Search Word(s) in Title, Keywords, Authors, and Abstract: Analysis

A Contour Descriptors-Based Generalized Scheme for Handwritten Odia Numerals Recognition
Tusar Kanti Mishra, Banshidhar Majhi and Ratnakar Dash
Page: 174~183, Vol. 13, No.1, 2017
10.3745/JIPS.02.0012

Keywords: Contour Features, Handwritten Character, Neural Classifier, Numeral Recognition, OCR, Odia
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017
10.3745/JIPS.04.0013

Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017
10.3745/JIPS.03.0024

Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script
Rajiv Kumar, Kiran Kumar Ravulakollu and Rajesh Bhat
Page: 893~913, Vol. 13, No.4, 2017
10.3745/JIPS.02.0018

Keywords: CPAR-2012, Devnagari, Fuzzy Membership, Handwritten Script, Writer Identification
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017
10.3745/JIPS.04.0028

Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

Feasibility and Performance Analysis of RDMA Transfer through PCI Express
Min Choi and Jong Hyuk Park
Page: 95~103, Vol. 13, No.1, 2017
10.3745/JIPS.01.0013

Keywords: Interconnection Network, Non-transparent Bridge, PCI Express, RDMA
Show / Hide Abstract

Detection of Microcalcification Using the Wavelet Based Adaptive Sigmoid Function and Neural Network
Sanjeev Kumar and Mahesh Chandra
Page: 703~715, Vol. 13, No.4, 2017
10.3745/JIPS.01.0007

Keywords: Cascade-Forward Back Propagation Technique, Computer-Aided Diagnosis (CAD), Contrast Limited Adaptive Histogram Equalization (CLAHE), Gray-Level Co-Occurrence Matrix (GLCM), Mammographic Image Analysis Society (MIAS) Database, Modified Sigmoid Function
Show / Hide Abstract

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017
10.3745/JIPS.03.0064

Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017
10.3745/JIPS.04.0029

Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

DTG Big Data Analysis for Fuel Consumption Estimation
Wonhee Cho and Eunmi Choi
Page: 285~304, Vol. 13, No.2, 2017
10.3745/JIPS.04.0031

Keywords: Big Data Analysis, DTG, Eco-Driving, Fuel Economy, Fuel Consumption Estimation, MapReduce
Show / Hide Abstract

Unsupervised Segmentation of Images Based on Shuffled Frog-Leaping Algorithm
Amel Tehami* and Hadria Fizazi
Page: 370~384, Vol. 13, No.2, 2017
10.3745/JIPS.02.0055

Keywords: Image, K-means, Meta-Heuristic, Optimization, SFLA, Unsupervised Segmentation
Show / Hide Abstract

Speech Query Recognition for Tamil Language Using Wavelet and Wavelet Packets
P. Iswarya and V. Radha
Page: 1135~1148, Vol. 13, No.5, 2017
10.3745/JIPS.02.0033

Keywords: De-noising, Feature Extraction, Speech Recognition, Support Vector Machine, Wavelet Packet
Show / Hide Abstract

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 385~399, Vol. 13, No.2, 2017
10.3745/JIPS.03.0070

Keywords: Fragile Watermarking, Local Binary Pattern (LBP), Least Significant Bit (LSB), Tamper Detection and Localization
Show / Hide Abstract

Content-Based Image Retrieval Using Combined Color and Texture Features Extracted by Multi-resolution Multi-direction Filtering
Hee-Hyung Bu, Nam-Chul Kim, Chae-Joo Moon and Jong-Hwa Kim
Page: 464~475, Vol. 13, No.3, 2017
10.3745/JIPS.02.0060

Keywords: Color and Texture Feature, Content-Based Image Retrieval, HSV Color Space, Multi-resolution Multi-direction Filtering
Show / Hide Abstract

Achievable Rate Analysis for Opportunistic Non-orthogonal Multiple Access-Based Cooperative Relaying Systems
In-Ho Lee and Howon Lee
Page: 630~642, Vol. 13, No.3, 2017
10.3745/JIPS.03.0076

