Language Model. 837-852 - Dewen Seng, Jiaming Zhang, Xiaoying Shi:
Visual Analysis of Deep Q-network. 853-873 - Prohim Tam
, Sa Math
, Seokhoon Kim:
Intelligent Massive Traffic Handling Scheme in 5G Bottleneck Backhaul Networks. 874-890
- Xiaozhu Wu:
A Dynamic QoS Adjustment Enabled and Load-balancing-aware Service Composition Method for Multiple Requests. 891-910
- Hyeonseong Choi, Youngrang Kim, Jaehwan Lee, Yoonhee Kim
:
Empirical Performance Evaluation of Communication Libraries for Multi-GPU based Distributed Deep Learning in a Container Environment. 911-931 - Rabatul Aduni Sulaiman
, Dayang N. A. Jawawi, Shahliza Abd Halim:
A Dissimilarity with Dice-Jaro-Winkler Test Case Prioritization Approach for Model-Based Testing in Software Product Line. 932-951
- Manal M. Alqarni, Asma Cherif, Entisar S. Alkayal:
A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges. 952-973
- Hyun Yoo, Roy C. Park, Kyungyong Chung:
IoT-Based Health Big-Data Process Technologies: A Survey. 974-992 - Mingzhu Zhang:
A New Three-dimensional Integrated Multi-index Method for CBIR System. 993-1014 - Kalaphath Kounlaxay, YoonSik Shim, Shin-Jin Kang, Ho-Young Kwak, Soo Kyun Kim:
Learning Media on Mathematical Education based on Augmented Reality. 1015-1029
- Wanchang Jiang, Yanhui Liu, Shengda Wang, Jian Guo:
Bridge-edges Mining in Complex Power Optical Cable Network based on Minimum Connected Chain Attenuation Topological Potential. 1030-1050
- Ali Hamza
, Danish Shehzad
, Muhammad Shahzad Sarfraz, Usman Habib
, Numan Shafi:
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching. 1051-1077 - Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance. 1078-1099 - Mahdi Khosravy, Kazuaki Nakamura, Yuki Hirose, Naoko Nitta, Noboru Babaguchi:
Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System. 1100-1118 - Francisco Montes, Javier Bermejo Higuera, Luís Enrique Sanchez, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia:
Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey. 1119-1139
- Guowei Lei, Hailan Chen, Yuanan Liu:
Analysis of Antenna Selection in Two-way Relaying MIMO Systems with CPM Modulation. 1140-1155 - Insoo Hwang, Inseok Kang, Intae Hwang, Cheolwoo You:
Equal Gain Block Decomposition Methods for Multiuser MIMO Networks. 1156-1173 - Fangcheng Xu, Xiangbin Yu, WeiYe Xu, Jiali Cai:
Performance Analysis and Power Allocation for NOMA-assisted Cloud Radio Access Network. 1174-1192
Volume 15, Number 4, April 2021
- Ying Tian, Yuting Zhu:
Quality Variable Prediction for Dynamic Process Based on Adaptive Principal Component Regression with Selective Integration of Multiple Local Models. 1193-1215 - Weiwei Liu, Fu Wang, Chennan Zhang, Jingyu Zhang, Lei Wang:
A Simulation Study of Urban Public Transport Transfer Station Based on Anylogic. 1216-1231 - Jun-Ki Hong:
LSTM-based Sales Forecasting Model. 1232-1245 - Le Chang, Fan Zhang, Biao Li:
Fast and Accurate Single Image Super- Resolution via Enhanced U-Net. 1246-1262 - Bo-Lun Chen
, Yiyun Shen, Min Ji, Ji-Wei Liu, Yongtao Yu, Yue Zhang:
Competitive Influence Maximization on Online Social Networks under Cost Constraint. 1263-1274 - Yu Deng, Hang Lei, Xiaoyu Li, Yiou Lin, Wangchi Cheng, Shan Yang:
Attention Capsule Network for Aspect-Level Sentiment Classification. 1275-1292
- Jianrui Fan, Xinru Zhao, Wencan Wang, Shengsuo Cai, Lijuan Zhang:
Towards the Saturation Throughput Disparity of Flows in Directional CSMA/CA Networks: An Analytical Model. 1293-1316 - Aditya Tandon
, Pramod Kumar, Vinay Rishiwal, Mano Yadav, Preeti Yadav:
A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT. 1317-1341
