Search Word(s) in Title, Keywords, Authors, and Abstract: AMI

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017

Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Page: 8~25, Vol. 13, No.1, 2017

Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City
Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Page: 184~195, Vol. 13, No.1, 2017

Keywords: Blockchain, Internet of Things, Security, Vehicular Network
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017

Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

An Improved Stereo Matching Algorithm with Robustness to Noise Based on Adaptive Support Weight
Ingyu Lee and Byungin Moon
Page: 256~267, Vol. 13, No.2, 2017

Keywords: Adaptive Census Transform, Adaptive Support Weight, Local Matching, Multiple Sparse Windows, Stereo Matching
Show / Hide Abstract

Self-adaptive and Bidirectional Dynamic Subset Selection Algorithm for Digital Image Correlation
Wenzhuo Zhang, Rong Zhou and Yuanwen Zou
Page: 305~320, Vol. 13, No.2, 2017

Keywords: Digital Image Correlation, Dynamic Subset Size, Image Processing, Information Amount, Self-adaptive
Show / Hide Abstract

Unsupervised Segmentation of Images Based on Shuffled Frog-Leaping Algorithm
Amel Tehami* and Hadria Fizazi
Page: 370~384, Vol. 13, No.2, 2017

Keywords: Image, K-means, Meta-Heuristic, Optimization, SFLA, Unsupervised Segmentation
Show / Hide Abstract

Rough Set-Based Approach for Automatic Emotion Classification of Music
Babu Kaji Baniya and Joonwhoan Lee
Page: 400~416, Vol. 13, No.2, 2017

Keywords: Attributes, Covariance, Discretize, Rough Set, Rules
Show / Hide Abstract

NDynamic Framework for Secure VM Migration over Cloud Computing
Suresh B. Rathod and V. Krishna Reddy
Page: 476~490, Vol. 13, No.3, 2017

Keywords: Cloud Computing, Datacenter (DC), Host Controller, Physical Host, Virtual Machine (VM)
Show / Hide Abstract

An Improved Zone-Based Routing Protocol for Heterogeneous Wireless Sensor Networks
Liquan Zhao and Nan Chen
Page: 500~517, Vol. 13, No.3, 2017

Keywords: Energy Consumption, Heterogeneous Wireless Sensor Networks, Stable Election Protocol, Zone-Based
Show / Hide Abstract

CPU Scheduling with a Round Robin Algorithm Based on an Effective Time Slice
Mohammad M. Tajwar, Md. Nuruddin Pathan, Latifa Hussaini and Adamu Abubakar
Page: 941~950, Vol. 13, No.4, 2017

Keywords: Average Turnaround Time, Average Waiting Time, CPU Processing Time, Round Robin Algorithm, Quantum Time
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016

Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016

Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016

Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

Resilient Packet Transmission (RPT) for Buffer Based Routing (BBR) Protocol
Geetanjali Rathee and Nitin Rakesh
Page: 57~72, Vol. 12, No.1, 2016

Keywords: WMN, Resiliency, BBR, Routing, RPT
Show / Hide Abstract

Content Based Dynamic Texture Analysis and Synthesis Based on SPIHT with GPU
Premanand P Ghadekar and Nilkanth B Chopade
Page: 46~56, Vol. 12, No.1, 2016

Keywords: Discrete Wavelet Transform, Dynamic Texture, GPU, SPIHT, SVD
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Page: 338~357, Vol. 12, No.3, 2016

Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic
Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef and Lamia Belguith Hadrich
Page: 358~380, Vol. 12, No.3, 2016

Keywords: Alkhalil Morphological Analyzer, Approach to Multi-Criteria Decision (MCA), Arabic Language Processing (ALP), Augmented Transition Networks (ATNs), Contextual Exploration, Tagging, Diacritization, Disambiguation Method, Segmentation
Show / Hide Abstract

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis
Leila Boussaad, Mohamed Benmohammed and Redha Benzid
Page: 392~409, Vol. 12, No.3, 2016

Keywords: Active Appearance Model, Age-Invariant, Face Recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016

Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

Bilingual Multiword Expression Alignment by Constituent-Based Similarity Score
Hyeong-Won Seo, Hongseok Kwon, Min-Ah Cheon and Jae-Hoon Kim
Page: 455~467, Vol. 12, No.3, 2016

Keywords: Bilingual Lexicon, Compositionality, Context Vector, Multiword Expression, MWE Alignment, Pivot Language
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016

Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

A Security Protection Framework for Cloud Computing
Wenzheng Zhu and Changhoon Lee
Page: 538~547, Vol. 12, No.3, 2016

Keywords: Cloud Computing, Collusive Worker, Malicious Worker, MapReduce, Non-collusive Worker
Show / Hide Abstract

Community Model for Smart TV over the Top Services
Suman Pandey, Young Joon Won, Mi-Jung Choi and Joon-Min Gil
Page: 577~590, Vol. 12, No.4, 2016

Keywords: Community Formation, Datamining, HbbTV, Smart TV
Show / Hide Abstract

Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke
Meeyeon Lee, Ye-Seul Park and Jung-Won Lee
Page: 741~753, Vol. 12, No.4, 2016

Keywords: Acute Myocardial Infarction, Data Model, Hospital Information System, Ischemic Stroke, Medical Image, Medical Information, Ontology
Show / Hide Abstract

Analysis of Semantic Relations Between Multimodal Medical Images Based on Coronary Anatomy for Acute Myocardial Infarction
Yeseul Park, Meeyeon Lee, Myung-Hee Kim and Jung-Won Lee
Page: 129~148, Vol. 12, No.1, 2016

Keywords: Acute Myocardial Infarction, Coronary Anatomy, Coronary Angiography, Data Model, Echocardiography, Medical Images, Multimodality, Semantic Features
Show / Hide Abstract

GMM-Based Maghreb Dialect IdentificationSystem
Lachachi Nour-Eddine and Adla Abdelkader
Page: 22~38, Vol. 11, No.1, 2015

Keywords: Core-Set, Gaussian Mixture Models (GMM), Kernel Methods, Minimal Enclosing Ball (MEB), Quadratic Programming (QP), Support Vector Machines (SVMs), Universal Background Model (UBM)
Show / Hide Abstract

Selection of the Best Two-Hop AF Wireless Link under Multiple Antenna Schemes over a Fading Channel
Abu Sayed Md. Mostafizur Rahaman, Md. Imdadul Islam and M.R. Amin
Page: 57~75, Vol. 11, No.1, 2015

Keywords: Ergodic Capacity, OFDM, OSTBC, Space Diversity, TAS, Wideband Slope
Show / Hide Abstract

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
Amine Dahane, Nasr-Eddine Berrached and Abdelhamid Loukil
Page: 205~228, Vol. 11, No.2, 2015

Keywords: Clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks
Show / Hide Abstract

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Siti Nurmaini and Ahmad Zarkasi
Page: 370~388, Vol. 11, No.3, 2015

Keywords: Localization Process, RAM-Based Neural Network, Swarm Robots
Show / Hide Abstract

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki and Driss Aboutajdine
Page: 495~508, Vol. 11, No.4, 2015

Keywords: Copyright Protection, Mammograms, Medical Image, Robust Watermarking, Visual Cryptography
Show / Hide Abstract

Event Detection on Motion Activities Using a Dynamic Grid
Jitdumrong Preechasuk and Punpiti Piamsa-nga
Page: 538~555, Vol. 11, No.4, 2015

Keywords: Dynamic Grid Feature, Event Detection, Event Patterns, Pedestrian Activities
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015

Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process
G. A. Preethi and C. Chandrasekar
Page: 616~629, Vol. 11, No.4, 2015

Keywords: Action, Heterogeneous Handoff, MDP, Policy Iteration, State
Show / Hide Abstract

Improved Dynamic Subjective Logic Model with Evidence Driven
Jiao-Hong Qiang, Wang-Xin Xin and Tian-Jun Feng
Page: 630~642, Vol. 11, No.4, 2015

