


default search action
Journal of Information Science and Engineering, Volume 34
Volume 34, Number 1, January 2018
- Balgeun Yoo, Seongjin Lee, Youjip Won:

Analyzing the Storage Defects From the Perspective of Synthetic Fault Injection. 1-20
- Chung-Chih Tsai, Chia-Wen Chang, Chin-Wang Tao:

Vision-Based Obstacle Detection for Mobile Robot in Outdoor Environment. 21-34 - Milad Riyahi, Marjan Kuchaki Rafsanjani, Rouzbeh Motevalli, Ahmad Hashemi:

A New Genetic Algorithm to Optimize Mobile Data Offloading in Smart Grids. 35-49 - Pei-Yin Chen, Shih-Hsiang Lin, Po-Chun Chen:

Hardware Implementation of an Image Interpolation Method with Controllable Sharpness. 51-64 - Maryam Azari Takami, Reza Sheikh, Shib Sankar Sana:

A Hesitant Fuzzy Set Theory Based Approach for Project Portfolio Selection with Interactions under Uncertainty. 65-79 - Shu-Chien Huang:

High-Quality Codebook Generation of Vector Quantization Using the HT-ABC-LBG Algorithm. 81-102 - Cheng-Hsuan Li, Pei-Jyun Hsien, Li-Hui Lin:

A Fast and Automatic Kernel-based Classification Scheme: GDA+SVM or KNWFE+SVM. 103-121
- Shin-Yan Chiou, Jiun-Ming Chen:

Design and Implementation of a Multiple-Choice E-voting Scheme on Mobile System using Novel t -out-of- n Oblivious Signature. 135-154 - Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:

Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks. 155-170 - Bao-Yuan Kang, Mu Wang, Dong-Ya Jing:

An Off-Line Payment Scheme for Digital Content via Subliminal Channel. 171-192 - Shi-Chun Tsai, Ming-Chuan Yang:

Representing Symmetric Boolean Functions with Polynomial over Composite Moduli. 193-203
- Shu-Ching Wang, Shun-Sheng Wang, Kuo-Qin Yan:

Reaching Optimal Interactive Consistency in a Fallible Cloud Computing Environment. 205-223 - Saad Allawi Nsaif, Nguyen Xuan Tien, Jong Myung Rhee:

A Novel Algorithm for Loop Prevention and Fast Recovery (LPFR) in Ethernet Rings. 225-242
- Jaejun Yoo, Ki-Hoon Lee, Young-Ho Jeon:

Migration from RDBMS to NoSQL Using Column-level Denormalization and Atomic Aggregates. 243-259 - Depeng Dang, Xue Jiang, Nan Wang, Yingting Yao, Wen-Bin Yao:

Concurrency Control of Real-Time Web Service Transactions. 261-287 - Chien-Liang Liu, Wen-Hoar Hsaio, Tao-Hsing Chang:

Locality Sensitive K-means Clustering. 289-305
Volume 34, Number 2, March
- Saehwa Kim:

Efficient Optimal Priority Assignment for Fixed Priority Preemption Threshold Scheduling. 319-335 - Cheng-Juei Yu, Yi-Hsin Wu, Sheng-De Wang:

An Approach to the Design of Specific Hardware Circuits from C Programs. 337-351
- Divya Kumar, K. K. Mishra:

Multi-Objective Optimization using Co-variance Guided Artificial Bee Colony. 353-369
- Chien-Ming Chen, Weicheng Fang, Shuai Liu, Tsu-Yang Wu, Jeng-Shyang Pan, King-Hang Wang:

Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol. 371-390 - Jen-Chun Chang, Hsin-Lung Wu:

The Log-Rank Conjecture for Read- k XOR Functions. 391-399 - Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:

Phrase Search for Encrypted Cloud Storage. 401-417
- Baozhou Yu, Qi Zhu:

Energy Efficiency Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks. 419-433 - E. Murugavalli, S. J. Thiruvengadam:

A BER Analysis of mmWave Bidirectional Relay Network. 435-450 - Pei-Hsuan Tsai:

Building Coordinate System of Sensor Nodes Using Self-configurable Grid-based Approach. 451-468
- Mohsen Saadatpour, Sayyed Kamyar Izadi, Mohammad Nasirifar:

Priority-based Clustering in Weighted Graph Streams. 469-488 - Xiaoqing Lin, Zong-Min Ma, Li Yan:

RDF Keyword Search Using a Type-based Summary. 489-504 - Mohammadhossein Barkhordari, Mahdi Niamanesh:

Arvand: A Method to Integrate Multidimensional Data Sources Into Big Data Analytic Structures. 505-518 - Guan-Feng Li, Zong-Min Ma:

An Efficient Matching Algorithm for Fuzzy RDF Graph. 519-534 - Jing-Tao Sun, Qiu-Yu Zhang:

A Game Theory based Feature Word Selection Model for Chinese Texts. 535-550 - Chang-Sup Park:

Reducing Redundancy in Keyword Query Processing on Graph Databases. 551-574
Volume 34, Number 3, May
- Hsiu-Yu Lin, Yu-Ling Hsueh, Wen-Nung Lie:

Convolutional Recurrent Neural Networks for Posture Analysis in Fall Detection. 577-591 - Shin-Jie Lee, Wu-Chen Su, Chi-En Huang, Jie-Lin You:

Methods for Categorizing and Recommending API Usage Patterns Based on Degree Centralities and Pattern Distances. 593-610 - Shang-Pin Ma, Peng-Zhong Chen, Yang-Sheng Ma, Jheng-Shiun Jiang:

Building Mobile Apps by Ordinary Users: A Service-Brick-Based Approach. 611-629 - Shin-Jie Lee, You-Chen Lin, Kun-Hui Lin, Jie-Lin You:

A System for Composing and Delivering Heterogeneous Web Testing Software as a Composite Web Testing Service. 631-648 - Kuo-Hsun Hsu, Chang-Yen Tsai:

From Early Aspect to Aspect-Oriented Programming: A State-Based Join Point Model Approach. 649-670
- J. Praveen Kumar, S. Domnic:

Image Based Plant Phenotyping using Graph Based Method and Circular Hough Transform. 671-686 - S. Deivasigamani, Chinnaiyan Senthilpari, Wong Hin Yong:

Computer Aided Automatic Detection and Classification of EEG Signals for Screening Epilepsy Disorder. 687-700 - Hsueh-Yi Lin, Cheng-Jian Lin, Mei-Ling Huang:

Using a Hybrid of Morphological Operation and Neuro-fuzzy Filter for Transmission Map Refinement and Halation Elimination in Weather Degraded Images. 701-720
- Yunqi Dou, Jiang Weng, Chuangui Ma, Fushan Wei:

Revisiting the Expansion Length of Triple-base Number System for Elliptic Curve Scalar Multiplication. 721-732 - Jian Zou, Le Dong:

Cryptanalysis of the Round-Reduced Kupyna. 733-748 - Benhui Zhang, Yuan-Sheng Tang:

On the Construction and Analysis of Verifiable Multi-secret Sharing Based on Non-homogeneous Linear Recursion. 749-763
- Meng-Shu Chiang, Chung-Ming Huang, Duy-Tuan Dao, Binh-Chau Pham:

The Backward Fast Media Independent Handover for Proxy Mobile IPv6 Control Scheme (BFMIH-PMIPV6) over Heterogeneous Wireless Mobile Networks. 765-780
- Mingqi Lv, Tieming Chen, Yifan Li, Yinglong Li:

Urban Traffic Congestion Index Estimation With Open Ubiquitous Data. 781-799
Volume 34, Number 4, July
- Liang Zhu, Haiyong Xie, Yifeng Liu, Jianfeng Guan, Yang Liu, Yongping Xiong:

PTPP: Preference-Aware Trajectory Privacy-Preserving over Location-Based Social Networks. 803-820 - T. R. Reshmi, Krishnan Murugan:

Enhanced Passive Duplicate Address Detection (EPDAD) for Autoconfiguration in MANETs. 821-833 - Anuradha Pughat, Vidushi Sharma:

Integrated Fuzzy Control to Power Management on Event-based Sensor Node. 835-849 - Shanidul Hoque, Wasim Arif, Barati Sen, Srimanta Baishya:

Analysis of Spectrum Handoff under General Residual Time Distributions of Spectrum Holes in Cognitive Radio Networks. 851-867 - Yanping Li, Laifeng Lu, Kai Zhang:

Novel V2V Cross-domain Communications in Heterogeneous VANETs. 869-884 - Ashim Jyoti Gogoi, Naushad Manzoor Laskar, Ch. Lison Singh, Krishna Lal Baishnab, Koushik Guha:

Throughput Optimization in Multi-user Cognitive Radio Network using Swarm Intelligence Techniques. 885-902 - S. R. Barkunan, V. Bhanumathi:

An Efficient Deployment of Sensor Nodes in Wireless Sensor Networks for Agricultural Field. 903-918 - Shijie Jia, Ruiling Zhang, Tian-Yin Wang, Lujie Zhong, Mingchuan Zhang:

A Novel Mobility Similarity Measurement Method to Increase the Performance of Community-based Video Delivery in VANETs. 919-942 - Teng Li, Jianfeng Ma, Cong Sun, Ning Xi:

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. 943-960 - Shuangyuan Qiao, Yong Zeng, Lingjie Zhou, Hi-Hong Liu, Jianfeng Ma:

Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones. 961-976 - Iman M. Almomani, Mamdouh Alenezi:

Efficient Denial of Service Attacks Detection in Wireless Sensor Networks. 977-1000 - Shujie Yang, Haiyong Xie, Yifeng Liu, Zhongbai Jiang, Lujie Zhong:

SKCFS: Stochastic Optimal Forwarding Strategy for Knowledge Centric Network. 1001-1014 - Yang Xu, Jia Liu, Ruo Ando, Norio Shiratori:

End-to-end Congestion Relief and Physical Layer Security-Aware Routing Design for Ad Hoc Networks in IoT Applications. 1015-1030 - Zhiwei Li, Jun Liu, Tao Wang, Boyan Ding:

EPEE 3.0: A Unified Host-FPGA Communication Library Framework for SDR Platforms. 1031-1046 - Runcong Ma, Gwo-Jong Yu, Shenghui Zhao, Bin Yang:

Hierarchical CSI-Fingerprint Classification for Passive Multiperson Localization. 1047-1061 - Xiang Ji, Qingyi Hua, Anwen Wang, Junsong Tang, Chunyu Li, Chen Feng, Dingyi Fang:

2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue. 1063-1077 - Tao Zhang:

Fairness Guaranteed Rating Decomposition in Service-oriented Reputation Systems. 1079-1094
Volume 34, Number 5, September
- Yi-Chung Chen, Heng-Yi Su:

A Distributed Neural Filter for Finding Depth- k Skyline Friends in Social Networks. 1097-1118 - Chien-Hung Liu, Woei-Kae Chen:

Coupling Analysis and Visualization of KDT Scripts. 1119-1139 - Yasuhiro Watanabe, Hironori Washizaki, Kiyoshi Honda, Yuki Noyori, Yoshiaki Fukazawa, Aoi Morizuki, Hiroyuki Shibata, Kentarou Ogawa, Mikako Ishigaki, Satiyo Shiizaki, Teppei Yamaguchi, Tomoaki Yagi:

ID3P: Iterative Data-Driven Development of Personas to Improve Business Goals, Strategies, and Measurements. 1141-1173 - Ming-Chi Liu, Chen-Hsiang Yu, Jungpin Wu, An-Chi Liu, Hsi-Min Chen:

Applying Learning Analytics to Deconstruct User Engagement by Using Log Data of MOOCs. 1175-1186 - Shang-Pin Ma, Ching-Ting Ho:

Modularized and Flow-Based Approach to Chatbot Design and Deployment. 1187-1201 - Hsi-Min Chen, Wei-Han Chen, Chi-Chen Lee:

An Automated Assessment System for Analysis of Coding Convention Violations in Java Programming Assignments. 1203-1221 - Yu-Chen Chiu, Hwai-Jung Hsu, Jungpin Wu, Don-Lin Yang:

Predicting Student Performance in MOOCs Using Learning Activity Data. 1223-1235 - Mahesh M. Goyani, Narendra M. Patel:

Robust Facial Expression Recognition using Local Haar Mean Binary Pattern. 1237-1249 - Zhi Zhao, Jiuchao Feng, Weiyu Yu, Ziliang Ren, Bao Peng, Zhili Zhou:

A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor Network. 1251-1272 - Pei-Chuan Zhou, Alan Liu, Ching-Jung Lee:

A Requirements Engineering Approach to Attribute Selection in a Recommendation System. 1273-1286 - Chien-Hung Liu, Woei-Kae Chen, Shu-Ling Chen:

A Concurrent Approach for Improving the Efficiency of Android CTS Testing. 1287-1306 - Mehmet Karaköse, Mehmet Baygin, Koray Sener Parlak, Nursena Baygin, Erhan Akin:

A Novel Reconfiguration Method Using Image Processing Based Moving Shadow Detection, Optimization, and Analysis for PV Arrays. 1307-1328 - Ming-Yen Lin, Sue-Chen Hsueh, Chih-Chen Chan:

Mining and Maintenance of Sequential Patterns using a Backward Generation Framework. 1329-1349
Volume 34, Number 6, November
- Yo Nishiyama, Yuko Sasaki, Yuki Hirai, Hironori Nakajo, Keiichi Kaneko:

Fault-tolerant Routing based on Routing Capabilities in a Hyper-Star Graph. 1353-1366 - Pilsung Kang:

Dynamic Algorithm Switching in Parallel Simulations using AOP. 1367-1382
- Yu-Ting Tsai, Wei-Jhih Wang, Tzu-Yuan Kao:

Cache-Aware Out-of-Core Tensor Decomposition on GPUs. 1383-1403 - Toan Bui, Tram Nguyen, Bay Vo, Thanh Nguyen, Witold Pedrycz, Václav Snásel:

Application of Particle Swarm Optimization to Create Multiple-Choice Tests. 1405-1423 - Gin-Der Wu, Zhen-Wei Zhu:

Linear-Discriminant-Analysis-Based Type-2 Fuzzy-Neural-Network for Speech Detection and Recognition. 1425-1440 - Mushtaq Ahmad Khan, Wen Chen, Zhoujia Fu, Asmat Ullah:

Meshfree Digital Total Variation Based Algorithm for Multiplicative Noise Removal. 1441-1468 - Hsin-Te Hwang, Yi-Chiao Wu, Syu-Siang Wang, Chin-Cheng Hsu, Yu Tsao, Hsin-Min Wang, Yih-Ru Wang, Sin-Horng Chen:

Locally Linear Embedding Based Post-Filtering for Speech Enhancement. 1469-1491 - Hsin-Te Hwang, Yi-Chiao Wu, Yu-Huai Peng, Chin-Cheng Hsu, Yu Tsao, Hsin-Min Wang, Yih-Ru Wang, Sin-Horng Chen:

Voice Conversion Based on Locally Linear Embedding. 1493-1516
- Yi-Fan Tseng, Chun-I Fan:

Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption. 1517-1541
- Der-Rong Din, Yi-Fen Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu:

Spectrum Expansion/Contraction Problem for Multipath Routing with Time-Varying Traffic on Elastic Optical Networks. 1543-1559 - V. Rekha, V. Kavitha:

Efficient Low Bit Rate Image Coder for Fingerprint Image Compression. 1561-1578
- Ming-Hung Wang, Chin-Laung Lei:

SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events. 1579-1598 - Manojit Ghose, Aryabartta Sahu, Sushanta Karmakar:

Energy Efficient Online Scheduling of Real Time Tasks on Large Multi-threaded Multiprocessor Systems. 1599-1615 - P. Swathypriyadharsini, K. Premalatha:

TrioCuckoo: A Multi Objective Cuckoo Search Algorithm for Triclustering Microarray Gene Expression Data. 1617-1631 - Yi-Chung Chen, Chiang Lee:

An Efficient Mechanism for Compensating Vague Pattern Identification in Support of a Multi-Criteria Recommendation System. 1633-1653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














