Search Word(s) in Title, Keywords, Authors, and Abstract: ATE

An Intuitionistic Fuzzy Approach to Classify the User Based on an Assessment of the Learner’s Knowledge Level in E-Learning Decision-Making
Mukta Goyal, Divakar Yadav and Alka Tripathi
Page: 57~67, Vol. 13, No.1, 2017
10.3745/JIPS.04.0011

Keywords: Domain Model, E-Learning, E-Learning Environment, Fuzzy Rules, Intuitionistic Fuzzy Set, User Modeling
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017
10.3745/JIPS.04.0013

Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017
10.3745/JIPS.03.0024

Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script
Rajiv Kumar, Kiran Kumar Ravulakollu and Rajesh Bhat
Page: 893~913, Vol. 13, No.4, 2017
10.3745/JIPS.02.0018

Keywords: CPAR-2012, Devnagari, Fuzzy Membership, Handwritten Script, Writer Identification
Show / Hide Abstract

Fingerprint Matching Based on Dimension Reduced DCT Feature Vectors
Sangita Bharkad and Manesh Kokare
Page: 852~862, Vol. 13, No.4, 2017
10.3745/JIPS.02.0017

Keywords: Biometric, Discrete Cosine Transform, Fingerprint Identification, Similarity Measure
Show / Hide Abstract

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
10.3745/JIPS.03.0029

Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016
Jong Hyuk Park
Page: 1~7, Vol. 13, No.1, 2017
10.3745/JIPS.00.0003

Keywords:
Show / Hide Abstract

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Page: 8~25, Vol. 13, No.1, 2017
10.3745/JIPS.02.0051

Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

Adaptive Medical Image Compression Based on Lossy and Lossless Embedded Zerotree Methods
Sid Ahmed Elhannachi, Nacéra Benamrane and Taleb-Ahmed Abdelmalik
Page: 40~56, Vol. 13, No.1, 2017
10.3745/JIPS.02.0052

Keywords: LEZW, Medical Images, ROI, RDCT, SPIHT
Show / Hide Abstract

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017
10.3745/JIPS.03.0059

Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

Joint Estimation of Near-Field Source Parameters and Array Response
Han Cui and Wenjuan Peng
Page: 83~94, Vol. 13, No.1, 2017
10.3745/JIPS.03.0060

Keywords: Array Calibration, Gain/Phase Response, Near-Field Source Localization
Show / Hide Abstract

A Joint Channel Estimation and Data Detection for a MIMO Wireless Communication System via Sphere Decoding
Gajanan R. Patil and Vishwanath K. Kokate
Page: 1029~1042, Vol. 13, No.4, 2017
10.3745/JIPS.03.0033

Keywords: Maximum Likelihood Decoding, Multiple Input Multiple Output, Normalized Mean Square Error, Training Based Channel Estimation, Semi-Blind Channel Estimation, Spatial Multiplexing, Sphere Decoding
Show / Hide Abstract

Feasibility and Performance Analysis of RDMA Transfer through PCI Express
Min Choi and Jong Hyuk Park
Page: 95~103, Vol. 13, No.1, 2017
10.3745/JIPS.01.0013

Keywords: Interconnection Network, Non-transparent Bridge, PCI Express, RDMA
Show / Hide Abstract

Combination of Classifiers Decisions for Multilingual Speaker Identification
B. G. Nagaraja and H. S. Jayanna
Page: 928~940, Vol. 13, No.4, 2017
10.3745/JIPS.02.0025

Keywords: Classifier Combination, Cross-lingual, Monolingual, Multilingual, Speaker Identification
Show / Hide Abstract

Color Image Coding Based on Shape-Adaptive All Phase Biorthogonal Transform
Xiaoyan Wang, Chengyou Wang, Xiao Zhou and Zhiqiang Yang
Page: 114~127, Vol. 13, No.1, 2017
10.3745/JIPS.02.0053

Keywords: Color Image Coding, Shape-Adaptive All Phase Biorthogonal Transform (SA-APBT), Color Space Conversion, Chain Code
Show / Hide Abstract

Self-Identification of Boundary’s Nodes in Wireless Sensor Networks
Kouider Elouahed Moustafa and Haffaf Hafid
Page: 128~140, Vol. 13, No.1, 2017
10.3745/JIPS.03.0062

Keywords: Boundary Recognition, Military Applications, Military Surveillance, Wireless Sensor Network
Show / Hide Abstract

Wireless Channel Identification Algorithm Based on Feature Extraction and BP Neural Network
Dengao Li*, Gang Wu, Jumin Zhao, Wenhui Niu and Qi Liu
Page: 141~151, Vol. 13, No.1, 2017
10.3745/JIPS.03.0063

Keywords: BP Neural Network, Channel Identification, Feature Extraction, Wireless Communication
Show / Hide Abstract

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017
10.3745/JIPS.03.0064

Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City
Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Page: 184~195, Vol. 13, No.1, 2017
10.3745/JIPS.03.0065

Keywords: Blockchain, Internet of Things, Security, Vehicular Network
Show / Hide Abstract

Advances in Algorithm, Multimedia, and Network for Future IT
Jong Hyuk Park
Page: 197~203, Vol. 13, No.2, 2017
10.3745/JIPS.00.0004

Keywords:
Show / Hide Abstract

A Hybrid Bacterial Foraging Optimization Algorithm and a Radial Basic Function Network for Image Classification
Yasmina Teldja Amghar and Hadria Fizazi
Page: 215~235, Vol. 13, No.2, 2017
10.3745/JIPS.01.0014

Keywords: Bacterial Foraging Optimization Algorithm, Hybrid, Image Classification, Radial Basic Function
Show / Hide Abstract

Mobility Scenarios into Future Wireless Access Network
Syed Mushhad Mustuzhar Gilani, Tang Hong, Qiqi Cai and Guofeng Zhao
Page: 236~255, Vol. 13, No.2, 2017
10.3745/JIPS.03.0069

Keywords: Access Point (AP), Internet Architecture, Network Function Virtualization (NFV), Seamless Handover, Software-Defined Network (SDN)
Show / Hide Abstract

An Improved Stereo Matching Algorithm with Robustness to Noise Based on Adaptive Support Weight
Ingyu Lee and Byungin Moon
Page: 256~267, Vol. 13, No.2, 2017
10.3745/JIPS.02.0057

Keywords: Adaptive Census Transform, Adaptive Support Weight, Local Matching, Multiple Sparse Windows, Stereo Matching
Show / Hide Abstract

DTG Big Data Analysis for Fuel Consumption Estimation
Wonhee Cho and Eunmi Choi
Page: 285~304, Vol. 13, No.2, 2017
10.3745/JIPS.04.0031

Keywords: Big Data Analysis, DTG, Eco-Driving, Fuel Economy, Fuel Consumption Estimation, MapReduce
Show / Hide Abstract

Self-adaptive and Bidirectional Dynamic Subset Selection Algorithm for Digital Image Correlation
Wenzhuo Zhang, Rong Zhou and Yuanwen Zou
Page: 305~320, Vol. 13, No.2, 2017
10.3745/JIPS.02.0056

Keywords: Digital Image Correlation, Dynamic Subset Size, Image Processing, Information Amount, Self-adaptive
Show / Hide Abstract

A Multi-Objective TRIBES/OC-SVM Approach for the Extraction of Areas of Interest from Satellite Images
Wafaa Benhabib and Hadria Fizazi
Page: 321~339, Vol. 13, No.2, 2017
10.3745/JIPS.02.0054

Keywords: Image Classification, MO-TRIBES, OC-SVM, Remote Sensing
Show / Hide Abstract

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System
Salima Lalani and D. D. Doye
Page: 340~347, Vol. 13, No.2, 2017
10.3745/JIPS.03.0067

Keywords: DWT, Fuzzy, SVD, Watermarking
Show / Hide Abstract

Block Sparse Signals Recovery via Block BacktrackingBased Matching Pursuit Method
Rui Qi, Yujie Zhang and Hongwei Li
Page: 360~369, Vol. 13, No.2, 2017
10.3745/JIPS.04.0030

Keywords: Block Sparse Signal, Compressed Sensing, Sparse Signal Reconstruction
Show / Hide Abstract

Unsupervised Segmentation of Images Based on Shuffled Frog-Leaping Algorithm
Amel Tehami* and Hadria Fizazi
Page: 370~384, Vol. 13, No.2, 2017
10.3745/JIPS.02.0055

Keywords: Image, K-means, Meta-Heuristic, Optimization, SFLA, Unsupervised Segmentation
Show / Hide Abstract

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 385~399, Vol. 13, No.2, 2017
10.3745/JIPS.03.0070

Keywords: Fragile Watermarking, Local Binary Pattern (LBP), Least Significant Bit (LSB), Tamper Detection and Localization
Show / Hide Abstract

Boosting the Reasoning-Based Approach by Applying Structural Metrics for Ontology Alignment
Abderrahmane Khiat and Moussa Benaissa
Page: 834~851, Vol. 13, No.4, 2017
10.3745/JIPS.02.0034

Keywords: Description Logics Inference, Intra-Taxonomy Measures, Ontology Alignment, Semantic Interoperability, Semantic Web, Structural Similarity
Show / Hide Abstract

Rough Set-Based Approach for Automatic Emotion Classification of Music
Babu Kaji Baniya and Joonwhoan Lee
Page: 400~416, Vol. 13, No.2, 2017
10.3745/JIPS.04.0032

Keywords: Attributes, Covariance, Discretize, Rough Set, Rules
Show / Hide Abstract

A Power Allocation Algorithm Based on Variational Inequality Problem for Cognitive Radio Networks
Ming-Yue Zhou and Xiao-Hui Zhao
Page: 417~427, Vol. 13, No.2, 2017
10.3745/JIPS.03.0068

Keywords: Cognitive Radio, Power Allocation, Variational Inequality
Show / Hide Abstract

New Approaches to Advanced Network and Image Processing
Jong Hyuk Park
Page: 429~434, Vol. 13, No.3, 2017
10.3745/JIPS.00.0005

Keywords:
Show / Hide Abstract

Granular Bidirectional and Multidirectional Associative Memories: Towards a Collaborative Buildup of Granular Mappings
Witold Pedrycz
Page: 435~447, Vol. 13, No.3, 2017
10.3745/JIPS.02.0058

Keywords: Allocation of Information Granularity and Optimization, Bidirectional Associative Memory, Collaborative Clustering, Granular Computing, Multi-directional Associative Memory, Prototypes
Show / Hide Abstract

