


default search action
KSII Transactions on Internet and Information Systems, Volume 11
Volume 11, Number 1, January 2017
- Guangwei Xu, Zhifeng Sun, Cairong Yan, Xiujin Shi, Yue Li:

Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage. 1-17 - Huioon Kim, Hyounggyu Kim, Kyungwon Chun, Youngjoo Chung:

Experience in Practical Implementation of Abstraction Interface for Integrated Cloud Resource Management on Multi-Clouds. 18-38 - Yongsheng Hao, Mandan Xia, Na Wen, Rongtao Hou, Hua Deng, Lina Wang, Qin Wang:

Parallel task scheduling under multi-Clouds. 39-60 - Doan Perdana, Ray-Guang Cheng, Riri Fitri Sari:

Analytical Study of the Impact of the Mobility Node on the Multi-channel MAC Coordination Scheme of the IEEE 1609.4 Standard. 61-77 - Jintao Wang, Xi Jin, Peng Zeng

, Zhaowei Wang, Ming Wan:
Phase Switching Mechanism for WiFi-based Long Distance Networks in Industrial Real-Time Applications. 78-101 - A. Chaminda J. Samarasekera, Hyundong Shin:

Outage Probability for Cooperative Nano Communication in the THz Gap Frequency Range. 102-122 - Sang-Jo Yoo, Ju-Tae Jang, Myunghwan Seo, Hyung-Weon Cho:

Secondary System Initialization Protocol Using FFT-based Correlation Matching for Cognitive Radio Ad-hoc Networks. 123-145 - Omar M. Zakaria, Aisha Hassan Abdalla Hashim

, Wan Haslina Hassan, Othman Omran Khalifa
, Mohammad Azram, Shidrokh Goudarzi
, Lalitha Bhavani Jivanadham, Mahdi Zareei
:
State-Aware Re-configuration Model for Multi-Radio Wireless Mesh Networks. 146-170 - Ye Shen, Jing Feng, Weijun Ma, Lei Jiang, Min Yin:

Overlay Multicast Update Strategy Based on Perturbation Theory. 171-192 - Tao Wang, Zheng Yao, Baoxian Zhang, Cheng Li

:
Utility Bounds of Joint Congestion and Medium Access Control for CSMA based Wireless Networks. 193-214 - Yuan Liu, Junjie Chen, Zhenfeng Xu

:
Improved DV-Hop Localization Algorithm Based on Bat Algorithm in Wireless Sensor Networks. 215-236 - Wen Liu, Zhigang Wang, Yanming Shen:

Job-aware Network Scheduling for Hadoop Cluster. 237-252 - WeiYe Xu, Min Lin:

Downlink Capacity Analysis of Distributed Antenna Systems with Imperfect Channel State Information. 253-271
- Hainan Wang, Baochang Zhang, Hong Zheng, Yao Cao, Zhenhua Guo, Chengshan Qian:

The Robust Derivative Code for Object Recognition. 272-287 - Jianjun Li, Susu Fan, Zhihui Wang, Haojie Li, Chin-Chen Chang:

An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification. 288-301 - Hai-Gen Min

, Xiangmo Zhao, Zhigang Xu
, Licheng Zhang:
Robust Features and Accurate Inliers Detection Framework: Application to Stereo Ego-motion Estimation. 302-320 - Vahid Ghasemi, Ali Akbar Pouyan, Mohsen Sharifi

:
Human Activity Recognition in Smart Homes Based on a Difference of Convex Programming Problem. 321-344 - Jun Lee, Jeong-Sik Park, Chung-Pyo Hong, Yong-Ho Seo:

Illumination-Robust Foreground Extraction for Text Area Detection in Outdoor Environment. 345-359 - Yuting Su, Fan Yu, Chengqian Zhang:

Digital Video Steganalysis Based on a Spatial Temporal Detector. 360-373 - Arkadiusz Biernacki:

Improving Video Quality by Diversification of Adaptive Streaming Strategies. 374-395 - LiPing Liu, Linlin Ci, Wei Liu, Hui Yang:

Control Flow Checking at Virtual Edges. 396-413 - Sunghee Lee, Kwangsue Chung:

A Multipath Congestion Control Scheme for High-Quality Multimedia Streaming. 414-435 - Jimin Yu, Lijian Tan, Shangbo Zhou, Liping Wang, Chaomei Wang:

Image Denoising Based on Adaptive Fractional Order Anisotropic Diffusion. 436-450 - Zhihui Wang

, Sook Yoon, Dong Sun Park
:
A novel visual tracking system with adaptive incremental extreme learning machine. 451-465
- Lihui Lin, Kaizhi Chen, Shangping Zhong:

Enhancing the Session Security of Zen Cart based on HMAC-SHA256. 466-483 - Yixun Hu, Kangfeng Zheng, Xu Wang

, Yixian Yang:
WORM-HUNTER: A Worm Guard System using Software-defined Networking. 484-510 - Sirapat Boonkrong

:
Internet Banking Login with Multi-Factor Authentication. 511-535 - Wei Li, Zhiyong Gao, Dawu Gu, Chenyu Ge, Linfeng Liao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:

Security Analysis of the Whirlpool Hash Function in the Cloud of Things. 536-551 - Xiaofeng Song, Fenlin Liu, Liju Chen, Chunfang Yang, Xiangyang Luo:

Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography. 552-569 - Lahouari Ghouti

:
A Perceptually-Adaptive High-Capacity Color Image Watermarking System. 570-595 - Il-Hwan Kim, KyungLyul Lee, Jaehyoun Kim:

Role and Function of the Information Public Law. 596-611
Volume 11, Number 2, February 2017
- Guang Yang, Yewen Cao, Deqiang Wang, Jian Xu, Changlei Wu:

Collaborative Sub-channel Allocation with Power Control in Small Cell Networks. 611-627 - Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Lu Xia, Xiaohui Qi:

Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets. 628-649 - Wen'an Zhou, Jianlong Liu, Yiyu Zhang, Cheng-Yi Yang, Xuhui Yang:

A Novel Resource Scheduling Scheme for CoMP Systems. 650-669 - Qi Liu, Weidong Cai, Qiang Liu, Jian Shen

, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment. 670-686 - Nannan Sui, Cong Wang

, Wei Xie, Youyun Xu:
Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic. 687-708 - Guolin Sun, Sebakara Samuel Rene Adolphe, Hangming Zhang, Guisong Liu

, Wei Jiang:
User Bandwidth Demand Centric Soft-Association Control in Wi-Fi Networks. 709-730 - Muhammad Zahid Abbas, Kamalrulnizam Abu Bakar

, Muhammad Ayaz, Muhammad Hafiz Mohammed, Moeenuddin Tariq:
Hop-by-Hop Dynamic Addressing Based Routing Protocol for Monitoring of long range Underwater Pipeline. 731-763 - Taekon Kim, Hyungkeun Lee:

Performance Evaluation of the RIX-MAC Protocol for Wireless Sensor Networks. 764-784
- Zheyi Fan, Shuqin Weng, Yajun Zeng, Jiao Jiang, Fengqian Pang, Zhiwen Liu:

Misclassified Samples based Hierarchical Cascaded Classifier for Video Face Recognition. 785-804 - Xiaozhou Zhu, Xin Song, Xiaoqian Chen, Yuzhu Bai, Huimin Lu:

Size Aware Correlation Filter Tracking with Adaptive Aspect Ratio Estimation. 805-825
- Ling Zhao, Mingwu Zhang, Hua Shen, Yudi Zhang, Jian Shen

:
Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server. 826-845 - Zehui Wu, Qiang Wei, Kailei Ren, Qingxian Wang:

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks. 846-864 - Dong Hee Kim, Seungjo Baek, Jongin Lim:

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle. 865-882 - Muhammad Imran

, Bruce A. Harvey:
Block Based Blind & Secure Gray Image Watermarking Technique Based on Discrete Wavelet Transform and Singular Value Decomposition. 883-900 - Abderrahmen Guermazi, Abdelfettah Belghith

, Mohamed Abid, Sofien Gannouni
:
KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks. 901-923 - Xiaoxue Liu, Yanping Li, Juan Qu, Yong Ding:

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS. 924-944 - Zhenxing Qian

, Shu Dai, Boyang Chen:
Reversible Data Hiding in JPEG Images Using Ordered Embedding. 945-958 - Yilin Ye, Lifa Wu, Zheng Hong, Kangyu Huang:

A Risk Classification Based Approach for Android Malware Detection. 959-981
- Soo Kyun Kim

, Shin-Jin Kang, Yoo-Joo Choi, Min-Hyung Choi, Min Hong:
Augmented-Reality Survey: from Concept to Application. 982-1004 - YiNa Jeong, Eun-Hee Jeong, Byung kwan Lee:

An App Visualization design based on IoT Self-diagnosis Micro Control Unit for car accident prevention. 1005-1018 - Jong-Hyun Kim, Jung Lee, Chang-Hun Kim, Sun-Jeong Kim:

Realistic Visual Simulation of Water Effects in Response to Human Motion using a Depth Camera. 1019-1031 - Ha Sung Hwang:

The Influence of personality traits on the Facebook Addiction. 1032-1042 - Tae-young Kim, Suntae Kim, Sangchul Choi, Jeong-Ah Kim, Jae-Young Choi, Jong-Won Ko, Jee-Huong Lee, YoungWha Cho:

A Machine-Learning Based Approach for Extracting Logical Structure of a Styled Document. 1043-1056 - Murad Khan, Bhagya Nathali Silva

, Changsu Jung, Kijun Han:
A context-Aware Smart Home Control System based on ZigBee Sensor Network. 1057-1069 - Tsung-Han Lee, Lin-Huang Chang, Wei-Chung Cheng:

Design and Implementation of SDN-based 6LBR with QoS Mechanism over Heterogeneous WSN and Internet. 1070-1088 - Jin Ma, Jongsuk Ruth Lee, Kumwon Cho, Minjae Park:

Design and Implementation of Information Management Tools for the EDISON Open Platform. 1089-1104 - Sangmin Lee:

Evaluation of Mobile Application in User's Perspective: Case of P2P Lending Apps in FinTech Industry. 1105-1117 - Md. Zia Uddin

, Jaehyoun Kim:
A Robust Approach for Human Activity Recognition Using 3-D Body Joint Motion Features with Deep Belief Network. 1118-1133 - Se Dong Min, Jiyoung Heo, Youngsun Kong

, Yunyoung Nam, Preap Ley, Bong-Keun Jung
, Dongik Oh, Wonhan Shin:
Thermal Infrared Image Analysis for Breast Cancer Detection. 1134-1147 - Kyoungsook Kim, Moonsuk Yeon, Byeong-Soo Jeong, Kwanghoon Pio Kim

:
A Conceptual Approach for Discovering Proportions of Disjunctive Routing Patterns in a Business Process Model. 1148-1161 - Jae-Gu Lee, Jin Kim, Seonwoo Lee, Young Woong Ko:

A Location Tracking System using BLE Beacon Exploiting a Double-Gaussian Filter. 1162-1179 - Sung-Wook Park, Im-Yeong Lee:

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment. 1180-1200 - Jung-Yeon Kim, Ye-Rin Cha, Sang-Heon Lee, Bong-Keun Jung

:
Development and Evaluation of Tip Pinch Strength Measurement on a Paretic hand Rehabilitation Device. 1201-1216 - Amarmend Dashbalbar, Sang-Min Song, Jung-Won Lee, Byungjeong Lee:

Towards Enacting a SPEM-based Test Process with Maturity Levels. 1217-1233 - Jaekwon Lee, Kisub Kim, Yonghyeon Lee, Jang-Eui Hong, Young-Hoon Seo, Byung-Do Yang, Woosung Jung:

Extracting the Source Code Context to Predict Import Changes using GPES. 1234-1249 - Younghan Kim, Hyunseok Ahn, Changseok Yoon, Yongseok Lim, Seung-ok Lim, Myung-Hyun Yoon:

Implementation of Bistatic Backscatter Wireless Communication System Using Ambient Wi-Fi Signals. 1250-1264
Volume 11, Number 3, March 2017
- Bin Hu, Ning Xie, Tingting Zhao, Xiaotong Zhang:

Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing. 1265-1278 - Yuan Gao, Changping Zhu, Zhixiang Deng, Yibin Tang:

Adaptive Cooperation for Bidirectional Communication in Cognitive Radio Networks. 1279-1300 - Weizhi Zhong, Kunqi Chen, Xin Liu, Jianjiang Zhou:

Holistic Joint Optimal Cooperative Spectrum Sensing and Transmission Based on Cooperative Communication in Cognitive Radio. 1301-1318 - Jaewoo So:

Opportunistic Reporting-based Sensing-Reporting-Throughput Optimization Scheme for Cooperative Cognitive Radio Networks. 1319-1355 - Jing Cao, Junsheng Wu, Wenchao Yang:

Spectrum allocation strategy for heterogeneous wireless service based on bidding game. 1336-1356 - Guangjun Liang, Qi Zhu, Jianfang Xin, Ziyu Pan:

Joint Resource Allocation Scheme for OFDM Wireless-Powered Cooperative Communication Networks. 1357-1372 - Gul Zameen Khan, Ruben Gonzalez, Eun-Chan Park:

On the Design of a WiFi Direct 802.11ac WLAN under a TGn MIMO Multipath Fading Channel. 1373-1392 - Sungryoul Lee:

Sequential Hypothesis Testing based Polling Interval Adaptation in Wireless Sensor Networks for IoT Applications. 1393-1405 - Shaowei Liu, Weimin Lei, Wei Zhang, Xiaoshi Song:

MPMTP-AR: Multipath Message Transport Protocol Based on Application-Level Relay. 1406-1424 - Guowei Lei, Yuanan Liu, Xuefang Xiao:

Analysis of Joint Transmit and Receive Antenna Selection in CPM MIMO Systems. 1425-1440 - Van-Huy Vu, Ibrahim Mashal, Tein-Yaw Chung:

A Novel Bandwidth Estimation Method Based on MACD for DASH. 1441-1461 - Pervez Khan, Niamat Ullah, Hoon Kim:

WBAN MAC Protocols - Non-Saturation Modeling and Performance Analysis. 1462-1476 - Weilong Li, De-Wei Wu, Jia Du, Yang Zhou

:
A biologically inspired model based on a multi-scale spatial representation for goal-directed navigation. 1477-1491 - Kwangsoo Kim

, Seung-Hun Shin, Byeong-Hee Roh
:
Firing Offset Adjustment of Bio-Inspired DESYNC-TDMA to Improve Slot Utilization Performances in Wireless Sensor Networks. 1492-1509 - Shiming He, Weini Zeng, Kun Xie, Hongming Yang, Mingyong Lai, Xin Su:

PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid. 1510-1532 - Tahani Gazdar, Abdelfettah Belghith

, Ahmad S. Al-Mogren
:
DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks. 1533-1556 - Suchul Lee, Sungil Lee, Jun-Rak Lee:

SPaRe: Efficient SQLite Recovery Using Database Schema Patterns. 1557-1569 - Kyoungsoo Bok, Jinkyung Yun, Yeonwoo Kim, Jongtae Lim, Jaesoo Yoo:

User Reputation computation Method Based on Implicit Ratings on Social Media. 1570-1594
- Yue Ming, Guangchao Wang, Xiaopeng Hong:

Spatial-temporal texture features for 3D human activity recognition using laser-based RGB-D videos. 1595-1613 - Huiwu Luo, Fei Zhao, Shangfeng Chen, Huan-zhang Lu:

A Tree Regularized Classifier - Exploiting Hierarchical Structure Information in Feature Vector for Human Action Recognition. 1614-1632 - Chao Deng, Zhiheng Wang, Xingwang Li

, Hui-na Li, Charles Casimiro Cavalcante
:
An Improved Remote Sensing Image Fusion Algorithm Based on IHS Transformation. 1633-1649 - Ching-Liang Su:

Ear Recognition by Major Axis and Complex Vector Manipulation. 1650-1669 - Jinghui Chu, Hailan Liang, Zheng Tong, Wei Lu:

Slow Feature Analysis for Mitotic Event Recognition. 1670-1683 - Haiwei Lei, Wenyi Liu, Anhong Wang:

Parallel Deblocking Filter Based on Modified Order of Accessing the Coding Tree Units for HEVC on Multicore Processor. 1684-1699 - Liping Wang

, Xiao Zhou
, Cheng-You Wang
, Baochen Jiang
:
Post-Processing for JPEG-Coded Image Deblocking via Sparse Representation and Adaptive Residual Threshold. 1700-1721
- Chaoyuan Cui

, Yun Wu, Yonggang Li, Bingyu Sun:
Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism. 1722-1741 - ZahidMehmood, Gongliang Chen, Jianhua Li, Aiiad Albeshri

:
An Untraceable ECC-Based Remote User Authentication Scheme. 1742-1760 - Zhengwei Zhang, Lifa Wu, Yunyang Yan, Shaozhang Xiao, Shangbing Gao:

Adaptive reversible image watermarking algorithm based on DE. 1761-1784 - Xiao Zhang, Chengqi Wang, Zhiming Zheng:

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism. 1785-1801 - Danhui Wang, An Wang:

Bitwise Collision Attack Based on Second-Order Distance. 1802-1819
Volume 11, Number 4, April 2017
- Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong:

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing. 1820-1840 - Yujin Nam, Jaewoo So, Jinsung Kim:

Interference Mitigation Scheme for Device-to-Device MIMO Communications Underlaying a Cellular Network. 1841-1865 - Sukhwinder Sharma

, Rakesh Kumar Bansal, Savina Bansal
:
Heterogeneity-aware Energy-efficient Clustering (HEC) Technique for WSNs. 1866-1888 - Xuan-Xinh Nguyen

, Dinh-Thuan Do:
An Adaptive-Harvest-Then-Transmit Protocol for Wireless Powered Communications: Multiple Antennas System and Performance Analysis. 1889-1910 - Shengwen Tian, Jianxin Liao, Tonghong Li

, Jingyu Wang
, Guanghai Cui:
Resilient Routing Overlay Network Construction with Super-Relay Nodes. 1911-1930 - Bo Yin, Siwang Zhou, Shiwen Zhang, Ke Gu

, Fei Yu
:
On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks. 1931-1953 - Jin Xu, Kai Zhang:

A Low-Complexity CLSIC-LMMSE-Based Multi-User Detection Algorithm for Coded MIMO Systems with High Order Modulation. 1954-1971 - Hao Xu, Li-Ning Xing, Lan Huang:

Regional Science and Technology Resource Allocation Optimization Based on Improved Genetic Algorithm. 1972-1986 - Keol Cho, Ki-Seok Chung:

Self-Adaptive Termination Check of Min-Sum Algorithm for LDPC Decoders Using the First Two Minima. 1987-2001 - Muhammad Ali Lodhi

, Abdul Rehman, Meer M. Khan, Muhammad Asfand-e-yar, Faisal Bashir Hussain:
Transient Multipath routing protocol for low power and lossy networks. 2002-2019 - Feng Zhang, Xiaoming Wang, Lichen Zhang, Peng Li, Liang Wang, Wangyang Yu:

Dynamic Adjustment Strategy of n-Epidemic Routing Protocol for Opportunistic Networks: A Learning Automata Approach. 2020-2037 - Jia Zhao, Li Lv, Hui Wang, Hui Sun, Runxiu Wu, Jugen Nie, Zhifeng Xie:

Particle Swarm Optimization based on Vector Gaussian Learning. 2038-2057 - Gongchao Su

, Bin Chen, Xiaohui Lin, Hui Wang, Lemin Li:
User Association and Base Station Sleep Management in Dense Heterogeneous Cellular Networks. 2058-2074
- Jeonghwan Gwak, Geunpyo Park, Moongu Jeon:

Viewpoint Invariant Person Re-Identification for Global Multi-Object Tracking with Non-Overlapping Cameras. 2075-2092 - Jia Liu:

Recognizing Actions from Different Views by Topic Transfer. 2093-2108 - Yiling Shen, Ningzhong Liu, Han Sun:

Sparse Representation based Two-dimensional Bar Code Image Super-resolution. 2109-2123 - Ying Tong, Yuehong Shen, Bin Gao, Fenggang Sun, Rui Chen, Yefeng Xu:

A Noisy-Robust Approach for Facial Expression Recognition. 2124-2148
- Chuyu She, Wushao Wen, Quanqi Ye, Kesong Zheng:

Vulnerable Path Attack and its Detection. 2149-2170 - Hyun-Kyo Oh, Sang-Wook Kim:

Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems. 2171-2195 - Zheng Zhao, Fenlin Liu, Daofu Gong:

An SDN based hopping multicast communication against DoS attack. 2196-2218 - Dongmin Kim, Ik Rae Jeong:

Provably-Secure Public Auditing with Deduplication. 2219-2236 - Feng Wang, Bo Han, Lei Niu, Ya Wang:

An Improved Cancelable Fingerprint Template Encryption System Research. 2237-2253 - Ya Liu, Hongbing Wang, Chunlu Wang:

Efficient and Secure Certificateless Proxy Re-Encryption. 2254-2275 - Yong Cheng, Jun Ma

, Jiangchun Ren, Songzhu Mei
, Zhiying Wang:
UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk. 2276-2291 - Zehong Chen, Peng Zhang, Fangguo Zhang

, Jiwu Huang:
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE. 2292-2309
Volume 11, Number 5, May 2017
- Adnan Khalid

, Muhammad Shahbaz:
Service Architecture Models For Fog Computing: A Remedy for Latency Issues in Data Access from Clouds. 2310-2345 - Nahid Hamzehee Nia, Sepideh Adabi

