Search Word(s) in Title, Keywords, Authors, and Abstract: VIA

Foreign Detection based on Wavelet Transform Algorithm with Image Analysis Mechanism in The Inner Wall of The Tube
Jinlong Zhu, Fanhua Yu, Mingyu Sun, Dong Zhao and Qingtian Geng
Page: 34~46, Vol. 15, No.1, 2019
10.3745/JIPS.02.0106
Keywords: Foreign Substance Inspection, Monte Carlo, Wavelets Transform
Show / Hide Abstract

Future Trends of Blockchain and Crypto Currency: Challenges, Opportunities, and Solutions
Yunsick Sung and Jong Hyuk Park
Page: 457~463, Vol. 15, No.3, 2019
10.3745/JIPS.03.0115
Keywords: Blockchain and Crypto Currency, Cloud Computing, Sentiment Analysis, Internet of Things
Show / Hide Abstract

Health and Wellness Monitoring Using Intelligent Sensing Technique
Yao Meng, Sang-Hoon Yi and Hee-Cheol Kim
Page: 478~491, Vol. 15, No.3, 2019
10.3745/JIPS.04.0115
Keywords: Accelerometer, Electrocardiogram, Healthcare, Persuasive Technology, Real-Time Monitoring
Show / Hide Abstract

Movie Recommendation Algorithm Using Social Network Analysis to Alleviate Cold-Start Problem
Khamphaphone Xinchang, Phonexay Vilakone and Doo-Soon Park
Page: 616~631, Vol. 15, No.3, 2019
10.3745/JIPS.04.0121
Keywords: Cold Start Problem, Collaborative Filtering (CF), Movie Recommendation System, Social Network Analysis
Show / Hide Abstract

Robust Ultrasound Multigate Blood Volume Flow Estimation
Yi Zhang, Jinkai Li, Xin Liu and Dong Chyuan Liu
Page: 820~832, Vol. 15, No.4, 2019
10.3745/JIPS.01.0046
Keywords: Blood Volume Flow Estimation, Flow Velocity Estimation, Ultrasound
Show / Hide Abstract

Kernel Fisher Discriminant Analysis for Natural Gait Cycle Based Gait Recognition
Jun Huang, Xiuhui Wang and Jun Wang
Page: 957~966, Vol. 15, No.4, 2019
10.3745/JIPS.02.0115
Keywords: Gait Energy Image, Gait Recognition, Kernel Fisher Discriminant Analysis, Natural Gait Cycle
Show / Hide Abstract

A Survey on Passive Image Copy-Move Forgery Detection
Zhi Zhang, Chengyou Wang and Xiao Zhou
Page: 6~31, Vol. 14, No.1, 2018
10.3745/JIPS.02.0078
Keywords: Copy-Move Forgery Detection (CMFD), Image Forensics, Image Tamper Detection, Passive Forgery Detection
Show / Hide Abstract

A Survey on Automatic Twitter Event Summarization
Dwijen Rudrapal, Amitava Das and Baby Bhattacharya
Page: 79~100, Vol. 14, No.1, 2018
10.3745/JIPS.02.0079
Keywords: ROUGE, Social Media Text, Tweet Stream, Tweet Summarization
Show / Hide Abstract

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform
Wei Song, Ning Feng, Yifei Tian, Simon Fong and Kyungeun Cho
Page: 162~175, Vol. 14, No.1, 2018
10.3745/JIPS.04.0056
Keywords: Cloud Computing, Deep Belief Network, IoT, Power Conservation, Smart Metre
Show / Hide Abstract

Analyzing Machine Learning Techniques for Fault Prediction Using Web Applications
Ruchika Malhotra and Anjali Sharma
Page: 751~770, Vol. 14, No.3, 2018
10.3745/JIPS.04.0077
Keywords: Empirical Validation, Fault prediction, Machine Learning, Object-Oriented Metrics, Web Application Quality
Show / Hide Abstract

Measuring the Degree of Content Immersion in a Non-experimental Environment Using a Portable EEG Device
Nam-Ho Keum, Taek Lee, Jung-Been Lee and Hoh Peter In
Page: 1049~1061, Vol. 14, No.4, 2018
10.3745/JIPS.04.0084
Keywords: Automated Collection, BCI, Measurement of Immersion, Noise Filtering, Non-experimental Environment, Portable EEG
Show / Hide Abstract

An Embedded Multifunctional Media System for Mobile Devices in Terrestrial DTV Relaying
Jun Huang and Haibing Yin
Page: 1272~1285, Vol. 14, No.5, 2018
10.3745/JIPS.03.0100
Keywords: DTV, Media Relaying, Media Server, Mobile Devices, Terrestrial Broadcasting
Show / Hide Abstract

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Page: 8~25, Vol. 13, No.1, 2017
10.3745/JIPS.02.0051
Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