Keywords: Achievable Rate Analysis, Decode-and-Forward Relaying, Non-orthogonal Multiple Access, Opportunistic Transmission, Rayleigh Fading Channels, Superposition Coding
Show / Hide Abstract

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries
Carlos Porcel, Alberto Ching-López, Juan Bernabé-Moreno, Alvaro Tejeda-Lorente and Enrique Herrera-Viedma
Page: 653~667, Vol. 13, No.4, 2017
10.3745/JIPS.04.0035

Keywords: Digital Libraries, Dissemination of Information, Fuzzy Linguistic Modeling, Recommender Systems
Show / Hide Abstract

Weighted Local Naive Bayes Link Prediction
JieHua Wu, GuoJi Zhang, YaZhou Ren, XiaYan Zhang and Qiao Yang
Page: 914~927, Vol. 13, No.4, 2017
10.3745/JIPS.04.0040

Keywords: Complex Network, Link Prediction, Naive Bayes Model, Weighted Network
Show / Hide Abstract

Identifying Influential People Based on Interaction Strength
Muhammad Azam Zia, Zhongbao Zhang, Liutong Chen, Haseeb Ahmad and Sen Su
Page: 987~999, Vol. 13, No.4, 2017
10.3745/JIPS.04.0041

Keywords: Influence, Interaction, IPRank, Micro-Blog, Online Social Network
Show / Hide Abstract

Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1043~1051, Vol. 13, No.5, 2017
10.3745/JIPS.00.0007

Keywords:
Show / Hide Abstract

Similarity Evalution between Graphs: A Formal Concept Analysis Approach
Fei Hao, Dae-Soo Sim, Doo-Soon Park and Hyung-Seok Seo
Page: 1158~1167, Vol. 13, No.5, 2017
10.3745/JIPS.04.0048

Keywords: Formal Concept Analysis, Graph, Social Networks, Similarity Evaluation
Show / Hide Abstract

A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network
Bayu Adhi Tama and Kyung-Hyune Rhee
Page: 1203~1212, Vol. 13, No.5, 2017
10.3745/JIPS.03.0080

Keywords: Classifier Ensembles, Classifier’s Significance, Intrusion Detection Systems (IDSs), Wireless Network
Show / Hide Abstract

Modeling and Simulation of Scheduling Medical Materials Using Graph Model for Complex Rescue
Ming Lv, Jingchen Zheng, Qingying Tong, Jinhong Chen, Haoting Liu and Yun Gao
Page: 1243~1258, Vol. 13, No.5, 2017
10.3745/JIPS.04.0042

Keywords: Bipartite Graph, BSCS, Drug Scheduling, Medical Rescue, Optimization Matching
Show / Hide Abstract

Analysis on Ampacity of Overhead Transmission Lines Being Operated
Zhijie Yan, Yanling Wang and Likai Liang
Page: 1358~1371, Vol. 13, No.5, 2017
10.3745/JIPS.04.0044

Keywords: Ampacity, Dynamic Thermal Rating, Rating Scales, Risk Level, Transmission Line
Show / Hide Abstract

Content-based Image Retrieval Using Texture Features Extracted from Local Energy and Local Correlation of Gabor Transformed Images
Hee-Hyung Bu, Nam-Chul Kim, Bae-Ho Lee and Sung-Ho Kim
Page: 1372~1381, Vol. 13, No.5, 2017
10.3745/JIPS.02.0075

Keywords: Content-based Image Retrieval, Gabor Transformation, Local Energy, Local Correlation, Texture Feature
Show / Hide Abstract

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things
Youn-Hee Han, Hyun-Kyo Lim and Joon-Min Gil
Page: 1410~1429, Vol. 13, No.5, 2017
10.3745/JIPS.03.0081

Keywords: Internet of Things, Location Caching Scheme, Location Tracking, Mobile Computing, Mobile Object
Show / Hide Abstract

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 196~213, Vol. 12, No.2, 2016
10.3745/JIPS.03.0037

Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE
Show / Hide Abstract

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance
Kuldeep Gurjar and Yang-Sae Moon
Page: 234~248, Vol. 12, No.2, 2016
10.3745/JIPS.04.0024

Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score
Show / Hide Abstract

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Samaneh Mashhadi
Page: 249~262, Vol. 12, No.2, 2016
10.3745/JIPS.03.0050

Keywords: Non-repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016
10.3745/JIPS.04.0025

Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016
10.3745/JIPS.03.0021

Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

Resilient Packet Transmission (RPT) for Buffer Based Routing (BBR) Protocol
Geetanjali Rathee and Nitin Rakesh
Page: 57~72, Vol. 12, No.1, 2016
10.3745/JIPS.03.0014

Keywords: WMN, Resiliency, BBR, Routing, RPT
Show / Hide Abstract

Content Based Dynamic Texture Analysis and Synthesis Based on SPIHT with GPU
Premanand P Ghadekar and Nilkanth B Chopade
Page: 46~56, Vol. 12, No.1, 2016
10.3745/JIPS.02.0009

Keywords: Discrete Wavelet Transform, Dynamic Texture, GPU, SPIHT, SVD
Show / Hide Abstract

A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic
Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef and Lamia Belguith Hadrich
Page: 358~380, Vol. 12, No.3, 2016
10.3745/JIPS.02.0041

Keywords: Alkhalil Morphological Analyzer, Approach to Multi-Criteria Decision (MCA), Arabic Language Processing (ALP), Augmented Transition Networks (ATNs), Contextual Exploration, Tagging, Diacritization, Disambiguation Method, Segmentation
Show / Hide Abstract

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis
Leila Boussaad, Mohamed Benmohammed and Redha Benzid
Page: 392~409, Vol. 12, No.3, 2016
10.3745/JIPS.02.0043

Keywords: Active Appearance Model, Age-Invariant, Face Recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
10.3745/JIPS.03.0045

Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification
Chouchane Ammar*, Belahcene Mebarka, Ouamane Abdelmalik and Bourennane Salah
Page: 468~488, Vol. 12, No.3, 2016
10.3745/JIPS.02.0037

Keywords: 3D Face Verification, Depth Image, Dimensionality Reduction, Histograms Local Features, Local Descriptors, Support Vector Machine
Show / Hide Abstract

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet
Jeong Kyu Lee, Seo Yeon Moon and Jong Hyuk Park
Page: 489~501, Vol. 12, No.3, 2016
10.3745/JIPS.01.0009

Keywords: Future Internet, Human Behavior, Intrusion Prevention, Malware Detection
Show / Hide Abstract

A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features
Mohamed Belaoued and Smaine Mazouzi
Page: 644~660, Vol. 12, No.4, 2016
10.3745/JIPS.03.0058

Keywords: Chi-Square Test, Malware Analysis, PE-Optional Header, Real-Time Detection Windows API
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016
10.3745/JIPS.01.0012

Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

Soft Set Theory Oriented Forecast Combination Method for Business Failure Prediction
Wei Xu and Zhi Xiao
Page: 109~128, Vol. 12, No.1, 2016
10.3745/JIPS.04.0016

Keywords: Business Failure Prediction, Combined Forecasting Method, Qualitative Analysis, Quantitative Analysis, Receiver Operating Characteristic Curve, Soft Set Theory
Show / Hide Abstract

Analysis of Semantic Relations Between Multimodal Medical Images Based on Coronary Anatomy for Acute Myocardial Infarction
Yeseul Park, Meeyeon Lee, Myung-Hee Kim and Jung-Won Lee
Page: 129~148, Vol. 12, No.1, 2016
10.3745/JIPS.04.0021

Keywords: Acute Myocardial Infarction, Coronary Anatomy, Coronary Angiography, Data Model, Echocardiography, Medical Images, Multimodality, Semantic Features
Show / Hide Abstract

Research on the E-Commerce Credit Scoring Model Using the Gaussian Density Function
Xiao Qiang, He Rui-chun and Zhang Wei
Page: 173~183, Vol. 11, No.2, 2015
10.3745/JIPS.04.0012

