default search action
The Journal of Information Processing Systems, Volume 12
Volume 12, Number 1, 2016
- Ning Yu, Zeng Yu, Bing Li, Feng Gu, Yi Pan:
A Comprehensive Review of Emerging Computational Methods for Gene Identification. 1-34 - Sajid Ullah Khan, Wang Yin Chai, Chai Soo See, Amjad Khan:
X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach. 35-45 - Premanand Pralhad Ghadekar, Nilkanth B. Chopade:
Content Based Dynamic Texture Analysis and Synthesis Based on SPIHT with GPU. 46-56 - Geetanjali Rathee, Nitin Rakesh:
Resilient Packet Transmission (RPT) for Buffer Based Routing (BBR) Protocol. 57-72 - Sang-Seon Byun:
An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks. 73-82 - Ravinder Kumar, Pravin Chandra, Madasu Hanmandlu:
A Robust Fingerprint Matching System Using Orientation Features. 83-99 - Christian Gerber, Mokdong Chung:
Number Plate Detection with a Multi-Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices. 100-108 - Wei Xu, Zhi Xiao:
Soft Set Theory Oriented Forecast Combination Method for Business Failure Prediction. 109-128 - Ye-Seul Park, Meeyeon Lee, Myung-Hee Kim, Jung-Won Lee:
Analysis of Semantic Relations Between Multimodal Medical Images Based on Coronary Anatomy for Acute Myocardial Infarction. 129-148 - Moulkheir Naoui, Saïd Mahmoudi, Ghalem Belalem:
Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model. 149-168 - Sangmin Lee, Dongho Kim:
The Effects of Industry Classification on a Successful ERP Implementation Model. 169-181
Volume 12, Number 2, 2016
- Kenan Mu, Fei Hui, Xiangmo Zhao:
Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching. 183-195 - Moneeb Gohar, Seok Joo Koh:
Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks. 196-213 - Saleena Nabizath, Vineeth Paleri:
An Improved Algorithm for Redundancy Detection Using Global Value Numbering. 214-225 - Jayaprakash Kar, Manoj Ranjan Mishra:
Mitigating Threats and Security Metrics in Cloud Computing. 226-233 - Kuldeep Gurjar, Yang-Sae Moon:
Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance. 234-248 - Samaneh Mashhadi:
Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes. 249-262 - Yan Li, Dongho Kim, Byeong-Seok Shin:
Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL. 263-274 - Yasmine Derdour, Kechar Bouabdellah, Mohamed Fayçal Khelfi:
Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks. 275-294 - Muhammad Sajjad Khan, Insoo Koo:
The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks. 295-309 - Gautham Sekar, Soumyadeep Bhattacharya:
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. 310-312 - Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa, Hasan Al-Shalabi:
An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping. 322-331
Volume 12, Number 3, 2016
- Jong Hyuk Park:
[Editorial] Advanced Technologies and Applications for Security and Multimedia Computing. 333-337 - Alireza Khatamian, Hamid R. Arabnia:
Survey on 3D Surface Reconstruction. 338-357 - Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef, Lamia Hadrich Belguith:
A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic. 358-380 - Sunghyu Han, Il-Yong Lee, Jung-Ho Ahn:
Two-Dimensional Joint Bayesian Method for Face Verification. 381-391 - Leila Boussaad, Mohamed Benmohammed, Redha Benzid:
Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis. 392-409 - Hao Chao, Cheng Song:
Landmark-Guided Segmental Speech Decoding for Continuous Mandarin Speech Recognition. 410-421 - Sang-Yong Choi, Daehyeok Kim, Yongmin Kim:
ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks. 422-435 - Chantana Chantrapornchai, Paingruthai Nusawat:
Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns. 436-454 - Hyeong-Won Seo, Hong-Seok Kwon, Min-Ah Cheon, Jae-Hoon Kim:
Bilingual Multiword Expression Alignment by Constituent-Based Similarity Score. 455-467 - Ammar Chouchane, Mebarka Belahcene, Abdelmalik Ouamane, Salah Bourennane:
Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification. 468-488 - Jeong Kyu Lee, Seo Yeon Moon, Jong Hyuk Park:
HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet. 489-501 - Yanyan Hou, Xiuzhen Wang, Sanrong Liu:
A Multiple Features Video Copy Detection Algorithm Based on a SURF Descriptor. 502-510 - Van-Giang Nguyen, Younghan Kim:
SDN-Based Enterprise and Campus Networks: A Case of VLAN Management. 511-524 - Mohammed Hatem Ali Al-Hooti, Supeno Djanali, Tohari Ahmad:
Audio Data Hiding Based on Sample Value Modification Using Modulus Function. 525-537 - Wenzheng Zhu, Changhoon Lee:
A Security Protection Framework for Cloud Computing. 538-547
Volume 12, Number 4, 2016
- Jong Hyuk Park:
[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors. 549-554 - Ibtissem Bekkouche, Fizazi Hadria:
A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform. 555-576 - Suman Pandey, Youngjoon Won, Mi-Jung Choi, Joon-Min Gil:
Community Model for Smart TV over the Top Services. 577-590 - Arif Muntasa:
Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images. 591-611 - Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim, Yoo-Joo Choi:
Interactive Authoring Tool for Mobile Augmented Reality Content. 612-630 - Liping Wang, Cheng-You Wang, Wei Huang, Xiao Zhou:
Image Deblocking Scheme for JPEG Compressed Images Using an Adaptive-Weighted Bilateral Filter. 631-643 - Mohamed Belaoued, Smaine Mazouzi:
A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features. 644-660 - Md. Mostafa Kamal Sarker, Moon Kyou Song:
Segmentation and Recognition of Korean Vehicle License Plate Characters Based on the Global Threshold Method and the Cross-Correlation Matching Algorithm. 661-680 - Salima Lalani, Dharmapal Dronacharya Doye:
A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique. 681-687 - Nawal Sad Houari, Noria Taghezout:
A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm. 688-710 - Fei Hao, Doo-Soon Park, Sangyeon Woo, Se Dong Min, Sewon Park:
Treatment Planning in Smart Medical: A Sustainable Strategy. 711-723 - Mohd-Norhadri Mohd-Hilmi, Marwah Al Laila, Nurul Hashimah Ahamed Hassain Malim:
Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms. 724-740 - Meeyeon Lee, Ye-Seul Park, Jung-Won Lee:
Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke. 741-753 - Kethepalli Mallikarjuna, K. Satya Prasad, M. V. Subramanyam:
Sparsification of Digital Images Using Discrete Rajan Transform. 754-764 - Dongyan Wang, Fanfan Yang, Heng Zhang:
Blind Color Image Watermarking Based on DWT and LU Decomposition. 765-778
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.