Search Word(s) in Title, Keywords, Authors, and Abstract: ATE

[EDITORIAL] Practical Approaches Based on Deep Learning and Social Computing
Jong Hyuk Park
Page: 1~5, Vol. 14, No.1, 2018
10.3745/JIPS.00.0009
Keywords:
Show / Hide Abstract

A Survey on Passive Image Copy-Move Forgery Detection
Zhi Zhang, Chengyou Wang and Xiao Zhou
Page: 6~31, Vol. 14, No.1, 2018
10.3745/JIPS.02.0078
Keywords: Copy-Move Forgery Detection (CMFD), Image Forensics, Image Tamper Detection, Passive Forgery Detection
Show / Hide Abstract

A Comparative Analysis of Music Similarity Measures in Music Information Retrieval Systems
Kuldeep Gurjar and Yang-Sae Moon
Page: 32~55, Vol. 14, No.1, 2018
10.3745/JIPS.04.0054
Keywords: Content-Based Music Retrieval, MIR System, Music Information Retrieval Survey, Music Similarity Measures
Show / Hide Abstract

A Survey on Automatic Twitter Event Summarization
Dwijen Rudrapal, Amitava Das and Baby Bhattacharya
Page: 79~100, Vol. 14, No.1, 2018
10.3745/JIPS.02.0079
Keywords: ROUGE, Social Media Text, Tweet Stream, Tweet Summarization
Show / Hide Abstract

A Survey about Consensus Algorithms Used in Blockchain
Giang-Truong Nguyen and Kyungbaek Kim
Page: 101~128, Vol. 14, No.1, 2018
10.3745/JIPS.01.0024
Keywords: Blockchain, Consensus Algorithm
Show / Hide Abstract

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang and Fang Zhao
Page: 129~139, Vol. 14, No.1, 2018
10.3745/JIPS.04.0055
Keywords: AI, Crowdsourcing, Personality, Planning Language, Software Development, Task
Show / Hide Abstract

A Development of LDA Topic Association Systems Based on Spark-Hadoop Framework
Kiejin Park and Limei Peng
Page: 140~149, Vol. 14, No.1, 2018
10.3745/JIPS.04.0057
Keywords: Association Analysis, Hadoop, LDA (Latent Dirichlet Allocation), Spark, Topic Model
Show / Hide Abstract

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform
Wei Song, Ning Feng, Yifei Tian, Simon Fong and Kyungeun Cho
Page: 162~175, Vol. 14, No.1, 2018
10.3745/JIPS.04.0056
Keywords: Cloud Computing, Deep Belief Network, IoT, Power Conservation, Smart Metre
Show / Hide Abstract

Convolutional Neural Network Based Multi-feature Fusion for Non-rigid 3D Model Retrieval
Hui Zeng, Yanrong Liu, Siqi Li, JianYong Che and Xiuqing Wang
Page: 176~190, Vol. 14, No.1, 2018
10.3745/JIPS.04.0058
Keywords: Convolutional Neural Network, HKS, Multi-Feature Fusion, Non-rigid 3D Model, WKS
Show / Hide Abstract

Face Recognition Based on the Combination of Enhanced Local Texture Feature and DBN under Complex Illumination Conditions
Chen Li, Shuai Zhao, Ke Xiao and Yanjie Wang
Page: 191~204, Vol. 14, No.1, 2018
10.3745/JIPS.04.0060
Keywords: Deep Belief Network, Enhanced Local Texture Feature, Face Recognition, Illumination Variation
Show / Hide Abstract

Variations of AlexNet and GoogLeNet to Improve Korean Character Recognition Performance
Sang-Geol Lee, Yunsick Sung, Yeon-Gyu Kim and Eui-Young Cha
Page: 205~217, Vol. 14, No.1, 2018
10.3745/JIPS.04.0061
Keywords: Classification, CNN, Deep Learning, Korean Character Recognition
Show / Hide Abstract

Vocal Effort Detection Based on Spectral Information Entropy Feature and Model Fusion
Hao Chao, Bao-Yun Lu, Yong-Li Liu and Hui-Lai Zhi
Page: 218~227, Vol. 14, No.1, 2018
10.3745/JIPS.04.0063
Keywords: Gaussian Mixture Model, Model Fusion, Multilayer Perceptron, Spectral Information Entropy, Support Vector Machine, Vocal Effort
Show / Hide Abstract

Impediments to the Integration of ICT in Public Schools of Contemporary Societies: A Review of Literature
Shafaq Salam, Jianqiu Zeng, Zulfiqar Hussain Pathan, Zahid Latif and Aliya Shaheen
Page: 252~269, Vol. 14, No.1, 2018
10.3745/JIPS.04.0062
Keywords: Extrinsic & Intrinsic Impediments, ICT Integration, Public Schools, Software Education Reform
Show / Hide Abstract

Implementation of Multipurpose PCI Express Adapter Cards with On-Board Optical Module
Kyungmo Koo, Junglok Yu, Sangwan Kim, Min Choi and Kwangho Cha
Page: 270~279, Vol. 14, No.1, 2018
10.3745/JIPS.01.0022
Keywords: Device Network, Interconnection Network, On-Board Optical Module, PCI Express Bus
Show / Hide Abstract

[EDITORIAL] Enhanced Integrated Algorithm & Software Architecture
Jong Hyuk Park
Page: 281~285, Vol. 14, No.2, 2018
10.3745/JIPS.00.0010
Keywords:
Show / Hide Abstract

Security and Privacy in Ubiquitous Sensor Networks
Alfredo J. Perez, Sherali Zeadally and Nafaa Jabeur
Page: 286~308, Vol. 14, No.2, 2018
10.3745/JIPS.03.0094
Keywords: Human-Centric Sensing, Internet of Things, Opportunistic Sensing, Participatory Sensing, Privacy, Security, Ubiquitous Sensing
Show / Hide Abstract

Sustaining Low-Carbon Emission Development: An Energy Efficient Transportation Plan for CPEC
Asma Zubedi, Zeng Jianqiu, Qasim Ali Arain, Imran Memon, Sehrish Khan, Muhammad Saad Khan and Ying Zhang
Page: 322~345, Vol. 14, No.2, 2018
10.3745/JIPS.04.0067
Keywords: Carbon Emission, Climate Change, CPEC, Green ICT, ITS
Show / Hide Abstract

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence
Humaira Arshad, Aman Bin Jantan and Oludare Isaac Abiodun
Page: 346~376, Vol. 14, No.2, 2018
10.3745/JIPS.03.0095
Keywords: Criminal Investigation, Data, Digital Forensics, Electronic Evidence, Reliability, Validation, Verification
Show / Hide Abstract

Dynamic Cloud Resource Reservation Model Based on Trust
Jiao-Hong Qiang, Ding-Wan Ning, Tian-Jun Feng and Li-Wei Ping
Page: 377~398, Vol. 14, No.2, 2018
10.3745/JIPS.03.0091
Keywords: Cloud-Domain-Based Management Architecture, Decision of Candidate Resources, Dynamic Resource Reservation, Two-Way Trust Evaluation Mechanism
Show / Hide Abstract

Impact of Instance Selection on kNN-Based Text Categorization
Fatiha Barigou
Page: 418~434, Vol. 14, No.2, 2018
10.3745/JIPS.02.0080
Keywords: Classification Accuracy, Classification Efficiency, Data Reduction, Instance Selection, k-Nearest Neighbors, Text Categorization
Show / Hide Abstract

Fingerprint Identification Based on Hierarchical Triangulation
Meryam Elmouhtadi, Sanaa El fkihi and Driss Aboutajdine
Page: 435~447, Vol. 14, No.2, 2018
10.3745/JIPS.02.0084
Keywords: Biometric, Fingerprint Identification, Delaunay Triangulation, Fingerprint Matching, Minutiae Extraction
Show / Hide Abstract

On Modification and Application of the Artificial Bee Colony Algorithm
Zhanxiang Ye, Min Zhu and Jin Wang
Page: 448~454, Vol. 14, No.2, 2018
10.3745/JIPS.01.0025
Keywords: Artificial Bee Colony, Bees’ Number Reallocation, Search Equation
Show / Hide Abstract

GLIBP: Gradual Locality Integration of Binary Patterns for Scene Images Retrieval
Salah Bougueroua and Bachir Boucheham
Page: 469~486, Vol. 14, No.2, 2018
10.3745/JIPS.02.0081
Keywords: CBIR, Elliptic-Region, Global Information, LBP, Local Information, Texture
Show / Hide Abstract

Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment
Yeon-Woo Jang, Moon-Hwan Kang and Jae-Woo Chang
Page: 499~509, Vol. 14, No.2, 2018
10.3745/JIPS.01.0026
Keywords: Bloom Filter, Concurrency Control, Hybrid Transactional Memory, Multi-core in-Memory Databases
Show / Hide Abstract

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery
Chengyou Wang, Heng Zhang and Xiao Zhou
Page: 510~522, Vol. 14, No.2, 2018
10.3745/JIPS.02.0082
Keywords: Image Authentication and Self-recovery, Least Significant Bit (LSB), Peak Signal-to-Noise Ratio (PSNR), Self-embedding Fragile Watermarking
Show / Hide Abstract

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment
Sung-Hoon Lee, Jong-hyuk Roh, SooHyung Kim and Seung-Hun Jin
Page: 523~538, Vol. 14, No.2, 2018
10.3745/JIPS.03.0093
Keywords: Feature Subset, Keystroke Dynamics, Smartphone Sensor
Show / Hide Abstract

An Effective Denoising Method for Images Contaminated with Mixed Noise Based on Adaptive Median Filtering and Wavelet Threshold Denoising
Lin Lin
Page: 539~551, Vol. 14, No.2, 2018
10.3745/JIPS.02.0083
Keywords: Adaptive Median Filter (AMF), Gaussian Mixture Model (GMM), Image Denoising, Mixed Noise, Wavelet Threshold Denoising
Show / Hide Abstract

Load Balancing in Cloud Computing Using Meta-Heuristic Algorithm
Youssef Fahim, Hamza Rahhali, Mohamed Hanine, El-Habib Benlahmar, El-Houssine Labriji, Mostafa Hanoune and Ahmed Eddaoui
Page: 569~589, Vol. 14, No.3, 2018
10.3745/JIPS.01.0028
Keywords: Bat-Algorithm, Cloud Computing, Load Balancing, Pre-scheduling, Virtual Machines
Show / Hide Abstract

A New Operator Extracting Image Patch Based on EPLL
Jianwei Zhang, Tao Jiang, Yuhui Zheng, Jin Wang and Jiacen Xie
Page: 590~599, Vol. 14, No.3, 2018
10.3745/JIPS.02.0086
Keywords: Expected Patch Log Likelihood, Image Denoising, Patch Priors, Structure Information
Show / Hide Abstract

A Method of Image Identification in Instrumentation
Xiaoli Wang, Shilin Wang and Baochen Jiang
Page: 600~606, Vol. 14, No.3, 2018
10.3745/JIPS.04.0071
Keywords: Code Wheel Instrument, Image Identification, IoT, Smart City, Template Matching
Show / Hide Abstract

Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model
Jin-Wook Jang
Page: 607~620, Vol. 14, No.3, 2018
10.3745/JIPS.04.0072
Keywords: Automobile Control Software, Risk-based Test, Software Testing Process, Test Design, Test Planning, Test Policy and Strategy, TMMi Assessment
Show / Hide Abstract

Development of Flash Memory Page Management Techniques
Jeong-Joon Kim
Page: 631~644, Vol. 14, No.3, 2018
10.3745/JIPS.04.0073
Keywords: Flash Memory, Page Replacement Algorithm, SSD
Show / Hide Abstract

Information Technology Infrastructure for Agriculture Genotyping Studies
Bens Pardamean, James W. Baurley, Anzaludin S. Perbangsa, Dwinita Utami, Habib Rijzaani and Dani Satyawan
Page: 655~665, Vol. 14, No.3, 2018
10.3745/JIPS.01.0029
Keywords: Agriculture Biotechnology, Big Data, Genotyping, Infrastructure, IT
Show / Hide Abstract

Analysis of a Third-Party Application for Mobile Forensic Investigation
Jung Hyun Ryu, Nam Yong Kim, Byoung Wook Kwon, Sang Ki Suk, Jin Ho Park and Jong Hyuk Park
Page: 680~693, Vol. 14, No.3, 2018
10.3745/JIPS.03.0097
Keywords: Digital Investigation, Mobile, Forensics, Third-Party Applications
Show / Hide Abstract

