


default search action
International Journal of Software Innovation, Volume 6
Volume 6, Number 1, 2018
- Mohamed K. Elhadad

, Khaled M. Badran
, Goda Ismaeel Salama
:
A Novel Approach for Ontology-Based Feature Vector Generation for Web Text Document Classification. 1-10 - Xiaohui Li, Hongbin Dong, Yang Zhou, Jun He:

A Matching Approach to Factor Scores Based on Online Sponsored Search Auction. 11-30 - Kanokwan Atchariyachanvanich

, Nichaporn Mitinunwong, Butsaraporn Tamthong, Noboru Sonehara:
Determinants of Personal Health Information Disclosure: A Case of Mobile Application. 31-43 - Ahmad A. Saifan, Hiba Alsghaier, Khaled Alkhateeb:

Evaluating the Understandability of Android Applications. 44-57 - Omar A. M. Salem, Liwei Wang:

Fuzzy Mutual Information Feature Selection Based on Representative Samples. 58-72
Volume 6, Number 2, 2018
- Xiaoyi Zhou, Jixin Ma

, Xiaoming Yao, Honglei Li:
A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations. 1-9 - Yucong Duan, Lixu Shao, Gongzhu Hu:

Specifying Knowledge Graph with Data Graph, Information Graph, Knowledge Graph, and Wisdom Graph. 10-25 - Kota Nomura, Makoto Fukumoto

:
Music Melodies Suited to Multiple Users' Feelings Composed by Asynchronous Distributed Interactive Genetic Algorithm. 26-36 - Kohei Fujisawa, Atsushi Nunome

, Kiyoshi Shibayama, Hiroaki Hirata
:
Design Space Exploration for Implementing a Software-Based Speculative Memory System. 37-49 - Salima Bella, Assia Belbachir

, Ghalem Belalem
:
A Centralized Autonomous System of Cooperation for UAVs- Monitoring and USVs- Cleaning. 50-76 - Fatima Kabli, Reda Mohamed Hamou

, Abdelmalek Amine
:
Protein Classification Using N-gram Technique and Association Rules. 77-89
Volume 6, Number 3, 2018
- Masato Konishi, Seiya Okubo, Tetsuro Nishino, Mitsuo Wakatsuki:

A Decision Tree Analysis of a Multi-Player Card Game With Imperfect Information. 1-17 - Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi:

Probably Secure Efficient Anonymous Credential Scheme. 18-35 - Mohammed Al-Obeidallah

, Miltos Petridis, Stelios Kapetanakis:
A Multiple Phases Approach for Design Patterns Recovery Based on Structural and Method Signature Features. 36-52 - Kensuke Tanioka, Hiroshi Yadohisa

:
Unfolding Models for Asymmetric Dissimilarity Data With External Information Based on Path Structures. 53-66 - Tian Nie, Yi Ding, Chen Zhao, Youchao Lin, Takehito Utsuro:

A Method of Subtopic Classification of Search Engine Suggests by Integrating a Topic Model and Word Embeddings. 67-78 - Sahar A. El-Rahman, Tarek A. El-Shishtawy, Raafat El-Kammar:

A Knowledge-Based Machine Translation Using AI Technique. 79-92 - Layla Mohammed Alrawais, Mamdouh Alenezi

, Mohammad Akour
:
Security Testing Framework for Web Applications. 93-117
Volume 6, Number 4, 2018
- Shunki Takami, Kazuo Takayanagi, Shivashish Jaishy

, Nobuhiro Ito, Kazunori Iwata
:
Agent-Development Framework Based on Modular Structure to Research Disaster-Relief Activities. 1-15 - Long Niu, Sachio Saiki, Masahide Nakamura:

Using Non-Intrusive Environmental Sensing for ADLS Recognition in One-Person Household. 16-29 - Shota Sakaue, Hiroki Nomiya, Teruhisa Hochin:

Unsupervised Estimation of Facial Expression Intensity for Emotional Scene Retrieval in Lifelog Videos. 30-45 - Takuhiro Kagawa, Sachio Saiki, Masahide Nakamura:

PRISM: Visualizing Personalized Real-Time Incident on Security Map. 46-58 - Yudai Kuwahata, Jun-ichi Kushida, Satoshi Ono

:
A Preliminary Study on Adaptive Evolution Control Using Rank Correlation for Surrogate-Assisted Evolutionary Computation. 59-72 - Takayuki Yoshida, Teruhisa Hochin, Hiroki Nomiya:

Automatic Composition System Based on Melodic Outlines and Music Theory. 73-85 - Partha Ghosh

, Takaaki Goto
, Soumya Sen:
Taxicab Geometry Based Analysis on Skyline for Business Intelligence. 86-102 - Junqi Guo, Ke Shan, Hao Wu, Rongfang Bie, Wenwan You, Di Lu:

Research on Facial Expression Recognition Technology Based on Convolutional-Neural-Network Structure. 103-116 - Matt Sinda, Tyler Danner, Sean O'Neill, Abeer Alqurashi, Haeng-Kon Kim:

Improving the Bluetooth Hopping Sequence for Better Security in IoT Devices. 117-131

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