, Majid Nikougoftar Nategh:
A Coordinated Heuristic Approach for Virtual Network Embedding in Cloud Infrastructure. 2346-2361 - Jiping Liu, Wenxiao Shi, Pengxia Wu:

Joint Routing and Channel Assignment in Multi-rate Wireless Mesh Networks. 2362-2378 - Lei Yang, Chaowei Tang, Heng Wang, Hui Tang:

Multi-path Routing Policy for Content Distribution in Content Network. 2379-2397 - Xi Luo, Ying An:

Neighbor Cooperation Based In-Network Caching for Content-Centric Networking. 2398-2415 - Huan Zhang

, Hongjiang Lei
, Imran Shafique Ansari, Gaofeng Pan
, Khalid A. Qaraqe
:
Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels. 2416-2432 - Ngoc Minh Nguyen, Myung Kyun Kim:

Reduced-Pipelined Duty Cycle MAC Protocol (RP-MAC) for Wireless Sensor Network. 2433-2452 - Yahia Zakaria

, Lubomir Ivanek, Ivan Glesk
:
Propagation Measurements and Estimation of Channel Propagation Models in Urban Environment. 2453-2467 - Lei Quan, Song Xiao, Xiao Xue, Cunbo Lu:

Semi-deterministic Sparse Matrix for Low Complexity Compressive Sampling. 2468-2483 - Lin Li, Yunyi Yan

, Libin Jia, Jun Ma:
Constructing Negative Links from Multi-facet of Social Media. 2484-2498 - Sajid M. Sheikh, Riaan Wolhuter

, Herman A. Engelbrecht:
A Model for Analyzing the Performance of Wireless Multi-Hop Networks using a Contention-based CSMA/CA Strategy. 2499-2522
- Zhonghua Liu, Gang Liu, Jiexin Pu, Shigang Liu:

Noisy label based discriminative least squares regression and its kernel extension for object identification. 2523-2538 - Kang Qiu, Benshun Yi, Weizhong Li, Taiqi Huang:

Hierarchical Regression for Single Image Super Resolution via Clustering and Sparse Representation. 2539-2554 - Yong Seok Heo, Soochahn Lee, Ho Yub Jung:

Dual Exposure Fusion with Entropy-based Residual Filtering. 2555-2575 - Zhaofeng Zhang, Zemin Wu, Qingzhu Jiang, Lin Du, Lei Hu:

Co-saliency Detection Based on Superpixel Matching and Cellular Automata. 2576-2589 - Xu Zhang, Xiaofeng Wang, Yue Du, Xiaoyan Qin:

Domain Adaptation Image Classification Based on Multi-sparse Representation. 2590-2606 - Jing Sun

, Xibiao Cai, Fuming Sun
, Richang Hong:
Dual graph-regularized Constrained Nonnegative Matrix Factorization for Image Clustering. 2607-2627
- Md. Abdullah Al Rahat Kutubi, Kazi Md. Rokibul Alam, Rafaf Tahsin, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto:

An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme. 2628-2645 - Hanshu Hong, Yunhao Xia, Zhixin Sun, Ximeng Liu:

Provably secure attribute based signcryption with delegated computation and efficient key updating. 2646-2659 - Jingyi Cui, Jiansheng Guo, Yanyan Huang, Yipeng Liu:

Improved Meet-in-the-Middle Attacks on Crypton and mCrypton. 2660-2679 - Sudha Ellison Mathe

, Lakshmi Boppana:
Design and Implementation of a Sequential Polynomial Basis Multiplier over GF(2m). 2680-2700 - Furui Zhan, Nianmin Yao

:
Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform. 2701-2722 - Yi Sun, Guangming Tang, Yuan Bian, Xiaoyu Xu:

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs. 2723-2740 - Weiwei Zhang, Xin Li, Yuzhao Zhang, Ru Zhang, Lixin Zheng:

Robust video watermarking algorithm for H.264/AVC based on JND model. 2741-2761 - Xiaojun Zhang, Chunxiang Xu, Yuan Zhang

:
Fuzzy identity-based signature scheme from lattice and its application in biometric authentication. 2762-2777 - Yonghao Gu, Yongfei Wang, Zhen Yang, Yimu Gao:

A Distributed Privacy-Utility Tradeoff Method Using Distributed Lossy Source Coding with Side Information. 2778-2791 - Xiangsong Zhang, Zhenhua Liu:

Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update. 2792-2810
Volume 11, Number 6, June 2017
- Gang Wang, Zhao Yang, Cangzhou Yuan, Peizhen Liu:

Combinatorial Auction-Based Two-Stage Matching Mechanism for Mobile Data Offloading. 2811-2830 - Yanan Tang, Hui Gao, Xin Su, Tiejun Lv:

Joint Destination-Relay Selection and Antenna Mode Selection in Full-Duplex Relay Network. 2831-2847 - Joaquín Aparicio, Juan José Echevarria, Jon Legarda

:
A Software Defined Networking Approach to Improve the Energy Efficiency of Mobile Wireless Sensor Networks. 2848-2869 - Qinglei Qi, Wendong Wang, Xiangyang Gong, Xirong Que:

Rules Placement with Delay Guarantee in Combined SDN Forwarding Element. 2870-2888 - Wenjie Yu, Xunbo Li, Xiang Li, Zhi Zeng:

Constrained Relay Node Deployment using an improved multi-objective Artificial Bee Colony in Wireless Sensor Networks. 2889-2909 - Faisal Rehman

, Osman Khalid, Nuhman ul Haq
, Atta ur Rehman Khan
, Kashif Bilal, Sajjad Ahmad Madani
:
Diet-Right: A Smart Food Recommendation System. 2910-2925 - Zhiqing Wei, Huici Wu, Zhiyong Feng:

Polygon Approximation Based Cognitive Information Delivery in Geo-location Database Oriented Spectrum Sharing. 2926-2945 - Ying Zhou, Lihua Yang, Longxiang Yang:

Improved Compressed Network Coding Scheme for Energy-Efficient Data Communication in Wireless Sensor Networks. 2946-2962 - Youwei Yuan

, Weixin Chen, Guangjie Han, Gangyong Jia:
OLAP4R: A Top-K Recommendation System for OLAP Sessions. 2963-2978 - Xiong Yang, Decai Huang, Zi-Ke Zhang:

Neighborhood coreness algorithm for identifying a set of influential spreaders in complex networks. 2979-2995 - Junseok Song, Kyung Tae Kim, Byung Jun Lee, Sang-Young Kim, Hee Yong Youn:

A novel classification approach based on Naïve Bayes for Twitter sentiment analysis. 2996-3011 - Qin Yu, Kesi Lv, Jie Hu, Kun Yang, Xuemin Hong:

Joint Uplink and Downlink Resource Allocation in Data and Energy Integrated Communication Networks. 3012-3028 - Zhi-Ling Tang, Si-Min Li:

Deep Recurrent Neural Network for Multiple Time Slot Frequency Spectrum Predictions of Cognitive Radio. 3029-3045 - Hamid Reza Boveiri

, Raouf Khayami
:
Static Homogeneous Multiprocessor Task Graph Scheduling Using Ant Colony Optimization. 3046-3070
- Yesool Cha, Jinman Kim, Byoung-Ha Park, Young-Choong Park, Seong-Dong Kim:

Development of an ICT Car Service Applying a Human-Centered Design. 3071-3085 - Jing-Ying Xiong, Ming Dai, Chunlei Zhao, Ruo-Qiu Wang:

Antiblurry Dejitter Image Stabilization Method of Fuzzy Video for Driving Recorders. 3086-3103 - Thanh Binh Nguyen, Ashish Khare, Nguyen Chi Thanh:

Human Tracking Based On Context Awareness In Outdoor Environment. 3104-3120 - Wenjuan Ma, Shusen Sun:

Deformable Surface 3D Reconstruction from a Single Image by Linear Programming. 3121-3142 - Heekyung Yang, Kyungha Min:

A Multi-Layered Framework for color pastel painting. 3143-3165 - Jiahui Chen

, Shaohua Tang, Xinglin Zhang:
HS-Sign: A Security Enhanced UOV Signature Scheme Based on Hyper-Sphere. 3166-3187 - Jong-Ho Yun, Myung-Ryul Choi, Sang-Sun Lee:

An image enhancement Method for extracting multi-license plate region. 3188-3207 - Hyeon-Sik Son, Byungin Moon

:
A Multi-Level Accumulation-Based Rectification Method and Its Circuit Implementation. 3208-3229
- Xin Su, Xuchong Liu, Jiuchuan Lin, Shiming He, Zhangjie Fu, Wenjia Li:

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining. 3230-3253 - Zhiyuan Zhao, Jianhua Wang:

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing. 3254-3272 - Jingru Li, Li Yu, Jia Zhao, Chao Luo, Jun Zheng:

TSTE: A Time-variant Stochastic Trust Evaluation Model in Social Networks. 3273-3308
Volume 11, Number 7, July 2017
- Guolin Sun, Guohui Wang, Prince Clement Addo, Guisong Liu

, Wei Jiang:
Dynamic Resource Reservation for Ultra-low Latency IoT Air-Interface Slice. 3309-3328 - Jiping Jiao, Lingyu Chen, Xuemin Hong, Jianghong Shi:

A Heuristic Algorithm for Optimal Facility Placement in Mobile Edge Networks. 3329-3350 - Mohammad Z. Masoud

, Yousef Jaradat
, Ismael Jannoud, Hong Huang:
DRA: Duplication Resolver Algorithm for Power Conservation Utilizing Software Defined Network (SDN). 3351-3369 - Sani Umar Abdullahi

, Jian Liu, Seyed Alireza Mohadeskasaei:
Analytical Evaluation of FFR-aided Heterogeneous Cellular Networks with Optimal Double Threshold. 3370-3392 - Zhiyuan Zhao, Xiangru Meng, Yuze Su, Zhentao Li:

Virtual Network Embedding based on Node Connectivity Awareness and Path Integration Evaluation. 3393-3412 - Sungwook Kim:

Repeated Overlapping Coalition Game Model for Mobile Crowd Sensing Mechanism. 3413-3430 - Jing Wang, Mingsheng Ouyang, Wei Liang

, Jun Hou, Xiangyang Liu:
Device-to-Device Relay Cooperative Transmission Based on Network Coding. 3431-3445 - Bo Zheng, Hengyang Zhang, Kun Zhuo, Huaxin Wu:

A Multi-Priority Service Differentiated and Adaptive Backoff Mechanism over IEEE 802.11 DCF for Wireless Mobile Networks. 3446-3464 - Longzhe Han, Xuecai Bao, Wenfeng Wang, Xiangsheng Feng

, Zuhan Liu, Wenqun Tan:
A Receiver-Driven Loss Recovery Mechanism for Video Dissemination over Information-Centric VANET. 3465-3479 - Yuan Liu, Junjie Chen:

A Collaborative and Predictive Localization Algorithm for Wireless Sensor Networks. 3480-3500 - Hongyuan Gao

, Shibo Zhang
, Yanan Du, Yu Wang, Ming Diao:
Relay Selection Scheme Based on Quantum Differential Evolution Algorithm in Relay Networks. 3501-3523 - Jianrong Bao, Bin Jiang, Chao Liu, Xianyang Jiang, Minhong Sun:

Optimized Relay Selection and Power Allocation by an Exclusive Method in Multi-Relay AF Cooperative Networks. 3524-3542
- Changguo Li:

Parallel Implementation of the Recursive Least Square for Hyperspectral Image Compression on GPUs. 3543-3557 - Zhaotian Li, Yuesheng Zhu, Guibo Luo, Biao Guo:

A New Copyright Protection Scheme for Depth Map in 3D Video. 3558-3577 - Yiming Xiang, Yi Zhuang, Nan Jiang:

An Efficient Block Index Scheme with Segmentation for Spatio-Textual Similarity Join. 3578-3593 - Minghua Wan, Zhihui Lai:

Feature Extraction via Sparse Difference Embedding (SDE). 3594-3607
- Aly Mohamed El-Semary, Mohamed Mostafa A. Azim, Hossam Diab

:
SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map. 3608-3628 - Yang Lu, Gang Wang, Jiguo Li, Jian Shen

:
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks. 3629-3647 - Min Dong, Yanli Ren, Xinpeng Zhang:

Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing. 3648-3663 - Sanghyun Park, Sang-ug Kang:

Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique. 3664-3677 - Mu Han, Lei Hua, Shidian Ma:

A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET. 3678-3698 - Zhiyuan Zhao, Jianhua Wang:

Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions. 3699-3719 - Jaewook Jung, Jongho Moon, Dongho Won:

Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. 3720-3746 - Jing Yang, Xinsheng Ji, Kaizhi Huang, Ming Yi, Yajun Chen:

AKA-PLA: Enhanced AKA Based on Physical Layer Authentication. 3747-3765
Volume 11, Number 8, August 2017
- Jiao Li, Gongqian Liang, Tianshi Liu:

A Novel Multi-link Integrated Factor Algorithm Considering Node Trust Degree for Blockchain-based Communication. 3766-3788 - Guiguo Feng, Wangmei Guo, Jingliang Gao:

Achievable Rate of Beamforming Dual-hop Multi-antenna Relay Network in the Presence of a Jammer. 3789-3808 - Beakcheol Jang, Wonyong Yoon:

CCDC: A Congestion Control Technique for Duty Cycling WSN MAC Protocols. 3809-3822 - Xiong Gan, Hong Lu, Guangyou Yang:

Energy-Efficient Cooperative Beamforming based CMISO Transmission with Optimal Nodes Deployment in Wireless Sensor Networks. 3823-3840 - Yulun Cheng, Longxiang Yang, Hongbo Zhu:

Virtual Resource Allocation in Virtualized Small Cell Networks with Physical-Layer Network Coding Aided Self-Backhauls. 3841-3861 - Xing Hu, Linhua Ma, Shaocheng Huang, Jinke Huang, Kangning Sun, Tianyu Huang:

Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model. 3862-3888 - Dan Li, Xianbin Wen:

A Range-Based Monte Carlo Box Algorithm for Mobile Nodes Localization in WSNs. 3889-3903 - Shaowei Liu, Weimin Lei, Wei Zhang, Hao Li:

Integration of Multipath Transmission into the IMS Framework. 3904-3917
- Imjae Hwang, Hyuck-Joo Kwon, Ji-Hye Chang, Yeong-Kyu Lim, Cheong Ghil Kim, Woo-Chan Park:

An Effective Viewport Resolution Scaling Technique to Reduce the Power Consumption in Mobile GPUs. 3918-3934 - Jingxiu Zong, Lili Meng, Huaxiang Zhang, Wenbo Wan:

JND-based Multiple Description Image Coding. 3935-3949 - Yiyu Hong, Jongweon Kim:

Retrieval of Non-rigid 3D Models Based on Approximated Topological Structure and Local Volume. 3950-3964 - Sungsoo Lim, Daeho Lee:

Real-Time Eye Tracking Using IR Stereo Camera for Indoor and Outdoor Environments. 3965-3983 - Bin Wang, Chuanjiang Li, Qian Zhang, Jifeng Huang:

An Extended Generative Feature Learning Algorithm for Image Recognition. 3984-4005
- Muhammad Tausif, Javed Ferzund, Sohail Jabbar

, Raheela Shahzadi:
Towards Designing Efficient Lightweight Ciphers for Internet of Things. 4006-4024 - Libing Wu

, Jing Fan, Yong Xie, Jing Wang:
An Improved Authentication and Key Agreement scheme for Session Initial Protocol. 4025-4042 - Yufei Liu

, Dechang Pi:
A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection. 4043-4060
- Hanbyeog Cho, Donghyuk Han, Sungjin Shin, Hyoung Jun Cho, Changsung Lee

, Goeun Lim, Mingoo Kang, Jong-Moon Chung:
Handover based on Maximum Cell Residence Time and Adaptive TTT for LTE-R High-Speed Railways. 4061-4076 - Yejin Sohn, Minju Cho, Jongho Paik:

Design of 8K Broadcasting System based on MMT over Heterogeneous Networks. 4077-4091 - Young-Su Ryu, Kyung Won Park, Jungwook Wee, Ki-Won Kwon:

An Efficient 4K and 8K UHD Transmission Scheme on Convergence Networks with Broadcasting and LTE by using Coordinated Multi-Point Transmission System. 4092-4104 - Sangwoo Hahm:

Information Sharing and Creativity in a Virtual Team: Roles of Authentic Leadership, Sharing Team Climate and Psychological Empowerment. 4105-4119 - Nak-Jun Sung, Min Hong, Seung-Hyun Lee, Yoo-Joo Choi:

Simulation of Deformable Objects using GLSL 4.3. 4120-4132 - Yoosin Kim, Yeonjin Ju, SeongGwan Hong, Seung Ryul Jeong:

Practical Text Mining for Trend Analysis: Ontology to visualization in Aerospace Technology. 4133-4145 - Dong Hyuk Jo, Jong Woo Park:

The Determinants of Technology Commercialization Performance of Technology-based SMEs. 4146-4161 - Suhwang Seol, DaeSun Ko, InSung Yeo:

UX Analysis based on TR and UTAUT of Sports Smart Wearable Devices. 4162-4179
Volume 11, Number 9, September 2017
- Weidong Guo, Houyuan Tian, Qing Wang:

Energy Harvesting in Multi-relay Multiuser Networks based on Two-step Selection Scheme. 4180-4196 - Yunhao Xia, Hanshu Hong, Guofeng Lin, Zhixin Sun:

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction. 4197-4219 - Jiamin Chen, Qi Zhu, Su Zhao:

Interference Management Algorithm Based on Coalitional Game for Energy-Harvesting Small Cells. 4220-4241 - Kui Liu, Changle Li, Chao Guo, Rui Chen:

An Efficient Downlink MAC Protocol for Multi-User MIMO WLANs. 4242-4263 - Donghyun Lee, Jae-Hyun Park, Kwang-Ho Kim, Jeong-Sik Park, Ji-Hwan Kim, Gil-Jin Jang, Unsang Park:

Maximum Likelihood-based Automatic Lexicon Generation for AI Assistant-based Interaction with Mobile Devices. 4264-4279 - Amin Keshavarzi

, Abolfazl Toroghi Haghighat, Mahdi Bohlouli
:
Adaptive Resource Management and Provisioning in the Cloud Computing: A Survey of Definitions, Standards and Research Roadmaps. 4280-4300 - Sadam M. Alkhalidi, Dong Wang, Zaid A. Al-Marhabi:

Sector-based Charging Schedule in Rechargeable Wireless Sensor Networks. 4301-4319 - Jiawei Nie, Juan Luo

, Luxiu Yin:
Energy-aware Multi-dimensional Resource Allocation Algorithm in Cloud Data Center. 4320-4333 - Yao Nie, Chunyan Feng, Fangfang Liu, Caili Guo, Wen Zhao:

Phase Noise Self-Cancellation Scheme Based on Orthogonal Polarization for OFDM System. 4334-4356 - Qiang Ji, Shifeng Zhang, Haoguang Zhao, Tiankui Zhang, Jinlong Cao:

Quantum Bee Colony Optimization and Non-dominated Sorting Quantum Bee Colony Optimization Based Multi-relay Selection Scheme. 4357-4378 - Xiao Yang, Zheng Qin, Binhua Wan, Renwei Zhang, Huihui Wang

:
The Improved Velocity-based Models for Pedestrian Dynamics. 4379-4397 - Zhaoshu Tang, Zhenquan Qin, Ming Zhu, Jian Fang, Lei Wang, Honglian Ma:

TOUSE: A Fair User Selection Mechanism Based on Dynamic Time Warping for MU-MIMO Networks. 4398-4417 - Jun Yan, Kegen Yu

, Yangqin Cao, Liang Chen
:
Attack-Resistant Received Signal Strength based Compressive Sensing Wireless Localization. 4418-4437
- Huanlong Zhang, Jianwei Zhang, Qinge Wu, Xiaoliang Qian, Tong Zhou, Hengcheng Fu:

Extended kernel correlation filter for abrupt motion tracking. 4438-4460 - Sung-Jong Eun, Eun-Young Jung, Dong-Kyun Park, Taeg Keun Whangbo:

Robust Image Similarity Measurement based on MR Physical Information. 4461-4475 - Qian Ji, Liyan Zhang, Zechao Li:

KNN-based Image Annotation by Collectively Mining Visual and Semantic Similarities. 4476-4490 - Min Yuan, Heng Yao, Chuan Qin

, Ying Tian:
A Dynamic Hand Gesture Recognition System Incorporating Orientation-based Linear Extrapolation Predictor and Velocity-assisted Longest Common Subsequence Algorithm. 4491-4509 - Ning Sun, Hang Guo, Jixin Liu, Guang Han:

Facial Gender Recognition via Low-rank and Collaborative Representation in An Unconstrained Environment. 4510-4526 - Minwoo Kim, Jonghoon Chun, Sang-Kyun Kim:

Study on 3 DoF Image and Video Stitching Using Sensed Data. 4527-4548 - Zhengyan Zhang, Jingjie Yan, Guanming Lu, Haibo Li, Ning Sun, Qi Ge:

Multiscale Adaptive Local Directional Texture Pattern for Facial Expression Recognition. 4549-4566 - Zhi Zhang

, Dongyan Wang
, Cheng-You Wang
, Xiao Zhou
:
Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors. 4567-4587
- Hwankuk Kim

, Kyungho Lee, Jongin Lim:
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. 4588-4608 - Bangyi Sun, Jianfeng Chu, Liang Hu, Hongtu Li, Guangkun Shi:

A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management. 4609-4623 - Lei Xu

, Chungen Xu
, Xing Zhang:
A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform. 4624-4640 - Kai Wang

, Wei Bao, Yingjie Wang, Xiangrong Tong:
Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking. 4641-4657 - Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Tianling Lu:

Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. 4658-4679
Volume 11, Number 10, October 2017
- Shiyu Ji, Liangrui Tang, Chen Xu, Shimo Du, Jiajia Zhu, Hailin Hu:

QoE-aware Energy Efficiency Maximization Based Joint User Access Selection and Power Allocation for Heterogeneous Network. 4680-4697 - Ehsan Mostajeran, Rafidah Md Noor

, Mohammad Hossein Anisi
, Ismail Ahmedy, Fawad Ali Khan:
A Realistic Path Loss Model for Real-time Communication in the Urban Grid Environment for Vehicular Ad hoc Networks. 4698-4716 - Guolin Sun, Bruce Mareri

, Guisong Liu
, Xiufen Fang, Wei Jiang:
Big Data Based Dynamic Flow Aggregation over 5G Network Slicing. 4717-4737 - Jing Mao, Chen Chen, Lin Bai, Haige Xiang, Jinho Choi

:
Subcarrier and Power Allocation for Multiuser MIMO-OFDM Systems with Various Detectors. 4738-4758 - Alidu Abubakari, Raymond Sabogu-Sumah, Han-Shin Jo

:
Optimal Inter-Element Spacing of FD-MIMO Planar Array in Urban Macrocell with Elevation Channel Modelling. 4759-4780 - Tareq Alhmiedat

:
Low-power Environmental Monitoring System for ZigBee Wireless Sensor Network. 4781-4803 - Zhimin Liu, Zhangdong Ouyang:

A Learning Automata-based Algorithm for Area Coverage Problem in Directional Sensor Networks. 4807-4822 - Fang Ye, Chunxia Su, Yibing Li, Xu Zhang:

Cross-layer Dynamic Subcarrier Allocation with Adaptive Service Rate Control in SC-FDMA System. 4823-4843 - Anwar Khan, Nadeem Javaid

, Ihsan Ali
, Mohammad Hossein Anisi
, Atiq Ur Rahman, Naeem Bhatti, Muhammad Zia, Hasan Mahmood:
An Energy Efficient Interference-aware Routing Protocol for Underwater WSNs. 4844-4864 - Xiaolin Wu, Bin Zhu, Yang Wang, Yue Rong:

Optimization for Relay-Assisted Broadband Power Line Communication Systems with QoS Requirements Under Time-varying Channel Conditions. 4865-4886 - Zhangguo Shen, Wanliang Wang, Qing Shen, Zechao Li:

Hybrid CSA optimization with seasonal RVR in traffic flow forecasting. 4887-4907 - DonHee Lee, Kyoungro Yoon:

An efficient spatio-temporal index for spatio-temporal query in wireless sensor networks. 4908-4928
- Mayur Rajaram Parate, Kishor M. Bhurchandi

:
Structurally Enhanced Correlation Tracking. 4929-4947 - Aram Baek, Kang-Woon Lee, Jae-Gon Kim, Haechul Choi:

Analysis of Implementing Mobile Heterogeneous Computing for Image Sequence Processing. 4948-4967 - Yuesheng Zhu, Yifeng Jiang, Zhuandi Huang, Guibo Luo:

SuperDepthTransfer: Depth Extraction from Image Using Instance-Based Learning with Superpixels. 4968-4986 - Bae-Muu Chang:

Design of Solving Similarity Recognition for Cloth Products Based on Fuzzy Logic and Particle Swarm Optimization Algorithm. 4987-5005 - Xin Wang, Lingling Xu, Yuzhen Zhang, Chen Ning:

A novel hybrid method for robust infrared target detection. 5006-5022 - Fidalcastro A., E. Baburaj

:
Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data. 5023-5038
- Haiyang Yu

, Yongquan Cai, Shanshan Kong, Zhenhu Ning, Fei Xue, Han Zhong:
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. 5039-5061 - Janghyuk Kauh, Wongi Lim, Koohyung Kwon, Jong-Eon Lee, Jung-Jae Kim, Min-Woo Ryu, Si-Ho Cha:

Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems. 5062-5079 - Qiuhua Wang, Qiuyun Lyu, Xiaojun Wang, Jianrong Bao:

A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation. 5080-5097
- Pusik Park, Rustam Rakhimov Igorevich, Jongho Yoon:

Performance Evaluation of a Method to Improve Fairness in In-Vehicle Non-Destructive Arbitration Using ID Rotation. 5098-5115 - Chao Deng, Kaibin Huang, Yik-Chung Wu

, Minghua Xia:
Analysis of RF-DC Conversion Efficiency of Composite Multi-Antenna Rectifiers for Wireless Power Transfer. 5116-5131 - Jin-Lee Lee, Doo-Ho Park, Changhoon Lee:

Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier. 5132-5148 - Kang-Woo Choi, Kang Yi, Chong-Min Kyung:

Lifetime Maximization of Wireless Video Sensor Network Node by Dynamically Resizing Communication Buffer. 5149-5167 - Jong-Moon Chung, Taeyoung Ha, Sung-Woong Jo, Taehyun Kyong, So-Yun Park:

Augmented Reality based Low Power Consuming Smartphone Control Scheme. 5168-5181
Volume 11, Number 11, November 2017
- Sang-Kyun Kim, Nevadita Sahu, Marius Preda

:
Beginning of a New Standard: Internet of Media Things. 5182-5199 - Liaoruo Huang, Qingguo Shen

, Wenjuan Shao:
Congestion Aware Fast Link Failure Recovery of SDN Network Based on Source Routing. 5200-5222 - Yunong Han, Kun Yang:

Load Aware Automatic Channel Switching for Software-Defined Enterprise WLANs. 5223-5242 - Wentao Wang, Lingxia Wang, Fang Zheng:

An Improved Adaptive Scheduling Strategy Utilizing Simulated Annealing Genetic Algorithm for Data Center Networks. 5243-5263 - Taejoon Kim, Kwanghoon An, Heejung Yu:

Optimal Resource Planning with Interference Coordination for Relay-Based Cellular Networks. 5264-5281 - Huijun Dai, Xiaolin Gui, Zhaosheng Dai, Dewang Ren, Yingjie Gu:

A Bi-Target Based Mobile Relay Selection Algorithm for MCNs. 5282-5300 - Xianling Wang, Min Xiao, Hongyi Zhang, Sida Song:

Modeling and SINR Analysis of Dual Connectivity in Downlink Heterogeneous Cellular Networks. 5301-5323 - Hua Chen, Shan Wu, Ping Hu, Zhudi Xu:

On the Feasibility of Interference Alignment in the Cellular Network. 5324-5337 - Haiwei Zuo, Yanjing Sun, Song Li, Qiang Ni, Xiaolin Wang, Xiaoguang Zhang:

A Medium Access Control Mechanism for Distributed In-band Full-Duplex Wireless Networks. 5338-5359 - Xiaohui Ma, Guobing Li

, Guomei Zhang:
A New Dynamic Transmission-Mode Selection Scheme for AMC/HARQ-Based Wireless Networks. 5360-5376 - Yuan Liang, Xinyu Da, Shu Wang:

On Narrowband Interference Suppression in OFDM-based Systems with CDMA and Weighted-type Fractional Fourier Transform Domain Preprocessing. 5377-5391
- Debajyoti Pal

, Vajirasak Vanijja:
Model for Mobile Online Video viewed on Samsung Galaxy Note 5. 5392-5418 - Murodjon Abdukholikov, TaegKeun Whangbo:

Fast image stitching method for handling dynamic object problems in Panoramic Images. 5419-5434 - Tahmina Khanam, Kaushik Deb:

Baggage Recognition in Occluded Environment using Boosting Technique. 5436-5458 - Wanli Feng, Yigang Cen, Xianyou Zeng, Zhetao Li, Ming Zeng, Viacheslav V. Voronin

:
Object tracking based on adaptive updating of a spatial-temporal context model. 5459-5473 - Waled Hussein Al-Arashi, Wuh Shing Chai, Shahrel Azmin Suandi

:
RowAMD Distance: A Novel 2DPCA-Based Distance Computation with Texture-Based Technique for Face Recognition. 5474-5490 - Peng Li, Hongwei Ge, Jinlong Yang:

Novel Partitioning Algorithm for a Gaussian Inverse Wishart PHD Filter for Extended Target Tracking. 5491-5505 - Ningning Hu, Yao Zhao, Huihui Bai:

3D View Synthesis with Feature-Based Warping. 5506-5521 - Gaohua Lin, Yongming Zhang, Qixing Zhang

, Yang Jia, Gao Xu, Jinjun Wang:
Smoke detection in video sequences based on dynamic texture using volume local binary patterns. 5522-5536
- Pin-Chang Su, Chien-Hua Tsai

:
New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography. 5537-5555 - Jiping Li, Yaoming Ding, Zenggang Xiong, Shouyin Liu:

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks. 5556-5573 - Weipeng Guo, Yonghong Chen, Yiqiao Cai, Tian Wang, Hui Tian

:
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. 5574-5591 - Xiaofeng Ma, Yi Zhang, Xiaofeng Song, Chao Fan:

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection. 5592-5609 - Zhangkai Luo, Huali Wang, Kaijie Zhou:

Physical Layer Security Scheme Based on Polarization Modulation and WFRFT Processing for Dual-polarized Satellite Systems. 5610-5624 - Lunzhi Deng, Yixian Yang, Yuling Chen:

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group. 5625-5641 - Hongwei Tang, Shengzhong Feng, Xiaofang Zhao, Yan Jin:

VirtAV: an Agentless Runtime Antivirus System for Virtual Machines. 5642-5670 - Zhuolin Mei, Bin Wu, Shengli Tian, Yonghui Ruan, Zongmin Cui:

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control. 5671-5693
Volume 11, Number 12, December 2017
- Walaa Hashem

, Heba Nashaat
, Rawya Rizk:
Honey Bee Based Load Balancing in Cloud Computing. 5694-5711 - Qingyong Deng, Xueming Li, Zhetao Li, Anfeng Liu, Young-June Choi:

Electricity Cost Minimization for Delay-tolerant Basestation Powered by Heterogeneous Energy Source. 5712-5728 - Cheng Wu, Lujie Wang, Yiming Wang:

A Competition-based Algorithm for Routing Discovery and Repair in Large-scale VANET. 5729-5744 - Wonwoo Lee, Hyungkyu Yang, Beakcheol Jang:

A High Isolation 4 by 4 MIMO Antenna for LTE Mobile Phones using Coupling Elements. 5745-5758 - Yingmo Jie, Mingchu Li, Tingting Tang, Cheng Guo:

Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network. 5759-5779 - Frederic Nzanywayingoma

, Yang Yang:
Effective Task Scheduling and Dynamic Resource Optimization based on Heuristic Algorithms in Cloud Computing Environment. 5780-5802 - Weidang Lu, Chenxin He, Yuanrong Lin, Hong Peng, Xin Liu:

Contract Theory Based Cooperative Spectrum Sharing with Joint Power and Bandwidth Optimization. 5803-5819 - Yuli Zhang, Yuhua Xu, Qihui Wu:

Opportunistic Spectrum Access with Dynamic Users: Directional Graphical Game and Stochastic Learning. 5820-5834 - Fasee Ullah

, Abdul Hanan Abdullah, Gaddafi Abdul-Salaam
, Marina Md Arshad
:
CDASA-CSMA/CA: Contention Differentiated Adaptive Slot Allocation CSMA-CA for Heterogeneous Data in Wireless Body Area Networks. 5835-5854 - Sang-Kon Kim, Taekon Kim, Hyungkeun Lee:

A Novel Transmission Scheme for Compressed Health Data Using ISO/IEEE11073-20601. 5855-5877 - Taeyeun Kim

, Sanghyun Bae:
Designing an Intelligent Rehabilitation Wheelchair Vehicle System Using Neural Network-based Torque Control Algorithm. 5878-5904 - Yongheng Chen, Yaojin Lin, Wanli Zuo:

Phrase-based Topic and Sentiment Detection and Tracking Model using Incremental HDP. 5905-5926 - Narisa Zhao, Xiaojun Liu:

Information Propagation in Social Networks with Overlapping Community Structure. 5927-5942 - Zhenwei Xie, Qi Zhu, Su Zhao:

Resource Allocation Algorithm Based on Simultaneous Wireless Information and Power Transfer for OFDM Relay Networks. 5943-5962
- Siqi Zhou, Feng Xu, Ping Ping, Zaipeng Xie

, Xin Lyu:
Non-square colour image scrambling based on two-dimensional Sine-Logistic and Hénon map. 5963-5980 - Jeonho Kang, Dongjin Kang, Kyuheon Kim:

Method of DASH segments into a MMTP stream for switching contents under a hybrid broadcasting environment. 5981-5997 - Jeong-Chan Jin, Young-Jin Kim:

Human Visual System-aware Dimming Method Combining Pixel Compensation and Histogram Specification. 5998-6016 - Yenewondim Biadgie, Minsung Kim, Kyung-Ah Sohn:

Multi-resolution Lossless Image Compression for Progressive Transmission and Multiple Decoding Using an Enhanced Edge Adaptive Hierarchical Interpolation. 6017-6037 - Jong-Seol Lee, Dalwon Jang, Kyoungro Yoon:

Automatic melody extraction algorithm using a convolutional neural network. 6038-6053 - Hoon Ko, Chang-Hoon Lee, Kwanmoon Jeong, Myeung Su Lee, Yunyoung Nam, Kwon-Ha Yoon, Jinseok Lee

:
A Pilot Study on Hip Bone Mineral Densities Estimation from Forearm CBCT images. 6054-6068 - Zahid Mahmood

, Tauseef Ali, Muhammad Nazeer
, Nargis Bibi, Imran Shahzad, Shoaib Azmat:
EAR: Enhanced Augmented Reality System for Sports Entertainment Applications. 6069-6091
- Reinhard Behrens, Ali Ahmed

:
A Security Architecture for the Internet of Things. 6092-6115 - Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Ping Zheng:

Identity Based Proxy Re-encryption Scheme under LWE. 6116-6132 - Zahid Ali, Unsang Park, Jongho Nang, Jeong-Seon Park, Taehwa Hong, Sungjoo Park:

Periocular Recognition Using uMLBP and Attribute Features. 6133-6151 - Sungju Lee, Jaewon Sa, Hyeonjoong Cho, Daihee Park:

Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application. 6152-6168 - Ling Xiong, Daiyuan Peng, Tu Peng, Hongbin Liang:

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. 6169-6187 - Hongfeng Zhu:

A Novel Two-party Scheme against Off-line Password Guessing Attacks using New Theorem of Chaotic maps. 6187-6204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














