Search Word(s) in Title, Keywords, Authors, and Abstract: IT

Practical Approaches Based on Deep Learning and Social Computing
Jong Hyuk Park
Page: 1~5, Vol. 14, No.1, 2018
10.3745/JIPS.00.0009

Keywords:
Show / Hide Abstract

A Survey on Passive Image Copy-Move Forgery Detection
Zhi Zhang, Chengyou Wang and Xiao Zhou
Page: 6~31, Vol. 14, No.1, 2018
10.3745/JIPS.02.0078

Keywords: Copy-Move Forgery Detection (CMFD), Image Forensics, Image Tamper Detection, Passive Forgery Detection
Show / Hide Abstract

A Comparative Analysis of Music Similarity Measures in Music Information Retrieval Systems
Kuldeep Gurjar and Yang-Sae Moon
Page: 32~55, Vol. 14, No.1, 2018
10.3745/JIPS.04.0054

Keywords: Content-Based Music Retrieval, MIR System, Music Information Retrieval Survey, Music Similarity Measures
Show / Hide Abstract

Black Hole along with Other Attacks in MANETs: A Survey
Fan-Hsun Tseng, Hua-Pei Chiang and Han-Chieh Chao
Page: 56~78, Vol. 14, No.1, 2018
10.3745/JIPS.03.0090

Keywords: Collaborative Black Hole Attack, Flooding Attack, Mobile Ad Hoc Network, Non-cooperative Black Hole Attack, Wormhole Attack
Show / Hide Abstract

A Survey on Automatic Twitter Event Summarization
Dwijen Rudrapal, Amitava Das and Baby Bhattacharya
Page: 79~100, Vol. 14, No.1, 2018
10.3745/JIPS.02.0079

Keywords: ROUGE, Social Media Text, Tweet Stream, Tweet Summarization
Show / Hide Abstract

A Survey about Consensus Algorithms Used in Blockchain
Giang-Truong Nguyen and Kyungbaek Kim
Page: 101~128, Vol. 14, No.1, 2018
10.3745/JIPS.01.0024

Keywords: Blockchain, Consensus Algorithm
Show / Hide Abstract

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang and Fang Zhao
Page: 129~139, Vol. 14, No.1, 2018
10.3745/JIPS.04.0055

Keywords: AI, Crowdsourcing, Personality, Planning Language, Software Development, Task
Show / Hide Abstract

A Development of LDA Topic Association Systems Based on Spark-Hadoop Framework
Kiejin Park and Limei Peng
Page: 140~149, Vol. 14, No.1, 2018
10.3745/JIPS.04.0057

Keywords: Association Analysis, Hadoop, LDA (Latent Dirichlet Allocation), Spark, Topic Model
Show / Hide Abstract

DeepAct: A Deep Neural Network Model for Activity Detection in Untrimmed Videos
Yeongtaek Song and Incheol Kim
Page: 150~161, Vol. 14, No.1, 2018
10.3745/JIPS.04.0059

Keywords: Activity Detection, Bi-directional LSTM, Deep Neural Networks, Untrimmed Video
Show / Hide Abstract

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform
Wei Song, Ning Feng, Yifei Tian, Simon Fong and Kyungeun Cho
Page: 162~175, Vol. 14, No.1, 2018
10.3745/JIPS.04.0056

Keywords: Cloud Computing, Deep Belief Network, IoT, Power Conservation, Smart Metre
Show / Hide Abstract

Convolutional Neural Network Based Multi-feature Fusion for Non-rigid 3D Model Retrieval
Hui Zeng, Yanrong Liu, Siqi Li, JianYong Che and Xiuqing Wang
Page: 176~190, Vol. 14, No.1, 2018
10.3745/JIPS.04.0058

Keywords: Convolutional Neural Network, HKS, Multi-Feature Fusion, Non-rigid 3D Model, WKS
Show / Hide Abstract

Face Recognition Based on the Combination of Enhanced Local Texture Feature and DBN under Complex Illumination Conditions
Chen Li, Shuai Zhao, Ke Xiao and Yanjie Wang
Page: 191~204, Vol. 14, No.1, 2018
10.3745/JIPS.04.0060

Keywords: Deep Belief Network, Enhanced Local Texture Feature, Face Recognition, Illumination Variation
Show / Hide Abstract

Variations of AlexNet and GoogLeNet to Improve Korean Character Recognition Performance
Sang-Geol Lee, Yunsick Sung, Yeon-Gyu Kim and Eui-Young Cha
Page: 205~217, Vol. 14, No.1, 2018
10.3745/JIPS.04.0061

Keywords: Classification, CNN, Deep Learning, Korean Character Recognition
Show / Hide Abstract

Vocal Effort Detection Based on Spectral Information Entropy Feature and Model Fusion
Hao Chao, Bao-Yun Lu, Yong-Li Liu and Hui-Lai Zhi
Page: 218~227, Vol. 14, No.1, 2018
10.3745/JIPS.04.0063

Keywords: Gaussian Mixture Model, Model Fusion, Multilayer Perceptron, Spectral Information Entropy, Support Vector Machine, Vocal Effort
Show / Hide Abstract

Efficient Flow Table Management Scheme in SDN-Based Cloud Computing Networks
Nambong Ha and Namgi Kim
Page: 228~238, Vol. 14, No.1, 2018
10.3745/JIPS.01.0023

Keywords: Cloud Computing Network, Cloud Service, Flow Table, SDN
Show / Hide Abstract

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment
Ruirui Zhang and Xin Xiao
Page: 239~251, Vol. 14, No.1, 2018
10.3745/JIPS.03.0089

Keywords: Artificial Immune, Cloud Computing, Danger Theory, Intrusion Detection, Virtual Machine
Show / Hide Abstract

Impediments to the Integration of ICT in Public Schools of Contemporary Societies: A Review of Literature
Shafaq Salam, Jianqiu Zeng, Zulfiqar Hussain Pathan, Zahid Latif and Aliya Shaheen
Page: 252~269, Vol. 14, No.1, 2018
10.3745/JIPS.04.0062

Keywords: Extrinsic & Intrinsic Impediments, ICT Integration, Public Schools, Software Education Reform
Show / Hide Abstract

Implementation of Multipurpose PCI Express Adapter Cards with On-Board Optical Module
Kyungmo Koo, Junglok Yu, Sangwan Kim, Min Choi and Kwangho Cha
Page: 270~279, Vol. 14, No.1, 2018
10.3745/JIPS.01.0022

Keywords: Device Network, Interconnection Network, On-Board Optical Module, PCI Express Bus
Show / Hide Abstract

Enhanced Integrated Algorithm & Software Architecture
Jong Hyuk Park
Page: 281~285, Vol. 14, No.2, 2018
10.3745/JIPS.00.0010

Keywords:
Show / Hide Abstract

Security and Privacy in Ubiquitous Sensor Networks
Alfredo J. Perez, Sherali Zeadally and Nafaa Jabeur
Page: 286~308, Vol. 14, No.2, 2018
10.3745/JIPS.03.0094

Keywords: Human-Centric Sensing, Internet of Things, Opportunistic Sensing, Participatory Sensing, Privacy, Security, Ubiquitous Sensing
Show / Hide Abstract

Verifying Code toward Trustworthy Software
Hyong-Soon Kim and Eunyoung Lee
Page: 309~321, Vol. 14, No.2, 2018
10.3745/JIPS.01.0027

Keywords: Certified Compiler, Formal Verification, Language Semantics, Program Verification
Show / Hide Abstract

Sustaining Low-Carbon Emission Development: An Energy Efficient Transportation Plan for CPEC
Asma Zubedi, Zeng Jianqiu, Qasim Ali Arain, Imran Memon, Sehrish Khan, Muhammad Saad Khan and Ying Zhang
Page: 322~345, Vol. 14, No.2, 2018
10.3745/JIPS.04.0067

Keywords: Carbon Emission, Climate Change, CPEC, Green ICT, ITS
Show / Hide Abstract

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence
Humaira Arshad, Aman Bin Jantan and Oludare Isaac Abiodun
Page: 346~376, Vol. 14, No.2, 2018
10.3745/JIPS.03.0095

Keywords: Criminal Investigation, Data, Digital Forensics, Electronic Evidence, Reliability, Validation, Verification
Show / Hide Abstract

Dynamic Cloud Resource Reservation Model Based on Trust
Jiao-Hong Qiang, Ding-Wan Ning, Tian-Jun Feng and Li-Wei Ping
Page: 377~398, Vol. 14, No.2, 2018
10.3745/JIPS.03.0091

Keywords: Cloud-Domain-Based Management Architecture, Decision of Candidate Resources, Dynamic Resource Reservation, Two-Way Trust Evaluation Mechanism
Show / Hide Abstract

Routing Techniques for Data Aggregation in Sensor Networks
Jeong-Joon Kim
Page: 396~417, Vol. 14, No.2, 2018
10.3745/JIPS.04.0065

Keywords: Itinerary, R-tree, Routing, Sensor Networks, Spatio-temporal Data
Show / Hide Abstract

Impact of Instance Selection on kNN-Based Text Categorization
Fatiha Barigou
Page: 418~434, Vol. 14, No.2, 2018
10.3745/JIPS.02.0080

Keywords: Classification Accuracy, Classification Efficiency, Data Reduction, Instance Selection, k-Nearest Neighbors, Text Categorization
Show / Hide Abstract

Fingerprint Identification Based on Hierarchical Triangulation
Meryam Elmouhtadi, Sanaa El fkihi and Driss Aboutajdine
Page: 435~447, Vol. 14, No.2, 2018
10.3745/JIPS.02.0084

Keywords: Biometric, Fingerprint Identification, Delaunay Triangulation, Fingerprint Matching, Minutiae Extraction
Show / Hide Abstract

On Modification and Application of the Artificial Bee Colony Algorithm
Zhanxiang Ye, Min Zhu and Jin Wang
Page: 448~454, Vol. 14, No.2, 2018
10.3745/JIPS.01.0025

Keywords: Artificial Bee Colony, Bees’ Number Reallocation, Search Equation
Show / Hide Abstract

Formulating Analytical Solution of Network ODE Systems Based on Input Excitations
Susmit Bagchi
Page: 455~468, Vol. 14, No.2, 2018
10.3745/JIPS.03.0092

Keywords: Computer Networks, Convergent Functions, Dynamic Networks, Ordinary Differential Equations
Show / Hide Abstract

GLIBP: Gradual Locality Integration of Binary Patterns for Scene Images Retrieval
Salah Bougueroua and Bachir Boucheham
Page: 469~486, Vol. 14, No.2, 2018
10.3745/JIPS.02.0081

Keywords: CBIR, Elliptic-Region, Global Information, LBP, Local Information, Texture
Show / Hide Abstract

