


Остановите войну!
for scientists:


default search action
KSII Transactions on Internet and Information Systems, Volume 16
Volume 16, Number 1, January 2022
- Liquan Zhao, Leilei Wang:
A new lightweight network based on MobileNetV3. 1-15 - Xibin Jia, Chen Qian, Zhenghan Yang, Hui Xu, Xianjun Han, Hao Ren, Xinru Wu, Boyang Ma, Dawei Yang, Hong Min:
Boundary-Aware Dual Attention Guided Liver Segment Segmentation Model. 16-37 - Muhammad Hasnain, Imran Ghani, Muhammad Fermi Pasha
, Seung Ryul Jeong:
Machine Learning Methods for Trust-based Selection of Web Services. 38-59
- Cheng Yang, Guanming Lu:
Skin Lesion Segmentation with Codec Structure Based Upper and Lower Layer Feature Fusion Mechanism. 60-79 - Yang Lan, Lijie Xie, Xingjuan Cai, Lifang Wang:
A many-objective evolutionary algorithm based on integrated strategy for skin cancer detection. 80-96
- Geetha Sivanantham, Srivatsun Gopalakrishnan:
Stochastic Gradient Descent Optimization Model for Demand Response in a Connected Microgrid. 97-115 - Umair Abdullah, Muhammad Shaheen, Farhan Sabir Ujager:
Implementing Rule-based Healthcare Edits. 116-132 - Muhammad Salman Latif, Rafaqat Kazmi, Nadia Khan, Rizwan Majeed, Sunnia Ikram, Malik Muhammad Ali Shahid:
Pest Prediction in Rice using IoT and Feed Forward Neural Network. 133-152 - Ermatita, Ahmad Sanmorino, Samsuryadi, Dian Palupi Rini:
Analyzing Factors Contributing to Research Performance using Backpropagation Neural Network and Support Vector Machine. 153-172
- Mohammed Alotaibi
, Muhammad Ammad uddin:
Effectiveness of e-health systems in improving hypertension management and awareness: a systematic review. 173-187 - Xuesong Liang, Yongpeng Wu, Yujin Huang, Derrick Wing Kwan Ng, Pei Li, Yingbiao Yao:
Performance Optimization and Analysis on P2P Mobile Communication Systems Accelerated by MEC Servers. 188-210
- Weixing Wang, Angyan Tu, Fredrik Bergholm:
Improved Minimum Spanning Tree based Image Segmentation with Guided Matting. 211-230 - Hanwen Guo, Ziyang Liu, Zeyu Jiao:
Research on Satisfaction Evaluation Based on Tourist Big Data. 231-244 - Yao Fan, Yubo Li, Yingnan Shi, Shuaishuai Wang:
Application of YOLOv5 Neural Network Based on Improved Attention Mechanism in Recognition of Thangka Image Defects. 245-265
- Fen Wang, Yang Lu, Zhongqi Wang, Jinmei Tian:
Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function. 266-286 - Yihua Zhou, Songshou Dong
, Yuguang Yang:
Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting. 287-304 - Jiyoung Woo, Sung Hee Park, Huy Kang Kim:
Profane or Not: Improving Korean Profane Detection using Deep Learning. 305-318
- Xiaorong Xu, Minghang Sun, Wei-Ping Zhu, Wei Feng, Yingbiao Yao:
Bidirectional Link Resource Allocation Strategy in GFDM-based Multiuser SWIPT Systems. 319-333 - Chih-Heng Ke, Lia Astuti:
Applying Deep Reinforcement Learning to Improve Throughput and Reduce Collision Rate in IEEE 802.11 Networks. 334-349 - Wei Huang, Hongbo Xu, Zhongnian Li:
A half subcarrier guard band spectrum assignment scheme for multi-user FBMC systems. 350-364
Volume 16, Number 2, February 2022
- Chaoyan Zhang, Baolong Guo, Nannan Liao, Qiuyun Zhong, Hengyan Liu, Cheng Li, Jianglei Gong:
STAR-24K: A Public Dataset for Space Common Target Detection. 365-380
- Duc Anh Nguyen, Van Thanh Pham, Doan Tu Lap, Tuan-Khai Nguyen, Van An Tran, Duc-Tan Tran
, Huu An Nguyen, Nhu Dinh Dang:
Efficient Forest Fire Detection using Rule-Based Multi-color Space and Correlation Coefficient for Application in Unmanned Aerial Vehicles. 381-404 - Penghong Wang, Xingjuan Cai, Liping Xie:
A modified error-oriented weight positioning model based on DV-Hop. 405-423 - Zeliang Liu, Chunmei Zhang, Hui Peng, Qin Xu, Yubao Gao:
Drug distribution management system based on IoT. 424-444 - Yinjuan Deng, Shangping Wang, Qian Zhang, Duo Zhang:
A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT. 445-466 - Xin Xu, Jiawen Sun:
Study on the influence of Alpha wave music on working memory based on EEG. 467-479
- Deepanjal Shrestha, Wenan Tan, Bijay Gaudel, Neesha Rajkarnikar, Seung Ryul Jeong:
Multi-dimensional Analysis and Prediction Model for Tourist Satisfaction. 480-502
- Nor Azman Ismail, Cheah Wen Chai, Hussein Samma, Md Sah Salam, Layla Hasan
, Nur Haliza Abdul Wahab, Farhan Mohamed, Wong Yee Leng, Mohd. Foad Rohani:
Web-based University Classroom Attendance System Based on Deep Learning Face Recognition. 503-523
- Wenguang Ma, Wei Ma, Shibiao Xu:
Deep Facade Parsing with Occlusions. 524-543 - Zhixiong Huang, Jinjiang Li, Zhen Hua:
Attention-based for Multiscale Fusion Underwater Image Enhancement. 544-564
- Guangwei Xu, Shan Li, Miaolin Lai, Yanglan Gan, Xiangyang Feng, Qiubo Huang, Li Li, Wei Li:
Verification Control Algorithm of Data Integrity Verification in Remote Data sharing. 565-586 - Seonghyun Min, Kyungho Son:
MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights. 587-608 - Waheeb Ahmed, Di Wu, Daniel Mukathie:
Blockchain-Assisted Trust Management Scheme for Securing VANETs. 609-631 - Mehmet Sevri
, Hacer Karacan:
Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security. 632-657
- Rui Guo, Pei Yang, Na Ying, Lixin Wang:
Multiple Node Flip Fast-SSC Decoding Algorithm for Polar Codes Based on Node Reliability. 658-675
- Eunjung Shin, Ha Sung Hwang:
Exploring the Key Factors that Lead to Intentions to Use AI Fashion Curation Services through Big Data Analysis. 676-691 - Hyochan Lee, Hyunhak Song, Sungyoon Cho, Kiwon Kwon, Sunghyun Park, Taeho Im:
High-Speed Maritime Object Detection Scheme for the Protection of the Aid to Navigation. 692-712 - Hye-Jeong Kwon, Min-Jeong Kim, Ji-Won Baek, Kyungyong Chung:
Voice Frequency Synthesis using VAW-GAN based Amplitude Scaling for Emotion Transformation. 713-725 - Shaopeng Hou, Jongchang Ahn:
Design and Empirical Study of an Online Education Platform Based on B2B2C, Focusing on the Perspective of Art Education. 726-741 - Sony Peng, Yixuan Yang, Makara Mao, Doo-Soon Park:
Centralized Machine Learning Versus Federated Averaging: A Comparison using MNIST Dataset. 742-756
Volume 16, Number 3, March 2022
- Xuebin Xu, Kan Meng, Xiaomin Xing, Chen Chen:
Adaptive low-resolution palmprint image recognition based on channel attention mechanism and modified deep residual network. 757-770 - Zhan Tang, Xuchao Guo, Zhao Bai, Lei Diao, Shuhan Lu, Lin Li:
A Protein-Protein Interaction Extraction Approach Based on Large Pre-trained Language Model and Adversarial Training. 771-791 - Huaiwei Si, Guozhen Tan, Yifu Yuan, Yanfei Peng, Jianping Li:
Explicit Dynamic Coordination Reinforcement Learning Based on Utility. 792-812 - Yin Long, Xiaobo Liu, Simon Murphy:
Multi-view Clustering by Spectral Structure Fusion and Novel Low-rank Approximation. 813-829 - M. Irfan Marwat, Javed Ali Khan
, Mohammad Dahman Alshehri, Muhammad Asghar Ali, Hizbullah, Haider Ali, Muhammad Assam:
Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach. 830-860
- Beomjoong Kim
, Hyoung Joong Kim, Junghee Lee:
First Smart Contract Allowing Cryptoasset Recovery. 861-876
- You Yang, Sixun Liu, Bin Xing, Kesen Li:
Face inpainting via Learnable Structure Knowledge of Fusion Network. 877-893 - Kaiyang Liao, Bing Fan, Yuanlin Zheng, Guangfeng Lin
