Search Word(s) in Title, Keywords, Authors, and Abstract: VIA

A Survey of Multimodal Systems and Techniques for Motor Learning
Ramin Tadayon, Troy McDaniel and Sethuraman Panchanathan
Page: 8~25, Vol. 13, No.1, 2017
10.3745/JIPS.02.0051

Keywords: Augmented Motor Learning and Training, Multimodal Systems and Feedback, Rehabilitative Technologies
Show / Hide Abstract

A Joint Channel Estimation and Data Detection for a MIMO Wireless Communication System via Sphere Decoding
Gajanan R. Patil and Vishwanath K. Kokate
Page: 1029~1042, Vol. 13, No.4, 2017
10.3745/JIPS.03.0033

Keywords: Maximum Likelihood Decoding, Multiple Input Multiple Output, Normalized Mean Square Error, Training Based Channel Estimation, Semi-Blind Channel Estimation, Spatial Multiplexing, Sphere Decoding
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 1229~1242, Vol. 13, No.5, 2017
10.3745/JIPS.03.0038

Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

Block Sparse Signals Recovery via Block BacktrackingBased Matching Pursuit Method
Rui Qi, Yujie Zhang and Hongwei Li
Page: 360~369, Vol. 13, No.2, 2017
10.3745/JIPS.04.0030

Keywords: Block Sparse Signal, Compressed Sensing, Sparse Signal Reconstruction
Show / Hide Abstract

A Method of Chinese and Thai Cross-Lingual Query Expansion Based on Comparable Corpus
Peili Tang, Jing Zhao, Zhengtao Yu, Zhuo Wang and Yantuan Xian
Page: 805~817, Vol. 13, No.4, 2017
10.3745/JIPS.04.0039

Keywords: Comparable Corpus, Cross-Language Query Expansion, Cross-Language Information Retrieval, Words Relationship
Show / Hide Abstract

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things
Youn-Hee Han, Hyun-Kyo Lim and Joon-Min Gil
Page: 1410~1429, Vol. 13, No.5, 2017
10.3745/JIPS.03.0081

Keywords: Internet of Things, Location Caching Scheme, Location Tracking, Mobile Computing, Mobile Object
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
10.3745/JIPS.03.0049

Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks
Yasmine-Derdour, Bouabdellah-Kechar and Mohammed Fayc?al-Khelfi
Page: 275~294, Vol. 12, No.2, 2016
10.3745/JIPS.03.0032

Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs
Show / Hide Abstract

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks
Sang-Yong Choi, Daehyeok Kim and Yong-Min Kim
Page: 422~435, Vol. 12, No.3, 2016
10.3745/JIPS.03.0045

Keywords: Drive-by Download, Malware Distribution Network, Webpage Link Analysis, Web Security
Show / Hide Abstract

A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform
Ibtissem Bekkouche and Hadria Fizazi
Page: 555~576, Vol. 12, No.4, 2016
10.3745/JIPS.02.0047

Keywords: Fourier Transform, Fuzzy Clustering, Harmony Search, Processing Image, Remote Sensing
Show / Hide Abstract

X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach
Sajid Ullah Khan, Wang Yin Chai, Chai Soo See and Amjad Khan
Page: 35~45, Vol. 12, No.1, 2016
10.3745/JIPS.02.0029

Keywords: Image Enhancement, Image Fusion, Poisson/Impulse Noise, Sharpening, Wavelet Transform
Show / Hide Abstract

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang and Kimoon Jeong
Page: 229~238, Vol. 11, No.2, 2015
10.3745/JIPS.03.0026

Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Show / Hide Abstract

An Adaptive Superframe Duration Allocation Algorithm for Resource-Efficient Beacon Scheduling
Young-Ae Jeon, Sang-Sung Choi, Dae-Young Kim and Kwang-il Hwang
Page: 295~309, Vol. 11, No.2, 2015
10.3745/JIPS.03.0025

Keywords: Beacon Scheduling, Energy Efficient, IEEE802.15.4, IEEE802.15.4e, LR-WPAN, Superframe Duration Allocation
Show / Hide Abstract

Gesture Input as an Out-of-band Channel
Oyuntungalag Chagnaadorj and Jiro Tanaka
Page: 92~102, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.092
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer
Show / Hide Abstract

A High Quality Steganographic Method Using Morphing
Anant M.Bagade and Sanjay N.Talbar
Page: 256~270, Vol. 10, No.2, 2014
10.3745/JIPS.03.0005
Keywords: Morphed Steganography, Hiding Capacity, Imperceptibility, Stego Image Quality
Show / Hide Abstract

A Novel Framework for Defining and Submitting Workflows to Service-Oriented Systems
Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Page: 365~383, Vol. 10, No.3, 2014
10.3745/JIPS.02.0003
Keywords: Service Composition, Service-Oriented Computing, Service-Oriented Workflow, UML2BPEL, Workflow
Show / Hide Abstract

Multifactor Authentication Using a QR Code and a One-Time Password
Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya and G. Sainarayanan
Page: 483~490, Vol. 10, No.3, 2014
10.3745/JIPS.02.0005
Keywords: Authentication, One-Time Password, Personal Assurance Message, Quick Response Code
Show / Hide Abstract

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Sun-Ho Lee and Im-Yeong Lee
Page: 287~300, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.287
Keywords: Searchable Encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage
Show / Hide Abstract

An Intelligent Automatic Early Detection System of Forest Fire Smoke Signatures using Gaussian Mixture Model
Seok-Hwan Yoon and Joonyoung Min
Page: 621~632, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.621
Keywords: Forest Fire Detection, Gaussian Mixture Models, HSL Color Space, Smoke Signature
Show / Hide Abstract