Optimization of Train Working Plan based on Multiobjective Bi-level Programming Model
Xiaowei HAI and Chanchan ZHAO
Page: 487~498, Vol. 14, No.2, 2018
10.3745/JIPS.04.0066

Keywords: Bi-Level Programming, Genetic Algorithm, Multiobjective, Train Working Plan
Show / Hide Abstract

Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment
Yeon-Woo Jang, Moon-Hwan Kang and Jae-Woo Chang
Page: 499~509, Vol. 14, No.2, 2018
10.3745/JIPS.01.0026

Keywords: Bloom Filter, Concurrency Control, Hybrid Transactional Memory, Multi-core in-Memory Databases
Show / Hide Abstract

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery
Chengyou Wang, Heng Zhang and Xiao Zhou
Page: 510~522, Vol. 14, No.2, 2018
10.3745/JIPS.02.0082

Keywords: Image Authentication and Self-recovery, Least Significant Bit (LSB), Peak Signal-to-Noise Ratio (PSNR), Self-embedding Fragile Watermarking
Show / Hide Abstract

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment
Sung-Hoon Lee, Jong-hyuk Roh, SooHyung Kim and Seung-Hun Jin
Page: 523~538, Vol. 14, No.2, 2018
10.3745/JIPS.03.0093

Keywords: Feature Subset, Keystroke Dynamics, Smartphone Sensor
Show / Hide Abstract

An Effective Denoising Method for Images Contaminated with Mixed Noise Based on Adaptive Median Filtering and Wavelet Threshold Denoising
Lin Lin
Page: 539~551, Vol. 14, No.2, 2018
10.3745/JIPS.02.0083

Keywords: Adaptive Median Filter (AMF), Gaussian Mixture Model (GMM), Image Denoising, Mixed Noise, Wavelet Threshold Denoising
Show / Hide Abstract

A Method of Coupling Expected Patch Log Likelihood and Guided Filtering for Image Denoising
Shunfeng Wang, Jiacen Xie, Yuhui Zheng, Jin Wang and Tao Jiang
Page: 552~562, Vol. 14, No.2, 2018
10.3745/JIPS.02.0085

Keywords: Edge Preserving, Expected Patch Log Likelihood, Image De-noising, Guided Filtering
Show / Hide Abstract

Load Balancing in Cloud Computing Using Meta-Heuristic Algorithm
Youssef Fahim, Hamza Rahhali, Mohamed Hanine, El-Habib Benlahmar, El-Houssine Labriji, Mostafa Hanoune and Ahmed Eddaoui
Page: 569~589, Vol. 14, No.3, 2018
10.3745/JIPS.01.0028

Keywords: Bat-Algorithm, Cloud Computing, Load Balancing, Pre-scheduling, Virtual Machines
Show / Hide Abstract

A New Operator Extracting Image Patch Based on EPLL
Jianwei Zhang, Tao Jiang, Yuhui Zheng, Jin Wang and Jiacen Xie
Page: 590~599, Vol. 14, No.3, 2018
10.3745/JIPS.02.0086

Keywords: Expected Patch Log Likelihood, Image Denoising, Patch Priors, Structure Information
Show / Hide Abstract

A Method of Image Identification in Instrumentation
Xiaoli Wang, Shilin Wang and Baochen Jiang
Page: 600~606, Vol. 14, No.3, 2018
10.3745/JIPS.04.0071

Keywords: Code Wheel Instrument, Image Identification, IoT, Smart City, Template Matching
Show / Hide Abstract

Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model
Jin-Wook Jang
Page: 607~620, Vol. 14, No.3, 2018
10.3745/JIPS.04.0072

Keywords: Automobile Control Software, Risk-based Test, Software Testing Process, Test Design, Test Planning, Test Policy and Strategy, TMMi Assessment
Show / Hide Abstract

Development of Flash Memory Page Management Techniques
Jeong-Joon Kim
Page: 631~644, Vol. 14, No.3, 2018
10.3745/JIPS.04.0073

Keywords: Flash Memory, Page Replacement Algorithm, SSD
Show / Hide Abstract

Information Technology Infrastructure for Agriculture Genotyping Studies
Bens Pardamean, James W. Baurley, Anzaludin S. Perbangsa, Dwinita Utami, Habib Rijzaani and Dani Satyawan
Page: 655~665, Vol. 14, No.3, 2018
10.3745/JIPS.01.0029

Keywords: Agriculture Biotechnology, Big Data, Genotyping, Infrastructure, IT
Show / Hide Abstract

Analysis of a Third-Party Application for Mobile Forensic Investigation
Jung Hyun Ryu, Nam Yong Kim, Byoung Wook Kwon, Sang Ki Suk, Jin Ho Park and Jong Hyuk Park
Page: 680~693, Vol. 14, No.3, 2018
10.3745/JIPS.03.0097

Keywords: Digital Investigation, Mobile, Forensics, Third-Party Applications
Show / Hide Abstract

A New Approach for Hierarchical Dividing to Passenger Nodes in Passenger Dedicated Line
Chanchan Zhao, Feng Liu and Xiaowei Hai
Page: 694~708, Vol. 14, No.3, 2018
10.3745/JIPS.04.0074

Keywords: Hierarchical Dividing, K-Means, Passenger Nodes, Passenger Dedicated line, Self-Organizing Map
Show / Hide Abstract

Contribution to Improve Database Classification Algorithms for Multi-Database Mining
Salim Miloudi, Sid Ahmed Rahal and Salim Khiat
Page: 709~726, Vol. 14, No.3, 2018
10.3745/JIPS.04.0075

Keywords: Connected Components, Database Classification, Graph-Based Algorithm, Multi-Database Mining
Show / Hide Abstract

Microblog Sentiment Analysis Method Based on Spectral Clustering
Shi Dong, Xingang Zhang and Ya Li
Page: 727~739, Vol. 14, No.3, 2018
10.3745/JIPS.04.0076

Keywords: Machine Learning, RDM, Sentiment Analysis, Spectral Cluster
Show / Hide Abstract

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration
Sarang Na, Taeeun Kim and Hwankuk Kim
Page: 740~750, Vol. 14, No.3, 2018
10.3745/JIPS.03.0098

Keywords: Common Platform Enumeration (CPE), Common Vulnerabilities and Exposures (CVE), OS Fingerprinting, Security Vulnerability Analysis, Service Identification
Show / Hide Abstract

Analyzing Machine Learning Techniques for Fault Prediction Using Web Applications
Ruchika Malhotra and Anjali Sharma
Page: 751~770, Vol. 14, No.3, 2018
10.3745/JIPS.04.0077

Keywords: Empirical Validation, Fault prediction, Machine Learning, Object-Oriented Metrics, Web Application Quality
Show / Hide Abstract

Maximizing Network Utilization in IEEE 802.21 Assisted Vertical Handover over Wireless Heterogeneous Networks
Dinesh Pandey, Beom Hun Kim, Hui-Seon Gang, Goo-Rak Kwon and Jae-Young Pyun
Page: 771~789, Vol. 14, No.3, 2018
10.3745/JIPS.03.0099

Keywords: Handover Decision, IEEE 802.21, Occupied Bandwidth, SINR, Vertical Handover
Show / Hide Abstract

New Similarity Measures of Simplified Neutrosophic Sets and Their Applications
Chunfang Liu
Page: 790~800, Vol. 14, No.3, 2018
10.3745/JIPS.04.0078

Keywords: Multi-Criteria Decision-Making, Pattern Recognition, Similarity Measure, Simplified Neutrosophic Sets
Show / Hide Abstract

Task Assignment Model for Crowdsourcing Software Development: TAM
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang, Fang Zhao, Abdul Rehman Gilal and Wenhua Shao
Page: 621~630, Vol. 14, No.3, 2018
10.3745/JIPS.04.0064

Keywords: Crowdsourced, Human Factor, Personality Type, Software Development, Task Assignment
Show / Hide Abstract

Shift in the Regional Balance of Power From Europe to Asia: A Case Study of ICT Industry
Jin Hua, Zahid Latif, Shen Tiyan, Zulfiqar Hussain Pathan, Muhammad Zahid Tunio, Shafaq Salam and Liu Ximei
Page: 645~654, Vol. 14, No.3, 2018
10.3745/JIPS.04.0070

Keywords: Digital Power, European Union (EU), Game Changer, Information and Communication Technology (ICT), One Belt, One Road
Show / Hide Abstract

LBP and DWT Based Fragile Watermarking for Image Authentication
Chengyou Wang, Heng Zhang and Xiao Zhou
Page: 666~679, Vol. 14, No.3, 2018
10.3745/JIPS.03.0096

Keywords: Discrete Wavelet Transform (DWT), Fragile Watermarking, Image Authentication, Local Binary Pattern (LBP), Semi-blind Detection
Show / Hide Abstract

A Mixed Co-clustering Algorithm Based on Information Bottleneck
Yongli Liu, Tianyi Duan, Xing Wan and Hao Chao
Page: 1467~1486, Vol. 13, No.6, 2017
10.3745/JIPS.01.0019

Keywords: Co-clustering, F-Measure, Fuzzy Clustering, Information Bottleneck, Objective Function
Show / Hide Abstract

Designing Test Methods for IT-Enabled Energy Storage System to Evaluate Energy Dynamics
Young Gon Kim, Dong Hoon Kim and Eun-Kyu Lee
Page: 1487~1495, Vol. 13, No.6, 2017
10.3745/JIPS.01.0020

Keywords: Converged IT Service, Cyber-Physical System, Energy Dynamics, Energy Storage System, Microgrid, Test Method, Smart Grid
Show / Hide Abstract

Combining Multi-Criteria Analysis with CBR for Medical Decision Support
Mansoul Abdelhak and Atmani Baghdad
Page: 1496~1515, Vol. 13, No.6, 2017
10.3745/JIPS.04.0050

Keywords: Case-Based Reasoning (CBR), Decision Support, Medical Diagnosis, Multi-Criteria Analysis (MCA), Multimodal Reasoning
Show / Hide Abstract

Patch Integrity Verification Method Using Dual Electronic Signatures
JunHee Kim and Yoojae Won
Page: 1516~1526, Vol. 13, No.6, 2017
10.3745/JIPS.03.0084

Keywords: Digital Signature, Electronic Signature, Integrity, Patch Distribution, Patch Management
Show / Hide Abstract

miRNA Pattern Discovery from Sequence Alignment
Xiaohan Sun and Junying Zhang
Page: 1527~1543, Vol. 13, No.6, 2017
10.3745/JIPS.04.0051

Keywords: Deep Sequencing Data, miRNA, Pattern Discovery
Show / Hide Abstract

A Network Coding-Aware Routing Mechanism for Time-Sensitive Data Delivery in Multi-Hop Wireless Networks
Minho Jeong and Sanghyun
Page: 1544~1553, Vol. 13, No.6, 2017
10.3745/JIPS.03.0085