Keywords: Abnormal Point, Credit Scoring, Density, E-commerce
Show / Hide Abstract

A Note on Computing the Crisp Order Context of a Fuzzy Formal Context for Knowledge Reduction
Prem Kumar Singh and Ch. Aswani Kumar
Page: 184~204, Vol. 11, No.2, 2015
10.3745/JIPS.04.0009

Keywords: Crisp Context, Concept Lattice, Formal Concept Analysis, Fuzzy Formal Concept, Fuzzy Relation, Knowledge Reduction
Show / Hide Abstract

Event Detection on Motion Activities Using a Dynamic Grid
Jitdumrong Preechasuk and Punpiti Piamsa-nga
Page: 538~555, Vol. 11, No.4, 2015
10.3745/JIPS.02.0035

Keywords: Dynamic Grid Feature, Event Detection, Event Patterns, Pedestrian Activities
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015
10.3745/JIPS.03.0044

Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks
Bharti Sharma, Ravinder Singh Bhatia and Awadhesh Kumar Singh
Page: 36~54, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.036
Keywords: MANET, Inter-Cluster, Intra-Cluster, Mutual Exclusion, Token Ring
Show / Hide Abstract

Probabilistic Models for Local Patterns Analysis
Khiat Salim, Belbachir Hafida and Rahal Sid Ahmed
Page: 145~161, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.145
Keywords: Global Pattern, Maximum Entropy Method, Non-derivable Itemset, Itemset Inclusion-exclusion Model
Show / Hide Abstract

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
Shi-Kyu Bae
Page: 300~313, Vol. 10, No.2, 2014
10.3745/JIPS.03.0006
Keywords: Wireless Sensor Networks, Time Synchronization, Energy Efficiency, Power Consumption, Performance, Analysis
Show / Hide Abstract

Imputation of Medical Data Using Subspace Condition Order Degree Polynomials
Klaokanlaya Silachan and Panjai Tantatsanawong
Page: 395~411, Vol. 10, No.3, 2014
10.3745/JIPS.04.0007
Keywords: Imputation, Personal Temporal Data, Polynomial Interpolation
Show / Hide Abstract

Extreme Learning Machine Ensemble Using Bagging for Facial Expression Recognition
Deepak Ghimire and Joonwhoan Lee
Page: 443~458, Vol. 10, No.3, 2014
10.3745/JIPS.02.0004
Keywords: Bagging, Ensemble Learning, Extreme Learning Machine, Facial Expression Recognition, Histogram of Orientation Gradient
Show / Hide Abstract

The Accuracy of the Non-continuous I Test for One- Dimensional Arrays with References Created by Induction Variables
Qing Zhang
Page: 523~542, Vol. 10, No.4, 2014
10.3745/JIPS.01.0005
Keywords: Data Dependence Analysis, Loop Parallelization, Loop Vectorization, Parallelizing/Vectorizing Compilers
Show / Hide Abstract

Design and Implementation of a Content Model for m-Learning
Jin Gon Shon and Byoung Wook Kim
Page: 543~554, Vol. 10, No.4, 2014
10.3745/JIPS.04.0010
Keywords: Content Model, M-Learning, Requirement Analysis of M-Learning Environment, Segment Content, Supplement Content
Show / Hide Abstract

Multimodal Biometric Using a Hierarchical Fusion of a Person’s Face, Voice, and Online Signature
Youssef Elmir, Zakaria Elberrichi and Réda Adjoudj
Page: 555~567, Vol. 10, No.4, 2014
10.3745/JIPS.02.0007
Keywords: Hierarchical Fusion, LDA, Multimodal Biometric Fusion, PCA
Show / Hide Abstract

Traffic Analysis of a Cognitive Radio Network Based on the Concept of Medium Access Probability
Risala T. Khan, Md. Imdadul Islam and M. R. Amin
Page: 602~617, Vol. 10, No.4, 2014
10.3745/JIPS.03.0019
Keywords: Blocking Probability, Fading Channel, Path Loss Model, State Transition Chain, Throughput
Show / Hide Abstract

