Search Word(s) in Title, Keywords, Authors, and Abstract: Efficiency

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017
10.3745/JIPS.03.0024

Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017
10.3745/JIPS.03.0059

Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

Test Set Generation for Pairwise Testing Using Genetic Algorithms
Sangeeta Sabharwal and Manuj Aggarwal
Page: 1089~1102, Vol. 13, No.5, 2017
10.3745/JIPS.04.0019

Keywords: Combinatorial Testing, Genetic Algorithm, Mixed Covering Arrays, Pairwise Testing, Test Set, t-way Testing
Show / Hide Abstract

DTG Big Data Analysis for Fuel Consumption Estimation
Wonhee Cho and Eunmi Choi
Page: 285~304, Vol. 13, No.2, 2017
10.3745/JIPS.04.0031

Keywords: Big Data Analysis, DTG, Eco-Driving, Fuel Economy, Fuel Consumption Estimation, MapReduce
Show / Hide Abstract

A Multi-Objective TRIBES/OC-SVM Approach for the Extraction of Areas of Interest from Satellite Images
Wafaa Benhabib and Hadria Fizazi
Page: 321~339, Vol. 13, No.2, 2017
10.3745/JIPS.02.0054

Keywords: Image Classification, MO-TRIBES, OC-SVM, Remote Sensing
Show / Hide Abstract

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System
Salima Lalani and D. D. Doye
Page: 340~347, Vol. 13, No.2, 2017
10.3745/JIPS.03.0067

Keywords: DWT, Fuzzy, SVD, Watermarking
Show / Hide Abstract

Hadoop Based Wavelet Histogram for Big Data in Cloud
Jeong-Joon Kim
Page: 668~676, Vol. 13, No.4, 2017
10.3745/JIPS.04.0036

Keywords: Big Data, Histogram, MapReduce, Wavelet
Show / Hide Abstract

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications
Daewon Kim
Page: 731~751, Vol. 13, No.4, 2017
10.3745/JIPS.04.0037

Keywords: Cloud, HTML5, JavaScript, Mobile
Show / Hide Abstract

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs
Shailendra Rathore, Pradip Kumar Sharma and Jong Hyuk Park
Page: 1014~1028, Vol. 13, No.4, 2017
10.3745/JIPS.03.0079

Keywords: Cross-Site Scripting Attack Detection, Dataset, JavaScript, Machine Learning Classifier, Social Networking Services
Show / Hide Abstract

A CTR Prediction Approach for Text Advertising Based on the SAE-LR Deep Neural Network
Zilong Jiang, Shu Gao and Wei Dai
Page: 1052~1070, Vol. 13, No.5, 2017
10.3745/JIPS.02.0069

Keywords: Deep Neural Network, Machine Learning, Text Advertising, SAE-LR
Show / Hide Abstract

An Algorithm Solving SAT Problem Based on Splitting Rule and Extension Rule
Youjun Xu
Page: 1149~1157, Vol. 13, No.5, 2017
10.3745/JIPS.02.0071

Keywords: Extension Rule, IER, MOAMD Strategy, Satisfiability Problem, Splitting Rule
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016
10.3745/JIPS.03.0032

Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
10.3745/JIPS.03.0048

Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks
Govind P. Gupta, Manoj Misra and Kumkum Garg
Page: 148~164, Vol. 11, No.1, 2015
10.3745/JIPS.03.0018

Keywords: Agent Migration Protocol, Data Aggregation, Mobile Agent, WSN
Show / Hide Abstract

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
Amine Dahane, Nasr-Eddine Berrached and Abdelhamid Loukil
Page: 205~228, Vol. 11, No.2, 2015
10.3745/JIPS.02.0019

Keywords: Clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks
Show / Hide Abstract

An Adaptive Superframe Duration Allocation Algorithm for Resource-Efficient Beacon Scheduling
Young-Ae Jeon, Sang-Sung Choi, Dae-Young Kim and Kwang-il Hwang
Page: 295~309, Vol. 11, No.2, 2015
10.3745/JIPS.03.0025

Keywords: Beacon Scheduling, Energy Efficient, IEEE802.15.4, IEEE802.15.4e, LR-WPAN, Superframe Duration Allocation
Show / Hide Abstract

Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments
Maheshi B. Dissanayake and Dilanga L. B. Abeyrathna
Page: 483~494, Vol. 11, No.3, 2015
10.3745/JIPS.03.0036

Keywords: Complexity, Compression Efficiency, HEVC, H.264/AVC, Latency
Show / Hide Abstract

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks
Bharti Sharma, Ravinder Singh Bhatia and Awadhesh Kumar Singh
Page: 36~54, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.036
Keywords: MANET, Inter-Cluster, Intra-Cluster, Mutual Exclusion, Token Ring
Show / Hide Abstract

Probabilistic Models for Local Patterns Analysis
Khiat Salim, Belbachir Hafida and Rahal Sid Ahmed
Page: 145~161, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.145
Keywords: Global Pattern, Maximum Entropy Method, Non-derivable Itemset, Itemset Inclusion-exclusion Model
Show / Hide Abstract