Keywords: Dynamic Weight, Evidence Driven, Subjective Logic
Show / Hide Abstract

Trivariate B-spline Approximation of Spherical Solid Objects
Junho Kim, Seung-Hyun Yoon and Yunjin Lee
Page: 23~35, Vol. 10, No.1, 2014
Keywords: Trivariate B-spline Approximation, Volume Mesh Parameterization, Topological Sphere Model, Harmonic Mapping
Show / Hide Abstract

Performance Evaluation of the VoIP Services of the Cognitive Radio System, Based on DTMC
Ummy Habiba, Md. Imdadul Islam and M. R. Amin
Page: 119~131, Vol. 10, No.1, 2014
Keywords: Cognitive Radio, VoIP, DTMC, Cross-layer Analytical Model, M/G/1(m) Traffic, IEEE 802.16e/m
Show / Hide Abstract

Leveraged BMIS Model for Cloud Risk Control
YouJin Song and Yasheng Pang
Page: 240~255, Vol. 10, No.2, 2014
Keywords: Cloud risk, CSFs, BMIS, Risk control, Leverage point, Effective model
Show / Hide Abstract

Skin Segmentation Using YUV and RGB Color Spaces
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan and Puteri Suhaiza Sulaiman
Page: 283~299, Vol. 10, No.2, 2014
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space
Show / Hide Abstract

Fault Detection in the Semiconductor Etch Process Using the Seasonal Autoregressive Integrated Moving Average Modeling
Muhammad Zeeshan Arshad, Javeria Muhammad Nawaz and Sang Jeen Hong
Page: 429~442, Vol. 10, No.3, 2014
Keywords: Autoregressive Integrated Moving Average, Dynamic Time Warping, Fault Detection, Seasonal Autoregressive Integrated Moving Average, Semiconductor Process, Time Series Modeling
Show / Hide Abstract

Spectrum Sensing and Data Transmission in a Cognitive Relay Network Considering Spatial False Alarms
Tasnina A. Tishita, Sumiya Akhter, Md. Imdadul Islam and M. R. Amin
Page: 459~470, Vol. 10, No.3, 2014
Keywords: Cognitive Network, Conventional False Alarms, Probability of Symbol Error Rate, Spatial False Alarms, Spectrum Sensing
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Page: 491~502, Vol. 10, No.4, 2014
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

Performance Evaluation of the WiMAX Network under a Complete Partitioned User Group with a Traffic Shaping Algorithm
Jesmin Akhter, Md. Imdadul Islam and M. R. Amin
Page: 568~580, Vol. 10, No.4, 2014
Keywords: Blocking Probability, CAC, Complete Partition Scheme, Subscriber Station, Throughput
Show / Hide Abstract

Traffic Analysis of a Cognitive Radio Network Based on the Concept of Medium Access Probability
Risala T. Khan, Md. Imdadul Islam and M. R. Amin
Page: 602~617, Vol. 10, No.4, 2014
Keywords: Blocking Probability, Fading Channel, Path Loss Model, State Transition Chain, Throughput
Show / Hide Abstract

A Fuzzy Impulse Noise Filter Based on Boundary Discriminative Noise Detection
Om Prakash Verma and Shweta Singh
Page: 89~102, Vol. 9, No.1, 2013
Keywords: Impulse Noise, Decision Boundaries, Color Components, Fuzzy Filter, Membership Function
Show / Hide Abstract

An Improvement Video Search Method for VP-Tree by using a Trigonometric Inequality
Samuel Sangkon Lee, Masami Shishibori and Chia Y. Han
Page: 315~332, Vol. 9, No.2, 2013
Keywords: Vantage Point; VP-Tree; Trigonometric Inequality; Search Algorithm; Range Search; Nearest Neighbor Search; AESA algorithm; Multimedia Database
Show / Hide Abstract

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do and Deokjai Choi
Page: 333~348, Vol. 9, No.2, 2013
Keywords: Gait Recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, Identification, Signal Processing
Show / Hide Abstract

Developing a Dynamic Materialized View Index for Efficiently Discovering Usable Views for Progressive Queries
Chao Zhu, Qiang Zhu, Calisto Zuzarte and Wenbin Ma
Page: 511~537, Vol. 9, No.4, 2013
Keywords: Database, query processing, query optimization, progressive query, materialized view, index
Show / Hide Abstract

The Architectural Pattern of a Highly Extensible System for the Asynchronous Processing of a Large Amount of Data
Ro Man Hwang, Soo Kyun Kim, Syungog An and Dong-Won Park
Page: 567~574, Vol. 9, No.4, 2013
Keywords: Large data, UML Diagram, Object-Oriented Software
Show / Hide Abstract

Simple Fuzzy Rule Based Edge Detection
O.P. Verma, Veni Jain and Rajni Gumber
Page: 575~591, Vol. 9, No.4, 2013
Keywords: Edge detection, Edge improvement, Fuzzy rules, Membership function
Show / Hide Abstract

Dynamic knowledge mapping guided by data mining: Application on Healthcare
Menaouer Brahami, Baghdad Atmani and Nada Matta
Page: 1~30, Vol. 9, No.1, 2013
Keywords: Knowledge Management, Knowledge Mapping (Knowledge Cartography), Knowledge Representation, Boolean Modeling, Cellular Machine, Data Mining, Boolean Inference Engine
Show / Hide Abstract

A Dynamic Zigbee Protocol for Reducing Power Consumption
Do-keun Kwon, Ki hyun Chung and Kyunghee Choi
Page: 41~52, Vol. 9, No.1, 2013
Keywords: Zigbee, Low Power Protocol, Beacon, Power Consumption
Show / Hide Abstract

An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators
B. John Oommen, Anis Yazidi and Ole-Christoffer Granmo
Page: 191~212, Vol. 8, No.2, 2012
Keywords: Weak es timators, User's Profiling, Time Varying Preferences
Show / Hide Abstract

Dynamic Replication Based on Availability and Popularity in the Presence of Failures
Bakhta Meroufel and Ghalem Belalem
Page: 263~278, Vol. 8, No.2, 2012
Keywords: Data Grid, Dynamic Replication, Availability, Failures, Best Client, Best Responsible, Data Management
Show / Hide Abstract

Expressive Exceptions for Safe Pervasive Spaces
Eun-Sun Cho and Sumi Helal
Page: 279~300, Vol. 8, No.2, 2012
Keywords: Exceptions, Safety, Programming models for Pervasive Systems, Pervasive Computing, Contexts, Situations
Show / Hide Abstract

TBBench: A Micro-Benchmark Suite for Intel Threading Building Blocks
Ami Marowka
Page: 331~346, Vol. 8, No.2, 2012
Keywords: TBB, Micro-Benchmarks, Multi-Core, Parallel Overhead
Show / Hide Abstract

Texture Comparison with an Orientation Matching Scheme
Nguyen Cao Truong Hai, Do-Yeon Kim and Hyuk-Ro Park
Page: 389~398, Vol. 8, No.3, 2012
Keywords: Orientation Matching, Texture Analysis, Texture Comparison, K-means Clustering
Show / Hide Abstract

A New Approach to Fingerprint Detection Using a Combination of Minutiae Points and Invariant Moments Parameters
Sarnali Basak, Md. Imdadul Islam and M. R. Amin
Page: 421~436, Vol. 8, No.3, 2012
Keywords: Random Variable, Skewness, Kurtosis, Invariant Moment, Termination And Bifurcation Points, Virtual Core Point
Show / Hide Abstract

Web-Based Computational System for Protein- Protein Interaction Inference
Ki-Bong Kim
Page: 459~470, Vol. 8, No.3, 2012
Keywords: Protein-Protein Interactions (PPIs), WASPI (Web-based Assistant System for Protein-protein interaction Inference), InterPro, InterProScan, BLAST
Show / Hide Abstract

Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6
Hyon-Young Choi, Sung-Gi Min, Youn-Hee Han and Rajeev Koodli
Page: 603~620, Vol. 8, No.4, 2012
Keywords: Flow Mobility, Proxy Mobile IPv6
Show / Hide Abstract

Proactive: Comprehensive Access to Job Information
Danielle Lee and Peter Brusilovsky
Page: 721~738, Vol. 8, No.4, 2012
Keywords: Job recommendation, explicit preference, implicit preference, personalized information retrieval
Show / Hide Abstract