A Fuzzy Impulse Noise Filter Based on Boundary Discriminative Noise Detection
Om Prakash Verma and Shweta Singh
Page: 89~102, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.089
Keywords: Impulse Noise, Decision Boundaries, Color Components, Fuzzy Filter, Membership Function
Show / Hide Abstract

An Analysis of Replication Enhancement for a High Availability Cluster
Sehoon Park, Im Y. Jung, Heonsang Eom and Heon Y. Yeom
Page: 205~216, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.205
Keywords: High-Availability Cluster, Replication Enhancement, SRM, DRBD
Show / Hide Abstract

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Om Prakash Verma, Munazza Nizam and Musheer Ahmad
Page: 271~286, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.271
Keywords: Chaotic Systems, Number of Pixel Change Rate, Unified Average Changed Intensity, Correlation Coefficient, Entropy
Show / Hide Abstract

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
Komal Mahajan, Ansuyia Makroo and Deepak Dahiya
Page: 379~394, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.379
Keywords: Virtual Machine (VM), Server affinity, VM load balancer, CloudAnalyst, Data center, Cloudlet
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.405
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

Simple Fuzzy Rule Based Edge Detection
O.P. Verma, Veni Jain and Rajni Gumber
Page: 575~591, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.575
Keywords: Edge detection, Edge improvement, Fuzzy rules, Membership function
Show / Hide Abstract

Small Object Segmentation Based on Visual Saliency in Natural Images
Huynh Trung Manh and Gueesang Lee
Page: 592~601, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.592
Keywords: Gaussian Mixture Model (GMM), Visual Saliency, Segmentation, Object Detection.
Show / Hide Abstract

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model
Seok-Hwan Yoon and Joonyoung Min
Page: 621~632, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.621
Keywords: Forest Fire Detection, Gaussian Mixture Models, HSL Color Space, Smoke Signature
Show / Hide Abstract

Discriminatory Projection of Camouflaged Texture Through Line Masks
Nagappa Bhajantri, Pradeep Kumar R and Nagabhushan P
Page: 660~677, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.660
Keywords: Camouflage, Line mask, Enhancement, Texture analysis, Distribution pattern, Histogram, Regression line
Show / Hide Abstract

Agile Software Development Framework in a Small Project Environment
Seiyoung Lee and Hwan-Seung Yong
Page: 69~88, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.069
Keywords: Agile Methods, Small Software Projects, Industrial Case Study
Show / Hide Abstract

Using a Cellular Automaton to Extract Medical Information from Clinical Reports
Fatiha Barigou, Baghdad Atmani and Bouziane Beldjilali
Page: 67~84, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.067
Keywords: Clinical Reports, Information Extraction, Cellular Automaton, Boolean Inference Engine
Show / Hide Abstract

An Improved Fast and Secure Hash Algorithm
Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar and Nipun Rajan
Page: 119~132, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.119
Keywords: SHA-256, SFHA-256, Improved SFHA-256
Show / Hide Abstract

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
Daya Gupta, Asok De and Kakali Chatterjee
Page: 145~158, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.145
Keywords: Hyperelliptic Curve Cryptosystem(HECC), Secure Hyperelliptic Curve, Hyperelliptic Curve Deffie-Hellman(HECDH), Hyperelliptic Curve Digital Signature Algorithm (HECDSA)
Show / Hide Abstract

Attack and Correction: How to Design a Secure and Efficient Mix Network
Kun Peng
Page: 175~190, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.175
Keywords: Mix Network, Correction
Show / Hide Abstract

Fault Prediction Using Statistical and Machine Learning Methods for Improving Software Quality
Ruchika Malhotra and Ankita Jain
Page: 241~262, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.241
Keywords: Empirical Validation, Object Oriented, Receiver Operating Characteristics, Statistical Methods, Machine Learning, Fault Prediction
Show / Hide Abstract

Expressive Exceptions for Safe Pervasive Spaces
Eun-Sun Cho and Sumi Helal
Page: 279~300, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.279
Keywords: Exceptions, Safety, Programming models for Pervasive Systems, Pervasive Computing, Contexts, Situations
Show / Hide Abstract

