Search Word(s) in Title, Keywords, Authors, and Abstract: ITS

Fuzzy-Membership Based Writer Identification from Handwritten Devnagari Script
Rajiv Kumar, Kiran Kumar Ravulakollu and Rajesh Bhat
Page: 893~913, Vol. 13, No.4, 2017

Keywords: CPAR-2012, Devnagari, Fuzzy Membership, Handwritten Script, Writer Identification
Show / Hide Abstract

Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016
Jong Hyuk Park
Page: 1~7, Vol. 13, No.1, 2017

Show / Hide Abstract

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Page: 8~25, Vol. 13, No.1, 2017

Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

Self-Identification of Boundary’s Nodes in Wireless Sensor Networks
Kouider Elouahed Moustafa and Haffaf Hafid
Page: 128~140, Vol. 13, No.1, 2017

Keywords: Boundary Recognition, Military Applications, Military Surveillance, Wireless Sensor Network
Show / Hide Abstract

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017

Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Deep Learning in Genomic and Medical Image Data Analysis: Challenges and Approaches
Ning Yu, Zeng Yu, Feng Gu, Tianrui Li, Xinmin Tian and Yi Pan
Page: 204~214, Vol. 13, No.2, 2017

Keywords: Bioinformatics, Deep Learning, Deep Neural Networks, DNA Genome Analysis, Image Data Analysis, Machine Learning, lincRNA
Show / Hide Abstract

A Hybrid Bacterial Foraging Optimization Algorithm and a Radial Basic Function Network for Image Classification
Yasmina Teldja Amghar and Hadria Fizazi
Page: 215~235, Vol. 13, No.2, 2017

Keywords: Bacterial Foraging Optimization Algorithm, Hybrid, Image Classification, Radial Basic Function
Show / Hide Abstract

Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization
Sarah Hachemi Benziane and Abdelkader Benyettou
Page: 268~283, Vol. 13, No.2, 2017

Keywords: Biometrics, BPSO, GPU, Hand Vein, Identification, OTSU
Show / Hide Abstract

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System
Salima Lalani and D. D. Doye
Page: 340~347, Vol. 13, No.2, 2017

Keywords: DWT, Fuzzy, SVD, Watermarking
Show / Hide Abstract

Design of Real-Time CAN Framework Based on Plug and Play Functionality
Sungheo Kim and Kwang-il Hwang
Page: 348~359, Vol. 13, No.2, 2017

Keywords: Controller Area Networks, Plug and Play, Real-Time
Show / Hide Abstract

Unsupervised Segmentation of Images Based on Shuffled Frog-Leaping Algorithm
Amel Tehami* and Hadria Fizazi
Page: 370~384, Vol. 13, No.2, 2017

Keywords: Image, K-means, Meta-Heuristic, Optimization, SFLA, Unsupervised Segmentation
Show / Hide Abstract

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 385~399, Vol. 13, No.2, 2017

Keywords: Fragile Watermarking, Local Binary Pattern (LBP), Least Significant Bit (LSB), Tamper Detection and Localization
Show / Hide Abstract

Granular Bidirectional and Multidirectional Associative Memories: Towards a Collaborative Buildup of Granular Mappings
Witold Pedrycz
Page: 435~447, Vol. 13, No.3, 2017

Keywords: Allocation of Information Granularity and Optimization, Bidirectional Associative Memory, Collaborative Clustering, Granular Computing, Multi-directional Associative Memory, Prototypes
Show / Hide Abstract

Blind Image Quality Assessment on Gaussian Blur Images
Liping Wang, Chengyou Wang and Xiao Zhou
Page: 448~463, Vol. 13, No.3, 2017

Keywords: Blind Image Quality Assessment (BIQA), Gaussian Blur Image, Saliency Map, Structure Tensor, Structural Similarity (SSIM)
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017

Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017

Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

Hadoop Based Wavelet Histogram for Big Data in Cloud
Jeong-Joon Kim
Page: 668~676, Vol. 13, No.4, 2017

Keywords: Big Data, Histogram, MapReduce, Wavelet
Show / Hide Abstract

An Innovative Approach of Bangla Text Summarization by Introducing Pronoun Replacement and Improved Sentence Ranking
Md. Majharul Haque, Suraiya Pervin and Zerina Begum
Page: 752~777, Vol. 13, No.4, 2017

Keywords: Bangla News Document, Cosine Similarity, Dangling Pronoun, Pronoun Replacement, Sentence Frequency
Show / Hide Abstract

Real-Time Motion Blur Using Triangular Motion Paths
MinhPhuoc Hong and Kyoungsu Oh
Page: 818~833, Vol. 13, No.4, 2017

Keywords: Motion Blur, Real-Time Rendering, Visibility
Show / Hide Abstract

CPU Scheduling with a Round Robin Algorithm Based on an Effective Time Slice
Mohammad M. Tajwar, Md. Nuruddin Pathan, Latifa Hussaini and Adamu Abubakar
Page: 941~950, Vol. 13, No.4, 2017

Keywords: Average Turnaround Time, Average Waiting Time, CPU Processing Time, Round Robin Algorithm, Quantum Time
Show / Hide Abstract

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs
Shailendra Rathore, Pradip Kumar Sharma and Jong Hyuk Park
Page: 1014~1028, Vol. 13, No.4, 2017

Keywords: Cross-Site Scripting Attack Detection, Dataset, JavaScript, Machine Learning Classifier, Social Networking Services
Show / Hide Abstract

Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model
Moulkheir Naoui, Saïd Mahmoudi and Ghalem Belalem
Page: 149~168, Vol. 12, No.1, 2016

Keywords: Active Appearance Model, Data Parallelism, Deformable Model, Distributed Image Processing, Parallel Image Processing, Segmentation
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016

Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching
Kenan Mu, Fei Hui and Xiangmo Zhao
Page: 183~195, Vol. 12, No.2, 2016

Keywords: Computer Vision, Highway Traffic Surveillance, SIFT Feature Matching, Vehicle Detection, Vehicle Tracking
Show / Hide Abstract

An Improved Algorithm for Redundancy Detection Using Global Value Numbering
Nabizath Saleena and Vineeth Paleri
Page: 214~225, Vol. 12, No.2, 2016

Keywords: Equivalent Expression, Global Value Numbering, Herbrand Equivalence, Strong Equivalence Dag
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016

Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016

Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016

Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016

Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic
Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef and Lamia Belguith Hadrich
Page: 358~380, Vol. 12, No.3, 2016

Keywords: Alkhalil Morphological Analyzer, Approach to Multi-Criteria Decision (MCA), Arabic Language Processing (ALP), Augmented Transition Networks (ATNs), Contextual Exploration, Tagging, Diacritization, Disambiguation Method, Segmentation
Show / Hide Abstract

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet
Jeong Kyu Lee, Seo Yeon Moon and Jong Hyuk Park
Page: 489~501, Vol. 12, No.3, 2016

Keywords: Future Internet, Human Behavior, Intrusion Prevention, Malware Detection
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016

Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform
Ibtissem Bekkouche and Hadria Fizazi
Page: 555~576, Vol. 12, No.4, 2016

Keywords: Fourier Transform, Fuzzy Clustering, Harmony Search, Processing Image, Remote Sensing
Show / Hide Abstract

Community Model for Smart TV over the Top Services
Suman Pandey, Young Joon Won, Mi-Jung Choi and Joon-Min Gil
Page: 577~590, Vol. 12, No.4, 2016

Keywords: Community Formation, Datamining, HbbTV, Smart TV
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016

Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

Blind Color Image Watermarking Based on DWT and LU Decomposition
Dongyan Wang, Fanfan Yang and Heng Zhang
Page: 765~778, Vol. 12, No.4, 2016

Keywords: Digital Color Image Watermark, Discrete Wavelet Transformation (DWT), LU Decomposition, Normalized Correlation (NC), Structural Similarity (SSIM)
Show / Hide Abstract

X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach
Sajid Ullah Khan, Wang Yin Chai, Chai Soo See and Amjad Khan
Page: 35~45, Vol. 12, No.1, 2016

Keywords: Image Enhancement, Image Fusion, Poisson/Impulse Noise, Sharpening, Wavelet Transform
Show / Hide Abstract

Penetration Testing and Network Auditing: Linux
Deris Stiawan, Mohd. Yazid Idris and Abdul Hanan Abdullah
Page: 104~115, Vol. 11, No.1, 2015

Keywords: Network attack, network auditing, network forensic
Show / Hide Abstract

Energy Consumption Scheduling in a Smart Grid Including Renewable Energy
Nadia Boumkheld, Mounir Ghogho and Mohammed El Koutbi
Page: 116~124, Vol. 11, No.1, 2015

Keywords: Demand Response, Energy Management, Energy Scheduling, Optimization
Show / Hide Abstract

A Note on Computing the Crisp Order Context of a Fuzzy Formal Context for Knowledge Reduction
Prem Kumar Singh and Ch. Aswani Kumar
Page: 184~204, Vol. 11, No.2, 2015

Keywords: Crisp Context, Concept Lattice, Formal Concept Analysis, Fuzzy Formal Concept, Fuzzy Relation, Knowledge Reduction
Show / Hide Abstract

A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation
Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee and Hong-Woo Chun
Page: 248~265, Vol. 11, No.2, 2015

Keywords: Bioinformatics, Event Extraction, Maximum Entropy, Text-Mining
Show / Hide Abstract

Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map
Mishal Almazrooie, Azman Samsudin and Manmeet Mahinderjit Singh
Page: 310~324, Vol. 11, No.2, 2015

Keywords: Chaos Theory, Cryptography, Differential Attacks, Hash Function, Logistic Map, Salsa20, Stream Cipher
Show / Hide Abstract

A Review of Fixed-Complexity Vector Perturbation for MU-MIMO
Manar Mohaisen
Page: 354~369, Vol. 11, No.3, 2015

Keywords: Block Diagonalization, MU-MIMO, Perfect and Imperfect Channel Knowledge, Quantization, Vector Perturbation
Show / Hide Abstract

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Siti Nurmaini and Ahmad Zarkasi
Page: 370~388, Vol. 11, No.3, 2015

Keywords: Localization Process, RAM-Based Neural Network, Swarm Robots
Show / Hide Abstract

A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases
Si-Woo Byun and Seok-Woo Jang
Page: 389~405, Vol. 11, No.3, 2015

Keywords: Column-Aware Index Management, Column-Oriented Databases, Flash Memory Storage, Game Database, Network Database
Show / Hide Abstract

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Souad Bekkouch and Kamel Mohamed Faraoun
Page: 406~420, Vol. 11, No.3, 2015

Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform
Show / Hide Abstract

A Lightweight and Effective Music Score Recognition on Mobile Phones
Tam Nguyen and Gueesang Lee
Page: 438~449, Vol. 11, No.3, 2015

Keywords: Mobile Camera, Music Score, SVM, Symbol Classification
Show / Hide Abstract

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks
Chang Liu, Sang-Hwa Chung, Han-You Jeong and Ik-Joo Jung
Page: 465~482, Vol. 11, No.3, 2015

Keywords: Contention Window, IEEE 802.11p, MAC Layer, Message Priority, Vehicular Network
Show / Hide Abstract

Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage
Nawel Bendimerad and Bouabdellah Kechar
Page: 509~527, Vol. 11, No.4, 2015

Keywords: Coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015

Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization
Seung-Shik Kang
Page: 573~582, Vol. 11, No.4, 2015

Keywords: Consonant Normalization, Edit Distance, Korean Character, Normalization Factor
Show / Hide Abstract

Uniform Fractional Band CAC Scheme for QoS Provisioning in Wireless Networks
Md. Asadur Rahman, Mostafa Zaman Chowdhury and Yeong Min Jang
Page: 583~600, Vol. 11, No.4, 2015

Keywords: Acceptance Factor, Call Admission Control (CAC), Call Blocking Probability (CBP), Call Dropping Probability (CDP), Channel Utilization, Uniform Fractional Band (UFB), Quality of Service (QoS)
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015

Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process
G. A. Preethi and C. Chandrasekar
Page: 616~629, Vol. 11, No.4, 2015

Keywords: Action, Heterogeneous Handoff, MDP, Policy Iteration, State
Show / Hide Abstract

The Construction and Viterbi Decoding of New (2k, k, l) Convolutional Codes
Wanquan Peng and Chengchang Zhang
Page: 69~80, Vol. 10, No.1, 2014
Keywords: Convolutional Codes, Block Codes, Double Loop Cyclic Codes, Matrix Decoding, Viterbi Algorithm
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

The Design of the IIR Differintegrator and its Application in Edge Detection
Madhu Jain, Maneesha Gupta and N. K. Jain
Page: 223~239, Vol. 10, No.2, 2014
Keywords: Digital integrator, digital differentiator, edge detection and image processing
Show / Hide Abstract

Skin Segmentation Using YUV and RGB Color Spaces
Zaher Hamid Al-Tairi, Rahmita Wirza Rahmat, M. Iqbal Saripan and Puteri Suhaiza Sulaiman
Page: 283~299, Vol. 10, No.2, 2014
Keywords: Skin Segmentation, Thresholding Technique, Skin Detection, Color Space
Show / Hide Abstract

Training-Free Fuzzy Logic Based Human Activity Recognition
Eunju Kim and Sumi Helal
Page: 335~354, Vol. 10, No.3, 2014
Keywords: Activity Semantic Knowledge, Fuzzy Logic, Human Activity Recognition, Multi-Layer Neural Network
Show / Hide Abstract

Graphemes Segmentation for Arabic Online Handwriting Modeling
Houcine Boubaker, Najiba Tagougui, Haikal El Abed, Monji Kherallah and Adel M. Alimi
Page: 503~522, Vol. 10, No.4, 2014
Keywords: Baseline Detection, Diacritic Features, Fourier Descriptors, Geometric Parameters, Grapheme Segmentation, Online Arabic Handwriting Modeling
Show / Hide Abstract

Multimodal Biometric Using a Hierarchical Fusion of a Person’s Face, Voice, and Online Signature
Youssef Elmir, Zakaria Elberrichi and Réda Adjoudj
Page: 555~567, Vol. 10, No.4, 2014
Keywords: Hierarchical Fusion, LDA, Multimodal Biometric Fusion, PCA
Show / Hide Abstract

An Efficient Color Edge Detection Using the Mahalanobis Distance
Kittiya Khongkraphan
Page: 589~601, Vol. 10, No.4, 2014
Keywords: Color Image, Edge Detection, Mahalanobis Distance
Show / Hide Abstract

A Step towards User Privacy while Using Location-Based Services
Fizza Abbas and Heekuck Oh
Page: 618~627, Vol. 10, No.4, 2014
Keywords: Location Based Services, Location Privacy, Point of Interests
Show / Hide Abstract

Optical Character Recognition for Hindi Language Using a Neural-network Approach
Divakar Yadav, Sonia Sánchez-Cuadrado and Jorge Morato
Page: 117~140, Vol. 9, No.1, 2013
Keywords: OCR, Pre-processing, Segmentation, Feature Vector, Classification, Artificial Neural Network (ANN)
Show / Hide Abstract

