


default search action
The Journal of Information Processing Systems, Volume 12
Volume 12, Number 1, 2016
- Ning Yu, Zeng Yu, Bing Li, Feng Gu, Yi Pan

:
A Comprehensive Review of Emerging Computational Methods for Gene Identification. 1-34 - Sajid Ullah Khan, Wang Yin Chai, Chai Soo See, Amjad Khan:

X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach. 35-45 - Premanand Pralhad Ghadekar

, Nilkanth B. Chopade
:
Content Based Dynamic Texture Analysis and Synthesis Based on SPIHT with GPU. 46-56 - Geetanjali Rathee, Nitin Rakesh

:
Resilient Packet Transmission (RPT) for Buffer Based Routing (BBR) Protocol. 57-72 - Sang-Seon Byun:

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks. 73-82 - Ravinder Kumar, Pravin Chandra

, Madasu Hanmandlu:
A Robust Fingerprint Matching System Using Orientation Features. 83-99 - Christian Gerber, Mokdong Chung:

Number Plate Detection with a Multi-Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices. 100-108 - Wei Xu, Zhi Xiao:

Soft Set Theory Oriented Forecast Combination Method for Business Failure Prediction. 109-128 - Ye-Seul Park, Meeyeon Lee, Myung-Hee Kim, Jung-Won Lee:

Analysis of Semantic Relations Between Multimodal Medical Images Based on Coronary Anatomy for Acute Myocardial Infarction. 129-148 - Moulkheir Naoui, Saïd Mahmoudi

, Ghalem Belalem
:
Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model. 149-168 - Sangmin Lee, Dongho Kim:

The Effects of Industry Classification on a Successful ERP Implementation Model. 169-181
Volume 12, Number 2, 2016
- Kenan Mu, Fei Hui, Xiangmo Zhao:

Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching. 183-195 - Moneeb Gohar, Seok Joo Koh:

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks. 196-213 - Saleena Nabizath

, Vineeth Paleri
:
An Improved Algorithm for Redundancy Detection Using Global Value Numbering. 214-225 - Jayaprakash Kar

, Manoj Ranjan Mishra
:
Mitigating Threats and Security Metrics in Cloud Computing. 226-233 - Kuldeep Gurjar, Yang-Sae Moon:

Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance. 234-248 - Samaneh Mashhadi

:
Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes. 249-262 - Yan Li, Dongho Kim, Byeong-Seok Shin:

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL. 263-274 - Yasmine Derdour, Kechar Bouabdellah, Mohamed Fayçal Khelfi:

Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks. 275-294 - Muhammad Sajjad Khan, Insoo Koo:

The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks. 295-309 - Gautham Sekar, Soumyadeep Bhattacharya:

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. 310-312 - Ayman Al-Dmour

, Mohammed Abuhelaleh
, Ahmed Musa, Hasan Al-Shalabi:
An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping. 322-331
Volume 12, Number 3, 2016
- Jong Hyuk Park:

[Editorial] Advanced Technologies and Applications for Security and Multimedia Computing. 333-337 - Alireza Khatamian, Hamid R. Arabnia

:
Survey on 3D Surface Reconstruction. 338-357 - Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef, Lamia Hadrich Belguith

:
A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic. 358-380 - Sunghyu Han, Il-Yong Lee, Jung-Ho Ahn:

Two-Dimensional Joint Bayesian Method for Face Verification. 381-391 - Leila Boussaad, Mohamed Benmohammed, Redha Benzid:

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis. 392-409 - Hao Chao, Cheng Song:

Landmark-Guided Segmental Speech Decoding for Continuous Mandarin Speech Recognition. 410-421 - Sang-Yong Choi, Daehyeok Kim, Yongmin Kim:

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks. 422-435 - Chantana Chantrapornchai, Paingruthai Nusawat

:
Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns. 436-454 - Hyeong-Won Seo, Hong-Seok Kwon, Min-Ah Cheon, Jae-Hoon Kim

:
Bilingual Multiword Expression Alignment by Constituent-Based Similarity Score. 455-467 - Ammar Chouchane, Mebarka Belahcene, Abdelmalik Ouamane, Salah Bourennane:

Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification. 468-488 - Jeong Kyu Lee, Seo Yeon Moon, Jong Hyuk Park:

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet. 489-501 - Yanyan Hou, Xiuzhen Wang, Sanrong Liu:

A Multiple Features Video Copy Detection Algorithm Based on a SURF Descriptor. 502-510 - Van-Giang Nguyen, Younghan Kim:

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management. 511-524 - Mohammed Hatem Ali Al-Hooti, Supeno Djanali, Tohari Ahmad

:
Audio Data Hiding Based on Sample Value Modification Using Modulus Function. 525-537 - Wenzheng Zhu, Changhoon Lee:

A Security Protection Framework for Cloud Computing. 538-547
Volume 12, Number 4, 2016
- Jong Hyuk Park:

[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors. 549-554 - Ibtissem Bekkouche

, Fizazi Hadria
:
A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform. 555-576 - Suman Pandey, Youngjoon Won, Mi-Jung Choi, Joon-Min Gil:

Community Model for Smart TV over the Top Services. 577-590 - Arif Muntasa

:
Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images. 591-611 - Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim, Yoo-Joo Choi:

Interactive Authoring Tool for Mobile Augmented Reality Content. 612-630 - Liping Wang

, Cheng-You Wang
, Wei Huang, Xiao Zhou
:
Image Deblocking Scheme for JPEG Compressed Images Using an Adaptive-Weighted Bilateral Filter. 631-643 - Mohamed Belaoued

, Smaine Mazouzi:
A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features. 644-660 - Md. Mostafa Kamal Sarker

, Moon Kyou Song:
Segmentation and Recognition of Korean Vehicle License Plate Characters Based on the Global Threshold Method and the Cross-Correlation Matching Algorithm. 661-680 - Salima Lalani, Dharmapal Dronacharya Doye:

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique. 681-687 - Sad-Houari Nawal, Noria Taghezout:

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm. 688-710 - Fei Hao

, Doo-Soon Park, Sangyeon Woo, Se Dong Min, Sewon Park:
Treatment Planning in Smart Medical: A Sustainable Strategy. 711-723 - Mohd-Norhadri Mohd-Hilmi, Marwah Al Laila

, Nurul Hashimah Ahamed Hassain Malim
:
Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms. 724-740 - Meeyeon Lee, Ye-Seul Park, Jung-Won Lee:

Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke. 741-753 - Kethepalli Mallikarjuna

, K. Satya Prasad, Makam Venkata Subramanyam
:
Sparsification of Digital Images Using Discrete Rajan Transform. 754-764 - Dongyan Wang

, Fanfan Yang
, Heng Zhang
:
Blind Color Image Watermarking Based on DWT and LU Decomposition. 765-778

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














