Journal: JIPS

Volume 16, Issue 6

1231 -- 1237Young-Sik Jeong, Jong Hyuk Park. Algorithms, Processes, and Services for Future ICT
1238 -- 1249Hamoud Alshammari, Sameh Abd El-Ghany, Abdulaziz Shehab. Big IoT Healthcare Data Analytics Framework Based on Fog and Cloud Computing
1250 -- 1260Gayoung Jung, Incheol Kim. Multimodal Context Embedding for Scene Graph Generation
1261 -- 1270Xiuping Zheng, Meiling Li, Xiaoxia Yang. Secure Performance Analysis Based on Maximum Capacity
1271 -- 1280Hyun Sik Sim. A Study on the Fault Process and Equipment Analysis of Plastic Ball Grid Array Manufacturing Using Data-Mining Techniques
1281 -- 1292Hongqiang Jiao, Xinxin Wang, Wanning Ding. Service Oriented Cloud Computing Trusted Evaluation Model
1293 -- 1308Dong-Ho Lee, Yan Li 0050, Byeong-Seok Shin. Mid-level Feature Extraction Method Based Transfer Learning to Small-Scale Dataset of Medical Images with Visualizing Analysis
1309 -- 1323Jun Li 0078, Haoxiang Zhang, Zhongrui Ni. Improved Social Force Model based on Navigation Points for Crowd Emergent Evacuation
1324 -- 1342Je-Kwan Park, Tai-Myoung Chung. Boundary-RRT* Algorithm for Drone Collision Avoidance and Interleaved Path Re-planning
1343 -- 1358Liquan Zhao, Ke Ma. Stagewise Weak Orthogonal Matching Pursuit Algorithm Based on Adaptive Weak Threshold and Arithmetic Mean
1359 -- 1371Jisu Kwon, Moon Gi Seok, Daejin Park. GPU-Based ECC Decode Unit for Efficient Massive Data Reception Acceleration
1372 -- 1390Seong-Hwan Cho, Seung Hee Kim. Suggestion for Collaboration-Based UI/UX Development Model through Risk Analysis
1391 -- 1406Qiumei Zheng, Nan Liu, Baoqin Cao, Fenghua Wang, Yanan Yang. Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy
1407 -- 1423Minji Seo, Ki Yong Lee. A Graph Embedding Technique for Weighted Graphs Based on LSTM Autoencoders
1424 -- 1436Ting-Ting Yang, Su-yin Zhou, Ai-jun Xu, Jian-xin Yin. A Method for Tree Image Segmentation Combined Adaptive Mean Shifting with Image Abstraction
1437 -- 1446Jaehyeon Cho, Nammee Moon. Design of Image Generation System for DCGAN-Based Kids' Book Text
1447 -- 1458Tomoya Kawakami. A Structured Overlay Network Scheme Based on Multiple Different Time Intervals
1459 -- 1478Sushil Kumar Singh, Abir El Azzaoui, Mikail Mohammed Salim, Jong Hyuk Park. Quantum Communication Technology for Future ICT - Review
1479 -- 1494Chenbo Liu. Directional Interpolation Based on Improved Adaptive Residual Interpolation for Image Demosaicking