Keywords: Coding-Aware Routing, Link Quality, Multi-Hop Wireless Network, Network Coding, Traffic Load Distribution
Show / Hide Abstract

Generation of Finite Inductive, Pseudo Random, Binary Sequences
Paul Fisher, Nawaf Aljohani and Jinsuk Baek
Page: 1554~1574, Vol. 13, No.6, 2017
10.3745/JIPS.01.0021

Keywords: Pseudo Random, Linear Shift Registers, Finite Induction, Graphs, Hamiltonian Cycles
Show / Hide Abstract

Transaction Processing Method for NoSQL Based Column
Jeong-Joon Kim
Page: 1575~1584, Vol. 13, No.6, 2017
10.3745/JIPS.04.0052

Keywords: Bigdata, HBase, Multi-Row Transaction, NoSQL
Show / Hide Abstract

Review on Digital Image Watermarking Based on Singular Value Decomposition
Chengyou Wang, Yunpeng Zhang and Xiao Zhou
Page: 1585~1601, Vol. 13, No.6, 2017
10.3745/JIPS.03.0086

Keywords: Copyright Protection, Tamper Detection, Digital Image Watermarking, Evaluation Indexes, Singular Value Decomposition (SVD)
Show / Hide Abstract

A Distributed Coexistence Mitigation Scheme for IoT-Based Smart Medical Systems
BeomSeok Kim
Page: 1602~1612, Vol. 13, No.6, 2017
10.3745/JIPS.03.0087

Keywords: Channel Access, Channel Planning, Coexistence Mitigation, IoT, Smart Medical System
Show / Hide Abstract

Internet of Things (IoT) Framework for Granting Trust among Objects
Vera Suryani, Selo Sulistyo and Widyawan Widyawan
Page: 1613~1627, Vol. 13, No.6, 2017
10.3745/JIPS.03.0088

Keywords: Framework, Internet of Things, Privacy, Security, Trust
Show / Hide Abstract

Texture Image Retrieval Using DTCWT-SVD and Local Binary Pattern Features
Dayou Jiang and Jongweon Kim
Page: 1628~1639, Vol. 13, No.6, 2017
10.3745/JIPS.02.0077

Keywords: Dual-Tree Complex Wavelet Transform, Image Retrieval, Local Binary Pattern, SVD, Texture Feature
Show / Hide Abstract

An Intuitionistic Fuzzy Approach to Classify the User Based on an Assessment of the Learner’s Knowledge Level in E-Learning Decision-Making
Mukta Goyal, Divakar Yadav and Alka Tripathi
Page: 57~67, Vol. 13, No.1, 2017
10.3745/JIPS.04.0011

Keywords: Domain Model, E-Learning, E-Learning Environment, Fuzzy Rules, Intuitionistic Fuzzy Set, User Modeling
Show / Hide Abstract

A Contour Descriptors-Based Generalized Scheme for Handwritten Odia Numerals Recognition
Tusar Kanti Mishra, Banshidhar Majhi and Ratnakar Dash
Page: 174~183, Vol. 13, No.1, 2017
10.3745/JIPS.02.0012

Keywords: Contour Features, Handwritten Character, Neural Classifier, Numeral Recognition, OCR, Odia
Show / Hide Abstract

Prediction & Assessment of Change Prone Classes Using Statistical & Machine Learning Techniques
Ruchika Malhotra and Ravi Jangra
Page: 778~804, Vol. 13, No.4, 2017
10.3745/JIPS.04.0013

Keywords: Change Proneness, Empirical Validation, Machine Learning Techniques, Software Quality
Show / Hide Abstract

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures
Bharti Nagpal, Naresh Chauhan and Nanhay Singh
Page: 689~702, Vol. 13, No.4, 2017
10.3745/JIPS.03.0024

Keywords: Dynamic Analysis, Detection, Prevention, SQL Injection Attack, Static Analysis, Vulnerabilities
Show / Hide Abstract

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script
Rajiv Kumar, Kiran Kumar Ravulakollu and Rajesh Bhat
Page: 893~913, Vol. 13, No.4, 2017
10.3745/JIPS.02.0018

Keywords: CPAR-2012, Devnagari, Fuzzy Membership, Handwritten Script, Writer Identification
Show / Hide Abstract

Fingerprint Matching Based on Dimension Reduced DCT Feature Vectors
Sangita Bharkad and Manesh Kokare
Page: 852~862, Vol. 13, No.4, 2017
10.3745/JIPS.02.0017

Keywords: Biometric, Discrete Cosine Transform, Fingerprint Identification, Similarity Measure
Show / Hide Abstract

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
10.3745/JIPS.03.0029

Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016
Jong Hyuk Park
Page: 1~7, Vol. 13, No.1, 2017
10.3745/JIPS.00.0003

Keywords:
Show / Hide Abstract

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Page: 8~25, Vol. 13, No.1, 2017
10.3745/JIPS.02.0051

Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

An Improved Cat Swarm Optimization Algorithm Based on Opposition-Based Learning and Cauchy Operator for Clustering
Yugal Kumar and G. Sahoo
Page: 1000~1013, Vol. 13, No.4, 2017
10.3745/JIPS.02.0022

Keywords: Cat Swarm Optimization, Cauchy Mutation Operator, Clustering, Opposition-Based Learning, Particle Swarm Optimization
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017
10.3745/JIPS.04.0028

Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

Adaptive Medical Image Compression Based on Lossy and Lossless Embedded Zerotree Methods
Sid Ahmed Elhannachi, Nacéra Benamrane and Taleb-Ahmed Abdelmalik
Page: 40~56, Vol. 13, No.1, 2017
10.3745/JIPS.02.0052

Keywords: LEZW, Medical Images, ROI, RDCT, SPIHT
Show / Hide Abstract

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017
10.3745/JIPS.03.0059

Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

Joint Estimation of Near-Field Source Parameters and Array Response
Han Cui and Wenjuan Peng
Page: 83~94, Vol. 13, No.1, 2017
10.3745/JIPS.03.0060

Keywords: Array Calibration, Gain/Phase Response, Near-Field Source Localization
Show / Hide Abstract

A Joint Channel Estimation and Data Detection for a MIMO Wireless Communication System via Sphere Decoding
Gajanan R. Patil and Vishwanath K. Kokate
Page: 1029~1042, Vol. 13, No.4, 2017
10.3745/JIPS.03.0033

Keywords: Maximum Likelihood Decoding, Multiple Input Multiple Output, Normalized Mean Square Error, Training Based Channel Estimation, Semi-Blind Channel Estimation, Spatial Multiplexing, Sphere Decoding
Show / Hide Abstract

Feasibility and Performance Analysis of RDMA Transfer through PCI Express
Min Choi and Jong Hyuk Park
Page: 95~103, Vol. 13, No.1, 2017
10.3745/JIPS.01.0013

Keywords: Interconnection Network, Non-transparent Bridge, PCI Express, RDMA
Show / Hide Abstract

Combination of Classifiers Decisions for Multilingual Speaker Identification
B. G. Nagaraja and H. S. Jayanna
Page: 928~940, Vol. 13, No.4, 2017
10.3745/JIPS.02.0025

Keywords: Classifier Combination, Cross-lingual, Monolingual, Multilingual, Speaker Identification
Show / Hide Abstract

Parallel and Sequential Implementation to Minimize the Time for Data Transmission Using Steiner Trees
V. Anand and N. Sairam
Page: 104~113, Vol. 13, No.1, 2017
10.3745/JIPS.03.0061

Keywords: Least-Cost Path, Non-terminal Nodes, Parallel, Sequential, Steiner Vertices, Terminals, Time Complexity
Show / Hide Abstract

Detection of Microcalcification Using the Wavelet Based Adaptive Sigmoid Function and Neural Network
Sanjeev Kumar and Mahesh Chandra
Page: 703~715, Vol. 13, No.4, 2017
10.3745/JIPS.01.0007

Keywords: Cascade-Forward Back Propagation Technique, Computer-Aided Diagnosis (CAD), Contrast Limited Adaptive Histogram Equalization (CLAHE), Gray-Level Co-Occurrence Matrix (GLCM), Mammographic Image Analysis Society (MIAS) Database, Modified Sigmoid Function
Show / Hide Abstract

Color Image Coding Based on Shape-Adaptive All Phase Biorthogonal Transform
Xiaoyan Wang, Chengyou Wang, Xiao Zhou and Zhiqiang Yang
Page: 114~127, Vol. 13, No.1, 2017
10.3745/JIPS.02.0053

Keywords: Color Image Coding, Shape-Adaptive All Phase Biorthogonal Transform (SA-APBT), Color Space Conversion, Chain Code
Show / Hide Abstract

Self-Identification of Boundary’s Nodes in Wireless Sensor Networks
Kouider Elouahed Moustafa and Haffaf Hafid
Page: 128~140, Vol. 13, No.1, 2017
10.3745/JIPS.03.0062

Keywords: Boundary Recognition, Military Applications, Military Surveillance, Wireless Sensor Network
Show / Hide Abstract

Wireless Channel Identification Algorithm Based on Feature Extraction and BP Neural Network
Dengao Li*, Gang Wu, Jumin Zhao, Wenhui Niu and Qi Liu
Page: 141~151, Vol. 13, No.1, 2017
10.3745/JIPS.03.0063

Keywords: BP Neural Network, Channel Identification, Feature Extraction, Wireless Communication
Show / Hide Abstract

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017
10.3745/JIPS.03.0064

Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City
Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Page: 184~195, Vol. 13, No.1, 2017
10.3745/JIPS.03.0065

Keywords: Blockchain, Internet of Things, Security, Vehicular Network
Show / Hide Abstract

Test Set Generation for Pairwise Testing Using Genetic Algorithms
Sangeeta Sabharwal and Manuj Aggarwal
Page: 1089~1102, Vol. 13, No.5, 2017
10.3745/JIPS.04.0019

Keywords: Combinatorial Testing, Genetic Algorithm, Mixed Covering Arrays, Pairwise Testing, Test Set, t-way Testing
Show / Hide Abstract

Advances in Algorithm, Multimedia, and Network for Future IT
Jong Hyuk Park
Page: 197~203, Vol. 13, No.2, 2017
10.3745/JIPS.00.0004

Keywords:
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017
10.3745/JIPS.04.0029

Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

A Hybrid Bacterial Foraging Optimization Algorithm and a Radial Basic Function Network for Image Classification
Yasmina Teldja Amghar and Hadria Fizazi
Page: 215~235, Vol. 13, No.2, 2017
10.3745/JIPS.01.0014

Keywords: Bacterial Foraging Optimization Algorithm, Hybrid, Image Classification, Radial Basic Function
Show / Hide Abstract

