Digital Library
Search: "[ author: hu ]" (242)
-
JongBeom Lim, DaeWon Lee, Kwang-Sik Chung, HeonChang Yu
Vol. 15, No. 5, pp. 1192-1200, Oct. 2019
10.3745/JIPS.04.0139
Keywords: Artificial intelligence, Cloud Computing, Edge-Cloud Systems, Fog Computing, Resource Management -
Hui Zeng, Qi Wang, Chen Li, Wei Song
Vol. 15, No. 5, pp. 1179-1191, Oct. 2019
10.3745/JIPS.02.0120
Keywords: Learning-Based Multiple Pooling Fusion, Multi-View Convolutional Neural Network, 3D Model Classification, 3D Model Retrieval -
Hongyi Cao, Qiaomu Ren, Xiuguo Zou, Shuaitang Zhang, Yan Qian
Vol. 15, No. 5, pp. 1156-1170, Oct. 2019
10.3745/JIPS.02.0119
Keywords: Boxplot Method, DBSCAN Clustering Algorithm, Main Grid, SCADA, Theoretical Line Loss -
Kaiqun Hu, Xin Feng
Vol. 15, No. 5, pp. 1131-1140, Oct. 2019
10.3745/JIPS.04.0134
Keywords: Canopy Volume Measurement, Tracer Deposition Device, Ultrasonic Sensor, Variable Rate Spraying System -
Wei Jia, Qingyi Hua, Minjun Zhang, Rui Chen, Xiang Ji, Bo Wang
Vol. 15, No. 4, pp. 986-1016, Aug. 2019
10.3745/JIPS.04.0131
Keywords: Intuitionistic Fuzzy Entropy Measure, Mobile User Interface Pattern, Particle Swarm Optimization, Population Search Strategy, Semi-Supervised Kernel Fuzzy C-Means -
Jun Huang, Xiuhui Wang, Jun Wang
Vol. 15, No. 4, pp. 957-966, Aug. 2019
10.3745/JIPS.02.0115
Keywords: Gait Energy Image, Gait Recognition, Kernel Fisher Discriminant Analysis, Natural Gait Cycle -
Khusanbek Gafurov, Tai-Myoung Chung
Vol. 15, No. 4, pp. 797-819, Aug. 2019
10.3745/JIPS.03.0125
Keywords: Cloud, Edge, IoT, IoT Security, MEC/MCC, RFID, WSN, 5G -
Lianhui Li, Guanying Xu, Hongguang Wang
Vol. 15, No. 3, pp. 655-669, Jun. 2019
10.3745/JIPS.04.0118
Keywords: adaptive weight, D-S Theory, Fuzzy-Rough-Sets-AHP, Green Supply Chain, Supplier Evaluation -
Shuiping Ni, Huigang Chang, Yuping Xu
Vol. 15, No. 3, pp. 604-615, Jun. 2019
10.3745/JIPS.03.0122
Keywords: adaptive spectrum sensing, Cognitive Radio, Detection Time, Fusion Center, SNR Estimation, Voting Rule -
Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel
Vol. 15, No. 3, pp. 538-549, Jun. 2019
10.3745/JIPS.03.0117
Keywords: access control, Cloud Storage, Encryption, Security