Texture Comparison with an Orientation Matching Scheme
Nguyen Cao Truong Hai, Do-Yeon Kim and Hyuk-Ro Park
Page: 389~398, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.389
Keywords: Orientation Matching, Texture Analysis, Texture Comparison, K-means Clustering
Show / Hide Abstract

A New Approach to Fingerprint Detection Using a Combination of Minutiae Points and Invariant Moments Parameters
Sarnali Basak, Md. Imdadul Islam and M. R. Amin
Page: 421~436, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.421
Keywords: Random Variable, Skewness, Kurtosis, Invariant Moment, Termination And Bifurcation Points, Virtual Core Point
Show / Hide Abstract

Iris Recognition Using Ridgelets
Lenina Birgale and Manesh Kokare
Page: 445~458, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.445
Keywords: Ridgelets, Texture, Wavelets, Biometrics, Features, Database
Show / Hide Abstract

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face
M.P. Satone and Dr. G.K. Kharate
Page: 483~494, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.483
Keywords: Face Recognition, Princ ipal Component Analysis, Subband, Wavelet Transform
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.567
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

A Comparative Study of Estimation by Analogy using Data Mining Techniques
Geeta Nagpal, Moin Uddin and Arvinder Kaur
Page: 621~652, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.621
Keywords: Software Estimations, Estimation by Analogy, Grey Relational Analysis, Robust Regression, Data Mining Techniques
Show / Hide Abstract

Enhanced FFD-AABB Collision Algorithm for Deformable Objects
JaeHong Jeon, Min-Hyung Choi and Min Hong
Page: 713~720, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.713
Keywords: FFD-AABB Algorithm, Physically-Based Simulation, Deformable Objects, Collision Detection, Bounding Sphere
Show / Hide Abstract

Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20
Mouhamed Abdulla and Yousef R. Shayan
Page: 43~52, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.043
Keywords: MBWA, IEEE 802.20, Interference, Mobility, Degradation
Show / Hide Abstract

A Cultural Dimensions Model based on Smart Phone Applications
Jung-Min Oh and Nammee Moon
Page: 209~220, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.209
Keywords: Smart Phone, Culture, Cultural Dimensions Model, MDS, Mobile Application Analysis
Show / Hide Abstract

Development of an OPC Client-Server Framework for Monitoring and Control Systems
Vu Van Tan and Myeong-Jae Yi
Page: 321~340, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.321
Keywords: OPC, OPC UA SDK, Monitoring and Control, Redundancy, Unified Architecture
Show / Hide Abstract

Analysis of Generalized Impact Factors and the Indices of Journals
Ash Mohammad Abbas
Page: 341~354, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.341
Keywords: Information Systems, Quality of Research, Impact factor, h-index, g-index
Show / Hide Abstract

An Adequacy Based Test Data Generation Technique Using Genetic Algorithms
Ruchika Malhotra and Mohit Garg
Page: 363~384, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.363
Keywords: Software Testing, Adequacy Based Testing Criteria, Reliability Based Testing Criteria, Genetic Algorithms, Mutation Analysis
Show / Hide Abstract

Analysis of Business Attributes in Information Technology Environments
Hong Joo Lee
Page: 385~396, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.385
Keywords: Business Attributes, Information Technology, Value Chain, Business System
Show / Hide Abstract

A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments
Yuki Fujiwara, Susumu Date, Kohei Ichikawa and Haruo Takemura
Page: 581~594, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.581
Keywords: T iled Display Wall, SAGE, Multiple Application Control
Show / Hide Abstract

A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal
Amartya Neogi, Abhoy Chand Mondal and Soumitra Kumar Mandal
Page: 595~612, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.595
Keywords: Performance Appraisal, Cascaded Fuzzy Inference System, University Non-Teaching Staff, Sensitivity Analysis, Gaussian MF, Fuzzy Rules
Show / Hide Abstract