Computer Simulation: A Hybrid Model for Traffic Signal Optimisation
Mohamed Kamal JBIRA and Munir AHMED
Page: 1~16, Vol. 7, No.1, 2011
Keywords: Traffic Congestion, Hybrid Model, Optimisation Method
Show / Hide Abstract

A Clustering Protocol with Mode Selection for Wireless Sensor Network
Aries Kusdaryono and Kyung Oh Lee
Page: 29~42, Vol. 7, No.1, 2011
Keywords: Ad Hoc Network, Wireless Sensor Networks, Clustering, Routing Protocol
Show / Hide Abstract

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances
Ivy Ong and Hyotaek Lim
Page: 53~62, Vol. 7, No.1, 2011
Keywords: iATA Protocol, Load Balancing, Network Monitoring, Storage Network Solution, Write Replication
Show / Hide Abstract

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs
Jung-Hwan Chang
Page: 75~84, Vol. 7, No.1, 2011
Keywords: Enhanced Pyramid Model, Hamiltonian Cycle, Edge-Disjoint Cycle
Show / Hide Abstract

Effective Partitioning of Static Global Buses for Small Processor Arrays
Susumu Matsumae
Page: 85~92, Vol. 7, No.1, 2011
Keywords: Processor Array, Dynamically Reconfigurable Bus, Statically Partitioned Bus, Scaling-Simulation, Polylogarithmic Time Simulation
Show / Hide Abstract

Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits
Haiqing Nan, Kyung Ki Kim, Wei Wang and Ken Choi
Page: 93~102, Vol. 7, No.1, 2011
Keywords: PVT Variation sensors, Yield, Voltage Scaling, Frequency Scaling
Show / Hide Abstract

Virus Detection Method based on Behavior Resource Tree
Mengsong Zou, Lansheng Han, Ming Liu and Qiwen Liu
Page: 173~186, Vol. 7, No.1, 2011
Keywords: Computer Virus, Behavior-Based Detection, Dynamic Link Library, Behavior Resource Tree
Show / Hide Abstract

A Cultural Dimensions Model based on Smart Phone Applications
Jung-Min Oh and Nammee Moon
Page: 209~220, Vol. 7, No.1, 2011
Keywords: Smart Phone, Culture, Cultural Dimensions Model, MDS, Mobile Application Analysis
Show / Hide Abstract

Parallel Prefix Computation and Sorting on a Recursive Dual-Net
Yamin Li, Shietung Peng and Wanming Chu
Page: 271~286, Vol. 7, No.2, 2011
Keywords: Interconnection Networks, Algorithm, Parallel Prefix Computation, Sorting
Show / Hide Abstract

Evaluating Service Description to Guarantee Quality of U-service Ontology
Meeyeon Lee, Jung-Won Lee, Kyung-Ah Kim and Seung Soo Park
Page: 287~298, Vol. 7, No.2, 2011
Keywords: Quality Model, Quality Metric, Dynamic Service Composition, U-service (Ubiquitous-Service) Ontology, U-service Description Specification
Show / Hide Abstract

Batch Resizing Policies and Techniques for Fine-Grain Grid Tasks: The Nuts and Bolts
Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan and Rajkumar Buyya
Page: 299~320, Vol. 7, No.2, 2011
Keywords: Batch Resizing, Task Granularity, Global Grid, Application Turnaround Time
Show / Hide Abstract

Wavelet-based Feature Extraction Algorithm for an Iris Recognition System
Ayra Panganiban, Noel Linsangan and Felicito Caluyo
Page: 425~434, Vol. 7, No.3, 2011
Keywords: Biometrics, Degrees of Freedom, Iris Recognition, Wavelet
Show / Hide Abstract

A Survey of RFID Deployment and Security Issues
Amit Grover and Hal Berghel
Page: 561~580, Vol. 7, No.4, 2011
Keywords: RFID, RFID Standards, RFID Protocols, RFID Security, EPC structure, RFID Applications, RFID Classification
Show / Hide Abstract

