


default search action
Journal of Web Engineering, Volume 21
Volume 21, Number 1, 2022
- In-Young Ko, Abhishek Srivastava, Michael Mrissa:

Editorial: Scalable and Dynamic Big Data Processing and Service Provision in Edge Cloud Environments. v-ix - Genoveva Vargas-Solar, Md Sahil Hassan, Ali Akoglu

:
JITA4DS: Disaggregated Execution of Data Science Pipelines Between the Edge and the Data Centre. - Jiwon Choi, Jaewook Lee, Duksan Ryu

, Suntae Kim, Jongmoon Baik:
GAIN-QoS: A Novel QoS Prediction Model for Edge Computing. - Rubén Rentero-Trejo

, Daniel Flores-Martín, Jaime Galán-Jiménez, José García-Alonso
, Juan Manuel Murillo, Javier Berrocal:
Using Federated Learning to Achieve Proactive Context-Aware IoT Environments. - Niki Hrovatin, Aleksandar Tosic, Jernej Vicic:

In-Network Convolution in Grid Shaped Sensor Networks. - Aleksandar Tosic, Jernej Vicic:

Spatial Path Selection and Network Topology Optimisation in P2P Anonymous Routing Protocols.
Volume 21, Number 2, 2022
- Romulo de Almeida Neves

, Willian Massami Watanabe
, Rafael Oliveira
:
Morpheus Web Testing: A Tool for Generating Test Cases for Widget Based Web Applications. - Dimple Chehal

, Parul Gupta, Payal Gulati:
Evaluating Annotated Dataset of Customer Reviews for Aspect Based Sentiment Analysis. - Nickolas Savarimuthu

, Karesiddaiah Shobha
:
Efficient Pre-Processing Techniques for Improving Classifiers Performance. - Sowmya HK

, R. J. Anandhi:
Semantic Based Weighted Web Session Clustering Using Adapted K-Means and Hierarchical Agglomerative Algorithms. - Zixin Liu, Zhibo Wang, Mingxing Ling:

Side-channel Attack Using Word Embedding and Long Short Term Memories. - Feng Xiong, Hongzhi Wang:

Mining Simple Path Traversal Patterns in Knowledge Graph. - Qibin Zhou, Qinggang Su

, Dingyu Yang:
RealTE: Real-time Trajectory Estimation Over Large-Scale Road Networks. - Nannan Zhao:

Credibility Evaluation of Web Big Data Information Based on Particle Swarm Optimization. - Yilin Liu, Ruian Liu, Shengxiong Wang, Da Yan, Bo Peng, Tong Zhang:

Video Face Detection Based on Improved SSD Model and Target Tracking Algorithm. - Jie Shen

, Wenqi Dong, Jing Wang, Peng Zang, Xuewei Shi, Yang Wang:
Time-Sensitive Satellite Internet Based on Uniform Content Labels.
- Ahmad Al Nawasrah, Ammar Almomani, Huthaifa A. Al Issa, Khalid Alissa, Ayat Alrosan

, Abdulellah A. Alaboudi, Brij B. Gupta
:
Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System.
- Qibin Zhou, Qinggang Su

, Peng Xiong:
A Scheme of Selecting Vehicles to Assist Download Based on WebGIS for VANET.
- Hosung Park, Changmin Kim, Hyunsoo Son, Soonshin Seo

, Ji-Hwan Kim
:
Hybrid CTC-Attention Network-Based End-to-End Speech Recognition System for Korean Language.
- Isaac Sim, Young Ghyu Sun, Soo Hyun Kim, SangWoon Lee, Cheong Ghil Kim, Jin Young Kim:

Performance of Digital Drone Signage System Based on DUET. - Seonghwan Park

, Junsik Kim
, Yonghae Hwang, Doug Young Suh, Kyuheon Kim:
Enhancement of 3D Point Cloud Contents Using 2D Image Super Resolution Network. - Sangyub Lee

, In-Pyo Cho, Chung-Pyo Hong
:
Contactless Elevator Button Control System Based on Weighted K-NN Algorithm for AI Edge Computing Environment. - Byoungman An

, Youngseop Kim:
Image Link Through Adaptive Encoding Data Base and Optimized GPU Algorithm for Real-time Image Processing of Artificial Intelligence. - Soonshin Seo

, Changmin Kim
, Ji-Hwan Kim
:
Convolutional Neural Networks Using Log Mel-Spectrogram Separation for Audio Event Classification with Unknown Devices.
Volume 21, Number 3, 2022
- Shahrzad Hekmat

, Saeed Parsa
, Babak Vaziri
:
A New Semi-Automated Method for Service Identification. - Rishabh Gupta

, Ashutosh Kumar Singh:
Differential and Access Policy Based Privacy-Preserving Model in Cloud Environment. - Abolfazl Zare

, Mohammad Reza Motadel, Aliakbar Jalali:
A Hybrid Recommendation System Based on the Supply Chain in Social Networks.
- Min-Hyuk Jeong

, Sang-Kyun Kim:
Video Streaming Based on Blockchain State Channel with IoT Camera. - Ermal Elbasani

, Jeong-Dong Kim
:
AMR-CNN: Abstract Meaning Representation with Convolution Neural Network for Toxic Content Detection. - Myung-Kyu Yi

, Taeg Keun Whangbo:
An Efficient and Secure Authentication for Ambient Assisted Living System. - Eunjae Kim

, Juwon Yun, Woo-Nam Chung, Jae-Ho Nah
, Youngsik Kim, Cheoung Ghil Kim, Woo-Chan Park:
Effective Algorithm to Control Depth Level for Performance Improvement of Sound Tracing. - Risto Ollila

, Niko Mäkitalo
, Tommi Mikkonen
:
Modern Web Frameworks: A Comparison of Rendering Performance. - Ziliang Wang, Fanqin Zhou, Lei Feng, Wenjing Li, Tingting Zhang, Sheng Wang, Ying Li:

Multi-granularity Decomposition of Componentized Network Applications Based on Weighted Graph Clustering. - Ming Hu

:
Research on Semantic Information Retrieval Based on Improved Fish Swarm Algorithm. - Jiaxing Zhang, Anuo Yang, Shuaishuai Feng:

Data Protection of Internet Enterprise Platforms in the Era of Big Data. - Xiaogang Ruan, Peiyuan Guo, Jing Huang:

A Semantic OctoMap Mapping Method Based on CBAM-PSPNet. - Mandeep Kumar, Jahid Ali:

Taylor Sailfish Optimizer-Based Deep Stacked Auto Encoder for Blackhole Attack Detection in Wireless Sensor Network. - Byung-Seo Park

, Woosuk Kim, Jin-Kyum Kim
, Dong-Wook Kim, Young-Ho Seo
:
Quality Enhancement of 3D Volumetric Contents Based on 6DoF for 5G Telepresence Service. - Cheong-Ghil Kim, Young-Jun Hwang, Chayapol Kamyod

:
A Study of Profanity Effect in Sentiment Analysis on Natural Language Processing Using ANN. - Seok Hee Oh, Jung Woon Park, Seong-Jin Cho:

Effectiveness of the VR Cognitive Training for Symptom Relief in Patients with ADHD.
Volume 21, Number 4, 2022
- Rawaa Alatrash, Rojalina Priyadarshini

, Hadi Ezaldeen, Akram Alhinnawi:
A Hybrid Recommendation Integrating Semantic Learner Modelling and Sentiment Multi-Classification. 941-988 - