


default search action
KSII Transactions on Internet and Information Systems, Volume 19
Volume 19, Number 1, January 2025
- Menglong Xu, Yanliang Zhang, Yapu Yang:
Argument Structure Mining Based on Effective Usage of Contextual Information. 1-16 - Uma Natarajan, Anitha Ramachandran
:
LSTM-RNN Based Efficient Execution System For Compute And Data Intensive Mobile Applications In The Edges. 17-39
- Sivanagaraju Vallabhuni, Kumar Debasis:
Incremental Health Improvement through Advanced Response-Based Treatment Recommendation (HMIPRTR): Integrating LSTM, GRU, and BFO for Enhanced Patient Care. 40-77
- Yan Qu, Yan Liu:
Design and Research of Facial Expression Recognition System Based on Key Point Extraction. 78-104 - Quoc-Dai Luong Tran
, Hai-My Hoang Nguyen:
A Hybrid Approach to Enhancing Contextual Information for Vietnam Civil Code Question-Answering. 105-122 - Jinyuan Li, Fan Yang, Wei He, Hailong Zhu:
An online ultrasonic flowmeter fault diagnosis method based on an extended belief rule base. 123-148
- Changjun Zou:
Multi-scale feature fusion attention of stereo vision depth recovery network based on Swin Transformer. 149-166
- Melbin George, S. Baskar:
Federated learning empowered Time-Sensitive Dynamic Data Modeling for applied computational problem of supply chain sector. 167-190
- Soo-Hyun Lee, Gyung-Eun Yun, Seong Hee Park, Min Young Lim, Youn Kyu Lee:
Towards Robust Deepfake Detection Based on Heart Rate Analysis. 191-212 - Vinod Salunkhe, Sujatha Rajkumar:
Protection of Electronic Health Records (EHRs) on the Ethereum Blockchain: Identifying and Preventing Active Threats to Smart Contracts. 213-231 - Wenhao Li
, Shams-ul-Arfeen Laghari, Selvakumar Manickam, Yung-Wey Chong:
Exploration and Evaluation of Human-centric Cloaking Techniques in Phishing Websites. 232-258
- Trang Nguyen T. H., Taejoon Kim:
Proximal Policy Optimization for Up/Downlink Time Slots Allocation in 5/6G Dynamic TDD Networks. 259-278 - Rui Guo, Chenfei Zhang, Chen Lou:
Improved LDPC-like BPL Decoding Algorithm for Polar Code. 279-294 - Yuna Sim, Seungseok Sin, Jina Ma, Sangmi Moon, Young-Hwan You, Cheol Hong Kim, Chang-Gun Lee, Intae Hwang:
Optimizing Beamforming for Improving Secrecy Performance in Systems Enabled by Multiple Flying RISs. 295-311 - Tanairat Mata
, Pisit Boonsrimuang:
Frequency domain oversampled OFDM with Index modulation for SFBC-based MIMO system in high-speed wireless communications. 312-326 - Xuan Lu, Jinhong Guo, Furong Peng, Yu Dong:
TDOA-MCM: A TDOA-based Multi-path Communication Mechanism for UWB Indoor Positioning. 327-343
Volume 19, Number 2, February 2025
- Yongjun Yan, Gaoying Liu, Liwen Liu:
Enhancing Efficiency and Resilience Multiobjective Optimization Model and Algorithm for Site Selection of Emergency Material Storage Sites. 344-367 - Muthubharathi R, M. Pandi, B. Vinoth Kumar, A. SenthilKumar:
Efficient Workload Allocation in IoT Fog-Cloud Architectures for Energy Efficiency and Low Latency Using DEABC Algorithm. 368-397
- Mingliang Xie, Lei Yu, Yuqing Chen, Wei Wei, Guoyang Ma, Xiong Huang, Xuan Wang:
Neural Network Algorithm-based Reactor Core Damage Assessment and Quick Source Term Calculation. 398-421
- Binbin Huang, Weiwei Xu, Zewen Lin, Zixin Huang, Yuyu Yin:
Task execution Failure Prediction Based on 1DCNN and Transformer in Cloud. 422-446
- Yazeed Yasin Ghadi, Fahad R. Albogamy, Saeed Alamri, Bilal Mehboob, Sardar Usman, Muhammad Hasnain:
ChatGPT-Assisted Energy Efficiency Enhancement for Blockchain Network Sustainability. 447-471 - Anh-Tuan Huynh, Phuoc Tran:
Utilizing Transformer Models To Detect Vietnamese Fake News on Social Media Platforms. 472-487 - Eunsun Choi, Sunju Park, Youngkwon Bae, Jaekwoun Shim, Woochun Jun, Byoungrae Han, Namje Park:
AI and Digital Literacy Training Support Strategies for Elementary School Teachers in South Korea: Insights from Needs Analysis and Delphi Survey. 488-512
- Me Young Lee, Hyeon Ah Seong, Si Won Seong, Eui Chul Lee:
Hierarchical Classification of Animal Images Including Visually Similar Species: A Case Study on Parrot Images. 513-532 - Jianqiang Dai, Aimin Xie, Deying Yu:
Classroom Behavior Recognition Through Joint Improvement of Faster RCNN Algorithm Under the Construction of Smart Education. 533-554
- Dong-young Yoo, Yong-Joon Lee, Hyun-Ho Park, Young-woo Hong:
Effectiveness of bot detection method for MMORPG behavior Using Shapley additive explanations. 555-571
- Mariam Ibrahim, Abdallah Ebdah:
Security Analysis of Electrical Vehicle Systems. 572-588 - Feng Xiao, Xi Hu:
Cryptanalysis and Improvement of a Novel RFID Authentication Protocol for Medical Systems. 589-611 - Zhimin Gu, Guo Jing, Li Yan, Daohua Zhu, Haitao Jiang, Yang Yu:
Registration and Copyright Binding on Non-Fungible Tokens via Zero-Watermarking. 612-634 - D. Dhinakaran
, G. Prabaharan, K. Valarmathi, S. M. Udhaya Sankar, R. Sugumar:
Safeguarding Privacy by utilizing SC-DℓDA Algorithm in Cloud-Enabled Multi Party Computation. 635-656
- Weihua Liu, Shilin Zhang, Wenjun Song, Baona Li, Lixun Huang, Daoying Huang:
IA Solution in Closed-Form for Optimum DoF in the Multi-User MIMO Interference Network. 657-670 - Chenfei Zhang, Rui Guo:
Fast Convergent LDPC-like BP List Decoding Algorithm for Polar Code Based on Partially Permutation Sparse Graph. 671-685 - Shuo Yang, Xiaorong Xu, Zhaoting Liu, Jun Wu, Jianrong Bao:
Secure Beamforming Optimization in IRS-assisted CR-SWIPT MIMO System. 686-703
Volume 19, Number 3, March 2025
- Ahmet Yapici, M. Ali Akcayol:
Video Frame Denoising via CNN and GAN Methods. 704-729 - Yan Li, Guihua Wen, Bo Liu:
Fed-BSE: Federated Learning Based on Bayesian Selective Ensemble. 730-751 - Shaik Rasheeda Begum, Saad Yunus Sait:
Feature Selection Using CS - BPSO for Depression Detection Based on Profile Information. 752-772 - Chen Wang, Bo Xie, Peiqian Zhan, Xiaoqi Yang, Hua Zhang:
Triple Masked Attention Network with Skill Embedding for Knowledge Tracing. 773-789 - Liping Zhang, Minming Xu, Song Li:
GCATRL: Using deep reinforcement learning to optimize knowledge graph completion. 790-810 - Junhan Peng, Xuhong Huang, Ronghao Kang, Zhihong Chen, Jianjun Huang:
Lightweight Algorithm for Detecting Fishing Boats in Offshore Aquaculture Areas Based on YOLOv7-Tiny. 811-830
- Vuk Vukovic, Nebojsa Tausan, Nebojsa Gagic, Lazar Rakovic, Slobodan Maric:
Challenges in the Establishment of Cloud Enterprise Resource Planning Systems. 831-850
- Keyue Yao, Ziguan Cui, Lipeng Wu, Zongliang Gan, Feng Liu:
Region-edge continuous enhancement network for salient object detection. 851-870 - Yoo-Joo Choi, Ku-Jin Kim:
Visualization and Analysis for Mesh Surface Curvature Based on Interpolation. 871-885 - Yao Yang, Xiaoling Chen, Linna Zhang, Yansen Huang, Yi Cen, Yigang Cen:
Industrial Surface Anomaly Detection by Combining Grayscale Edge Features and Normal Memory Features of Images for Reconstruction. 886-906 - Jinjin Zhang, Ranchen Dai, Yongsheng Tang, Tianming Zhan, Xiaobing Yu:
Hyperspectral Images Change Detection Based on Dense Multi-scale Attention for Land Resource Auditing. 907-925 - Xibin Jia, Chuanxu Yang, Yifan Yang, Chen Qian, Luo Wang, Zhenghan Yang, Hui Xu, Xianjun Han, Hao Ren, Xinru Wu, Boyang Ma, Dawei Yang:
Multi-scale Main-auxiliary MRI Sequences Fusion Based U-Net for Focal Lesion Segmentation. 926-949 - Minghua Wan, Weiyu Gu, Guowei Yang, Hai Tan:
Robust Non-negative Matrix Factorization with Supervised Graph Embedding for Image Classification. 950-972
- Ahmed Ayad Abdalhameed, Ammar Ismael Kadhim:
Molecular Swarm Optimization Analysis of Data Transmission and Recurrent Neural Networks (RNNs) for Attack Prevention in Mobile Ad Hoc Networks (MANETs). 973-986 - Kui Jiang, Siwei Wu, Ruibin Huang, Zhaorui Deng:
DGA Domain Name Detection Model Based on Gated Convolution and LSTM. 987-1006
- Sujin Park, Yong Ju, Eunjin Kim, JeongHyeon Chang:
Research On Consumer's Intention to Use Mobile Payment Platforms: Based on the VAM and TAM Models. 1007-1026 - Taekryong Han, Dongho Kim, Joonyoung Ahn, Kijung Ryu, Sangmin Lee:
A Study on the Effect of Voicebot Quality on Intention to Continuous Use in AI Contact Centers in the Financial Sector. 1027-1048 - Eunbi Cho, JeongHyeon Chang, Kwanghoon Pio Kim:
Development of CCTV Contextualization Based Environment of Disorder Detection Using Deep Learning. 1049-1063

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.