Search Word(s) in Title, Keywords, Authors, and Abstract: Platform

A Survey on Automatic Twitter Event Summarization
Dwijen Rudrapal, Amitava Das and Baby Bhattacharya
Page: 79~100, Vol. 14, No.1, 2018
10.3745/JIPS.02.0079

Keywords: ROUGE, Social Media Text, Tweet Stream, Tweet Summarization
Show / Hide Abstract

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang and Fang Zhao
Page: 129~139, Vol. 14, No.1, 2018
10.3745/JIPS.04.0055

Keywords: AI, Crowdsourcing, Personality, Planning Language, Software Development, Task
Show / Hide Abstract

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform
Wei Song, Ning Feng, Yifei Tian, Simon Fong and Kyungeun Cho
Page: 162~175, Vol. 14, No.1, 2018
10.3745/JIPS.04.0056

Keywords: Cloud Computing, Deep Belief Network, IoT, Power Conservation, Smart Metre
Show / Hide Abstract

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment
Ruirui Zhang and Xin Xiao
Page: 239~251, Vol. 14, No.1, 2018
10.3745/JIPS.03.0089

Keywords: Artificial Immune, Cloud Computing, Danger Theory, Intrusion Detection, Virtual Machine
Show / Hide Abstract

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration
Sarang Na, Taeeun Kim and Hwankuk Kim
Page: 740~750, Vol. 14, No.3, 2018
10.3745/JIPS.03.0098

Keywords: Common Platform Enumeration (CPE), Common Vulnerabilities and Exposures (CVE), OS Fingerprinting, Security Vulnerability Analysis, Service Identification
Show / Hide Abstract

Integrated Lighting Enabler System Using M2M Platforms for Enhancing Energy Efficiency
Maman Abdurohman, Aji Gautama Putrada, Sidik Prabowo, Catur Wirawan Wijiutomo and Asma Elmangoush
Page: 1033~1048, Vol. 14, No.4, 2018
10.3745/JIPS.03.0103

Keywords: M2M, Platform, OpenMTC, Sensor and Lighting
Show / Hide Abstract

Task Assignment Model for Crowdsourcing Software Development: TAM
Muhammad Zahid Tunio, Haiyong Luo, Cong Wang, Fang Zhao, Abdul Rehman Gilal and Wenhua Shao
Page: 621~630, Vol. 14, No.3, 2018
10.3745/JIPS.04.0064

Keywords: Crowdsourced, Human Factor, Personality Type, Software Development, Task Assignment
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017
10.3745/JIPS.04.0028

Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

Feasibility and Performance Analysis of RDMA Transfer through PCI Express
Min Choi and Jong Hyuk Park
Page: 95~103, Vol. 13, No.1, 2017
10.3745/JIPS.01.0013

Keywords: Interconnection Network, Non-transparent Bridge, PCI Express, RDMA
Show / Hide Abstract

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution
Manmeet Mahinderjit Singh, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin and Nurul Hashimah Ahamed Hassain Malim
Page: 559~572, Vol. 13, No.3, 2017
10.3745/JIPS.04.0033

Keywords: Cyberbullying, Digital Etiquette, Intrusion Detection System, Mobile Application, Social Network
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
10.3745/JIPS.03.0048

Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016
10.3745/JIPS.03.0056

Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016
10.3745/JIPS.01.0012

Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks
Sang-Seon Byun
Page: 73~82, Vol. 12, No.1, 2016
10.3745/JIPS.03.0041

Keywords: Cognitive Radio Networks, Congestion Control, TCP, USRP
Show / Hide Abstract

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm
Amine Dahane, Nasr-Eddine Berrached and Abdelhamid Loukil
Page: 205~228, Vol. 11, No.2, 2015
10.3745/JIPS.02.0019

Keywords: Clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks
Show / Hide Abstract

An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway
Pyung Soo Kim
Page: 425~434, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.425
Keywords: A Home Network, IPTV, Service Platform, Open Architecture, Home Electronic System (HES), Home Gateway Initiative (HGI)
Show / Hide Abstract

Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components
Chen Liu, Omar Granados, Rolando Duarte and Jean Andrian
Page: 133~144, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.133
Keywords: Software Communication Architecture, Software Defined Radio, Energy Efficiency, FPGA, Cognitive Radio
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.347
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

Design and Development of m-Learning Service Based on 3G Cellular Phones
Kwang Sik Chung and Jeong Eun Lee
Page: 521~538, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.521
Keywords: m-Learning, e-Learning Service Platform, Mobile Education Device, Cellular Phone, 3G Networks, H.264
Show / Hide Abstract

Accelerating the Sweep3D for a Graphic Processor Unit
Chunye Gong, Jie Liu, Haitao Chen, Jing Xie and Zhenghu Gong
Page: 63~74, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.063
Keywords: Sweep3D, Neutron Transport, GPU, CUDA
Show / Hide Abstract

Efficient Server Virtualization using Grid Service Infrastructure
Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song and Young-Sik Jeong
Page: 553~562, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.553
Keywords: Server Virtualization, Grid Service, Grid Infrastructure, Power Efficiency, Cloud Computing
Show / Hide Abstract

A Scalable Wireless Body Area Network for Bio-Telemetry
Adnan Saeed, Miad Faezipour, Mehrdad Nourani, Subhash Banerjee, Gil Lee, Gopal Gupta and Lakshman Tamil
Page: 77~86, Vol. 5, No.2, 2009
10.3745/JIPS.2009.5.2.077
Keywords: Body Area Network, Plug-and-Play Biosensors, Telemedicine, Ubiquitous Computing, ECG Monitoring, ECG Feature Extraction
Show / Hide Abstract

Design of Cryptographic Hardware Architecture for Mobile Computing
Mooseop Kim, Youngsae Kim and Hyunsook Cho
Page: 187~196, Vol. 5, No.4, 2009
10.3745/JIPS.2009.5.4.187
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing
Show / Hide Abstract

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System
Shengzhong Deng, Chan-Hyun Youn, Qi Liu, Hoe Young Kim, Taoran Yu and Young Hun Kim
Page: 103~112, Vol. 4, No.3, 2008
10.3745/JIPS.2008.4.3.103
Keywords: Grid Worfklow, Collaborative Healthcare Platform, SLA, Policy Adjuster
Show / Hide Abstract

Addressing Mobile Agent Security through Agent Collaboration
Evens Jean, Yu Jiao and Ali R Hurson
Page: 43~53, Vol. 3, No.2, 2007
None
Keywords: Disk Striping, Multimedia System, Bandwidth
Show / Hide Abstract

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services
Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn and Jaecheol Ryou
Page: 86~95, Vol. 1, No.1, 2005
None
Keywords: Location-based service, Open LBS security, XKMS, XML security, XML web services
Show / Hide Abstract