


default search action
Journal of Information Science and Engineering, Volume 35
Volume 35, Number 1, January 2019
- Danqi Du, Feng Zhou, Wei Xiong:

Cost-Sensitive ListMLE Ranking Approach Based on Sparse Representation. 1-22 - Pei-Jun Lee, Trong-An Bui, Chiao Su:

Artifact Reduction based Multi-view Generation Algorithm for Sparse Camera Configuration. 23-39 - Hai Vu, Van-Hung Le, Thi Thuy Nguyen, Thi-Lan Le, Thanh-Hai Tran:

Fitting Cylindrical Objects in 3-D Point Cloud using Contextual and Geometrical Constraints. 41-60 - Jen-Yuan Yeh, Tien-Yu Hsu, Cheng-Jung Tsai, Pei-Cheng Cheng, Jung-Yi Lin:

On Identifying Cited Texts for Citances and Classifying Their Discourse Facets by Classification Techniques. 61-86 - Hilman F. Pardede, Asri Rizki Yuliani, Agus Subekti:

On the Effect of the Implementation of Human Auditory Systems on Q -Log-Based Features for Robustness of Speech Recognition Against Noise. 87-104 - Chiao-Wen Kao, Hui-Hui Chen, Bor-Jiunn Hwang, Yu-Ju Huang, Kuo-Chin Fan:

Gender Classification with Jointing Multiple Models for Occlusion Images. 105-123
- Po-Jen Chuang, Han-Chun Chuang:

Effective Privacy Preservation in Third-Party Cloud Storage Auditing. 125-135 - Yang Yang, Yu-Chao Zhan, Jia Liu, Xi-Meng Liu, Feng Yuan, Shang-Ping Zhong:

Chinese Multi-Keyword Fuzzy Rank Search over Encrypted Cloud Data based on Locality-Sensitive Hashing. 137-158
- Der-Rong Din:

Survivable Routing Problem in EONs with FIPP p -Cycles Protection. 159-174
- Jaekwon Lee, Dongsun Kim, Woosung Jung:

Cost-Aware Clustering of Bug Reports by Using a Genetic Algorithm. 175-200 - Xiaoning Zeng, Xudong Lin, Caiyan Pei, Jing Cao:

Cardinality Estimation Based on Cluster Analysis. 201-222 - Hsing-Kuo Pao, Fong-Fuei Lee, Yuh-Jye Lee:

Dealing with Interleaved Event Inputs for Intrusion Detection. 223-242
Volume 35, Number 2, March 2019
- T. Manikumar, A. John Sanjeev Kumar:

A Buffered Genetic Algorithm for Automated Branch Coverage in Software Testing. 245-273
- Ebrahimi Ebrahimi, Mohammad Bagher Tavakoli, Farbod Setoudeh:

Iris Recognition System Based on Fractal Dimensions Using Improved Box Counting. 275-290 - Minghe Wang, Erhua Zhang, Zhenmin Tang:

Robust Speaker Verification via RPCA under Additive Noise. 291-305 - Uzair Iqbal, Ying Wah Teh, Muhammad Habib Ur Rehman, Qurat-Ul-Ain Mastoi:

A Deterministic Approach for Finding the T Onset Parameter of Flatten T Wave in ECG. 307-321
- Gwan-Hwan Hwang, Kun-Yih Huang, Bo-Sian Liao, Yiling Yuan, Hung-Fu Chen:

Real-time Auditing of the Runtime Environment for Cloud Computing Platforms. 323-339 - Ling Xiong, Tu Peng, Peng Peng, Hongbin Liang, Zhicai Liu:

An Efficient Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings. 341-360
- A. Jahir Husain, M. A. Maluk Mohamed:

IMBF - Counteracting Denial-of-Sleep Attacks in 6LowPAN Based Internet of Things. 361-374 - You-Chiun Wang, Han Hua:

An Adaptive Broadcast and Multicast Traffic Cutting Framework to Improve Ethernet Efficiency by SDN. 375-392 - Ahmed Alzahrani, Vijey Thayananthan:

Analysis of Energy Efficiency for MIMO Wireless Network using Manifold Techniques. 393-409
- Yun-Jung Lee, Gyun Woo:

Analyzing the Dynamics of Stock Network for Recommanding Stock Portfolio. 411-427 - Chih-Hua Tai:

Guest Recommendation for Holding Social Activities Among Friends Through Social Platforms. 429-445 - Trong-Dat Nguyen, Sang-Won Lee:

DSM: A Low-Overhead, High-Performance, Dynamic Stream Mapping Approach for MongoDB. 447-469 - Guang-Ho Cha:

An Efficient Search Algorithm for Fingerprint Databases. 471-484
Volume 35, Number 3, May 2019
- Han Wang, Chen-Yen Tang, Chin-Jung Tao, Heng-Chih Hsieh:

Disaster Scenario and Record Capture System. 487-505 - Souhir Feki, Aymen Belghith, Faouzi Zarai:

Ant Colony Optimization-based Resource Allocation and Resource Sharing Scheme for V2V Communication. 507-519 - Karunanithy Kalaivanan, Velusamy Bhanumathi:

Unmanned Aerial Vehicle based Reliable and Energy Efficient Data Collection from Red Alerted Area using Wireless Sensor Networks with IoT. 521-536
- Khanh Nguyen-Huu, Chang Geun Song, Seon-Woo Lee:

Smartphone Holding Styles Based Step Detection and Length Estimation. 537-554
- Kuang-Hui Tang, Chuan-Kuei Huang, Cheng-Jian Lin:

Automatic Text Recognition in Natural Scene Using Neural Network Classifier with Dynamic-group-based Hybrid Particle Swarm Optimization. 555-575 - Revati Shriram, Vijaya V. Baskar, Betty Martin, Mahalingam Sundhararajan, Nivedita Daimiwal:

Regression Analysis of Coherence between Concurrent EEG-EEG and EEG CPPG Signals from Prefrontal Cortex during Music Evoked Emotions. 577-595 - Cheng-Wei Lee, Yi-Lun Wu, Liang-Chih Yu:

A Combining Mutual Information and Entropy for Unknown Word Extraction from Multilingual Code-Switching Sentences. 597-610 - Xiyang Liu, Yang Zhang, Jing Hu, Mengyun Tang, Haichang Gao:

Breaking Text-based CAPTCHAs using Average Vertical Partition. 611-634
- Pu Zhao, Jia Yu, Hanlin Zhang:

Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing. 635-650
- Zhi-Hong Wang, Yi Guo:

Sentence-Ranking-Enhanced Keywords Extraction from Chinese Patents. 651-674 - Sharath B. R. Kumar, Kuochen Wang, Shi-Min Shen:

Corpus-based Topic Derivation and Timestamp-based Popular Hashtag Prediction in Twitter. 675-696 - S. Vatchala, S. Ravimaran, A. Sathish:

Auto Sec SDN-XTR: A Hybrid End to End Security Mechanism with Efficient Trace Representation on Open Stack Cloud. 697-718
Volume 35, Number 4, July
- Zhao Wang, Yaping Mao, Christopher Melekian, Eddie Cheng:

Steiner Distance in Join, Corona, Cluster, and Threshold Graphs. 721-735 - G. Rajesh, R. Ranjitha:

A Cooperative Game Theoretic Approach for Congestion Management in 6LoWPAN. 737-748 - Lei Shi, Junping Du, MeiYu Liang, Fei-Fei Kou:

SRTM: A Sparse RNN-Topic Model for Discovering Bursty Topics in Big Data of Social Networks. 749-767 - V. Gnanasekar, S. Solai Manohar, M. Senthil Kumaran:

Priority-based Channel Scheduling and Route Discovery for IWSN Applications. 769-786 - T. Kumaragurubaran, M. Indra Devi:

RCUHP-SM: A Rules Generation and Clustering based Uncovering Hidden Patterns in Social Media. 787-804 - Gokila K., Ila Vennila:

A Secure Link Aware Fault Detection Algorithm for Enabling a Reliable Communication in MANET. 805-820 - Jing Hu, Jun Yan, Zhenqiang Wu, Hai Liu, Yihui Zhou:

A Privacy-Preserving Approach in Friendly-Correlations of Graph Based on Edge-Differential Privacy. 821-837
- Jen-Cheng Ying, Wang-Dauh Tseng, Wen-Jiin Tsai:

Multi-Scan Architecture with Scan Chain Disabling Technique for Capture Power Reduction. 839-849
- Sheeraz Arif, Jing Wang, Fida Hussain, Zesong Fei:

Trajectory-Based 3D Convolutional Descriptors for Human Action Recognition. 851-870
- Shih-Yu Huang, Ping Sheng Huang:

A Homophone-based Chinese Text Steganography Scheme for Chatting Applications. 871-886 - Gyeong-Min Kim, Juhyun Park, Yun-Hwan Jang, Yongsu Park:

Efficient Automatic Original Entry Point Detection. 887-901
- Bumjoon Jo, Junhong Ahn, Sungwon Jung:

Efficient Spatial Keyword Search Methods for Reflecting Multiple Keyword Domains. 903-921 - Ping Zhao, Li Yan:

A Methodology for Indexing Temporal RDF Data. 923-934
Volume 35, Number 5, September
- Sunandita Debnath, Ashraf Hossain:

Sensor Scheduling Schemes and Network Coverage in Dense Wireless Sensor Networks. 937-958 - Liang Zhu, Liping Yu, Zengyu Cai, Jianwei Zhang:

Toward Pattern and Preference-Aware Travel Route Recommendation over Location-Based Social Networks. 959-975 - Preeth Raguraman, Mohan Ramasundaram:

Dimension based Localization Technique in Internet of Things: A Fuzzy Driven Approach for Mobile Target. 977-996 - Amina Gharsallah, Faouzi Zarai, Mahmoud Neji:

Optimized Handover Mechanism in Heterogeneous Vehicular Communication Systems. 997-1009 - Jianping Wang, Wei Chen, Shu-Jing Zhang, Xiangang Zuo, Zhou Yu:

A Clustering Algorithm of Underwater Acoustic Sensor Networks based on Hierarchical 3D Mesh. 1011-1027 - Baihe Ma, Zhihong Liu, Yong Zeng, Zhuo Ma, Hui Zhang, Jianfeng Ma:

Cooperative Jamming for Secrecy of Wireless Communications. 1029-1044 - Shiow-Fen Hwang, Wei-Chen Chen, Chyi-Ren Dow, Nhut-Lam Nguyen:

Efficient RSU Placement Schemes in Urban Vehicular Ad Hoc Networks. 1045-1060 - Fang Ren, Xuefei Yang, Dong Zheng:

A QC-LDPC Code Based Digital Signature Algorithm. 1061-1074 - Cong Gao, Zhenzhou Tian, Yanping Chen, Zhongmin Wang:

A Cost-Efficient Virtual Sensor Management Scheme for Manufacturing Network in Smart Factory. 1075-1097 - Osamah Ibrahim Khalaf, Ghaida Muttashar Abdulsahib:

Frequency Estimation by the Method of Minimum Mean Squared Error and P-value Distributed in the Wireless Sensor Network. 1099-1112 - Yan Gao, Yong Zeng, Zhihong Liu, Jian-Feng Ma, Yang Liu, Yi-Kai Liu:

Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things. 1113-1132 - Kalaivanan Karunanithy, Velusamy Bhanumathi:

An Efficient Distributed Clustering and Gradient based Routing Protocol for Wireless Sensor Networks. 1133-1146 - Ashish Pandey, Abhishek Rajan, Arnab Nandi, Valentina Emilia Balas:

On Lifetime Enhancement of Super Nodes based Wireless Sensor Networks by using Sine Cosine Algorithm. 1147-1159 - Amina Gharsallah, Faouzi Zarai, Mahmoud Neji:

MIH/SDN-Based Vertical Handover Approach for 5G Mobile Networks. 1161-1172
Volume 35, Number 6, November
- Priti Nitin Metange, K. B. Khanchandani:

Ultra-Low Power Hybrid PLL Frequency Synthesizer with Lock Check Provisioning Efficient Phase Noise. 1175-1191 - Hongli Yu, Gwo-Jong Yu, Bin Yang, Jinjun Liu:

Motion Detection with Local Linear Embedding and its Application to Indoor Device- Free Human Trajectory Tracking. 1193-1208 - Shixun Wu, Shengjun Zhang, Kai Xu, Darong Huang:

A Weighting Localization Algorithm with LOS and One-Bound NLOS Identification in Multipath Environments. 1209-1222 - Ravi Shankar, Ritesh Kumar Mishra:

S-DF Cooperative Communication System Over Time Selective Fading Channels. 1223-1248 - Jing Zhou:

Research of Additive Iteration Step Sizes for SINMF. 1249-1261 - Anxiang Ma, Xiaohong Zhang, Changsheng Zhang, Bin Zhang, Yan Gao:

An Adaptive Ant Colony Algorithm for Dynamic Traveling Salesman Problem. 1263-1277 - Fu Zhang, Dong-Xia Cao, Jingwei Cheng:

Spatio-Temporal UML Modeling and Verifying with Description Logic. 1279-1298 - Chun Yan, Meixuan Li, Wei Liu:

Application of Improved Genetic Algorithm in Function Optimization. 1299-1309 - Yu-E. Bao, Eer-Dun Bai:

Optimality Conditions for Fuzzy Programming Problems with Differentiable Fuzzy Objective Mappings. 1311-1327 - Yong-Jian Yang, Xiao-Guang Fan, Shu-Juan Tang, Haibao Xia, Zhen-Fu Zhuo, Ming Wan:

Amended Kalman Filtering with Intermittent Measurements in Target Tracking. 1329-1341 - Meijiao Wang, Lizhen Wang, Lihong Zhao:

Spatial Co-location Pattern Mining Based on Fuzzy Neighbor Relationship. 1343-1363 - Shi-Fei Ding, Yuexuan An:

Multiple Birth Support Vector Machine with Triplet Loss Function. 1365-1376 - Bingyan Lin, Xiaoyan Zhang:

Relative Reduction of Incomplete Interval-valued Decision Information Systems Associated with Evidence Theory. 1377-1396 - Hong Xue, Yi Yuan, Chi Jiang, Bo-Yu Cai:

Difference Measure Method of Risk Probability Distribution Based on Moment Generating Function and Fuzzy Data Stream Clustering. 1397-1417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