Blind Image Quality Assessment on Gaussian Blur Images
Liping Wang, Chengyou Wang and Xiao Zhou
Page: 448~463, Vol. 13, No.3, 2017
10.3745/JIPS.02.0059

Keywords: Blind Image Quality Assessment (BIQA), Gaussian Blur Image, Saliency Map, Structure Tensor, Structural Similarity (SSIM)
Show / Hide Abstract

NDynamic Framework for Secure VM Migration over Cloud Computing
Suresh B. Rathod and V. Krishna Reddy
Page: 476~490, Vol. 13, No.3, 2017
10.3745/JIPS.01.0015

Keywords: Cloud Computing, Datacenter (DC), Host Controller, Physical Host, Virtual Machine (VM)
Show / Hide Abstract

A Fast Ground Segmentation Method for 3D Point Cloud
Phuong Chu, Seoungjae Cho, Sungdae Sim, Kiho Kwak and Kyungeun Cho
Page: 491~499, Vol. 13, No.3, 2017
10.3745/JIPS.02.0061

Keywords: 3D Point Cloud, Ground Segmentation, Light Detection and Ranging, Start-Ground Point, Threshold Point
Show / Hide Abstract

An Improved Zone-Based Routing Protocol for Heterogeneous Wireless Sensor Networks
Liquan Zhao and Nan Chen
Page: 500~517, Vol. 13, No.3, 2017
10.3745/JIPS.03.0072

Keywords: Energy Consumption, Heterogeneous Wireless Sensor Networks, Stable Election Protocol, Zone-Based
Show / Hide Abstract

Improvement of OPW-TR Algorithm for Compressing GPS Trajectory Data
Qingbin Meng, Xiaoqiang Yu, Chunlong Yao, Xu Li, Peng Li and Xin Zhao
Page: 533~545, Vol. 13, No.3, 2017
10.3745/JIPS.03.0073

Keywords: ASED, GPS Trajectory, SED, Trajectory Compression
Show / Hide Abstract

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution
Manmeet Mahinderjit Singh, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin and Nurul Hashimah Ahamed Hassain Malim
Page: 559~572, Vol. 13, No.3, 2017
10.3745/JIPS.04.0033

Keywords: Cyberbullying, Digital Etiquette, Intrusion Detection System, Mobile Application, Social Network
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017
10.3745/JIPS.04.0034

Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

Fire Detection Using Multi-Channel Information and Gray Level Co-occurrence Matrix Image Features
Jae-Hyun Jun, Min-Jun Kim, Yong-Suk Jang and Sung-Ho Kim
Page: 590~598, Vol. 13, No.3, 2017
10.3745/JIPS.02.0062

Keywords: Color Features, Fire Detection, Texture Features
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017
10.3745/JIPS.03.0074

Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

Achievable Rate Analysis for Opportunistic Non-orthogonal Multiple Access-Based Cooperative Relaying Systems
In-Ho Lee and Howon Lee
Page: 630~642, Vol. 13, No.3, 2017
10.3745/JIPS.03.0076

Keywords: Achievable Rate Analysis, Decode-and-Forward Relaying, Non-orthogonal Multiple Access, Opportunistic Transmission, Rayleigh Fading Channels, Superposition Coding
Show / Hide Abstract

Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning
Jong Hyuk Park
Page: 643~652, Vol. 13, No.4, 2017
10.3745/JIPS.00.0006

Keywords:
Show / Hide Abstract

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries
Carlos Porcel, Alberto Ching-López, Juan Bernabé-Moreno, Alvaro Tejeda-Lorente and Enrique Herrera-Viedma
Page: 653~667, Vol. 13, No.4, 2017
10.3745/JIPS.04.0035

Keywords: Digital Libraries, Dissemination of Information, Fuzzy Linguistic Modeling, Recommender Systems
Show / Hide Abstract

Hadoop Based Wavelet Histogram for Big Data in Cloud
Jeong-Joon Kim
Page: 668~676, Vol. 13, No.4, 2017
10.3745/JIPS.04.0036

Keywords: Big Data, Histogram, MapReduce, Wavelet
Show / Hide Abstract

Time-Delay and Amplitude Modified BP Imaging Algorithm of Multiple Targets for UWB Through-the-Wall Radar Imaging
Huamei Zhang, Dongdong Li, Jinlong Zhao and Haitao Wang
Page: 677~688, Vol. 13, No.4, 2017
10.3745/JIPS.02.0064

Keywords:
Show / Hide Abstract

Using Semantic Knowledge in the Uyghur-Chinese Person Name Transliteration
Alim Murat, Turghun Osman, Yating Yang, Xi Zhou, Lei Wang and Xiao Li
Page: 716~730, Vol. 13, No.4, 2017
10.3745/JIPS.02.0065

Keywords: Gender, Language Origin, Semantic Knowledge-based Model, Transliteration of Person Name
Show / Hide Abstract

An Innovative Approach of Bangla Text Summarization by Introducing Pronoun Replacement and Improved Sentence Ranking
Md. Majharul Haque, Suraiya Pervin and Zerina Begum
Page: 752~777, Vol. 13, No.4, 2017
10.3745/JIPS.04.0038

Keywords: Bangla News Document, Cosine Similarity, Dangling Pronoun, Pronoun Replacement, Sentence Frequency
Show / Hide Abstract

A Method of Chinese and Thai Cross-Lingual Query Expansion Based on Comparable Corpus
Peili Tang, Jing Zhao, Zhengtao Yu, Zhuo Wang and Yantuan Xian
Page: 805~817, Vol. 13, No.4, 2017
10.3745/JIPS.04.0039

Keywords: Comparable Corpus, Cross-Language Query Expansion, Cross-Language Information Retrieval, Words Relationship
Show / Hide Abstract

Real-Time Motion Blur Using Triangular Motion Paths
MinhPhuoc Hong and Kyoungsu Oh
Page: 818~833, Vol. 13, No.4, 2017
10.3745/JIPS.02.0066

Keywords: Motion Blur, Real-Time Rendering, Visibility
Show / Hide Abstract

A Text Similarity Measurement Method Based on Singular Value Decomposition and Semantic Relevance
Xu Li, Chunlong Yao, Fenglong Fan and Xiaoqiang Yu
Page: 863~875, Vol. 13, No.4, 2017
10.3745/JIPS.02.0067

Keywords: Natural Language Processing, Semantic Relevance, Singular Value Decomposition, Text Representation, Text Similarity Measurement
Show / Hide Abstract

Weighted Local Naive Bayes Link Prediction
JieHua Wu, GuoJi Zhang, YaZhou Ren, XiaYan Zhang and Qiao Yang
Page: 914~927, Vol. 13, No.4, 2017
10.3745/JIPS.04.0040

Keywords: Complex Network, Link Prediction, Naive Bayes Model, Weighted Network
Show / Hide Abstract

CPU Scheduling with a Round Robin Algorithm Based on an Effective Time Slice
Mohammad M. Tajwar, Md. Nuruddin Pathan, Latifa Hussaini and Adamu Abubakar
Page: 941~950, Vol. 13, No.4, 2017
10.3745/JIPS.01.0018

Keywords: Average Turnaround Time, Average Waiting Time, CPU Processing Time, Round Robin Algorithm, Quantum Time
Show / Hide Abstract

Traffic Information Service Model Considering Personal Driving Trajectories
Homin Han and Soyoung Park
Page: 951~969, Vol. 13, No.4, 2017
10.3745/JIPS.03.0078

Keywords: GPS-to-Road Mapping Strategy, Personal Trajectory, Traffic Information System, Trajectory Estimation
Show / Hide Abstract

Identifying Influential People Based on Interaction Strength
Muhammad Azam Zia, Zhongbao Zhang, Liutong Chen, Haseeb Ahmad and Sen Su
Page: 987~999, Vol. 13, No.4, 2017
10.3745/JIPS.04.0041

Keywords: Influence, Interaction, IPRank, Micro-Blog, Online Social Network
Show / Hide Abstract

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs
Shailendra Rathore, Pradip Kumar Sharma and Jong Hyuk Park
Page: 1014~1028, Vol. 13, No.4, 2017
10.3745/JIPS.03.0079

Keywords: Cross-Site Scripting Attack Detection, Dataset, JavaScript, Machine Learning Classifier, Social Networking Services
Show / Hide Abstract

A Comprehensive Review of Emerging Computational Methods for Gene Identification
Ning Yu, Zeng Yu, Bing Li, Feng Gu and Yi Pan
Page: 1~34, Vol. 12, No.1, 2016
10.3745/JIPS.04.0023

Keywords: Cloud Computing, Comparative Methods, Deep Learning, Fourier Transform, Gene Identification, Gene Prediction, Hidden Markov Model, Machine Learning, Protein-Coding Region, Support Vector Machine
Show / Hide Abstract

Number Plate Detection with a Multi-Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices
Christian Gerber and Mokdong Chung
Page: 100~108, Vol. 12, No.1, 2016
10.3745/JIPS.04.0022

Keywords: Convolutional Neural Network, Number Plate Detection, OCR
Show / Hide Abstract

Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model
Moulkheir Naoui, Saïd Mahmoudi and Ghalem Belalem
Page: 149~168, Vol. 12, No.1, 2016
10.3745/JIPS.02.0039

Keywords: Active Appearance Model, Data Parallelism, Deformable Model, Distributed Image Processing, Parallel Image Processing, Segmentation
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016
10.3745/JIPS.03.0047

Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching
Kenan Mu, Fei Hui and Xiangmo Zhao
Page: 183~195, Vol. 12, No.2, 2016
10.3745/JIPS.02.0040

Keywords: Computer Vision, Highway Traffic Surveillance, SIFT Feature Matching, Vehicle Detection, Vehicle Tracking
Show / Hide Abstract

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 196~213, Vol. 12, No.2, 2016
10.3745/JIPS.03.0037

Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE
Show / Hide Abstract

An Improved Algorithm for Redundancy Detection Using Global Value Numbering
Nabizath Saleena and Vineeth Paleri
Page: 214~225, Vol. 12, No.2, 2016
10.3745/JIPS.02.0014

Keywords: Equivalent Expression, Global Value Numbering, Herbrand Equivalence, Strong Equivalence Dag
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
10.3745/JIPS.03.0049

Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance
Kuldeep Gurjar and Yang-Sae Moon
Page: 234~248, Vol. 12, No.2, 2016
10.3745/JIPS.04.0024

Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score
Show / Hide Abstract

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Samaneh Mashhadi
Page: 249~262, Vol. 12, No.2, 2016
10.3745/JIPS.03.0050

