


default search action
Journal of Information Science and Engineering, Volume 41
Volume 41, Number 1, January 2025
- Junwei Dai, Jian-Qiang Lu, Yi-Min Mao, Jingguo Dai:

An Efficient Scene Matching and Recognition Model for Large-Scale Identification Application. 1-24 - An Lu, Chun-Feng Liao:

Investigating the Influence of Data Architecture on the Performance of Kubernetes-Based Applications. 25-42 - Eng-Shen Tu, Shin-Jie Lee:

Input Relation Prompting for Metamorphic Testing on Query-Based Systems. 43-60 - Vijayalakshmi Pasupathy, Rashmita Khilar:

Enhanced Detection of Fetal Congenital Cardiac Abnormalities through Hybrid Deep Learning Using Hunter-Prey Optimization. 61-76 - Kuo-Hsun Hsu, Yi-Yuan Chen, Andrew Weian Hou:

MAT-Go: A Study on Automated Transformation of Monolithic Go Application Systems Into Microservice Architecture. 77-96 - YungYu Zhuang, Chien-Wen Kao, Wei-Hsin Yen:

A Static Analysis Approach for Detecting Array Shape Errors in Python. 97-119 - Wen-Tin Lee, Ping-Yi Song, Ming-Kai Tsai:

A Data-Consistent Microservices Architecture Library using Saga Design Pattern and Backup Mechanism. 121-136 - Shang-Pin Ma, Wan-Lin You, Sheng-Kai Wang:

Using Model Transformation to Generate Chatbots for Web APIs. 137-153
- Yong Jin, Yanghua Gao, Weidong Lou, Ze-Liang Zheng, Sheng-Duo Gan:

AD-FGP: Industrial Multivariate Time-Series Anomaly Detection via Fusion of Generative and Predictive Models. 155-171 - Hui Zhi, Yu Huang, Yong Wang:

Blockchain-Based Security Cooperation Communication Scheme for IoV. 173-193 - Tung-Tso Tsai, Han-Yu Lin, Yu-Chi Chen, Yuan-Chin Chen:

Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks. 195-216 - Cheng-Han Shie, Pin-Yen Chiu, Po-Hsuan Hang, Cong-Han Lai, Sheng-Feng Lu, Chun-I Fan:

Detecting and Preventing Wireless Deauthentication Flood Attacks over 802.11 Networks. 217-235 - Jheng-Jia Huang, Wei-Hsueh Wang, Chih Yang:

Flexible and Efficient Multi-Device Authentication and KDP Supporting Third-Party Service Based on Smart Home Environments. 237-257
Volume 41, Number 2, March 2025
- Yong Ran, Chunjiong Zhang, Mingcan Xu, Lang Lang:

Multi-Directional Visual Tangerine Dynamic Classification and Recognition based on Region Proposal Networks. 261-278 - Lin Tao:

Machine Learning Based Landscape Garden Plan Analysis and Rendering Application. 279-295 - Wangyang Jiang, Guang-Zhen Zhang, Xuan He:

BSAV-RepVGG: Box Slide-Aware Vectors Based Target Detection Algorithm for Aerial Image. 297-318 - Longming Xu, Hui-Xia Zeng, Wei-Jian Liu:

A Man Overboard Detection Method in Natural Waters based on YOLOv7-FAEA. 319-340 - Hua-Dong Li, Xiao-Yu Yi, Chuan Wei, Yang Zhang:

GIS-based Research on the Siting Decision of Construction Waste Resource Utilization Facilities. 341-368 - Li-Wei Yuan, Wei Zhang, Zhi-Hua Xing, Su-Min Li, Chao-Wei Peng:

Temporal and Spatial Evolution of Surface Subsidence in DHS Iron Mine Based on Synthetic Aperture Radar Remote Sensing Monitoring. 369-384 - Ying Shen, Wei-hua Zhu, Si-Yong Fu, Guangsheng Wu:

Image Classification with Regularized Likelihood Estimation and Large Interval Discriminant Dimensionality Reduction. 385-400 - Qiong He, Yue-Qiao Jin, Yong-Fan Li, Qi-Xiao Li:

Study on Improving a Sheet-Fed Printing Site Based on 5S Management. 401-418 - Hui-Fang Zhang:

Boundary Recognition Method for Preposition Phrases in Modern Chinese based on Top-N Algorithm. 419-434 - Hai-Dong Zhu:

Procrastination Model Based on Theoretical Mechanics and Its Corresponding Solutions. 435-447 - Jinhuan Wang:

Character Recognition Technology based on Improved CNN. 449-466
- P. Sheela Rani, S. Baghavathi Priya, A. Kala:

Digital Certificate Verification in Educational Sector Using Non-Interactive Zero Knowledge Proof and Blockchain. 467-480
- Shimpee Seema, Bvr Reddy, Ravi Shankar, Preeti Singh, Vandana Nath:

Examination of the M-MIMO NOMA over Time Selective Channel Employing QRM-MLD MMSE Algorithm. 481-510
- Nabil Bennenni, Nasreddine Benbelkacem, Nuh Aydin:

Skew LCD-LDPC Codes over a Mixed Alphabet-. 511-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