Discriminatory Projection of Camouflaged Texture Through Line Masks
Nagappa Bhajantri, Pradeep Kumar R and Nagabhushan P
Page: 660~677, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.660
Keywords: Camouflage, Line mask, Enhancement, Texture analysis, Distribution pattern, Histogram, Regression line
Show / Hide Abstract

Dynamic knowledge mapping guided by data mining: Application on Healthcare
Menaouer Brahami, Baghdad Atmani and Nada Matta
Page: 1~30, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.001
Keywords: Knowledge Management, Knowledge Mapping (Knowledge Cartography), Knowledge Representation, Boolean Modeling, Cellular Machine, Data Mining, Boolean Inference Engine
Show / Hide Abstract

Optimal Software Release Using Time and Cost Benefits via Fuzzy Multi-Criteria and Fault Tolerance
Praveen Ranjan Srivastava
Page: 21~54, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.021
Keywords: Software Testing, Fuzzy Multi-Criteria Approach, Fuzzy Logic, Fuzzy Rules Based, Confidence, Centre of Gravity, Fault Tolerance, Kilo Line of Code (KLOC), Software Development Effort (SDE), Software Test Effort (STE), Decision Makers (DM)
Show / Hide Abstract

An Improved Fast and Secure Hash Algorithm
Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar and Nipun Rajan
Page: 119~132, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.119
Keywords: SHA-256, SFHA-256, Improved SFHA-256
Show / Hide Abstract

A Vision-Based Method to Find Fingertips in a Closed Hand
Ankit Chaudhary, Kapil Vatwani, Tushar Agrawal and J.L. Raheja
Page: 399~408, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.399
Keywords: Hand Shape Parameters, Fingertips Detection, Skin Filter, Natural Computing, Corner Detection
Show / Hide Abstract

A Method for Learning Macro-Actions for Virtual Characters Using Programming by Demonstration and Reinforcement Learning
Yunsick Sung and Kyungeun Cho
Page: 409~420, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.409
Keywords: Reinforcement Learning, Monte Carlo Method, Behavior Generation Model, Programming B y Demonstration, Macro-Action, Multi-Step Action
Show / Hide Abstract

Using an Adaptive Search Tree to Predict User Location
Sechang Oh
Page: 437~444, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.437
Keywords: Location Prediction, Learning System, Search Tree, Context-Awareness
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.495
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

Evaluation of an Abstract Component Model for Embedded Systems Development
Christian Bunse, Yunja Choi and Hans Gerhard Gross
Page: 539~554, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.539
Keywords: Software Development Management, Software Reusability, Modeling
Show / Hide Abstract

Approximate Clustering on Data Streams Using Discrete Cosine Transform
Feng Yu, Damalie Oyana, Wen-Chi Hou and Michael Wainer
Page: 67~78, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.067
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression
Show / Hide Abstract

A New Variational Level Set Evolving Algorithm for Image Segmentation
Yang Fei and Jong Won Park
Page: 1~4, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.001
Keywords: Level Set Methods, Evolving Algorithm, without Re-initialization, Image Segmentation
Show / Hide Abstract

Implementation of Advanced IP Network Technology for IPTV Service
Young-Do Joo
Page: 25~32, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.025
Keywords: IPTV, Premium Backbone, QoS, Multicast, High Availability, Security
Show / Hide Abstract

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics
Byung-Gyu No, Doo-Soon Park, Min Hong, HwaMin Lee and Yoon Sok Park
Page: 33~40, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.033
Keywords: Worm, Random Constant Spreading, Dynamic Network, Depth Distribution Characteristic, Bandwidth Control
Show / Hide Abstract

MMMP: A MAC Protocol to Ensure QoS for Multimedia Traffic over Multi-hop Ad Hoc Networks
Sunil Kumar, Mahasweta Sarkar, Supraja Gurajala and John D. Matyjas
Page: 41~52, Vol. 4, No.2, 2008
10.3745/JIPS.2008.4.2.041
Keywords: Medium Access Control, MAC, Ad Hoc Networks, Multi Hop, QoS, Multimedia
Show / Hide Abstract

Eager Data Transfer Mechanism for Reducing Communication Latency in User-Level Network Protocols
Chulho Won, Ben Lee, Kyoung Park and Myung-Joon Kim
Page: 133~144, Vol. 4, No.4, 2008
10.3745/JIPS.2008.4.4.133
Keywords: Data Transfer, Cache Coherence, User-Level, Low-Latency, Network Protocols, Message, VIA
Show / Hide Abstract

An Evaluation of Multimedia Data Downstream with PDA in an Infrastructure Network
Youn-Sik Hong and Hye-Sun Hur
Page: 76~81, Vol. 2, No.2, 2006
None
Keywords: Multimedia data, downstream, PDA, TCP window size, inter-packet delay
Show / Hide Abstract

Digital Controller of a Diesel Generator using an Embedded System
Kwang Seon Ahn
Page: 143~146, Vol. 2, No.3, 2006
None
Keywords: Diesel Generator, Embedded Controller, Remote Control
Show / Hide Abstract

A Statistic Correlation Analysis Algorithm Between Land Surface Temperature and Vegetation Index
Hyung Moo Kim, Beob Kyun Kim and Kang Soo You
Page: 102~106, Vol. 1, No.1, 2005
None
Keywords: LST, NDVI, Correlation Analysis, Landsat ETM+
Show / Hide Abstract