Digital Library
Search: "[ author: S ]" (681)
-
Youjin Song, Yasheng Pang
Vol. 10, No. 1, pp. 132-144, Mar. 2014
10.3745/JIPS.2014.10.1.132
Keywords: Cloud Risk, Risk Control, Cloud Computing, BMIS, CSFs -
Ummy Habiba, Md. Imdadul Islam, M. R. Amin
Vol. 10, No. 1, pp. 119-131, Mar. 2014
10.3745/JIPS.2014.10.1.119
Keywords: cognitive radio, VoIP, DTMC, Cross-layer Analytical Model, M/G/1(m) Traffic, IEEE 802.16e/m -
Rasheed Hussain, Heekuck Oh
Vol. 10, No. 1, pp. 103-118, Mar. 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing -
Le Thi Khue Van, Gueesang Lee
Vol. 10, No. 1, pp. 55-68, Mar. 2014
10.3745/JIPS.2014.10.1.055
Keywords: Degraded Document Image, Binarization, Stroke Width, Contrast Feature, Text Boundary -
Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh
Vol. 10, No. 1, pp. 36-54, Mar. 2014
10.3745/JIPS.2014.10.1.036
Keywords: MANET, Inter-Cluster, Intra-Cluster, Mutual Exclusion, Token Ring -
Junho Kim, Seung-Hyun Yoon, Yunjin Lee
Vol. 10, No. 1, pp. 23-35, Mar. 2014
10.3745/JIPS.2014.10.1.023
Keywords: Trivariate B-spline Approximation, Volume Mesh Parameterization, Topological Sphere Model, Harmonic Mapping -
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia, Farnoush Banaei-Kashani
Vol. 10, No. 1, pp. 1-22, Mar. 2014
10.3745/JIPS.2014.10.1.001
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety -
Nagappa Bhajantri, Pradeep Kumar R, Nagabhushan P
Vol. 9, No. 4, pp. 660-677, Dec. 2013
10.3745/JIPS.2013.9.4.660
Keywords: Camouflage, Line Mask, Enhancement, Texture analysis, Distribution pattern, histogram, Regression line -
Moneeb Gohar, Seok-Joo Koh
Vol. 9, No. 4, pp. 651-659, Dec. 2013
10.3745/JIPS.2013.9.4.651
Keywords: HIP, Network-based, Handover, simulations -
Kancherla Jonah Nishanth, Vadlamani Ravi
Vol. 9, No. 4, pp. 633-650, Dec. 2013
10.3745/JIPS.2013.9.4.633
Keywords: Data Imputation, General Regression Neural Network (GRNN), Evolving Clustering Method (ECM), Imputation, K-Medoids clustering, k-Means Clustering, MLP