An Improved Approach to Ranking Web Documents
Pooja Gupta, Sandeep K. Singh, Divakar Yadav and A. K. Sharma
Page: 217~236, Vol. 9, No.2, 2013
Keywords: Ranking, Ordering, WWW, Information Retrieval, Contextual Relevance, Contextual Sense, Web Documents
Show / Hide Abstract

A Secure Network for Mobile Wireless Service
Kun Peng
Page: 247~258, Vol. 9, No.2, 2013
Keywords: Mobile Wireless Network, Security
Show / Hide Abstract

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Om Prakash Verma, Munazza Nizam and Musheer Ahmad
Page: 271~286, Vol. 9, No.2, 2013
Keywords: Chaotic Systems, Number of Pixel Change Rate, Unified Average Changed Intensity, Correlation Coefficient, Entropy
Show / Hide Abstract

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do and Deokjai Choi
Page: 333~348, Vol. 9, No.2, 2013
Keywords: Gait Recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, Identification, Signal Processing
Show / Hide Abstract

Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine
Young Sup Hwang, Jin Baek Kwon, Jae Chan Moon and Seong Je Cho
Page: 395~404, Vol. 9, No.3, 2013
Keywords: adaptive classification, malicious web pages, support vector machine
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator
Panduranga H T, Dr. Naveen Kumar S K and Sharath Kumar H S
Page: 499~510, Vol. 9, No.3, 2013
Keywords: Image Encryption, Latin Square
Show / Hide Abstract

Developing a Dynamic Materialized View Index for Efficiently Discovering Usable Views for Progressive Queries
Chao Zhu, Qiang Zhu, Calisto Zuzarte and Wenbin Ma
Page: 511~537, Vol. 9, No.4, 2013
Keywords: Database, query processing, query optimization, progressive query, materialized view, index
Show / Hide Abstract

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model
Seok-Hwan Yoon and Joonyoung Min
Page: 621~632, Vol. 9, No.4, 2013
Keywords: Forest Fire Detection, Gaussian Mixture Models, HSL Color Space, Smoke Signature
Show / Hide Abstract

Optimal Software Release Using Time and Cost Benefits via Fuzzy Multi-Criteria and Fault Tolerance
Praveen Ranjan Srivastava
Page: 21~54, Vol. 8, No.1, 2012
Keywords: Software Testing, Fuzzy Multi-Criteria Approach, Fuzzy Logic, Fuzzy Rules Based, Confidence, Centre of Gravity, Fault Tolerance, Kilo Line of Code (KLOC), Software Development Effort (SDE), Software Test Effort (STE), Decision Makers (DM)
Show / Hide Abstract

A Dual Modeling Method for a Real-Time Palpation Simulator
Sang-Youn Kim, Sekil Park and Jinah Park
Page: 55~66, Vol. 8, No.1, 2012
Keywords: Haptic Feedback, Dual Model, Palpation, Real-Time Simulation, S-chain Model
Show / Hide Abstract

An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units
Sangpil Lee, Deokho Kim, Jaeyoung Yi and Won Woo Ro
Page: 159~174, Vol. 8, No.1, 2012
Keywords: General-Purpose Computation on a Graphics Processing Unit, SEED Block Cipher, Parallelism, Multi-Core Processors
Show / Hide Abstract

Attack and Correction: How to Design a Secure and Efficient Mix Network
Kun Peng
Page: 175~190, Vol. 8, No.1, 2012
Keywords: Mix Network, Correction
Show / Hide Abstract

An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators
B. John Oommen, Anis Yazidi and Ole-Christoffer Granmo
Page: 191~212, Vol. 8, No.2, 2012
Keywords: Weak es timators, User's Profiling, Time Varying Preferences
Show / Hide Abstract

Dynamic Replication Based on Availability and Popularity in the Presence of Failures
Bakhta Meroufel and Ghalem Belalem
Page: 263~278, Vol. 8, No.2, 2012
Keywords: Data Grid, Dynamic Replication, Availability, Failures, Best Client, Best Responsible, Data Management
Show / Hide Abstract

TBBench: A Micro-Benchmark Suite for Intel Threading Building Blocks
Ami Marowka
Page: 331~346, Vol. 8, No.2, 2012
Keywords: TBB, Micro-Benchmarks, Multi-Core, Parallel Overhead
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

Automatic Detection of Texture-defects using Texture-periodicity and Jensen-Shannon Divergence
V. Asha, N.U. Bhajantri and P. Nagabhushan
Page: 359~374, Vol. 8, No.2, 2012
Keywords: Periodicity, Jensen-Shannon Divergence, Cluster, Defect
Show / Hide Abstract

A Vision-Based Method to Find Fingertips in a Closed Hand
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal and J.L. Raheja
Page: 399~408, Vol. 8, No.3, 2012
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner Detection
Show / Hide Abstract

Performance Anomaly of the IEEE 802.11 DCF in Different Frame Error Rate Conditions
Koohong Kang
Page: 739~748, Vol. 8, No.4, 2012
Keywords: IEEE 802.11 DCF, Wireless LAN, Throughput and Delay Performance
Show / Hide Abstract