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks
Ji-In Kim and Seok-Joo Koh
Page: 627~634, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.627
Keywords: Proxy Mobile IPv6, Handover, Partial Bicasting, Buffering, Simulation Analysis
Show / Hide Abstract

Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model
Tonmoy Saha, Md. Abu Shufean, Mahbubul Alam and Md. Imdadul Islam
Page: 653~678, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.653
Keywords: WiMAX, Markov Arrival Process, Markov Modulated Poisson Process, Two dimensional Markov Chain
Show / Hide Abstract

A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Joon-Min Gil and Mihye Kim
Page: 707~716, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.707
Keywords: Desktop Grids, Execution Behavior, Log Analysis System, REST Web Services, Resource Group-based Task Scheduling
Show / Hide Abstract

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`
Shirisha Tallapally and R Padmavathy
Page: 43~52, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.043
Keywords: STPKE’ Protocol, The Proposed Protocol, Undetectable Online Password Guessing Attack
Show / Hide Abstract

Approximate Clustering on Data Streams Using Discrete Cosine Transform
Feng Yu, Damalie Oyana, Wen-Chi Hou and Michael Wainer
Page: 67~78, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.067
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression
Show / Hide Abstract

Incremental Model-based Test Suite Reduction with Formal Concept Analysis
Pin Ng, Richard Y. K. Fung and Ray W. M. Kong
Page: 197~208, Vol. 6, No.2, 2010
10.3745/JIPS.2010.6.2.197
Keywords: Test Suite Reduction, Model-based Testing, State Machine Model, Formal Concept Analysis
Show / Hide Abstract

Hiding Secret Data in an Image Using Codeword Imitation
Zhi-Hui Wang, Chin-Chen Chang and Pei-Yu Tsai
Page: 435~452, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.435
Keywords: Data Hiding, Steganography, Vector Quantization
Show / Hide Abstract

A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Chetna Gupta, Yogesh Singh and Durg Singh Chauhan
Page: 597~608, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.597
Keywords: Change Impact Analysis, Regression Testing, Software Maintenance, Software Testing
Show / Hide Abstract

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System
Hyung-Min Lim, Kun-Won Jang and Byung-Gi Kim
Page: 609~620, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.609
Keywords: u-Learning, e-Learning, Event Hooking, Content packing
Show / Hide Abstract

Privacy-Aware Adaptable Web Services Using Petri Nets
You-Jin Song and Jae-Geol Yim
Page: 19~24, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.019
Keywords: Privacy, Web Service, Petri Net, Context Framework
Show / Hide Abstract

A Survey of Face Recognition Techniques
Rabia Jafri and Hamid R Arabnia
Page: 41~68, Vol. 5, No.2, 2009
10.3745/JIPS.2009.5.2.041
Keywords: Face Recognition, Person Identification, Biometrics
Show / Hide Abstract

Analysis of Handover Latency for Mobile IPv6 and mSCTP
Dong-Phil Kim and Seok-Joo Koh
Page: 87~96, Vol. 4, No.3, 2008
10.3745/JIPS.2008.4.3.087
Keywords: Mobile IPv6, mSCTP, handover latency, vertical handover, horizontal handover
Show / Hide Abstract

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System
Shengzhong Deng, Chan-Hyun Youn, Qi Liu, Hoe Young Kim, Taoran Yu and Young Hun Kim
Page: 103~112, Vol. 4, No.3, 2008
10.3745/JIPS.2008.4.3.103
Keywords: Grid Worfklow, Collaborative Healthcare Platform, SLA, Policy Adjuster
Show / Hide Abstract

Static Type Assignment for SSA Form in CTOC
Ki-Tae Kim and Weon-Hee Yoo
Page: 26~32, Vol. 3, No.1, 2007
None
Keywords: Bytecode, control flow graph, Static Single Assignment, Static Type Assignment
Show / Hide Abstract

Feature Extraction of Concepts by Independent Component Analysis
Altangerel Chagnaa, Cheol-Young Ock, Chang-Beom Lee and Purev Jaimai
Page: 33~37, Vol. 3, No.1, 2007
None
Keywords: Independent Component Analysis, Clustering, Latent Concepts.
Show / Hide Abstract