Skin Segmentation Using YUV and RGB Color Spaces
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan and Puteri Suhaiza Sulaiman
Page: 283~299, Vol. 10, No.2, 2014
10.3745/JIPS.02.0002
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space
Show / Hide Abstract

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks
Shi-Kyu Bae
Page: 300~313, Vol. 10, No.2, 2014
10.3745/JIPS.03.0006
Keywords: Wireless Sensor Networks, Time Synchronization, Energy Efficiency, Power Consumption, Performance, Analysis
Show / Hide Abstract

Efficient Greedy Algorithms for Influence Maximization in Social Networks
Jiaguo Lv, Jingfeng Guo and Huixiao Ren
Page: 471~482, Vol. 10, No.3, 2014
10.3745/JIPS.04.0003
Keywords: Greedy Algorithm, Influence Maximization, Social Network
Show / Hide Abstract

Optical Character Recognition for Hindi Language Using a Neural-network Approach
Divakar Yadav, Sonia Sánchez-Cuadrado and Jorge Morato
Page: 117~140, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.117
Keywords: OCR, Pre-processing, Segmentation, Feature Vector, Classification, Artificial Neural Network (ANN)
Show / Hide Abstract

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance
Hoo-Rock Lee, Kyung-Yul Chung and Kyoung-Son Jhang
Page: 237~246, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.237
Keywords: Maintenance Hatch, Underground Facilities, WSN, Routing Protocol, ns-2
Show / Hide Abstract

A Dynamic Zigbee Protocol for Reducing Power Consumption
Do-keun Kwon, Ki hyun Chung and Kyunghee Choi
Page: 41~52, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.041
Keywords: Zigbee, Low Power Protocol, Beacon, Power Consumption
Show / Hide Abstract

Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components
Chen Liu, Omar Granados, Rolando Duarte and Jean Andrian
Page: 133~144, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.133
Keywords: Software Communication Architecture, Software Defined Radio, Energy Efficiency, FPGA, Cognitive Radio
Show / Hide Abstract

Attack and Correction: How to Design a Secure and Efficient Mix Network
Kun Peng
Page: 175~190, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.175
Keywords: Mix Network, Correction
Show / Hide Abstract

TBBench: A Micro-Benchmark Suite for Intel Threading Building Blocks
Ami Marowka
Page: 331~346, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.331
Keywords: TBB, Micro-Benchmarks, Multi-Core, Parallel Overhead
Show / Hide Abstract

Efficient and General PVSS Based on ElGamal Encryption
Kun Peng
Page: 375~388, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.375
Keywords: ElGamal, PVSS
Show / Hide Abstract

Performance Evaluation of Multi-Hop Communication Based on a Mobile Multi-Robot System in a Subterranean Laneway
Qing-Ling Liu and Duk-Hwan Oh
Page: 471~482, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.471
Keywords: Multi-hop Communication, Wireless Sensor Network, Multi-Robot System, Disaster Exploration, ZigBee Technology, Underground Environment
Show / Hide Abstract

A Survey of QoS Based Routing Protocols for Wireless Sensor Networks
R.Sumathi and M.G.Srinivas
Page: 589~602, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.589
Keywords: Wireless Sensor Networks, Quality of Service, Reliability, Energy Efficiency, End-To-End Delay, Critical Data
Show / Hide Abstract

Generic Constructions for Strong Designated Verifier Signature
Deng-Guo Feng, Jing Xu and Wei-Dong Chen
Page: 159~172, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.159
Keywords: Strong Designated Verifier Signature, Ring Signature, Deniable Authenticated Key Exchange, Provable security
Show / Hide Abstract

An Efficient Broadcast Technique for Vehicular Networks
Ai Hua Ho, Yao H. Ho, Kien A. Hua, Roy Villafane and Han-Chieh Chao
Page: 221~240, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.221
Keywords: V2V Communication Protocols, Vehicular Network, Ad Hoc Network, Broadcast, Broadcasting Storm, Routing
Show / Hide Abstract

Development of an OPC Client-Server Framework for Monitoring and Control Systems
Vu Van Tan and Myeong-Jae Yi
Page: 321~340, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.321
Keywords: OPC, OPC UA SDK, Monitoring and Control, Redundancy, Unified Architecture
Show / Hide Abstract

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting
Kun Peng
Page: 549~560, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.549
Keywords: Efficient Proof, E-Voting
Show / Hide Abstract

A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments
Yuki Fujiwara, Susumu Date, Kohei Ichikawa and Haruo Takemura
Page: 581~594, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.581
Keywords: T iled Display Wall, SAGE, Multiple Application Control
Show / Hide Abstract

A Cascaded Fuzzy Inference System for University Non-Teaching Staff Performance Appraisal
Amartya Neogi, Abhoy Chand Mondal and Soumitra Kumar Mandal
Page: 595~612, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.595
Keywords: Performance Appraisal, Cascaded Fuzzy Inference System, University Non-Teaching Staff, Sensitivity Analysis, Gaussian MF, Fuzzy Rules
Show / Hide Abstract

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`
Shirisha Tallapally and R Padmavathy
Page: 43~52, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.043
Keywords: STPKE’ Protocol, The Proposed Protocol, Undetectable Online Password Guessing Attack
Show / Hide Abstract

A Hexagon Tessellation Approach for the Transmission Energy Efficiency in Underwater Wireless Sensor Networks
Sungun Kim, Hyunsoo Cheon, Sangbo Seo, Seungmi Song and Seonyeong Park
Page: 53~66, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.053
Keywords: UWSN, Hexagon Tessellation, Energy Efficiency, Hybrid
Show / Hide Abstract

A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks
Kezhong Liu and Ji Xiong
Page: 147~162, Vol. 6, No.2, 2010
10.3745/JIPS.2010.6.2.147
Keywords: Localization Algorithm, Mobile Beacon Node, Sensor Network, RS?
Show / Hide Abstract

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments
Mohammad S. Obaidat, Sanjay K. Dhurandher, Deepank Gupta, Nidhi Gupta and Anupriya Asthana
Page: 269~294, Vol. 6, No.3, 2010
10.3745/JIPS.2010.6.3.269
Keywords: Sensor Network, Security, Energy Efficiency, Routing, Dynamic Trust Factor
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.481
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Mining Spatio-Temporal Patterns in Trajectory Data
Juyoung Kang and Hwan-Seung Yong
Page: 521~536, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.521
Keywords: Data Mining, Spatio-Temporal Data Mining, Trajectory Data, Frequent Spatio-Temporal Patterns
Show / Hide Abstract

Efficient Server Virtualization using Grid Service Infrastructure
Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song and Young-Sik Jeong
Page: 553~562, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.553
Keywords: Server Virtualization, Grid Service, Grid Infrastructure, Power Efficiency, Cloud Computing
Show / Hide Abstract

A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Chetna Gupta, Yogesh Singh and Durg Singh Chauhan
Page: 597~608, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.597
Keywords: Change Impact Analysis, Regression Testing, Software Maintenance, Software Testing
Show / Hide Abstract

Differentiated Services Based Admission Control and Multi Path Routing Algorithm for IPv6
Muhammad Omer Farooq and Sadia Aziz
Page: 97~104, Vol. 5, No.2, 2009
10.3745/JIPS.2009.5.2.097
Keywords: Differentiated Services (DiffServ), Admission Control, IPv6, QoS Routing, QoS Architecture
Show / Hide Abstract

GPU-based Stereo Matching Algorithm with the Strategy of Population-based Incremental Learning
Dong-Hu Nie, Kyu-Phil Han and Heng-Suk Lee
Page: 105~116, Vol. 5, No.2, 2009
10.3745/JIPS.2009.5.2.105
Keywords: Image filtering, Performance Evaluation, General-Purpose Computation Based on GPU, GPU, Population-Based Incremental Learning
Show / Hide Abstract

A Security Metrics Taxonomization Model for Software-Intensive Systems
Reijo M Savola
Page: 197~206, Vol. 5, No.4, 2009
10.3745/JIPS.2009.5.4.197
Keywords: Security Metrics, Security Objectives, Taxonomy, Correctness, Effectiveness, Efficiency
Show / Hide Abstract

Membership Management based on a Hierarchical Ring for Large Grid Environments
Tae-Wan Gu, Seong-Jun Hong, Saangyong Uhmn and Kwang-Mo Lee
Page: 8~15, Vol. 3, No.1, 2007
None
Keywords: P2P, Membership Overlay, Membership Management, Hierarchical Ring
Show / Hide Abstract

TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network
Yuan Yang, Fu Zhen, Tae-Seok Lee and Myong-Soon Park
Page: 39~43, Vol. 2, No.1, 2006
None
Keywords: Wireless Sensor Network, MAC protocol, traffic aware, sleep/wake mechanism
Show / Hide Abstract

Secure Key Management Protocol in the Wireless Sensor Network
Yoon-Su Jeong and Sang-Ho Lee
Page: 48~51, Vol. 2, No.1, 2006
None
Keywords: Cluster, Key Management Protocol, WSN
Show / Hide Abstract

The Design and Implementation of an Available Bandwidth Measurement Scheme in the KGrid System
Seong-il Hahm, Seongho Cho, Han Choi, Chong-kwon Kim and Pillwoo Lee
Page: 101~106, Vol. 2, No.2, 2006
None
Keywords: KGrid, Globus Toolkit, Available Bandwidth Measurement, XML schema
Show / Hide Abstract

A Study of a Server Selection Model for Selecting a Replicated Server based on Downstream Measurement in the Server-side
Seung-Hae Kim, Won-Hyuk Lee and Gi-Hwan Cho
Page: 130~136, Vol. 2, No.2, 2006
None
Keywords: server selection, replicated server, measurement
Show / Hide Abstract