


default search action
KSII Transactions on Internet and Information Systems, Volume 18
Volume 18, Number 1, January 2024
Artificial Intelligence & Big Data
- Na Wang, Xianglian Zhao:
Time-Series Forecasting Based on Multi-Layer Attention Architecture. 1-14 - Yunbo Rao, Tian Tan, Shaoning Zeng, Zhanglin Cheng, Jihong Sun:
A dual path encoder-decoder network for placental vessel segmentation in fetoscopic surgery. 15-29 - Yonghyun Lee, Eunchan Kim
:
Deep Learning-based Delinquent Taxpayer Prediction: A Scientific Administrative Approach. 30-45
IoT & Application
- Anusha Bamini A. M., R. Chitra, Saurabh Agarwal
, Hyunsung Kim, Punitha Stephan, Thompson Stephan:
IoT-Based Automatic Water Quality Monitoring System with Optimized Neural Network. 46-63 - Yang Liu, Yingqi Fan, Ling Zhao, Bo Mi:
A refinement and abstraction method of the SPZN formal model for intelligent networked vehicles systems. 64-88
Information Systems
- Noorah Abdullah Al Manyi, Ahmad Fadhil Yusof, Ali Safaa Sadiq:
Emerging Trends in Cloud-Based E-Learning: A Systematic Review of Predictors, Security and Themes. 89-104 - Faizan Ullah
, Muhammad Nadeem, Muhammad Abrar:
Revolutionizing Brain Tumor Segmentation in MRI with Dynamic Fusion of Handcrafted Features and Global Pathway-based Deep Learning. 105-125
Multimedia & Computer Vision
- Porawat Visutsak
, Xiabi Liu, Keun Ho Ryu, Naphat Bussabong, Nicha Sirikong, Preeyaphorn Intamong, Warakorn Sonnui, Siriwan Boonkerd, Jirawat Thongpiem, Maythar Poonpanit, Akarasate Homwiseswongsa, Kittipot Hirunwannapong, Chaimongkol Suksomsong, Rittikait Budrit:
Transfer Learning for Caladium bicolor Classification: Proof of Concept to Application Development. 126-146
Security & Privacy
- Jun Yan, Jiawang Chen, Yihui Zhou, Zhenqiang Wu, Laifeng Lu:
An Uncertain Graph Method Based on Node Random Response to Preserve Link Privacy of Social Networks. 147-169 - Mohammed Abdul Majeed, Rossilawati Sulaiman, Zarina Shukur:
New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption. 170-191 - Yang Hua, Xu Xi
, Chengyi Qu, Jinglong Du, Maofeng Weng, Bao Ye:
An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformation. 192-210
Wireless Communication
- Jie Lu, Wenjiang Feng, Dan Pu:
Resource Allocation and Offloading Decisions of D2D Collaborative UAV-assisted MEC Systems. 211-232 - K. Vamshi Krishna, Ganesh Reddy Karri:
Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm. 233-262
Volume 18, Number 2, February 2024
Artificial Intelligence & Big Data
- Fengqian Pang, Xi Chen, Letong Li, Xin Xu, Zhiqiang Xing:
F_MixBERT: Sentiment Analysis Model using Focal Loss for Imbalanced E-commerce Reviews. 263-283 - Navin K., M. B. Mukesh Krishnan:
Knowledge Based Recommender System for Disease Diagnostic and Treatment Using Adaptive Fuzzy-Blocks. 284-310 - Jingjing Ye, Jun Wang:
Visual Model of Pattern Design Based on Deep Convolutional Neural Network. 311-326
IoT & Application
- Ziyang Jin, Yijun Wang, Jingying Lv:
Edge Computing Task Offloading of Internet of Vehicles Based on Improved MADDPG Algorithm. 327-347 - Haoyi Zhong, Yongjiang Zhao, Chang Gyoon Lim:
Abnormal State Detection using Memory-augmented Autoencoder technique in Frequency-Time Domain. 348-369
Information Systems
- Nur 'Aisyah Binti Zakaria Adli, Muneer Ahmad
, Norjihan Binti Abdul Ghani
, Sri Devi Ravana, Azah Anir Norman:
An Ensemble Classification of Mental Health in Malaysia related to the Covid-19 Pandemic using Social Media Sentiment Analysis. 370-396 - Farhan Hanis Muhmad Asri
, Dalbir Singh, Zulkefli Mansor, Helmi Norman:
A Review of Cross-Cultural Design to Improve User Engagement for Learning Management System. 397-419
Multimedia & Computer Vision
- Lingyun Yang, Yuning Dong, Zaijian Wang, Feifei Gao:
One-dimensional CNN Model of Network Traffic Classification based on Transfer Learning. 420-437 - Dong Yu, Jian Jin, Lili Meng, Zhipeng Chen, Huaxiang Zhang:
Adversarial Complementary Learning for Just Noticeable Difference Estimation. 438-455
Security & Privacy
- Xiangyu Ma, Yuntao Zhao, Yongxin Feng, Yutao Hu
:
A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism. 456-477 - Guoyong Han, Hongluan Zhao:
Revisited Security Evaluation on Midori-64 against Differential Cryptanalysis. 478-493 - Kangseok Kim:
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDS. 494-510 - Sol-Bee Lee, Jung-Hyok Kwon, Bu-Young Kim, Woo-Seong Shim, Dongwan Kim, Eui-Jik Kim:
Block-based Self-organizing TDMA for Reliable VDES in SANETs. 511-527
Volume 18, Number 3, March 2024
Artificial Intelligence & Big Data
- Ran Tian, Bo Wang, Chu Wang:
MAGRU: Multi-layer Attention with GRU for Logistics Warehousing Demand Prediction. 528-550 - Tianyang Li, Yingnan Han, Xiaolong Li:
A DQN-based Two-Stage Scheduling Method for Real-Time Large-Scale EVs Charging Service. 551-569 - Swapna Davies, Jaison Jacob
:
Novel Algorithms for Early Cancer Diagnosis Using Transfer Learning with MobileNetV2 in Thermal Images. 570-590
Information Systems
- Mehmet F. Karaca
:
Effects of Preprocessing on Text Classification in Balanced and Imbalanced Datasets. 591-609 - Abdulaziz Alanazi, Nur Fazidah Elias, Hazura Mohamed, Noraidah Sahari:
The Critical Success Factors Influencing the Use of Mobile Learning and its Perceived Impacts in Students' Education: A Systematic Literature Review. 610-632 - Shahid Saleem, Saif Ur Rehman Malik, Bilal Mehboob, Roobaea Alroobaea
, Sultan Abdullah Algarni, Abdullah M. Baqasah
, Naveed Ahmad, Muhammad Hasnain:
A UML-based Approach towards Test Case Generation and Optimization. 633-652
Multimedia & Computer Vision
- Cunzhe Liu, Zhen Hua, Jinjiang Li:
Deep Reference-based Dynamic Scene Deblurring. 653-669 - YeonSeung Choo, Boeun Kim, Hyun-Sik Kim, Yong-Suk Park:
3D Cross-Modal Retrieval Using Noisy Center Loss and SimSiam for Small Batch Training. 670-684
Security & Privacy
- L. Arulmozhiselvan, E. Uma:
Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications. 685-703 - Mamoona Arshad, Ahmad Karim:
Android Botnet Detection Using Hybrid Analysis. 704-719 - Jingjie Liu, Suzhen Cao, Caifen Wang, Chenxu Liu:
An Efficient PSI-CA Protocol Under the Malicious Model. 720-737 - Hong Zhang, Lang Li, Di Li:
Improve the Performance of Semi-Supervised Side-channel Analysis Using HWFilter Method. 738-754 - R. Alexander, K. Pradeep Mohan Kumar:
Genetic Algorithm based hyperparameter tuned CNN for identifying IoT intrusions. 755-778 - T. Madhuvanthi, A. Revathi:
A Survey on UAV Network for Secure Communication and Attack Detection: A focus on Q-learning, Blockchain, IRS and mmWave Technologies. 779-800 - Jiping Li, Yuanyuan Zhang
, Lixiang Shen, Jing Cao, Wenwu Xie, Yi Zheng, Shouyin Liu:
An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs. 801-825
Volume 18, Number 4, April 2024
Artificial Intelligence & Big Data
- Ruochen Huang
, Zhiyuan Wei, Wei Feng, Yong Li, Changwei Zhang, Chen Qiu, Mingkai Chen:
Edge Computing Model based on Federated Learning for COVID-19 Clinical Outcome Prediction in the 5G Era. 826-842 - Xiaorui Shao, Su Yeon Lee, Chang Soo Kim:
A Novel and Effective University Course Scheduler Using Adaptive Parallel Tabu Search and Simulated Annealing. 843-859 - Inayatul Haq, Tehseen Mazhar
, Hinna Hafeez, Najib Ullah, Fatma Mallek, Habib Hamam:
Exploring Machine Learning Classifiers for Breast Cancer Classification. 860-880
IoT & Application
- Sony P., G. Siva Shanmugam, Sureshkumar Nagarajan:
Enhancement of Semantic Interoperability in Healthcare Systems Using IFCIoT Architecture. 881-902 - Fengjiao Zhou, Rui Ma, Mohamad Shaharudin bin Samsurijan, Xiaoqin Xie:
Design of Smart City Considering Carbon Emissions under The Background of Industry 5.0. 903-921
Mobile Communication
- Kyeongjea Lee, Tae-Woo Kim, Sungyoon Cho, Kiwon Kwon, Dong Ku Kim:
Evaluating Relay Beamwidth for Enhanced Coverage and Data Rates in Buoy-Assisted Maritime Communications. 922-937
Multimedia & Computer Vision
- Hongliang Zhu, Hui Yin, Yanting Liu, Ning Chen:
Dual-stream Co-enhanced Network for Unsupervised Video Object Segmentation. 938-958 - A. Hussain, P. Balaji Srikaanth:
Leveraging Deep Learning and Farmland Fertility Algorithm for Automated Rice Pest Detection and Classification Model. 959-979 - Canlin Li, Shun Song, Pengcheng Gao, Wei Huang, Lihua Bi:
EDMFEN: Edge detection-based multi-scale feature enhancement Network for low-light image enhancement. 980-997
Security & Privacy
- Guangwei Xu, Chen Wang, Shan Li, Xiujin Shi, Xin Luo, Yanglan Gan:
Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing. 998-1019 - Lejun Zhang, Bo Zhang, Ran Guo, Zhujun Wang, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian, Sergey Gataullin
:
Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount. 1020-1041
Wireless Communication
- Yuke Sun, Aihua Zhang, Hao Yang, Di Tian, Haowen Xia:
Near-Optimal Low-Complexity Hybrid Precoding for THz Massive MIMO Systems. 1042-1058 - Amrutha Sasidharan
, Santhi Venkatakrishnan:
Intension to Use Mobile Banking: An Integration of Theory of Planned Behaviour (TPB) and Technology Acceptance Model (TAM). 1059-1074 - Xuancheng Jin, Zhen Cheng, Zhian Ye, Weihua Gong:
Optimizations of Multi-hop Cooperative Molecular Communication in Cylindrical Anomalous-Diffusive Channel. 1075-1089
Papers on APIC-IST 2023
- Haein Lee
, Hae Sun Jung, Heungju Park, Jang Hyun Kim:
CORRECT? CORECT!: Classification of ESG Ratings with Earnings Call Transcript. 1090-1100 - Jialei Ye, Xiaoyou He, Ziyang Liu:
Identification of Demand Type Differences and Their Impact on Consumer Behavior: A Case Study Based on Smart Wearable Product Design. 1101-1121 - Yootae Shin, Qianfeng Lin, Jooyoung Son:
A Comparison of Deep Learning Models for IQ Fingerprint Map Based Indoor Positioning in Ship Environments. 1122-1140
Volume 18, Number 5, May 2024
Artificial Intelligence & Big Data
- Tao Li, Liang Wang, Lina Wang, Rui Han:
Super-Resolution Reconstruction of Humidity Fields based on Wasserstein Generative Adversarial Network with Gradient Penalty. 1141-1162 - Panpan Guo, Gang Zhou, Jicang Lu, Zhufeng Li, Taojie Zhu:
Paper Recommendation Using SPECTER with Low-Rank and Sparse Matrix Factorization. 1163-1185 - Boying Zhao, Yuanyuan Qu, Mengliang Mu, Bing Xu, Wei He:
An Interpretable Bearing Fault Diagnosis Model Based on Hierarchical Belief Rule Base. 1186-1207 - Yun Meng:
Massive Music Resources Retrieval Method Based on Ant Colony Algorithm. 1208-1222 - Zilong Jin, Chi Zhang, Lejun Zhang:
An Inference Similarity-based Federated Learning Framework for Enhancing Collaborative Perception in Autonomous Driving. 1223-1237
IoT & Application
- Xiangyu Shi, Zhixia Zhang, Zhihua Cui, Xingjuan Cai:
Many-objective joint optimization for dependency-aware task offloading and service caching in mobile edge computing. 1238-1259
Mobile Communication
- Liu Hui:
Intelligent recommendation method of intelligent tourism scenic spot route based on collaborative filtering. 1260-1272
Networking
- Kookjin Kim, Jaepil Youn
, Hansung Kim, Dongil Shin, Dongkyoo Shin:
State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis. 1273-1300 - Seong-Mok Kim, Ye-Eun Jeong, Yong Soo Kim, Youn-Ho Lee, Seung Young Lee:
Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles. 1301-1316 - Long Cheng, Yuanyuan Shi, Chen Cui, Yuqing Zhou:
An Indoor Localization Algorithm of UWB and INS Fusion based on Hypothesis Testing. 1317-1340
Security & Privacy
- Ihsan Günes:
Robustness Analysis of a Novel Model-Based Recommendation Algorithms in Privacy Environment. 1341-1368
Wireless Communication
- Ting Li, Jinbiao Zhang:
A Novel Broadband Channel Estimation Technique Based on Dual-Module QGAN. 1369-1389 - Rooh Ullah, Beenish Ayesha Akram, Amna Zafar, Atif Saeed, Sultan H. Almotiri, Mohammed A. Al Ghamdi:
An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks. 1390-1411 - Choangyang Liu, Wenjie Dai, Rui Guo:
Syndrome Check aided Fast-SSCANL Decoding Algorithm for Polar Codes. 1412-1430
Volume 18, Number 6, June 2024
Artificial Intelligence & Big Data
- Pu Zhang, Di Zhao, Xiangjie Kong, Jialong Zhang, Lei Li:
A survey on cooperative fault-tolerant control for multiagent systems. 1431-1448 - Minhyuk Kim:
Regression Algorithms Evaluation for Analysis of Crosstalk in High-Speed Digital System. 1449-1461 - Zilong Jin, Jin Wang, Lejun Zhang:
Clustering-Based Federated Learning for Enhancing Data Privacy in Internet of Vehicles. 1462-1477
IoT & Application
- Sulaiman Sulmi Almutairi
, Rehmat Ullah, Qazi Zia Ullah, Habib Shah:
Inhalation Configuration Detection for COVID-19 Patient Secluded Observing using Wearable IoTs Platform. 1478-1499 - Enhou Zu, Haoming Wen, Ming-Hung Shu, Chih-Lung Yu:
Evaluation of Problems in Tourism Systems and Their Evolutionary Status Based on Self-Organization Theory. 1500-1517
Information Systems
- Taoer Yang, Aqsa, Rafaqat Kazmi, Karthik Rajashekaran:
AI-Enabled Business Models and Innovations: A Systematic Literature Review. 1518-1539
Multimedia & Computer Vision
- Manoj K., Iyapparaja Meenakshisundaram:
A Comprehensive Approach for Tamil Handwritten Character Recognition with Feature Selection and Ensemble Learning. 1540-1561 - Youguo He, Yizhi Sun, Yingfeng Cai, Chaochun Yuan, Jie Shen, Liwei Tian:
Multi-modal Pedestrian Trajectory Prediction based on Pedestrian Intention for Intelligent Vehicle. 1562-1582 - Wen Wu, Xiuqing Huang, Seth Y. Ntim, Yue Shen, Xinyu Li, Guopeng Wang:
Impact of Moral Intensity on Moral Behavior in the context of Artificial Intelligence: The Mediating Role of Technology Moral Sense. 1583-1598
Security & Privacy
- Ming Tan, Aodi Liu, Xiaohan Wang, Siyuan Shang, Na Wang, Xuehui Du:
A cross-domain access control mechanism based on model migration and semantic reasoning. 1599-1618 - Khaled H. Abuhmaidan, Marwan Alshar'e
, Abdallah M. Abualkishik, Ahmad K. Kayed:
Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption. 1619-1637
Wireless Communication
- Baochao Liu, Lina Wang:
Resource allocation algorithm for space-based LEO satellite network based on satellite association. 1638-1658
Papers on APIC-IST 2023
- Kyeongjea Lee, Joohyun Jo, Sungyoon Cho, Kiwon Kwon, Dong Ku Kim:
Link Quality Enhancement with Beamforming Using Kalman-based Motion Tracking for Maritime Communication. 1659-1674 - Hyunah Park, Kyung Han You:
An Investigation into the Relationship between Metaverse Usage Patterns and Cultural Tastes: A Study of Avatar Formation among Generation Z. 1675-1691 - Junseok Oh, Eunsoo Cho, Ji-Hwan Kim:
Integration of WFST Language Model in Pre-trained Korean E2E ASR Model. 1692-1705
Volume 18, Number 7, July 2024
Artificial Intelligence & Big Data
- Zhenzhen Yang, Xue Sun, Yongpeng Yang, Xinyi Wu:
MEDU-Net+: a novel improved U-Net based on multi-scale encoder-decoder for medical image segmentation. 1706-1725 - Zain Ul Abideen, Xiaodong Sun, Chao Sun, Hafiz Shafiq Ur Rehman Khalil
:
Improved Deep Learning-based Approach for Spatial-Temporal Trajectory Planning via Predictive Modeling of Future Location. 1726-1748
IoT & Application
- Meizhao Liu, Yingcheng Gu, Sen Dong, Liu Wei, Kai Liu, Yuting Yan, Yu Song, Huanyu Cheng, Lei Tang, Sheng Zhang:
Collaborative Inference for Deep Neural Networks in Edge Environments. 1749-1773 - Yu Geng, Tiecheng Song, Qiang Wang, Xiaoqin Song:
Geometric Optimization Algorithm for Path Loss Model of Riparian Zone IoT Networks Based on Federated Learning Framework. 1774-1794 - Yifan Hu
, Xiqiang Hou, Fuqiang Wang:
SDN-COR: An Efficient Network Coding Opportunistic Routing Method for Software-Defined Wireless Sensor Networks. 1795-1816 - Wanchang Jiang, Zhipeng Liu:
Software Key Node Recognition Algorithm for Defect Detection based on Node Expansion Degree and Improved K-shell Position. 1817-1839
Internet Computing
- Vinay K. Ahlawat, Gaurav Agarwal, Vikas Goel, Kueh Lee Hui, Mangal Sain:
A Novel encrypted XML streaming technique for indexing data on multiple channels. 1840-1867
Information Systems
- Tin T. Tran
, Václav Snásel, Thuan Q. Nguyen:
Collaborative filtering by graph convolution network in location-based recommendation system. 1868-1887
Multimedia & Computer Vision
- Zhenhua Li, Lei Zhang:
Multi-scale context fusion network for melanoma segmentation. 1888-1906 - Weiping Jiang, Yan Wei, Hao Zhai:
FS-Transformer: A new frequency Swin Transformer for multi-focus image fusion. 1907-1928
Networking
- Jindong Kim, Jonggeun Choi, Hyukjin Kwon:
A study on the development directions of a smart counter-drone defense system based on the future technological environment. 1929-1952 - Cheol Ryu, Jae-Ho Lee, Do-Hyung Kim, Hyung-Seok Lee, Young-Sae Kim, Jin-Hee Han, Jeongnyeo Kim:
A Comprehensive Survey of TPM for Defense Systems. 1953-1967
Security & Privacy
- V. Sakthivel, P. Prakash, Jae-Woo Lee, Prabu P:
Enhancing Transparency and Trust in Agrifood Supply Chains through Novel Blockchain-based Architecture. 1968-1985 - Nor Fadzilah Abdullah, Ammar Riadh Kairaldeen, Asma Abu-Samah, Rosdiadee Nordin:
Machine Learning-Based Transactions Anomaly Prediction for Enhanced IoT Blockchain Network Security and Performance. 1986-2009
Wireless Communication
- Ying Liu, Jinhong Bian, Yuanyuan Wang:
An Efficient mmWave MIMO Transmission with Hybrid Precoding. 2010-2026 - Xuemei Bai, Congcong Hou, Chenjie Zhang, Hanping Hu:
Reconfigurable Intelligent Surface assisted massive MIMO systems based on phase shift optimization. 2027-2046 - Bing Ning, Shuang Li, Xinli Wu, Wanming Hao:
Resource allocation for Millimeter Wave mMIMO-NOMA System with IRS. 2047-2066
Volume 18, Number 8, August 2024
Artificial Intelligence & Big Data
- Ji-Won Baek, Kyungyong Chung:
Meta Learning based Object Tracking Technology: A Survey. 2067-2081 - Guiyuan Zhu, Shengyang Liao, Tianming Zhan, Yunjie Chen:
An improved fuzzy c-means method based on multivariate skew-normal distribution for brain MR image segmentation. 2082-2102 - Qi Zhang, Jinfeng Ou, Hua-Ying Zhou:
Efficient Recognition of Easily-confused Chinese Herbal Slices Images Using Enhanced ResNeSt. 2103-2118
Internet Computing
- Bei He:
Crowd Psychological and Emotional Computing Based on PSMU Algorithm. 2119-2136
Information Systems
- Arif Djunaidy, Nisrina Fadhilah Fano:
Development of Customer Review Ranking Model Considering Product and Service Aspects Using Random Forest Regression Method. 2137-2156 - Chenye Qiu, Huixing Fang:
Demand Response Based Optimal Microgrid Scheduling Problem Using A Multi-swarm Sine Cosine Algorithm. 2157-2177 - Aswathy M. R., P. C. Reghu Raj, Ajeesh Ramanujan:
Effectiveness of Fuzzy Graph Based Document Model. 2178-2198
Multimedia & Computer Vision
- Shugang Liu, Jialong Chen, Qiangguo Yu, Jie Zhan, Linan Duan:
A fast defect detection method for PCBA based on YOLOv7. 2199-2213
Security & Privacy
- S. Shyam Sundar, R. S. Bhuvaneswaran, L. Sai Ramesh:
Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network. 2214-2229 - Seok Bin Son, Seong-Hee Park, Youn Kyu Lee:
A Comprehensive Study on Key Components of Grayscale-based Deepfake Detection. 2230-2252 - S. Thangam
, S. Sibi Chakkaravarthy:
An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication. 2253-2280
Wireless Communication
- Mingfei Zhao, Rui Xue:
Complex Field Network Coding with MPSK Modulation for High Throughput in UAV Networks. 2281-2297
Papers on APIC-IST 2023
- Hyunbin Kim, Junchul Chun:
Region and Global-Specific PatchCore based Anomaly Detection from Chest X-ray Images. 2298-2315 - Thanh-Hai Nguyen
, Kyoung-Sook Kim, Dinh-Lam Pham, Kwanghoon Pio Kim
:
A Web-based System for Business Process Discovery: Leveraging the SICN-Oriented Process Mining Algorithm with Django, Cytoscape, and Graphviz. 2316-2332
Papers on ICONI 2023
- Hyeonwoo Kim, Junsuk Lee, Jehyeok Rew, Eenjun Hwang:
Automated Facial Wrinkle Segmentation Scheme Using UNet++. 2333-2345 - Seungeun Chung, Youjin Seo, Han Young Ryoo:
Development of Innovative Product Designs with Stretchable Displays Based on User's Expected Experience. 2346-2365 - Jaehyuk So, Minjoon Kim:
Implementation of a High-speed Template Matching System for Wafer-vision Alignment Using FPGA. 2366-2380 - Wonseop Shin, Jaeseok Yoo, Bumsoo Kim, Yonghoon Jung, Muhammad Sajjad, Youngsup Park, Sanghyun Seo:
Generating 3D Digital Twins of Real Indoor Spaces based on Real-World Point Cloud Data. 2381-2398 - Gyusun Hwang, Junhee Han, Haejoong Kim:
A Digital Twin Architecture for Automotive Logistics- An Industry Case Study. 2399-2416 - GeunYoung Kim, Yunsik Ham, Jaecheol Ryou:
Privacy-preserving credential smart contracts using Zokrates. 2417-2430 - Jaeho Lee, Wongi Jeon, Juhyoung Sung, Kiwon Kwon, Yangseob Kim, Kyungwon Park, Jongho Paik, Sungyoon Cho:
Design of an Aquaculture Decision Support Model for Improving Profitability of Land-based Fish Farm Based on Statistical Data. 2431-2449 - Joonyoung Ahn, Kijung Ryu, Changik Oh, Taekryong Han, Heewon Kim, Dongho Kim:
A Study on The Conversion Factor between Heterogeneous DBMS for Cloud Migration. 2450-2463
Volume 18, Number 9, September 2024
Artificial Intelligence & Big Data
- Xuehao Du, Ping Ji, Wei Qin, Lei Wang, Yunshi Lan:
Probing Effects of Contextual Bias on Number Magnitude Estimation. 2464-2482 - Li Liu, Yuqi Kong:
Real-Time Instance Segmentation Method Based on Location Attention. 2483-2494 - Heejeong Jasmine Lee, Sang-Sun Yoo, Kang-Yoon Lee:
Machine Learning-Enhanced Survival Analysis: Identifying Significant Predictors of Mortality in Heart Failure. 2495-2511
IoT & Application
- Menda Ebraheem, Aravind Kumar Kondaji
, Y. Butchi Raju, N. Bhupesh Kumar:
A Computationally Effective Remote Health Monitoring Framework using AGTO-MLRC Models for CVD Diagnosis. 2512-2545 - Zeng Xing, Bo Zhao, Bo Xu, Guangliang Ren, Zhiqiang Liu:
Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things. 2546-2563
Information Systems
- Noora Shawareb, Ahmed Ewais, Fisnik Dalipi
:
Utilizing Data Mining Techniques to Predict Students Performance using Data Log from MOODLE. 2564-2588
Multimedia & Computer Vision
- Abdul Raheem
, Zhen Yang, Haiyang Yu, Muhammad Yaqub, Fahad Sabah, Shahzad Ahmed, Malik Abdul Manan
, Imran Shabir Chuhan:
IPC-CNN: A Robust Solution for Precise Brain Tumor Segmentation Using Improved Privacy-Preserving Collaborative Convolutional Neural Network. 2589-2604 - Huanlong Zhang, Weiqiang Fu, Bin Zhou, Keyan Zhou, Xiangbo Yang, Shanfeng Liu:
Memory Propagation-based Target-aware Segmentation Tracker with Adaptive Mask-attention Decision Network. 2605-2625 - Yulin Cao, Chunyu Li, Guoqing Zhang, Yuhui Zheng:
Low Lumination Image Enhancement with Transformer based Curve Learning. 2626-2641 - Xiaole Ge, Feng Zhou, Shuaiting Chen, Gan Gao, Rugang Wang:
Vehicle detection and tracking algorithm based on improved feature extraction. 2642-2664
Networking
- Youngho Kim, Seongyoung Sohn, Kyeong Tae Kim, Hae Sook Jeon, Sang-Min Lee, Yun-kyung Lee, Jeongnyeo Kim:
Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study. 2665-2691
Security & Privacy
- Isa Ismail, Khairul Akram Zainol Ariffin:
Open Source Tools for Digital Forensic Investigation: Capability, Reliability, Transparency and Legal Requirements. 2692-2716 - Zhuolin Mei, Jing Zeng
, Caicai Zhang, Shimao Yao, Jiaoli Shi, Bin Wu:
Fast Range Query on Encrypted Multi-dimensional Data in Cloud Environment. 2717-2738 - Zheng Zhang, Quan Ren, Jie Lu, Yuxiang Hu, Hongchang Chen:
DDPG-SDPCR: A DDPG-based Software Defined Perimeter Components Redeployment. 2739-2763
Wireless Communication
- Bin Qiu, Duan Li, Xian Li, Hailin Xiao:
FCBAFL: An Energy-Conserving Federated Learning Approach in Industrial Internet of Things. 2764-2781 - Yi Zheng
, Cunyi Liao, Ruifeng Xiao, Qiang He:
Convolutional GRU and Attention based Fall Detection Integrating with Human Body Keypoints and DensePose. 2782-2804 - Bin Zhong, Hehong Lin, Liang Chen, Zhongshan Zhang:
Performance Improvement for Device-to-Device (D2D) Users in Underlay Cellular Communication Networks. 2805-2817
Volume 18, Number 10, October 2024
Artificial Intelligence & Big Data
- Yuchen Liu
, Meng Wang, Gangmin Li, Terry R. Payne
, Yong Yue, Ka Lok Man:
Optimizing E-Commerce with Ensemble Learning and Iterative Clustering for Superior Product Selection. 2818-2839
IoT & Application
- Xiaoyuan Gu, Hongyuan Gao, Jingya Ma, Shibo Zhang, Jiayi Wang:
Joint Antenna Selection and Power Allocation Method Based on Quantum Energy Valley Optimization Algorithm for Massive MIMO IoT Systems. 2840-2856
Internet Services & Management
- Sangmin Lee, Semi Han:
An analysis of factors influencing college students' acceptance of telemedicine. 2857-2871
Information Systems
- Ramzi Salah, Muaadh Mukred, Lailatul Qadri Zakaria, Fuad Ali Mohammed Al-Yarimi:
A Machine Learning Approach for Named Entity Recognition in Classical Arabic Natural Language Processing. 2895-2919 - Nasa Zata Dina
, Sri Devi Ravana, Norisma Idris, Tseng-Ping Chiu:
Discovering Hidden Emotional Heterogeneity of Customers in Textual Reviews and its Influencing Factors. 2920-2942
Multimedia & Computer Vision
- I. Dhurga bai, A. Selvapandian
:
Performance Analysis of Cervical Cancer Detection System Using Fusion Based CFICNN Classifier. 2943-2965 - Chen Gao, Jiyong Xu, Ruixia Liu:
Marine Vessel Target Detection Algorithm Based On Improved YOLOv5. 2966-2983
Security & Privacy
- Chao-Hsien Hsieh, Fengya Xu, Qingqing Yang, Dehong Kong:
Efficient SVH2M for information anomaly detection in manufacturing processes on system call. 2984-3009 - Parasuraman Kumar, Arumugam Maharajan:
Maritime Cybersecurity Leveraging Artificial Intelligence Mechanisms Unveiling Recent Innovations and Projecting Future Trends. 3010-3039 - WenBin Hsieh
:
Securing Internet of Vehicles with a provable secure post-quantum mutually authenticated protocol based on Small Integer Solution. 3040-3059 - Xuedong Mao, Yuntao Zhao, Yongxin Feng, Yutao Hu:
MalEXLNet: A semantic analysis and detection method of malware API sequence based on EXLNet model. 3060-3083
Wireless Communication
- Li Yang, Haoyu Wei, Guobing Hu, Wenqing Zhu:
An improved Graph-based SNR Estimation Algorithm. 3084-3108
Volume 18, Number 11, November 2024
Artificial Intelligence & Big Data
- N. Venkatesan, N. Arulanand:
Tokenization Stability Index: A Catalyst for Optimizing Transformer Models for Low Resource Languages. 3109-3128
Internet Computing
- Heshuai Shen:
Design of Teaching Resource Recommendation Platform Based on Fuzzy Recommendation Algorithm in the Context of Education Informatization. 3129-3147