A Joint Channel Estimation and Data Detection for a MIMO Wireless Communication System via Sphere Decoding
Gajanan R. Patil and Vishwanath K. Kokate
Page: 1029~1042, Vol. 13, No.4, 2017
10.3745/JIPS.03.0033
Keywords: Maximum Likelihood Decoding, Multiple Input Multiple Output, Normalized Mean Square Error, Training Based Channel Estimation, Semi-Blind Channel Estimation, Spatial Multiplexing, Sphere Decoding
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 1229~1242, Vol. 13, No.5, 2017
10.3745/JIPS.03.0038
Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

Block Sparse Signals Recovery via Block BacktrackingBased Matching Pursuit Method
Rui Qi, Yujie Zhang and Hongwei Li
Page: 360~369, Vol. 13, No.2, 2017
10.3745/JIPS.04.0030
Keywords: Block Sparse Signal, Compressed Sensing, Sparse Signal Reconstruction
Show / Hide Abstract

A Method of Chinese and Thai Cross-Lingual Query Expansion Based on Comparable Corpus
Peili Tang, Jing Zhao, Zhengtao Yu, Zhuo Wang and Yantuan Xian
Page: 805~817, Vol. 13, No.4, 2017
10.3745/JIPS.04.0039
Keywords: Comparable Corpus, Cross-Language Query Expansion, Cross-Language Information Retrieval, Words Relationship
Show / Hide Abstract

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things
Youn-Hee Han, Hyun-Kyo Lim and Joon-Min Gil
Page: 1410~1429, Vol. 13, No.5, 2017
10.3745/JIPS.03.0081
Keywords: Internet of Things, Location Caching Scheme, Location Tracking, Mobile Computing, Mobile Object
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
10.3745/JIPS.03.0049
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016
10.3745/JIPS.03.0032
Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
10.3745/JIPS.03.0045
Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform
Ibtissem Bekkouche and Hadria Fizazi
Page: 555~576, Vol. 12, No.4, 2016
10.3745/JIPS.02.0047
Keywords: Fourier Transform, Fuzzy Clustering, Harmony Search, Processing Image, Remote Sensing
Show / Hide Abstract

X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach
Sajid Ullah Khan, Wang Yin Chai, Chai Soo See and Amjad Khan
Page: 35~45, Vol. 12, No.1, 2016
10.3745/JIPS.02.0029
Keywords: Image Enhancement, Image Fusion, Poisson/Impulse Noise, Sharpening, Wavelet Transform
Show / Hide Abstract

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang and Kimoon Jeong
Page: 229~238, Vol. 11, No.2, 2015
10.3745/JIPS.03.0026
Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Show / Hide Abstract

An Adaptive Superframe Duration Allocation Algorithm for Resource-Efficient Beacon Scheduling
Young-Ae Jeon, Sang-Sung Choi, Dae-Young Kim and Kwang-il Hwang
Page: 295~309, Vol. 11, No.2, 2015
10.3745/JIPS.03.0025
Keywords: Beacon Scheduling, Energy Efficient, IEEE802.15.4, IEEE802.15.4e, LR-WPAN, Superframe Duration Allocation
Show / Hide Abstract

Gesture Input as an Out-of-band Channel
Oyuntungalag Chagnaadorj and Jiro Tanaka
Page: 92~102, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.092
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer
Show / Hide Abstract

A High Quality Steganographic Method Using Morphing
Anant M.Bagade and Sanjay N.Talbar
Page: 256~270, Vol. 10, No.2, 2014
10.3745/JIPS.03.0005
Keywords: Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality
Show / Hide Abstract

A Novel Framework for Defining and Submitting Workflows to Service-Oriented Systems
Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Page: 365~383, Vol. 10, No.3, 2014
10.3745/JIPS.02.0003
Keywords: Service Composition, Service-Oriented Computing, Service-Oriented Workflow, UML2BPEL, Workflow
Show / Hide Abstract

Multifactor Authentication Using a QR Code and a One-Time Password
Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya and G. Sainarayanan
Page: 483~490, Vol. 10, No.3, 2014
10.3745/JIPS.02.0005
Keywords: Authentication, One-Time Password, Personal Assurance Message, Quick Response Code
Show / Hide Abstract

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Sun-Ho Lee and Im-Yeong Lee
Page: 287~300, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.287
Keywords: Searchable Encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage
Show / Hide Abstract

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model
Seok-Hwan Yoon and Joonyoung Min
Page: 621~632, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.621
Keywords: Forest Fire Detection, Gaussian Mixture Models, HSL Color Space, Smoke Signature
Show / Hide Abstract

Discriminatory Projection of Camouflaged Texture Through Line Masks
Nagappa Bhajantri, Pradeep Kumar R and Nagabhushan P
Page: 660~677, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.660
Keywords: Camouflage, Line mask, Enhancement, Texture analysis, Distribution pattern, Histogram, Regression line
Show / Hide Abstract

Dynamic knowledge mapping guided by data mining: Application on Healthcare
Menaouer Brahami, Baghdad Atmani and Nada Matta
Page: 1~30, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.001
Keywords: Knowledge Management, Knowledge Mapping (Knowledge Cartography), Knowledge Representation, Boolean Modeling, Cellular Machine, Data Mining, Boolean Inference Engine
Show / Hide Abstract