Keywords: Non-repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016
10.3745/JIPS.04.0025

Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016
10.3745/JIPS.03.0032

Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks
Muhammad Sajjad Khan and Insoo Koo
Page: 295~309, Vol. 12, No.2, 2016
10.3745/JIPS.03.0040

Keywords: Cognitive Radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016
10.3745/JIPS.03.0021

Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping
Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa and Hasan Al-Shalabi
Page: 322~331, Vol. 12, No.2, 2016
10.3745/JIPS.03.0051

Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Page: 338~357, Vol. 12, No.3, 2016
10.3745/JIPS.01.0010

Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic
Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef and Lamia Belguith Hadrich
Page: 358~380, Vol. 12, No.3, 2016
10.3745/JIPS.02.0041

Keywords: Alkhalil Morphological Analyzer, Approach to Multi-Criteria Decision (MCA), Arabic Language Processing (ALP), Augmented Transition Networks (ATNs), Contextual Exploration, Tagging, Diacritization, Disambiguation Method, Segmentation
Show / Hide Abstract

Two-Dimensional Joint Bayesian Method for Face Verification
Sunghyu Han, Il-Yong Lee and Jung-Ho Ahn
Page: 381~391, Vol. 12, No.3, 2016
10.3745/JIPS.02.0036

Keywords: Face Verification, Joint Bayesian Method, LBP, LFW Database, Two-Dimensional Joint Bayesian Method
Show / Hide Abstract

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis
Leila Boussaad, Mohamed Benmohammed and Redha Benzid
Page: 392~409, Vol. 12, No.3, 2016
10.3745/JIPS.02.0043

Keywords: Active Appearance Model, Age-Invariant, Face Recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform
Show / Hide Abstract

Landmark-Guided Segmental Speech Decoding for Continuous Mandarin Speech Recognition
Hao Chao and Cheng Song
Page: 410~421, Vol. 12, No.3, 2016
10.3745/JIPS.03.0052

Keywords: Decoding, Landmark, Mandarin, Speech Recognition, Segment Model
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
10.3745/JIPS.03.0045

Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
10.3745/JIPS.03.0048

Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification
Chouchane Ammar*, Belahcene Mebarka, Ouamane Abdelmalik and Bourennane Salah
Page: 468~488, Vol. 12, No.3, 2016
10.3745/JIPS.02.0037

Keywords: 3D Face Verification, Depth Image, Dimensionality Reduction, Histograms Local Features, Local Descriptors, Support Vector Machine
Show / Hide Abstract

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet
Jeong Kyu Lee, Seo Yeon Moon and Jong Hyuk Park
Page: 489~501, Vol. 12, No.3, 2016
10.3745/JIPS.01.0009

Keywords: Future Internet, Human Behavior, Intrusion Prevention, Malware Detection
Show / Hide Abstract

A Multiple Features Video Copy Detection Algorithm Based on a SURF Descriptor
Yanyan Hou, Xiuzhen Wang and Sanrong Liu
Page: 502~510, Vol. 12, No.3, 2016
10.3745/JIPS.02.0042

Keywords: Local Invariant Feature, Speeded-Up Robust Features, Video Copy Detection
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016
10.3745/JIPS.03.0039

Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016
10.3745/JIPS.03.0054

Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

A Security Protection Framework for Cloud Computing
Wenzheng Zhu and Changhoon Lee
Page: 538~547, Vol. 12, No.3, 2016
10.3745/JIPS.03.0053

Keywords: Cloud Computing, Collusive Worker, Malicious Worker, MapReduce, Non-collusive Worker
Show / Hide Abstract

[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors
Jong Hyuk Park
Page: 549~554, Vol. 12, No.4, 2016
10.3745/JIPS.00.0002

Keywords:
Show / Hide Abstract

A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform
Ibtissem Bekkouche and Hadria Fizazi
Page: 555~576, Vol. 12, No.4, 2016
10.3745/JIPS.02.0047

Keywords: Fourier Transform, Fuzzy Clustering, Harmony Search, Processing Image, Remote Sensing
Show / Hide Abstract

Community Model for Smart TV over the Top Services
Suman Pandey, Young Joon Won, Mi-Jung Choi and Joon-Min Gil
Page: 577~590, Vol. 12, No.4, 2016
10.3745/JIPS.03.0057

Keywords: Community Formation, Datamining, HbbTV, Smart TV
Show / Hide Abstract

Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images
Arif Muntasa
Page: 591~611, Vol. 12, No.4, 2016
10.3745/JIPS.01.0011

Keywords: Eigenspaces, Feature Extraction, Homogeneous, Non-homogeneous
Show / Hide Abstract

Interactive Authoring Tool for Mobile Augmented Reality Content
Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim and Yoo-Joo Cho
Page: 612~630, Vol. 12, No.4, 2016
10.3745/JIPS.02.0048

Keywords: Augmented Reality, Authoring Tool, Interactive Mobile, Mobile App
Show / Hide Abstract

Image Deblocking Scheme for JPEG Compressed Images Using an Adaptive-Weighted Bilateral Filter
Liping Wang, Chengyou Wang, Wei Huang and Xiao Zhou
Page: 631~643, Vol. 12, No.4, 2016
10.3745/JIPS.02.0046

Keywords: Image Deblocking, Adaptive-Weighted Bilateral Filter, Blind Image Quality Assessment (BIQA), Local Entropy
Show / Hide Abstract

A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features
Mohamed Belaoued and Smaine Mazouzi
Page: 644~660, Vol. 12, No.4, 2016
10.3745/JIPS.03.0058

Keywords: Chi-Square Test, Malware Analysis, PE-Optional Header, Real-Time Detection Windows API
Show / Hide Abstract

Segmentation and Recognition of Korean Vehicle License Plate Characters Based on the Global Threshold Method and the Cross-Correlation Matching Algorithm
Md. Mostafa Kamal Sarker and Moon Kyou Song
Page: 661~680, Vol. 12, No.4, 2016
10.3745/JIPS.02.0050

Keywords: Cross-Correlation, Global Threshold, License Plate Recognition, Radon Transformation, Traffic Surveillance
Show / Hide Abstract

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique
Salima Lalani and D. D. Doye
Page: 681~687, Vol. 12, No.4, 2016
10.3745/JIPS.02.0045

Keywords: DWT, Image Watermarking, Torus
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016
10.3745/JIPS.03.0056

Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

Treatment Planning in Smart Medical: A Sustainable Strategy
Fei Hao, Doo-Soon Park, Sang Yeon Woo, Se Dong Min and Sewon Park
Page: 711~723, Vol. 12, No.4, 2016
10.3745/JIPS.04.0026

Keywords: Degree of Membership, Fuzzy Evaluation, Smart Medical, Sustainable, Treatment Plan
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016
10.3745/JIPS.01.0012

Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

A Robust Fingerprint Matching System Using Orientation Features
Ravinder Kumar, Pravin Chandra and Madasu Hanmandlu
Page: 83~99, Vol. 12, No.1, 2016
10.3745/JIPS.02.0020

Keywords: Circular ROI, Core Point Detection, Image-Based Fingerprint Matching, Orientation Features
Show / Hide Abstract

Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke
Meeyeon Lee, Ye-Seul Park and Jung-Won Lee
Page: 741~753, Vol. 12, No.4, 2016
10.3745/JIPS.04.0027

Keywords: Acute Myocardial Infarction, Data Model, Hospital Information System, Ischemic Stroke, Medical Image, Medical Information, Ontology
Show / Hide Abstract

Sparsification of Digital Images Using Discrete Rajan Transform
Kethepalli Mallikarjuna, Kodati Satya Prasad and M. V. Subramanyam
Page: 754~764, Vol. 12, No.4, 2016
10.3745/JIPS.02.0049

Keywords: Degree of Sparsity, Discrete Rajan Transform, Sparsification
Show / Hide Abstract

Blind Color Image Watermarking Based on DWT and LU Decomposition
Dongyan Wang, Fanfan Yang and Heng Zhang
Page: 765~778, Vol. 12, No.4, 2016
10.3745/JIPS.03.0055

Keywords: Digital Color Image Watermark, Discrete Wavelet Transformation (DWT), LU Decomposition, Normalized Correlation (NC), Structural Similarity (SSIM)
Show / Hide Abstract

Soft Set Theory Oriented Forecast Combination Method for Business Failure Prediction
Wei Xu and Zhi Xiao
Page: 109~128, Vol. 12, No.1, 2016
10.3745/JIPS.04.0016

Keywords: Business Failure Prediction, Combined Forecasting Method, Qualitative Analysis, Quantitative Analysis, Receiver Operating Characteristic Curve, Soft Set Theory
Show / Hide Abstract

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks
Sang-Seon Byun
Page: 73~82, Vol. 12, No.1, 2016
10.3745/JIPS.03.0041

Keywords: Cognitive Radio Networks, Congestion Control, TCP, USRP
Show / Hide Abstract

Personalizing Information Using Users’ Online Social Networks: A Case Study of CiteULike
Danielle Lee
Page: 1~21, Vol. 11, No.1, 2015
10.3745/JIPS.04.0014

Keywords: CiteULike, Homophily, Information Personalization, Online Social Networks, Social Network-based Recommendations
Show / Hide Abstract

GMM-Based Maghreb Dialect IdentificationSystem
Lachachi Nour-Eddine and Adla Abdelkader
Page: 22~38, Vol. 11, No.1, 2015
10.3745/JIPS.02.0015

Keywords: Core-Set, Gaussian Mixture Models (GMM), Kernel Methods, Minimal Enclosing Ball (MEB), Quadratic Programming (QP), Support Vector Machines (SVMs), Universal Background Model (UBM)
Show / Hide Abstract

A Real-Time Integrated Hierarchical Temporal Memory Network for the Real-Time Continuous Multi-Interval Prediction of Data Streams
Hyun-Syug Kang
Page: 39~56, Vol. 11, No.1, 2015
10.3745/JIPS.02.0011

Keywords: Data Streams, Hierarchical Temporal Memory, Multiple Interval Prediction, Real-Time Prediction
Show / Hide Abstract

Selection of the Best Two-Hop AF Wireless Link under Multiple Antenna Schemes over a Fading Channel
Abu Sayed Md. Mostafizur Rahaman, Md. Imdadul Islam and M.R. Amin
Page: 57~75, Vol. 11, No.1, 2015
10.3745/JIPS.03.0023

Keywords: Ergodic Capacity, OFDM, OSTBC, Space Diversity, TAS, Wideband Slope
Show / Hide Abstract

Spatial Interpolation of Meteorologic Variables in Vietnam using the Kriging Method
Xuan Thanh Nguyen, Ba Tung Nguyen, Khac Phong Do, Quang Hung Bui, Thi Nhat Thanh Nguyen, Van Quynh Vuong and Thanh Ha Le
Page: 134~147, Vol. 11, No.1, 2015
10.3745/JIPS.02.0016

Keywords: Interpolation, Meteorologic Variables, Kriging
Show / Hide Abstract

An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks
Govind P. Gupta, Manoj Misra and Kumkum Garg
Page: 148~164, Vol. 11, No.1, 2015
10.3745/JIPS.03.0018

Keywords: Agent Migration Protocol, Data Aggregation, Mobile Agent, WSN
Show / Hide Abstract

Learning to Prevent Inactive Student of Indonesia Open University
Bayu Adhi Tama
Page: 165~172, Vol. 11, No.2, 2015
10.3745/JIPS.04.0015

Keywords: Educational Data Mining, Ensemble Techniques, Inactive Student, Open University
Show / Hide Abstract

Research on the E-Commerce Credit Scoring Model Using the Gaussian Density Function
Xiao Qiang, He Rui-chun and Zhang Wei
Page: 173~183, Vol. 11, No.2, 2015
10.3745/JIPS.04.0012

Keywords: Abnormal Point, Credit Scoring, Density, E-commerce
Show / Hide Abstract

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
Amine Dahane, Nasr-Eddine Berrached and Abdelhamid Loukil
Page: 205~228, Vol. 11, No.2, 2015
10.3745/JIPS.02.0019

Keywords: Clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks
Show / Hide Abstract

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang and Kimoon Jeong
Page: 229~238, Vol. 11, No.2, 2015
10.3745/JIPS.03.0026

Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Show / Hide Abstract

A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation
Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee and Hong-Woo Chun
Page: 248~265, Vol. 11, No.2, 2015
10.3745/JIPS.04.0008

Keywords: Bioinformatics, Event Extraction, Maximum Entropy, Text-Mining
Show / Hide Abstract

Counter Chain: A New Block Cipher Mode of Operation
Aly Mohamed El-Semary and Mohamed Mostafa A. Azim
Page: 266~279, Vol. 11, No.2, 2015
10.3745/JIPS.03.0031

Keywords: Authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
Show / Hide Abstract

Biological Infectious Watermarking Model for Video Copyright Protection
Bong-Joo Jang, Suk-Hwan Lee, SangHun Lim and Ki-Ryong Kwon
Page: 280~294, Vol. 11, No.2, 2015
10.3745/JIPS.02.0013

Keywords: Biological Virus Modeling, Copyright Protection, Infectious Watermarking, Video Watermarking
Show / Hide Abstract

An Adaptive Superframe Duration Allocation Algorithm for Resource-Efficient Beacon Scheduling
Young-Ae Jeon, Sang-Sung Choi, Dae-Young Kim and Kwang-il Hwang
Page: 295~309, Vol. 11, No.2, 2015
10.3745/JIPS.03.0025

Keywords: Beacon Scheduling, Energy Efficient, IEEE802.15.4, IEEE802.15.4e, LR-WPAN, Superframe Duration Allocation
Show / Hide Abstract

A Dataset of Online Handwritten Assamese Characters
Udayan Baruah and Shyamanta M. Hazarika
Page: 325~341, Vol. 11, No.3, 2015
10.3745/JIPS.02.0008

Keywords: Assamese, Character Recognition, Dataset Collection, Data Verification, Online Handwriting, Support Vector Machine
Show / Hide Abstract

Sparse Channel Estimation of Single Carrier Frequency Division Multiple Access Based on Compressive Sensing
Yuan-Hong Zhong, Zhi-Yong Huang, Bin Zhu and Hua Wu
Page: 342~353, Vol. 11, No.3, 2015
10.3745/JIPS.03.0028

Keywords: Compressive Sensing, Random Pilot Pattern, SC-FDMA, Sparse Channel Estimation
Show / Hide Abstract

A Review of Fixed-Complexity Vector Perturbation for MU-MIMO
Manar Mohaisen
Page: 354~369, Vol. 11, No.3, 2015
10.3745/JIPS.03.0035

Keywords: Block Diagonalization, MU-MIMO, Perfect and Imperfect Channel Knowledge, Quantization, Vector Perturbation
Show / Hide Abstract

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Siti Nurmaini and Ahmad Zarkasi
Page: 370~388, Vol. 11, No.3, 2015
10.3745/JIPS.01.0008

Keywords: Localization Process, RAM-Based Neural Network, Swarm Robots
Show / Hide Abstract

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Souad Bekkouch and Kamel Mohamed Faraoun
Page: 406~420, Vol. 11, No.3, 2015
10.3745/JIPS.02.0021

Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform
Show / Hide Abstract

Classification of Textured Images Based on Discrete Wavelet Transform and Information Fusion
Chaimae Anibou, Mohammed Nabil Saidi and Driss Aboutajdine
Page: 421~437, Vol. 11, No.3, 2015
10.3745/JIPS.02.0028

Keywords: Discrete Wavelet Transform, Feature Extraction, Fuzzy Set Theory, Information Fusion, Probability Theory, Segmentation, Supervised Classification
Show / Hide Abstract

A Lightweight and Effective Music Score Recognition on Mobile Phones
Tam Nguyen and Gueesang Lee
Page: 438~449, Vol. 11, No.3, 2015
10.3745/JIPS.02.0023

Keywords: Mobile Camera, Music Score, SVM, Symbol Classification
Show / Hide Abstract

Comparative Study of Various Persian Stemmers in the Field of Information Retrieval
Fatemeh Momenipour Moghadam and MohammadReza Keyvanpour
Page: 450~464, Vol. 11, No.3, 2015
10.3745/JIPS.04.0020

Keywords: Lookup Table Stemmer, Stemmer, Statistical Stemmer, Structural Stemmer
Show / Hide Abstract

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks
Chang Liu, Sang-Hwa Chung, Han-You Jeong and Ik-Joo Jung
Page: 465~482, Vol. 11, No.3, 2015
10.3745/JIPS.03.0027

Keywords: Contention Window, IEEE 802.11p, MAC Layer, Message Priority, Vehicular Network
Show / Hide Abstract

Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments
Maheshi B. Dissanayake and Dilanga L. B. Abeyrathna
Page: 483~494, Vol. 11, No.3, 2015
10.3745/JIPS.03.0036

Keywords: Complexity, Compression Efficiency, HEVC, H.264/AVC, Latency
Show / Hide Abstract

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki and Driss Aboutajdine
Page: 495~508, Vol. 11, No.4, 2015
10.3745/JIPS.02.0032

Keywords: Copyright Protection, Mammograms, Medical Image, Robust Watermarking, Visual Cryptography
Show / Hide Abstract

Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage
Nawel Bendimerad and Bouabdellah Kechar
Page: 509~527, Vol. 11, No.4, 2015
10.3745/JIPS.03.0034

Keywords: Coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks
Show / Hide Abstract

Text Detection in Scene Images Based on Interest Points
Minh Hieu Nguyen and Gueesang Lee
Page: 528~537, Vol. 11, No.4, 2015
10.3745/JIPS.02.0026

Keywords: Connected Component, Interest Point, Tensor Voting, Text Detection
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015
10.3745/JIPS.02.0030

Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization
Seung-Shik Kang
Page: 573~582, Vol. 11, No.4, 2015
10.3745/JIPS.04.0018

Keywords: Consonant Normalization, Edit Distance, Korean Character, Normalization Factor
Show / Hide Abstract

Uniform Fractional Band CAC Scheme for QoS Provisioning in Wireless Networks
Md. Asadur Rahman, Mostafa Zaman Chowdhury and Yeong Min Jang
Page: 583~600, Vol. 11, No.4, 2015
10.3745/JIPS.03.0043

Keywords: Acceptance Factor, Call Admission Control (CAC), Call Blocking Probability (CBP), Call Dropping Probability (CDP), Channel Utilization, Uniform Fractional Band (UFB), Quality of Service (QoS)
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015
10.3745/JIPS.03.0044

Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process
G. A. Preethi and C. Chandrasekar
Page: 616~629, Vol. 11, No.4, 2015
10.3745/JIPS.03.0015

Keywords: Action, Heterogeneous Handoff, MDP, Policy Iteration, State
Show / Hide Abstract

Improved Dynamic Subjective Logic Model with Evidence Driven
Jiao-Hong Qiang, Wang-Xin Xin and Tian-Jun Feng
Page: 630~642, Vol. 11, No.4, 2015
10.3745/JIPS.03.0030

Keywords: Dynamic Weight, Evidence Driven, Subjective Logic
Show / Hide Abstract

Viewpoint Unconstrained Face Recognition Based on Affine Local Descriptors and Probabilistic Similarity
Yongbin Gao and Hyo Jong Lee
Page: 643~654, Vol. 11, No.4, 2015
10.3745/JIPS.02.0027

Keywords: Affine Scale Invariant Feature Transform, Face Recognition, Probabilistic Similarity
Show / Hide Abstract

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia and Farnoush Banaei-Kashani
Page: 1~22, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.001
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety
Show / Hide Abstract

Trivariate B-spline Approximation of Spherical Solid Objects
Junho Kim, Seung-Hyun Yoon and Yunjin Lee
Page: 23~35, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.023
Keywords: Trivariate B-spline Approximation, Volume Mesh Parameterization, Topological Sphere Model, Harmonic Mapping
Show / Hide Abstract

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks
Bharti Sharma, Ravinder Singh Bhatia and Awadhesh Kumar Singh
Page: 36~54, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.036
Keywords: MANET, Inter-Cluster, Intra-Cluster, Mutual Exclusion, Token Ring
Show / Hide Abstract

Stroke Width-Based Contrast Feature for Document Image Binarization
Le Thi Khue Van and Gueesang Lee
Page: 55~68, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.055
Keywords: Degraded Document Image, Binarization, Stroke Width, Contrast Feature, Text Boundary
Show / Hide Abstract

Push-N-Scheme with Timeout for Content Delivery of Social Networking Services
Kyungkoo Jun
Page: 81~92, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.081
Keywords: Push Scheme, Content Delivery, SNS, Wait Time
Show / Hide Abstract

Gesture Input as an Out-of-band Channel
Oyuntungalag Chagnaadorj and Jiro Tanaka
Page: 92~102, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.092
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

