Journal: J. Web Eng.

Volume 20, Issue 8

0 -- 0Chang-bae Moon, Jong-Yeol Lee, Byeong Man Kim. How to Retrieve Music using Mood Tags in a Folksonomy
0 -- 0Shijie Qiu, Yan Niu, Jun Li, Xing Li. Research on Semantic Similarity of Short Text Based on Bert and Time Warping Distance
0 -- 0Abdullah Talha Kabakus. Towards the Importance of the Type of Deep Neural Network and Employment of Pre-trained Word Vectors for Toxicity Detection: An Experimental Study
0 -- 0Usha Yadav, Neelam Duhan. Efficient Retrieval of Data Using Semantic Search Engine Based on NLP and RDF
0 -- 0Xinping Huang. Research on the Methods and Key Techniques of Web Archive Oriented Social Media Information Collection
0 -- 0Sohee Son, Jeongin Kwon, Hui-Yong Kim, Haechul Choi. Tiny Drone Tracking Framework Using Multiple Trackers and Kalman-based Predictor
0 -- 0Mei Zhang, Huihui Su, JingHua Wen. Analysis and Mining of Internet Public Opinion Based on LDA Subject Classification
0 -- 0Xing Wu, Zhenfeng Gao, Yushun Fan, Xiu Li, Liang Gu, Jia Zhang, Chang Chen, Hao Zhang, Qiang Wang. T-DSES: A Blockchain-powered Trusted Decentralized Service Eco-System
0 -- 0Wanus Srimaharaj, Roungsan Chaisricharoen. A Novel Processing Model for P300 Brainwaves Detection
0 -- 0Minseop Kim, Haechul Choi. Enhanced Real-Time Intermediate Flow Estimation for Video Frame Interpolation
0 -- 0Sakshi Chhabra, Ashutosh Kumar Singh. Dynamic Resource Allocation Method for Load Balance Scheduling Over Cloud Data Center Networks
0 -- 0Sujie Shao, Jiajia Tang, Shuang Wu, Jianong Li, Shaoyong Guo, Feng Qi 0004. Delay and Energy Consumption Optimization Oriented Multi-service Cloud Edge Collaborative Computing Mechanism in IoT
0 -- 0Oriana Tio Parahita Nainggolan, Ayu Niza Machfazia, Fortunata Tyasrinestu, Djohan, Phakkharawat Sittiprapaporn. Sibelius as a Tool to Improve Student's Ability of Making Counterpoint Melody
0 -- 0Wangwang Yu, Jun Liu, Jie Zhou. A Novel Automated Guided Vehicle (AGV) Remote Path Planning Based on RLACA Algorithm in 5G Environment
0 -- 0Hao Wu, Xi Zhang, Jufeng Yang. Deep Learning-Based Encrypted Network Traffic Classification and Resource Allocation in SDN

Volume 20, Issue 7

0 -- 0Andreas M. Klein, Maria Rauschenberger, Jörg Thomaschewski, María José Escalona Cuaresma. Comparing Voice Assistant Risks and Potential with Technology-Based Users: A Study from Germany and Spain
0 -- 0Ayman Meidan, Julián Alberto García-García, Isabel Ramos 0002, David Lizcano Casas, María José Escalona. An MDA Proposal To Integrate the Measurement Lifecycle Into the Process Lifecycle
0 -- 0Sonika Malik, Sarika Jain 0001. F-ONTOCOM: A Fuzzified Cost Estimation Approach for Ontology Engineering
0 -- 0Amit Gupta, Rajesh Bhatia. Knowledge Based Deep Inception Model for Web Page Classification
0 -- 0Nicolás Sánchez-Gómez, Jesús Torres Valderrama, Manuel Mejías Risoto, Alejandra Garrido. Blockchain Smart Contract Meta-modeling
0 -- 0Oscar Pedreira, Delfina Ramos-Vidal, Alejandro Cortiñas, Miguel Rodríguez Luaces, Ángeles Saavedra Places. Development of Digital Libraries with Software Product Line Engineering
1 -- 4Miguel Angel Olivero, José Gonzalez Enríquez, Andres Jimenez Ramirez. Special Issue on Advanced Practices in Web Engineering 2021