A New Approach for Hierarchical Dividing to Passenger Nodes in Passenger Dedicated Line
Chanchan Zhao, Feng Liu and Xiaowei Hai
Page: 694~708, Vol. 14, No.3, 2018
10.3745/JIPS.04.0074
Keywords: Hierarchical Dividing, K-Means, Passenger Nodes, Passenger Dedicated line, Self-Organizing Map
Show / Hide Abstract

Contribution to Improve Database Classification Algorithms for Multi-Database Mining
Salim Miloudi, Sid Ahmed Rahal and Salim Khiat
Page: 709~726, Vol. 14, No.3, 2018
10.3745/JIPS.04.0075
Keywords: Connected Components, Database Classification, Graph-Based Algorithm, Multi-Database Mining
Show / Hide Abstract

Microblog Sentiment Analysis Method Based on Spectral Clustering
Shi Dong, Xingang Zhang and Ya Li
Page: 727~739, Vol. 14, No.3, 2018
10.3745/JIPS.04.0076
Keywords: Machine Learning, RDM, Sentiment Analysis, Spectral Cluster
Show / Hide Abstract

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration
Sarang Na, Taeeun Kim and Hwankuk Kim
Page: 740~750, Vol. 14, No.3, 2018
10.3745/JIPS.03.0098
Keywords: Common Platform Enumeration (CPE), Common Vulnerabilities and Exposures (CVE), OS Fingerprinting, Security Vulnerability Analysis, Service Identification
Show / Hide Abstract

Analyzing Machine Learning Techniques for Fault Prediction Using Web Applications
Ruchika Malhotra and Anjali Sharma
Page: 751~770, Vol. 14, No.3, 2018
10.3745/JIPS.04.0077
Keywords: Empirical Validation, Fault prediction, Machine Learning, Object-Oriented Metrics, Web Application Quality
Show / Hide Abstract

Maximizing Network Utilization in IEEE 802.21 Assisted Vertical Handover over Wireless Heterogeneous Networks
Dinesh Pandey, Beom Hun Kim, Hui-Seon Gang, Goo-Rak Kwon and Jae-Young Pyun
Page: 771~789, Vol. 14, No.3, 2018
10.3745/JIPS.03.0099
Keywords: Handover Decision, IEEE 802.21, Occupied Bandwidth, SINR, Vertical Handover
Show / Hide Abstract

Speaker Verification with the Constraint of Limited Data
Thyamagondlu Renukamurthy Jayanthi Kumari and Haradagere Siddaramaiah Jayanna
Page: 807~823, Vol. 14, No.4, 2018
10.3745/JIPS.01.0030
Keywords: Gaussian Mixture Model (GMM), GMM-UBM, Multiple Frame Rate (MFR), Multiple Frame Size (MFS), MFSR, SFSR
Show / Hide Abstract

Applying Lexical Semantics to Automatic Extraction of Temporal Expressions in Uyghur
Alim Murat, Azharjan Yusup, Zulkar Iskandar, Azragul Yusup and Yusup Abaydulla
Page: 824~836, Vol. 14, No.4, 2018
10.3745/JIPS.02.0089
Keywords: Feature Combination, Lexical Semantics, Morphosyntax, Temporal Expression Extraction, Uyghur
Show / Hide Abstract

QP-DTW: Upgrading Dynamic Time Warping to Handle Quasi Periodic Time Series Alignment
Imen Boulnemour and Bachir Boucheham
Page: 851~876, Vol. 14, No.4, 2018
10.3745/JIPS.02.0090
Keywords: Alignment, Comparison, Diagnosis, DTW, Motif Discovery, Pattern Recognition, SEA, Similarity Search, Time Series
Show / Hide Abstract

Motion-Blurred Shadows Utilizing a Depth-Time Ranges Shadow Map
MinhPhuoc Hong and Kyoungsu Oh
Page: 877~891, Vol. 14, No.4, 2018
10.3745/JIPS.02.0091
Keywords: Motion-Blurred Shadows, Real-Time Rendering, Space-Time Visibility
Show / Hide Abstract

Predicting the Unemployment Rate Using Social Media Analysis
Pum-Mo Ryu
Page: 904~915, Vol. 14, No.4, 2018
10.3745/JIPS.04.0079
Keywords: Google Index, Prediction, Sentiment Analysis, Social Media, Unemployment Rate
Show / Hide Abstract

Analysis of Academic Evaluation Indicators Based on Citation Quality
Mingyue Zhang, Jin Shi, Jin Wang and Chang Liu
Page: 916~925, Vol. 14, No.4, 2018
10.3745/JIPS.04.0080
Keywords: Academic Evaluation Indicators, Citation Analysis, Citation Impact, Citation Quality
Show / Hide Abstract

An Improved Spin Echo Train De-noising Algorithm in NMRL
Feng Liu and Shuangbao Ma
Page: 941~947, Vol. 14, No.4, 2018
10.3745/JIPS.04.0081
Keywords: Nuclear Magnetic Resonance Logging, Signal to Noise Ratio, Spin Echo Train, Wavelet Transform
Show / Hide Abstract

Significant Motion-Based Adaptive Sampling Module for Mobile Sensing Framework
Muhammad Fiqri Muthohar, I Gde Dharma Nugraha and Deokjai Choi
Page: 948~960, Vol. 14, No.4, 2018
10.3745/JIPS.04.0082
Keywords: Adaptive Sampling, Android Mobile Sensing Framework, Significant Motion Sensor
Show / Hide Abstract

A New Perspective to Stable Marriage Problem in Profit Maximization of Matrimonial Websites
Aniket Bhatnagar, Varun Gambhir and Manish Kumar Thakur
Page: 961~979, Vol. 14, No.4, 2018
10.3745/JIPS.02.0092
Keywords: Bipartite Matching, Combinatorial Optimization, Evolutionary Computing, Genetic Algorithm, Matrimonial Websites, Stable Marriage Problem
Show / Hide Abstract

An Efficient Implementation of Mobile Raspberry Pi Hadoop Clusters for Robust and Augmented Computing Performance
Kathiravan Srinivasan, Chuan-Yu Chang, Chao-Hsi Huang, Min-Hao Chang, Anant Sharma and Avinash Ankur
Page: 989~1009, Vol. 14, No.4, 2018
10.3745/JIPS.01.0031
Keywords: Clusters, Hadoop, MapReduce, Mobile Raspberry Pi, Single-board Computer
Show / Hide Abstract

Restful Web Services Composition Using Semantic Ontology for Elderly Living Assistance Services
Sheik Mohammad Mostakim Fattah and Ilyoung Chong
Page: 1010~1032, Vol. 14, No.4, 2018
10.3745/JIPS.04.0083
Keywords: Internet of Things, Service Composition, Web of Objects
Show / Hide Abstract

Integrated Lighting Enabler System Using M2M Platforms for Enhancing Energy Efficiency
Maman Abdurohman, Aji Gautama Putrada, Sidik Prabowo, Catur Wirawan Wijiutomo and Asma Elmangoush
Page: 1033~1048, Vol. 14, No.4, 2018
10.3745/JIPS.03.0103
Keywords: M2M, Platform, OpenMTC, Sensor and Lighting
Show / Hide Abstract

Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device
Nam-Ho Keum, Taek Lee, Jung-Been Lee and Hoh Peter In
Page: 1049~1061, Vol. 14, No.4, 2018
10.3745/JIPS.04.0084
Keywords: Automated Collection, BCI, Measurement of Immersion, Noise Filtering, Non-experimental Environment, Portable EEG
Show / Hide Abstract

Cross-Validation Probabilistic Neural Network Based Face Identification
Abdelhadi Lotfi and Abdelkader Benyettou
Page: 1075~1086, Vol. 14, No.5, 2018
10.3745/JIPS.04.0085
Keywords: Biometrics, Classification, Cross-Validation, Face Identification, Optimization, Probabilistic Neural Networks
Show / Hide Abstract

GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data
Hyunjo Lee, Youngho Song and Jae-Woo Chang
Page: 1087~1101, Vol. 14, No.5, 2018
10.3745/JIPS.01.0032
Keywords: Cloud Computing, Data Encryption, Query Processing over Encrypted Data
Show / Hide Abstract

Designing a Vibrotactile Reading System for Mobile Phones
Shaowei Chu and Keying Zhu
Page: 1102~1113, Vol. 14, No.5, 2018
10.3745/JIPS.02.0093
Keywords: Blind Use, Mobile Accessibility, Tactile Reading, User Study, Vibrotactile Interface
Show / Hide Abstract

A Multi-Level Integrator with Programming Based Boosting for Person Authentication Using Different Biometrics
Sumana Kundu and Goutam Sarker
Page: 1114~1135, Vol. 14, No.5, 2018
10.3745/JIPS.02.0094
Keywords: Accuracy, Back Propagation Learning, Biometrics, HBC, F-score, Malsburg Learning, Mega-Super-Classifier, MOCA, Multiple Classification System, OCA, Person Identification, Precision, Recall, RBFN, SOM, Super- Classifier
Show / Hide Abstract

A Physical Storage Design Method for Access Structures of Image Information Systems
Jung-A Lee and Jong-Hak Lee
Page: 1150~1166, Vol. 14, No.5, 2018
10.3745/JIPS.04.0086
Keywords: Image Access Structure, Image Retrieval Query, Multidimensional File Organizations, Physical Storage Design
Show / Hide Abstract

A Clustering Approach for Feature Selection in Microarray Data Classification Using Random Forest
Husna Aydadenta and Adiwijaya
Page: 1167~1175, Vol. 14, No.5, 2018
10.3745/JIPS.04.0087
Keywords: Classification, Clustering, Dimensional Reduction, Microarray, Random Forest
Show / Hide Abstract

A Hybrid Proposed Framework for Object Detection and Classification
Muhammad Aamir, Yi-Fei Pu, Ziaur Rahman, Waheed Ahmed Abro, Hamad Naeem, Farhan Ullah and Aymen Mudheher Badr
Page: 1176~1194, Vol. 14, No.5, 2018
10.3745/JIPS.02.0095
Keywords: Image Proposals, Feature Extraction, Object Classification, Object Detection, Segmentation
Show / Hide Abstract

Semantic Image Search: Case Study for Western Region Tourism in Thailand
Chantana Chantrapornchai, Netnapa Bunlaw and Chidchanok Choksuchat
Page: 1195~1214, Vol. 14, No.5, 2018
10.3745/JIPS.04.0088
Keywords: Image Search, Ontology, Semantic Web, Tourism, Western Thailand
Show / Hide Abstract

Multi-Attribute Decision-Making Method Applying A Novel Correlation Coefficient of Interval-Valued Neutrosophic Hesitant Fuzzy Sets
Chunfang Liu
Page: 1215~1224, Vol. 14, No.5, 2018
10.3745/JIPS.04.0089
Keywords: Correlation Coefficient, Decision-Making, Interval-Valued Neutrosophic Hesitant Fuzzy Set
Show / Hide Abstract

A Study on the Design of Humane Animal Care System and Java Implementation
Hui-Su Gong, Sunghyun Weon and Jun-Ho Huh
Page: 1225~1236, Vol. 14, No.5, 2018
10.3745/JIPS.02.0096
Keywords: Animal Care, Artificial Intelligence, BPM, Design, Humane Animal Care, Intelligent Agent, Software Engineering
Show / Hide Abstract

An Improved Harmony Search Algorithm and Its Application in Function Optimization
Zhongda Tian and Chao Zhang
Page: 1237~1253, Vol. 14, No.5, 2018
10.3745/JIPS.04.0090
Keywords: Complex Functions, Harmony Search, Intelligent Algorithm, Optimization
Show / Hide Abstract

A Dependency Graph-Based Keyphrase Extraction Method Using Anti-patterns
Khuyagbaatar Batsuren, Erdenebileg Batbaatar, Tsendsuren Munkhdalai, Meijing Li, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 1254~1271, Vol. 14, No.5, 2018
10.3745/JIPS.04.0091
Keywords: Dependency Graph, Keyphrase Extraction
Show / Hide Abstract

An Internet of Things System Architecture for Aiding Firefighters in the Scene of Disaster
Hyesun Lee, Sang Gi Hong and Kang Bok Lee
Page: 1286~1292, Vol. 14, No.5, 2018
10.3745/JIPS.04.0092
Keywords: Disaster and Safety, Internet of Things, Reference Architecture
Show / Hide Abstract

Research on the Multi-Focus Image Fusion Method Based on the Lifting Stationary Wavelet Transform
Kaiqun Hu and Xin Feng
Page: 1293~1300, Vol. 14, No.5, 2018
10.3745/JIPS.04.0093
Keywords: Image Fusion, Lifting Stationary Wavelet Transform, Normalized Cut, Transform of NSCT
Show / Hide Abstract