Performance Evaluation of the VoIP Services of the Cognitive Radio System, Based on DTMC
Ummy Habiba, Md. Imdadul Islam and M. R. Amin
Page: 119~131, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.119
Keywords: Cognitive Radio, VoIP, DTMC, Cross-layer Analytical Model, M/G/1(m) Traffic, IEEE 802.16e/m
Show / Hide Abstract

How to Manage Cloud Risks Based on the BMIS Model
Youjin Song and Yasheng Pang
Page: 132~144, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.132
Keywords: Cloud Risk, Risk Control, Cloud Computing, BMIS, CSFs
Show / Hide Abstract

Probabilistic Models for Local Patterns Analysis
Khiat Salim, Belbachir Hafida and Rahal Sid Ahmed
Page: 145~161, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.145
Keywords: Global Pattern, Maximum Entropy Method, Non-derivable Itemset, Itemset Inclusion-exclusion Model
Show / Hide Abstract

Non-iterative Bit Loading Algorithm for OFDM in Independent and Correlated fading
John W. Manry and Santosh Nagaraj
Page: 163~175, Vol. 10, No.2, 2014
10.3745/JIPS.03.0001
Keywords: Adaptive Modulation, Orthogonal Frequency Division Multiplexing (OFDM), FadingAdaptive Modulation, Orthogonal Frequency Division Multiplexing (OFDM), Fading
Show / Hide Abstract

Prioritized Multipath Video Forwarding in WSN
Syed Muhammad Asad Zaidi, Jieun Jung and Byunghun Song
Page: 176~192, Vol. 10, No.2, 2014
10.3745/JIPS.03.0002
Keywords: WMSN, H.264, Multiple Paths, Quality of Service
Show / Hide Abstract

Duplication with Task Assignment in Mesh Distributed System
Rashmi Sharma and Nitin
Page: 193~214, Vol. 10, No.2, 2014
10.3745/JIPS.01.0001
Keywords: Distributed System(DS), Task Assignment Heuristics, Task Duplication(TD), Directed Acyclic Graph(DAG)
Show / Hide Abstract

Optical Image Encryption and Decryption Considering Wireless Communication Channels
Myungjin Cho and In-Ho Lee
Page: 215~222, Vol. 10, No.2, 2014
10.3745/JIPS.03.0003
Keywords: Optical Encryption and Decryption, Wireless Communication Channels
Show / Hide Abstract

The Design of the IIR Differintegrator and its Application in Edge Detection
Madhu Jain, Maneesha Gupta and N. K. Jain
Page: 223~239, Vol. 10, No.2, 2014
10.3745/JIPS.02.0001
Keywords: Digital integrator, digital differentiator, edge detection and image processing
Show / Hide Abstract

Leveraged BMIS Model for Cloud Risk Control
YouJin Song and Yasheng Pang
Page: 240~255, Vol. 10, No.2, 2014
10.3745/JIPS.03.0004
Keywords: Cloud risk, CSFs, BMIS, Risk control, Leverage point, Effective model
Show / Hide Abstract

A High Quality Steganographic Method Using Morphing
Anant M.Bagade and Sanjay N.Talbar
Page: 256~270, Vol. 10, No.2, 2014
10.3745/JIPS.03.0005
Keywords: Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality
Show / Hide Abstract

Content Modeling Based on Social Network Community Activity
Kyung-Rog Kim and Nammee Moon
Page: 271~282, Vol. 10, No.2, 2014
10.3745/JIPS.04.0001
Keywords: Social network community activities, content model, learning objects, content granularity, content aggregation level
Show / Hide Abstract

Skin Segmentation Using YUV and RGB Color Spaces
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan and Puteri Suhaiza Sulaiman
Page: 283~299, Vol. 10, No.2, 2014
10.3745/JIPS.02.0002
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space
Show / Hide Abstract

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
Shi-Kyu Bae
Page: 300~313, Vol. 10, No.2, 2014
10.3745/JIPS.03.0006
Keywords: Wireless Sensor Networks, Time Synchronization, Energy Efficiency, Power Consumption, Performance, Analysis
Show / Hide Abstract

Default Prediction for Real Estate Companies with Imbalanced Dataset
Yuan-Xiang Dong , Zhi Xiao and Xue Xiao
Page: 314~333, Vol. 10, No.2, 2014
10.3745/JIPS.04.0002
Keywords: Default prediction, Imbalanced dataset, Real estate listed companies, Minoritysample generation approach
Show / Hide Abstract

Training-Free Fuzzy Logic Based Human Activity Recognition
Eunju Kim and Sumi Helal
Page: 335~354, Vol. 10, No.3, 2014
10.3745/JIPS.04.0005
Keywords: Activity Semantic Knowledge, Fuzzy Logic, Human Activity Recognition, Multi-Layer Neural Network
Show / Hide Abstract

Improving Database System Performance by Applying NoSQL
Yong-Lak Choi, Woo-Seong Jeon and Seok-Hwan Yoon
Page: 355~364, Vol. 10, No.3, 2014
10.3745/JIPS.04.0006
Keywords: Database System Performance, NoSQL, NoSQL Practical Use
Show / Hide Abstract

A Novel Framework for Defining and Submitting Workflows to Service-Oriented Systems
Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Page: 365~383, Vol. 10, No.3, 2014
10.3745/JIPS.02.0003
Keywords: Service Composition, Service-Oriented Computing, Service-Oriented Workflow, UML2BPEL, Workflow
Show / Hide Abstract

Femtocell Subband Selection Method for Managing Cross- and Co-tier Interference in a Femtocell Overlaid Cellular Network
Young Min Kwon, Hyunseung Choo, Tae-Jin Lee, Min Young Chung and Mihui Kim
Page: 384~394, Vol. 10, No.3, 2014
10.3745/JIPS.03.0008
Keywords: Clustering Method, Femtocell, Frequency Partition, Interference Management
Show / Hide Abstract

Imputation of Medical Data Using Subspace Condition Order Degree Polynomials
Klaokanlaya Silachan and Panjai Tantatsanawong
Page: 395~411, Vol. 10, No.3, 2014
10.3745/JIPS.04.0007
Keywords: Imputation, Personal Temporal Data, Polynomial Interpolation
Show / Hide Abstract

Ultra Low Power Data Aggregation for Request Oriented Sensor Networks
Kwang-il Hwang and In Jang
Page: 412~428, Vol. 10, No.3, 2014
10.3745/JIPS.03.0009
Keywords: Data Aggregation, Energy Efficient, Low Power Listening, Medium Access Control, Request Oriented, Sensor Networks
Show / Hide Abstract

Fault Detection in the Semiconductor Etch Process Using the Seasonal Autoregressive Integrated Moving Average Modeling
Muhammad Zeeshan Arshad, Javeria Muhammad Nawaz and Sang Jeen Hong
Page: 429~442, Vol. 10, No.3, 2014
10.3745/JIPS.04.0004
Keywords: Autoregressive Integrated Moving Average, Dynamic Time Warping, Fault Detection, Seasonal Autoregressive Integrated Moving Average, Semiconductor Process, Time Series Modeling
Show / Hide Abstract

Extreme Learning Machine Ensemble Using Bagging for Facial Expression Recognition
Deepak Ghimire and Joonwhoan Lee
Page: 443~458, Vol. 10, No.3, 2014
10.3745/JIPS.02.0004
Keywords: Bagging, Ensemble Learning, Extreme Learning Machine, Facial Expression Recognition, Histogram of Orientation Gradient
Show / Hide Abstract

Spectrum Sensing and Data Transmission in a Cognitive Relay Network Considering Spatial False Alarms
Tasnina A. Tishita, Sumiya Akhter, Md. Imdadul Islam and M. R. Amin
Page: 459~470, Vol. 10, No.3, 2014
10.3745/JIPS.03.0007
Keywords: Cognitive Network, Conventional False Alarms, Probability of Symbol Error Rate, Spatial False Alarms, Spectrum Sensing
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Page: 491~502, Vol. 10, No.4, 2014
10.3745/JIPS.01.0004
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

Graphemes Segmentation for Arabic Online Handwriting Modeling
Houcine Boubaker, Najiba Tagougui, Haikal El Abed, Monji Kherallah and Adel M. Alimi
Page: 503~522, Vol. 10, No.4, 2014
10.3745/JIPS.02.0006
Keywords: Baseline Detection, Diacritic Features, Fourier Descriptors, Geometric Parameters, Grapheme Segmentation, Online Arabic Handwriting Modeling
Show / Hide Abstract

The Accuracy of the Non-continuous I Test for One- Dimensional Arrays with References Created by Induction Variables
Qing Zhang
Page: 523~542, Vol. 10, No.4, 2014
10.3745/JIPS.01.0005
Keywords: Data Dependence Analysis, Loop Parallelization, Loop Vectorization, Parallelizing/Vectorizing Compilers
Show / Hide Abstract

Design and Implementation of a Content Model for m-Learning
Jin Gon Shon and Byoung Wook Kim
Page: 543~554, Vol. 10, No.4, 2014
10.3745/JIPS.04.0010
Keywords: Content Model, M-Learning, Requirement Analysis of M-Learning Environment, Segment Content, Supplement Content
Show / Hide Abstract

Multimodal Biometric Using a Hierarchical Fusion of a Person’s Face, Voice, and Online Signature
Youssef Elmir, Zakaria Elberrichi and Réda Adjoudj
Page: 555~567, Vol. 10, No.4, 2014
10.3745/JIPS.02.0007
Keywords: Hierarchical Fusion, LDA, Multimodal Biometric Fusion, PCA
Show / Hide Abstract

Performance Evaluation of the WiMAX Network under a Complete Partitioned User Group with a Traffic Shaping Algorithm
Jesmin Akhter, Md. Imdadul Islam and M. R. Amin
Page: 568~580, Vol. 10, No.4, 2014
10.3745/JIPS.03.0016
Keywords: Blocking Probability, CAC, Complete Partition Scheme, Subscriber Station, Throughput
Show / Hide Abstract

An Unified Representation of Context Knowledge Base for Mobile Context-Aware System
Jang-Seop Jeong and Dae-Wook Bang
Page: 581~588, Vol. 10, No.4, 2014
10.3745/JIPS.01.0002
Keywords: Context-Awareness, Knowledge Base, Unified Context Information
Show / Hide Abstract

An Efficient Color Edge Detection Using the Mahalanobis Distance
Kittiya Khongkraphan
Page: 589~601, Vol. 10, No.4, 2014
10.3745/JIPS.02.0010
Keywords: Color Image, Edge Detection, Mahalanobis Distance
Show / Hide Abstract