Volume 20, Issue 6

0 -- 0Ji Duo, Peng Zhang, Liu Hao. A K-means Text Clustering Algorithm Based on Subject Feature Vector
0 -- 0Yi Wang, Ying Wang. A Survey of Ontologies and Their Applications in e-Learning Environments
0 -- 0Mingyi Huang, Chengyu Song. ARMPatch: A Binary Patching Framework for ARM-based IoT Devices
0 -- 0Imjae Hwang, Juwon Yun, Woo-Nam Chung, Jaeshin Lee, Cheong-Ghil Kim, Youngsik Kim, Woo-Chan Park. Lossless Compression Algorithm and Architecture for Reduced Memory Bandwidth Requirement with Improved Prediction Based on the Multiple DPCM Golomb-Rice Algorithm
0 -- 0Yongxiang Hu. A Study on Hybrid Hierarchical Network Representation Learning
0 -- 0P. M. Rekha, Nagamani H. Shahapure, Punitha M., P. R. Sudha. Water Moth Search Algorithm-based Deep Training for Intrusion Detection in IoT
0 -- 0Bowen Chen, Li Zhu, Da Wang, JunHua Cheng. Research on the Design of Mass Recommendation System Based on Lambda Architecture
0 -- 0Weimin Gao, Jiaming Zhong, Yuan Xiao. Research on Mining and Application of Group Events Based on Network Public Opinion Big Data
0 -- 0Sobhan Mohammadnia, Rasool Esmaeilyfard, Reza Akbari. An Efficient Method for Automatic Antipatterns Detection of REST Web Services
0 -- 0Ozgur Koray Sahingoz, Ugur Cekmez, Ali Buldu. Internet of Things (IoTs) Security: Intrusion Detection using Deep Learning
0 -- 0Wanhua Cao, Yi Zhang, Juntao Liu, Ziyun Rao. A Novel Negative Sampling Based on Frequency of Relational Association Entities for Knowledge Graph Embedding
0 -- 0Yuan Zheng, Xiangbin Wen. The Application of Artificial Intelligence Technology in Cloud Computing Environment Resources
0 -- 0Merve Kanmaz, Muhammed Ali Aydin, Ahmet Sertbas. A New Geometric Data Perturbation Method for Data Anonymization Based on Random Number Generators

Volume 20, Issue 5

0 -- 0Guoji Yu, Zhong Jianxu, Shaofeng Yu, Liao Chongyang, Yining Ma. The Collaborative Production Management System of Power Enterprises Based on Online Information Sharing
0 -- 0Liu Hui, Xudong He, Gao Fan, Kailun Wang, Yuan Enze. Web Service Access Control Based on Browser Fingerprint Detection
0 -- 0Hong Zhao, Lupeng Yue, Weijie Wang, Xiangyan Zeng. Research on End-to-end Voiceprint Recognition Model Based on Convolutional Neural Network
0 -- 0Yue Wang, Yiming Jiang, Julong Lan. Intrusion Detection Using Few-shot Learning Based on Triplet Graph Convolutional Network
0 -- 0Xin Su, Xiaohui Li. Elastic Performance Test Method of Web Server in Cloud Computing Environment
0 -- 0Xie Changgui, Xu Hao, Liu Yuxi, Chen Ping. Hot-Rolled, Heavy-Rail Image Recognition Based on Deep-Learning Network
0 -- 0Yogesh M. Gajmal, R. Udayakumar. Blockchain-Based Access Control and Data Sharing Mechanism in Cloud Decentralized Storage System
0 -- 0Yuxiang Cai. Research on data fusion method of multi-source complex system
1229 -- 1246Vinay Raj, Sadam Ravichandra. Patterns for Migration of SOA Based Applications to Microservices Architecture
1247 -- 1278Amina Meherehera, Imane Mekideche, Leila Zemmouchi-Ghomari, Abdessamed Réda Ghomari. Transformation Approach of Open Web Data to Linked Open Data
1279 -- 1296Arpad Gellert. Web Usage Mining by Neural Hybrid Prediction with Markov Chain Components
1327 -- 1366Neha Jain, Ashish Payal, Aarti Jain. Performance Analysis of Routing Protocols On IPv4 and IPv6 Addressing Networks
1367 -- 1396Laksamon Archawaporn, Adisorn Leelasantitham. Managing Factors to Stages of the Online Customer Journey Influence on Brand Trust
1397 -- 1424Kanawut Chattrairat, Waranyu Wongseree, Adisorn Leelasantitham. Comparisons of Machine Learning Methods of Statistical Downscaling Method: Case Studies of Daily Climate Anomalies in Thailand
1425 -- 1464Unhawa Ninrutsirikun, Debajyoti Pal, Chonlameth Arpnikanondt, Bunthit Watanapa. Unified Model for Learning Style Recommendation