A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network
Jiehui Chen, Mariam B.Salim and Mitsuji Matsumoto
Page: 17~28, Vol. 7, No.1, 2011
Keywords: Mobile Target Tracking, Sensor Network, Clustering, Voronoi Diagram
Show / Hide Abstract

Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20
Mouhamed Abdulla and Yousef R. Shayan
Page: 43~52, Vol. 7, No.1, 2011
Keywords: MBWA, IEEE 802.20, Interference, Mobility, Degradation
Show / Hide Abstract

Accelerating the Sweep3D for a Graphic Processor Unit
Chunye Gong, Jie Liu, Haitao Chen, Jing Xie and Zhenghu Gong
Page: 63~74, Vol. 7, No.1, 2011
Keywords: Sweep3D, Neutron Transport, GPU, CUDA
Show / Hide Abstract

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs
Jung-Hwan Chang
Page: 75~84, Vol. 7, No.1, 2011
Keywords: Enhanced Pyramid Model, Hamiltonian Cycle, Edge-Disjoint Cycle
Show / Hide Abstract

Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits
Haiqing Nan, Kyung Ki Kim, Wei Wang and Ken Choi
Page: 93~102, Vol. 7, No.1, 2011
Keywords: PVT Variation sensors, Yield, Voltage Scaling, Frequency Scaling
Show / Hide Abstract

Security Framework for RFID-based Applications in Smart Home Environment
Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee
Page: 111~120, Vol. 7, No.1, 2011
Keywords: RFID, Smart Home, Home Network System, Home Server, Secure RFIDBased Applications, RFID Reader-Enabled Devices, RFID Tagged Consumer Items, EPCglobal Architecture Framework
Show / Hide Abstract

Guess and Determine Attack on Bivium
Neda Rohani, Zainab Noferesti, Javad Mohajeri and Mohammad Reza Aref
Page: 151~158, Vol. 7, No.1, 2011
Keywords: Bivium, Guess and Determine Attack, Stream Ciphers, Linear Approximations, Entropy
Show / Hide Abstract

A Method of Risk Assessment for Multi-Factor Authentication
Jae-Jung Kim and Seng-Phil Hong
Page: 187~198, Vol. 7, No.1, 2011
Keywords: Multi-factor Authentication, PKI, User Authentication, Biometric Authentication
Show / Hide Abstract

An Efficient Broadcast Technique for Vehicular Networks
Ai Hua Ho, Yao H. Ho, Kien A. Hua, Roy Villafane and Han-Chieh Chao
Page: 221~240, Vol. 7, No.2, 2011
Keywords: V2V Communication Protocols, Vehicular Network, Ad Hoc Network, Broadcast, Broadcasting Storm, Routing
Show / Hide Abstract

Batch Resizing Policies and Techniques for Fine-Grain Grid Tasks: The Nuts and Bolts
Nithiapidary Muthuvelu, Ian Chai, Eswaran Chikkannan and Rajkumar Buyya
Page: 299~320, Vol. 7, No.2, 2011
Keywords: Batch Resizing, Task Granularity, Global Grid, Application Turnaround Time
Show / Hide Abstract

A Novel Similarity Measure for Sequence Data
Mohammad. H. Pandi, Omid Kashefi and Behrouz Minaei
Page: 413~424, Vol. 7, No.3, 2011
Keywords: Sequence Data, Similarity Measure, Sequence Mining
Show / Hide Abstract

Wavelet-based Feature Extraction Algorithm for an Iris Recognition System
Ayra Panganiban, Noel Linsangan and Felicito Caluyo
Page: 425~434, Vol. 7, No.3, 2011
Keywords: Biometrics, Degrees of Freedom, Iris Recognition, Wavelet
Show / Hide Abstract

Probabilistic Soft Error Detection Based on Anomaly Speculation
Joonhyuk Yoo
Page: 435~446, Vol. 7, No.3, 2011
Keywords: Probabilistic Soft Error Detection, Reliability, Anomaly Speculation
Show / Hide Abstract

A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game
Hiroshi Kutsuna and Satoshi Fujita
Page: 531~542, Vol. 7, No.3, 2011
Keywords: Congestion Control, AIMD, Minority Game
Show / Hide Abstract

A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study
Seo-Young Noh and Shashi K. Gadia
Page: 635~652, Vol. 7, No.4, 2011
Keywords: Parametric Data Model, Model Comparison, ParaSQL, Spatiotemporal Data
Show / Hide Abstract

Grobner Basis Attacks on Lightweight RFID Authentication Protocols
Daewan Han
Page: 691~706, Vol. 7, No.4, 2011
Keywords: RFID, Authentication Protocol, Algebraic Attack, Grobner Basis
Show / Hide Abstract

A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Joon-Min Gil and Mihye Kim
Page: 707~716, Vol. 7, No.4, 2011
Keywords: Desktop Grids, Execution Behavior, Log Analysis System, REST Web Services, Resource Group-based Task Scheduling
Show / Hide Abstract