A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal
Amartya Neogi, Abhoy Chand Mondal and Soumitra Kumar Mandal
Page: 595~612, Vol. 7, No.4, 2011
Keywords: Performance Appraisal, Cascaded Fuzzy Inference System, University Non-Teaching Staff, Sensitivity Analysis, Gaussian MF, Fuzzy Rules
Show / Hide Abstract

An Efficient DVS Algorithm for Pinwheel Task Schedules
Da-Ren Chen and You-Shyang Chen
Page: 613~626, Vol. 7, No.4, 2011
Keywords: Hard Real-time Systems, Power-aware Scheduling, Dynamic Voltage Scaling, Pinwheel Tasks
Show / Hide Abstract

Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic
Md. Syeful Islam, Md. Rezaur Rahman, Anupam Roy, Md. Imdadul Islam and M. R. Amin
Page: 679~690, Vol. 7, No.4, 2011
Keywords: Carried Traffic, LST, Two-Dimensional Traffic, Cell Dropping Probability, M/G/1 Model
Show / Hide Abstract

A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Joon-Min Gil and Mihye Kim
Page: 707~716, Vol. 7, No.4, 2011
Keywords: Desktop Grids, Execution Behavior, Log Analysis System, REST Web Services, Resource Group-based Task Scheduling
Show / Hide Abstract

Approximate Clustering on Data Streams Using Discrete Cosine Transform
Feng Yu, Damalie Oyana, Wen-Chi Hou and Michael Wainer
Page: 67~78, Vol. 6, No.1, 2010
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression
Show / Hide Abstract

Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams
Younghee Kim, Wonyoung Kim and Ungmo Kim
Page: 79~90, Vol. 6, No.1, 2010
Keywords: Frequent Itemsets, Weighted Support, Window Sliding, Weighted Support FP-Tree, Data Stream, WSFI-Mine
Show / Hide Abstract

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif and Munir Ahmed
Page: 177~184, Vol. 6, No.2, 2010
Keywords: Secure Routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Show / Hide Abstract

Developing Digital Games through Software Reuse
Beatriz Neto, Lucia Fernandes, Claudia Werner and Jano Moreira de Souza
Page: 219~234, Vol. 6, No.2, 2010
Keywords: Games, Product Line, Software Reuse, Software Development
Show / Hide Abstract

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments
Mohammad S. Obaidat, Sanjay K. Dhurandher, Deepank Gupta, Nidhi Gupta and Anupriya Asthana
Page: 269~294, Vol. 6, No.3, 2010
Keywords: Sensor Network, Security, Energy Efficiency, Routing, Dynamic Trust Factor
Show / Hide Abstract

Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol
R. Padmavathy and Chakravarthy Bhagvati
Page: 335~346, Vol. 6, No.3, 2010
Keywords: Ephemeral Key, Pohlig-Hellman Method, Van-Oorschot Method, Index Calculus Method, Chang-Chang Password Key Exchange Protocol
Show / Hide Abstract

Speed-Sensitive Handover Scheme over IEEE 802.16 Multi-Relay Networks
DongHo Kim, SoonSeok Kim and YongHee Lee
Page: 403~412, Vol. 6, No.3, 2010
Keywords: Multi-Relay Networks, Handover
Show / Hide Abstract

On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks
Hamid Karimi, Mehdi Kargahi and Nasser Yazdani
Page: 413~434, Vol. 6, No.3, 2010
Keywords: Failure Recovery, Job Allocation, Quality of Service, Real-Time Scheduling, Wireless Sensor Network
Show / Hide Abstract

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Dae-Suk Yoo and Seung Sik Choi
Page: 501~510, Vol. 6, No.4, 2010
Keywords: Sensor Networks, Energy-Efficient MAC, S-MAC
Show / Hide Abstract

Fingerprint Detection Using Canny Filter and DWT, a New Approach
Md. Imdadul Islam, Nasima Begum, Mahbubul Alam and M. R. Amin
Page: 511~520, Vol. 6, No.4, 2010
Keywords: Canny Filter, Color Inversion, Skewness, Kurtosis and Convolution
Show / Hide Abstract