Volume 20, Issue 4

933 -- 970Claus Hoffmann, Pascal Linden, Maria-Esther Vidal. Creating and Capturing Artificial Emotions in Autonomous Robots and Software Agents
935 -- 962Hélder Gomes, André Zúquete, Gonçalo Paiva Dias, Fábio Marques. Secure Browsing in Local Government: The Case of Portugal
963 -- 992Saeedeh Sajjadi-Ghaem-Maghami, James Miller. A New Semantic Approach to Improve Webpage Segmentation
971 -- 1002Xavier Chamberland-Thibeault, Sylvain Hallé. An An Empirical Study of Web Page Structural Properties
1003 -- 1026Harm Delva, Julián Andrés Rojas, Pieter Colpaert, Ruben Verborgh. Geospatially Partitioning Public Transit Networks for Open Data Publishing
1027 -- 1052Feng Chen, Deyun Chen, Lili Wang, Botao Yang. Optimal Design of Electrical Capacitance Tomography Sensor and Improved ART Image Reconstruction Algorithm Based On the Internet of Things
1053 -- 1076Wei Du, Haiyan Zhu, Teeraporn Saeheaw. Application of the LDA Model to Semantic Annotation of Web-based English Educational Resources
1075 -- 1092Wenli Liu, Cuiping Shi, Hengjun Zhu, Hongbo Yu. Wireless Sensor Network Node Localization Algorithm Based on PSO-MA
1093 -- 1114Xiaoying Fan. Photographic Image Intelligent Fuzzy Assistant Teaching System Based on Augmented Reality and Web
1115 -- 1130Xiaoming Song, Daihan Xu, Guodong Li, Wenxia Xu. Multi-image Reorganization Encryption Based on S-L-F Cascade Chaos and Bit Scrambling
1131 -- 1144Hongjian Guo. Research on Web Data Mining Based on Topic Crawler
1145 -- 1156Lijun Bian. Integration of "Offline + Online" Teaching Method of College English Based on Web Search Technology
1157 -- 1176Ye-nan Yin, Yijie Bian. Named Entity Recognition with Gating Mechanism and Parallel BiLSTM
1177 -- 1188D. Lefloch, J. M. Wang. A Deep Convolutional Neural Network to Limit Virus Spread Using Facial Mask Segmentation
1189 -- 1228Wenyan Zhang, Ling Xu, Meng Yan, Ziliang Wang, Chunlei Fu. A Probability Distribution and Location-aware ResNet Approach for QoS Prediction

Volume 20, Issue 3

575 -- 596Liyong Chen, Xiuye Yin. Recognition Method of Abnormal Behavior of Marine Fish Swarm Based on In-Depth Learning Network Model
597 -- 614Zhixiao Wang, Wenyao Yan, Ang Gao. Fine-Grained User Location Prediction using Meta-Path Context with Attention Mechanism
615 -- 640Peng Xiong, Qinggang Su. An Algorithm with Efficiently Collecting and Aggregating Data for Wireless Sensor Networks
641 -- 668Dong Wang, Kehong Wang, Lemei Yan, Zeyu Yue, Jiewen Zhang. Information Credibility Evaluation in Presence of Users' Safety in New Retailing
669 -- 688Ming Hao, Weijing Wang, Fang Zhou. Joint Representations of Texts and Labels with Compositional Loss for Short Text Classification
689 -- 712Bin Lin. Research on Data Release and Location Monitoring Technology of Sensor Network Based on Internet of Things
713 -- 742Peng Xiong, Qinggang Su. Key Distribution Strategy of Wireless Sensor Network Based on Multi-Hash Chain
743 -- 758Chen Chen, Kaiwen Luo, Lan Min, Shenglin Li. Research on Outlier Detection for High-Dimensional Data Based on PPCLOF
759 -- 774Meiyan Xu, Junfeng Yao, Yifeng Zheng, Yaojin Lin. Multi-Rhythm Capsule Network Recognition Structure for Motor Imagery Classification
775 -- 794Min-Hao Wu, Ting Cheng Chang, Yi Li-Min. Digital Forensics Security Analysis on iOS Devices
795 -- 816Kyung Won Kim, Kyoungro Yoon. News Article Based Industry Risk Index Prediction for Industry-Specific Evaluation
817 -- 852Deepali Bajaj, Urmil Bharti, Anita Goel, Suresh Chand Gupta. A Prescriptive Model for Migration to Microservices Based on SDLC Artifacts
853 -- 878S. Mathulaprangsan, S. Patarapuwadol, K. Lanthong, D. Jetpipattanapong, S. Sateanpattanakul. Rice Disease Recognition Using Effective Deep Neural Networks
879 -- 902Kapil Madan, Rajesh Bhatia. Crawling the Deep Web Using Asynchronous Advantage Actor Critic Technique
903 -- 934Veeraraghavan Jagannathan. Bayesian Probability and Tanimoto Based Recurrent Neural Network for Question Answering System

