Search Word(s) in Title, Keywords, Authors, and Abstract: SAG

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
10.3745/JIPS.03.0029

Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017
10.3745/JIPS.04.0028

Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 1229~1242, Vol. 13, No.5, 2017
10.3745/JIPS.03.0038

Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017
10.3745/JIPS.03.0074

Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

HESnW: History Encounters-Based Spray-and-Wait Routing Protocol for Delay Tolerant Networks
Shunyi Gan, Jipeng Zhou and Kaimin Wei
Page: 618~629, Vol. 13, No.3, 2017
10.3745/JIPS.03.0075

Keywords: Delivery Cost, DTNs, History Node, Multiple Probability, Spray-and-Wait
Show / Hide Abstract

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 1382~1396, Vol. 13, No.5, 2017
10.3745/JIPS.02.0063

Keywords: Digital Image Watermarking, Semi-fragile Watermarking, False Detection, Local Binary Pattern (LBP), Arnold Transform
Show / Hide Abstract

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications
Daewon Kim
Page: 731~751, Vol. 13, No.4, 2017
10.3745/JIPS.04.0037

Keywords: Cloud, HTML5, JavaScript, Mobile
Show / Hide Abstract

Extraction of ObjectProperty-UsageMethod Relation from Web Documents
Chaveevan Pechsiri, Sumran Phainoun and Rapeepun Piriyakul
Page: 1103~1125, Vol. 13, No.5, 2017
10.3745/JIPS.04.0046

Keywords: Medicinal Property, N-Word-Co, Semantic Relation, Usage-Method
Show / Hide Abstract

3D Segmentation for High-Resolution Image Datasets Using a Commercial Editing Tool in the IoT Environment
Koojoo Kwon and Byeong-Seok Shin
Page: 1126~1134, Vol. 13, No.5, 2017
10.3745/JIPS.02.0070

Keywords: Segmentation, Large-Scale Image, Photo Editing, Visible Korean, Volume Rendering
Show / Hide Abstract

Modeling and Simulation of Scheduling Medical Materials Using Graph Model for Complex Rescue
Ming Lv, Jingchen Zheng, Qingying Tong, Jinhong Chen, Haoting Liu and Yun Gao
Page: 1243~1258, Vol. 13, No.5, 2017
10.3745/JIPS.04.0042

Keywords: Bipartite Graph, BSCS, Drug Scheduling, Medical Rescue, Optimization Matching
Show / Hide Abstract

Spatio-temporal Sensor Data Processing Techniques
Jeong-Joon Kim
Page: 1259~1276, Vol. 13, No.5, 2017
10.3745/JIPS.04.0047

Keywords: Multi-dimensional Operator, Multi-dimensional Spatio-temporal Data Type, Sensor Networks, Sensor Query Processing System
Show / Hide Abstract

Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns
Chantana Chantrapornchai and Paingruthai Nusawat
Page: 436~454, Vol. 12, No.3, 2016
10.3745/JIPS.03.0048

Keywords: Battery Discharge Rate, Mobile Battery Usage, Multi-Layer Perceptron, Prediction Model, Support Vector Machine
Show / Hide Abstract

Bilingual Multiword Expression Alignment by Constituent-Based Similarity Score
Hyeong-Won Seo, Hongseok Kwon, Min-Ah Cheon and Jae-Hoon Kim
Page: 455~467, Vol. 12, No.3, 2016
10.3745/JIPS.02.0044

Keywords: Bilingual Lexicon, Compositionality, Context Vector, Multiword Expression, MWE Alignment, Pivot Language
Show / Hide Abstract

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016
10.3745/JIPS.03.0054

Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

Genetic Symmetric Key Generation for IDEA
Nandini Malhotra and Geeta Nagpal
Page: 239~247, Vol. 11, No.2, 2015
10.3745/JIPS.03.0017

Keywords: Crossover, IDEA, Genetic Algorithm, Mutation, Symmetric Key Generation
Show / Hide Abstract

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks
Chang Liu, Sang-Hwa Chung, Han-You Jeong and Ik-Joo Jung
Page: 465~482, Vol. 11, No.3, 2015
10.3745/JIPS.03.0027

Keywords: Contention Window, IEEE 802.11p, MAC Layer, Message Priority, Vehicular Network
Show / Hide Abstract

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks
Bharti Sharma, Ravinder Singh Bhatia and Awadhesh Kumar Singh
Page: 36~54, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.036
Keywords: MANET, Inter-Cluster, Intra-Cluster, Mutual Exclusion, Token Ring
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

Multifactor Authentication Using a QR Code and a One-Time Password
Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya and G. Sainarayanan
Page: 483~490, Vol. 10, No.3, 2014
10.3745/JIPS.02.0005
Keywords: Authentication, One-Time Password, Personal Assurance Message, Quick Response Code
Show / Hide Abstract

On the Minimization of Crosstalk Conflicts in a Destination Based Modified Omega Network
Ved Prakash Bhardwaj and Nitin
Page: 301~314, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.301
Keywords: Optical Multistage Interconnection Network, Crosstalk, Time Domain Approach, Omega Network, Destination Based Modified Omega Network, Crosstalk Free Modified Omega Network
Show / Hide Abstract

Developing a Web-Based Knowledge Product Outsourcing System at a University
Mark B. Onte and Dave E. Marcial
Page: 548~566, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.548
Keywords: Knowledge Product Outsourcing, Management, Web 2.0, IT in Education
Show / Hide Abstract

A Network-Based Handover Scheme in HIP-Based Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 651~659, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.651
Keywords: HIP, network-based, handover, simulations
Show / Hide Abstract

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
Daya Gupta, Asok De and Kakali Chatterjee
Page: 145~158, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.145
Keywords: Hyperelliptic Curve Cryptosystem(HECC), Secure Hyperelliptic Curve, Hyperelliptic Curve Deffie-Hellman(HECDH), Hyperelliptic Curve Digital Signature Algorithm (HECDSA)
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.495
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.567
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

A Clustering Protocol with Mode Selection for Wireless Sensor Network
Aries Kusdaryono and Kyung Oh Lee
Page: 29~42, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.029
Keywords: Ad Hoc Network, Wireless Sensor Networks, Clustering, Routing Protocol
Show / Hide Abstract

Generic Constructions for Strong Designated Verifier Signature
Deng-Guo Feng, Jing Xu and Wei-Dong Chen
Page: 159~172, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.159
Keywords: Strong Designated Verifier Signature, Ring Signature, Deniable Authenticated Key Exchange, Provable security
Show / Hide Abstract

An Efficient Broadcast Technique for Vehicular Networks
Ai Hua Ho, Yao H. Ho, Kien A. Hua, Roy Villafane and Han-Chieh Chao
Page: 221~240, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.221
Keywords: V2V Communication Protocols, Vehicular Network, Ad Hoc Network, Broadcast, Broadcasting Storm, Routing
Show / Hide Abstract

A Multi-Application Controller for SAGE-enabled Tiled Display Wall in Wide-area Distributed Computing Environments
Yuki Fujiwara, Susumu Date, Kohei Ichikawa and Haruo Takemura
Page: 581~594, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.581
Keywords: T iled Display Wall, SAGE, Multiple Application Control
Show / Hide Abstract

GML Map Visualization on Mobile Devices
Eun-Ha Song and Young-Sik Jeong
Page: 33~42, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.033
Keywords: Map Visualization, DXF, DWG, SHP, GML, POI, Trace Monitoring
Show / Hide Abstract

Fast Fuzzy Control of Warranty Claims System
Sang-Hyun Lee, Sung Eui Cho and Kyung-li Moon
Page: 209~218, Vol. 6, No.2, 2010
10.3745/JIPS.2010.6.2.209
Keywords: Warranty Claims, Age, Usage, Fuzzy Logic
Show / Hide Abstract

On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks
Hamid Karimi, Mehdi Kargahi and Nasser Yazdani
Page: 413~434, Vol. 6, No.3, 2010
10.3745/JIPS.2010.6.3.413
Keywords: Failure Recovery, Job Allocation, Quality of Service, Real-Time Scheduling, Wireless Sensor Network
Show / Hide Abstract

Privacy-Aware Adaptable Web Services Using Petri Nets
You-Jin Song and Jae-Geol Yim
Page: 19~24, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.019
Keywords: Privacy, Web Service, Petri Net, Context Framework
Show / Hide Abstract

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression
Tin-Yu Wu, Han-Chieh Chao and Chi-Hsiang Lo
Page: 117~130, Vol. 5, No.3, 2009
10.3745/JIPS.2009.5.3. 117
Keywords: SAG, RoHC, MIPv6, Handoff Latency, Early Binding Update
Show / Hide Abstract

Spatial Query Processing Based on Minimum Bounding in Wireless Sensor Networks
Sun Ok Yang and SungSuk Kim
Page: 229~236, Vol. 5, No.4, 2009
10.3745/JIPS.2009.5.4.229
Keywords: Notification Message, Parent Selection Message, Spatial Query Process, Minimum Bounding Area
Show / Hide Abstract

MMMP: A MAC Protocol to Ensure QoS for Multimedia Traffic over Multi-hop Ad Hoc Networks
Sunil Kumar, Mahasweta Sarkar, Supraja Gurajala and John D. Matyjas
Page: 41~52, Vol. 4, No.2, 2008
10.3745/JIPS.2008.4.2.041
Keywords: Medium Access Control, MAC, Ad Hoc Networks, Multi Hop, QoS, Multimedia
Show / Hide Abstract

Eager Data Transfer Mechanism for Reducing Communication Latency in User-Level Network Protocols
Chulho Won, Ben Lee, Kyoung Park and Myung-Joon Kim
Page: 133~144, Vol. 4, No.4, 2008
10.3745/JIPS.2008.4.4.133
Keywords: Data Transfer, Cache Coherence, User-Level, Low-Latency, Network Protocols, Message, VIA
Show / Hide Abstract

Secure Key Management Protocol in the Wireless Sensor Network
Yoon-Su Jeong and Sang-Ho Lee
Page: 48~51, Vol. 2, No.1, 2006
None
Keywords: Cluster, Key Management Protocol, WSN
Show / Hide Abstract

Digital Controller of a Diesel Generator using an Embedded System
Kwang Seon Ahn
Page: 143~146, Vol. 2, No.3, 2006
None
Keywords: Diesel Generator, Embedded Controller, Remote Control
Show / Hide Abstract

Automatic Reading System for On-off Type DNA Chip
Munho Ryu, Jong Dae Kim and Jongwon Kim
Page: 189~193, Vol. 2, No.3, 2006
None
Keywords: DNA chip, Automatic Reading, Report Generation, Image Processing, HPV DNA chip
Show / Hide Abstract

A Cluster-Based Energy-Efficient Routing Protocol without Location Information for Sensor Networks
Giljae Lee, Jonguk Kong, Minsun Lee and Okhwan Byeon
Page: 49~54, Vol. 1, No.1, 2005
None
Keywords: Wireless sensor networks, ubiquitous sensor networks, cluster-based routing protocol, energy-efficient routing
Show / Hide Abstract

The Comparison of RBS and TDP for the Sensor Networks Synchronization
Hyojung Lee, Byungchul Kim and Youngmi Kwon
Page: 70~74, Vol. 1, No.1, 2005
None
Keywords: Sensor Network, RBS, TDP, Time Synchronization
Show / Hide Abstract

A Study on RFID System with Secure Service Availability for Ubiquitous Computing
Dae-Hee Seo and Im-Yeong Lee
Page: 96~101, Vol. 1, No.1, 2005
None
Keywords: RFID, Service Availability, Secure Communication, Network Management Ubiquitous Computing
Show / Hide Abstract