An Efficient Functional Analysis Method for Micro-array Data Using Gene Ontology
Dong-wan Hong, Jong-keun Lee, Sung-soo Park, Sang-kyoon Hong and Jee-hee Yoon
Page: 38~42, Vol. 3, No.1, 2007
None
Keywords: Micro-array data, Functional analysis, Gene Ontology, Informative genes.
Show / Hide Abstract

Vehicle Classification by Road Lane Detection and Model Fitting Using a Surveillance Camera
Wook-Sun Shin, Doo-Heon Song and Chang-Hun Lee
Page: 52~57, Vol. 2, No.1, 2006
None
Keywords: Vehicle Type classification, Road Lane Detection, Model fitting, Vanishing Point, Machine Learning
Show / Hide Abstract

A Practical Security Risk Analysis Process and Tool for Information System
YoonJung Chung, InJung Kim and DoHoon Lee
Page: 95~100, Vol. 2, No.2, 2006
None
Keywords: Risk Management, Asset, Threats, Vulnerability, Countermeasure
Show / Hide Abstract

Metaphor and Typeface Based on Children’s Sensibilities for e-Learning
Miheon Jo and Jeonghye Han
Page: 178~182, Vol. 2, No.3, 2006
None
Keywords: e-Learning, Sensibility Factor, Metaphor, Typeface, Collaborative Recommending
Show / Hide Abstract

Automatic Reading System for On-off Type DNA Chip
Munho Ryu, Jong Dae Kim and Jongwon Kim
Page: 189~193, Vol. 2, No.3, 2006
None
Keywords: DNA chip, Automatic Reading, Report Generation, Image Processing, HPV DNA chip
Show / Hide Abstract

A Hierarchical Text Rating System for Objectionable Documents
Chi Yoon Jeong, Seung Wan Han and Taek Yong Nam
Page: 22~26, Vol. 1, No.1, 2005
None
Keywords: Objectionable documents, document analysis, text classification, hierarchical system, SVM
Show / Hide Abstract

Wavelet-based Image Denoising with Optimal Filter
Yong-Hwan Lee and Sang-Burm Rhee
Page: 32~35, Vol. 1, No.1, 2005
None
Keywords: Image Denoising, Noise Reduction Wavelet
Show / Hide Abstract

Performance Analysis of the Distributed Location Management Scheme in Large Mobile Networks
Dong Chun Lee, Hong-Jin Kim, Jong Chan Lee and Yi Bing Lin
Page: 55~61, Vol. 1, No.1, 2005
None
Keywords: Distributed Location Management, LMN, Performance Analysis, IMT-2000
Show / Hide Abstract

A Performance Analysis Model of PC-based Software Router Supporting IPv6-IPv4 Translation for Residential Gateway
Ssang-Hee Seo and In-Yeup Kong
Page: 62~69, Vol. 1, No.1, 2005
None
Keywords: Performance analysis model, Software PC router, IPv6-IPv4 translator, M/G/1/K, MMPP-2/G/1/K, residential gateway
Show / Hide Abstract

The Plan and Tools for Vulnerability Testing in Information Software-Based System
Injung Kim, Younggyo Lee and Dongho Won
Page: 75~78, Vol. 1, No.1, 2005
None
Keywords: Risk Analysis, Vulnerability, Asset, Threat
Show / Hide Abstract

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation
Jung-Ho Eom, Seon-Ho Park, Tae-Kyung Kim and Tai-Myoung Chung
Page: 79~85, Vol. 1, No.1, 2005
None
Keywords: Risk management, Risk Analysis, Asset analysis, 2-dimensional qualitative analysis
Show / Hide Abstract

A Statistic Correlation Analysis Algorithm Between Land Surface Temperature and Vegetation Index
Hyung Moo Kim, Beob Kyun Kim and Kang Soo You
Page: 102~106, Vol. 1, No.1, 2005
None
Keywords: LST, NDVI, Correlation Analysis, Landsat ETM+
Show / Hide Abstract