Search Word(s) in Title, Keywords, Authors, and Abstract: Cloud

An Intrusion Detection Method Based on Changes of Antibody Concentration in Immune Response
Ruirui Zhang and Xin Xiao
Page: 137~150, Vol. 15, No.1, 2019
10.3745/JIPS.03.0108
Keywords: Antibody Concentration, Artificial Immune, Cloud Model, Evolutionary Algorithms, Intrusion Detection
Show / Hide Abstract

Enhanced Security Framework for E-Health Systems using Blockchain
Mohan Kubendiran, Satyapal Singh and Arun Kumar Sangaiah
Page: 239~250, Vol. 15, No.2, 2019
10.3745/JIPS.04.0106
Keywords: Blockchain, Cloud Computing, Data Integrity, Data Provenance, E-Health System
Show / Hide Abstract

Scalable Service Placement in the Fog Computing Environment for the IoT-Based Smart City
Jonghwa Choi and Sanghyun Ahn
Page: 440~448, Vol. 15, No.2, 2019
10.3745/JIPS.03.0113
Keywords: Fog Computing, Internet of Things (IoT), Service Management, Service Placement, Service Provisioning
Show / Hide Abstract

Future Trends of Blockchain and Crypto Currency: Challenges, Opportunities, and Solutions
Yunsick Sung and Jong Hyuk Park
Page: 457~463, Vol. 15, No.3, 2019
10.3745/JIPS.03.0115
Keywords: Blockchain and Crypto Currency, Cloud Computing, Sentiment Analysis, Internet of Things
Show / Hide Abstract

A Secure Cloud Computing System by Using Encryption and Access Control Model
Ghassan Sabeeh Mahmood, Dong Jun Huang and Baidaa Abdulrahman Jaleel
Page: 538~549, Vol. 15, No.3, 2019
10.3745/JIPS.03.0117
Keywords: Access Control, Cloud Storage, Encryption, Security
Show / Hide Abstract

The Design of Remote Monitoring and Warning System for Dangerous Chemicals Based on CPS
Zhe Kan and Xiaolei Wang
Page: 632~644, Vol. 15, No.3, 2019
10.3745/JIPS.04.0117
Keywords: Cloud Services, Cyber-Physical System (CPS), Dangerous Chemicals, Data Collector, Remote Monitoring and Warning
Show / Hide Abstract

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions
Khusanbek Gafurov and Tai-Myoung Chung
Page: 797~819, Vol. 15, No.4, 2019
10.3745/JIPS.03.0125
Keywords: Cloud, Edge, IoT, IoT Security, MEC/MCC, RFID, WSN, 5G
Show / Hide Abstract

Learning Algorithms in AI System and Services
Young-Sik Jeong and Jong Hyuk Park
Page: 1029~1035, Vol. 15, No.5, 2019
10.3745/JIPS.02.0118
Keywords: Blockchain and Crypto Currency, Cloud Computing, Internet of Things, Sentiment Analysis
Show / Hide Abstract

Intelligent Resource Management Schemes for Systems, Services, and Applications of Cloud Computing Based on Artificial Intelligence
JongBeom Lim, DaeWon Lee, Kwang-Sik Chung and HeonChang Yu
Page: 1192~1200, Vol. 15, No.5, 2019
10.3745/JIPS.04.0139
Keywords: Artificial Intelligence, Cloud Computing, Edge-Cloud Systems, Fog Computing, Resource Management
Show / Hide Abstract

Privacy-Preservation Using Group Signature for Incentive Mechanisms in Mobile Crowd Sensing
Mihui Kim, Younghee Park and Pankaj Balasaheb Dighe
Page: 1036~1054, Vol. 15, No.5, 2019
10.3745/JIPS.01.0045
Keywords: Incentive Method, Internet of Things (IoT) Model, Mobile Crowd Sensing (MCS), Privacy-Preserving, Using Group Signature
Show / Hide Abstract

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform
Wei Song, Ning Feng, Yifei Tian, Simon Fong and Kyungeun Cho
Page: 162~175, Vol. 14, No.1, 2018
10.3745/JIPS.04.0056
Keywords: Cloud Computing, Deep Belief Network, IoT, Power Conservation, Smart Metre
Show / Hide Abstract

Efficient Flow Table Management Scheme in SDN-Based Cloud Computing Networks
Nambong Ha and Namgi Kim
Page: 228~238, Vol. 14, No.1, 2018
10.3745/JIPS.01.0023
Keywords: Cloud Computing Network, Cloud Service, Flow Table, SDN
Show / Hide Abstract