Object tracking with the multi-templates regression model based MS algorithm
Hua Zhang and Lijia Wang
Page: 1307~1317, Vol. 14, No.6, 2018
10.3745/JIPS.02.0097
Keywords: Mean Shift Algorithm, Multi-Templates, Object tracking, Regression Model
Show / Hide Abstract

Triqubit-state Measurement-based Image Edge Detection Algorithm
Zhonghua Wang and Faliang Huang
Page: 1331~1346, Vol. 14, No.6, 2018
10.3745/JIPS.04.0095
Keywords: Edge Detection, Partial Differential Equation, Pixel Saliency, Qubit State, Quantum Measurement
Show / Hide Abstract

Energy efficient Cross Layer Multipath Routing for Image Delivery in Wireless Sensor Networks
Santhosha Rao, Kumara Shama and Pavan Kumar Rao
Page: 1347~1360, Vol. 14, No.6, 2018
10.3745/JIPS.03.0104
Keywords: Castalia for OMNET++, Cross Layer Multimedia, Magick++, Sink-Based MMRE AOMDV
Show / Hide Abstract

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions
Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park and Jong Hyuk Park
Page: 1361~1384, Vol. 14, No.6, 2018
10.3745/JIPS.03.0105
Keywords: Cyber Physical System, Internet of Things, Security Analysis, Security Threats
Show / Hide Abstract

Infrared and Visible Image Fusion Based on NSCT and Deep Learning
Xin Feng
Page: 1405~1419, Vol. 14, No.6, 2018
10.3745/JIPS.04.0096
Keywords: Boltzmann Machine, Depth Model, Image Fusion, Split Bregman Iterative Algorithm
Show / Hide Abstract

A Study on Business-Based Screen Design Techniques for Designing Efficient Applications
Tae-Woo Kim, Sun-Yi Park and Jeong-Mo Yeo
Page: 1420~1430, Vol. 14, No.6, 2018
10.3745/JIPS.01.0034
Keywords: Applications, Business Processes, DFD, Screen Design, Screens
Show / Hide Abstract

Two-Phase Security Protection for the Internet of Things Object
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1431~1437, Vol. 14, No.6, 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic
Show / Hide Abstract

A CPU-GPU Hybrid System of Environment Perception and 3D Terrain Reconstruction for Unmanned Ground Vehicle
Wei Song, Shuanghui Zou, Yifei Tian, Su Sun, Simon Fong, Kyungeun Cho and Lvyang Qiu
Page: 1445~1456, Vol. 14, No.6, 2018
10.3745/JIPS.02.0099
Keywords: Driving Awareness, Environment Perception, Unmanned Ground Vehicle, 3D Reconstruction
Show / Hide Abstract

Path Generation Method of UAV Autopilots using Max-Min Algorithm
Jeonghoon Kwak and Yunsick Sung
Page: 1457~1463, Vol. 14, No.6, 2018
10.3745/JIPS.02.0100
Keywords: Autopilot, Max-Min Algorithm, Path Generation, Unmanned Aerial Vehicle
Show / Hide Abstract

Small Sample Face Recognition Algorithm based on Novel Siamese Network
Jianming Zhang, Xiaokang Jin, Yukai Liu, Arun Kumar Sangaiah and Jin Wang
Page: 1464~1479, Vol. 14, No.6, 2018
10.3745/JIPS.02.0101
Keywords: Convolutional Neural Network, Face Recognition, Loss Function, Siamese Network, Small Sample
Show / Hide Abstract

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments
JongBeom Lim, HeonChang Yu and Joon-Min Gil
Page: 1480~1493, Vol. 14, No.6, 2018
10.3745/JIPS.02.0102
Keywords: Cloud Computing, Clustering, Computational Intelligence, Resource Monitoring
Show / Hide Abstract

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information
Chen Li, Mengti Liang, Wei Song and Ke Xiao
Page: 1494~1507, Vol. 14, No.6, 2018
10.3745/JIPS.02.0103
Keywords: Face Recognition, Intelligent Human Identification, MP-CNN, Robust Feature
Show / Hide Abstract

CNN-LSTM Coupled Model for Prediction of Waterworks Operation Data
Kerang Cao, Hangyung Kim, Chulhyun Hwang and Hoekyung Jung
Page: 1508~1520, Vol. 14, No.6, 2018
10.3745/JIPS.02.0104
Keywords: Big Data, CNN, Correlation Analysis, Deep-Learning, LSTM
Show / Hide Abstract

Task Assignment Model for Crowdsourcing Software Development: TAM
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang, Fang Zhao, Abdul Rehman Gilal and Wenhua Shao
Page: 621~630, Vol. 14, No.3, 2018
10.3745/JIPS.04.0064
Keywords: Crowdsourced, Human Factor, Personality Type, Software Development, Task Assignment
Show / Hide Abstract

Power Cable Ampacity and Influential Factors Analysis under Operation
Qiang Tong, Jianping Qi, Yanling Wang, Likai Liang, Xiangxing Meng and Qiang Zhang
Page: 1136~1149, Vol. 14, No.5, 2018
10.3745/JIPS.04.0068
Keywords: Conductor Temperature, Influential Factors, Power Cable, Static Thermal Rating, Transient Temperature
Show / Hide Abstract

Short-Term Wind Speed Forecast Based on Least Squares Support Vector Machine
Yanling Wang, Xing Zhou, Likai Liang, Mingjun Zhang, Qiang Zhang and Zhiqiang Niu
Page: 1385~1397, Vol. 14, No.6, 2018
10.3745/JIPS.04.0069
Keywords: Cluster Analysis, Least Squares, Least Squares Support Vector Regression (LSSVR), Particle Swarm Optimization (PSO), Short-Time Wind Speed Forecasting
Show / Hide Abstract

Shift in the Regional Balance of Power From Europe to Asia: A Case Study of ICT Industry
Jin Hua, Zahid Latif, Shen Tiyan, Zulfiqar Hussain Pathan, Muhammad Zahid Tunio, Shafaq Salam and Liu Ximei
Page: 645~654, Vol. 14, No.3, 2018
10.3745/JIPS.04.0070
Keywords: Digital Power, European Union (EU), Game Changer, Information and Communication Technology (ICT), One Belt, One Road
Show / Hide Abstract

LBP and DWT Based Fragile Watermarking for Image Authentication
Chengyou Wang, Heng Zhang and Xiao Zhou
Page: 666~679, Vol. 14, No.3, 2018
10.3745/JIPS.03.0096
Keywords: Discrete Wavelet Transform (DWT), Fragile Watermarking, Image Authentication, Local Binary Pattern (LBP), Semi-blind Detection
Show / Hide Abstract

Arm Orientation Estimation Method with Multiple Devices for NUI/NUX
Yunsick Sung, Ryong Choi and Young-Sik Jeong
Page: 980~988, Vol. 14, No.4, 2018
10.3745/JIPS.02.0087
Keywords: Bayesian Probability, HTC VIVE, Motion Estimation, NUI/NUX, Thalmic Myo
Show / Hide Abstract

Gait Recognition Algorithm Based on Feature Fusion of GEI Dynamic Region and Gabor Wavelets
Jun Huang, Xiuhui Wang and Jun Wang
Page: 892~903, Vol. 14, No.4, 2018
10.3745/JIPS.02.0088
Keywords: Gait Recognition, Feature Fusion, Gabor Wavelets, GEI, KPCA
Show / Hide Abstract

An Embedded Multifunctional Media System for Mobile Devices in Terrestrial DTV Relaying
Jun Huang and Haibing Yin
Page: 1272~1285, Vol. 14, No.5, 2018
10.3745/JIPS.03.0100
Keywords: DTV, Media Relaying, Media Server, Mobile Devices, Terrestrial Broadcasting
Show / Hide Abstract

A Mixed Co-clustering Algorithm Based on Information Bottleneck
Yongli Liu, Tianyi Duan, Xing Wan and Hao Chao
Page: 1467~1486, Vol. 13, No.6, 2017
10.3745/JIPS.01.0019
Keywords: Co-clustering, F-Measure, Fuzzy Clustering, Information Bottleneck, Objective Function
Show / Hide Abstract

Designing Test Methods for IT-Enabled Energy Storage System to Evaluate Energy Dynamics
Young Gon Kim, Dong Hoon Kim and Eun-Kyu Lee
Page: 1487~1495, Vol. 13, No.6, 2017
10.3745/JIPS.01.0020
Keywords: Converged IT Service, Cyber-Physical System, Energy Dynamics, Energy Storage System, Microgrid, Test Method, Smart Grid
Show / Hide Abstract

Combining Multi-Criteria Analysis with CBR for Medical Decision Support
Mansoul Abdelhak and Atmani Baghdad
Page: 1496~1515, Vol. 13, No.6, 2017
10.3745/JIPS.04.0050
Keywords: Case-Based Reasoning (CBR), Decision Support, Medical Diagnosis, Multi-Criteria Analysis (MCA), Multimodal Reasoning
Show / Hide Abstract

miRNA Pattern Discovery from Sequence Alignment
Xiaohan Sun and Junying Zhang
Page: 1527~1543, Vol. 13, No.6, 2017
10.3745/JIPS.04.0051
Keywords: Deep Sequencing Data, miRNA, Pattern Discovery
Show / Hide Abstract

A Network Coding-Aware Routing Mechanism for Time-Sensitive Data Delivery in Multi-Hop Wireless Networks
Minho Jeong and Sanghyun
Page: 1544~1553, Vol. 13, No.6, 2017
10.3745/JIPS.03.0085
Keywords: Coding-Aware Routing, Link Quality, Multi-Hop Wireless Network, Network Coding, Traffic Load Distribution
Show / Hide Abstract

Generation of Finite Inductive, Pseudo Random, Binary Sequences
Paul Fisher, Nawaf Aljohani and Jinsuk Baek
Page: 1554~1574, Vol. 13, No.6, 2017
10.3745/JIPS.01.0021
Keywords: Pseudo Random, Linear Shift Registers, Finite Induction, Graphs, Hamiltonian Cycles
Show / Hide Abstract

Transaction Processing Method for NoSQL Based Column
Jeong-Joon Kim
Page: 1575~1584, Vol. 13, No.6, 2017
10.3745/JIPS.04.0052
Keywords: Bigdata, HBase, Multi-Row Transaction, NoSQL
Show / Hide Abstract

Review on Digital Image Watermarking Based on Singular Value Decomposition
Chengyou Wang, Yunpeng Zhang and Xiao Zhou
Page: 1585~1601, Vol. 13, No.6, 2017
10.3745/JIPS.03.0086
Keywords: Copyright Protection, Tamper Detection, Digital Image Watermarking, Evaluation Indexes, Singular Value Decomposition (SVD)
Show / Hide Abstract

A Distributed Coexistence Mitigation Scheme for IoT-Based Smart Medical Systems
BeomSeok Kim
Page: 1602~1612, Vol. 13, No.6, 2017
10.3745/JIPS.03.0087
Keywords: Channel Access, Channel Planning, Coexistence Mitigation, IoT, Smart Medical System
Show / Hide Abstract

Beacon-Based Indoor Location Measurement Method to Enhanced Common Chord-Based Trilateration
Jeonghoon Kwak and Yunsick Sung
Page: 1640~1651, Vol. 13, No.6, 2017
10.3745/JIPS.04.0053
Keywords: Beacon, Chord-Based Trilateration, Indoor Location, Trilateration, Unmanned Aerial Vehicle
Show / Hide Abstract

An Intuitionistic Fuzzy Approach to Classify the User Based on an Assessment of the Learner’s Knowledge Level in E-Learning Decision-Making
Mukta Goyal, Divakar Yadav and Alka Tripathi
Page: 57~67, Vol. 13, No.1, 2017
10.3745/JIPS.04.0011
Keywords: Domain Model, E-Learning, E-Learning Environment, Fuzzy Rules, Intuitionistic Fuzzy Set, User Modeling
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017
10.3745/JIPS.04.0013
Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017
10.3745/JIPS.03.0024
Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script
Rajiv Kumar, Kiran Kumar Ravulakollu and Rajesh Bhat
Page: 893~913, Vol. 13, No.4, 2017
10.3745/JIPS.02.0018
Keywords: CPAR-2012, Devnagari, Fuzzy Membership, Handwritten Script, Writer Identification
Show / Hide Abstract