Volume 20, Issue 2

217 -- 252Nisha Pahal, Brejesh Lall, Santanu Chaudhury. An Ontology Representation Language for Multimedia Event Applications
253 -- 280Hanxin Chen, Yuzhuo Miao, Yongting Chen, Lu Fang, Li Zeng, Jun Shi. Intelligent Model-based Integrity Assessment of Nonstationary Mechanical System
281 -- 302Jiaxing Zhang, Shuaishuai Feng. Machine Learning Modeling: A New Way to do Quantitative Research in Social Sciences in the Era of AI
303 -- 326Selma Benkessirat, Boustia Narhimene, Rezoug Nachida. A New Collaborative Filtering Approach Based on Game Theory for Recommendation Systems
327 -- 358Nahid Dara, Sima Emadi. Enriching Web Services Tags to Improve Data-Driven Web Services Composition
359 -- 386Yongxiu He, Wei Xiong, Binyou Yang, Rui Zhang, Ming-li Cui, TianTian Feng, Yi-er Sun. Distributed Energy Transaction Model Based on the Alliance Blockchain in Case of China
387 -- 412Fuhua Shang, Qiuyu Ding, Ruishan Du, Maojun Cao, Huanyu Chen. Construction and Application of the User Behavior Knowledge Graph in Software Platforms
413 -- 430Jinyu Lei, Xiumin Chu, Wei He. Trajectory Data Restoring: A Way of Visual Analysis of Vessel Identity Base on OPTICS
431 -- 458Qiang He, Zheng Xiang, Peng Ren. A General Framework of LSTM and Transfer Learning Based CFDAMA Strategy in Broadband Satellite System
459 -- 470Shuaishuai Feng, Junyan Meng, Jiaxing Zhang. News Recommendation Systems in the Era of Information Overload
471 -- 490Su-qin Xu, Hao Jiang, Tingting Li, Li-ming Yuan, Lu Yu, Jie Chen, Biao Chen, Bao-qiang Zhang. A High Autonomous Sea Front Detection Algorithm Based on SAR Data
491 -- 512Zhiqiang Xu. Application Research of Tethered UAV Platform in Marine Emergency Communication Network
513 -- 532Jianhu Gong. Design and Analysis of Low Delay Deterministic Network Based on Data Mining Association Analysis
533 -- 556Guofeng Qin, Jianhuang Zou, Qiufang Xia, Jiahao Qin. Dynamic Recognition and Tracking of Barium Flow Field Based on Deglutition Video
557 -- 574Xu Han, Jingming Liu, Baohua Tan, Lucheng Duan. Design and Implementation of Smart Ocean Visualization System Based on Extended Reality Technology

Volume 20, Issue 1

1 -- 32Kyu-Seok Shim, Il Kwon Sohn, Eunjoo Lee, Woojin Seok, Wonhyuk Lee. Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis
33 -- 52M. Subramaniam, Ayyaswamy Kathirvel, E. Sabitha, H. Anwar Basha. Modified Firefly Algorithm and Fuzzy C-Mean Clustering Based Semantic Information Retrieval
53 -- 88Ayyaswamy Kathirvel, M. Subramaniam, S. Navaneethan, C. Sabarinath. Improved IDR Response System for Sensor Network
89 -- 102Jinkook Kim, Soohyun Kim. Data Analysis for Thermal Disease Wearable Devices
103 -- 112Sunyoung Kang. Development of Converged Device-Based Exercise Program for Preventing Fall and Increasing Physical Activity for the Elderly
113 -- 128Manisha Mudgal, Deepika Punj, Anuradha Pillai. Theoretical and Empirical Analysis of Crime Data
129 -- 146Manisha Mudgal, Deepika Punj, Anuradha Pillai. Suspicious Action Detection in Intelligent Surveillance System Using Action Attribute Modelling
147 -- 170Fengsui Wang, Jingang Chen, Furong Liu. Keyframe Generation Method via Improved Clustering and Silhouette Coefficient for Video Summarization
171 -- 190Cho Do Xuan. Detecting APT Attacks Based on Network Traffic Using Machine Learning
191 -- 216Hongqiang Li, Dongyan Zhao 0002, Xiaoke Tang, Jie Gan, Xu Zhao, Yubing Zhang. Chirp Spreading Spectrum in Imperfect Environment and Wireless Tree Topology Network