, Congjun Cao:
Image Retrieval Based on the Weighted and Regional Integration of CNN Features. 894-907 - Peng Li, Wenhui Wang, Junda Qiu, Congzhe You, Zhenqiu Shu:
Robust Generalized Labeled Multi-Bernoulli Filter and Smoother for Multiple Target Tracking using Variational Bayesian. 908-928 - Minjae Seo, Jong-Ho Paik, Gooman Park:
A Proposal for Zoom-in/out View Streaming based on Object Information of Free Viewpoint Video. 929-946
- N. Mohananthini
, C. Ananth, M. Y. Mohamed Parvees:
Secured Different Disciplinaries in Electronic Medical Record based on Watermarking and Consortium Blockchain Technology. 947-971 - Kai Zhang
, Xuejia Lai, Jie Guan, Bin Hu:
Research on the Security Level of μ2 against Impossible Differential cryptanalysis. 972-985 - Lingyun Xiang, Rong Wang, Zhongliang Yang, Yuling Liu:
Generative Linguistic Steganography: A Comprehensive Review. 986-1005 - Jaewon Choi, Jaehyoun Kim, Ho Lee:
Hybrid Fraud Detection Model: Detecting Fraudulent Information in the Healthcare Crowdfunding. 1006-1027 - Jun Yan, Ziwei Han, Yihui Zhou, Laifeng Lu:
A Differential Privacy Approach to Preserve GWAS Data Sharing based on A Game Theoretic Perspective. 1028-1046 - Di Li, Lang Li
, Yu Ou:
CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks. 1047-1062 - Ki-Wan Kang, Jung-Taek Seo, Sung Hoon Baek, Chul-Woo Kim, Ki-Woong Park:
SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation. 1063-1075
- Tae-Koo Kang:
Emotion Recognition using Short-Term Multi-Physiological Signals. 1076-1094
Volume 16, Number 4, April 2022
- Longbao Wang, Xin Lv, Jicun An:
Trajectory Distance Algorithm Based on Segment Transformation Distance. 1095-1109 - Hui Wen, Dongshun Jia, Zhiqiang Liu, Hang Xu, Guangtao Hao:
Optimal SVM learning method based on adaptive sparse sampling and granularity shift factor. 1110-1127 - Heming Jia, Kangjian Sun, Yao Li, Ning Cao:
Improved marine predators algorithm for feature selection and SVM optimization. 1128-1145 - Umer Ayub, Syed M. Ahsan
, Shavez M. Qureshi:
Scalable Big Data Pipeline for Video Stream Analytics Over Commodity Hardware. 1146-1165 - Saima Majeed, Ammar Ul Hassan, Jaeyoung Choi:
Few-Shot Content-Level Font Generation. 1166-1186
- Yindi Yao, Dangyuan Xie, Chen Wang, Ying Li, Yangli Li:
Routing Protocol for Wireless Sensor Networks Based on Virtual Force Disturbing Mobile Sink Node. 1187-1208 - JingYao Shi, KangYoon Lee:
Systolic blood pressure measurement algorithm with mmWave radar sensor. 1209-1223
- V. Sathya
, S. Kannan:
Lifetime Escalation and Clone Detection in Wireless Sensor Networks using Snowball Endurance Algorithm(SBEA). 1224-1248
- Yeon-sup Lim:
Cost-Efficient Framework for Mobile Video Streaming using Multi-Path TCP. 1249-1265
- Jiyang Chen, Bin Lian, Yongjie Li, Jialin Cui, Ping Yu, Zhenyu Shu, Jili Tao:
Double-Blind Compact E-cash from Bilinear Map. 1266-1285 - Wanshan Xu, Jianbiao Zhang, Yilin Yuan:
Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System. 1286-1306 - Keshav Sinha
, Partha Paul, Amritanjali:
An Improved Pseudorandom Sequence Generator and its Application to Image Encryption. 1307-1329
- Tongtong Cheng
, Yigang He, Yuting Wu, Shuguang Ning, Yongbo Sui, Yuan Huang:
Low Complexity Hybrid Precoding in Millimeter Wave Massive MIMO Systems. 1330-1350 - Young Jeon, Wonseok Lee, Tran Manh Hoang, Taejoon Kim:
Self-Organization of Multi-UAVs for Improving QoE in Unequal User Distribution. 1351-1372 - Zhen Cheng, Jie Sun, Jun Yan, Yuchun Tu:
Optimizations for Mobile MIMO Relay Molecular Communication via Diffusion with Network Coding. 1373-1391 - Jia Zhang, Jun Wu
, Zehao Chen, Ze Chen, Jipeng Gan, Jiangtao He, Bangyu Wang:
Spectrum- and Energy- Efficiency Analysis Under Sensing Delay Constraint for Cognitive Unmanned Aerial Vehicle Networks. 1392-1413
Volume 16, Number 5, May 2022
- Chin-Hung Kuan, Yungho Leu, Chien-Pang Lee
:
A Strategy of Assessing Climate Factors' Influence for Agriculture Output. 1414-1430 - Junke Zhu, Le Sun, Yilin Wang, Sudha Subramani, Dandan Peng, Shangwe Charmant Nicolas:
A ResNet based multiscale feature extraction for classifying multi-variate medical time series. 1431-1445 - Zhiguo Chen, Myoungjin Kim, Yun Cui:
SaaS application mashup based on High Speed Message Processing. 1446-1465 - Jaewoong Moon, Subin Kim, Jangyong Park, Jieun Lee, Kyung-shin Kim, Jaeseung Song:
MalDC: Malicious Software Detection and Classification using Machine Learning. 1466-1488
- Muhammad Rehan Faheem, Tayyaba Anees
, Muzammil Hussain:
Keywords and Spatial Based Indexing for Searching the Things on Web. 1489-1515 - Qing Liu, Lanlan Li:
A Cyber-Physical Information System for Smart Buildings with Collaborative Information Fusion. 1516-1539
- Timothy D. Paul, Vimalathithan Rathinasabapathy:
EvaluationOf LoRaWAN In A Highly Dense Environment With Design Of Common Automated Metering Platform (CAMP) Based On LoRaWAN Protocol. 1540-1560
- Rabatul Aduni Sulaiman
, Dayang Norhayati Abang Jawawi, Shahliza Abd Halim:
Classification Trends Taxonomy of Model-based Testing for Software Product Line: A Systematic Literature Review. 1561-1583
- Zhaozhe Gong, Xiaodong Li, Xiaoying Shi, Geng Liu, Bin Chen:
Research of 3D image processing of VR technology in medicine based on DNN. 1584-1596 - Jun Li, Xiang Li, Yifei Wei, Xiaojun Wang:
Deep Local Multi-level Feature Aggregation Based High-speed Train Image Matching. 1597-1610
- Haixia Zhao, Yongzhuang Wei, Zhenghong Liu:
A New BISON-like Construction Block Cipher: DBISON. 1611-1633 - Lejun Zhang, Yanfei Zou, Muhammad Hassam Yousuf, Weizheng Wang, Zilong Jin, Yansen Su, Seokhoon Kim:
BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment. 1634-1652 - Peiqian Liu, Shangchen Xie, Zihao Shen
, Hui Wang
:
Enhancing Location Privacy through P2P Network and Caching in Anonymizer. 1653-1670 - Dengyong Zhang, Pengjie Wu, Feng Li, Wenjie Zhu, Victor S. Sheng:
Cascaded-Hop For DeepFake Videos Detection. 1671-1686 - Huimin Ren, Suhyun Kim, Daehee Seo, Imyeong Lee:
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks. 1687-1707
- Qiujuan Qiao:
Routing optimization algorithm for logistics virtual monitoring based on VNF dynamic deployment. 1708-1734 - Vishal Bhargava, N. S. Raghava:
802.11 practical improvements using low power technology. 1735-1754 - Cunxiang Xie, Limin Zhang, Zhaogen Zhong:
Meta learning-based open-set identification system for specific emitter identification in non-cooperative scenarios. 1755-1777
Volume 16, Number 6, June 2022
- Rosna P. Haroon, Abdul Gafur M., Usman Barakkath Nisha:
An Efficient Machine Learning-based Text Summarization in the Malayalam Language. 1778-1799 - Bing Liu, Zhi-Jun Lv, Nan Zhu, Dongyu Chang, Mengxin Lu:
Hot Keyword Extraction of Sci-tech Periodicals Based on the Improved BERT Model. 1800-1817 - Yuyan Meng, Deyu Yuan, Shaofan Su, Yang Ming:
A Novel Transfer Learning-Based Algorithm for Detecting Violence Images. 1818-1832 - Jingxin Liu, Jieren Cheng, Xin Peng, Zeli Zhao, Xiangyan Tang, Victor S. Sheng:
MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition. 1833-1848