Volume 16, Issue 5

1001 -- 1007Ji Su Park, Jong Hyuk Park. Enhanced Machine Learning Algorithms: Deep Learning, Reinforcement learning and Q-learning
1008 -- 1014Shuangbao Ma, Wen Liu, Changli You, Shulin Jia, Yurong Wu. An Improved Defect Detection Algorithm of Jean Fabric Based on Optimized Gabor Filter
1015 -- 1033Chengjuan Ren, Dae-Kyoo Kim, Dongwon Jeong. A Survey of Deep Learning in Agriculture: Techniques and Their Applications
1034 -- 1047Gi-Chul Yang. Next-Generation Personal Authentication Scheme Based on EEG Signal and Deep Learning
1048 -- 1063SooHyun Cho. Rate Adaptation with Q-Learning in CSMA/CA Wireless Networks
1064 -- 1073Li Wang, Chunling Jin, Chongqi Xu. An Evaluative Study of the Operational Safety of High-Speed Railway Stations Based on IEM-Fuzzy Comprehensive Assessment Theory
1074 -- 1082Dongcheul Lee. Comparison of Reinforcement Learning Activation Functions to Improve the Performance of the Racing Game Learning Agent
1083 -- 1094Guoqing Xu, Shouxiang Zhang. Fast Leaf Recognition and Retrieval Using Multi-Scale Angular Description Method
1095 -- 1104Xiaoli Wang, Feifei Wang, Yuhou Song, Guirong Zhang, Shaohui Wang. Design of Intelligent Management and Service System for Gas Valve
1105 -- 1112Junqin Wen. Gait Recognition Based on GF-CNN and Metric Learning
1113 -- 1128Yongfei Ye, Xinghua Sun, Minghe Liu, Jing Mi, Ting Yan, Lihua Ding. Intelligent On-demand Routing Protocol for Ad Hoc Network
1129 -- 1144Fan Yao. Thangka Image Inpainting Algorithm Based on Wavelet Transform and Structural Constraints
1145 -- 1157Jinlong Zhu, Fanhua Yu, Guangjie Liu, Mingyu Sun, Dong Zhao, Qingtian Geng, Jinbo Su. Classroom Roll-Call System Based on ResNet Networks
1158 -- 1168Liquan Zhao, Kexin Zhang. Localization Algorithm for Wireless Sensor Networks Based on Modified Distance Estimation
1169 -- 1182Peng Wang, Jiyun Bai, Jun Meng. A Hybrid Genetic Ant Colony Optimization Algorithm with an Embedded Cloud Model for Continuous Optimization
1183 -- 1195Mai Thanh Nhat Truong, Sanghoon Kim. A Study on Visual Saliency Detection in Infrared Images Using Boolean Map Approach
1196 -- 1213Sehrish Malik, Israr Ullah, DoHyeun Kim 0001, KyuTae Lee. Heuristic and Statistical Prediction Algorithms Survey for Smart Environments
1214 -- 1222Sung-Bong Jang, Young Woong Ko. An Efficient Object Augmentation Scheme for Supporting Pervasiveness in a Mobile Augmented Reality
1223 -- 1230Sangchul Woo, Yunsick Sung. Dynamic Action Space Handling Method for Reinforcement Learning Models

Volume 16, Issue 4

743 -- 749Ji Su Park, Jong Hyuk Park. Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions
750 -- 759Yifan Liao. Hot Spot Analysis of Tourist Attractions Based on Stay Point Spatial Clustering
760 -- 773Junho Jeong, Donghyo Kim, Byungdo Lee, Yunsik Son 0001. Design and Implementation of a Digital Evidence Management Model Based on Hyperledger Fabric
774 -- 783Qinghua Liu, Yuanxin He, Chang Jiang. Localization of Subsurface Targets Based on Symmetric Sub-array MIMO Radar
784 -- 794Li Gong, Hong Wang, Chunling Jin, Lili Lu, Menghan Ma. Type Drive Analysis of Urban Water Security Factors
795 -- 808Lu Chen 0004, Liming Zhou, Jinming Liu. Aircraft Recognition from Remote Sensing Images Based on Machine Vision
809 -- 819KyoungSon Jhang. Voting and Ensemble Schemes Based on CNN Models for Photo-Based Gender Prediction
820 -- 831Wanying Yan, Junjun Guo. Joint Hierarchical Semantic Clipping and Sentence Extraction for Document Summarization
832 -- 844Lang Yu, Gang He, Ahmad Khwaja Mutahir. N-Step Sliding Recursion Formula of Variance and Its Implementation
845 -- 858Maman Abdurohman, Yadi Supriadi, Fitra Zul Fahmi. A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network
859 -- 869Yulei Huang. Fast Incremental Checkpoint Based on Page-Level Rewrite Interval Prediction
870 -- 881Cheng Peng, Qing Chen, Longxin Zhang, Lanjun Wan, Xinpan Yuan. Research on Fault Diagnosis of Wind Power Generator Blade Based on SC-SMOTE and kNN
882 -- 895Jinsu Kang, Yoojae Won. A Study on Variant Malware Detection Techniques Using Static and Dynamic Features
896 -- 914Wei-Che Chien, Shih-Yun Huang, Chin-Feng Lai, Han-Chieh Chao. Resource Management in 5G Mobile Networks: Survey and Challenges
915 -- 934Mansi Agnihotri, Anuradha Chug. A Systematic Literature Survey of Software Metrics, Code Smells and Refactoring Techniques
935 -- 958Yiran Wang, Dae-Kyoo Kim, Dongwon Jeong. A Survey of the Application of Blockchain in Multiple Fields of Financial Services
959 -- 974Jianhua Wang, Haozhan Wang, Fujian Xu, Jun Liu, Lianglun Cheng. A Fast CU Size Decision Optimal Algorithm Based on Neighborhood Prediction for HEVC
975 -- 990Jose Costa Sapalo Sicato, Sushil Kumar Singh, Shailendra Rathore, Jong Hyuk Park. A Comprehensive Analyses of Intrusion Detection System for IoT Environment
991 -- 1000Hee-Hyung Bu, Nam Chul Kim, Byoung-Ju Yun, Sung-Ho Kim. Content-Based Image Retrieval Using Multi-Resolution Multi-Direction Filtering-Based CLBP Texture Features and Color Autocorrelogram Features

Volume 16, Issue 3

523 -- 529Ji Su Park, Jong Hyuk Park. Advances in Algorithms, Security, and Systems for ICT Convergence
530 -- 540Jinhua Wang, Jie Cao. Fault Diagnosis Method Based on High Precision CRPF under Complex Noise Environment
541 -- 556Jeonghoon Seo, Chaeho Cho, Yoojae Won. Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning
557 -- 571Yi Zhang, Haifeng Wang, Xin Fan. Algorithm for Detection of Fire Smoke in a Video Based on Wavelet Energy Slope Fitting
572 -- 587Xinghua Sun, Yongfei Ye, Jie Yang, Li Hao, Lihua Ding, Haomin Song. Research and Implementation of U-Learning System Based on Experience API
588 -- 598Pyung Soo Kim. An Alternative State Estimation Filtering Algorithm for Temporarily Uncertain Continuous Time System
599 -- 611Xinxia Song, Zhigang Chen, Dechao Sun. Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption
612 -- 628Yuanfeng Yang, Lin Li, Zhaobin Liu, Gang Liu. Abnormal Behavior Recognition Based on Spatio-temporal Context
629 -- 638Younghwan Byun, Sechang Oh, Min Choi. ICT Agriculture Support System for Chili Pepper Harvesting
639 -- 647Yuyao He, Yanli Chu, Sanxue Guo. One-Dimensional Search Location Algorithm Based on TDOA
648 -- 662Jian Wei Li, Yi-Chun Chang, Min-Xiong Xu, De-Yao Huang. A Health Management Service with Beacon-Based Identification for Preventive Elderly Care
663 -- 676Guoqing Xu, Ran Wu, Qi Wang. Multi-granular Angle Description for Plant Leaf Classification and Retrieval Based on Quotient Space
677 -- 687Taejun Park, Kwang-il Hwang. Receiver Protection from Electrical Shock in Vehicle Wireless Charging Environments
688 -- 698Jiaxing Wei, Maolin Xu, Hongling Xiu. A Point Clouds Fast Thinning Algorithm Based on Sample Point Spatial Neighborhood
699 -- 717Sandi Rahmadika, Si-Wan Noh, Kyeongmo Lee, Bruno Joachim Kweka, Kyung Hyune Rhee. The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network
718 -- 732Jun Li, Guimin Huang, Ya Zhou. A Sentiment Classification Approach of Sentences Clustering in Webcast Barrages
733 -- 741Joonsuu Park, KeeHyun Park. Construction of a Remote Monitoring System in Smart Dust Environment

Volume 16, Issue 2

239 -- 245Ji Su Park, Jong Hyuk Park. Advanced Technologies in Blockchain, Machine Learning, and Big Data
246 -- 260Hanchul Woo, Suk-Jae Jeong, Jun Ho Huh. Improvement of ITSM IT Service Efficiency in Military Electronic Service
261 -- 276Khamis Abdul-Latif Khamis, Huazhu Song, Xian Zhong. Formal Representation and Query for Digital Contents Data
277 -- 300Supavit Kongwudhikunakorn, Kitsana Waiyamai. Combining Distributed Word Representation and Document Distance for Short Text Document Clustering
301 -- 317Kyoung-Tack Song, Shee-Ihn Kim, Seung Hee Kim. A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System
318 -- 328Zhang Cheng, Nanni Huang. Risk Assessment and Decision-Making of a Listed Enterprise's L/C Settlement Based on Fuzzy Probability and Bayesian Game Theory
329 -- 342Xiaodong Tan. Topic Extraction and Classification Method Based on Comment Sets
343 -- 359Hussein Kanaan, Alireza Behrad. Three-Dimensional Shape Recognition and Classification Using Local Features of Model Views and Sparse Representation of Shape Descriptors
360 -- 376Min Li, Shaobo Deng, Lei Wang. Ensemble of Classifiers Constructed on Class-Oriented Attribute Reduction
377 -- 393Suganya Selvaraj, Hanjun Kim, Eunmi Choi. Offline-to-Online Service and Big Data Analysis for End-to-end Freight Management System
394 -- 405Zidan Sun, Xiaofeng Zhou, Likai Liang, Yang Mo. Electromagnetic Environment of Transmission Line Based on Full Parameter Online Estimation
406 -- 420Liping Zhang, Song Li, Yingying Guo, Xiaohong Hao. A Method for k Nearest Neighbor Query of Line Segment in Obstructed Spaces
421 -- 434Chang Hyun Roh, Im-Yeong Lee. A Study on Electronic Voting System Using Private Blockchain
435 -- 446Xiuguo Zou, Qiaomu Ren, Hongyi Cao, Yan Qian, Shuaitang Zhang. Identification of Tea Diseases Based on Spectral Reflectance and Machine Learning
447 -- 459Samuel Sangkon Lee. Conceptual Extraction of Compound Korean Keywords
460 -- 477Xiao Ma, Zhongbao Zhang, Sen Su. Energy-Aware Virtual Data Center Embedding
478 -- 493Yongli Liu, Renjie Li. PSA: A Photon Search Algorithm
494 -- 507Vilakone Phonexay, Khamphaphone Xinchang, Doo-Soon Park. Movie Recommendation System Based on Users' Personal Information and Movies Rated Using the Method of k-Clique and Normalized Discounted Cumulative Gain
508 -- 521Yatao Zhang, Zhenguo Ma, Wentao Dong. Nonlinear Quality Indices Based on a Novel Lempel-Ziv Complexity for Assessing Quality of Multi-Lead ECGs Collected in Real Time

Volume 16, Issue 1

1 -- 5Young-Sik Jeong, Jong Hyuk Park. Security, Privacy, and Efficiency of Sustainable Computing for Future Smart Cities
6 -- 29Sayan Maity, Mohamed Abdel-Mottaleb, Shihab S. Asfour. Multimodal Biometrics Recognition from Facial Video with Missing Modalities Using Deep Learning
30 -- 41Kaiqun Hu, Xin Feng. An Improvement Algorithm for the Image Compression Imaging
42 -- 48Kwangmin Koo, Wooyeob Lee, Sungryung Cho, Inwhee Joe. A Secure Operating System Architecture Based on Linux against Communication Offense with Root Exploit for Unmanned Aerial Vehicles
49 -- 60Zhonghua Wang, Xiaoming Huang, Faliang Huang. A New Image Enhancement Algorithm Based on Bidirectional Diffusion
61 -- 82Jun-Young Park, Eui-nam Huh. A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement
83 -- 95Liming Zhou, Yingzi Shan. Privacy-Preserving, Energy-Saving Data Aggregation Scheme in Wireless Sensor Networks
96 -- 112Lihao Ni, Yanshen Liu, Yi Liu. Privacy Protection Model for Location-Based Services
113 -- 119Taehoon Kim, Donggeun Kim, SangJoon Lee. Cell Counting Algorithm Using Radius Variation, Watershed and Distance Transform
120 -- 131Maolin Xu, Jiaxing Wei, Hongling Xiu. Research on the Basic Rodrigues Rotation in the Conversion of Point Clouds Coordinate System
132 -- 144Mohamed Hanine, El Habib Benlahmar. A Load-Balancing Approach Using an Improved Simulated Annealing Algorithm
145 -- 154Yongjian Zhao, Bin Jiang. Adaptive Signal Separation with Maximum Likelihood
155 -- 170Xinmei Wu, Fang-li Guan, Aijun Xu. Passive Ranging Based on Planar Homography in a Monocular Vision System
171 -- 183Ye-seul Park, Jung-Won Lee. Class-Labeling Method for Designing a Deep Neural Network of Capsule Endoscopic Images Using a Lesion-Focused Knowledge Model
184 -- 200Kai Wang, Shu Yang. Computing Semantic Similarity between ECG-Information Concepts Based on an Entropy-Weighted Concept Lattice
201 -- 209Jinhyun Ahn, Dong-Hyuk Im. Combining Local and Global Features to Reduce 2-Hop Label Size of Directed Acyclic Graphs
210 -- 223Yanjiao Wang, Huanhuan Tao, Zhuang Ma. Symbiotic Organisms Search for Constrained Optimization Problems
224 -- 237Unsoo Jang, Kun Ha Suh, Eui Chul Lee. Low-Quality Banknote Serial Number Recognition Based on Deep Neural Network