Search Word(s) in Title, Keywords, Authors, and Abstract: Hole

Black Hole along with Other Attacks in MANETs: A Survey
Fan-Hsun Tseng, Hua-Pei Chiang and Han-Chieh Chao
Page: 56~78, Vol. 14, No.1, 2018
10.3745/JIPS.03.0090
Keywords: Collaborative Black Hole Attack, Flooding Attack, Mobile Ad Hoc Network, Non-cooperative Black Hole Attack, Wormhole Attack
Show / Hide Abstract

A New Operator Extracting Image Patch Based on EPLL
Jianwei Zhang, Tao Jiang, Yuhui Zheng, Jin Wang and Jiacen Xie
Page: 590~599, Vol. 14, No.3, 2018
10.3745/JIPS.02.0086
Keywords: Expected Patch Log Likelihood, Image Denoising, Patch Priors, Structure Information
Show / Hide Abstract

Self-Identification of Boundary’s Nodes in Wireless Sensor Networks
Kouider Elouahed Moustafa and Haffaf Hafid
Page: 128~140, Vol. 13, No.1, 2017
10.3745/JIPS.03.0062
Keywords: Boundary Recognition, Military Applications, Military Surveillance, Wireless Sensor Network
Show / Hide Abstract

Nearest Neighbor Based Prototype Classification Preserving Class Regions
Doosung Hwang and Daewon Kim
Page: 1345~1357, Vol. 13, No.5, 2017
10.3745/JIPS.04.0045
Keywords: Class Prototype, Dissimilarity, Greedy Method, Nearest-Neighbor Rule, Set Cover Optimization
Show / Hide Abstract

The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks
Muhammad Sajjad Khan and Insoo Koo
Page: 295~309, Vol. 12, No.2, 2016
10.3745/JIPS.03.0040
Keywords: Cognitive Radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015
10.3745/JIPS.03.0044
Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

A Feature Selection-based Ensemble Method for Arrhythmia Classification
Erdenetuya Namsrai, Tsendsuren Munkhdalai, Meijing Li, Jung-Hoon Shin, Oyun-Erdene Namsrai and Keun Ho Ryu
Page: 31~40, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.031
Keywords: Data Mining, Ensemble Method, Feature Selection, Arrhythmia Classification
Show / Hide Abstract

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Lukman Sharif and Munir Ahmed
Page: 177~184, Vol. 6, No.2, 2010
10.3745/JIPS.2010.6.2.177
Keywords: Secure Routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack
Show / Hide Abstract

Topological Boundary Detection in Wireless Sensor Networks
Thanh Le Dinh
Page: 145~150, Vol. 5, No.3, 2009
10.3745/JIPS.2009.5.3.145
Keywords: Wireless sensor network, Hole, Boundary detection, 2-neighbor graph
Show / Hide Abstract

Design of Cryptographic Hardware Architecture for Mobile Computing
Mooseop Kim, Youngsae Kim and Hyunsook Cho
Page: 187~196, Vol. 5, No.4, 2009
10.3745/JIPS.2009.5.4.187
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing
Show / Hide Abstract

Automatic Reading System for On-off Type DNA Chip
Munho Ryu, Jong Dae Kim and Jongwon Kim
Page: 189~193, Vol. 2, No.3, 2006
None
Keywords: DNA chip, Automatic Reading, Report Generation, Image Processing, HPV DNA chip
Show / Hide Abstract