Mobility Scenarios into Future Wireless Access Network
Syed Mushhad Mustuzhar Gilani, Tang Hong, Qiqi Cai and Guofeng Zhao
Page: 236~255, Vol. 13, No.2, 2017
10.3745/JIPS.03.0069

Keywords: Access Point (AP), Internet Architecture, Network Function Virtualization (NFV), Seamless Handover, Software-Defined Network (SDN)
Show / Hide Abstract

An Improved Stereo Matching Algorithm with Robustness to Noise Based on Adaptive Support Weight
Ingyu Lee and Byungin Moon
Page: 256~267, Vol. 13, No.2, 2017
10.3745/JIPS.02.0057

Keywords: Adaptive Census Transform, Adaptive Support Weight, Local Matching, Multiple Sparse Windows, Stereo Matching
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 1229~1242, Vol. 13, No.5, 2017
10.3745/JIPS.03.0038

Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization
Sarah Hachemi Benziane and Abdelkader Benyettou
Page: 268~283, Vol. 13, No.2, 2017
10.3745/JIPS.03.0066

Keywords: Biometrics, BPSO, GPU, Hand Vein, Identification, OTSU
Show / Hide Abstract

DTG Big Data Analysis for Fuel Consumption Estimation
Wonhee Cho and Eunmi Choi
Page: 285~304, Vol. 13, No.2, 2017
10.3745/JIPS.04.0031

Keywords: Big Data Analysis, DTG, Eco-Driving, Fuel Economy, Fuel Consumption Estimation, MapReduce
Show / Hide Abstract

Self-adaptive and Bidirectional Dynamic Subset Selection Algorithm for Digital Image Correlation
Wenzhuo Zhang, Rong Zhou and Yuanwen Zou
Page: 305~320, Vol. 13, No.2, 2017
10.3745/JIPS.02.0056

Keywords: Digital Image Correlation, Dynamic Subset Size, Image Processing, Information Amount, Self-adaptive
Show / Hide Abstract

A Multi-Objective TRIBES/OC-SVM Approach for the Extraction of Areas of Interest from Satellite Images
Wafaa Benhabib and Hadria Fizazi
Page: 321~339, Vol. 13, No.2, 2017
10.3745/JIPS.02.0054

Keywords: Image Classification, MO-TRIBES, OC-SVM, Remote Sensing
Show / Hide Abstract

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System
Salima Lalani and D. D. Doye
Page: 340~347, Vol. 13, No.2, 2017
10.3745/JIPS.03.0067

Keywords: DWT, Fuzzy, SVD, Watermarking
Show / Hide Abstract

Image Restoration and Object Removal Using Prioritized Adaptive Patch-Based Inpainting in a Wavelet Domain
Rajesh P. Borole and Sanjiv V. Bonde
Page: 1183~1202, Vol. 13, No.5, 2017
10.3745/JIPS.02.0031

Keywords: Image Inpainting, Object Removal, Region Filling, Texture and Structure Propagation, Wavelet Inpainting
Show / Hide Abstract

Design of Real-Time CAN Framework Based on Plug and Play Functionality
Sungheo Kim and Kwang-il Hwang
Page: 348~359, Vol. 13, No.2, 2017
10.3745/JIPS.03.0071

Keywords: Controller Area Networks, Plug and Play, Real-Time
Show / Hide Abstract

Block Sparse Signals Recovery via Block BacktrackingBased Matching Pursuit Method
Rui Qi, Yujie Zhang and Hongwei Li
Page: 360~369, Vol. 13, No.2, 2017
10.3745/JIPS.04.0030

Keywords: Block Sparse Signal, Compressed Sensing, Sparse Signal Reconstruction
Show / Hide Abstract

Unsupervised Segmentation of Images Based on Shuffled Frog-Leaping Algorithm
Amel Tehami* and Hadria Fizazi
Page: 370~384, Vol. 13, No.2, 2017
10.3745/JIPS.02.0055

Keywords: Image, K-means, Meta-Heuristic, Optimization, SFLA, Unsupervised Segmentation
Show / Hide Abstract

Speech Query Recognition for Tamil Language Using Wavelet and Wavelet Packets
P. Iswarya and V. Radha
Page: 1135~1148, Vol. 13, No.5, 2017
10.3745/JIPS.02.0033

Keywords: De-noising, Feature Extraction, Speech Recognition, Support Vector Machine, Wavelet Packet
Show / Hide Abstract

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 385~399, Vol. 13, No.2, 2017
10.3745/JIPS.03.0070

Keywords: Fragile Watermarking, Local Binary Pattern (LBP), Least Significant Bit (LSB), Tamper Detection and Localization
Show / Hide Abstract

Boosting the Reasoning-Based Approach by Applying Structural Metrics for Ontology Alignment
Abderrahmane Khiat and Moussa Benaissa
Page: 834~851, Vol. 13, No.4, 2017
10.3745/JIPS.02.0034

Keywords: Description Logics Inference, Intra-Taxonomy Measures, Ontology Alignment, Semantic Interoperability, Semantic Web, Structural Similarity
Show / Hide Abstract

Rough Set-Based Approach for Automatic Emotion Classification of Music
Babu Kaji Baniya and Joonwhoan Lee
Page: 400~416, Vol. 13, No.2, 2017
10.3745/JIPS.04.0032

Keywords: Attributes, Covariance, Discretize, Rough Set, Rules
Show / Hide Abstract

A Power Allocation Algorithm Based on Variational Inequality Problem for Cognitive Radio Networks
Ming-Yue Zhou and Xiao-Hui Zhao
Page: 417~427, Vol. 13, No.2, 2017
10.3745/JIPS.03.0068

Keywords: Cognitive Radio, Power Allocation, Variational Inequality
Show / Hide Abstract

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform
Geeta Kasana, Kulbir Singh and Satvinder Singh Bhatia
Page: 1331~1344, Vol. 13, No.5, 2017
10.3745/JIPS.03.0042

Keywords: Arnold Transform, DWT, JPEG, JPEG2000, PSNR, SIM
Show / Hide Abstract

New Approaches to Advanced Network and Image Processing
Jong Hyuk Park
Page: 429~434, Vol. 13, No.3, 2017
10.3745/JIPS.00.0005

Keywords:
Show / Hide Abstract

Granular Bidirectional and Multidirectional Associative Memories: Towards a Collaborative Buildup of Granular Mappings
Witold Pedrycz
Page: 435~447, Vol. 13, No.3, 2017
10.3745/JIPS.02.0058

Keywords: Allocation of Information Granularity and Optimization, Bidirectional Associative Memory, Collaborative Clustering, Granular Computing, Multi-directional Associative Memory, Prototypes
Show / Hide Abstract

Blind Image Quality Assessment on Gaussian Blur Images
Liping Wang, Chengyou Wang and Xiao Zhou
Page: 448~463, Vol. 13, No.3, 2017
10.3745/JIPS.02.0059

Keywords: Blind Image Quality Assessment (BIQA), Gaussian Blur Image, Saliency Map, Structure Tensor, Structural Similarity (SSIM)
Show / Hide Abstract

NDynamic Framework for Secure VM Migration over Cloud Computing
Suresh B. Rathod and V. Krishna Reddy
Page: 476~490, Vol. 13, No.3, 2017
10.3745/JIPS.01.0015

Keywords: Cloud Computing, Datacenter (DC), Host Controller, Physical Host, Virtual Machine (VM)
Show / Hide Abstract

A Fast Ground Segmentation Method for 3D Point Cloud
Phuong Chu, Seoungjae Cho, Sungdae Sim, Kiho Kwak and Kyungeun Cho
Page: 491~499, Vol. 13, No.3, 2017
10.3745/JIPS.02.0061

Keywords: 3D Point Cloud, Ground Segmentation, Light Detection and Ranging, Start-Ground Point, Threshold Point
Show / Hide Abstract

An Improved Zone-Based Routing Protocol for Heterogeneous Wireless Sensor Networks
Liquan Zhao and Nan Chen
Page: 500~517, Vol. 13, No.3, 2017
10.3745/JIPS.03.0072

Keywords: Energy Consumption, Heterogeneous Wireless Sensor Networks, Stable Election Protocol, Zone-Based
Show / Hide Abstract

Improvement of OPW-TR Algorithm for Compressing GPS Trajectory Data
Qingbin Meng, Xiaoqiang Yu, Chunlong Yao, Xu Li, Peng Li and Xin Zhao
Page: 533~545, Vol. 13, No.3, 2017
10.3745/JIPS.03.0073

Keywords: ASED, GPS Trajectory, SED, Trajectory Compression
Show / Hide Abstract

Multicast Tree Construction with User-Experienced Quality for Multimedia Mobile Networks
Hoejung Jung and Namgi Kim
Page: 546~558, Vol. 13, No.3, 2017
10.3745/JIPS.01.0017

Keywords: GTM, Mobile Network, Multicast Tree Construction, SDN
Show / Hide Abstract

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution
Manmeet Mahinderjit Singh, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin and Nurul Hashimah Ahamed Hassain Malim
Page: 559~572, Vol. 13, No.3, 2017
10.3745/JIPS.04.0033

Keywords: Cyberbullying, Digital Etiquette, Intrusion Detection System, Mobile Application, Social Network
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017
10.3745/JIPS.04.0034

Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

Fire Detection Using Multi-Channel Information and Gray Level Co-occurrence Matrix Image Features
Jae-Hyun Jun, Min-Jun Kim, Yong-Suk Jang and Sung-Ho Kim
Page: 590~598, Vol. 13, No.3, 2017
10.3745/JIPS.02.0062

Keywords: Color Features, Fire Detection, Texture Features
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017
10.3745/JIPS.03.0074

Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

Outage Performance of Selective Dual-Hop MIMO Relaying with OSTBC and Transmit Antenna Selection in Rayleigh Fading Channels
In-Ho Lee, Hyun-Ho Choi and Howon Lee
Page: 1071~1088, Vol. 13, No.5, 2017
10.3745/JIPS.03.0077

Keywords: Dual-Hop Relaying, Orthogonal Space-Time Block Code, Outage Probability, Rayleigh Fading, Transmit Antenna Selection
Show / Hide Abstract

HESnW: History Encounters-Based Spray-and-Wait Routing Protocol for Delay Tolerant Networks
Shunyi Gan, Jipeng Zhou and Kaimin Wei
Page: 618~629, Vol. 13, No.3, 2017
10.3745/JIPS.03.0075

Keywords: Delivery Cost, DTNs, History Node, Multiple Probability, Spray-and-Wait
Show / Hide Abstract

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 1382~1396, Vol. 13, No.5, 2017
10.3745/JIPS.02.0063

Keywords: Digital Image Watermarking, Semi-fragile Watermarking, False Detection, Local Binary Pattern (LBP), Arnold Transform
Show / Hide Abstract

