Digital Library
Search: "[ keyword: IT ]" (506)
-
Dongyan Wang, Fanfan Yang, Heng Zhang
Vol. 12, No. 4, pp. 765-778, Dec. 2016
10.3745/JIPS.03.0055
Keywords: Digital Color Image Watermark, Discrete Wavelet Transformation (DWT), LU Decomposition, Normalized Correlation (NC), Structural Similarity (SSIM) -
Kethepalli Mallikarjuna, Kodati Satya Prasad, M. V. Subramanyam
Vol. 12, No. 4, pp. 754-764, Dec. 2016
10.3745/JIPS.02.0049
Keywords: Degree of Sparsity, Discrete Rajan Transform, Sparsification -
Meeyeon Lee, Ye-Seul Park, Jung-Won Lee
Vol. 12, No. 4, pp. 741-753, Dec. 2016
10.3745/JIPS.04.0027
Keywords: Acute Myocardial Infarction, Data Model, Hospital Information System, Ischemic Stroke, Medical Image, Medical Information, Ontology -
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila, Nurul Hashimah Ahamed Hassain Malim
Vol. 12, No. 4, pp. 724-740, Dec. 2016
10.3745/JIPS.01.0012
Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening -
Nawal Sad Houari, Noria Taghezout
Vol. 12, No. 4, pp. 688-710, Dec. 2016
10.3745/JIPS.03.0056
Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent -
Md. Mostafa Kamal Sarker, Moon Kyou Song
Vol. 12, No. 4, pp. 661-680, Dec. 2016
10.3745/JIPS.02.0050
Keywords: Cross-correlation, Global Threshold, License Plate Recognition, Radon Transformation, Traffic Surveillance -
Liping Wang, Chengyou Wang, Wei Huang, Xiao Zhou
Vol. 12, No. 4, pp. 631-643, Dec. 2016
10.3745/JIPS.02.0046
Keywords: Image deblocking, Adaptive-Weighted Bilateral Filter, Blind Image Quality Assessment (BIQA), Local Entropy -
Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim, Yoo-Joo Cho
Vol. 12, No. 4, pp. 612-630, Dec. 2016
10.3745/JIPS.02.0048
Keywords: Augmented Reality, Authoring Tool, Interactive Mobile, Mobile App -
Suman P, ey, Young Joon Won, Mi-Jung Choi, Joon-Min Gil
Vol. 12, No. 4, pp. 577-590, Dec. 2016
10.3745/JIPS.03.0057
Keywords: Community Formation, Datamining, HbbTV, Smart TV -
Mohammed Hatem Ali Al-Hooti, Supeno Djanali, Tohari Ahmad
Vol. 12, No. 3, pp. 525-537, Sep. 2016
10.3745/JIPS.03.0054
Keywords: Audio, Data Hiding, Modulus Function, Information Security, network security