- Manogar Ellappan, Abirami S:
Dynamic Prime Chunking Algorithm for Data Deduplication in Cloud Storage. 1342-1359
- Yumei Wu, Zhen Li, LanJie Zhao, Zhengwei Yu, Hong Miao:
Safety Ontology Modeling and Verification on MIS of Ship-Building and Repairing Enterprise. 1360-1388 - Bin Yu, Xiaofeng Li, He Zhao:
PoW-BC: A PoW Consensus Protocol Based on Block Compression. 1389-1408 - Jamal A. Nasir, Zia Ud Din:
Syntactic Structured Framework for Resolving Reflexive Anaphora in Urdu Discourse Using Multilingual NLP. 1409-1425
- Guosheng Zhao, Dongmei Liu, Jian Wang:
The Game Selection Model for the Payoff Strategy Optimization of Mobile CrowdSensing Task. 1426-1447
- Lu Chen, Feng Xiang, Zhixin Sun:
Image Deduplication Based on Hashing and Clustering in Cloud Storage. 1448-1463 - Baixi Xing, Jian Dou, Qing Huang, Huahao Si:
Stylized Image Generation based on Music-image Synesthesia Emotional Style Transfer using CNN Network. 1464-1485 - Shinjin Kang, Teasung Hahn:
Eyeglass Remover Network based on a Synthetic Image Dataset. 1486-1501 - Jaekwan Jeong, Kahui Park, Yaewon Hyun, Daewon Kim:
Measuring Psychological Support for the Unemployed: The Case of Kakao NEET Project. 1502-1520
- Teng Li, Yu Zhang, Sha Wang, Junjie Sun:
High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation. 1521-1537 - Yongkang Gong, Diqun Yan
, Terui Mao, Donghua Wang, Rangding Wang:
Defending and Detecting Audio Adversarial Example using Frame Offsets. 1538-1552 - Yuling Liu, Jiao Wu, Xianyi Chen:
An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS. 1553-1567
- Zhengyu Kong, Duanpo Wu, Xinyu Jin, Shuwei Cen, Fang Dong:
Improved AP Deployment Optimization Scheme Based on Multi-objective Particle Swarm Optimization Algorithm. 1568-1589
Volume 15, Number 5, May 2021
- Nadia Mansouri, Zied Lachiri:
Human Laughter Generation using Hybrid Generative Models. 1590-1609 - Xiaorui Shao
, Lijiang Wang, Chang Soo Kim, Ilkyeun Ra:
Fault Diagnosis of Bearing Based on Convolutional Neural Network Using Multi-Domain Features. 1610-1629 - Jang Hyun Kim, Min Hyung Park, Yerin Kim, Dongyan Nan
, Fernando Travieso:
Relation Between News Topics and Variations in Pharmaceutical Indices During COVID-19 Using a Generalized Dirichlet-Multinomial Regression (g-DMR) Model. 1630-1648 - Xiaochen Yue, Qicheng Liu:
Parallel Algorithm of Improved FunkSVD Based on Spark. 1649-1665 - Hua Wang
, Mengyu Wang, Yuxin Zhu, Jiqiang Niu, Xueye Chen, Yang Zhang:
Zoning Permanent Basic Farmland Based on Artificial Immune System coupling with spatial constraints. 1666-1689 - Tao Li, Wenduo Xu, Lina Wang, Ningpeng Li, Yongjun Ren, Jinyue Xia:
An Integrated Artificial Neural Network-based Precipitation Revision Model. 1690-1707
- Amith M. Weerasinghe, Rupasingha A. H. M. Rupasingha
:
Improving Web Service Recommendation using Clustering with K-NN and SVD Algorithms. 1708-1727
- Tao Yan, In-Ho Ra, Deyang Liu, Qian Zhang:
A Bit Allocation Method Based on Proportional-Integral-Derivative Algorithm for 3DTV. 1728-1743 - Yuhao Wang, Jun Ma:
Visual Object Tracking using Surface Fitting for Scale and Rotation Estimation. 1744-1760 - Juan Wang, Cong Ke, Minghu Wu, Min Liu, Chunyan Zeng:
Infrared and visible image fusion based on Laplacian pyramid and generative adversarial network. 1761-1777 - Wei Xiong
, Xiuhong Jia, Dichun Yang, Meihui Ai, Lirong Li, Song Wang
:
DP-LinkNet: A convolutional network for historical document image binarization. 1778-1797 - Chunmao Wu, Huayuan Xu, Ziyang Liu:
The Approaches of Positive Experience Design on IoT Intelligent Products. 1798-1813 - Yan Liu, Bingxue Lv, Jingwen Wang, Wei Huang, Tiantian Qiu, Yunzhong Chen:
Single Low-Light Ghost-Free Image Enhancement via Deep Retinex Model. 1814-1828
- Wei Liu, Linlin Ci, LiPing Liu:
A Configurable Software-based Approach for Detecting CFEs Caused by Transient Faults. 1829-1846 - Wenchao Li, Hu Xiong:
Efficient Proxy Re-encryption Scheme for E-Voting System. 1847-1870 - Young Lee, Sang Geun Hahn:
State of the Art of Anti-Screen Capture Protection Techniques. 1871-1890 - Huanruo Li, Yunfei Guo, Shumin Huo, Yuehang Ding:
EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception. 1891-1908 - Alejandro Enciso Bernal, Sergio Mauricio Martínez Monterrubio
, Javier Parra Fuente, Rubén González Crespo
, Elena Verdú
:
Methodology for Computer Security Incident Response Teams into IoT Strategy. 1909-1928
- Sangmi Moon, Hyeonsung Kim, Young-Hwan You, Cheol Hong Kim, Intae Hwang:
Coordinated Millimeter Wave Beam Selection Using Fingerprint for Cellular-Connected Unmanned Aerial Vehicle. 1929-1943 - Guosheng Li:
Sum-Rate Performance of A NOMA-based Two-Way Relay Approach for A Two-User Cellular Network. 1944-1956
Volume 15, Number 6, June 2021
- K. Balachander, D. Paulraj:
Building Energy Time Series Data Mining for Behavior Analytics and Forecasting Energy consumption. 1957-1980 - Wei Xu, Hao Zheng, Zhongxue Yang, Yingjie Yang:
Micro-Expression Recognition Base on Optical Flow Features and Improved MobileNetV2. 1981-1995 - Younghan Lee, Mi-Lyang Kim, Seoyoun Hong:
Big-data Analytics: Exploring the Well-being Trend in South Korea Through Inductive Reasoning. 1996-2011 - Jieren Cheng, Jingxin Liu, Xinbin Xu, Dongwan Xia, Le Liu, Victor S. Sheng:
A review of Chinese named entity recognition. 2012-2030
- Fangfang Gu, Keshen Jiang, Fangdong Cao:
Machine Learning Aided Tracking Analysis of Haze Pollution and Regional Heterogeneity. 2031-2048
- Farah Younas, Jumana Nadir, Muhammad Usman, Muhammad Attique Khan
, Sajid Ali Khan, Seifedine Kadry, Yunyoung Nam:
An Artificial Intelligence Approach for Word Semantic Similarity Measure of Hindi Language. 2049-2068 - Ping Ji, Hui Huang, Xueliang Liu, Xue-You Hu:
Product Adoption Maximization Leveraging Social Influence and User Interest Mining. 2069-2085
- ByongKwon Lee, Soo Kyun Kim, Seokhun Kim:
A Study on Pagoda Image Search Using Artificial Intelligence (AI) Technology for Restoration of Cultural Properties. 2086-2097 - Na Ma, Tingxin Wen:
Vehicle Face Re-identification Based on Nonnegative Matrix Factorization with Time Difference Constraint. 2098-2114 - Meng Xu, Rize Jin, Liangfu Lu, Tae-Sun Chung:
A Novel Cross Channel Self-Attention based Approach for Facial Attribute Editing. 2115-2127
- Appala Raju Uppala, C. Venkata Narasimhulu, K. Satya Prasad:
Improved Convolutional Neural Network Based Cooperative Spectrum Sensing For Cognitive Radio. 2128-2147
- Dat Phuc Tran Song, Yong-Hyeon Shin, Changhoon Lee:
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks. 2148-2167 - Prasanna Srinivasan V., Balasubadra K., Saravanan K., Arjun V. S., Malarkodi S.:
Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid. 2168-2187 - Qing Yang, Xiaoliang Wang, Jing Zheng, Wenqi Ge, Ming Bai, Frank Jiang:
LSTM Android Malicious Behavior Analysis Based on Feature Weighting. 2188-2203
- Xiaochen Liu, Yuanyuan Gao, Nan Sha, Guozhen Zang, Shijie Wang:
Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers. 2204-2224 - Ranida Hamidouche, Zibouda Aliouat, Ado Adamou Abba Ari
, Abdelhak Guéroui:
Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme. 2225-2239