Fingerprint Matching Based on Dimension Reduced DCT Feature Vectors
Sangita Bharkad and Manesh Kokare
Page: 852~862, Vol. 13, No.4, 2017
10.3745/JIPS.02.0017
Keywords: Biometric, Discrete Cosine Transform, Fingerprint Identification, Similarity Measure
Show / Hide Abstract

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
10.3745/JIPS.03.0029
Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

[EDITORIAL] Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016
Jong Hyuk Park
Page: 1~7, Vol. 13, No.1, 2017
10.3745/JIPS.00.0003
Keywords:
Show / Hide Abstract

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Page: 8~25, Vol. 13, No.1, 2017
10.3745/JIPS.02.0051
Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

Adaptive Medical Image Compression Based on Lossy and Lossless Embedded Zerotree Methods
Sid Ahmed Elhannachi, Nacéra Benamrane and Taleb-Ahmed Abdelmalik
Page: 40~56, Vol. 13, No.1, 2017
10.3745/JIPS.02.0052
Keywords: LEZW, Medical Images, ROI, RDCT, SPIHT
Show / Hide Abstract

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017
10.3745/JIPS.03.0059
Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

Joint Estimation of Near-Field Source Parameters and Array Response
Han Cui and Wenjuan Peng
Page: 83~94, Vol. 13, No.1, 2017
10.3745/JIPS.03.0060
Keywords: Array Calibration, Gain/Phase Response, Near-Field Source Localization
Show / Hide Abstract

A Joint Channel Estimation and Data Detection for a MIMO Wireless Communication System via Sphere Decoding
Gajanan R. Patil and Vishwanath K. Kokate
Page: 1029~1042, Vol. 13, No.4, 2017
10.3745/JIPS.03.0033
Keywords: Maximum Likelihood Decoding, Multiple Input Multiple Output, Normalized Mean Square Error, Training Based Channel Estimation, Semi-Blind Channel Estimation, Spatial Multiplexing, Sphere Decoding
Show / Hide Abstract

Feasibility and Performance Analysis of RDMA Transfer through PCI Express
Min Choi and Jong Hyuk Park
Page: 95~103, Vol. 13, No.1, 2017
10.3745/JIPS.01.0013
Keywords: Interconnection Network, Non-transparent Bridge, PCI Express, RDMA
Show / Hide Abstract

Combination of Classifiers Decisions for Multilingual Speaker Identification
B. G. Nagaraja and H. S. Jayanna
Page: 928~940, Vol. 13, No.4, 2017
10.3745/JIPS.02.0025
Keywords: Classifier Combination, Cross-lingual, Monolingual, Multilingual, Speaker Identification
Show / Hide Abstract

Color Image Coding Based on Shape-Adaptive All Phase Biorthogonal Transform
Xiaoyan Wang, Chengyou Wang, Xiao Zhou and Zhiqiang Yang
Page: 114~127, Vol. 13, No.1, 2017
10.3745/JIPS.02.0053
Keywords: Color Image Coding, Shape-Adaptive All Phase Biorthogonal Transform (SA-APBT), Color Space Conversion, Chain Code
Show / Hide Abstract

Self-Identification of Boundary’s Nodes in Wireless Sensor Networks
Kouider Elouahed Moustafa and Haffaf Hafid
Page: 128~140, Vol. 13, No.1, 2017
10.3745/JIPS.03.0062
Keywords: Boundary Recognition, Military Applications, Military Surveillance, Wireless Sensor Network
Show / Hide Abstract

Wireless Channel Identification Algorithm Based on Feature Extraction and BP Neural Network
Dengao Li*, Gang Wu, Jumin Zhao, Wenhui Niu and Qi Liu
Page: 141~151, Vol. 13, No.1, 2017
10.3745/JIPS.03.0063
Keywords: BP Neural Network, Channel Identification, Feature Extraction, Wireless Communication
Show / Hide Abstract

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017
10.3745/JIPS.03.0064
Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City
Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Page: 184~195, Vol. 13, No.1, 2017
10.3745/JIPS.03.0065
Keywords: Blockchain, Internet of Things, Security, Vehicular Network
Show / Hide Abstract

Test Set Generation for Pairwise Testing Using Genetic Algorithms
Sangeeta Sabharwal and Manuj Aggarwal
Page: 1089~1102, Vol. 13, No.5, 2017
10.3745/JIPS.04.0019
Keywords: Combinatorial Testing, Genetic Algorithm, Mixed Covering Arrays, Pairwise Testing, Test Set, t-way Testing
Show / Hide Abstract

[EDITORIAL] Advances in Algorithm, Multimedia, and Network for Future IT
Jong Hyuk Park
Page: 197~203, Vol. 13, No.2, 2017
10.3745/JIPS.00.0004
Keywords:
Show / Hide Abstract

A Hybrid Bacterial Foraging Optimization Algorithm and a Radial Basic Function Network for Image Classification
Yasmina Teldja Amghar and Hadria Fizazi
Page: 215~235, Vol. 13, No.2, 2017
10.3745/JIPS.01.0014
Keywords: Bacterial Foraging Optimization Algorithm, Hybrid, Image Classification, Radial Basic Function
Show / Hide Abstract

Mobility Scenarios into Future Wireless Access Network
Syed Mushhad Mustuzhar Gilani, Tang Hong, Qiqi Cai and Guofeng Zhao
Page: 236~255, Vol. 13, No.2, 2017
10.3745/JIPS.03.0069
Keywords: Access Point (AP), Internet Architecture, Network Function Virtualization (NFV), Seamless Handover, Software-Defined Network (SDN)
Show / Hide Abstract

An Improved Stereo Matching Algorithm with Robustness to Noise Based on Adaptive Support Weight
Ingyu Lee and Byungin Moon
Page: 256~267, Vol. 13, No.2, 2017
10.3745/JIPS.02.0057
Keywords: Adaptive Census Transform, Adaptive Support Weight, Local Matching, Multiple Sparse Windows, Stereo Matching
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 1229~1242, Vol. 13, No.5, 2017
10.3745/JIPS.03.0038
Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

DTG Big Data Analysis for Fuel Consumption Estimation
Wonhee Cho and Eunmi Choi
Page: 285~304, Vol. 13, No.2, 2017
10.3745/JIPS.04.0031
Keywords: Big Data Analysis, DTG, Eco-Driving, Fuel Economy, Fuel Consumption Estimation, MapReduce
Show / Hide Abstract

Self-adaptive and Bidirectional Dynamic Subset Selection Algorithm for Digital Image Correlation
Wenzhuo Zhang, Rong Zhou and Yuanwen Zou
Page: 305~320, Vol. 13, No.2, 2017
10.3745/JIPS.02.0056
Keywords: Digital Image Correlation, Dynamic Subset Size, Image Processing, Information Amount, Self-adaptive
Show / Hide Abstract

A Multi-Objective TRIBES/OC-SVM Approach for the Extraction of Areas of Interest from Satellite Images
Wafaa Benhabib and Hadria Fizazi
Page: 321~339, Vol. 13, No.2, 2017
10.3745/JIPS.02.0054
Keywords: Image Classification, MO-TRIBES, OC-SVM, Remote Sensing
Show / Hide Abstract

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System
Salima Lalani and D. D. Doye
Page: 340~347, Vol. 13, No.2, 2017
10.3745/JIPS.03.0067
Keywords: DWT, Fuzzy, SVD, Watermarking
Show / Hide Abstract

Image Restoration and Object Removal Using Prioritized Adaptive Patch-Based Inpainting in a Wavelet Domain
Rajesh P. Borole and Sanjiv V. Bonde
Page: 1183~1202, Vol. 13, No.5, 2017
10.3745/JIPS.02.0031
Keywords: Image Inpainting, Object Removal, Region Filling, Texture and Structure Propagation, Wavelet Inpainting
Show / Hide Abstract

Block Sparse Signals Recovery via Block BacktrackingBased Matching Pursuit Method
Rui Qi, Yujie Zhang and Hongwei Li
Page: 360~369, Vol. 13, No.2, 2017
10.3745/JIPS.04.0030
Keywords: Block Sparse Signal, Compressed Sensing, Sparse Signal Reconstruction
Show / Hide Abstract

Unsupervised Segmentation of Images Based on Shuffled Frog-Leaping Algorithm
Amel Tehami* and Hadria Fizazi
Page: 370~384, Vol. 13, No.2, 2017
10.3745/JIPS.02.0055
Keywords: Image, K-means, Meta-Heuristic, Optimization, SFLA, Unsupervised Segmentation
Show / Hide Abstract

Speech Query Recognition for Tamil Language Using Wavelet and Wavelet Packets
P. Iswarya and V. Radha
Page: 1135~1148, Vol. 13, No.5, 2017
10.3745/JIPS.02.0033
Keywords: De-noising, Feature Extraction, Speech Recognition, Support Vector Machine, Wavelet Packet
Show / Hide Abstract

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 385~399, Vol. 13, No.2, 2017
10.3745/JIPS.03.0070
Keywords: Fragile Watermarking, Local Binary Pattern (LBP), Least Significant Bit (LSB), Tamper Detection and Localization
Show / Hide Abstract

Boosting the Reasoning-Based Approach by Applying Structural Metrics for Ontology Alignment
Abderrahmane Khiat and Moussa Benaissa
Page: 834~851, Vol. 13, No.4, 2017
10.3745/JIPS.02.0034
Keywords: Description Logics Inference, Intra-Taxonomy Measures, Ontology Alignment, Semantic Interoperability, Semantic Web, Structural Similarity
Show / Hide Abstract

Rough Set-Based Approach for Automatic Emotion Classification of Music
Babu Kaji Baniya and Joonwhoan Lee
Page: 400~416, Vol. 13, No.2, 2017
10.3745/JIPS.04.0032
Keywords: Attributes, Covariance, Discretize, Rough Set, Rules
Show / Hide Abstract

A Power Allocation Algorithm Based on Variational Inequality Problem for Cognitive Radio Networks
Ming-Yue Zhou and Xiao-Hui Zhao
Page: 417~427, Vol. 13, No.2, 2017
10.3745/JIPS.03.0068
Keywords: Cognitive Radio, Power Allocation, Variational Inequality
Show / Hide Abstract

[EDITORIAL] New Approaches to Advanced Network and Image Processing
Jong Hyuk Park
Page: 429~434, Vol. 13, No.3, 2017
10.3745/JIPS.00.0005
Keywords:
Show / Hide Abstract

Granular Bidirectional and Multidirectional Associative Memories: Towards a Collaborative Buildup of Granular Mappings
Witold Pedrycz
Page: 435~447, Vol. 13, No.3, 2017
10.3745/JIPS.02.0058
Keywords: Allocation of Information Granularity and Optimization, Bidirectional Associative Memory, Collaborative Clustering, Granular Computing, Multi-directional Associative Memory, Prototypes
Show / Hide Abstract

Blind Image Quality Assessment on Gaussian Blur Images
Liping Wang, Chengyou Wang and Xiao Zhou
Page: 448~463, Vol. 13, No.3, 2017
10.3745/JIPS.02.0059
Keywords: Blind Image Quality Assessment (BIQA), Gaussian Blur Image, Saliency Map, Structure Tensor, Structural Similarity (SSIM)
Show / Hide Abstract

NDynamic Framework for Secure VM Migration over Cloud Computing
Suresh B. Rathod and V. Krishna Reddy
Page: 476~490, Vol. 13, No.3, 2017
10.3745/JIPS.01.0015
Keywords: Cloud Computing, Datacenter (DC), Host Controller, Physical Host, Virtual Machine (VM)
Show / Hide Abstract

A Fast Ground Segmentation Method for 3D Point Cloud
Phuong Chu, Seoungjae Cho, Sungdae Sim, Kiho Kwak and Kyungeun Cho
Page: 491~499, Vol. 13, No.3, 2017
10.3745/JIPS.02.0061
Keywords: 3D Point Cloud, Ground Segmentation, Light Detection and Ranging, Start-Ground Point, Threshold Point
Show / Hide Abstract

An Improved Zone-Based Routing Protocol for Heterogeneous Wireless Sensor Networks
Liquan Zhao and Nan Chen
Page: 500~517, Vol. 13, No.3, 2017
10.3745/JIPS.03.0072
Keywords: Energy Consumption, Heterogeneous Wireless Sensor Networks, Stable Election Protocol, Zone-Based
Show / Hide Abstract

Improvement of OPW-TR Algorithm for Compressing GPS Trajectory Data
Qingbin Meng, Xiaoqiang Yu, Chunlong Yao, Xu Li, Peng Li and Xin Zhao
Page: 533~545, Vol. 13, No.3, 2017
10.3745/JIPS.03.0073
Keywords: ASED, GPS Trajectory, SED, Trajectory Compression
Show / Hide Abstract