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment
Ruirui Zhang and Xin Xiao
Page: 239~251, Vol. 14, No.1, 2018
10.3745/JIPS.03.0089
Keywords: Artificial Immune, Cloud Computing, Danger Theory, Intrusion Detection, Virtual Machine
Show / Hide Abstract

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence
Humaira Arshad, Aman Bin Jantan and Oludare Isaac Abiodun
Page: 346~376, Vol. 14, No.2, 2018
10.3745/JIPS.03.0095
Keywords: Criminal Investigation, Data, Digital Forensics, Electronic Evidence, Reliability, Validation, Verification
Show / Hide Abstract

Dynamic Cloud Resource Reservation Model Based on Trust
Jiao-Hong Qiang, Ding-Wan Ning, Tian-Jun Feng and Li-Wei Ping
Page: 377~398, Vol. 14, No.2, 2018
10.3745/JIPS.03.0091
Keywords: Cloud-Domain-Based Management Architecture, Decision of Candidate Resources, Dynamic Resource Reservation, Two-Way Trust Evaluation Mechanism
Show / Hide Abstract

Load Balancing in Cloud Computing Using Meta-Heuristic Algorithm
Youssef Fahim, Hamza Rahhali, Mohamed Hanine, El-Habib Benlahmar, El-Houssine Labriji, Mostafa Hanoune and Ahmed Eddaoui
Page: 569~589, Vol. 14, No.3, 2018
10.3745/JIPS.01.0028
Keywords: Bat-Algorithm, Cloud Computing, Load Balancing, Pre-scheduling, Virtual Machines
Show / Hide Abstract

An Efficient Implementation of Mobile Raspberry Pi Hadoop Clusters for Robust and Augmented Computing Performance
Kathiravan Srinivasan, Chuan-Yu Chang, Chao-Hsi Huang, Min-Hao Chang, Anant Sharma and Avinash Ankur
Page: 989~1009, Vol. 14, No.4, 2018
10.3745/JIPS.01.0031
Keywords: Clusters, Hadoop, MapReduce, Mobile Raspberry Pi, Single-board Computer
Show / Hide Abstract

GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data
Hyunjo Lee, Youngho Song and Jae-Woo Chang
Page: 1087~1101, Vol. 14, No.5, 2018
10.3745/JIPS.01.0032
Keywords: Cloud Computing, Data Encryption, Query Processing over Encrypted Data
Show / Hide Abstract

A CPU-GPU Hybrid System of Environment Perception and 3D Terrain Reconstruction for Unmanned Ground Vehicle
Wei Song, Shuanghui Zou, Yifei Tian, Su Sun, Simon Fong, Kyungeun Cho and Lvyang Qiu
Page: 1445~1456, Vol. 14, No.6, 2018
10.3745/JIPS.02.0099
Keywords: Driving Awareness, Environment Perception, Unmanned Ground Vehicle, 3D Reconstruction
Show / Hide Abstract

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments
JongBeom Lim, HeonChang Yu and Joon-Min Gil
Page: 1480~1493, Vol. 14, No.6, 2018
10.3745/JIPS.02.0102
Keywords: Cloud Computing, Clustering, Computational Intelligence, Resource Monitoring
Show / Hide Abstract

NDynamic Framework for Secure VM Migration over Cloud Computing
Suresh B. Rathod and V. Krishna Reddy
Page: 476~490, Vol. 13, No.3, 2017
10.3745/JIPS.01.0015
Keywords: Cloud Computing, Datacenter (DC), Host Controller, Physical Host, Virtual Machine (VM)
Show / Hide Abstract

A Fast Ground Segmentation Method for 3D Point Cloud
Phuong Chu, Seoungjae Cho, Sungdae Sim, Kiho Kwak and Kyungeun Cho
Page: 491~499, Vol. 13, No.3, 2017
10.3745/JIPS.02.0061
Keywords: 3D Point Cloud, Ground Segmentation, Light Detection and Ranging, Start-Ground Point, Threshold Point
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017
10.3745/JIPS.04.0034
Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

Hadoop Based Wavelet Histogram for Big Data in Cloud
Jeong-Joon Kim
Page: 668~676, Vol. 13, No.4, 2017
10.3745/JIPS.04.0036
Keywords: Big Data, Histogram, MapReduce, Wavelet
Show / Hide Abstract

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications
Daewon Kim
Page: 731~751, Vol. 13, No.4, 2017
10.3745/JIPS.04.0037
Keywords: Cloud, HTML5, JavaScript, Mobile
Show / Hide Abstract

A Comprehensive Review of Emerging Computational Methods for Gene Identification
Ning Yu, Zeng Yu, Bing Li, Feng Gu and Yi Pan
Page: 1~34, Vol. 12, No.1, 2016
10.3745/JIPS.04.0023
Keywords: Cloud Computing, Comparative Methods, Deep Learning, Fourier Transform, Gene Identification, Gene Prediction, Hidden Markov Model, Machine Learning, Protein-Coding Region, Support Vector Machine
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
10.3745/JIPS.03.0049
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016
10.3745/JIPS.04.0025
Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Page: 338~357, Vol. 12, No.3, 2016
10.3745/JIPS.01.0010
Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016
10.3745/JIPS.03.0039
Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

A Security Protection Framework for Cloud Computing
Wenzheng Zhu and Changhoon Lee
Page: 538~547, Vol. 12, No.3, 2016
10.3745/JIPS.03.0053
Keywords: Cloud Computing, Collusive Worker, Malicious Worker, MapReduce, Non-collusive Worker
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015
10.3745/JIPS.02.0030
Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

How to Manage Cloud Risks Based on the BMIS Model
Youjin Song and Yasheng Pang
Page: 132~144, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.132
Keywords: Cloud Risk, Risk Control, Cloud Computing, BMIS, CSFs
Show / Hide Abstract

Leveraged BMIS Model for Cloud Risk Control
YouJin Song and Yasheng Pang
Page: 240~255, Vol. 10, No.2, 2014
10.3745/JIPS.03.0004
Keywords: Cloud risk, CSFs, BMIS, Risk control, Leverage point, Effective model
Show / Hide Abstract

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications
Vladi Kolici, Albert Herrero and Fatos Xhafa
Page: 491~502, Vol. 10, No.4, 2014
10.3745/JIPS.01.0004
Keywords: Benchmarking, Cloud Computing, Computing Intensive Applications, Genetic Algorithms, Grid Computing, Oracle Grid Engine, Scheduling, Simulation
Show / Hide Abstract

The Confinement Problem: 40 Years Later
Alex Crowell, Beng Heng Ng, Earlence Fernandes and Atul Prakash
Page: 189~204, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.189
Keywords: Confinement Problem, Covert Channels, Virtualization, Isolation, Taint Tracking
Show / Hide Abstract

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Sun-Ho Lee and Im-Yeong Lee
Page: 287~300, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.287
Keywords: Searchable Encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage
Show / Hide Abstract

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
Komal Mahajan, Ansuyia Makroo and Deepak Dahiya
Page: 379~394, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.379
Keywords: Virtual Machine (VM), Server affinity, VM load balancer, CloudAnalyst, Data center, Cloudlet
Show / Hide Abstract

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model
Seok-Hwan Yoon and Joonyoung Min
Page: 621~632, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.621
Keywords: Forest Fire Detection, Gaussian Mixture Models, HSL Color Space, Smoke Signature
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.347
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

An Adaptive Workflow Scheduling Scheme Based on an Estimated Data Processing Rate for Next Generation Sequencing in Cloud Computing
Byungsang Kim, Chan-Hyun Youn, Yong-Sung Park, Yonggyu Lee and Wan Choi
Page: 555~566, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.555
Keywords: Resource-Provisioning, Bio-Workflow Broker, Next-Generation Sequencing
Show / Hide Abstract

Efficient Server Virtualization using Grid Service Infrastructure
Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song and Young-Sik Jeong
Page: 553~562, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.553
Keywords: Server Virtualization, Grid Service, Grid Infrastructure, Power Efficiency, Cloud Computing
Show / Hide Abstract

Automatic In-Text Keyword Tagging based on Information Retrieval
Jinsuk Kim, Du-Seok Jin, KwangYoung Kim and Ho-Seop Choe
Page: 159~166, Vol. 5, No.3, 2009
10.3745/JIPS.2009.5.3.159
Keywords: Automatic In-Text Keyword Tagging, Information Retrieval, Pattern Matching, Boyer-Moore-Horspool Algorithm, Keyword Dictionary, Cross-Referencing, in-text content link
Show / Hide Abstract