Digital Library
Search: "[ author: al ]" (132)
-
Geetanjali Rathee, Nitin Rakesh
Vol. 12, No. 1, pp. 57-72, Mar. 2016
10.3745/JIPS.03.0014
Keywords: WMN, Resiliency, BBR, Routing, RPT -
Moulkheir Naoui, Saïd Mahmoudi, Ghalem Belalem
Vol. 12, No. 1, pp. 149-168, Mar. 2016
10.3745/JIPS.02.0039
Keywords: Active Appearance Model, Data Parallelism, Deformable Model, Distributed Image Processing, Parallel Image Processing, Segmentation -
Rupali Shinde, Min Choi, Su-Hyun Lee
Vol. 15, No. 6, pp. 1438-1448, Dec. 2019
10.3745/JIPS.04.0151
Keywords: debugger, Reverse engineering, VED -
Achmad Rizal, Risanuri Hidayat, Hanung Adi Nugroho
Vol. 15, No. 5, pp. 1068-1081, Oct. 2019
10.3745/JIPS.02.0116
Keywords: Activity, Complexity, Hjorth Descriptor, Lung Sound, Mobility, Wavelet transform -
Mihui Kim, Younghee Park, Pankaj Balasaheb Dighe
Vol. 15, No. 5, pp. 1036-1054, Oct. 2019
10.3745/JIPS.01.0045
Keywords: Incentive Method, Internet of Things (IoT) Model, Mobile Crowd Sensing (MCS), Privacy-Preserving, Using Group Signature -
Jeong Hoon Jo, Pradip Kumar Sharma, Jose Costa Sapalo Sicato, Jong Hyuk Park
Vol. 15, No. 4, pp. 765-784, Aug. 2019
10.3745/JIPS.03.0124
Keywords: Blockchain, Edge Computing, Internet of Things, network security, Smart City -
Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi
Vol. 15, No. 4, pp. 865-889, Aug. 2019
10.3745/JIPS.03.0126
Keywords: Advanced Persistent Threats (APT), Cyber-Attacks, Cyber Kill Chain (CKC), Intelligence Sharing, Knowledge Sharing -
Alok Joshi, Dewansh Aditya Gupta, Pravriti Jaipuriyar
Vol. 15, No. 3, pp. 670-681, Jun. 2019
10.3745/JIPS.03.0119
Keywords: ADC, DAC, DFT, FFT, OFDM, Verilog -
Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel
Vol. 15, No. 3, pp. 538-549, Jun. 2019
10.3745/JIPS.03.0117
Keywords: access control, Cloud Storage, Encryption, Security -
Mohan Kubendiran, Satyapal Singh, Arun Kumar Sangaiah
Vol. 15, No. 2, pp. 239-250, Apr. 2019
10.3745/JIPS.04.0106
Keywords: Blockchain, Cloud Computing, Data Integrity, Data Provenance, E-Health System