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution
Manmeet Mahinderjit Singh, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin and Nurul Hashimah Ahamed Hassain Malim
Page: 559~572, Vol. 13, No.3, 2017
10.3745/JIPS.04.0033
Keywords: Cyberbullying, Digital Etiquette, Intrusion Detection System, Mobile Application, Social Network
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017
10.3745/JIPS.04.0034
Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

Fire Detection Using Multi-Channel Information and Gray Level Co-occurrence Matrix Image Features
Jae-Hyun Jun, Min-Jun Kim, Yong-Suk Jang and Sung-Ho Kim
Page: 590~598, Vol. 13, No.3, 2017
10.3745/JIPS.02.0062
Keywords: Color Features, Fire Detection, Texture Features
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017
10.3745/JIPS.03.0074
Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 1382~1396, Vol. 13, No.5, 2017
10.3745/JIPS.02.0063
Keywords: Digital Image Watermarking, Semi-fragile Watermarking, False Detection, Local Binary Pattern (LBP), Arnold Transform
Show / Hide Abstract

Achievable Rate Analysis for Opportunistic Non-orthogonal Multiple Access-Based Cooperative Relaying Systems
In-Ho Lee and Howon Lee
Page: 630~642, Vol. 13, No.3, 2017
10.3745/JIPS.03.0076
Keywords: Achievable Rate Analysis, Decode-and-Forward Relaying, Non-orthogonal Multiple Access, Opportunistic Transmission, Rayleigh Fading Channels, Superposition Coding
Show / Hide Abstract

[EDITORIAL] Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning
Jong Hyuk Park
Page: 643~652, Vol. 13, No.4, 2017
10.3745/JIPS.00.0006
Keywords:
Show / Hide Abstract

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries
Carlos Porcel, Alberto Ching-López, Juan Bernabé-Moreno, Alvaro Tejeda-Lorente and Enrique Herrera-Viedma
Page: 653~667, Vol. 13, No.4, 2017
10.3745/JIPS.04.0035
Keywords: Digital Libraries, Dissemination of Information, Fuzzy Linguistic Modeling, Recommender Systems
Show / Hide Abstract

Hadoop Based Wavelet Histogram for Big Data in Cloud
Jeong-Joon Kim
Page: 668~676, Vol. 13, No.4, 2017
10.3745/JIPS.04.0036
Keywords: Big Data, Histogram, MapReduce, Wavelet
Show / Hide Abstract

Time-Delay and Amplitude Modified BP Imaging Algorithm of Multiple Targets for UWB Through-the-Wall Radar Imaging
Huamei Zhang, Dongdong Li, Jinlong Zhao and Haitao Wang
Page: 677~688, Vol. 13, No.4, 2017
10.3745/JIPS.02.0064
Keywords:
Show / Hide Abstract

Using Semantic Knowledge in the Uyghur-Chinese Person Name Transliteration
Alim Murat, Turghun Osman, Yating Yang, Xi Zhou, Lei Wang and Xiao Li
Page: 716~730, Vol. 13, No.4, 2017
10.3745/JIPS.02.0065
Keywords: Gender, Language Origin, Semantic Knowledge-based Model, Transliteration of Person Name
Show / Hide Abstract

An Innovative Approach of Bangla Text Summarization by Introducing Pronoun Replacement and Improved Sentence Ranking
Md. Majharul Haque, Suraiya Pervin and Zerina Begum
Page: 752~777, Vol. 13, No.4, 2017
10.3745/JIPS.04.0038
Keywords: Bangla News Document, Cosine Similarity, Dangling Pronoun, Pronoun Replacement, Sentence Frequency
Show / Hide Abstract

A Method of Chinese and Thai Cross-Lingual Query Expansion Based on Comparable Corpus
Peili Tang, Jing Zhao, Zhengtao Yu, Zhuo Wang and Yantuan Xian
Page: 805~817, Vol. 13, No.4, 2017
10.3745/JIPS.04.0039
Keywords: Comparable Corpus, Cross-Language Query Expansion, Cross-Language Information Retrieval, Words Relationship
Show / Hide Abstract

Real-Time Motion Blur Using Triangular Motion Paths
MinhPhuoc Hong and Kyoungsu Oh
Page: 818~833, Vol. 13, No.4, 2017
10.3745/JIPS.02.0066
Keywords: Motion Blur, Real-Time Rendering, Visibility
Show / Hide Abstract

A Text Similarity Measurement Method Based on Singular Value Decomposition and Semantic Relevance
Xu Li, Chunlong Yao, Fenglong Fan and Xiaoqiang Yu
Page: 863~875, Vol. 13, No.4, 2017
10.3745/JIPS.02.0067
Keywords: Natural Language Processing, Semantic Relevance, Singular Value Decomposition, Text Representation, Text Similarity Measurement
Show / Hide Abstract

Weighted Local Naive Bayes Link Prediction
JieHua Wu, GuoJi Zhang, YaZhou Ren, XiaYan Zhang and Qiao Yang
Page: 914~927, Vol. 13, No.4, 2017
10.3745/JIPS.04.0040
Keywords: Complex Network, Link Prediction, Naive Bayes Model, Weighted Network
Show / Hide Abstract

CPU Scheduling with a Round Robin Algorithm Based on an Effective Time Slice
Mohammad M. Tajwar, Md. Nuruddin Pathan, Latifa Hussaini and Adamu Abubakar
Page: 941~950, Vol. 13, No.4, 2017
10.3745/JIPS.01.0018
Keywords: Average Turnaround Time, Average Waiting Time, CPU Processing Time, Round Robin Algorithm, Quantum Time
Show / Hide Abstract

Traffic Information Service Model Considering Personal Driving Trajectories
Homin Han and Soyoung Park
Page: 951~969, Vol. 13, No.4, 2017
10.3745/JIPS.03.0078
Keywords: GPS-to-Road Mapping Strategy, Personal Trajectory, Traffic Information System, Trajectory Estimation
Show / Hide Abstract

Identifying Influential People Based on Interaction Strength
Muhammad Azam Zia, Zhongbao Zhang, Liutong Chen, Haseeb Ahmad and Sen Su
Page: 987~999, Vol. 13, No.4, 2017
10.3745/JIPS.04.0041
Keywords: Influence, Interaction, IPRank, Micro-Blog, Online Social Network
Show / Hide Abstract

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs
Shailendra Rathore, Pradip Kumar Sharma and Jong Hyuk Park
Page: 1014~1028, Vol. 13, No.4, 2017
10.3745/JIPS.03.0079
Keywords: Cross-Site Scripting Attack Detection, Dataset, JavaScript, Machine Learning Classifier, Social Networking Services
Show / Hide Abstract

[EDITORIAL] Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1043~1051, Vol. 13, No.5, 2017
10.3745/JIPS.00.0007
Keywords:
Show / Hide Abstract

A CTR Prediction Approach for Text Advertising Based on the SAE-LR Deep Neural Network
Zilong Jiang, Shu Gao and Wei Dai
Page: 1052~1070, Vol. 13, No.5, 2017
10.3745/JIPS.02.0069
Keywords: Deep Neural Network, Machine Learning, Text Advertising, SAE-LR
Show / Hide Abstract

Extraction of ObjectProperty-UsageMethod Relation from Web Documents
Chaveevan Pechsiri, Sumran Phainoun and Rapeepun Piriyakul
Page: 1103~1125, Vol. 13, No.5, 2017
10.3745/JIPS.04.0046
Keywords: Medicinal Property, N-Word-Co, Semantic Relation, Usage-Method
Show / Hide Abstract

An Algorithm Solving SAT Problem Based on Splitting Rule and Extension Rule
Youjun Xu
Page: 1149~1157, Vol. 13, No.5, 2017
10.3745/JIPS.02.0071
Keywords: Extension Rule, IER, MOAMD Strategy, Satisfiability Problem, Splitting Rule
Show / Hide Abstract

Similarity Evalution between Graphs: A Formal Concept Analysis Approach
Fei Hao, Dae-Soo Sim, Doo-Soon Park and Hyung-Seok Seo
Page: 1158~1167, Vol. 13, No.5, 2017
10.3745/JIPS.04.0048
Keywords: Formal Concept Analysis, Graph, Social Networks, Similarity Evaluation
Show / Hide Abstract

Regularization Parameter Selection for Total Variation Model Based on Local Spectral Response
Yuhui Zheng, Kai Ma, Qiqiong Yu, Jianwei Zhang and Jin Wang
Page: 1168~1182, Vol. 13, No.5, 2017
10.3745/JIPS.02.0072
Keywords: Image Denoising, Local Spectral Response, Regularization Parameter Selection
Show / Hide Abstract

A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network
Bayu Adhi Tama and Kyung-Hyune Rhee
Page: 1203~1212, Vol. 13, No.5, 2017
10.3745/JIPS.03.0080
Keywords: Classifier Ensembles, Classifier’s Significance, Intrusion Detection Systems (IDSs), Wireless Network
Show / Hide Abstract

Thai Classical Music Matching using t-Distribution on Instantaneous Robust Algorithm for Pitch Tracking Framework
Pheerasut Boonmatham, Sunee Pongpinigpinyo and Tasanawan Soonklang
Page: 1213~1228, Vol. 13, No.5, 2017
10.3745/JIPS.02.0073
Keywords: Pitch Tracking Algorithm, Instantaneous Robust Algorithm for Pitch Tracking, T-Distribution, Shortest Query Sample
Show / Hide Abstract

Modeling and Simulation of Scheduling Medical Materials Using Graph Model for Complex Rescue
Ming Lv, Jingchen Zheng, Qingying Tong, Jinhong Chen, Haoting Liu and Yun Gao
Page: 1243~1258, Vol. 13, No.5, 2017
10.3745/JIPS.04.0042
Keywords: Bipartite Graph, BSCS, Drug Scheduling, Medical Rescue, Optimization Matching
Show / Hide Abstract

Spatio-temporal Sensor Data Processing Techniques
Jeong-Joon Kim
Page: 1259~1276, Vol. 13, No.5, 2017
10.3745/JIPS.04.0047
Keywords: Multi-dimensional Operator, Multi-dimensional Spatio-temporal Data Type, Sensor Networks, Sensor Query Processing System
Show / Hide Abstract

Efficiently Processing Skyline Query on Multi-Instance Data
Shu-I Chiu and Kuo-Wei Hsu
Page: 1277~1298, Vol. 13, No.5, 2017
10.3745/JIPS.04.0049
Keywords: Multi-Instance Data, Product Search, Ranking, Recommendation, Skyline Query Processing
Show / Hide Abstract

Sector Based Multiple Camera Collaboration for Active Tracking Applications
Sangjin Hong, Kyungrog Kim and Nammee Moon
Page: 1299~1319, Vol. 13, No.5, 2017
10.3745/JIPS.02.0074
Keywords: Active Tracking, Master-Slave, Object Dynamics, Sector-Based Representation
Show / Hide Abstract

Nearest Neighbor Based Prototype Classification Preserving Class Regions
Doosung Hwang and Daewon Kim
Page: 1345~1357, Vol. 13, No.5, 2017
10.3745/JIPS.04.0045
Keywords: Class Prototype, Dissimilarity, Greedy Method, Nearest-Neighbor Rule, Set Cover Optimization
Show / Hide Abstract

Analysis on Ampacity of Overhead Transmission Lines Being Operated
Zhijie Yan, Yanling Wang and Likai Liang
Page: 1358~1371, Vol. 13, No.5, 2017
10.3745/JIPS.04.0044
Keywords: Ampacity, Dynamic Thermal Rating, Rating Scales, Risk Level, Transmission Line
Show / Hide Abstract

A Novel Statistical Feature Selection Approach for Text Categorization
Mohamed Abdel Fattah
Page: 1397~1409, Vol. 13, No.5, 2017
10.3745/JIPS.02.0076
Keywords: Electronic Texts, E-mail Filtering, Feature Selection, SMS Spam Filtering, Text Categorization
Show / Hide Abstract

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things
Youn-Hee Han, Hyun-Kyo Lim and Joon-Min Gil
Page: 1410~1429, Vol. 13, No.5, 2017
10.3745/JIPS.03.0081
Keywords: Internet of Things, Location Caching Scheme, Location Tracking, Mobile Computing, Mobile Object
Show / Hide Abstract

[EDITORIAL] Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1431~1435, Vol. 13, No.6, 2017
10.3745/JIPS.00.0008
Keywords:
Show / Hide Abstract

Task Management System According to Changes in the Situation Based on IoT
Cao Kerang, Hyunju Lee and Hoekyung Jung
Page: 1459~1466, Vol. 13, No.6, 2017
10.3745/JIPS.03.0083
Keywords: IoT, Priority, Sensor, Smart Home, Task Management System
Show / Hide Abstract

A Comprehensive Review of Emerging Computational Methods for Gene Identification
Ning Yu, Zeng Yu, Bing Li, Feng Gu and Yi Pan
Page: 1~34, Vol. 12, No.1, 2016
10.3745/JIPS.04.0023
Keywords: Cloud Computing, Comparative Methods, Deep Learning, Fourier Transform, Gene Identification, Gene Prediction, Hidden Markov Model, Machine Learning, Protein-Coding Region, Support Vector Machine
Show / Hide Abstract

Number Plate Detection with a Multi-Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices
Christian Gerber and Mokdong Chung
Page: 100~108, Vol. 12, No.1, 2016
10.3745/JIPS.04.0022
Keywords: Convolutional Neural Network, Number Plate Detection, OCR
Show / Hide Abstract

Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model
Moulkheir Naoui, Saïd Mahmoudi and Ghalem Belalem
Page: 149~168, Vol. 12, No.1, 2016
10.3745/JIPS.02.0039
Keywords: Active Appearance Model, Data Parallelism, Deformable Model, Distributed Image Processing, Parallel Image Processing, Segmentation
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016
10.3745/JIPS.03.0047
Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching
Kenan Mu, Fei Hui and Xiangmo Zhao
Page: 183~195, Vol. 12, No.2, 2016
10.3745/JIPS.02.0040
Keywords: Computer Vision, Highway Traffic Surveillance, SIFT Feature Matching, Vehicle Detection, Vehicle Tracking
Show / Hide Abstract

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 196~213, Vol. 12, No.2, 2016
10.3745/JIPS.03.0037
Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE
Show / Hide Abstract

An Improved Algorithm for Redundancy Detection Using Global Value Numbering
Nabizath Saleena and Vineeth Paleri
Page: 214~225, Vol. 12, No.2, 2016
10.3745/JIPS.02.0014
Keywords: Equivalent Expression, Global Value Numbering, Herbrand Equivalence, Strong Equivalence Dag
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
10.3745/JIPS.03.0049
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance
Kuldeep Gurjar and Yang-Sae Moon
Page: 234~248, Vol. 12, No.2, 2016
10.3745/JIPS.04.0024
Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score
Show / Hide Abstract

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Samaneh Mashhadi
Page: 249~262, Vol. 12, No.2, 2016
10.3745/JIPS.03.0050
Keywords: Non-repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016
10.3745/JIPS.04.0025
Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016
10.3745/JIPS.03.0032
Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks
Muhammad Sajjad Khan and Insoo Koo
Page: 295~309, Vol. 12, No.2, 2016
10.3745/JIPS.03.0040
Keywords: Cognitive Radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016
10.3745/JIPS.03.0021
Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping
Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa and Hasan Al-Shalabi
Page: 322~331, Vol. 12, No.2, 2016
10.3745/JIPS.03.0051
Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Page: 338~357, Vol. 12, No.3, 2016
10.3745/JIPS.01.0010
Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic
Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef and Lamia Belguith Hadrich
Page: 358~380, Vol. 12, No.3, 2016
10.3745/JIPS.02.0041
Keywords: Alkhalil Morphological Analyzer, Approach to Multi-Criteria Decision (MCA), Arabic Language Processing (ALP), Augmented Transition Networks (ATNs), Contextual Exploration, Tagging, Diacritization, Disambiguation Method, Segmentation
Show / Hide Abstract

Two-Dimensional Joint Bayesian Method for Face Verification
Sunghyu Han, Il-Yong Lee and Jung-Ho Ahn
Page: 381~391, Vol. 12, No.3, 2016
10.3745/JIPS.02.0036
Keywords: Face Verification, Joint Bayesian Method, LBP, LFW Database, Two-Dimensional Joint Bayesian Method
Show / Hide Abstract

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis
Leila Boussaad, Mohamed Benmohammed and Redha Benzid
Page: 392~409, Vol. 12, No.3, 2016
10.3745/JIPS.02.0043
Keywords: Active Appearance Model, Age-Invariant, Face Recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform
Show / Hide Abstract

Landmark-Guided Segmental Speech Decoding for Continuous Mandarin Speech Recognition
Hao Chao and Cheng Song
Page: 410~421, Vol. 12, No.3, 2016
10.3745/JIPS.03.0052
Keywords: Decoding, Landmark, Mandarin, Speech Recognition, Segment Model
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
10.3745/JIPS.03.0045
Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
10.3745/JIPS.03.0048
Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification
Chouchane Ammar*, Belahcene Mebarka, Ouamane Abdelmalik and Bourennane Salah
Page: 468~488, Vol. 12, No.3, 2016
10.3745/JIPS.02.0037
Keywords: 3D Face Verification, Depth Image, Dimensionality Reduction, Histograms Local Features, Local Descriptors, Support Vector Machine
Show / Hide Abstract

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet
Jeong Kyu Lee, Seo Yeon Moon and Jong Hyuk Park
Page: 489~501, Vol. 12, No.3, 2016
10.3745/JIPS.01.0009
Keywords: Future Internet, Human Behavior, Intrusion Prevention, Malware Detection
Show / Hide Abstract

A Multiple Features Video Copy Detection Algorithm Based on a SURF Descriptor
Yanyan Hou, Xiuzhen Wang and Sanrong Liu
Page: 502~510, Vol. 12, No.3, 2016
10.3745/JIPS.02.0042
Keywords: Local Invariant Feature, Speeded-Up Robust Features, Video Copy Detection
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016
10.3745/JIPS.03.0039
Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016
10.3745/JIPS.03.0054
Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

A Security Protection Framework for Cloud Computing
Wenzheng Zhu and Changhoon Lee
Page: 538~547, Vol. 12, No.3, 2016
10.3745/JIPS.03.0053
Keywords: Cloud Computing, Collusive Worker, Malicious Worker, MapReduce, Non-collusive Worker
Show / Hide Abstract

[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors
Jong Hyuk Park
Page: 549~554, Vol. 12, No.4, 2016
10.3745/JIPS.00.0002
Keywords:
Show / Hide Abstract

A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform
Ibtissem Bekkouche and Hadria Fizazi
Page: 555~576, Vol. 12, No.4, 2016
10.3745/JIPS.02.0047
Keywords: Fourier Transform, Fuzzy Clustering, Harmony Search, Processing Image, Remote Sensing
Show / Hide Abstract

Community Model for Smart TV over the Top Services
Suman Pandey, Young Joon Won, Mi-Jung Choi and Joon-Min Gil
Page: 577~590, Vol. 12, No.4, 2016
10.3745/JIPS.03.0057
Keywords: Community Formation, Datamining, HbbTV, Smart TV
Show / Hide Abstract

Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images
Arif Muntasa
Page: 591~611, Vol. 12, No.4, 2016
10.3745/JIPS.01.0011
Keywords: Eigenspaces, Feature Extraction, Homogeneous, Non-homogeneous
Show / Hide Abstract

Interactive Authoring Tool for Mobile Augmented Reality Content
Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim and Yoo-Joo Cho
Page: 612~630, Vol. 12, No.4, 2016
10.3745/JIPS.02.0048
Keywords: Augmented Reality, Authoring Tool, Interactive Mobile, Mobile App
Show / Hide Abstract

Image Deblocking Scheme for JPEG Compressed Images Using an Adaptive-Weighted Bilateral Filter
Liping Wang, Chengyou Wang, Wei Huang and Xiao Zhou
Page: 631~643, Vol. 12, No.4, 2016
10.3745/JIPS.02.0046
Keywords: Image Deblocking, Adaptive-Weighted Bilateral Filter, Blind Image Quality Assessment (BIQA), Local Entropy
Show / Hide Abstract

A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features
Mohamed Belaoued and Smaine Mazouzi
Page: 644~660, Vol. 12, No.4, 2016
10.3745/JIPS.03.0058
Keywords: Chi-Square Test, Malware Analysis, PE-Optional Header, Real-Time Detection Windows API
Show / Hide Abstract

Segmentation and Recognition of Korean Vehicle License Plate Characters Based on the Global Threshold Method and the Cross-Correlation Matching Algorithm
Md. Mostafa Kamal Sarker and Moon Kyou Song
Page: 661~680, Vol. 12, No.4, 2016
10.3745/JIPS.02.0050
Keywords: Cross-Correlation, Global Threshold, License Plate Recognition, Radon Transformation, Traffic Surveillance
Show / Hide Abstract

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique
Salima Lalani and D. D. Doye
Page: 681~687, Vol. 12, No.4, 2016
10.3745/JIPS.02.0045
Keywords: DWT, Image Watermarking, Torus
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016
10.3745/JIPS.03.0056
Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

Treatment Planning in Smart Medical: A Sustainable Strategy
Fei Hao, Doo-Soon Park, Sang Yeon Woo, Se Dong Min and Sewon Park
Page: 711~723, Vol. 12, No.4, 2016
10.3745/JIPS.04.0026
Keywords: Degree of Membership, Fuzzy Evaluation, Smart Medical, Sustainable, Treatment Plan
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016
10.3745/JIPS.01.0012
Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

A Robust Fingerprint Matching System Using Orientation Features
Ravinder Kumar, Pravin Chandra and Madasu Hanmandlu
Page: 83~99, Vol. 12, No.1, 2016
10.3745/JIPS.02.0020
Keywords: Circular ROI, Core Point Detection, Image-Based Fingerprint Matching, Orientation Features
Show / Hide Abstract

Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke
Meeyeon Lee, Ye-Seul Park and Jung-Won Lee
Page: 741~753, Vol. 12, No.4, 2016
10.3745/JIPS.04.0027
Keywords: Acute Myocardial Infarction, Data Model, Hospital Information System, Ischemic Stroke, Medical Image, Medical Information, Ontology
Show / Hide Abstract

Sparsification of Digital Images Using Discrete Rajan Transform
Kethepalli Mallikarjuna, Kodati Satya Prasad and M. V. Subramanyam
Page: 754~764, Vol. 12, No.4, 2016
10.3745/JIPS.02.0049
Keywords: Degree of Sparsity, Discrete Rajan Transform, Sparsification
Show / Hide Abstract

Blind Color Image Watermarking Based on DWT and LU Decomposition
Dongyan Wang, Fanfan Yang and Heng Zhang
Page: 765~778, Vol. 12, No.4, 2016
10.3745/JIPS.03.0055
Keywords: Digital Color Image Watermark, Discrete Wavelet Transformation (DWT), LU Decomposition, Normalized Correlation (NC), Structural Similarity (SSIM)
Show / Hide Abstract

Soft Set Theory Oriented Forecast Combination Method for Business Failure Prediction
Wei Xu and Zhi Xiao
Page: 109~128, Vol. 12, No.1, 2016
10.3745/JIPS.04.0016
Keywords: Business Failure Prediction, Combined Forecasting Method, Qualitative Analysis, Quantitative Analysis, Receiver Operating Characteristic Curve, Soft Set Theory
Show / Hide Abstract

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks
Sang-Seon Byun
Page: 73~82, Vol. 12, No.1, 2016
10.3745/JIPS.03.0041
Keywords: Cognitive Radio Networks, Congestion Control, TCP, USRP
Show / Hide Abstract

Personalizing Information Using Users’ Online Social Networks: A Case Study of CiteULike
Danielle Lee
Page: 1~21, Vol. 11, No.1, 2015
10.3745/JIPS.04.0014
Keywords: CiteULike, Homophily, Information Personalization, Online Social Networks, Social Network-based Recommendations
Show / Hide Abstract

GMM-Based Maghreb Dialect IdentificationSystem
Lachachi Nour-Eddine and Adla Abdelkader
Page: 22~38, Vol. 11, No.1, 2015
10.3745/JIPS.02.0015
Keywords: Core-Set, Gaussian Mixture Models (GMM), Kernel Methods, Minimal Enclosing Ball (MEB), Quadratic Programming (QP), Support Vector Machines (SVMs), Universal Background Model (UBM)
Show / Hide Abstract

A Real-Time Integrated Hierarchical Temporal Memory Network for the Real-Time Continuous Multi-Interval Prediction of Data Streams
Hyun-Syug Kang
Page: 39~56, Vol. 11, No.1, 2015
10.3745/JIPS.02.0011
Keywords: Data Streams, Hierarchical Temporal Memory, Multiple Interval Prediction, Real-Time Prediction
Show / Hide Abstract

Selection of the Best Two-Hop AF Wireless Link under Multiple Antenna Schemes over a Fading Channel
Abu Sayed Md. Mostafizur Rahaman, Md. Imdadul Islam and M.R. Amin
Page: 57~75, Vol. 11, No.1, 2015
10.3745/JIPS.03.0023
Keywords: Ergodic Capacity, OFDM, OSTBC, Space Diversity, TAS, Wideband Slope
Show / Hide Abstract

Spatial Interpolation of Meteorologic Variables in Vietnam using the Kriging Method
Xuan Thanh Nguyen, Ba Tung Nguyen, Khac Phong Do, Quang Hung Bui, Thi Nhat Thanh Nguyen, Van Quynh Vuong and Thanh Ha Le
Page: 134~147, Vol. 11, No.1, 2015
10.3745/JIPS.02.0016
Keywords: Interpolation, Meteorologic Variables, Kriging
Show / Hide Abstract

An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks
Govind P. Gupta, Manoj Misra and Kumkum Garg
Page: 148~164, Vol. 11, No.1, 2015
10.3745/JIPS.03.0018
Keywords: Agent Migration Protocol, Data Aggregation, Mobile Agent, WSN
Show / Hide Abstract

Learning to Prevent Inactive Student of Indonesia Open University
Bayu Adhi Tama
Page: 165~172, Vol. 11, No.2, 2015
10.3745/JIPS.04.0015
Keywords: Educational Data Mining, Ensemble Techniques, Inactive Student, Open University
Show / Hide Abstract

Research on the E-Commerce Credit Scoring Model Using the Gaussian Density Function
Xiao Qiang, He Rui-chun and Zhang Wei
Page: 173~183, Vol. 11, No.2, 2015
10.3745/JIPS.04.0012
Keywords: Abnormal Point, Credit Scoring, Density, E-commerce
Show / Hide Abstract

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
Amine Dahane, Nasr-Eddine Berrached and Abdelhamid Loukil
Page: 205~228, Vol. 11, No.2, 2015
10.3745/JIPS.02.0019
Keywords: Clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks
Show / Hide Abstract

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang and Kimoon Jeong
Page: 229~238, Vol. 11, No.2, 2015
10.3745/JIPS.03.0026
Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Show / Hide Abstract

A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation
Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee and Hong-Woo Chun
Page: 248~265, Vol. 11, No.2, 2015
10.3745/JIPS.04.0008
Keywords: Bioinformatics, Event Extraction, Maximum Entropy, Text-Mining
Show / Hide Abstract

Counter Chain: A New Block Cipher Mode of Operation
Aly Mohamed El-Semary and Mohamed Mostafa A. Azim
Page: 266~279, Vol. 11, No.2, 2015
10.3745/JIPS.03.0031
Keywords: Authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
Show / Hide Abstract

Biological Infectious Watermarking Model for Video Copyright Protection
Bong-Joo Jang, Suk-Hwan Lee, SangHun Lim and Ki-Ryong Kwon
Page: 280~294, Vol. 11, No.2, 2015
10.3745/JIPS.02.0013
Keywords: Biological Virus Modeling, Copyright Protection, Infectious Watermarking, Video Watermarking
Show / Hide Abstract

An Adaptive Superframe Duration Allocation Algorithm for Resource-Efficient Beacon Scheduling
Young-Ae Jeon, Sang-Sung Choi, Dae-Young Kim and Kwang-il Hwang
Page: 295~309, Vol. 11, No.2, 2015
10.3745/JIPS.03.0025
Keywords: Beacon Scheduling, Energy Efficient, IEEE802.15.4, IEEE802.15.4e, LR-WPAN, Superframe Duration Allocation
Show / Hide Abstract

A Dataset of Online Handwritten Assamese Characters
Udayan Baruah and Shyamanta M. Hazarika
Page: 325~341, Vol. 11, No.3, 2015
10.3745/JIPS.02.0008
Keywords: Assamese, Character Recognition, Dataset Collection, Data Verification, Online Handwriting, Support Vector Machine
Show / Hide Abstract

Sparse Channel Estimation of Single Carrier Frequency Division Multiple Access Based on Compressive Sensing
Yuan-Hong Zhong, Zhi-Yong Huang, Bin Zhu and Hua Wu
Page: 342~353, Vol. 11, No.3, 2015
10.3745/JIPS.03.0028
Keywords: Compressive Sensing, Random Pilot Pattern, SC-FDMA, Sparse Channel Estimation
Show / Hide Abstract

A Review of Fixed-Complexity Vector Perturbation for MU-MIMO
Manar Mohaisen
Page: 354~369, Vol. 11, No.3, 2015
10.3745/JIPS.03.0035
Keywords: Block Diagonalization, MU-MIMO, Perfect and Imperfect Channel Knowledge, Quantization, Vector Perturbation
Show / Hide Abstract

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Siti Nurmaini and Ahmad Zarkasi
Page: 370~388, Vol. 11, No.3, 2015
10.3745/JIPS.01.0008
Keywords: Localization Process, RAM-Based Neural Network, Swarm Robots
Show / Hide Abstract

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Souad Bekkouch and Kamel Mohamed Faraoun
Page: 406~420, Vol. 11, No.3, 2015
10.3745/JIPS.02.0021
Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform
Show / Hide Abstract

Classification of Textured Images Based on Discrete Wavelet Transform and Information Fusion
Chaimae Anibou, Mohammed Nabil Saidi and Driss Aboutajdine
Page: 421~437, Vol. 11, No.3, 2015
10.3745/JIPS.02.0028
Keywords: Discrete Wavelet Transform, Feature Extraction, Fuzzy Set Theory, Information Fusion, Probability Theory, Segmentation, Supervised Classification
Show / Hide Abstract

A Lightweight and Effective Music Score Recognition on Mobile Phones
Tam Nguyen and Gueesang Lee
Page: 438~449, Vol. 11, No.3, 2015
10.3745/JIPS.02.0023
Keywords: Mobile Camera, Music Score, SVM, Symbol Classification
Show / Hide Abstract

Comparative Study of Various Persian Stemmers in the Field of Information Retrieval
Fatemeh Momenipour Moghadam and MohammadReza Keyvanpour
Page: 450~464, Vol. 11, No.3, 2015
10.3745/JIPS.04.0020
Keywords: Lookup Table Stemmer, Stemmer, Statistical Stemmer, Structural Stemmer
Show / Hide Abstract

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks
Chang Liu, Sang-Hwa Chung, Han-You Jeong and Ik-Joo Jung
Page: 465~482, Vol. 11, No.3, 2015
10.3745/JIPS.03.0027
Keywords: Contention Window, IEEE 802.11p, MAC Layer, Message Priority, Vehicular Network
Show / Hide Abstract

Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments
Maheshi B. Dissanayake and Dilanga L. B. Abeyrathna
Page: 483~494, Vol. 11, No.3, 2015
10.3745/JIPS.03.0036
Keywords: Complexity, Compression Efficiency, HEVC, H.264/AVC, Latency
Show / Hide Abstract

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki and Driss Aboutajdine
Page: 495~508, Vol. 11, No.4, 2015
10.3745/JIPS.02.0032
Keywords: Copyright Protection, Mammograms, Medical Image, Robust Watermarking, Visual Cryptography
Show / Hide Abstract

Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage
Nawel Bendimerad and Bouabdellah Kechar
Page: 509~527, Vol. 11, No.4, 2015
10.3745/JIPS.03.0034
Keywords: Coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks
Show / Hide Abstract

Text Detection in Scene Images Based on Interest Points
Minh Hieu Nguyen and Gueesang Lee
Page: 528~537, Vol. 11, No.4, 2015
10.3745/JIPS.02.0026
Keywords: Connected Component, Interest Point, Tensor Voting, Text Detection
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015
10.3745/JIPS.02.0030
Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization
Seung-Shik Kang
Page: 573~582, Vol. 11, No.4, 2015
10.3745/JIPS.04.0018
Keywords: Consonant Normalization, Edit Distance, Korean Character, Normalization Factor
Show / Hide Abstract

Uniform Fractional Band CAC Scheme for QoS Provisioning in Wireless Networks
Md. Asadur Rahman, Mostafa Zaman Chowdhury and Yeong Min Jang
Page: 583~600, Vol. 11, No.4, 2015
10.3745/JIPS.03.0043
Keywords: Acceptance Factor, Call Admission Control (CAC), Call Blocking Probability (CBP), Call Dropping Probability (CDP), Channel Utilization, Uniform Fractional Band (UFB), Quality of Service (QoS)
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015
10.3745/JIPS.03.0044
Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process
G. A. Preethi and C. Chandrasekar
Page: 616~629, Vol. 11, No.4, 2015
10.3745/JIPS.03.0015
Keywords: Action, Heterogeneous Handoff, MDP, Policy Iteration, State
Show / Hide Abstract

Improved Dynamic Subjective Logic Model with Evidence Driven
Jiao-Hong Qiang, Wang-Xin Xin and Tian-Jun Feng
Page: 630~642, Vol. 11, No.4, 2015
10.3745/JIPS.03.0030
Keywords: Dynamic Weight, Evidence Driven, Subjective Logic
Show / Hide Abstract

Viewpoint Unconstrained Face Recognition Based on Affine Local Descriptors and Probabilistic Similarity
Yongbin Gao and Hyo Jong Lee
Page: 643~654, Vol. 11, No.4, 2015
10.3745/JIPS.02.0027
Keywords: Affine Scale Invariant Feature Transform, Face Recognition, Probabilistic Similarity
Show / Hide Abstract

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia and Farnoush Banaei-Kashani
Page: 1~22, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.001
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety
Show / Hide Abstract

Trivariate B-spline Approximation of Spherical Solid Objects
Junho Kim, Seung-Hyun Yoon and Yunjin Lee
Page: 23~35, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.023
Keywords: Trivariate B-spline Approximation, Volume Mesh Parameterization, Topological Sphere Model, Harmonic Mapping
Show / Hide Abstract

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks
Bharti Sharma, Ravinder Singh Bhatia and Awadhesh Kumar Singh
Page: 36~54, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.036
Keywords: MANET, Inter-Cluster, Intra-Cluster, Mutual Exclusion, Token Ring
Show / Hide Abstract

Stroke Width-Based Contrast Feature for Document Image Binarization
Le Thi Khue Van and Gueesang Lee
Page: 55~68, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.055
Keywords: Degraded Document Image, Binarization, Stroke Width, Contrast Feature, Text Boundary
Show / Hide Abstract

Push-N-Scheme with Timeout for Content Delivery of Social Networking Services
Kyungkoo Jun
Page: 81~92, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.081
Keywords: Push Scheme, Content Delivery, SNS, Wait Time
Show / Hide Abstract

Gesture Input as an Out-of-band Channel
Oyuntungalag Chagnaadorj and Jiro Tanaka
Page: 92~102, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.092
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

Performance Evaluation of the VoIP Services of the Cognitive Radio System, Based on DTMC
Ummy Habiba, Md. Imdadul Islam and M. R. Amin
Page: 119~131, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.119
Keywords: Cognitive Radio, VoIP, DTMC, Cross-layer Analytical Model, M/G/1(m) Traffic, IEEE 802.16e/m
Show / Hide Abstract

How to Manage Cloud Risks Based on the BMIS Model
Youjin Song and Yasheng Pang
Page: 132~144, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.132
Keywords: Cloud Risk, Risk Control, Cloud Computing, BMIS, CSFs
Show / Hide Abstract

Probabilistic Models for Local Patterns Analysis
Khiat Salim, Belbachir Hafida and Rahal Sid Ahmed
Page: 145~161, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.145
Keywords: Global Pattern, Maximum Entropy Method, Non-derivable Itemset, Itemset Inclusion-exclusion Model
Show / Hide Abstract

Non-iterative Bit Loading Algorithm for OFDM in Independent and Correlated fading
John W. Manry and Santosh Nagaraj
Page: 163~175, Vol. 10, No.2, 2014
10.3745/JIPS.03.0001
Keywords: Adaptive Modulation, Orthogonal Frequency Division Multiplexing (OFDM), FadingAdaptive Modulation, Orthogonal Frequency Division Multiplexing (OFDM), Fading
Show / Hide Abstract

Prioritized Multipath Video Forwarding in WSN
Syed Muhammad Asad Zaidi, Jieun Jung and Byunghun Song
Page: 176~192, Vol. 10, No.2, 2014
10.3745/JIPS.03.0002
Keywords: WMSN, H.264, Multiple Paths, Quality of Service
Show / Hide Abstract

Duplication with Task Assignment in Mesh Distributed System
Rashmi Sharma and Nitin
Page: 193~214, Vol. 10, No.2, 2014
10.3745/JIPS.01.0001
Keywords: Distributed System(DS), Task Assignment Heuristics, Task Duplication(TD), Directed Acyclic Graph(DAG)
Show / Hide Abstract

Optical Image Encryption and Decryption Considering Wireless Communication Channels
Myungjin Cho and In-Ho Lee
Page: 215~222, Vol. 10, No.2, 2014
10.3745/JIPS.03.0003
Keywords: Optical Encryption and Decryption, Wireless Communication Channels
Show / Hide Abstract

The Design of the IIR Differintegrator and its Application in Edge Detection
Madhu Jain, Maneesha Gupta and N. K. Jain
Page: 223~239, Vol. 10, No.2, 2014
10.3745/JIPS.02.0001
Keywords: Digital integrator, digital differentiator, edge detection and image processing
Show / Hide Abstract

Leveraged BMIS Model for Cloud Risk Control
YouJin Song and Yasheng Pang
Page: 240~255, Vol. 10, No.2, 2014
10.3745/JIPS.03.0004
Keywords: Cloud risk, CSFs, BMIS, Risk control, Leverage point, Effective model
Show / Hide Abstract

A High Quality Steganographic Method Using Morphing
Anant M.Bagade and Sanjay N.Talbar
Page: 256~270, Vol. 10, No.2, 2014
10.3745/JIPS.03.0005
Keywords: Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality
Show / Hide Abstract

Content Modeling Based on Social Network Community Activity
Kyung-Rog Kim and Nammee Moon
Page: 271~282, Vol. 10, No.2, 2014
10.3745/JIPS.04.0001
Keywords: Social network community activities, content model, learning objects, content granularity, content aggregation level
Show / Hide Abstract

Skin Segmentation Using YUV and RGB Color Spaces
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan and Puteri Suhaiza Sulaiman
Page: 283~299, Vol. 10, No.2, 2014
10.3745/JIPS.02.0002
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space
Show / Hide Abstract

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
Shi-Kyu Bae
Page: 300~313, Vol. 10, No.2, 2014
10.3745/JIPS.03.0006
Keywords: Wireless Sensor Networks, Time Synchronization, Energy Efficiency, Power Consumption, Performance, Analysis
Show / Hide Abstract

Default Prediction for Real Estate Companies with Imbalanced Dataset
Yuan-Xiang Dong , Zhi Xiao and Xue Xiao
Page: 314~333, Vol. 10, No.2, 2014
10.3745/JIPS.04.0002
Keywords: Default prediction, Imbalanced dataset, Real estate listed companies, Minoritysample generation approach
Show / Hide Abstract

Training-Free Fuzzy Logic Based Human Activity Recognition
Eunju Kim and Sumi Helal
Page: 335~354, Vol. 10, No.3, 2014
10.3745/JIPS.04.0005
Keywords: Activity Semantic Knowledge, Fuzzy Logic, Human Activity Recognition, Multi-Layer Neural Network
Show / Hide Abstract

Improving Database System Performance by Applying NoSQL
Yong-Lak Choi, Woo-Seong Jeon and Seok-Hwan Yoon
Page: 355~364, Vol. 10, No.3, 2014
10.3745/JIPS.04.0006
Keywords: Database System Performance, NoSQL, NoSQL Practical Use
Show / Hide Abstract

A Novel Framework for Defining and Submitting Workflows to Service-Oriented Systems
Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Page: 365~383, Vol. 10, No.3, 2014
10.3745/JIPS.02.0003
Keywords: Service Composition, Service-Oriented Computing, Service-Oriented Workflow, UML2BPEL, Workflow
Show / Hide Abstract

Femtocell Subband Selection Method for Managing Cross- and Co-tier Interference in a Femtocell Overlaid Cellular Network
Young Min Kwon, Hyunseung Choo, Tae-Jin Lee, Min Young Chung and Mihui Kim
Page: 384~394, Vol. 10, No.3, 2014
10.3745/JIPS.03.0008
Keywords: Clustering Method, Femtocell, Frequency Partition, Interference Management
Show / Hide Abstract

Imputation of Medical Data Using Subspace Condition Order Degree Polynomials
Klaokanlaya Silachan and Panjai Tantatsanawong
Page: 395~411, Vol. 10, No.3, 2014
10.3745/JIPS.04.0007
Keywords: Imputation, Personal Temporal Data, Polynomial Interpolation
Show / Hide Abstract

Ultra Low Power Data Aggregation for Request Oriented Sensor Networks
Kwang-il Hwang and In Jang
Page: 412~428, Vol. 10, No.3, 2014
10.3745/JIPS.03.0009
Keywords: Data Aggregation, Energy Efficient, Low Power Listening, Medium Access Control, Request Oriented, Sensor Networks
Show / Hide Abstract

Fault Detection in the Semiconductor Etch Process Using the Seasonal Autoregressive Integrated Moving Average Modeling
Muhammad Zeeshan Arshad, Javeria Muhammad Nawaz and Sang Jeen Hong
Page: 429~442, Vol. 10, No.3, 2014
10.3745/JIPS.04.0004
Keywords: Autoregressive Integrated Moving Average, Dynamic Time Warping, Fault Detection, Seasonal Autoregressive Integrated Moving Average, Semiconductor Process, Time Series Modeling
Show / Hide Abstract

Extreme Learning Machine Ensemble Using Bagging for Facial Expression Recognition
Deepak Ghimire and Joonwhoan Lee
Page: 443~458, Vol. 10, No.3, 2014
10.3745/JIPS.02.0004
Keywords: Bagging, Ensemble Learning, Extreme Learning Machine, Facial Expression Recognition, Histogram of Orientation Gradient
Show / Hide Abstract

Spectrum Sensing and Data Transmission in a Cognitive Relay Network Considering Spatial False Alarms
Tasnina A. Tishita, Sumiya Akhter, Md. Imdadul Islam and M. R. Amin
Page: 459~470, Vol. 10, No.3, 2014
10.3745/JIPS.03.0007
Keywords: Cognitive Network, Conventional False Alarms, Probability of Symbol Error Rate, Spatial False Alarms, Spectrum Sensing
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Page: 491~502, Vol. 10, No.4, 2014
10.3745/JIPS.01.0004
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

Graphemes Segmentation for Arabic Online Handwriting Modeling
Houcine Boubaker, Najiba Tagougui, Haikal El Abed, Monji Kherallah and Adel M. Alimi
Page: 503~522, Vol. 10, No.4, 2014
10.3745/JIPS.02.0006
Keywords: Baseline Detection, Diacritic Features, Fourier Descriptors, Geometric Parameters, Grapheme Segmentation, Online Arabic Handwriting Modeling
Show / Hide Abstract

The Accuracy of the Non-continuous I Test for One- Dimensional Arrays with References Created by Induction Variables
Qing Zhang
Page: 523~542, Vol. 10, No.4, 2014
10.3745/JIPS.01.0005
Keywords: Data Dependence Analysis, Loop Parallelization, Loop Vectorization, Parallelizing/Vectorizing Compilers
Show / Hide Abstract

Design and Implementation of a Content Model for m-Learning
Jin Gon Shon and Byoung Wook Kim
Page: 543~554, Vol. 10, No.4, 2014
10.3745/JIPS.04.0010
Keywords: Content Model, M-Learning, Requirement Analysis of M-Learning Environment, Segment Content, Supplement Content
Show / Hide Abstract

Multimodal Biometric Using a Hierarchical Fusion of a Person’s Face, Voice, and Online Signature
Youssef Elmir, Zakaria Elberrichi and Réda Adjoudj
Page: 555~567, Vol. 10, No.4, 2014
10.3745/JIPS.02.0007
Keywords: Hierarchical Fusion, LDA, Multimodal Biometric Fusion, PCA
Show / Hide Abstract

Performance Evaluation of the WiMAX Network under a Complete Partitioned User Group with a Traffic Shaping Algorithm
Jesmin Akhter, Md. Imdadul Islam and M. R. Amin
Page: 568~580, Vol. 10, No.4, 2014
10.3745/JIPS.03.0016
Keywords: Blocking Probability, CAC, Complete Partition Scheme, Subscriber Station, Throughput
Show / Hide Abstract

An Unified Representation of Context Knowledge Base for Mobile Context-Aware System
Jang-Seop Jeong and Dae-Wook Bang
Page: 581~588, Vol. 10, No.4, 2014
10.3745/JIPS.01.0002
Keywords: Context-Awareness, Knowledge Base, Unified Context Information
Show / Hide Abstract

An Efficient Color Edge Detection Using the Mahalanobis Distance
Kittiya Khongkraphan
Page: 589~601, Vol. 10, No.4, 2014
10.3745/JIPS.02.0010
Keywords: Color Image, Edge Detection, Mahalanobis Distance
Show / Hide Abstract

Traffic Analysis of a Cognitive Radio Network Based on the Concept of Medium Access Probability
Risala T. Khan, Md. Imdadul Islam and M. R. Amin
Page: 602~617, Vol. 10, No.4, 2014
10.3745/JIPS.03.0019
Keywords: Blocking Probability, Fading Channel, Path Loss Model, State Transition Chain, Throughput
Show / Hide Abstract

A Fuzzy Impulse Noise Filter Based on Boundary Discriminative Noise Detection
Om Prakash Verma and Shweta Singh
Page: 89~102, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.089
Keywords: Impulse Noise, Decision Boundaries, Color Components, Fuzzy Filter, Membership Function
Show / Hide Abstract

A TRUS Prostate Segmentation using Gabor Texture Features and Snake-like Contour
Sung Gyun Kim and Yeong Geon Seo
Page: 103~116, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.103
Keywords: Gabor Filter Bank, Support Vector Machines, Prostate Segmentation
Show / Hide Abstract

Optical Character Recognition for Hindi Language Using a Neural-network Approach
Divakar Yadav, Sonia Sánchez-Cuadrado and Jorge Morato
Page: 117~140, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.117
Keywords: OCR, Pre-processing, Segmentation, Feature Vector, Classification, Artificial Neural Network (ANN)
Show / Hide Abstract

A Robust Face Detection Method Based on Skin Color and Edges
Deepak Ghimire and Joonwhoan Lee
Page: 141~156, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.141
Keywords: Face Detection, Image Enhancement, Skin Tone Percentage Index, Canny Edge, Facial Features
Show / Hide Abstract

Region-Based Facial Expression Recognition in Still Images
Gawed M. Nagi, Rahmita Rahmat, Fatimah Khalid and Muhamad Taufik
Page: 173~188, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.173
Keywords: Facial Expression Recognition (FER), Facial Features Detection, Facial Features Extraction, Cascade Classifier, LBP, One-Vs-Rest SVM
Show / Hide Abstract

The Confinement Problem: 40 Years Later
Alex Crowell, Beng Heng Ng, Earlence Fernandes and Atul Prakash
Page: 189~204, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.189
Keywords: Confinement Problem, Covert Channels, Virtualization, Isolation, Taint Tracking
Show / Hide Abstract

An Analysis of Replication Enhancement for a High Availability Cluster
Sehoon Park, Im Y. Jung, Heonsang Eom and Heon Y. Yeom
Page: 205~216, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.205
Keywords: High-Availability Cluster, Replication Enhancement, SRM, DRBD
Show / Hide Abstract

An Improved Approach to Ranking Web Documents
Pooja Gupta, Sandeep K. Singh, Divakar Yadav and A. K. Sharma
Page: 217~236, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.217
Keywords: Ranking, Ordering, WWW, Information Retrieval, Contextual Relevance, Contextual Sense, Web Documents
Show / Hide Abstract

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance
Hoo-Rock Lee, Kyung-Yul Chung and Kyoung-Son Jhang
Page: 237~246, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.237
Keywords: Maintenance Hatch, Underground Facilities, WSN, Routing Protocol, ns-2
Show / Hide Abstract

An Integrated Neural Network Model for Domain Action Determination in Goal-Oriented Dialogues
Hyunjung Lee, Harksoo Kim and Jungyun Seo
Page: 259~270, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.259
Keywords: Domain Action, Speech Act, Concept Sequence, Neural Network
Show / Hide Abstract

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Om Prakash Verma, Munazza Nizam and Musheer Ahmad
Page: 271~286, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.271
Keywords: Chaotic Systems, Number of Pixel Change Rate, Unified Average Changed Intensity, Correlation Coefficient, Entropy
Show / Hide Abstract

Adap