Digital Library


Vol. 11, No. 2, Jun. 2015  



  1. Bayu Adhi Tama
    Vol. 11, No. 2, pp. 165-172, Jun. 2015  
    https://doi.org/10.3745/JIPS.04.0015

    Keywords: Educational Data Mining, Ensemble Techniques, Inactive Student, Open University
    Show / Hide Abstract

  2. Xiao Qiang, He Rui-chun, Zhang Wei
    Vol. 11, No. 2, pp. 173-183, Jun. 2015  
    https://doi.org/10.3745/JIPS.04.0012

    Keywords: Abnormal Point, Credit Scoring, Density, e-Commerce
    Show / Hide Abstract

  3. Prem Kumar Singh, Ch. Aswani Kumar
    Vol. 11, No. 2, pp. 184-204, Jun. 2015  
    https://doi.org/10.3745/JIPS.04.0009

    Keywords: Crisp Context, Concept Lattice, Formal Concept Analysis, Fuzzy Formal Concept, Fuzzy Relation, Knowledge Reduction
    Show / Hide Abstract

  4. Amine Dahane, Nasr-Eddine Berrached, Abdelhamid Loukil
    Vol. 11, No. 2, pp. 205-228, Jun. 2015  
    https://doi.org/10.3745/JIPS.02.0019

    Keywords: clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks
    Show / Hide Abstract

  5. Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang, Kimoon Jeong
    Vol. 11, No. 2, pp. 229-238, Jun. 2015  
    https://doi.org/10.3745/JIPS.03.0026

    Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
    Show / Hide Abstract

  6. N, ini Malhotra, Geeta Nagpal
    Vol. 11, No. 2, pp. 239-247, Jun. 2015  
    https://doi.org/10.3745/JIPS.03.0017

    Keywords: Crossover, IDEA, Genetic Algorithm, mutation, Symmetric Key Generation
    Show / Hide Abstract

  7. Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee, Hong-Woo Chun
    Vol. 11, No. 2, pp. 248-265, Jun. 2015  
    https://doi.org/10.3745/JIPS.04.0008

    Keywords: Bioinformatics, Event Extraction, Maximum Entropy, Text-Mining
    Show / Hide Abstract

  8. Aly Mohamed El-Semary, Mohamed Mostafa A. Azim,
    Vol. 11, No. 2, pp. 266-279, Jun. 2015  
    https://doi.org/10.3745/JIPS.03.0031

    Keywords: authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
    Show / Hide Abstract

  9. Bong-Joo Jang, Suk-Hwan Lee, SangHun Lim, Ki-Ryong Kwon
    Vol. 11, No. 2, pp. 280-294, Jun. 2015  
    https://doi.org/10.3745/JIPS.02.0013

    Keywords: Biological Virus Modeling, Copyright protection, Infectious Watermarking, Video Watermarking
    Show / Hide Abstract

  10. Young-Ae Jeon, Sang-Sung Choi, Dae-Young Kim, Kwang-il Hwang
    Vol. 11, No. 2, pp. 295-309, Jun. 2015  
    https://doi.org/10.3745/JIPS.03.0025

    Keywords: Beacon Scheduling, Energy Efficient, IEEE802.15.4, IEEE802.15.4e, LR-WPAN, Superframe Duration Allocation
    Show / Hide Abstract

  11. Mishal Almazrooie, Azman Samsudin, Manmeet Mahinderjit Singh
    Vol. 11, No. 2, pp. 310-324, Jun. 2015  
    https://doi.org/10.3745/JIPS.02.0024

    Keywords: Chaos Theory, Cryptography, Differential Attacks, Hash Function, Logistic Map, Salsa20, Stream Cipher
    Show / Hide Abstract