Optimal Software Release Using Time and Cost Benefits via Fuzzy Multi-Criteria and Fault Tolerance
Praveen Ranjan Srivastava
Page: 21~54, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.021
Keywords: Software Testing, Fuzzy Multi-Criteria Approach, Fuzzy Logic, Fuzzy Rules Based, Confidence, Centre of Gravity, Fault Tolerance, Kilo Line of Code (KLOC), Software Development Effort (SDE), Software Test Effort (STE), Decision Makers (DM)
Show / Hide Abstract

An Improved Fast and Secure Hash Algorithm
Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar and Nipun Rajan
Page: 119~132, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.119
Keywords: SHA-256, SFHA-256, Improved SFHA-256
Show / Hide Abstract

A Vision-Based Method to Find Fingertips in a Closed Hand
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal and J.L. Raheja
Page: 399~408, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.399
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner Detection
Show / Hide Abstract

A Method for Learning Macro-Actions for Virtual Characters Using Programming by Demonstration and Reinforcement Learning
Yunsick Sung and Kyungeun Cho
Page: 409~420, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.409
Keywords: Reinforcement Learning, Monte Carlo Method, Behavior Generation Model, Programming B y Demonstration, Macro-Action, Multi-Step Action
Show / Hide Abstract

Using an Adaptive Search Tree to Predict User Location
Sechang Oh
Page: 437~444, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.437
Keywords: Location Prediction, Learning System, Search Tree, Context-Awareness
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.495
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

Evaluation of an Abstract Component Model for Embedded Systems Development
Christian Bunse, Yunja Choi and Hans Gerhard Gross
Page: 539~554, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.539
Keywords: Software Development Management, Software Reusability, Modeling
Show / Hide Abstract

Approximate Clustering on Data Streams Using Discrete Cosine Transform
Feng Yu, Damalie Oyana, Wen-Chi Hou and Michael Wainer
Page: 67~78, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.067
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression
Show / Hide Abstract

A New Variational Level Set Evolving Algorithm for Image Segmentation
Yang Fei and Jong Won Park
Page: 1~4, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.001
Keywords: Level Set Methods, Evolving Algorithm, without Re-initialization, Image Segmentation
Show / Hide Abstract

Implementation of Advanced IP Network Technology for IPTV Service
Young-Do Joo
Page: 25~32, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.025
Keywords: IPTV, Premium Backbone, QoS, Multicast, High Availability, Security
Show / Hide Abstract

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics
Byung-Gyu No, Doo-Soon Park, Min Hong, HwaMin Lee and Yoon Sok Park
Page: 33~40, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.033
Keywords: Worm, Random Constant Spreading, Dynamic Network, Depth Distribution Characteristic, Bandwidth Control
Show / Hide Abstract

MMMP: A MAC Protocol to Ensure QoS for Multimedia Traffic over Multi-hop Ad Hoc Networks
Sunil Kumar, Mahasweta Sarkar, Supraja Gurajala and John D. Matyjas
Page: 41~52, Vol. 4, No.2, 2008
10.3745/JIPS.2008.4.2.041
Keywords: Medium Access Control, MAC, Ad Hoc Networks, Multi Hop, QoS, Multimedia
Show / Hide Abstract

Eager Data Transfer Mechanism for Reducing Communication Latency in User-Level Network Protocols
Chulho Won, Ben Lee, Kyoung Park and Myung-Joon Kim
Page: 133~144, Vol. 4, No.4, 2008
10.3745/JIPS.2008.4.4.133
Keywords: Data Transfer, Cache Coherence, User-Level, Low-Latency, Network Protocols, Message, VIA
Show / Hide Abstract

An Evaluation of Multimedia Data Downstream with PDA in an Infrastructure Network
Youn-Sik Hong and Hye-Sun Hur
Page: 76~81, Vol. 2, No.2, 2006
None
Keywords: Multimedia data, downstream, PDA, TCP window size, inter-packet delay
Show / Hide Abstract

Digital Controller of a Diesel Generator using an Embedded System
Kwang Seon Ahn
Page: 143~146, Vol. 2, No.3, 2006
None
Keywords: Diesel Generator, Embedded Controller, Remote Control
Show / Hide Abstract

A Statistic Correlation Analysis Algorithm Between Land Surface Temperature and Vegetation Index
Hyung Moo Kim, Beob Kyun Kim and Kang Soo You
Page: 102~106, Vol. 1, No.1, 2005
None
Keywords: LST, NDVI, Correlation Analysis, Landsat ETM+
Show / Hide Abstract

Privacy-Preservation Using Group Signature for Incentive Mechanisms in Mobile Crowd Sensing
Mihui Kim, Younghee Park and Pankaj Balasaheb Dighe
Page: 0~0, Vol. 0, No.0, 0
10.3745/JIPS.01.0045
Keywords: Incentive Method, Internet of Things (IoT) Model, Mobile Crowd Sensing (MCS), Privacy-Preserving, Using Group Signature
Show / Hide Abstract