Information Systems
- Runna Alghazo, Ghazanfar Latif, Nazeeruddin Mohammad, Jaafar M. Alghazo, Maura A. E. Pilotti:
Deep Learning-based Arabic Sign Recognition System for Automated Communication with Hearing Impaired Individuals. 3148-3164 - Chen Jiang:
Hybrid Teaching Mode of Physical Education with Sports Games Based on Artificial Intelligence. 3165-3176
Mobile Communication
- Hui Dun
, Yifan Zhao, Qiuyue Shi, Weihua Liu, Eryang Huan:
Energy Efficiency Optimization for D2D Communication with Statistical Channel State Information and QoS Awareness. 3177-3197
Multimedia & Computer Vision
- Taeyang Kim:
Designing an Algorithm for a Psychological Counseling System Utilizing Derivative Works in the Metaverse. 3198-3215 - Bang Cheng, Jianghua Cheng, Tong Liu, Xiaobing Luo, Xiangyu Du, Liang Zhang, Tao Wang:
CSFusionNet: An End-to-end Image Fusion Network Based on Cascade-Skip Learning. 3216-3235 - Kalaphath Kounlaxay, Yeo-Chan Yoon, Soo Kyun Kim:
Exploring Geometric Transformations in Computer Graphics through the GeoGebra Application. 3236-3255 - Xue Hao, Haza Nuzly Abdull Hamed, Babangida Isyaku, Qichen Su, Xin Dai:
Analysis of Atherosclerotic Plaques Using OCT Images Based on Deep Learning: A Comprehensive Review. 3256-3277
Networking
- Shu Li, Wenbo Zhang, Yongxin Feng:
Multipath Routing Protocol Based on Flooding Constraints and Composite Metrics. 3278-3292
Security & Privacy
- Hongluan Zhao, Guoyong Han, Zhaohui Xing:
Related-Key Differential Cryptanalysis of Midori-64 Based on Invariant Subspace. 3293-3305 - Jing Zhang, Qingbin Zhang, Yongli Tang, Chunming Zha, Yanru Zeng:
Permutation-based outsourced private set intersection cardinality protocol. 3306-3323
Wireless Communication
- Xiaofeng Hao, Huadi Zhang, Rui Guo:
Digital Modulation Recognition Based on High-Order Cumulants and P-LSTM. 3324-3338
Volume 18, Number 12, December 2024
Artificial Intelligence & Big Data
- Sunik Hwang, Hayoung Oh:
Trust Beyond Numbers: Data Augmentation Formula for Poll Prediction. 3339-3364 - Aditya Dubey, Pradeep Yadav, Chandra Prakash Bhargava, Trapti Pathak, Jyoti Kumari, Deshdeepak Shrivastava:
Classification of Breast Cancer Histopathological Images using Residual Learning-based CNN. 3365-3389
IoT & Application
- Yang Liu, Jiaojiao He, Jingwei Chen, Bo Mi, Ling Zhao, Xinyu Liu, Linhan Yang:
Adaptive Intelligent Sensing Control Method for Traffic Lights under Real-Time Vehicle Conditions Based on Logic Rules. 3390-3413
Internet Services & Management
- Ya-Jun Leng, Zhi Wang:
A Novel Collaborative Filtering Recommendation Method Based on Weight Determination. 3414-3430
Information Systems
- Qi Xi, Xiang Zhang:
Routing Optimization Algorithm under Deep Reinforcement Learning in Software Defined Network. 3431-3449
Mobile Communication
- Moonseong Kim, Woochan Lee:
Hopping Sensor Network without Sensing Holes : A Review. 3450-3469
Multimedia & Computer Vision
- Hyonjun Kang, Kwangyoung Kim, Myungseok Yang, Ka Lok Man, Mucheol Kim:
Crowd-movement-based Geofence-construction method for urban flood response. 3470-3490 - Hui Fu, Qiliang Gong, Ping Wang, Meiliang Hua, Zhaoyang Song:
A Haze Removal Method via The Fusion of Gaussian Low-Frequency Multi-Scale and Median Rank Detail Perspective Network. 3491-3512 - Jinliang Liu, Zheng Lv, Jun Zhao, Shenglan Liu:
Enhancing Multi-Object Tracking with Siamese Network-based Appearance Search. 3513-3526 - Kimleang Kea, Youngsun Han, Tae-Kyung Kim:
Multiple Sensor-based Adaptive Foveated Display Control for Enhanced Computational Efficiency of Virtual Reality Devices. 3527-3544
Wireless Communication
- Wenjie Dai, Rui Guo:
Complete State Critical Set Based SCLF Decoding Algorithm for Polar Codes. 3545-3559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.