Achievable Rate Analysis for Opportunistic Non-orthogonal Multiple Access-Based Cooperative Relaying Systems
In-Ho Lee and Howon Lee
Page: 630~642, Vol. 13, No.3, 2017
10.3745/JIPS.03.0076

Keywords: Achievable Rate Analysis, Decode-and-Forward Relaying, Non-orthogonal Multiple Access, Opportunistic Transmission, Rayleigh Fading Channels, Superposition Coding
Show / Hide Abstract

Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning
Jong Hyuk Park
Page: 643~652, Vol. 13, No.4, 2017
10.3745/JIPS.00.0006

Keywords:
Show / Hide Abstract

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries
Carlos Porcel, Alberto Ching-López, Juan Bernabé-Moreno, Alvaro Tejeda-Lorente and Enrique Herrera-Viedma
Page: 653~667, Vol. 13, No.4, 2017
10.3745/JIPS.04.0035

Keywords: Digital Libraries, Dissemination of Information, Fuzzy Linguistic Modeling, Recommender Systems
Show / Hide Abstract

Hadoop Based Wavelet Histogram for Big Data in Cloud
Jeong-Joon Kim
Page: 668~676, Vol. 13, No.4, 2017
10.3745/JIPS.04.0036

Keywords: Big Data, Histogram, MapReduce, Wavelet
Show / Hide Abstract

Time-Delay and Amplitude Modified BP Imaging Algorithm of Multiple Targets for UWB Through-the-Wall Radar Imaging
Huamei Zhang, Dongdong Li, Jinlong Zhao and Haitao Wang
Page: 677~688, Vol. 13, No.4, 2017
10.3745/JIPS.02.0064

Keywords:
Show / Hide Abstract

Using Semantic Knowledge in the Uyghur-Chinese Person Name Transliteration
Alim Murat, Turghun Osman, Yating Yang, Xi Zhou, Lei Wang and Xiao Li
Page: 716~730, Vol. 13, No.4, 2017
10.3745/JIPS.02.0065

Keywords: Gender, Language Origin, Semantic Knowledge-based Model, Transliteration of Person Name
Show / Hide Abstract

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications
Daewon Kim
Page: 731~751, Vol. 13, No.4, 2017
10.3745/JIPS.04.0037

Keywords: Cloud, HTML5, JavaScript, Mobile
Show / Hide Abstract

An Innovative Approach of Bangla Text Summarization by Introducing Pronoun Replacement and Improved Sentence Ranking
Md. Majharul Haque, Suraiya Pervin and Zerina Begum
Page: 752~777, Vol. 13, No.4, 2017
10.3745/JIPS.04.0038

Keywords: Bangla News Document, Cosine Similarity, Dangling Pronoun, Pronoun Replacement, Sentence Frequency
Show / Hide Abstract

A Method of Chinese and Thai Cross-Lingual Query Expansion Based on Comparable Corpus
Peili Tang, Jing Zhao, Zhengtao Yu, Zhuo Wang and Yantuan Xian
Page: 805~817, Vol. 13, No.4, 2017
10.3745/JIPS.04.0039

Keywords: Comparable Corpus, Cross-Language Query Expansion, Cross-Language Information Retrieval, Words Relationship
Show / Hide Abstract

Real-Time Motion Blur Using Triangular Motion Paths
MinhPhuoc Hong and Kyoungsu Oh
Page: 818~833, Vol. 13, No.4, 2017
10.3745/JIPS.02.0066

Keywords: Motion Blur, Real-Time Rendering, Visibility
Show / Hide Abstract

A Text Similarity Measurement Method Based on Singular Value Decomposition and Semantic Relevance
Xu Li, Chunlong Yao, Fenglong Fan and Xiaoqiang Yu
Page: 863~875, Vol. 13, No.4, 2017
10.3745/JIPS.02.0067

Keywords: Natural Language Processing, Semantic Relevance, Singular Value Decomposition, Text Representation, Text Similarity Measurement
Show / Hide Abstract

Interactive Experience Room Using Infrared Sensors and User’s Poses
Green Bang, Jinsuk Yang, Kyoungsu Oh and Ilju Ko
Page: 876~892, Vol. 13, No.4, 2017
10.3745/JIPS.02.0068

Keywords: Human Pose Recognition, Infrared Sensor, Interactive Experience Room, Virtual Reality
Show / Hide Abstract

Weighted Local Naive Bayes Link Prediction
JieHua Wu, GuoJi Zhang, YaZhou Ren, XiaYan Zhang and Qiao Yang
Page: 914~927, Vol. 13, No.4, 2017
10.3745/JIPS.04.0040

Keywords: Complex Network, Link Prediction, Naive Bayes Model, Weighted Network
Show / Hide Abstract

CPU Scheduling with a Round Robin Algorithm Based on an Effective Time Slice
Mohammad M. Tajwar, Md. Nuruddin Pathan, Latifa Hussaini and Adamu Abubakar
Page: 941~950, Vol. 13, No.4, 2017
10.3745/JIPS.01.0018

Keywords: Average Turnaround Time, Average Waiting Time, CPU Processing Time, Round Robin Algorithm, Quantum Time
Show / Hide Abstract

Traffic Information Service Model Considering Personal Driving Trajectories
Homin Han and Soyoung Park
Page: 951~969, Vol. 13, No.4, 2017
10.3745/JIPS.03.0078

Keywords: GPS-to-Road Mapping Strategy, Personal Trajectory, Traffic Information System, Trajectory Estimation
Show / Hide Abstract

Identifying Influential People Based on Interaction Strength
Muhammad Azam Zia, Zhongbao Zhang, Liutong Chen, Haseeb Ahmad and Sen Su
Page: 987~999, Vol. 13, No.4, 2017
10.3745/JIPS.04.0041

Keywords: Influence, Interaction, IPRank, Micro-Blog, Online Social Network
Show / Hide Abstract

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs
Shailendra Rathore, Pradip Kumar Sharma and Jong Hyuk Park
Page: 1014~1028, Vol. 13, No.4, 2017
10.3745/JIPS.03.0079

Keywords: Cross-Site Scripting Attack Detection, Dataset, JavaScript, Machine Learning Classifier, Social Networking Services
Show / Hide Abstract

Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1043~1051, Vol. 13, No.5, 2017
10.3745/JIPS.00.0007

Keywords:
Show / Hide Abstract

A CTR Prediction Approach for Text Advertising Based on the SAE-LR Deep Neural Network
Zilong Jiang, Shu Gao and Wei Dai
Page: 1052~1070, Vol. 13, No.5, 2017
10.3745/JIPS.02.0069

Keywords: Deep Neural Network, Machine Learning, Text Advertising, SAE-LR
Show / Hide Abstract

Extraction of ObjectProperty-UsageMethod Relation from Web Documents
Chaveevan Pechsiri, Sumran Phainoun and Rapeepun Piriyakul
Page: 1103~1125, Vol. 13, No.5, 2017
10.3745/JIPS.04.0046

Keywords: Medicinal Property, N-Word-Co, Semantic Relation, Usage-Method
Show / Hide Abstract

3D Segmentation for High-Resolution Image Datasets Using a Commercial Editing Tool in the IoT Environment
Koojoo Kwon and Byeong-Seok Shin
Page: 1126~1134, Vol. 13, No.5, 2017
10.3745/JIPS.02.0070

Keywords: Segmentation, Large-Scale Image, Photo Editing, Visible Korean, Volume Rendering
Show / Hide Abstract

An Algorithm Solving SAT Problem Based on Splitting Rule and Extension Rule
Youjun Xu
Page: 1149~1157, Vol. 13, No.5, 2017
10.3745/JIPS.02.0071

Keywords: Extension Rule, IER, MOAMD Strategy, Satisfiability Problem, Splitting Rule
Show / Hide Abstract

Similarity Evalution between Graphs: A Formal Concept Analysis Approach
Fei Hao, Dae-Soo Sim, Doo-Soon Park and Hyung-Seok Seo
Page: 1158~1167, Vol. 13, No.5, 2017
10.3745/JIPS.04.0048

Keywords: Formal Concept Analysis, Graph, Social Networks, Similarity Evaluation
Show / Hide Abstract

Regularization Parameter Selection for Total Variation Model Based on Local Spectral Response
Yuhui Zheng, Kai Ma, Qiqiong Yu, Jianwei Zhang and Jin Wang
Page: 1168~1182, Vol. 13, No.5, 2017
10.3745/JIPS.02.0072

Keywords: Image Denoising, Local Spectral Response, Regularization Parameter Selection
Show / Hide Abstract

A Detailed Analysis of Classifier Ensembles for Intrusion Detection in Wireless Network
Bayu Adhi Tama and Kyung-Hyune Rhee
Page: 1203~1212, Vol. 13, No.5, 2017
10.3745/JIPS.03.0080

Keywords: Classifier Ensembles, Classifier’s Significance, Intrusion Detection Systems (IDSs), Wireless Network
Show / Hide Abstract

Thai Classical Music Matching using t-Distribution on Instantaneous Robust Algorithm for Pitch Tracking Framework
Pheerasut Boonmatham, Sunee Pongpinigpinyo and Tasanawan Soonklang
Page: 1213~1228, Vol. 13, No.5, 2017
10.3745/JIPS.02.0073

Keywords: Pitch Tracking Algorithm, Instantaneous Robust Algorithm for Pitch Tracking, T-Distribution, Shortest Query Sample
Show / Hide Abstract

Modeling and Simulation of Scheduling Medical Materials Using Graph Model for Complex Rescue
Ming Lv, Jingchen Zheng, Qingying Tong, Jinhong Chen, Haoting Liu and Yun Gao
Page: 1243~1258, Vol. 13, No.5, 2017
10.3745/JIPS.04.0042

Keywords: Bipartite Graph, BSCS, Drug Scheduling, Medical Rescue, Optimization Matching
Show / Hide Abstract

Spatio-temporal Sensor Data Processing Techniques
Jeong-Joon Kim
Page: 1259~1276, Vol. 13, No.5, 2017
10.3745/JIPS.04.0047

Keywords: Multi-dimensional Operator, Multi-dimensional Spatio-temporal Data Type, Sensor Networks, Sensor Query Processing System
Show / Hide Abstract

Efficiently Processing Skyline Query on Multi-Instance Data
Shu-I Chiu and Kuo-Wei Hsu
Page: 1277~1298, Vol. 13, No.5, 2017
10.3745/JIPS.04.0049

Keywords: Multi-Instance Data, Product Search, Ranking, Recommendation, Skyline Query Processing
Show / Hide Abstract

Sector Based Multiple Camera Collaboration for Active Tracking Applications
Sangjin Hong, Kyungrog Kim and Nammee Moon
Page: 1299~1319, Vol. 13, No.5, 2017
10.3745/JIPS.02.0074