A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Chetna Gupta, Yogesh Singh and Durg Singh Chauhan
Page: 597~608, Vol. 6, No.4, 2010
Keywords: Change Impact Analysis, Regression Testing, Software Maintenance, Software Testing
Show / Hide Abstract

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System
Hyung-Min Lim, Kun-Won Jang and Byung-Gi Kim
Page: 609~620, Vol. 6, No.4, 2010
Keywords: u-Learning, e-Learning, Event Hooking, Content packing
Show / Hide Abstract

Privacy-Aware Adaptable Web Services Using Petri Nets
You-Jin Song and Jae-Geol Yim
Page: 19~24, Vol. 5, No.1, 2009
Keywords: Privacy, Web Service, Petri Net, Context Framework
Show / Hide Abstract

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics
Byung-Gyu No, Doo-Soon Park, Min Hong, HwaMin Lee and Yoon Sok Park
Page: 33~40, Vol. 5, No.1, 2009
Keywords: Worm, Random Constant Spreading, Dynamic Network, Depth Distribution Characteristic, Bandwidth Control
Show / Hide Abstract

A Survey of Face Recognition Techniques
Rabia Jafri and Hamid R Arabnia
Page: 41~68, Vol. 5, No.2, 2009
Keywords: Face Recognition, Person Identification, Biometrics
Show / Hide Abstract

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster
Junaid Ahsenali Chaudhry
Page: 69~76, Vol. 5, No.2, 2009
Keywords: Self Healing Systems, Load Estimation and Balancing, OKKAM, Entity Naming System
Show / Hide Abstract

A Scalable Wireless Body Area Network for Bio-Telemetry
Adnan Saeed, Miad Faezipour, Mehrdad Nourani, Subhash Banerjee, Gil Lee, Gopal Gupta and Lakshman Tamil
Page: 77~86, Vol. 5, No.2, 2009
Keywords: Body Area Network, Plug-and-Play Biosensors, Telemedicine, Ubiquitous Computing, ECG Monitoring, ECG Feature Extraction
Show / Hide Abstract

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression
Tin-Yu Wu, Han-Chieh Chao and Chi-Hsiang Lo
Page: 117~130, Vol. 5, No.3, 2009
10.3745/JIPS.2009.5.3. 117
Keywords: SAG, RoHC, MIPv6, Handoff Latency, Early Binding Update
Show / Hide Abstract

Study on Preemptive Real-Time Scheduling Strategy for Wireless Sensor Networks
ZHAO Zhi-bin and GAO Fuxiang
Page: 135~144, Vol. 5, No.3, 2009
Keywords: Real-time Schedule, Wireless Sensor Networks, Two-level Priority, TinyOS, Dynamic Schedule
Show / Hide Abstract

Utility-based Rate Allocation Scheme for Mobile Video Streaming over Femtocell Networks
Shan Guo Quan, Jian Xu and Young Yong Kim
Page: 151~158, Vol. 5, No.3, 2009
Keywords: Utility, femtocell network, backhaul, cross-talk, video streaming
Show / Hide Abstract

On Effective Slack Reclamation in Task Scheduling for Energy Reduction
Young Choon Lee and Albert Y Zomaya
Page: 175~186, Vol. 5, No.4, 2009
Keywords: Scheduling, Energy Awareness, Green Computing, Dynamic Voltage and Frequency Scaling, Data Centers
Show / Hide Abstract

Dynamic Reservation Scheme of Physical Cell Identity for 3GPP LTE Femtocell Systems
Poongup Lee, Jangkeun Jeong, Navrati Saxena and Jitae Shin
Page: 207~220, Vol. 5, No.4, 2009
Keywords: Femtocell, Physical Cell Identity (PCI), Access Control, Long Term Evolution (LTE)
Show / Hide Abstract

Fault-tolerant ZigBee-based Automatic Meter Reading Infrastructure
Kwang-il Hwang
Page: 221~228, Vol. 5, No.4, 2009
Keywords: AMR, AMI, Fault Tolerance, ZigBee
Show / Hide Abstract

An Empirical Study of Qualities of Association Rules from a Statistical View Point
Maryann Dorn, Wen-Chi Hou, Dunren Che and Zhewei Jiang
Page: 27~32, Vol. 4, No.1, 2008
Keywords: Data Mining, Association Rule Mining, Rule Evaluation, Chi-square Test
Show / Hide Abstract

