Journal: J. Inf. Sci. Eng.

Volume 38, Issue 6

1089 -- 1108YungYu Zhuang, Jui-Hsiang Kao, Kuan-Shang Liu, Chia-Yu Lin. Using User-Defined Domain-Specific Visual Languages to Modularize Programs for Conducting Experiments
1109 -- 1131Hsi-Min Chen, Bao An Nguyen, Chyi-Ren Dow, Nien-Lin Hsueh, An-Chi Liu. Exploring Time-Related Micro-Behavioral Patterns in a Python Programming Online Course
1133 -- 1147Wen-Tin Lee, Meng-Hsien Wu, Zhun-Wei Liu, Shin-Jie Lee. A Microservices Orchestration Library based on PHP and RESTful API
1149 -- 1169Chien-Hung Liu, Shu-Ling Chen. An Operation-Injection Approach to Detect Runtime Permission Crashes of Android Apps
1171 -- 1188YungYu Zhuang, Yao-Nang Tseng. A Novel Detection Method for the Security Vulnerability of Time-of-Check to Time-of-Use
1189 -- 1211Po-Wen Chi, Yu Zheng, Wei-Yang Chang, Ming-Hung Wang. SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks
1213 -- 1241Frank S. C. Tseng, Annie Y. H. Chou. Spatiotemporal Data Warehousing for Event Tracking Applications
1243 -- 1263Riley Byrd, Kulin Damani, Hongjia Che, Anthony Calandra, Dae-Kyoo Kim. A Systematic Literature Review of Volumetric 3D Model Reconstruction Methodologies Using Generative Adversarial Networks
1265 -- 1283Ting-Yu Lin, Ching-Yuan Wang, Ya-Pei Tuan, Meng-Hsun Tsai, Yean-Ru Chen. A Study on Traffic Asymmetry for Detecting DDoS Attack in P4-based SDN
1285 -- 1303Shang-Pin Ma, Chia-Yu Li, Wen-Tin Lee, Shin-Jie Lee. Microservice Migration Using Strangler Fig Pattern and Domain-Driven Design
1305 -- 1315Wen-Tin Lee, Chuan-Chun Huang. Deformable Convolutional Neuron Network Model for Detecting Tables and Columns from Document Images
1317 -- 1334Yi-Ting Huang, Ting-Yi Chen, Shun-Wen Hsiao, Yeali S. Sun. Learning Dynamic Malware Representation from Common Behavior
1335 -- 1355Ravi Shankar 0003, Manoj Kumar Beuria, Gopal Ramchandra Kulkarni, Abu Sarwar Zamani, Patteti Krishna, V. Gokula Krishnan. Examination of the DL Based Ubiquitous Multiple Input Multiple Output U/L NOMA System Considering Robust Fading Channel Conditions for Military Communication Scenario

Volume 38, Issue 5

895 -- 907Annu Priya, Sudip Kumar Sahana. An Optimized Modelling and Simulation on Task Scheduling for Multi-Processor System using Hybridized ACO-CVOA
909 -- 921Ing Ming Chew, Wei Kitt Wong, Jobrun Nandong. Optimization Analysis of Nonlinear Process Using Genetic Algorithm
923 -- 935Ihsan Kaya, Gürkan Isik, Ali Karasan, Fatma Kutlu Gündogdu, Hayri Baraçli. Evaluation of Potential Locations for Hydropower Plants by Using a Fuzzy Based Methodology Consists of Two-Dimensional Uncertain Linguistic Variables
937 -- 949I Ketut Agung Enriko, Ali Zaenal Abidin, Azizah Syifalianti Noor. LoRaWAN Implementation for Smart Electric Meter in Rural Area
951 -- 962I Ketut Agung Enriko, Fariz Alemuda, Daniel Adrianto. An Approach to Monitor Vaccine Quality During Distribution Using Internet of Things
963 -- 975Jonathan Then Sien Phang, King Hann Lim, Po Ken Pang. Skeletal Joint-based Regressive 3D Human Reconstruction from Partial Point Clouds
977 -- 1000Agung Tri Arta Hariyanto, Kuochen Wang, Wei-Chung Tsai, Chi-Tsung Chen. Improving ECG SVEB Detection using EMD with Resampling based on LSTM
1001 -- 1020Mohammed Dwaikat, Mohammed Awad. Hybrid Model for Coronary Artery Disease Classification Based on Neural Networks and Evolutionary Algorithms
1021 -- 1034Dayana David. Ambience Retaining Enhancement Algorithm for Uneven Illumination Images using Nonlinear Pixel Level Intensity Transfer Function (AREA)
1035 -- 1050G. H. J. Lanel, T. M. K. K. Jinasena, B. A. K. Welihinda. Semidirect Products of Finite Groups in Public-Key Cryptographic Protocols
1051 -- 1063Jun-Rui Wang, Xing Xie 0001, Yu-Chi Chen. A Generic Construction of Designated Verifier Signature from Standard Cryptographic Algorithms
1065 -- 1085Hsing-Yu Chen, Yu-Chun Lin, Duen-Ren Liu, Tzeng-Feng Liu. Online Product Recommendations based on Diversity and Latent Association Analysis on News and Products

Volume 38, Issue 4

697 -- 708Yan-Jing Wu, Tsang-Ling Sheu, Pei-Hsun Chan. Dynamic Slot Allocation in Restricted Access Window for IEEE 802.11ah Networks
715 -- 733Huma Hayat Khan, Muhammad Noman Malik, Youseef Alotaibi. Trust Issues in Crowdsourced Software Engineering: An Empirical Study
735 -- 748Chun-Liang Jhong, Hsin-Lung Wu. Efficient Provably Algorithms for Boundary Bin-Pair Selection Problem
749 -- 759Chi-Shiang Wang, Fang-Yi Su, Jung-Hsien Chiang. MedCheX: An Efficient COVID-19 Detection Model for Clinical Usage
761 -- 774Mohammad Amin Adibi. DCGAEL: An Optimized Ensemble Learning using a Discrete-Continuous Bi-level Genetic Algorithm
775 -- 790Jr-Chang Chen, Shih-Chieh Tang, I-Chen Wu. Monte-Carlo Simulation for Mahjong
791 -- 803Houda Benhar, Mohamed Hosni, Ali Idri. Univariate and Multivariate Filter Feature Selection for Heart Disease Classification
805 -- 819Xiaonian Wu, Ying-Xin Li, Lingchen Li, Yongzhuang Wei, Runlian Zhang. Impossible Differential Cryptanalysis of BORON
821 -- 832Hanumantha Rao Bitra, Palanisamy Ponnusamy. Analytic Form of Expression for a Capacity in an Adaptive Spatial Modulation Systems
833 -- 857Hsiu-Chunj Pan, Hsun Su, Shin-Shin Kao. On the 2-Vertex-Fault Hamiltonicity for Graphs Satisfying Ore's Theorem
859 -- 875Ravi Shankar 0003, Ayaz Ahmad, Saminathan Veerappan, Manoj Kumar Beuria, Patteti Krishna, Sudhansu Sekhar Singh, V. Gokula Krishnan. Examination of User Pairing NOMA System Considering the DQN Scheme over Time-Varying Fading Channel Conditions
877 -- 892Summiya A. Pathan, C. Noorullah Shariff, Yogesh Kumar Sharma. Towards the Rear Attuned Defense Scheme Embark Upon Selfish Mining
1211 -- 1229Po-Chun Kuo, Yu-Wei Chen, Yuan-Che Hsu, Chen-Mou Cheng, Wen-Ding Li, Bo-Yin Yang. High Performance Post-Quantum Key Exchange on FPGAs

Volume 38, Issue 3

499 -- 515Wen-Hsing Lai, Siou-Lin Wang. Monaural Instrument Sound Segregation by Stacked Recurrent Neural Network
517 -- 529Pablo López Diéguez, Von-Wun Soo. VAE+NN: Interpolation Composition by Direct Estimation of Encoded Vectors Against Linear Sampling of Latent Space
531 -- 546Kuei-Chien Chiu, Chih-Sung Lai, Hsing-Hui Chu, DucHanh Tran Thi, Rung Ching Chen. Exploring the Effect of Social Networking Service on Homestay Intention in Vietnam by GM(1, N) and Multiple Regression Analysis
547 -- 570Li-Pin Xiao, Po-Ruey Lei, Wen-Chih Peng. Hybrid Embedding of Multi-Behavior Network and Product-Content Knowledge Graph for Tourism Product Recommendation
571 -- 589Junjie Shan, Yoko Nishihara, Akira Maeda, Ryosuke Yamanishi. Question Generation for Reading Comprehension Test Complying with Types of Question
591 -- 603Masahiro Shioda, Takeshi Ito. Improving Mini-Shogi Engine Using Self-play and Possibility of White's Advantage
605 -- 618Yihong Han, Ryosuke Yamanishi, Yoko Nishihara. Lyrics Retrieval for Tourist Attractions Based on Shared Word-embedding Vectors
619 -- 644Fatma Zohra Lebib, Hakima Mellah, Abdelkrim Meziane. A Multi-Dimensional Source Selection Based on Topic Modelling
645 -- 663Zhan Guo, Okan K. Ersoy, Xuefeng Yan. L∞ Metric based Multi-Objective Differential Evolution Algorithm and its Industrial Application
665 -- 680Cheng-Zen Yang, Kun-Yu Chen, Anh-Hien Dao. Bug Severity Assessment Based on Weighted Multi-Facet Features with Particle Swarm Optimization
681 -- 695Krit Sriporn, Cheng-Fa Tsai, Paohsi Wang. Analyzing Tourist Behavior in Virtual Museums Using Intelligent Approach with Feature Selection
697 -- 711Si-Yu Chen, Ning Wang. Discovering Entity Columns of Web Tables Effectively and Efficiently

Volume 38, Issue 2

275 -- 294Chorng-Shiuh Koong, Zih-Yu Wei, Chun-Hsien Chen, Cheng-Yan Guo. Online Judgment System for Assessing C Program Structure
295 -- 316Gregorius Airlangga, Alan Liu. Investigating Software Domain Impact in Requirements Quality Attributes Prediction
317 -- 341Chien-Hung Liu, Wen-Yew Liang, Ming-Yi Tsai, Wei-Che Chang, Woei-kae Chen. A Novel Approach to Automate IoT Testing of Gateways and Devices
343 -- 355Vishal Pradhan, Joydip Dhar, Ajay Kumar 0002. Testing-Effort based NHPP Software Reliability Growth Model with Change-point Approach
357 -- 374Jutarporn Intasara, Chu-Ti Lin. Evaluating the Influence on Fault Localization Caused by Test Suite Reduction in Continuous Integration Process
375 -- 395Bao An Nguyen, Hsi-Min Chen, Chyi-Ren Dow, Yan-Ting Chen, Hoang-Thanh Duong. Identification and Validation of Web Themes: A DOM-Structure Matching Approach
397 -- 412Tomson Devis, Manju Manuel. Design and Implementation of a Smart Cost-effective Hearing Aid using Fractional Interpolated Filters
413 -- 427Dieu Vu, Khang Truong, Khanh Nguyen, Ngo Van Linh, Khoat Than. Revisiting Supervised Word Embeddings
429 -- 444Wang Gao, Hongtao Deng, Xun Zhu, Yuwei Wang. TRGM: Generating Informative Responses for Open Domain Dialogue Systems
445 -- 461Minh Tuan Nguyen, Jin-Huang Huang. Location Estimation of Receivers in an Audio Room using Deep Learning with a Convolution Neural Network
463 -- 477Ye-In Chang, Stephen Shei-Dei Yang, Yao-Chi Chuang, Jun-Hong Shen, Chi-Chih Lin, Chia-En Li. Automatic Classification of Uroflow Patterns via the Grading-based Approach
479 -- 496Khaled Jouini. Aggregates Selection in Replicated Document-Oriented Databases

Volume 38, Issue 1

1 -- 16Kun Niu, Changgen Peng, Youliang Tian, Weijie Tan. K -implicit Tracking Data Publishing Scheme against Geo-matching Attacks
17 -- 39Qinghua Zhu 0001, Jiajie Huang, Yan Hou. Multi-objective Scheduling of Cloud Data Centers Prone to Failures
41 -- 56Priyanka Kumari, Sudip Kumar Sahana. PSO-DQ: An Improved Routing Protocol Based on PSO using Dynamic Queue Mechanism for MANETs
57 -- 82Kang Xiang, Youliang Tian, Sheng Gao, Changgen Peng, Weijie Tan. Game-based Theory Rational Delegation Learning Scheme
83 -- 100Samir Berrani, Ali Yachir, Saïd Mahmoudi, Badis Djamaa, Mohamed Aissani. Towards a New Semantic Model for Service-Based IoT Applications
101 -- 120Pankaj Kumar Mishra, Shashi Kant Verma. ABCRF: Atomic Bond Connectivity Based Range Optimized Fuzzy Clustering Algorithm for WSN
121 -- 138Liang Zhu, Liping Yu, Zengyu Cai, Xiaowei Liu, Jianwei Zhang. K -Anonymous Based Anti-Positioning Security Strategy in Mobile Networks
139 -- 164Zhao Li, Yuyu Hu, Zhendong Hu, Jingling Li, Shitong Zhu, Yang Xu. Incremental-Compensation based Low-Cost Offline Robust Topology Control for Micro/Nano Satellite Network
165 -- 183Jiuren Qin, Kai Gao, Lujie Zhong, Shujie Yang. Q-Learning based and Energy-Aware Multipath Congestion Control in Mobile Wireless Network
185 -- 205Hsiu-Chuan Huang, Zhi-Kai Zhang, Chung-Kuan Chen, Wei-da Hong, Jui-Chien Jao, Shiuhpyng Shieh. Adaptive Entry Point Discovery for Web Vulnerability Scanning
207 -- 221Rashmeet Toor, Inderveer Chana. DIDACE: Literature Mining and Exploration of Disease-Diet Associations
223 -- 251Fan Guo, Jun-Feng Qiu, Jin Tang, Weiqing Li. Traffic Image Dehazing Using Sky Segmentation and Color Space Conversion
253 -- 271Hao-Chiang Shao, Lu-Hung Hsu, Yung-Chang Chen, Ying-Chu Huang, Shih-Ting Huang. Drosophila Brain Aligner: Registering 3D Point Clouds in 2D Parameterization Domain