Keywords: Active Tracking, Master-Slave, Object Dynamics, Sector-Based Representation
Show / Hide Abstract

A Tier-Based Duty-Cycling Scheme for Forest Monitoring
Fuquan Zhang, Deming Gao and In-Whee Joe
Page: 1320~1330, Vol. 13, No.5, 2017
10.3745/JIPS.04.0043

Keywords: Link Redundancy, Rechargeable Dynamic Duty Cycle, Tier, Wireless Sensor Networks
Show / Hide Abstract

Nearest Neighbor Based Prototype Classification Preserving Class Regions
Doosung Hwang and Daewon Kim
Page: 1345~1357, Vol. 13, No.5, 2017
10.3745/JIPS.04.0045

Keywords: Class Prototype, Dissimilarity, Greedy Method, Nearest-Neighbor Rule, Set Cover Optimization
Show / Hide Abstract

Analysis on Ampacity of Overhead Transmission Lines Being Operated
Zhijie Yan, Yanling Wang and Likai Liang
Page: 1358~1371, Vol. 13, No.5, 2017
10.3745/JIPS.04.0044

Keywords: Ampacity, Dynamic Thermal Rating, Rating Scales, Risk Level, Transmission Line
Show / Hide Abstract

Content-based Image Retrieval Using Texture Features Extracted from Local Energy and Local Correlation of Gabor Transformed Images
Hee-Hyung Bu, Nam-Chul Kim, Bae-Ho Lee and Sung-Ho Kim
Page: 1372~1381, Vol. 13, No.5, 2017
10.3745/JIPS.02.0075

Keywords: Content-based Image Retrieval, Gabor Transformation, Local Energy, Local Correlation, Texture Feature
Show / Hide Abstract

A Novel Statistical Feature Selection Approach for Text Categorization
Mohamed Abdel Fattah
Page: 1397~1409, Vol. 13, No.5, 2017
10.3745/JIPS.02.0076

Keywords: Electronic Texts, E-mail Filtering, Feature Selection, SMS Spam Filtering, Text Categorization
Show / Hide Abstract

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things
Youn-Hee Han, Hyun-Kyo Lim and Joon-Min Gil
Page: 1410~1429, Vol. 13, No.5, 2017
10.3745/JIPS.03.0081

Keywords: Internet of Things, Location Caching Scheme, Location Tracking, Mobile Computing, Mobile Object
Show / Hide Abstract

Efficient Approaches to Computer Vision and Pattern Recognition
Jong Hyuk Park
Page: 1431~1435, Vol. 13, No.6, 2017
10.3745/JIPS.00.0008

Keywords:
Show / Hide Abstract

A Survey on Asynchronous Quorum-Based Power Saving Protocols in Multi-Hop Networks
Mehdi Imani, Majid Joudaki, Hamid R. Arabnia and Niloofar Mazhari
Page: 1436~1458, Vol. 13, No.6, 2017
10.3745/JIPS.03.0082

Keywords: Ad Hoc Networks, Asynchronous Sleep Scheduling Protocols, Power Saving Protocols, Quorum Based Systems
Show / Hide Abstract

Task Management System According to Changes in the Situation Based on IoT
Cao Kerang, Hyunju Lee and Hoekyung Jung
Page: 1459~1466, Vol. 13, No.6, 2017
10.3745/JIPS.03.0083

Keywords: IoT, Priority, Sensor, Smart Home, Task Management System
Show / Hide Abstract

Number Plate Detection with a Multi-Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices
Christian Gerber and Mokdong Chung
Page: 100~108, Vol. 12, No.1, 2016
10.3745/JIPS.04.0022

Keywords: Convolutional Neural Network, Number Plate Detection, OCR
Show / Hide Abstract

Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model
Moulkheir Naoui, Saïd Mahmoudi and Ghalem Belalem
Page: 149~168, Vol. 12, No.1, 2016
10.3745/JIPS.02.0039

Keywords: Active Appearance Model, Data Parallelism, Deformable Model, Distributed Image Processing, Parallel Image Processing, Segmentation
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016
10.3745/JIPS.03.0047

Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching
Kenan Mu, Fei Hui and Xiangmo Zhao
Page: 183~195, Vol. 12, No.2, 2016
10.3745/JIPS.02.0040

Keywords: Computer Vision, Highway Traffic Surveillance, SIFT Feature Matching, Vehicle Detection, Vehicle Tracking
Show / Hide Abstract

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 196~213, Vol. 12, No.2, 2016
10.3745/JIPS.03.0037

Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE
Show / Hide Abstract

An Improved Algorithm for Redundancy Detection Using Global Value Numbering
Nabizath Saleena and Vineeth Paleri
Page: 214~225, Vol. 12, No.2, 2016
10.3745/JIPS.02.0014

Keywords: Equivalent Expression, Global Value Numbering, Herbrand Equivalence, Strong Equivalence Dag
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
10.3745/JIPS.03.0049

Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance
Kuldeep Gurjar and Yang-Sae Moon
Page: 234~248, Vol. 12, No.2, 2016
10.3745/JIPS.04.0024

Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score
Show / Hide Abstract

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Samaneh Mashhadi
Page: 249~262, Vol. 12, No.2, 2016
10.3745/JIPS.03.0050

Keywords: Non-repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016
10.3745/JIPS.04.0025

Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016
10.3745/JIPS.03.0032

Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks
Muhammad Sajjad Khan and Insoo Koo
Page: 295~309, Vol. 12, No.2, 2016
10.3745/JIPS.03.0040

Keywords: Cognitive Radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016
10.3745/JIPS.03.0021

Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

Resilient Packet Transmission (RPT) for Buffer Based Routing (BBR) Protocol
Geetanjali Rathee and Nitin Rakesh
Page: 57~72, Vol. 12, No.1, 2016
10.3745/JIPS.03.0014

Keywords: WMN, Resiliency, BBR, Routing, RPT
Show / Hide Abstract

An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping
Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa and Hasan Al-Shalabi
Page: 322~331, Vol. 12, No.2, 2016
10.3745/JIPS.03.0051

Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding
Show / Hide Abstract

Content Based Dynamic Texture Analysis and Synthesis Based on SPIHT with GPU
Premanand P Ghadekar and Nilkanth B Chopade
Page: 46~56, Vol. 12, No.1, 2016
10.3745/JIPS.02.0009

Keywords: Discrete Wavelet Transform, Dynamic Texture, GPU, SPIHT, SVD
Show / Hide Abstract

[Editorial] Advanced Technologies and Applications for Security and Multimedia Computing
Jong Hyuk Park
Page: 333~337, Vol. 12, No.3, 2016
10.3745/JIPS.00.0001

Keywords:
Show / Hide Abstract

Survey on 3D Surface Reconstruction
Alireza Khatamian and Hamid R. Arabnia
Page: 338~357, Vol. 12, No.3, 2016
10.3745/JIPS.01.0010

Keywords: Explicit Surfaces, Implicit Surfaces, Point Cloud, Surface Reconstruction
Show / Hide Abstract

A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic
Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef and Lamia Belguith Hadrich
Page: 358~380, Vol. 12, No.3, 2016
10.3745/JIPS.02.0041

Keywords: Alkhalil Morphological Analyzer, Approach to Multi-Criteria Decision (MCA), Arabic Language Processing (ALP), Augmented Transition Networks (ATNs), Contextual Exploration, Tagging, Diacritization, Disambiguation Method, Segmentation
Show / Hide Abstract

Two-Dimensional Joint Bayesian Method for Face Verification
Sunghyu Han, Il-Yong Lee and Jung-Ho Ahn
Page: 381~391, Vol. 12, No.3, 2016
10.3745/JIPS.02.0036

Keywords: Face Verification, Joint Bayesian Method, LBP, LFW Database, Two-Dimensional Joint Bayesian Method
Show / Hide Abstract

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis
Leila Boussaad, Mohamed Benmohammed and Redha Benzid
Page: 392~409, Vol. 12, No.3, 2016
10.3745/JIPS.02.0043

Keywords: Active Appearance Model, Age-Invariant, Face Recognition, Kernel Fisher Analysis, 2D-Discrete Cosine Transform
Show / Hide Abstract

Landmark-Guided Segmental Speech Decoding for Continuous Mandarin Speech Recognition
Hao Chao and Cheng Song
Page: 410~421, Vol. 12, No.3, 2016
10.3745/JIPS.03.0052

Keywords: Decoding, Landmark, Mandarin, Speech Recognition, Segment Model
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
10.3745/JIPS.03.0045

Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
10.3745/JIPS.03.0048

Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

Bilingual Multiword Expression Alignment by Constituent-Based Similarity Score
Hyeong-Won Seo, Hongseok Kwon, Min-Ah Cheon and Jae-Hoon Kim
Page: 455~467, Vol. 12, No.3, 2016
10.3745/JIPS.02.0044

Keywords: Bilingual Lexicon, Compositionality, Context Vector, Multiword Expression, MWE Alignment, Pivot Language
Show / Hide Abstract

Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification
Chouchane Ammar*, Belahcene Mebarka, Ouamane Abdelmalik and Bourennane Salah
Page: 468~488, Vol. 12, No.3, 2016
10.3745/JIPS.02.0037

Keywords: 3D Face Verification, Depth Image, Dimensionality Reduction, Histograms Local Features, Local Descriptors, Support Vector Machine
Show / Hide Abstract

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet
Jeong Kyu Lee, Seo Yeon Moon and Jong Hyuk Park
Page: 489~501, Vol. 12, No.3, 2016
10.3745/JIPS.01.0009

Keywords: Future Internet, Human Behavior, Intrusion Prevention, Malware Detection
Show / Hide Abstract

A Multiple Features Video Copy Detection Algorithm Based on a SURF Descriptor
Yanyan Hou, Xiuzhen Wang and Sanrong Liu
Page: 502~510, Vol. 12, No.3, 2016
10.3745/JIPS.02.0042

Keywords: Local Invariant Feature, Speeded-Up Robust Features, Video Copy Detection
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016
10.3745/JIPS.03.0039

Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016
10.3745/JIPS.03.0054

Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

A Security Protection Framework for Cloud Computing
Wenzheng Zhu and Changhoon Lee
Page: 538~547, Vol. 12, No.3, 2016
10.3745/JIPS.03.0053

Keywords: Cloud Computing, Collusive Worker, Malicious Worker, MapReduce, Non-collusive Worker
Show / Hide Abstract

[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors
Jong Hyuk Park
Page: 549~554, Vol. 12, No.4, 2016
10.3745/JIPS.00.0002

Keywords:
Show / Hide Abstract

A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform
Ibtissem Bekkouche and Hadria Fizazi
Page: 555~576, Vol. 12, No.4, 2016
10.3745/JIPS.02.0047

Keywords: Fourier Transform, Fuzzy Clustering, Harmony Search, Processing Image, Remote Sensing
Show / Hide Abstract

