The Journal of Information Processing Systems, Volume 12 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 12, Number 1, 2016

Sajid Ullah Khan, Wang Yin Chai, Chai Soo See, Amjad Khan:
X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach. 35-45

Premanand Pralhad Ghadekar
, Nilkanth B. Chopade
:
Content Based Dynamic Texture Analysis and Synthesis Based on SPIHT with GPU. 46-56

Geetanjali Rathee, Nitin Rakesh
:
Resilient Packet Transmission (RPT) for Buffer Based Routing (BBR) Protocol. 57-72

Sang-Seon Byun:
An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks. 73-82

Ravinder Kumar, Pravin Chandra
, Madasu Hanmandlu:
A Robust Fingerprint Matching System Using Orientation Features. 83-99

Christian Gerber, Mokdong Chung:
Number Plate Detection with a Multi-Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices. 100-108

Ye-Seul Park, Meeyeon Lee, Myung-Hee Kim, Jung-Won Lee:
Analysis of Semantic Relations Between Multimodal Medical Images Based on Coronary Anatomy for Acute Myocardial Infarction. 129-148

Moulkheir Naoui, Saïd Mahmoudi
, Ghalem Belalem
:
Feasibility Study of a Distributed and Parallel Environment for Implementing the Standard Version of AAM Model. 149-168

Sangmin Lee, Dongho Kim:
The Effects of Industry Classification on a Successful ERP Implementation Model. 169-181
Volume 12, Number 2, 2016

Kenan Mu, Fei Hui, Xiangmo Zhao:
Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching. 183-195

Moneeb Gohar, Seok Joo Koh:
Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks. 196-213

Saleena Nabizath
, Vineeth Paleri
:
An Improved Algorithm for Redundancy Detection Using Global Value Numbering. 214-225

Jayaprakash Kar
, Manoj Ranjan Mishra
:
Mitigating Threats and Security Metrics in Cloud Computing. 226-233

Kuldeep Gurjar, Yang-Sae Moon:
Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance. 234-248

Samaneh Mashhadi
:
Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes. 249-262

Yan Li, Dongho Kim, Byeong-Seok Shin:
Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL. 263-274

Yasmine Derdour, Kechar Bouabdellah, Mohamed Fayçal Khelfi:
Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks. 275-294

Muhammad Sajjad Khan, Insoo Koo:
The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks. 295-309

Gautham Sekar, Soumyadeep Bhattacharya:
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. 310-312

Ayman Al-Dmour
, Mohammed Abuhelaleh
, Ahmed Musa, Hasan Al-Shalabi:
An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping. 322-331
Volume 12, Number 3, 2016

Jong Hyuk Park:
[Editorial] Advanced Technologies and Applications for Security and Multimedia Computing. 333-337

Alireza Khatamian, Hamid R. Arabnia
:
Survey on 3D Surface Reconstruction. 338-357

Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef, Lamia Hadrich Belguith
:
A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic. 358-380

Sunghyu Han, Il-Yong Lee, Jung-Ho Ahn:
Two-Dimensional Joint Bayesian Method for Face Verification. 381-391

Leila Boussaad, Mohamed Benmohammed, Redha Benzid:
Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis. 392-409

Hao Chao, Cheng Song:
Landmark-Guided Segmental Speech Decoding for Continuous Mandarin Speech Recognition. 410-421

Sang-Yong Choi, Daehyeok Kim, Yongmin Kim:
ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks. 422-435

Chantana Chantrapornchai, Paingruthai Nusawat
:
Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns. 436-454

Hyeong-Won Seo, Hong-Seok Kwon, Min-Ah Cheon, Jae-Hoon Kim
:
Bilingual Multiword Expression Alignment by Constituent-Based Similarity Score. 455-467

Ammar Chouchane, Mebarka Belahcene, Abdelmalik Ouamane, Salah Bourennane:
Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification. 468-488

Jeong Kyu Lee, Seo Yeon Moon, Jong Hyuk Park:
HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet. 489-501

Yanyan Hou, Xiuzhen Wang, Sanrong Liu:
A Multiple Features Video Copy Detection Algorithm Based on a SURF Descriptor. 502-510

Van-Giang Nguyen, Younghan Kim:
SDN-Based Enterprise and Campus Networks: A Case of VLAN Management. 511-524

Mohammed Hatem Ali Al-Hooti, Supeno Djanali, Tohari Ahmad
:
Audio Data Hiding Based on Sample Value Modification Using Modulus Function. 525-537

Wenzheng Zhu, Changhoon Lee:
A Security Protection Framework for Cloud Computing. 538-547
Volume 12, Number 4, 2016

Jong Hyuk Park:
[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors. 549-554

Ibtissem Bekkouche
, Fizazi Hadria
:
A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform. 555-576

Suman Pandey, Youngjoon Won, Mi-Jung Choi, Joon-Min Gil:
Community Model for Smart TV over the Top Services. 577-590

Arif Muntasa
:
Homogeneous and Non-homogeneous Polynomial Based Eigenspaces to Extract the Features on Facial Images. 591-611

Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim, Yoo-Joo Choi:
Interactive Authoring Tool for Mobile Augmented Reality Content. 612-630

Liping Wang
, Cheng-You Wang
, Wei Huang, Xiao Zhou
:
Image Deblocking Scheme for JPEG Compressed Images Using an Adaptive-Weighted Bilateral Filter. 631-643

Mohamed Belaoued
, Smaine Mazouzi:
A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features. 644-660

Md. Mostafa Kamal Sarker
, Moon Kyou Song:
Segmentation and Recognition of Korean Vehicle License Plate Characters Based on the Global Threshold Method and the Cross-Correlation Matching Algorithm. 661-680

Salima Lalani, Dharmapal Dronacharya Doye:
A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique. 681-687

Sad-Houari Nawal, Noria Taghezout:
A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm. 688-710

Fei Hao
, Doo-Soon Park, Sangyeon Woo, Se Dong Min, Sewon Park:
Treatment Planning in Smart Medical: A Sustainable Strategy. 711-723

Mohd-Norhadri Mohd-Hilmi, Marwah Al Laila
, Nurul Hashimah Ahamed Hassain Malim
:
Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms. 724-740

Meeyeon Lee, Ye-Seul Park, Jung-Won Lee:
Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke. 741-753

Kethepalli Mallikarjuna
, K. Satya Prasad, Makam Venkata Subramanyam
:
Sparsification of Digital Images Using Discrete Rajan Transform. 754-764

Dongyan Wang
, Fanfan Yang
, Heng Zhang
:
Blind Color Image Watermarking Based on DWT and LU Decomposition. 765-778

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