TOSS: Telecom Operations Support Systems for Broadband Services
Yuan-Kai Chen, Chang-Ping Hsu, Chung-Hua Hu, Rong-Syh Lin, Yi-Bing Lin, Jian-Zhi Lyu, Wudy Wu and Heychyi Young
Page: 1~20, Vol. 6, No.1, 2010
Keywords: Operations Support System (OSS), New Generation Operations Systems and Software (NGOSS), enhanced Telecom Operations Map (eTOM), Internet Protocol Television (IPTV), IP-Virtual Private Network (IP-VPN)
Show / Hide Abstract

GML Map Visualization on Mobile Devices
Eun-Ha Song and Young-Sik Jeong
Page: 33~42, Vol. 6, No.1, 2010
Keywords: Map Visualization, DXF, DWG, SHP, GML, POI, Trace Monitoring
Show / Hide Abstract

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE`
Shirisha Tallapally and R Padmavathy
Page: 43~52, Vol. 6, No.1, 2010
Keywords: STPKE’ Protocol, The Proposed Protocol, Undetectable Online Password Guessing Attack
Show / Hide Abstract

The ISDF Framework: Towards Secure Software Development
Abdulaziz Alkussayer and William H Allen
Page: 91~106, Vol. 6, No.1, 2010
Keywords: Security Patterns, Secure Development, Security Framework
Show / Hide Abstract

Challenges to Next Generation Services in IP Multimedia Subsystem
Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen and Han-Chieh Chao
Page: 129~146, Vol. 6, No.2, 2010
Keywords: IP Multimedia Subsystems, Peer-to-Peer, Web Services, SCIM
Show / Hide Abstract

A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks
Kezhong Liu and Ji Xiong
Page: 147~162, Vol. 6, No.2, 2010
Keywords: Localization Algorithm, Mobile Beacon Node, Sensor Network, RS?
Show / Hide Abstract

IMTAR: Incremental Mining of General Temporal Association Rules
Anour F.A. Dafa-Alla, Ho Sun Shon, Khalid E.K. Saeed, Minghao Piao, Un-il Yun, Kyung Joo Cheoi and Keun Ho Ryu
Page: 163~176, Vol. 6, No.2, 2010
Keywords: Incremental Mining of General Temporal Association Rules, Incremental TFP-Tree
Show / Hide Abstract

Development of Personal Information Protection Model using a Mobile Agent
Seong-Hee Bae and Jaejoon Kim
Page: 185~196, Vol. 6, No.2, 2010
Keywords: Information Protect Model, Mobile Agent, Personal Information Protection, Privacy Protection Policy
Show / Hide Abstract

A Measurement System for 3D Hand-Drawn Gesture with a PHANToM™ Device
Seong Young Ko, Won-Chul Bang and Sang-Youn Kim
Page: 347~358, Vol. 6, No.3, 2010
Keywords: Hand-Drawn Gesture, Hand-Held Device, Inertial Measurement Unit, PHANToMTM , Calibration
Show / Hide Abstract

En-Route Trajectory calculation using Flight Plan Information for Effective Air Traffic Management
Yong-Kyun Kim, Yun-Hyun Jo, Jin-Won Yun, Taeck-Keun Oh, Hee-Chang Roh, Sang-Bang Choi and Hyo-Dal Park
Page: 375~384, Vol. 6, No.3, 2010
Keywords: ATC, ATM, Trajectory Prediction, ATFM
Show / Hide Abstract

Stakeholders Driven Requirements Engineering Approach for Data Warehouse Development
Manoj Kumar, Anjana Gosain and Yogesh Singh
Page: 385~402, Vol. 6, No.3, 2010
Keywords: Agent, Dependencies Among Agents, Stakeholders of the Organization, Data Warehouse Requirements Engineering, Early Requirements Engineering, Late Requirements Engineering
Show / Hide Abstract

Speed-Sensitive Handover Scheme over IEEE 802.16 Multi-Relay Networks
DongHo Kim, SoonSeok Kim and YongHee Lee
Page: 403~412, Vol. 6, No.3, 2010
Keywords: Multi-Relay Networks, Handover
Show / Hide Abstract

Hiding Secret Data in an Image Using Codeword Imitation
Zhi-Hui Wang, Chin-Chen Chang and Pei-Yu Tsai
Page: 435~452, Vol. 6, No.4, 2010
Keywords: Data Hiding, Steganography, Vector Quantization
Show / Hide Abstract

Security Properties of Domain Extenders for Cryptographic Hash Functions
Elena Andreeva, Bart Mennink and Bart Preneel
Page: 453~480, Vol. 6, No.4, 2010
Keywords: Hash Functions, Domain Extenders, Security Properties
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Efficient Server Virtualization using Grid Service Infrastructure
Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song and Young-Sik Jeong
Page: 553~562, Vol. 6, No.4, 2010
Keywords: Server Virtualization, Grid Service, Grid Infrastructure, Power Efficiency, Cloud Computing
Show / Hide Abstract

An Efficient Web Ontology Storage Considering Hierarchical Knowledge for Jena-based Applications
Dongwon Jeong, Heeyoung Shin, Doo-Kwon Baik and Young-Sik Jeong
Page: 11~18, Vol. 5, No.1, 2009
Keywords: Ontology, Jena, OWL, Ontology, Storage, Hierarchical Structure
Show / Hide Abstract

Privacy-Aware Adaptable Web Services Using Petri Nets
You-Jin Song and Jae-Geol Yim
Page: 19~24, Vol. 5, No.1, 2009
Keywords: Privacy, Web Service, Petri Net, Context Framework
Show / Hide Abstract

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics
Byung-Gyu No, Doo-Soon Park, Min Hong, HwaMin Lee and Yoon Sok Park
Page: 33~40, Vol. 5, No.1, 2009
Keywords: Worm, Random Constant Spreading, Dynamic Network, Depth Distribution Characteristic, Bandwidth Control
Show / Hide Abstract

A Survey of Face Recognition Techniques
Rabia Jafri and Hamid R Arabnia
Page: 41~68, Vol. 5, No.2, 2009
Keywords: Face Recognition, Person Identification, Biometrics
Show / Hide Abstract

A Scalable Wireless Body Area Network for Bio-Telemetry
Adnan Saeed, Miad Faezipour, Mehrdad Nourani, Subhash Banerjee, Gil Lee, Gopal Gupta and Lakshman Tamil
Page: 77~86, Vol. 5, No.2, 2009
Keywords: Body Area Network, Plug-and-Play Biosensors, Telemedicine, Ubiquitous Computing, ECG Monitoring, ECG Feature Extraction
Show / Hide Abstract

Differentiated Services Based Admission Control and Multi Path Routing Algorithm for IPv6
Muhammad Omer Farooq and Sadia Aziz
Page: 97~104, Vol. 5, No.2, 2009
Keywords: Differentiated Services (DiffServ), Admission Control, IPv6, QoS Routing, QoS Architecture
Show / Hide Abstract

GPU-based Stereo Matching Algorithm with the Strategy of Population-based Incremental Learning
Dong-Hu Nie, Kyu-Phil Han and Heng-Suk Lee
Page: 105~116, Vol. 5, No.2, 2009
Keywords: Image filtering, Performance Evaluation, General-Purpose Computation Based on GPU, GPU, Population-Based Incremental Learning
Show / Hide Abstract

Topological Boundary Detection in Wireless Sensor Networks
Thanh Le Dinh
Page: 145~150, Vol. 5, No.3, 2009
Keywords: Wireless sensor network, Hole, Boundary detection, 2-neighbor graph
Show / Hide Abstract

Utility-based Rate Allocation Scheme for Mobile Video Streaming over Femtocell Networks
Shan Guo Quan, Jian Xu and Young Yong Kim
Page: 151~158, Vol. 5, No.3, 2009
Keywords: Utility, femtocell network, backhaul, cross-talk, video streaming
Show / Hide Abstract

Automatic In-Text Keyword Tagging based on Information Retrieval
Jinsuk Kim, Du-Seok Jin, KwangYoung Kim and Ho-Seop Choe
Page: 159~166, Vol. 5, No.3, 2009
Keywords: Automatic In-Text Keyword Tagging, Information Retrieval, Pattern Matching, Boyer-Moore-Horspool Algorithm, Keyword Dictionary, Cross-Referencing, in-text content link
Show / Hide Abstract

On Effective Slack Reclamation in Task Scheduling for Energy Reduction
Young Choon Lee and Albert Y Zomaya
Page: 175~186, Vol. 5, No.4, 2009
Keywords: Scheduling, Energy Awareness, Green Computing, Dynamic Voltage and Frequency Scaling, Data Centers
Show / Hide Abstract

Spatial Query Processing Based on Minimum Bounding in Wireless Sensor Networks
Sun Ok Yang and SungSuk Kim
Page: 229~236, Vol. 5, No.4, 2009
Keywords: Notification Message, Parent Selection Message, Spatial Query Process, Minimum Bounding Area
Show / Hide Abstract

Neural Text Categorizer for Exclusive Text Categorization
Taeho Jo
Page: 77~86, Vol. 4, No.2, 2008
Keywords: Disk Neural Text Categorizer, Text Categorization,
Show / Hide Abstract

Comparison of Cultural Acceptability for Educational Robots between Europe and Korea
Jonghong Choi, Jongyun Lee and Jeonghye Han
Page: 97~102, Vol. 4, No.3, 2008
Keywords: Cultural Acceptability, Educational Robot, Identification, Robot Contents
Show / Hide Abstract

Tester Structure Expression Language and Its Application to the Environment for VLSI Tester Program Development
Masayuki Sato, Hiroki Wakamatsu, Masayuki Arai, Kenichi Ichino, Kazuhiko Iwasaki and Takeshi Asakawa
Page: 121~132, Vol. 4, No.4, 2008
Keywords: VLST test, VLSI tester, ATE, tester language, GTL, Tester selection tool
Show / Hide Abstract