Community Model for Smart TV over the Top Services
Suman Pandey, Young Joon Won, Mi-Jung Choi and Joon-Min Gil
Page: 577~590, Vol. 12, No.4, 2016
10.3745/JIPS.03.0057

Keywords: Community Formation, Datamining, HbbTV, Smart TV
Show / Hide Abstract

Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images
Arif Muntasa
Page: 591~611, Vol. 12, No.4, 2016
10.3745/JIPS.01.0011

Keywords: Eigenspaces, Feature Extraction, Homogeneous, Non-homogeneous
Show / Hide Abstract

Interactive Authoring Tool for Mobile Augmented Reality Content
Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim and Yoo-Joo Cho
Page: 612~630, Vol. 12, No.4, 2016
10.3745/JIPS.02.0048

Keywords: Augmented Reality, Authoring Tool, Interactive Mobile, Mobile App
Show / Hide Abstract

Image Deblocking Scheme for JPEG Compressed Images Using an Adaptive-Weighted Bilateral Filter
Liping Wang, Chengyou Wang, Wei Huang and Xiao Zhou
Page: 631~643, Vol. 12, No.4, 2016
10.3745/JIPS.02.0046

Keywords: Image Deblocking, Adaptive-Weighted Bilateral Filter, Blind Image Quality Assessment (BIQA), Local Entropy
Show / Hide Abstract

A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features
Mohamed Belaoued and Smaine Mazouzi
Page: 644~660, Vol. 12, No.4, 2016
10.3745/JIPS.03.0058

Keywords: Chi-Square Test, Malware Analysis, PE-Optional Header, Real-Time Detection Windows API
Show / Hide Abstract

Segmentation and Recognition of Korean Vehicle License Plate Characters Based on the Global Threshold Method and the Cross-Correlation Matching Algorithm
Md. Mostafa Kamal Sarker and Moon Kyou Song
Page: 661~680, Vol. 12, No.4, 2016
10.3745/JIPS.02.0050

Keywords: Cross-Correlation, Global Threshold, License Plate Recognition, Radon Transformation, Traffic Surveillance
Show / Hide Abstract

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique
Salima Lalani and D. D. Doye
Page: 681~687, Vol. 12, No.4, 2016
10.3745/JIPS.02.0045

Keywords: DWT, Image Watermarking, Torus
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016
10.3745/JIPS.03.0056

Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

Treatment Planning in Smart Medical: A Sustainable Strategy
Fei Hao, Doo-Soon Park, Sang Yeon Woo, Se Dong Min and Sewon Park
Page: 711~723, Vol. 12, No.4, 2016
10.3745/JIPS.04.0026

Keywords: Degree of Membership, Fuzzy Evaluation, Smart Medical, Sustainable, Treatment Plan
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016
10.3745/JIPS.01.0012

Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

A Robust Fingerprint Matching System Using Orientation Features
Ravinder Kumar, Pravin Chandra and Madasu Hanmandlu
Page: 83~99, Vol. 12, No.1, 2016
10.3745/JIPS.02.0020

Keywords: Circular ROI, Core Point Detection, Image-Based Fingerprint Matching, Orientation Features
Show / Hide Abstract

Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke
Meeyeon Lee, Ye-Seul Park and Jung-Won Lee
Page: 741~753, Vol. 12, No.4, 2016
10.3745/JIPS.04.0027

Keywords: Acute Myocardial Infarction, Data Model, Hospital Information System, Ischemic Stroke, Medical Image, Medical Information, Ontology
Show / Hide Abstract

Sparsification of Digital Images Using Discrete Rajan Transform
Kethepalli Mallikarjuna, Kodati Satya Prasad and M. V. Subramanyam
Page: 754~764, Vol. 12, No.4, 2016
10.3745/JIPS.02.0049

Keywords: Degree of Sparsity, Discrete Rajan Transform, Sparsification
Show / Hide Abstract

Blind Color Image Watermarking Based on DWT and LU Decomposition
Dongyan Wang, Fanfan Yang and Heng Zhang
Page: 765~778, Vol. 12, No.4, 2016
10.3745/JIPS.03.0055

Keywords: Digital Color Image Watermark, Discrete Wavelet Transformation (DWT), LU Decomposition, Normalized Correlation (NC), Structural Similarity (SSIM)
Show / Hide Abstract

Soft Set Theory Oriented Forecast Combination Method for Business Failure Prediction
Wei Xu and Zhi Xiao
Page: 109~128, Vol. 12, No.1, 2016
10.3745/JIPS.04.0016

Keywords: Business Failure Prediction, Combined Forecasting Method, Qualitative Analysis, Quantitative Analysis, Receiver Operating Characteristic Curve, Soft Set Theory
Show / Hide Abstract

X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach
Sajid Ullah Khan, Wang Yin Chai, Chai Soo See and Amjad Khan
Page: 35~45, Vol. 12, No.1, 2016
10.3745/JIPS.02.0029

Keywords: Image Enhancement, Image Fusion, Poisson/Impulse Noise, Sharpening, Wavelet Transform
Show / Hide Abstract

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks
Sang-Seon Byun
Page: 73~82, Vol. 12, No.1, 2016
10.3745/JIPS.03.0041

Keywords: Cognitive Radio Networks, Congestion Control, TCP, USRP
Show / Hide Abstract

Analysis of Semantic Relations Between Multimodal Medical Images Based on Coronary Anatomy for Acute Myocardial Infarction
Yeseul Park, Meeyeon Lee, Myung-Hee Kim and Jung-Won Lee
Page: 129~148, Vol. 12, No.1, 2016
10.3745/JIPS.04.0021

Keywords: Acute Myocardial Infarction, Coronary Anatomy, Coronary Angiography, Data Model, Echocardiography, Medical Images, Multimodality, Semantic Features
Show / Hide Abstract

Personalizing Information Using Users’ Online Social Networks: A Case Study of CiteULike
Danielle Lee
Page: 1~21, Vol. 11, No.1, 2015
10.3745/JIPS.04.0014

Keywords: CiteULike, Homophily, Information Personalization, Online Social Networks, Social Network-based Recommendations
Show / Hide Abstract

GMM-Based Maghreb Dialect IdentificationSystem
Lachachi Nour-Eddine and Adla Abdelkader
Page: 22~38, Vol. 11, No.1, 2015
10.3745/JIPS.02.0015

Keywords: Core-Set, Gaussian Mixture Models (GMM), Kernel Methods, Minimal Enclosing Ball (MEB), Quadratic Programming (QP), Support Vector Machines (SVMs), Universal Background Model (UBM)
Show / Hide Abstract

A Real-Time Integrated Hierarchical Temporal Memory Network for the Real-Time Continuous Multi-Interval Prediction of Data Streams
Hyun-Syug Kang
Page: 39~56, Vol. 11, No.1, 2015
10.3745/JIPS.02.0011

Keywords: Data Streams, Hierarchical Temporal Memory, Multiple Interval Prediction, Real-Time Prediction
Show / Hide Abstract

Selection of the Best Two-Hop AF Wireless Link under Multiple Antenna Schemes over a Fading Channel
Abu Sayed Md. Mostafizur Rahaman, Md. Imdadul Islam and M.R. Amin
Page: 57~75, Vol. 11, No.1, 2015
10.3745/JIPS.03.0023

Keywords: Ergodic Capacity, OFDM, OSTBC, Space Diversity, TAS, Wideband Slope
Show / Hide Abstract

Viewer’s Affective Feedback for Video Summarization
Majdi Dammak, Ali Wali and Adel M. Alimi
Page: 76~94, Vol. 11, No.1, 2015
10.3745/JIPS.01.0006

Keywords: Affective Computing, Emotion, FABO, K-NN, Motion Recognition, PCA, Video Summarization
Show / Hide Abstract

A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags
Haejae Jung
Page: 95~103, Vol. 11, No.1, 2015
10.3745/JIPS.03.0010

Keywords: RFID tag identification, anti-collision protocol, data structure, query tree
Show / Hide Abstract

Penetration Testing and Network Auditing: Linux
Deris Stiawan, Mohd. Yazid Idris and Abdul Hanan Abdullah
Page: 104~115, Vol. 11, No.1, 2015
10.3745/JIPS.03.0013

Keywords: Network attack, network auditing, network forensic
Show / Hide Abstract

Energy Consumption Scheduling in a Smart Grid Including Renewable Energy
Nadia Boumkheld, Mounir Ghogho and Mohammed El Koutbi
Page: 116~124, Vol. 11, No.1, 2015
10.3745/JIPS.03.0022

Keywords: Demand Response, Energy Management, Energy Scheduling, Optimization
Show / Hide Abstract

Fast Device Discovery for Remote Device Management in Lighting Control Networks
Sang-Il Choi, Sanghun Lee, Seok-Joo Koh, Sang-Kyu Lim, Insu Kim and Tae-Gyu Kang
Page: 125~133, Vol. 11, No.1, 2015
10.3745/JIPS.03.0011

Keywords: Device Discovery, Partition-Based, RDM
Show / Hide Abstract

Spatial Interpolation of Meteorologic Variables in Vietnam using the Kriging Method
Xuan Thanh Nguyen, Ba Tung Nguyen, Khac Phong Do, Quang Hung Bui, Thi Nhat Thanh Nguyen, Van Quynh Vuong and Thanh Ha Le
Page: 134~147, Vol. 11, No.1, 2015
10.3745/JIPS.02.0016

Keywords: Interpolation, Meteorologic Variables, Kriging
Show / Hide Abstract

An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks
Govind P. Gupta, Manoj Misra and Kumkum Garg
Page: 148~164, Vol. 11, No.1, 2015
10.3745/JIPS.03.0018

Keywords: Agent Migration Protocol, Data Aggregation, Mobile Agent, WSN
Show / Hide Abstract

Learning to Prevent Inactive Student of Indonesia Open University
Bayu Adhi Tama
Page: 165~172, Vol. 11, No.2, 2015
10.3745/JIPS.04.0015

Keywords: Educational Data Mining, Ensemble Techniques, Inactive Student, Open University
Show / Hide Abstract

Research on the E-Commerce Credit Scoring Model Using the Gaussian Density Function
Xiao Qiang, He Rui-chun and Zhang Wei
Page: 173~183, Vol. 11, No.2, 2015
10.3745/JIPS.04.0012

Keywords: Abnormal Point, Credit Scoring, Density, E-commerce
Show / Hide Abstract

A Note on Computing the Crisp Order Context of a Fuzzy Formal Context for Knowledge Reduction
Prem Kumar Singh and Ch. Aswani Kumar
Page: 184~204, Vol. 11, No.2, 2015
10.3745/JIPS.04.0009

Keywords: Crisp Context, Concept Lattice, Formal Concept Analysis, Fuzzy Formal Concept, Fuzzy Relation, Knowledge Reduction
Show / Hide Abstract

