


default search action
KSII Transactions on Internet and Information Systems, Volume 18
Volume 18, Number 1, January 2024
Artificial Intelligence & Big Data
- Na Wang, Xianglian Zhao:

Time-Series Forecasting Based on Multi-Layer Attention Architecture. 1-14 - Yunbo Rao, Tian Tan, Shaoning Zeng, Zhanglin Cheng, Jihong Sun:

A dual path encoder-decoder network for placental vessel segmentation in fetoscopic surgery. 15-29 - Yonghyun Lee, Eunchan Kim

:
Deep Learning-based Delinquent Taxpayer Prediction: A Scientific Administrative Approach. 30-45
IoT & Application
- Anusha Bamini A. M., R. Chitra, Saurabh Agarwal

, Hyunsung Kim, Punitha Stephan, Thompson Stephan:
IoT-Based Automatic Water Quality Monitoring System with Optimized Neural Network. 46-63 - Yang Liu, Yingqi Fan, Ling Zhao, Bo Mi:

A refinement and abstraction method of the SPZN formal model for intelligent networked vehicles systems. 64-88
Information Systems
- Noorah Abdullah Al Manyi, Ahmad Fadhil Yusof, Ali Safaa Sadiq:

Emerging Trends in Cloud-Based E-Learning: A Systematic Review of Predictors, Security and Themes. 89-104 - Faizan Ullah

, Muhammad Nadeem, Muhammad Abrar:
Revolutionizing Brain Tumor Segmentation in MRI with Dynamic Fusion of Handcrafted Features and Global Pathway-based Deep Learning. 105-125
Multimedia & Computer Vision
- Porawat Visutsak

, Xiabi Liu, Keun Ho Ryu, Naphat Bussabong, Nicha Sirikong, Preeyaphorn Intamong, Warakorn Sonnui, Siriwan Boonkerd, Jirawat Thongpiem, Maythar Poonpanit, Akarasate Homwiseswongsa, Kittipot Hirunwannapong, Chaimongkol Suksomsong, Rittikait Budrit:
Transfer Learning for Caladium bicolor Classification: Proof of Concept to Application Development. 126-146
Security & Privacy
- Jun Yan, Jiawang Chen, Yihui Zhou, Zhenqiang Wu, Laifeng Lu:

An Uncertain Graph Method Based on Node Random Response to Preserve Link Privacy of Social Networks. 147-169 - Mohammed Abdul Majeed, Rossilawati Sulaiman, Zarina Shukur:

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption. 170-191 - Yang Hua, Xu Xi

, Chengyi Qu, Jinglong Du, Maofeng Weng, Bao Ye:
An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformation. 192-210
Wireless Communication
- Jie Lu, Wenjiang Feng, Dan Pu:

Resource Allocation and Offloading Decisions of D2D Collaborative UAV-assisted MEC Systems. 211-232 - K. Vamshi Krishna, Ganesh Reddy Karri:

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm. 233-262
Volume 18, Number 2, February 2024
Artificial Intelligence & Big Data
- Fengqian Pang, Xi Chen, Letong Li, Xin Xu, Zhiqiang Xing:

F_MixBERT: Sentiment Analysis Model using Focal Loss for Imbalanced E-commerce Reviews. 263-283 - Navin K., M. B. Mukesh Krishnan:

Knowledge Based Recommender System for Disease Diagnostic and Treatment Using Adaptive Fuzzy-Blocks. 284-310 - Jingjing Ye, Jun Wang:

Visual Model of Pattern Design Based on Deep Convolutional Neural Network. 311-326
IoT & Application
- Ziyang Jin, Yijun Wang, Jingying Lv:

Edge Computing Task Offloading of Internet of Vehicles Based on Improved MADDPG Algorithm. 327-347 - Haoyi Zhong, Yongjiang Zhao, Chang Gyoon Lim:

Abnormal State Detection using Memory-augmented Autoencoder technique in Frequency-Time Domain. 348-369
Information Systems
- Nur 'Aisyah Binti Zakaria Adli, Muneer Ahmad

, Norjihan Binti Abdul Ghani
, Sri Devi Ravana, Azah Anir Norman:
An Ensemble Classification of Mental Health in Malaysia related to the Covid-19 Pandemic using Social Media Sentiment Analysis. 370-396 - Farhan Hanis Muhmad Asri

, Dalbir Singh, Zulkefli Mansor, Helmi Norman:
A Review of Cross-Cultural Design to Improve User Engagement for Learning Management System. 397-419
Multimedia & Computer Vision
- Lingyun Yang, Yuning Dong, Zaijian Wang, Feifei Gao:

One-dimensional CNN Model of Network Traffic Classification based on Transfer Learning. 420-437 - Dong Yu, Jian Jin, Lili Meng, Zhipeng Chen, Huaxiang Zhang:

Adversarial Complementary Learning for Just Noticeable Difference Estimation. 438-455
Security & Privacy
- Xiangyu Ma, Yuntao Zhao, Yongxin Feng, Yutao Hu

:
A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism. 456-477 - Guoyong Han, Hongluan Zhao:

Revisited Security Evaluation on Midori-64 against Differential Cryptanalysis. 478-493 - Kangseok Kim:

An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDS. 494-510 - Sol-Bee Lee, Jung-Hyok Kwon, Bu-Young Kim, Woo-Seong Shim, Dongwan Kim, Eui-Jik Kim:

Block-based Self-organizing TDMA for Reliable VDES in SANETs. 511-527
Volume 18, Number 3, March 2024
Artificial Intelligence & Big Data
- Ran Tian, Bo Wang, Chu Wang:

MAGRU: Multi-layer Attention with GRU for Logistics Warehousing Demand Prediction. 528-550 - Tianyang Li, Yingnan Han, Xiaolong Li:

A DQN-based Two-Stage Scheduling Method for Real-Time Large-Scale EVs Charging Service. 551-569 - Swapna Davies, Jaison Jacob

:
Novel Algorithms for Early Cancer Diagnosis Using Transfer Learning with MobileNetV2 in Thermal Images. 570-590
Information Systems
- Mehmet F. Karaca

:
Effects of Preprocessing on Text Classification in Balanced and Imbalanced Datasets. 591-609 - Abdulaziz Alanazi

, Nur Fazidah Elias, Hazura Mohamed, Noraidah Sahari:
The Critical Success Factors Influencing the Use of Mobile Learning and its Perceived Impacts in Students' Education: A Systematic Literature Review. 610-632 - Shahid Saleem, Saif Ur Rehman Malik

, Bilal Mehboob, Roobaea Alroobaea
, Sultan Abdullah Algarni, Abdullah M. Baqasah
, Naveed Ahmad, Muhammad Hasnain:
A UML-based Approach towards Test Case Generation and Optimization. 633-652
Multimedia & Computer Vision
- Cunzhe Liu, Zhen Hua, Jinjiang Li:

Deep Reference-based Dynamic Scene Deblurring. 653-669 - YeonSeung Choo, Boeun Kim, Hyun-Sik Kim, Yong-Suk Park:

3D Cross-Modal Retrieval Using Noisy Center Loss and SimSiam for Small Batch Training. 670-684
Security & Privacy
- L. Arulmozhiselvan, Elangovan Uma

:
Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications. 685-703 - Mamoona Arshad, Ahmad Karim:

Android Botnet Detection Using Hybrid Analysis. 704-719 - Jingjie Liu, Suzhen Cao, Caifen Wang, Chenxu Liu:

An Efficient PSI-CA Protocol Under the Malicious Model. 720-737 - Hong Zhang, Lang Li, Di Li:

Improve the Performance of Semi-Supervised Side-channel Analysis Using HWFilter Method. 738-754 - R. Alexander

, K. Pradeep Mohan Kumar:
Genetic Algorithm based hyperparameter tuned CNN for identifying IoT intrusions. 755-778 - T. Madhuvanthi, A. Revathi:

A Survey on UAV Network for Secure Communication and Attack Detection: A focus on Q-learning, Blockchain, IRS and mmWave Technologies. 779-800 - Jiping Li

, Yuanyuan Zhang
, Lixiang Shen, Jing Cao, Wenwu Xie, Yi Zheng, Shouyin Liu:
An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs. 801-825
Volume 18, Number 4, April 2024
Artificial Intelligence & Big Data
- Ruochen Huang

, Zhiyuan Wei, Wei Feng, Yong Li, Changwei Zhang, Chen Qiu, Mingkai Chen:
Edge Computing Model based on Federated Learning for COVID-19 Clinical Outcome Prediction in the 5G Era. 826-842 - Xiaorui Shao, Su Yeon Lee, Chang Soo Kim:

A Novel and Effective University Course Scheduler Using Adaptive Parallel Tabu Search and Simulated Annealing. 843-859 - Inayatul Haq, Tehseen Mazhar

, Hinna Hafeez, Najib Ullah, Fatma Mallek, Habib Hamam:
Exploring Machine Learning Classifiers for Breast Cancer Classification. 860-880
IoT & Application
- Sony P., G. Siva Shanmugam, Sureshkumar Nagarajan:

Enhancement of Semantic Interoperability in Healthcare Systems Using IFCIoT Architecture. 881-902 - Fengjiao Zhou, Rui Ma, Mohamad Shaharudin bin Samsurijan, Xiaoqin Xie:

Design of Smart City Considering Carbon Emissions under The Background of Industry 5.0. 903-921
Mobile Communication
- Kyeongjea Lee, Tae-Woo Kim, Sungyoon Cho, Kiwon Kwon, Dong Ku Kim:

Evaluating Relay Beamwidth for Enhanced Coverage and Data Rates in Buoy-Assisted Maritime Communications. 922-937
Multimedia & Computer Vision
- Hongliang Zhu, Hui Yin, Yanting Liu, Ning Chen:

Dual-stream Co-enhanced Network for Unsupervised Video Object Segmentation. 938-958 - A. Hussain

, P. Balaji Srikaanth:
Leveraging Deep Learning and Farmland Fertility Algorithm for Automated Rice Pest Detection and Classification Model. 959-979 - Canlin Li, Shun Song, Pengcheng Gao, Wei Huang, Lihua Bi:

EDMFEN: Edge detection-based multi-scale feature enhancement Network for low-light image enhancement. 980-997
Security & Privacy
- Guangwei Xu, Chen Wang, Shan Li, Xiujin Shi, Xin Luo, Yanglan Gan:

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing. 998-1019 - Lejun Zhang, Bo Zhang, Ran Guo, Zhujun Wang, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian, Sergey Gataullin

:
Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount. 1020-1041
Wireless Communication
- Yuke Sun, Aihua Zhang, Hao Yang, Di Tian, Haowen Xia

:
Near-Optimal Low-Complexity Hybrid Precoding for THz Massive MIMO Systems. 1042-1058 - Amrutha Sasidharan

, Santhi Venkatakrishnan:
Intension to Use Mobile Banking: An Integration of Theory of Planned Behaviour (TPB) and Technology Acceptance Model (TAM). 1059-1074 - Xuancheng Jin, Zhen Cheng, Zhian Ye, Weihua Gong:

Optimizations of Multi-hop Cooperative Molecular Communication in Cylindrical Anomalous-Diffusive Channel. 1075-1089
Papers on APIC-IST 2023
- Haein Lee

, Hae Sun Jung, Heungju Park, Jang Hyun Kim:
CORRECT? CORECT!: Classification of ESG Ratings with Earnings Call Transcript. 1090-1100 - Jialei Ye, Xiaoyou He, Ziyang Liu:

Identification of Demand Type Differences and Their Impact on Consumer Behavior: A Case Study Based on Smart Wearable Product Design. 1101-1121 - Yootae Shin, Qianfeng Lin, Jooyoung Son:

A Comparison of Deep Learning Models for IQ Fingerprint Map Based Indoor Positioning in Ship Environments. 1122-1140
Volume 18, Number 5, May 2024
Artificial Intelligence & Big Data
- Tao Li, Liang Wang, Lina Wang, Rui Han:

Super-Resolution Reconstruction of Humidity Fields based on Wasserstein Generative Adversarial Network with Gradient Penalty. 1141-1162 - Panpan Guo, Gang Zhou, Jicang Lu, Zhufeng Li, Taojie Zhu:

Paper Recommendation Using SPECTER with Low-Rank and Sparse Matrix Factorization. 1163-1185 - Boying Zhao, Yuanyuan Qu, Mengliang Mu, Bing Xu, Wei He:

An Interpretable Bearing Fault Diagnosis Model Based on Hierarchical Belief Rule Base. 1186-1207 - Yun Meng:

Massive Music Resources Retrieval Method Based on Ant Colony Algorithm. 1208-1222 - Zilong Jin, Chi Zhang, Lejun Zhang:

An Inference Similarity-based Federated Learning Framework for Enhancing Collaborative Perception in Autonomous Driving. 1223-1237
IoT & Application
- Xiangyu Shi, Zhixia Zhang, Zhihua Cui, Xingjuan Cai:

Many-objective joint optimization for dependency-aware task offloading and service caching in mobile edge computing. 1238-1259
Mobile Communication
- Liu Hui:

Intelligent recommendation method of intelligent tourism scenic spot route based on collaborative filtering. 1260-1272
Networking
- Kookjin Kim, Jaepil Youn

, Hansung Kim, Dongil Shin, Dongkyoo Shin:
State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis. 1273-1300 - Seong-Mok Kim, Ye-Eun Jeong, Yong Soo Kim, Youn-Ho Lee, Seung Young Lee:

Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles. 1301-1316 - Long Cheng, Yuanyuan Shi, Chen Cui, Yuqing Zhou:

An Indoor Localization Algorithm of UWB and INS Fusion based on Hypothesis Testing. 1317-1340
Security & Privacy
- Ihsan Günes:

Robustness Analysis of a Novel Model-Based Recommendation Algorithms in Privacy Environment. 1341-1368
Wireless Communication
- Ting Li, Jinbiao Zhang:

A Novel Broadband Channel Estimation Technique Based on Dual-Module QGAN. 1369-1389 - Rooh Ullah, Beenish Ayesha Akram, Amna Zafar, Atif Saeed, Sultan H. Almotiri

, Mohammed A. Al Ghamdi
:
An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks. 1390-1411 - Choangyang Liu, Wenjie Dai, Rui Guo:

Syndrome Check aided Fast-SSCANL Decoding Algorithm for Polar Codes. 1412-1430
Volume 18, Number 6, June 2024
Artificial Intelligence & Big Data
- Pu Zhang, Di Zhao, Xiangjie Kong, Jialong Zhang, Lei Li:

A survey on cooperative fault-tolerant control for multiagent systems. 1431-1448 - Minhyuk Kim:

Regression Algorithms Evaluation for Analysis of Crosstalk in High-Speed Digital System. 1449-1461 - Zilong Jin, Jin Wang, Lejun Zhang:

Clustering-Based Federated Learning for Enhancing Data Privacy in Internet of Vehicles. 1462-1477
IoT & Application
- Sulaiman Sulmi Almutairi

, Rehmat Ullah
, Qazi Zia Ullah, Habib Shah:
Inhalation Configuration Detection for COVID-19 Patient Secluded Observing using Wearable IoTs Platform. 1478-1499 - Enhou Zu, Haoming Wen, Ming-Hung Shu, Chih-Lung Yu:

Evaluation of Problems in Tourism Systems and Their Evolutionary Status Based on Self-Organization Theory. 1500-1517
Information Systems
- Taoer Yang, Aqsa, Rafaqat Kazmi

, Karthik Rajashekaran:
AI-Enabled Business Models and Innovations: A Systematic Literature Review. 1518-1539
Multimedia & Computer Vision
- Manoj K., Iyapparaja Meenakshisundaram:

A Comprehensive Approach for Tamil Handwritten Character Recognition with Feature Selection and Ensemble Learning. 1540-1561 - Youguo He, Yizhi Sun, Yingfeng Cai, Chaochun Yuan, Jie Shen, Liwei Tian:

Multi-modal Pedestrian Trajectory Prediction based on Pedestrian Intention for Intelligent Vehicle. 1562-1582 - Wen Wu, Xiuqing Huang, Seth Y. Ntim, Yue Shen, Xinyu Li, Guopeng Wang:

Impact of Moral Intensity on Moral Behavior in the context of Artificial Intelligence: The Mediating Role of Technology Moral Sense. 1583-1598
Security & Privacy
- Ming Tan, Aodi Liu, Xiaohan Wang, Siyuan Shang

, Na Wang, Xuehui Du:
A cross-domain access control mechanism based on model migration and semantic reasoning. 1599-1618 - Khaled H. Abuhmaidan, Marwan Alshar'e

, Abdallah M. Abualkishik, Ahmad K. Kayed:
Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption. 1619-1637
Wireless Communication
- Baochao Liu, Lina Wang:

Resource allocation algorithm for space-based LEO satellite network based on satellite association. 1638-1658
Papers on APIC-IST 2023
- Kyeongjea Lee, Joohyun Jo, Sungyoon Cho, Kiwon Kwon, Dong Ku Kim:

Link Quality Enhancement with Beamforming Using Kalman-based Motion Tracking for Maritime Communication. 1659-1674 - Hyunah Park, Kyung Han You:

An Investigation into the Relationship between Metaverse Usage Patterns and Cultural Tastes: A Study of Avatar Formation among Generation Z. 1675-1691 - Junseok Oh, Eunsoo Cho, Ji-Hwan Kim:

Integration of WFST Language Model in Pre-trained Korean E2E ASR Model. 1692-1705
Volume 18, Number 7, July 2024
Artificial Intelligence & Big Data
- Zhenzhen Yang, Xue Sun, Yongpeng Yang, Xinyi Wu:

MEDU-Net+: a novel improved U-Net based on multi-scale encoder-decoder for medical image segmentation. 1706-1725 - Zain Ul Abideen, Xiaodong Sun, Chao Sun, Hafiz Shafiq Ur Rehman Khalil

:
Improved Deep Learning-based Approach for Spatial-Temporal Trajectory Planning via Predictive Modeling of Future Location. 1726-1748
IoT & Application
- Meizhao Liu, Yingcheng Gu, Sen Dong, Liu Wei, Kai Liu, Yuting Yan, Yu Song, Huanyu Cheng, Lei Tang, Sheng Zhang:

Collaborative Inference for Deep Neural Networks in Edge Environments. 1749-1773 - Yu Geng, Tiecheng Song, Qiang Wang, Xiaoqin Song:

Geometric Optimization Algorithm for Path Loss Model of Riparian Zone IoT Networks Based on Federated Learning Framework. 1774-1794 - Yifan Hu

, Xiqiang Hou, Fuqiang Wang:
SDN-COR: An Efficient Network Coding Opportunistic Routing Method for Software-Defined Wireless Sensor Networks. 1795-1816 - Wanchang Jiang, Zhipeng Liu:

Software Key Node Recognition Algorithm for Defect Detection based on Node Expansion Degree and Improved K-shell Position. 1817-1839
Internet Computing
- Vinay K. Ahlawat, Gaurav Agarwal, Vikas Goel, Kueh Lee Hui, Mangal Sain:

A Novel encrypted XML streaming technique for indexing data on multiple channels. 1840-1867
Information Systems
- Tin T. Tran

, Václav Snásel, Thuan Q. Nguyen:
Collaborative filtering by graph convolution network in location-based recommendation system. 1868-1887
Multimedia & Computer Vision
- Zhenhua Li, Lei Zhang:

Multi-scale context fusion network for melanoma segmentation. 1888-1906 - Weiping Jiang, Yan Wei, Hao Zhai

:
FS-Transformer: A new frequency Swin Transformer for multi-focus image fusion. 1907-1928
Networking
- Jindong Kim, Jonggeun Choi, Hyukjin Kwon:

A study on the development directions of a smart counter-drone defense system based on the future technological environment. 1929-1952 - Cheol Ryu, Jae-Ho Lee, Do-Hyung Kim, Hyung-Seok Lee, Young-Sae Kim, Jin-Hee Han, Jeongnyeo Kim:

A Comprehensive Survey of TPM for Defense Systems. 1953-1967
Security & Privacy
- V. Sakthivel, P. Prakash, Jae-Woo Lee, Prabu P

:
Enhancing Transparency and Trust in Agrifood Supply Chains through Novel Blockchain-based Architecture. 1968-1985 - Nor Fadzilah Abdullah, Ammar Riadh Kairaldeen, Asma Abu-Samah, Rosdiadee Nordin:

Machine Learning-Based Transactions Anomaly Prediction for Enhanced IoT Blockchain Network Security and Performance. 1986-2009
Wireless Communication
- Ying Liu, Jinhong Bian, Yuanyuan Wang:

An Efficient mmWave MIMO Transmission with Hybrid Precoding. 2010-2026 - Xuemei Bai, Congcong Hou, Chenjie Zhang, Hanping Hu:

Reconfigurable Intelligent Surface assisted massive MIMO systems based on phase shift optimization. 2027-2046 - Bing Ning, Shuang Li, Xinli Wu, Wanming Hao:

Resource allocation for Millimeter Wave mMIMO-NOMA System with IRS. 2047-2066
Volume 18, Number 8, August 2024
Artificial Intelligence & Big Data
- Ji-Won Baek, Kyungyong Chung:

Meta Learning based Object Tracking Technology: A Survey. 2067-2081 - Guiyuan Zhu, Shengyang Liao, Tianming Zhan, Yunjie Chen:

An improved fuzzy c-means method based on multivariate skew-normal distribution for brain MR image segmentation. 2082-2102 - Qi Zhang, Jinfeng Ou, Hua-Ying Zhou:

Efficient Recognition of Easily-confused Chinese Herbal Slices Images Using Enhanced ResNeSt. 2103-2118
Internet Computing
- Bei He:

Crowd Psychological and Emotional Computing Based on PSMU Algorithm. 2119-2136
Information Systems
- Arif Djunaidy, Nisrina Fadhilah Fano:

Development of Customer Review Ranking Model Considering Product and Service Aspects Using Random Forest Regression Method. 2137-2156 - Chenye Qiu, Huixing Fang:

Demand Response Based Optimal Microgrid Scheduling Problem Using A Multi-swarm Sine Cosine Algorithm. 2157-2177 - Aswathy M. R., P. C. Reghu Raj, Ajeesh Ramanujan:

Effectiveness of Fuzzy Graph Based Document Model. 2178-2198
Multimedia & Computer Vision
- Shugang Liu, Jialong Chen, Qiangguo Yu, Jie Zhan, Linan Duan:

A fast defect detection method for PCBA based on YOLOv7. 2199-2213
Security & Privacy
- S. Shyam Sundar, R. S. Bhuvaneswaran, L. Sai Ramesh:

Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network. 2214-2229 - Seok Bin Son, Seong-Hee Park, Youn Kyu Lee:

A Comprehensive Study on Key Components of Grayscale-based Deepfake Detection. 2230-2252 - S. Thangam

, S. Sibi Chakkaravarthy:
An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication. 2253-2280
Wireless Communication
- Mingfei Zhao, Rui Xue:

Complex Field Network Coding with MPSK Modulation for High Throughput in UAV Networks. 2281-2297
Papers on APIC-IST 2023
- Hyunbin Kim, Junchul Chun:

Region and Global-Specific PatchCore based Anomaly Detection from Chest X-ray Images. 2298-2315 - Thanh-Hai Nguyen

, Kyoung-Sook Kim, Dinh-Lam Pham, Kwanghoon Pio Kim
:
A Web-based System for Business Process Discovery: Leveraging the SICN-Oriented Process Mining Algorithm with Django, Cytoscape, and Graphviz. 2316-2332
Papers on ICONI 2023
- Hyeonwoo Kim, Junsuk Lee, Jehyeok Rew, Eenjun Hwang:

Automated Facial Wrinkle Segmentation Scheme Using UNet++. 2333-2345 - Seungeun Chung, Youjin Seo, Han Young Ryoo:

Development of Innovative Product Designs with Stretchable Displays Based on User's Expected Experience. 2346-2365 - Jaehyuk So, Minjoon Kim

:
Implementation of a High-speed Template Matching System for Wafer-vision Alignment Using FPGA. 2366-2380 - Wonseop Shin

, Jaeseok Yoo, Bumsoo Kim, Yonghoon Jung, Muhammad Sajjad, Youngsup Park, Sanghyun Seo:
Generating 3D Digital Twins of Real Indoor Spaces based on Real-World Point Cloud Data. 2381-2398 - Gyusun Hwang, Junhee Han, Haejoong Kim:

A Digital Twin Architecture for Automotive Logistics- An Industry Case Study. 2399-2416 - GeunYoung Kim, Yunsik Ham, Jaecheol Ryou:

Privacy-preserving credential smart contracts using Zokrates. 2417-2430 - Jaeho Lee, Wongi Jeon, Juhyoung Sung, Kiwon Kwon, Yangseob Kim, Kyungwon Park, Jongho Paik, Sungyoon Cho:

Design of an Aquaculture Decision Support Model for Improving Profitability of Land-based Fish Farm Based on Statistical Data. 2431-2449 - Joonyoung Ahn, Kijung Ryu, Changik Oh, Taekryong Han, Heewon Kim, Dongho Kim:

A Study on The Conversion Factor between Heterogeneous DBMS for Cloud Migration. 2450-2463
Volume 18, Number 9, September 2024
Artificial Intelligence & Big Data
- Xuehao Du, Ping Ji, Wei Qin, Lei Wang, Yunshi Lan:

Probing Effects of Contextual Bias on Number Magnitude Estimation. 2464-2482 - Li Liu, Yuqi Kong:

Real-Time Instance Segmentation Method Based on Location Attention. 2483-2494 - Heejeong Jasmine Lee, Sang-Sun Yoo, Kang-Yoon Lee:

Machine Learning-Enhanced Survival Analysis: Identifying Significant Predictors of Mortality in Heart Failure. 2495-2511
IoT & Application
- Menda Ebraheem, Aravind Kumar Kondaji

, Y. Butchi Raju, N. Bhupesh Kumar:
A Computationally Effective Remote Health Monitoring Framework using AGTO-MLRC Models for CVD Diagnosis. 2512-2545 - Zeng Xing, Bo Zhao, Bo Xu, Guangliang Ren, Zhiqiang Liu:

Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things. 2546-2563
Information Systems
- Noora Shawareb, Ahmed Ewais, Fisnik Dalipi

:
Utilizing Data Mining Techniques to Predict Students Performance using Data Log from MOODLE. 2564-2588
Multimedia & Computer Vision
- Abdul Raheem

, Zhen Yang, Haiyang Yu, Muhammad Yaqub, Fahad Sabah, Shahzad Ahmed
, Malik Abdul Manan
, Imran Shabir Chuhan:
IPC-CNN: A Robust Solution for Precise Brain Tumor Segmentation Using Improved Privacy-Preserving Collaborative Convolutional Neural Network. 2589-2604 - Huanlong Zhang, Weiqiang Fu, Bin Zhou, Keyan Zhou, Xiangbo Yang, Shanfeng Liu:

Memory Propagation-based Target-aware Segmentation Tracker with Adaptive Mask-attention Decision Network. 2605-2625 - Yulin Cao

, Chunyu Li, Guoqing Zhang, Yuhui Zheng:
Low Lumination Image Enhancement with Transformer based Curve Learning. 2626-2641 - Xiaole Ge, Feng Zhou, Shuaiting Chen, Gan Gao, Rugang Wang:

Vehicle detection and tracking algorithm based on improved feature extraction. 2642-2664
Networking
- Youngho Kim, Seongyoung Sohn, Kyeong Tae Kim, Hae Sook Jeon, Sang-Min Lee, Yun-kyung Lee, Jeongnyeo Kim:

Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study. 2665-2691
Security & Privacy
- Isa Ismail, Khairul Akram Zainol Ariffin:

Open Source Tools for Digital Forensic Investigation: Capability, Reliability, Transparency and Legal Requirements. 2692-2716 - Zhuolin Mei, Jing Zeng

, Caicai Zhang, Shimao Yao, Jiaoli Shi, Bin Wu:
Fast Range Query on Encrypted Multi-dimensional Data in Cloud Environment. 2717-2738 - Zheng Zhang, Quan Ren, Jie Lu, Yuxiang Hu, Hongchang Chen:

DDPG-SDPCR: A DDPG-based Software Defined Perimeter Components Redeployment. 2739-2763
Wireless Communication
- Bin Qiu, Duan Li, Xian Li, Hailin Xiao:

FCBAFL: An Energy-Conserving Federated Learning Approach in Industrial Internet of Things. 2764-2781 - Yi Zheng

, Cunyi Liao, Ruifeng Xiao, Qiang He:
Convolutional GRU and Attention based Fall Detection Integrating with Human Body Keypoints and DensePose. 2782-2804 - Bin Zhong, Hehong Lin, Liang Chen, Zhongshan Zhang:

Performance Improvement for Device-to-Device (D2D) Users in Underlay Cellular Communication Networks. 2805-2817
Volume 18, Number 10, October 2024
Artificial Intelligence & Big Data
- Yuchen Liu

, Meng Wang, Gangmin Li, Terry R. Payne
, Yong Yue, Ka Lok Man:
Optimizing E-Commerce with Ensemble Learning and Iterative Clustering for Superior Product Selection. 2818-2839
IoT & Application
- Xiaoyuan Gu, Hongyuan Gao, Jingya Ma, Shibo Zhang, Jiayi Wang:

Joint Antenna Selection and Power Allocation Method Based on Quantum Energy Valley Optimization Algorithm for Massive MIMO IoT Systems. 2840-2856
Internet Services & Management
- Sangmin Lee, Semi Han:

An analysis of factors influencing college students' acceptance of telemedicine. 2857-2871
Information Systems
- Ramzi Salah, Muaadh Mukred

, Lailatul Qadri Zakaria, Fuad Ali Mohammed Al-Yarimi:
A Machine Learning Approach for Named Entity Recognition in Classical Arabic Natural Language Processing. 2895-2919 - Nasa Zata Dina

, Sri Devi Ravana, Norisma Idris, Tseng-Ping Chiu:
Discovering Hidden Emotional Heterogeneity of Customers in Textual Reviews and its Influencing Factors. 2920-2942
Multimedia & Computer Vision
- I. Dhurga bai, A. Selvapandian

:
Performance Analysis of Cervical Cancer Detection System Using Fusion Based CFICNN Classifier. 2943-2965 - Chen Gao, Jiyong Xu, Ruixia Liu:

Marine Vessel Target Detection Algorithm Based On Improved YOLOv5. 2966-2983
Security & Privacy
- Chao-Hsien Hsieh, Fengya Xu, Qingqing Yang, Dehong Kong:

Efficient SVH2M for information anomaly detection in manufacturing processes on system call. 2984-3009 - Parasuraman Kumar, Arumugam Maharajan

:
Maritime Cybersecurity Leveraging Artificial Intelligence Mechanisms Unveiling Recent Innovations and Projecting Future Trends. 3010-3039 - WenBin Hsieh

:
Securing Internet of Vehicles with a provable secure post-quantum mutually authenticated protocol based on Small Integer Solution. 3040-3059 - Xuedong Mao, Yuntao Zhao, Yongxin Feng, Yutao Hu

:
MalEXLNet: A semantic analysis and detection method of malware API sequence based on EXLNet model. 3060-3083
Wireless Communication
- Li Yang, Haoyu Wei, Guobing Hu, Wenqing Zhu:

An improved Graph-based SNR Estimation Algorithm. 3084-3108
Volume 18, Number 11, November 2024
Artificial Intelligence & Big Data
- N. Venkatesan, N. Arulanand:

Tokenization Stability Index: A Catalyst for Optimizing Transformer Models for Low Resource Languages. 3109-3128
Internet Computing
- Heshuai Shen:

Design of Teaching Resource Recommendation Platform Based on Fuzzy Recommendation Algorithm in the Context of Education Informatization. 3129-3147
Information Systems
- Runna Alghazo, Ghazanfar Latif, Nazeeruddin Mohammad, Jaafar M. Alghazo, Maura A. E. Pilotti

:
Deep Learning-based Arabic Sign Recognition System for Automated Communication with Hearing Impaired Individuals. 3148-3164 - Chen Jiang:

Hybrid Teaching Mode of Physical Education with Sports Games Based on Artificial Intelligence. 3165-3176
Mobile Communication
- Hui Dun

, Yifan Zhao, Qiuyue Shi, Weihua Liu, Eryang Huan:
Energy Efficiency Optimization for D2D Communication with Statistical Channel State Information and QoS Awareness. 3177-3197
Multimedia & Computer Vision
- Taeyang Kim:

Designing an Algorithm for a Psychological Counseling System Utilizing Derivative Works in the Metaverse. 3198-3215 - Bang Cheng, Jianghua Cheng, Tong Liu, Xiaobing Luo, Xiangyu Du, Liang Zhang, Tao Wang:

CSFusionNet: An End-to-end Image Fusion Network Based on Cascade-Skip Learning. 3216-3235 - Kalaphath Kounlaxay

, Yeo-Chan Yoon, Soo Kyun Kim:
Exploring Geometric Transformations in Computer Graphics through the GeoGebra Application. 3236-3255 - Xue Hao, Haza Nuzly Abdull Hamed, Babangida Isyaku, Qichen Su, Xin Dai:

Analysis of Atherosclerotic Plaques Using OCT Images Based on Deep Learning: A Comprehensive Review. 3256-3277
Networking
- Shu Li, Wenbo Zhang, Yongxin Feng:

Multipath Routing Protocol Based on Flooding Constraints and Composite Metrics. 3278-3292
Security & Privacy
- Hongluan Zhao, Guoyong Han, Zhaohui Xing:

Related-Key Differential Cryptanalysis of Midori-64 Based on Invariant Subspace. 3293-3305 - Jing Zhang, Qingbin Zhang, Yongli Tang, Chunming Zha, Yanru Zeng:

Permutation-based outsourced private set intersection cardinality protocol. 3306-3323
Wireless Communication
- Xiaofeng Hao, Huadi Zhang, Rui Guo:

Digital Modulation Recognition Based on High-Order Cumulants and P-LSTM. 3324-3338
Volume 18, Number 12, December 2024
Artificial Intelligence & Big Data
- Sunik Hwang, Hayoung Oh:

Trust Beyond Numbers: Data Augmentation Formula for Poll Prediction. 3339-3364 - Aditya Dubey, Pradeep Yadav, Chandra Prakash Bhargava, Trapti Pathak, Jyoti Kumari, Deshdeepak Shrivastava:

Classification of Breast Cancer Histopathological Images using Residual Learning-based CNN. 3365-3389
IoT & Application
- Yang Liu, Jiaojiao He, Jingwei Chen, Bo Mi, Ling Zhao, Xinyu Liu, Linhan Yang:

Adaptive Intelligent Sensing Control Method for Traffic Lights under Real-Time Vehicle Conditions Based on Logic Rules. 3390-3413
Internet Services & Management
- Ya-Jun Leng, Zhi Wang:

A Novel Collaborative Filtering Recommendation Method Based on Weight Determination. 3414-3430
Information Systems
- Qi Xi, Xiang Zhang:

Routing Optimization Algorithm under Deep Reinforcement Learning in Software Defined Network. 3431-3449
Mobile Communication
- Moonseong Kim, Woochan Lee:

Hopping Sensor Network without Sensing Holes : A Review. 3450-3469
Multimedia & Computer Vision
- Hyonjun Kang, Kwangyoung Kim, Myungseok Yang, Ka Lok Man, Mucheol Kim:

Crowd-movement-based Geofence-construction method for urban flood response. 3470-3490 - Hui Fu, Qiliang Gong, Ping Wang, Meiliang Hua, Zhaoyang Song:

A Haze Removal Method via The Fusion of Gaussian Low-Frequency Multi-Scale and Median Rank Detail Perspective Network. 3491-3512 - Jinliang Liu, Zheng Lv, Jun Zhao, Shenglan Liu:

Enhancing Multi-Object Tracking with Siamese Network-based Appearance Search. 3513-3526 - Kimleang Kea, Youngsun Han, Tae-Kyung Kim:

Multiple Sensor-based Adaptive Foveated Display Control for Enhanced Computational Efficiency of Virtual Reality Devices. 3527-3544
Wireless Communication
- Wenjie Dai, Rui Guo:

Complete State Critical Set Based SCLF Decoding Algorithm for Polar Codes. 3545-3559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