- Ghanshyam Singh, Pallavi Joshi, Ajay Singh Raghuvanshi:
A Novel Duty Cycle Based Cross Layer Model for Energy Efficient Routing in IWSN Based IoT Application. 1849-1876
- Yongquan Yang, Cuihua He, Bo Yin, Zhiqiang Wei, Bowei Hong:
Cloud Task Scheduling Based on Proximal Policy Optimization Algorithm for Lowering Energy Consumption of Data Center. 1877-1891 - S. Supreeth
, Kirankumari Patil:
VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment. 1892-1912
- Kailash Selvaraj, Saswati Mukherjee:
Global Manager - A Service Broker In An Integrated Cloud Computing, Edge Computing & IoT Environment. 1913-1934 - Keon Chul Park, Sangmin Lee:
Investigating Consumer Innovativeness for New Media Infusion: Role of Literacy in the Context of OTT Services in Korea. 1935-1952
- Qazi Mudassar Ilyas
, Muneer Ahmad, Noor Zaman Jhanjhi
, Muhammad Bilal Ahmad:
Analyzing the Impact of Social Distancing on the Stoning Ritual of the Islamic Pilgrimage. 1953-1972 - Abid Mehmood
, Dayang N. A. Jawawi:
AJFCode: An Approach for Full Aspect-Oriented Code Generation from Reusable Aspect Models. 1973-1993
- Long-Sheng Li, Hung-I Chi, Kai-Chung Xie, Din-Yuan Chan:
Mobility-Sensitive Multicast Protocol in NEMO. 1994-2017
- P. Ramya, Babu S. Venkatesh:
A Computerized Doughty Predictor Framework for Corona Virus Disease: Combined Deep Learning based Approach. 2018-2043 - Luoyuan Xu, Tao Guan, Yawei Luo
, Yuesong Wang, Zhuo Chen, Wenkai Liu:
EpiLoc: Deep Camera Localization Under Epipolar Constraint. 2044-2059
- Aluri V. H. Sai Prasad, Ganapavarapu V. S. Rajkumar:
A Novel Dynamic Optimization Technique for Finding Optimal Trust Weights in Cloud. 2060-2073 - Kritsanapong Somsuk:
The Improved Estimation of the Least Upper Bound to Search for RSA's Private key. 2074-2093 - Hui Li, Yaping Chen, Borong Zou:
Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting. 2094-2114 - Jin-gang Kim, Sueng-bum Lim, Taejin Lee:
Efficient Illegal Contents Detection and Attacker Profiling in Real Environments. 2115-2130
Volume 16, Number 7, July 2022
- Xuebin Xu, Jiada Zhang, Xiaorui Cheng, Longbin Lu, Yuqing Zhao, Zongyu Xu, Zhuangzhuang Gu:
A Tuberculosis Detection Method Using Attention and Sparse R-CNN. 2131-2153 - Vanitha Sivagami Sivasankaravel:
Cost Effective Image Classification Using Distributions of Multiple Features. 2154-2168 - Abdullah Hussein Alamoodi, Mohammed Rashad Baker
, Osamah Shihab Albahri, Bilal Bahaa Zaidan, A. A. Zaidan, Wing-Kwong Wong, Salem Garfan, Ahmed Shihab Albahri, Miguel A. Alonso
, Ali Najm Jasim, M. J. Baqer:
Public Sentiment Analysis and Topic Modeling Regarding COVID-19's Three Waves of Total Lockdown: A Case Study on Movement Control Order in Malaysia. 2169-2190 - Yibo Hou, Jianfeng He, Bo She:
Respiratory Motion Correction on PET Images Based on 3D Convolutional Neural Network. 2191-2208
- Namhwa Lee, Minsu Jeong, Youngjae Kim, Jisoo Shin, Inwhee Joe, Sanghoon Jeon
, Byuk Sung Ko:
IoT-based Architecture and Implementation for Automatic Shock Treatment. 2209-2224 - Sang-Kon Kim, Taekon Kim:
Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service. 2225-2238 - Meixi Wu, Liang Guo, Xiaotong Yang, Lina Xie, Shaopeng Wang:
Five Forces Model of Computational Power: A Comprehensive Measure Method. 2239-2256
- Kennedy Chinedu Okafor, Omowunmi Mary Longe:
Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications. 2257-2285
- Lu Chen, Xin Zhang, Zhixin Sun:
Scalable Blockchain Storage Model Based on DHT and IPFS. 2286-2304
- Saleh Saeed
, Unsang Park:
A study on presence quality and cybersickness in 2D, smartphone, and VR. 2305-2327