Comparison of Cultural Acceptability for Educational Robots between Europe and Korea
Jonghong Choi, Jongyun Lee and Jeonghye Han
Page: 97~102, Vol. 4, No.3, 2008
Keywords: Cultural Acceptability, Educational Robot, Identification, Robot Contents
Show / Hide Abstract

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System
Shengzhong Deng, Chan-Hyun Youn, Qi Liu, Hoe Young Kim, Taoran Yu and Young Hun Kim
Page: 103~112, Vol. 4, No.3, 2008
Keywords: Grid Worfklow, Collaborative Healthcare Platform, SLA, Policy Adjuster
Show / Hide Abstract

Server Selection Schemes Considering Node Status For a Fault-Tolerant Streaming Service on a Peer-to-Peer Network
Hyunjoo Kim, Sooyong Kang and Heon Y. Yeom
Page: 6~12, Vol. 2, No.1, 2006
Keywords: Peer-to-peer network, Fault-tolerant streaming services
Show / Hide Abstract

TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network
Yuan Yang, Fu Zhen, Tae-Seok Lee and Myong-Soon Park
Page: 39~43, Vol. 2, No.1, 2006
Keywords: Wireless Sensor Network, MAC protocol, traffic aware, sleep/wake mechanism
Show / Hide Abstract

Monitoring Systems for Embedded Equipment in Ubiquitous Environments
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park and Jung-Ho Park
Page: 58~66, Vol. 2, No.1, 2006
Keywords: Ubiquitous Computing, Monitoring System, Sensor Network
Show / Hide Abstract

A Method for Automatic Generation of OWL-S Service Ontology
Jin-Hyuk Yang and In-Jeong Chung
Page: 114~123, Vol. 2, No.2, 2006
Keywords: Ontology, Semantic Web, OWL-S, State-chart, and UML
Show / Hide Abstract

Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos
Kyuhee An, Kiyeal Lee and Mokdong Chung
Page: 170~177, Vol. 2, No.3, 2006
Keywords: RFID, EPCglobal Network, Framework, Business Process, Computer Security
Show / Hide Abstract

Metaphor and Typeface Based on Children’s Sensibilities for e-Learning
Miheon Jo and Jeonghye Han
Page: 178~182, Vol. 2, No.3, 2006
Keywords: e-Learning, Sensibility Factor, Metaphor, Typeface, Collaborative Recommending
Show / Hide Abstract

A Light-weight and Dynamically Reconfigurable RMON Agent System
Jun-Hyung Lee, Zin-Won Park and Myung-Kyun Kim
Page: 183~188, Vol. 2, No.3, 2006
Keywords: Network management, RMON agent system, Dynamic reconfiguration.
Show / Hide Abstract

Wavelet-based Image Denoising with Optimal Filter
Yong-Hwan Lee and Sang-Burm Rhee
Page: 32~35, Vol. 1, No.1, 2005
Keywords: Image Denoising, Noise Reduction Wavelet
Show / Hide Abstract

Prototyping a Student Model for Educational Games
YoungMee Choi, MoonWon Choo and SeongAh Chin
Page: 107~111, Vol. 1, No.1, 2005
Keywords: edutainment, pedagogical agents, emotion generation, student modeling, Intelligent Tutoring Systems, dynamic Bayesian networks
Show / Hide Abstract

Test Set Generation for Pairwise Testing Using Genetic Algorithms
Sangeeta Sabharwal and Manuj Aggarwal
Page: 0~0, Vol. 0, No.0, 0
Keywords: Combinatorial Testing, Genetic Algorithm, Mixed Covering Arrays, Pairwise Testing, Test Set, t-way Testing
Show / Hide Abstract

Speech Query Recognition for Tamil Language Using Wavelet and Wavelet Packets
P. Iswarya and V. Radha
Page: 0~0, Vol. 0, No.0, 0
Keywords: De-noising, Feature Extraction, Speech Recognition, Support Vector Machine, Wavelet Packet
Show / Hide Abstract