Mobility Management Survey for Home-eNB Based 3GPP LTE Systems
Hyoungwon Kwak, Poongup Lee, Yohan Kim, Navrati Saxena and Jitae Shin
Page: 145~152, Vol. 4, No.4, 2008
Keywords: Home-eNB, 3GPP LTE (Long Term Evolution), Mobility Management
Show / Hide Abstract

Comparative Study on the Educational Use of Home Robots for Children
Jeonghye Han, Miheon Jo, Vicki Jones and Jun H Jo
Page: 159~168, Vol. 4, No.4, 2008
Keywords: Human-Computer Interaction, Human-Robot Interaction, e-Learning, Educational Media, r-Learning, Web-Based Instruction
Show / Hide Abstract

Static Type Assignment for SSA Form in CTOC
Ki-Tae Kim and Weon-Hee Yoo
Page: 26~32, Vol. 3, No.1, 2007
Keywords: Bytecode, control flow graph, Static Single Assignment, Static Type Assignment
Show / Hide Abstract

Addressing Mobile Agent Security through Agent Collaboration
Evens Jean, Yu Jiao and Ali R Hurson
Page: 43~53, Vol. 3, No.2, 2007
Keywords: Disk Striping, Multimedia System, Bandwidth
Show / Hide Abstract

Actual Condition and Issues for Mobile Security System
Kouichi Sakurai and Kazuhide Fukushima
Page: 54~63, Vol. 3, No.2, 2007
Keywords: Mobile Security, Mobile Malware, Mobile DRM System, Mobile WiMAX Security, Group Key Management
Show / Hide Abstract

Vehicle Classification by Road Lane Detection and Model Fitting Using a Surveillance Camera
Wook-Sun Shin, Doo-Heon Song and Chang-Hun Lee
Page: 52~57, Vol. 2, No.1, 2006
Keywords: Vehicle Type classification, Road Lane Detection, Model fitting, Vanishing Point, Machine Learning
Show / Hide Abstract

An Evaluation of Multimedia Data Downstream with PDA in an Infrastructure Network
Youn-Sik Hong and Hye-Sun Hur
Page: 76~81, Vol. 2, No.2, 2006
Keywords: Multimedia data, downstream, PDA, TCP window size, inter-packet delay
Show / Hide Abstract

A New Fair Call Admission Control for Integrated Voice and Data Traffic in Wireless Mobile Networks
Young Ha Hwang, Sung-Kee Noh and Sang-Ha Kim
Page: 107~113, Vol. 2, No.2, 2006
Keywords: CAC, QoS, Fairness, Integrated service, Wireless mobile networks
Show / Hide Abstract

A Knowledge Discovery Framework for Spatiotemporal Data Mining
Jun-Wook Lee and Yong-Joon Lee
Page: 124~129, Vol. 2, No.2, 2006
Keywords: spatiotemporal data mining, spatiotemporal knowledge discovery, spatiotemporal moving pattern, discovery framework
Show / Hide Abstract

A Light-weight and Dynamically Reconfigurable RMON Agent System
Jun-Hyung Lee, Zin-Won Park and Myung-Kyun Kim
Page: 183~188, Vol. 2, No.3, 2006
Keywords: Network management, RMON agent system, Dynamic reconfiguration.
Show / Hide Abstract

Automatic Reading System for On-off Type DNA Chip
Munho Ryu, Jong Dae Kim and Jongwon Kim
Page: 189~193, Vol. 2, No.3, 2006
Keywords: DNA chip, Automatic Reading, Report Generation, Image Processing, HPV DNA chip
Show / Hide Abstract

A Hardware/Software Codesign for Image Processing in a Processor Based Embedded System for Vehicle Detection
Hosun Moon, Sunghwan Moon, Youngbin Seo and Yongdeak Kim
Page: 27~31, Vol. 1, No.1, 2005
Keywords: Embedded System, ITS, Image Processing, Vehicle Detect
Show / Hide Abstract

Wavelet-based Image Denoising with Optimal Filter
Yong-Hwan Lee and Sang-Burm Rhee
Page: 32~35, Vol. 1, No.1, 2005
Keywords: Image Denoising, Noise Reduction Wavelet
Show / Hide Abstract

Simulation of the Digital Image Processing Algorithm for the Coating Thickness Automatic Measurement of the TRISO-coated Fuel Particle
Woong-Ki Kim, Young-Woo Lee and Sung-Woong Ra
Page: 36~40, Vol. 1, No.1, 2005
Keywords: TRISO-coated Fuel Particle, Coating Thickness, X-ray CT, Computed Tomography, Filtered Backprojection, Automatic Measurement
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 0~0, Vol. 0, No.0, 0
Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

Image Restoration and Object Removal Using Prioritized Adaptive Patch-Based Inpainting in a Wavelet Domain
Rajesh P. Borole and Sanjiv V. Bonde
Page: 0~0, Vol. 0, No.0, 0
Keywords: Image Inpainting, Object Removal, Region Filling, Texture and Structure Propagation, Wavelet Inpainting
Show / Hide Abstract

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 0~0, Vol. 0, No.0, 0
Keywords: Digital Image Watermarking, Semi-fragile Watermarking, False Detection, Local Binary Pattern (LBP), Arnold Transform
Show / Hide Abstract