Traffic Analysis of a Cognitive Radio Network Based on the Concept of Medium Access Probability
Risala T. Khan, Md. Imdadul Islam and M. R. Amin
Page: 602~617, Vol. 10, No.4, 2014
10.3745/JIPS.03.0019
Keywords: Blocking Probability, Fading Channel, Path Loss Model, State Transition Chain, Throughput
Show / Hide Abstract

A Fuzzy Impulse Noise Filter Based on Boundary Discriminative Noise Detection
Om Prakash Verma and Shweta Singh
Page: 89~102, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.089
Keywords: Impulse Noise, Decision Boundaries, Color Components, Fuzzy Filter, Membership Function
Show / Hide Abstract

A TRUS Prostate Segmentation using Gabor Texture Features and Snake-like Contour
Sung Gyun Kim and Yeong Geon Seo
Page: 103~116, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.103
Keywords: Gabor Filter Bank, Support Vector Machines, Prostate Segmentation
Show / Hide Abstract

Optical Character Recognition for Hindi Language Using a Neural-network Approach
Divakar Yadav, Sonia Sánchez-Cuadrado and Jorge Morato
Page: 117~140, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.117
Keywords: OCR, Pre-processing, Segmentation, Feature Vector, Classification, Artificial Neural Network (ANN)
Show / Hide Abstract

A Robust Face Detection Method Based on Skin Color and Edges
Deepak Ghimire and Joonwhoan Lee
Page: 141~156, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.141
Keywords: Face Detection, Image Enhancement, Skin Tone Percentage Index, Canny Edge, Facial Features
Show / Hide Abstract

Region-Based Facial Expression Recognition in Still Images
Gawed M. Nagi, Rahmita Rahmat, Fatimah Khalid and Muhamad Taufik
Page: 173~188, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.173
Keywords: Facial Expression Recognition (FER), Facial Features Detection, Facial Features Extraction, Cascade Classifier, LBP, One-Vs-Rest SVM
Show / Hide Abstract

The Confinement Problem: 40 Years Later
Alex Crowell, Beng Heng Ng, Earlence Fernandes and Atul Prakash
Page: 189~204, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.189
Keywords: Confinement Problem, Covert Channels, Virtualization, Isolation, Taint Tracking
Show / Hide Abstract

An Analysis of Replication Enhancement for a High Availability Cluster
Sehoon Park, Im Y. Jung, Heonsang Eom and Heon Y. Yeom
Page: 205~216, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.205
Keywords: High-Availability Cluster, Replication Enhancement, SRM, DRBD
Show / Hide Abstract

An Improved Approach to Ranking Web Documents
Pooja Gupta, Sandeep K. Singh, Divakar Yadav and A. K. Sharma
Page: 217~236, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.217
Keywords: Ranking, Ordering, WWW, Information Retrieval, Contextual Relevance, Contextual Sense, Web Documents
Show / Hide Abstract

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance
Hoo-Rock Lee, Kyung-Yul Chung and Kyoung-Son Jhang
Page: 237~246, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.237
Keywords: Maintenance Hatch, Underground Facilities, WSN, Routing Protocol, ns-2
Show / Hide Abstract

An Integrated Neural Network Model for Domain Action Determination in Goal-Oriented Dialogues
Hyunjung Lee, Harksoo Kim and Jungyun Seo
Page: 259~270, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.259
Keywords: Domain Action, Speech Act, Concept Sequence, Neural Network
Show / Hide Abstract

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Om Prakash Verma, Munazza Nizam and Musheer Ahmad
Page: 271~286, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.271
Keywords: Chaotic Systems, Number of Pixel Change Rate, Unified Average Changed Intensity, Correlation Coefficient, Entropy
Show / Hide Abstract

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do and Deokjai Choi
Page: 333~348, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.333
Keywords: Gait Recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, Identification, Signal Processing
Show / Hide Abstract

Interactive Semantic Image Retrieval
Pushpa B. Patil and Manesh B. Kokare
Page: 349~364, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.349
Keywords: Content-based Image Retrieval (CBIR), Relevance Feedback (RF), Rotated Complex Wavelet Filt ers (RCWFs), Dual Tree Complex Wavelet, and Image retrieval
Show / Hide Abstract

An Efficient Load Balancing Scheme for Multi-Gateways in Wireless Mesh Networks
Junping Liu and Sang-Hwa Chung
Page: 365~378, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.365
Keywords: Wireless Mesh Network, Internet Gateway, Multi-Gateway Multi-Root, Load Balancing
Show / Hide Abstract

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
Komal Mahajan, Ansuyia Makroo and Deepak Dahiya
Page: 379~394, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.379
Keywords: Virtual Machine (VM), Server affinity, VM load balancer, CloudAnalyst, Data center, Cloudlet
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.405
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway
Pyung Soo Kim
Page: 425~434, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.425
Keywords: A Home Network, IPTV, Service Platform, Open Architecture, Home Electronic System (HES), Home Gateway Initiative (HGI)
Show / Hide Abstract

A Regularity-Based Preprocessing Method for Collaborative Recommender Systems
Raciel Yera Toledo, Yailé Caballero Mota and Milton García Borroto
Page: 435~460, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.435
Keywords: Collaborative Recommender Systems, Inconsistencies, Rating Regularities
Show / Hide Abstract

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment
Sung-Wook Park and Im-Yeong Lee
Page: 461~476, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.461
Keywords: NFC Mobile Payment, Zero Knowledge Proof, NTRU, Ring Signature
Show / Hide Abstract

Self-Localized Packet Forwarding in Wireless Sensor Networks
Tarun Dubey and O. P. Sahu
Page: 477~488, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.477
Keywords: Localization, Node Density, Packet Forwarding, Redundancy, WSNs
Show / Hide Abstract

A Simulation Model of Object Movement for Evaluating the Communication Load in Networked Virtual Environments
Mingyu Lim and Yunjin Lee
Page: 489~498, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.489
Keywords: Networked Virtual Environments, Simulation Model, Load Distribution, Interest Management
Show / Hide Abstract

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator
Panduranga H T, Dr. Naveen Kumar S K and Sharath Kumar H S
Page: 499~510, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.499
Keywords: Image Encryption, Latin Square
Show / Hide Abstract

Developing a Dynamic Materialized View Index for Efficiently Discovering Usable Views for Progressive Queries
Chao Zhu, Qiang Zhu, Calisto Zuzarte and Wenbin Ma
Page: 511~537, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.511
Keywords: Database, query processing, query optimization, progressive query, materialized view, index
Show / Hide Abstract

Opinion Bias Detection Based on Social Opinions for Twitter
A-Rong Kwon and Kyung-Soon Lee
Page: 538~547, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.538
Keywords: Social opinion, Personal opinion, Bias detection, Sentiment, Target
Show / Hide Abstract

Developing a Web-Based Knowledge Product Outsourcing System at a University
Mark B. Onte and Dave E. Marcial
Page: 548~566, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.548
Keywords: Knowledge Product Outsourcing, Management, Web 2.0, IT in Education
Show / Hide Abstract

Simple Fuzzy Rule Based Edge Detection
O.P. Verma, Veni Jain and Rajni Gumber
Page: 575~591, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.575
Keywords: Edge detection, Edge improvement, Fuzzy rules, Membership function
Show / Hide Abstract

Small Object Segmentation Based on Visual Saliency in Natural Images
Huynh Trung Manh and Gueesang Lee
Page: 592~601, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.592
Keywords: Gaussian Mixture Model (GMM), Visual Saliency, Segmentation, Object Detection.
Show / Hide Abstract

Automatic Single Document Text Summarization Using Key Concepts in Documents
Kamal Sarkar
Page: 602~620, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.602
Keywords: Automatic Text Summarization, Key Concepts, Keyphrase Extraction
Show / Hide Abstract

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model
Seok-Hwan Yoon and Joonyoung Min
Page: 621~632, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.621
Keywords: Forest Fire Detection, Gaussian Mixture Models, HSL Color Space, Smoke Signature
Show / Hide Abstract

A Computational Intelligence Based Online Data Imputation Method: An Application For Banking
Kancherla Jonah Nishanth and Vadlamani Ravi
Page: 633~650, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.633
Keywords: Data Imputation, General Regression Neural Network (GRNN), Evolving Clustering Method (ECM), Imputation, K-Medoids clustering, K-Means clustering, MLP
Show / Hide Abstract

A Network-Based Handover Scheme in HIP-Based Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 651~659, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.651
Keywords: HIP, network-based, handover, simulations
Show / Hide Abstract

Discriminatory Projection of Camouflaged Texture Through Line Masks
Nagappa Bhajantri, Pradeep Kumar R and Nagabhushan P
Page: 660~677, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.660
Keywords: Camouflage, Line mask, Enhancement, Texture analysis, Distribution pattern, Histogram, Regression line
Show / Hide Abstract

Dynamic knowledge mapping guided by data mining: Application on Healthcare
Menaouer Brahami, Baghdad Atmani and Nada Matta
Page: 1~30, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.001
Keywords: Knowledge Management, Knowledge Mapping (Knowledge Cartography), Knowledge Representation, Boolean Modeling, Cellular Machine, Data Mining, Boolean Inference Engine
Show / Hide Abstract

A Feature Selection-based Ensemble Method for Arrhythmia Classification
Erdenetuya Namsrai, Tsendsuren Munkhdalai, Meijing Li, Jung-Hoon Shin, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 31~40, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.031
Keywords: Data Mining, Ensemble Method, Feature Selection, Arrhythmia Classification
Show / Hide Abstract

A Dynamic Zigbee Protocol for Reducing Power Consumption
Do-keun Kwon, Ki hyun Chung and Kyunghee Choi
Page: 41~52, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.041
Keywords: Zigbee, Low Power Protocol, Beacon, Power Consumption
Show / Hide Abstract

A Cross-Layer Unequal Error Protection Scheme for Prioritized H.264 Video using RCPC Codes and Hierarchical QAM
Wei-Ho Chung, Sunil Kumar, Seethal Paluri, Santosh Nagaraj, Annamalai Annamalai Jr. and John D. Matyjas
Page: 53~68, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.053
Keywords: Wireless Transmission, Unequal Error Protection (UEP), Rate-Compatible Punctured Convolutional (RCPC) Code, Hierarchical Modulation, H.264/AVC Video Coding
Show / Hide Abstract

Agile Software Development Framework in a Small Project Environment
Seiyoung Lee and Hwan-Seung Yong
Page: 69~88, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.069
Keywords: Agile Methods, Small Software Projects, Industrial Case Study
Show / Hide Abstract

Optimal Software Release Using Time and Cost Benefits via Fuzzy Multi-Criteria and Fault Tolerance
Praveen Ranjan Srivastava
Page: 21~54, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.021
Keywords: Software Testing, Fuzzy Multi-Criteria Approach, Fuzzy Logic, Fuzzy Rules Based, Confidence, Centre of Gravity, Fault Tolerance, Kilo Line of Code (KLOC), Software Development Effort (SDE), Software Test Effort (STE), Decision Makers (DM)
Show / Hide Abstract

A Dual Modeling Method for a Real-Time Palpation Simulator
Sang-Youn Kim, Sekil Park and Jinah Park
Page: 55~66, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.055
Keywords: Haptic Feedback, Dual Model, Palpation, Real-Time Simulation, S-chain Model
Show / Hide Abstract

Hartley Transform Based Fingerprint Matching
Sangita Bharkad and Manesh Kokare
Page: 85~100, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.085
Keywords: Biometrics, Feature Extraction, Hartley Transform, Discrete Wavelet Transform, Fingerprint Matching
Show / Hide Abstract

Supporting Java Components in the SID Simulation System
Hasrul Ma'ruf, Hidayat Febiansyah and Jin Baek Kwon
Page: 101~118, Vol. 8, No.1, 2012
10.3745/JIPS.2011.8.1.101
Keywords: Embedded System, Simulation System, SID Simulator
Show / Hide Abstract

Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components
Chen Liu, Omar Granados, Rolando Duarte and Jean Andrian
Page: 133~144, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.133
Keywords: Software Communication Architecture, Software Defined Radio, Energy Efficiency, FPGA, Cognitive Radio
Show / Hide Abstract

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
Daya Gupta, Asok De and Kakali Chatterjee
Page: 145~158, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.145
Keywords: Hyperelliptic Curve Cryptosystem(HECC), Secure Hyperelliptic Curve, Hyperelliptic Curve Deffie-Hellman(HECDH), Hyperelliptic Curve Digital Signature Algorithm (HECDSA)
Show / Hide Abstract

An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units
Sangpil Lee, Deokho Kim, Jaeyoung Yi and Won Woo Ro
Page: 159~174, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.159
Keywords: General-Purpose Computation on a Graphics Processing Unit, SEED Block Cipher, Parallelism, Multi-Core Processors
Show / Hide Abstract

An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators
B. John Oommen, Anis Yazidi and Ole-Christoffer Granmo
Page: 191~212, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.191
Keywords: Weak es timators, User's Profiling, Time Varying Preferences
Show / Hide Abstract

A Novel Approach for Deriving Test Scenarios and Test Cases from Events
Sandeep K. Singh, Sangeeta Sabharwal and J.P.Gupta
Page: 213~240, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.213
Keywords: Events, Event Meta Model, Testing, Test cases, Test scenarios, Event Based Systems, Software Engineering
Show / Hide Abstract

Fault Prediction Using Statistical and Machine Learning Methods for Improving Software Quality
Ruchika Malhotra and Ankita Jain
Page: 241~262, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.241
Keywords: Empirical Validation, Object Oriented, Receiver Operating Characteristics, Statistical Methods, Machine Learning, Fault Prediction
Show / Hide Abstract

Dynamic Replication Based on Availability and Popularity in the Presence of Failures
Bakhta Meroufel and Ghalem Belalem
Page: 263~278, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.263
Keywords: Data Grid, Dynamic Replication, Availability, Failures, Best Client, Best Responsible, Data Management
Show / Hide Abstract

Expressive Exceptions for Safe Pervasive Spaces
Eun-Sun Cho and Sumi Helal
Page: 279~300, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.279
Keywords: Exceptions, Safety, Programming models for Pervasive Systems, Pervasive Computing, Contexts, Situations
Show / Hide Abstract

The Use of MSVM and HMM for Sentence Alignment
Mohamed Abdel Fattah
Page: 301~314, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.301
Keywords: Sentence Alignment, English/ Arabic Parallel Corpus, Parallel Corpora, Machine Translation, Multi-Class Support Vector Machine, Hidden Markov model
Show / Hide Abstract

A Framework for Processing Brain Waves Used in a Brain-computer Interface
Yunsick Sung, Kyungeun Cho and Kyhyun Um
Page: 315~330, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.315
Keywords: Brain-Computer Interface, BCI Toolkit, BCI Framework, EEG, Brain Wave
Show / Hide Abstract

TBBench: A Micro-Benchmark Suite for Intel Threading Building Blocks
Ami Marowka
Page: 331~346, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.331
Keywords: TBB, Micro-Benchmarks, Multi-Core, Parallel Overhead
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.347
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

Automatic Detection of Texture-defects using Texture-periodicity and Jensen-Shannon Divergence
V. Asha, N.U. Bhajantri and P. Nagabhushan
Page: 359~374, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.359
Keywords: Periodicity, Jensen-Shannon Divergence, Cluster, Defect
Show / Hide Abstract

Texture Comparison with an Orientation Matching Scheme
Nguyen Cao Truong Hai, Do-Yeon Kim and Hyuk-Ro Park
Page: 389~398, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.389
Keywords: Orientation Matching, Texture Analysis, Texture Comparison, K-means Clustering
Show / Hide Abstract

A Vision-Based Method to Find Fingertips in a Closed Hand
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal and J.L. Raheja
Page: 399~408, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.399
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner Detection
Show / Hide Abstract

A Method for Learning Macro-Actions for Virtual Characters Using Programming by Demonstration and Reinforcement Learning
Yunsick Sung and Kyungeun Cho
Page: 409~420, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.409
Keywords: Reinforcement Learning, Monte Carlo Method, Behavior Generation Model, Programming B y Demonstration, Macro-Action, Multi-Step Action
Show / Hide Abstract

A New Approach to Fingerprint Detection Using a Combination of Minutiae Points and Invariant Moments Parameters
Sarnali Basak, Md. Imdadul Islam and M. R. Amin
Page: 421~436, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.421
Keywords: Random Variable, Skewness, Kurtosis, Invariant Moment, Termination And Bifurcation Points, Virtual Core Point
Show / Hide Abstract

Using an Adaptive Search Tree to Predict User Location
Sechang Oh
Page: 437~444, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.437
Keywords: Location Prediction, Learning System, Search Tree, Context-Awareness
Show / Hide Abstract

Iris Recognition Using Ridgelets
Lenina Birgale and Manesh Kokare
Page: 445~458, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.445
Keywords: Ridgelets, Texture, Wavelets, Biometrics, Features, Database
Show / Hide Abstract

Web-Based Computational System for Protein- Protein Interaction Inference
Ki-Bong Kim
Page: 459~470, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.459
Keywords: Protein-Protein Interactions (PPIs), WASPI (Web-based Assistant System for Protein-protein interaction Inference), InterPro, InterProScan, BLAST
Show / Hide Abstract

Performance Evaluation of Multi-Hop Communication Based on a Mobile Multi-Robot System in a Subterranean Laneway
Qing-Ling Liu and Duk-Hwan Oh
Page: 471~482, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.471
Keywords: Multi-hop Communication, Wireless Sensor Network, Multi-Robot System, Disaster Exploration, ZigBee Technology, Underground Environment
Show / Hide Abstract

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face
M.P. Satone and Dr. G.K. Kharate
Page: 483~494, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.483
Keywords: Face Recognition, Princ ipal Component Analysis, Subband, Wavelet Transform
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.495
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

Design and Development of m-Learning Service Based on 3G Cellular Phones
Kwang Sik Chung and Jeong Eun Lee
Page: 521~538, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.521
Keywords: m-Learning, e-Learning Service Platform, Mobile Education Device, Cellular Phone, 3G Networks, H.264
Show / Hide Abstract

Evaluation of an Abstract Component Model for Embedded Systems Development
Christian Bunse, Yunja Choi and Hans Gerhard Gross
Page: 539~554, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.539
Keywords: Software Development Management, Software Reusability, Modeling
Show / Hide Abstract

An Adaptive Workflow Scheduling Scheme Based on an Estimated Data Processing Rate for Next Generation Sequencing in Cloud Computing
Byungsang Kim, Chan-Hyun Youn, Yong-Sung Park, Yonggyu Lee and Wan Choi
Page: 555~566, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.555
Keywords: Resource-Provisioning, Bio-Workflow Broker, Next-Generation Sequencing
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.567
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

A Survey of QoS Based Routing Protocols for Wireless Sensor Networks
R.Sumathi and M.G.Srinivas
Page: 589~602, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.589
Keywords: Wireless Sensor Networks, Quality of Service, Reliability, Energy Efficiency, End-To-End Delay, Critical Data
Show / Hide Abstract

Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6
Hyon-Young Choi, Sung-Gi Min, Youn-Hee Han and Rajeev Koodli
Page: 603~620, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.603
Keywords: Flow Mobility, Proxy Mobile IPv6
Show / Hide Abstract

A Comparative Study of Estimation by Analogy using Data Mining Techniques
Geeta Nagpal, Moin Uddin and Arvinder Kaur
Page: 621~652, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.621
Keywords: Software Estimations, Estimation by Analogy, Grey Relational Analysis, Robust Regression, Data Mining Techniques
Show / Hide Abstract

Online Recognition of Handwritten Korean and English Characters
Ming Ma, Dong-Won Park, Soo Kyun Kim and Syungog An
Page: 653~668, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.653
Keywords: Online Handwriting Recognition, Hidden Markov Model, Stochastic Grammar, Hierarchical Clustering, Position Verifier
Show / Hide Abstract

ECG Denoising by Modeling Wavelet Sub-Band Coefficients using Kernel Density Estimation
Shubhada Ardhapurkar, Ramchandra Manthalkar and Suhas Gajre
Page: 669~684, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.669
Keywords: Kernel Density Estimation, Discrete Wavelet Transform, Probability Density Function (PDF), Signal to Noise Ratio
Show / Hide Abstract

Evaluation of the Image Backtrack-Based Fast Direct Mode Decision Algorithm
Yungho Choi and Neungsoo Park
Page: 685~692, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.685
Keywords: H.264/AVC, Bi-Directional Prediction, Image Backtracking, Fast Algorithm, Mode Decision
Show / Hide Abstract

Enhanced FFD-AABB Collision Algorithm for Deformable Objects
JaeHong Jeon, Min-Hyung Choi and Min Hong
Page: 713~720, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.713
Keywords: FFD-AABB Algorithm, Physically-Based Simulation, Deformable Objects, Collision Detection, Bounding Sphere
Show / Hide Abstract

Performance Anomaly of the IEEE 802.11 DCF in Different Frame Error Rate Conditions
Koohong Kang
Page: 739~748, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.739
Keywords: IEEE 802.11 DCF, Wireless LAN, Throughput and Delay Performance
Show / Hide Abstract

Computer Simulation: A Hybrid Model for Traffic Signal Optimisation
Mohamed Kamal JBIRA and Munir AHMED
Page: 1~16, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.001
Keywords: Traffic Congestion, Hybrid Model, Optimisation Method
Show / Hide Abstract

A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network
Jiehui Chen, Mariam B.Salim and Mitsuji Matsumoto
Page: 17~28, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.017
Keywords: Mobile Target Tracking, Sensor Network, Clustering, Voronoi Diagram
Show / Hide Abstract

A Clustering Protocol with Mode Selection for Wireless Sensor Network
Aries Kusdaryono and Kyung Oh Lee
Page: 29~42, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.029
Keywords: Ad Hoc Network, Wireless Sensor Networks, Clustering, Routing Protocol
Show / Hide Abstract

Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20
Mouhamed Abdulla and Yousef R. Shayan
Page: 43~52, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.043
Keywords: MBWA, IEEE 802.20, Interference, Mobility, Degradation
Show / Hide Abstract

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances
Ivy Ong and Hyotaek Lim
Page: 53~62, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.053
Keywords: iATA Protocol, Load Balancing, Network Monitoring, Storage Network Solution, Write Replication
Show / Hide Abstract

Accelerating the Sweep3D for a Graphic Processor Unit
Chunye Gong, Jie Liu, Haitao Chen, Jing Xie and Zhenghu Gong
Page: 63~74, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.063
Keywords: Sweep3D, Neutron Transport, GPU, CUDA
Show / Hide Abstract

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs
Jung-Hwan Chang
Page: 75~84, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.075
Keywords: Enhanced Pyramid Model, Hamiltonian Cycle, Edge-Disjoint Cycle
Show / Hide Abstract

Effective Partitioning of Static Global Buses for Small Processor Arrays
Susumu Matsumae
Page: 85~92, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.085
Keywords: Processor Array, Dynamically Reconfigurable Bus, Statically Partitioned Bus, Scaling-Simulation, Polylogarithmic Time Simulation
Show / Hide Abstract

Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits
Haiqing Nan, Kyung Ki Kim, Wei Wang and Ken Choi
Page: 93~102, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.093
Keywords: PVT Variation sensors, Yield, Voltage Scaling, Frequency Scaling
Show / Hide Abstract

Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video Coding
Jun Guo and Joohee Kim
Page: 103~110, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.103
Keywords: Distributed Video Coding, Wyner-Ziv Coding, Spatial Motion Vector Smoothing, Weighted Vector Median Filter, Side Information
Show / Hide Abstract

Security Framework for RFID-based Applications in Smart Home Environment
Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee
Page: 111~120, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.111
Keywords: RFID, Smart Home, Home Network System, Home Server, Secure RFIDBased Applications, RFID Reader-Enabled Devices, RFID Tagged Consumer Items, EPCglobal Architecture Framework
Show / Hide Abstract

Ensuring Anonymity for LBSs in Smartphone Environment
Mohammed Alzaabi, Chan Yeob Yeun and Thomas Anthony Martin
Page: 121~136, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.121
Keywords: Location Based Services, Anonymity, Location Information
Show / Hide Abstract

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks
HyoJin Kim, Ramachandra Bhargav Chitti and JooSeok Song
Page: 137~150, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.137
Keywords: Collaborative Attack, Malicious Flooding Attack, Wireless Ad Hoc Network
Show / Hide Abstract

Guess and Determine Attack on Bivium
Neda Rohani, Zainab Noferesti, Javad Mohajeri and Mohammad Reza Aref
Page: 151~158, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.151
Keywords: Bivium, Guess and Determine Attack, Stream Ciphers, Linear Approximations, Entropy
Show / Hide Abstract

Generic Constructions for Strong Designated Verifier Signature
Deng-Guo Feng, Jing Xu and Wei-Dong Chen
Page: 159~172, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.159
Keywords: Strong Designated Verifier Signature, Ring Signature, Deniable Authenticated Key Exchange, Provable security
Show / Hide Abstract

Virus Detection Method based on Behavior Resource Tree
Mengsong Zou, Lansheng Han, Ming Liu and Qiwen Liu
Page: 173~186, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.173
Keywords: Computer Virus, Behavior-Based Detection, Dynamic Link Library, Behavior Resource Tree
Show / Hide Abstract

A Cultural Dimensions Model based on Smart Phone Applications
Jung-Min Oh and Nammee Moon
Page: 209~220, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.209
Keywords: Smart Phone, Culture, Cultural Dimensions Model, MDS, Mobile Application Analysis
Show / Hide Abstract

An Efficient Broadcast Technique for Vehicular Networks
Ai Hua Ho, Yao H. Ho, Kien A. Hua, Roy Villafane and Han-Chieh Chao
Page: 221~240, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.221
Keywords: V2V Communication Protocols, Vehicular Network, Ad Hoc Network, Broadcast, Broadcasting Storm, Routing
Show / Hide Abstract

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks
Mohammad S. Obaidat, Sanjay K. Dhurandher and Khushboo Diwakar
Page: 241~260, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.241
Keywords: Routing, Multimedia Networks, Congestion-aware Selection, MANET, CASPER, Performance Evaluation
Show / Hide Abstract

Evaluating Service Description to Guarantee Quality of U-service Ontology
Meeyeon Lee, Jung-Won Lee, Kyung-Ah Kim and Seung Soo Park
Page: 287~298, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.287
Keywords: Quality Model, Quality Metric, Dynamic Service Composition, U-service (Ubiquitous-Service) Ontology, U-service Description Specification
Show / Hide Abstract

Batch Resizing Policies and Techniques for Fine-Grain Grid Tasks: The Nuts and Bolts
Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan and Rajkumar Buyya
Page: 299~320, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.299
Keywords: Batch Resizing, Task Granularity, Global Grid, Application Turnaround Time
Show / Hide Abstract

Development of an OPC Client-Server Framework for Monitoring and Control Systems
Vu Van Tan and Myeong-Jae Yi
Page: 321~340, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.321
Keywords: OPC, OPC UA SDK, Monitoring and Control, Redundancy, Unified Architecture
Show / Hide Abstract

Analysis of Generalized Impact Factors and the Indices of Journals
Ash Mohammad Abbas
Page: 341~354, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.341
Keywords: Information Systems, Quality of Research, Impact factor, h-index, g-index
Show / Hide Abstract

An Adequacy Based Test Data Generation Technique Using Genetic Algorithms
Ruchika Malhotra and Mohit Garg
Page: 363~384, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.363
Keywords: Software Testing, Adequacy Based Testing Criteria, Reliability Based Testing Criteria, Genetic Algorithms, Mutation Analysis
Show / Hide Abstract

The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing
Witold Pedrycz
Page: 397~412, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.397
Keywords: Information Granularity, Principle of Justifiable Granularity, Knowledge Management, Optimal Granularity Allocation
Show / Hide Abstract

A Novel Similarity Measure for Sequence Data
Mohammad. H. Pandi, Omid Kashefi and Behrouz Minaei
Page: 413~424, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.413
Keywords: Sequence Data, Similarity Measure, Sequence Mining
Show / Hide Abstract

Wavelet-based Feature Extraction Algorithm for an Iris Recognition System
Ayra Panganiban, Noel Linsangan and Felicito Caluyo
Page: 425~434, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.425
Keywords: Biometrics, Degrees of Freedom, Iris Recognition, Wavelet
Show / Hide Abstract

Probabilistic Soft Error Detection Based on Anomaly Speculation
Joonhyuk Yoo
Page: 435~446, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.435
Keywords: Probabilistic Soft Error Detection, Reliability, Anomaly Speculation
Show / Hide Abstract

Utilizing Various Natural Language Processing Techniques for Biomedical Interaction Extraction
Kyung-Mi Park, Han-Cheol Cho and Hae-Chang Rim
Page: 459~472, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.459
Keywords: Biomedical Interaction Extraction, Natural Language Processing, Interaction Verb Extraction, Argument Relation Identification
Show / Hide Abstract

Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach
Jagat Sesh Challa, Arindam Paul, Yogesh Dada, Venkatesh Nerella, Praveen Ranjan Srivastava and Ajit Pratap Singh
Page: 473~518, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.473
Keywords: Software Quality Parameters, ISO/IEC 9126, Fuzzy Software Quality Quantification Tool (FSQQT), Fuzzy Membership Function, Triangular Fuzzy Sets, KLOC, GUI, CUI
Show / Hide Abstract

A Fast Snake Algorithm for Tracking Multiple Objects
Hua Fang, JeongWoo Kim and JongWhan Jang
Page: 519~530, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.519
Keywords: Snake, Detec tion, Tracking, Multiple Objects, Topology Changes
Show / Hide Abstract

A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game
Hiroshi Kutsuna and Satoshi Fujita
Page: 531~542, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.531
Keywords: Congestion Control, AIMD, Minority Game
Show / Hide Abstract

A Study on the Business Strategy of Smart Devices for Multimedia Contents
Hong Joo Lee
Page: 543~548, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.543
Keywords: Smart Device, Business Strategy, Business Value Chain
Show / Hide Abstract

A Survey of RFID Deployment and Security Issues
Amit Grover and Hal Berghel
Page: 561~580, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.561
Keywords: RFID, RFID Standards, RFID Protocols, RFID Security, EPC structure, RFID Applications, RFID Classification
Show / Hide Abstract

A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments
Yuki Fujiwara, Susumu Date, Kohei Ichikawa and Haruo Takemura
Page: 581~594, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.581
Keywords: T iled Display Wall, SAGE, Multiple Application Control
Show / Hide Abstract

A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal
Amartya Neogi, Abhoy Chand Mondal and Soumitra Kumar Mandal
Page: 595~612, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.595
Keywords: Performance Appraisal, Cascaded Fuzzy Inference System, University Non-Teaching Staff, Sensitivity Analysis, Gaussian MF, Fuzzy Rules
Show / Hide Abstract

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks
Ji-In Kim and Seok-Joo Koh
Page: 627~634, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.627
Keywords: Proxy Mobile IPv6, Handover, Partial Bicasting, Buffering,