default search action
Journal of Information Science and Engineering, Volume 36
Volume 36, Number 1, January 2020
- Tarak K. Kodali, Yilin Zhang, Eugene John, Wei-Ming Lin:
An Asynchronous High-Performance Approximate Adder with Low-Cost Error Correction. 1-12 - Junaid Akram, Zhendong Shi, Majid Mumtaz, Ping Luo:
DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool. 13-29 - Chia-Cheng Lee, Yu Chin Cheng, Chin-Yun Hsieh:
Composition and Testing of Connection Fault Handling Behaviors in Programs with AND/OR Graph. 31-52 - Nien-Lin Hsueh:
Design Pattern Analysis with Software Evolution Data. 53-73
- Sharaf Hussain, Shakeel A. Khoja:
Retrieval of Mathematical Information with Syntactic and Semantic Structure over Web. 75-89 - Rosdiana Shahril, Atsushi Saito, Akinobu Shimizu, Sabariah Baharun:
Bleeding Classification of Enhanced Wireless Capsule Endoscopy Images using Deep Convolutional Neural Network. 91-108
- Der-Rong Din:
Delay-Variation Constrained Spectrum Extraction and Contraction Problem for Multipath Routing on Elastic Optical Networks. 109-125
- Chung-Yi Lin, Wen-Guey Tzeng:
A Cooperative Game-Theoretic Model in Cloud Storage Auditing. 127-143 - Jen-Wei Huang, Yong-Bin Wu, Bijay Prasad Jaysawal:
On Mining Progressive Positive and Negative Sequential Patterns Simultaneously. 145-169 - Hyunkwang Shin, Byung-Won On, Ingyu Lee, Gyu Sang Choi:
Bucket-Sorted Hash Join. 171-190
Volume 36, Number 2, March
- Raya Mohammed Mahmood, Sefer Kurnaz:
Employing Data Mining to Predict Professional Identity. 193-203 - Maalim A. Aljabery, Sefer Kurnaz:
Applying Datamining Techniques to Predict Hearing Aid Type for Audiology Patients. 205-215 - Mohammed Ahmed, Nayyef Talib, Layth Al-Gebory:
Investigation of Corrosion Behavior of Carbon Steel for Petroleum Pipeline Applications under Turbulent Flow Conditions. 217-229 - Dheyaa Shaheed Al-Azzawi:
Evaluation of Genetic Algorithm Optimization in Machine Learning. 231-241 - Jamal Muafaq Hameed Al-Bayati:
Quality of Service Routing for MANET and Internet Hybrid Network to Support Communication Restoration Teams in Disaster Situations. 243-258 - Gurram Narendra Santosh Kumar, A. Srinath:
Induction Motor for Pedestrian Transportation in Benz Circle Vijayawada. 259-268 - Jamal Kh-Madhloom, Sinan Adnan Diwan, Abdulhussein Ali Zainab:
Smile Detection using Convolutional Neural Network and Fuzzy Logic. 269-278 - Lellis M. Thivagar, Abdulsattar Abdullah Hamad, S. G. Ahmed:
Conforming Dynamics in the Metric Spaces. 279-291 - Husam Ibrahiem Alsaadi, Almuttari M. Rafah, Oguz Bayat, Osman Nuri Ucani:
Computational Intelligence Algorithms to Handle Dimensionality Reduction for Enhancing Intrusion Detection System. 293-308 - Sevilay Bayatli, Sefer Kurnaz, Aboelhamd Ali, Jonathan North Washington, Francis M. Tyers:
Unsupervised Weighting of Transfer Rules in Rule-Based Machine Translation using Maximum-Entropy Approach. 309-322 - Ameen Sh. Ameen, Khattab M. Ali Alheeti, Salah A. Aliesawi:
Employing Graph Theory in Enhancing Power Energy of Wireless Sensor Networks. 323-335 - Eman Turki Mahdi, Maha Mahmood, Raghad Alabboodi:
A Proposed Hybrid Biometric Technique for Patterns Distinguishing. 337-345 - Reda Elbarougy, Gamal Behery, Akram el Khatib:
Graph-Based Extractive Arabic Text Summarization Using Multiple Morphological Analyzers. 347-363 - Theyazn H. H. Aldhyani, Ali Saleh Ali Alshebami, Mohammed Yahya Alzahrani:
Soft Computing Model to Predict Chronic Diseases. 365-376 - Osamah Ibrahim Khalaf, Ghaida Muttashar Abdulsahib, Bayan Mahdi Sabbar:
Optimization of Wireless Sensor Network Coverage using the Bee Algorithm. 377-386
- Zhao Huang, Quan Wang:
Enhancing Architecture-level Security of SoC Designs via the Distributed Security IPs Deployment Methodology. 387-421
- Po-Jen Chuang, Yen-Chia Huang:
Live Save: An Efficient Snapshot Mechanism for Virtual Machines in Xen. 423-440
- Mohamed Jaward Bah, Hongzhi Wang:
A Parametric and Non-Parametric Approach for High-Accurate Outlier Detection. 441-465
Volume 36, Number 3, May
- Chao-Chun Yeh, Han-Lin Lu, Jiazheng Zhou, Sheng-An Chang, Xuan-Yi Lin, Yichiao Sun, Shih-Kun Huang:
Big Data Platform Configuration Using Machine Learning. 469-493 - Dongmin Jang, Sujune Lee, Yoowon Jang, Hohyeon Jeong, Eunseok Lee:
A Novel Debugging Technique Based on Lightweight Crash Report Considering Security. 495-512 - Chien-Hung Liu, Woei-Kae Chen, Chen-Yan Liao:
Detecting Duplicate Actions in a KDT Script Based on LRS and LCS. 513-533
- Da-Huei Lee, Pei-Yin Chen, Fu-Jhong Yang, Wan-Ting Weng:
High-Efficient Low-Cost VLSI Implementation for Canny Edge Detection. 535-546 - Wei-Ho Tsai, Shiang-Shiun Kung:
Automatic Methods for Detecting Sung Lyrics Error. 547-559 - Wen-Jie Song, Chen Chen, Tian-Yang Sun, Wei Wang:
A Robust Equalization Feature for Language Recognition. 561-576 - Ge Pei, Haichang Gao, Xin Zhou, Nuo Cheng:
Feature Pooling - A Feature Compression Method Used in Convolutional Neural Networks. 577-596
- Amir Rezapour, Wen-Guey Tzeng:
A Robust Algorithm for Predicting Attacks Using Collaborative Security Logs. 597-619 - Che-Yi Chao, Ja-Chen Lin:
Selection of Embedding Area: A Better Way to Use Prediction-Error Expansion Method for Reversible Hiding. 621-641
- Shin-Yan Chiou, Zhen-Yuan Liao:
Design and Implementation of Beacon-Based Positioning. 643-658 - Ming-Hwa Cheng, Yan-Jing Wu, Wen-Shyang Hwang, Yong-Shin Huang:
Downlink Packet Scheduling with Minimum-Bandwidth Provisions in LTE/LTE-A Networks. 659-670
- Alberto Fernández Oliva, Francisco Maciá Pérez, José Vicente Berná-Martínez, Miguel Alfonso Abreu Ortega:
A Method Non-Deterministic and Computationally Viable for Detecting Outliers in Large Datasets. 671-685
Volume 36, Number 4, July
- Liyuan Xiao, Zhao Li, Lu Zhen, Jia Liu, Yang Xu:
Taichi: Signal Dodging and Interference Guiding to Enhance Data Transmission. 689-707 - Pengfei Yang, Jiayang Huang, Xin Mi, Bo Wan:
A Memory Confidentiality Protection Scheme Based on Dynamic Keys and Compression Counter. 709-726 - Lujie Zhong, Shujie Yang, Jiewei Chen:
QoS Aware Multi-Convergence Node Coordination Mechanism Based on Cellular Automata in Vehicular Sensor Networks. 727-743 - Hongtao Li, Linxia Gong, Feng Guo, Quanli Miao, Jie Wang, Tao Zhang:
Location Privacy Protection in Mobile Social Networks Based on l -diversity. 745-763 - Yichuan Wang, Binbin Bai, Xinhong Hei, Ju Ren, Wenjiang Ji:
Classification and Recognition of Unknown Network Protocol Characteristics. 765-776 - Mohit Kumar, Sonu Mittal, Mohammad Amir Khusru Akhtar:
A NSGA-II Based Energy Efficient Routing Algorithm for Wireless Sensor Networks. 777-794 - Cong Gao, Zhongmin Wang, Yanping Chen, Zhenzhou Tian:
A Scalable Two-Hop Multi-Sink Wireless Sensor Network for Data Collection in Large-Scale Smart Manufacturing Facilities. 795-819 - Jiawei Zheng, Xuewen Dong, Yulong Shen, Wei Tong:
Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT. 821-836 - Muhammad Azfar Yaqub, Syed Hassan Ahmed, Dongkyun Kim:
An Improved Push-based Protocol for Critical Data Dissemination in Vehicular Named Data Networks. 837-849 - Jun Li, Ming Chen:
A Novel Mobility-aware Gradient Forwarding Algorithm for Unmanned Aerial Vehicle Ad Hoc Networks. 851-864 - Gaofeng Hong, Wei Su, Qili Wen, Penglei Wu:
RAVEC: An Optimal Resource Allocation Mechanism in Vehicular MEC Systems. 865-878 - Yuan Su, Qiang Cao, Zhenqiang Wu:
Authorized Certificateless Conjunctive Keyword Search on Encrypted EHRs from WSNs. 879-894
- Myoungwon Oh, Anul Sung, Sanggeol Lee, Hyeonsang Eom, Heon Y. Yeom:
A Methodology for Improving the Performance of Paravirtual I/O Systems Based on Fast NVM Devices. 895-919 - Yuan-Ko Huang:
Processing Location-Based Aggregate Queries in Road Networks. 921-935
- Der-Rong Din, Meng-Xun Zhan:
The Survivable RBCMLSA Problem on EONs. 937-952
Volume 36, Number 5, September
- Kuntesh K. Jani, Animesh Anand, Subodh Srivastava, Rajeev Srivastava:
Automatic Abnormality Detection System for Capsule Endoscopy. 955-966 - Kah Haw Law:
Modelling of Charging Control Scheme for QZSI with Battery Topology. 967-979 - Jitendra Kumar, Ashutosh Kumar Singh:
Adaptive Learning based Prediction Framework for Cloud Datacenter Networks' Workload Anticipation. 981-992 - Ishu Gupta, Ashutosh Kumar Singh:
An Integrated Approach for Data Leaker Detection in Cloud Environment. 993-1005 - Hong Hui Tan, King Hann Lim:
Vanishing Gradient Analysis in Stochastic Diagonal Approximate Greatest Descent Optimization. 1007-1019 - Sharaf Hussain, Samita Bai, Shakeel A. Khoja:
Rule Based Conversion of L A T E X Math Equations into Content MathML (CMML). 1021-1034 - Telajala Venkata Mahendra, Sheikh Wasmir Hussain, Sandeep Mishra, Anup Dandapat:
A Novel Low-Power Matchline Evaluation Technique for Content Addressable Memory (CAM). 1035-1053 - Nithin P. B., Albert Francis, Ajai John Chemmanam, Bijoy Antony Jose, Jimson Mathew:
Interactive Robotic Testbed for Performance Assessment of Machine Learning based Computer Vision Techniques. 1055-1067 - Mian Mian Lau, King Hann Lim:
Convolutional and Fully Connected Layer in DFN. 1069-1078 - Niraj Bagh, T. Janardhan Reddy, M. Ramasubba Reddy:
Detection of Motor Imagery Movements in EEG-based BCI. 1079-1091 - Huanhuan Zhao, Zuchang Ma, Yining Sun:
Efficiently Controlling Wireless Data Centers with Exact Topology Adjustment Strategy. 1093-1105 - Wategaonkar Narayan Wategaonkar, Reshmi T. R:
A Risk Assessment Approach of Hypertension Based on Mobile Crowd Sensing. 1107-1124 - Dhanashri Narayan Wategaonkar, T. R. Reshmi:
ECSO-Based Energy-Efficient Reliable Sectoring-Scheme in WSN. 1125-1140 - Mehmet Emir Koksal:
An Alternative Method for Cryptology in Secret Communication. 1141-1152
Volume 36, Number 6, November
- Mostafa A. Elhosseini:
Heat Exchanger Design using Differential Evolution-Based ABC. 1155-1166 - Azhari A. Elhag, Abdullah M. Almarashi:
Forecasting Based on Some Statistical and Machine Learning Methods. 1167-1177 - Fenglong Wu, Hui Liang, Chao Ge, Fei Liang, Qian Zhang, Jian-Zhou Lu:
Semantic Framework Promotes Interactive Puppetry Animation Production to Assist Storytelling Training. 1179-1189 - Tahani A. Abushal:
Estimation for Exponentiated Weibull Distribution under Accelerated Multiple Type-II Censored Samples. 1191-1210 - Ebtehal Almohaimeed, Ali Allahem:
Poincaré Section for Hide Coupled Dynamo Model. 1211-1221 - Yousef Alnafisah:
Comparison Between Milstein and Exact Coupling Methods using MATLAB for a Particular Two-Dimensional Stochastic Differential Equation. 1223-1232 - Ali Algarni, Abdullah M. Almarashi, Sayed Abdel-Khalek:
Photon Statistics, Tomographic Entropy of a Single Qubit-Radiation Field in the Even Binomial Distribution. 1233-1242 - Ali Algarni, Abdullah M. Almarashi, Gamal Amin Abd-Elmougod:
Joint Type-I Generalized Hybrid Censoring for Estimation Two Weibull Distributions. 1243-1260 - Noura H. AlShamrani, Ahmed M. Elaiw, Hanan Ali Batarfi, Aatef D. Hobiny:
Modeling and Analysis of Scabies Transmission Disease. 1261-1277 - Abdel-Haleem Abdel-Aty, Mostafa M. A. Khater, Ahmed Mohamed Zidan, Raghda A. M. Attia:
New Analytical Solutions of Wick-Type Stochastic Schamel KdV Equation Via Modified Khater Method. 1279-1291
- Tayyab Ahmed Shaikh, Syed Sajjad Hussain, Muhammad Rizwan Tanweer, Manzoor Ahmed Hashmani:
Broadening Selection Competitive Constraint Handling Algorithm for Faster Convergence. 1293-1314 - Yu-Chi Liu, Meng-Huang Lee, Shin-Hung Chang, Wei-Chun Chung, Kuan-Jen Wang, Jan-Ming Ho, Ray-I Chang:
Scheduling for the QOE Optimization of DASH Streaming. 1315-1337 - Hong-Ji Wang, Xiang Xu, Baomin Xu, Yu Shuang-Yuan, Wang Quan-Xin:
Student-Centric Network Learning for Improved Knowledge Transfer. 1339-1351 - Pei-Jun Lee, Hong-Li Lin, Trong-An Bui:
An Asymmetric Filter Based 3D Synthesis Algorithm with Depth Region Classification. 1353-1374
- Ridhima Mehta:
Optimal Huffman Coding Performance of Ad-Hoc Networks Based on Cross-Layer Design. 1375-1386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.