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
Amine Dahane, Nasr-Eddine Berrached and Abdelhamid Loukil
Page: 205~228, Vol. 11, No.2, 2015
10.3745/JIPS.02.0019

Keywords: Clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks
Show / Hide Abstract

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang and Kimoon Jeong
Page: 229~238, Vol. 11, No.2, 2015
10.3745/JIPS.03.0026

Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Show / Hide Abstract

Genetic Symmetric Key Generation for IDEA
Nandini Malhotra and Geeta Nagpal
Page: 239~247, Vol. 11, No.2, 2015
10.3745/JIPS.03.0017

Keywords: Crossover, IDEA, Genetic Algorithm, Mutation, Symmetric Key Generation
Show / Hide Abstract

A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation
Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee and Hong-Woo Chun
Page: 248~265, Vol. 11, No.2, 2015
10.3745/JIPS.04.0008

Keywords: Bioinformatics, Event Extraction, Maximum Entropy, Text-Mining
Show / Hide Abstract

Counter Chain: A New Block Cipher Mode of Operation
Aly Mohamed El-Semary and Mohamed Mostafa A. Azim
Page: 266~279, Vol. 11, No.2, 2015
10.3745/JIPS.03.0031

Keywords: Authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
Show / Hide Abstract

Biological Infectious Watermarking Model for Video Copyright Protection
Bong-Joo Jang, Suk-Hwan Lee, SangHun Lim and Ki-Ryong Kwon
Page: 280~294, Vol. 11, No.2, 2015
10.3745/JIPS.02.0013

Keywords: Biological Virus Modeling, Copyright Protection, Infectious Watermarking, Video Watermarking
Show / Hide Abstract

An Adaptive Superframe Duration Allocation Algorithm for Resource-Efficient Beacon Scheduling
Young-Ae Jeon, Sang-Sung Choi, Dae-Young Kim and Kwang-il Hwang
Page: 295~309, Vol. 11, No.2, 2015
10.3745/JIPS.03.0025

Keywords: Beacon Scheduling, Energy Efficient, IEEE802.15.4, IEEE802.15.4e, LR-WPAN, Superframe Duration Allocation
Show / Hide Abstract

Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map
Mishal Almazrooie, Azman Samsudin and Manmeet Mahinderjit Singh
Page: 310~324, Vol. 11, No.2, 2015
10.3745/JIPS.02.0024

Keywords: Chaos Theory, Cryptography, Differential Attacks, Hash Function, Logistic Map, Salsa20, Stream Cipher
Show / Hide Abstract

A Dataset of Online Handwritten Assamese Characters
Udayan Baruah and Shyamanta M. Hazarika
Page: 325~341, Vol. 11, No.3, 2015
10.3745/JIPS.02.0008

Keywords: Assamese, Character Recognition, Dataset Collection, Data Verification, Online Handwriting, Support Vector Machine
Show / Hide Abstract

Sparse Channel Estimation of Single Carrier Frequency Division Multiple Access Based on Compressive Sensing
Yuan-Hong Zhong, Zhi-Yong Huang, Bin Zhu and Hua Wu
Page: 342~353, Vol. 11, No.3, 2015
10.3745/JIPS.03.0028

Keywords: Compressive Sensing, Random Pilot Pattern, SC-FDMA, Sparse Channel Estimation
Show / Hide Abstract

A Review of Fixed-Complexity Vector Perturbation for MU-MIMO
Manar Mohaisen
Page: 354~369, Vol. 11, No.3, 2015
10.3745/JIPS.03.0035

Keywords: Block Diagonalization, MU-MIMO, Perfect and Imperfect Channel Knowledge, Quantization, Vector Perturbation
Show / Hide Abstract

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Siti Nurmaini and Ahmad Zarkasi
Page: 370~388, Vol. 11, No.3, 2015
10.3745/JIPS.01.0008

Keywords: Localization Process, RAM-Based Neural Network, Swarm Robots
Show / Hide Abstract

A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases
Si-Woo Byun and Seok-Woo Jang
Page: 389~405, Vol. 11, No.3, 2015
10.3745/JIPS.04.0017

Keywords: Column-Aware Index Management, Column-Oriented Databases, Flash Memory Storage, Game Database, Network Database
Show / Hide Abstract

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Souad Bekkouch and Kamel Mohamed Faraoun
Page: 406~420, Vol. 11, No.3, 2015
10.3745/JIPS.02.0021

Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform
Show / Hide Abstract

Classification of Textured Images Based on Discrete Wavelet Transform and Information Fusion
Chaimae Anibou, Mohammed Nabil Saidi and Driss Aboutajdine
Page: 421~437, Vol. 11, No.3, 2015
10.3745/JIPS.02.0028

Keywords: Discrete Wavelet Transform, Feature Extraction, Fuzzy Set Theory, Information Fusion, Probability Theory, Segmentation, Supervised Classification
Show / Hide Abstract

A Lightweight and Effective Music Score Recognition on Mobile Phones
Tam Nguyen and Gueesang Lee
Page: 438~449, Vol. 11, No.3, 2015
10.3745/JIPS.02.0023

Keywords: Mobile Camera, Music Score, SVM, Symbol Classification
Show / Hide Abstract

Comparative Study of Various Persian Stemmers in the Field of Information Retrieval
Fatemeh Momenipour Moghadam and MohammadReza Keyvanpour
Page: 450~464, Vol. 11, No.3, 2015
10.3745/JIPS.04.0020

Keywords: Lookup Table Stemmer, Stemmer, Statistical Stemmer, Structural Stemmer
Show / Hide Abstract

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks
Chang Liu, Sang-Hwa Chung, Han-You Jeong and Ik-Joo Jung
Page: 465~482, Vol. 11, No.3, 2015
10.3745/JIPS.03.0027

Keywords: Contention Window, IEEE 802.11p, MAC Layer, Message Priority, Vehicular Network
Show / Hide Abstract

Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments
Maheshi B. Dissanayake and Dilanga L. B. Abeyrathna
Page: 483~494, Vol. 11, No.3, 2015
10.3745/JIPS.03.0036

Keywords: Complexity, Compression Efficiency, HEVC, H.264/AVC, Latency
Show / Hide Abstract

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms
Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki and Driss Aboutajdine
Page: 495~508, Vol. 11, No.4, 2015
10.3745/JIPS.02.0032

Keywords: Copyright Protection, Mammograms, Medical Image, Robust Watermarking, Visual Cryptography
Show / Hide Abstract

Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage
Nawel Bendimerad and Bouabdellah Kechar
Page: 509~527, Vol. 11, No.4, 2015
10.3745/JIPS.03.0034

Keywords: Coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks
Show / Hide Abstract

Text Detection in Scene Images Based on Interest Points
Minh Hieu Nguyen and Gueesang Lee
Page: 528~537, Vol. 11, No.4, 2015
10.3745/JIPS.02.0026

Keywords: Connected Component, Interest Point, Tensor Voting, Text Detection
Show / Hide Abstract

Event Detection on Motion Activities Using a Dynamic Grid
Jitdumrong Preechasuk and Punpiti Piamsa-nga
Page: 538~555, Vol. 11, No.4, 2015
10.3745/JIPS.02.0035

Keywords: Dynamic Grid Feature, Event Detection, Event Patterns, Pedestrian Activities
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015
10.3745/JIPS.02.0030

Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization
Seung-Shik Kang
Page: 573~582, Vol. 11, No.4, 2015
10.3745/JIPS.04.0018

Keywords: Consonant Normalization, Edit Distance, Korean Character, Normalization Factor
Show / Hide Abstract

Uniform Fractional Band CAC Scheme for QoS Provisioning in Wireless Networks
Md. Asadur Rahman, Mostafa Zaman Chowdhury and Yeong Min Jang
Page: 583~600, Vol. 11, No.4, 2015
10.3745/JIPS.03.0043

Keywords: Acceptance Factor, Call Admission Control (CAC), Call Blocking Probability (CBP), Call Dropping Probability (CDP), Channel Utilization, Uniform Fractional Band (UFB), Quality of Service (QoS)
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015
10.3745/JIPS.03.0044

Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process
G. A. Preethi and C. Chandrasekar
Page: 616~629, Vol. 11, No.4, 2015
10.3745/JIPS.03.0015

Keywords: Action, Heterogeneous Handoff, MDP, Policy Iteration, State
Show / Hide Abstract

Improved Dynamic Subjective Logic Model with Evidence Driven
Jiao-Hong Qiang, Wang-Xin Xin and Tian-Jun Feng
Page: 630~642, Vol. 11, No.4, 2015
10.3745/JIPS.03.0030

Keywords: Dynamic Weight, Evidence Driven, Subjective Logic
Show / Hide Abstract

Viewpoint Unconstrained Face Recognition Based on Affine Local Descriptors and Probabilistic Similarity
Yongbin Gao and Hyo Jong Lee
Page: 643~654, Vol. 11, No.4, 2015
10.3745/JIPS.02.0027

Keywords: Affine Scale Invariant Feature Transform, Face Recognition, Probabilistic Similarity
Show / Hide Abstract

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia and Farnoush Banaei-Kashani
Page: 1~22, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.001
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety
Show / Hide Abstract

Trivariate B-spline Approximation of Spherical Solid Objects
Junho Kim, Seung-Hyun Yoon and Yunjin Lee
Page: 23~35, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.023
Keywords: Trivariate B-spline Approximation, Volume Mesh Parameterization, Topological Sphere Model, Harmonic Mapping
Show / Hide Abstract

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks
Bharti Sharma, Ravinder Singh Bhatia and Awadhesh Kumar Singh
Page: 36~54, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.036
Keywords: MANET, Inter-Cluster, Intra-Cluster, Mutual Exclusion, Token Ring
Show / Hide Abstract

Stroke Width-Based Contrast Feature for Document Image Binarization
Le Thi Khue Van and Gueesang Lee
Page: 55~68, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.055
Keywords: Degraded Document Image, Binarization, Stroke Width, Contrast Feature, Text Boundary
Show / Hide Abstract

The Construction and Viterbi Decoding of New (2k, k, l) Convolutional Codes
Wanquan Peng and Chengchang Zhang
Page: 69~80, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.069
Keywords: Convolutional Codes, Block Codes, Double Loop Cyclic Codes, Matrix Decoding, Viterbi Algorithm
Show / Hide Abstract

Push-N-Scheme with Timeout for Content Delivery of Social Networking Services
Kyungkoo Jun
Page: 81~92, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.081
Keywords: Push Scheme, Content Delivery, SNS, Wait Time
Show / Hide Abstract

Gesture Input as an Out-of-band Channel
Oyuntungalag Chagnaadorj and Jiro Tanaka
Page: 92~102, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.092
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract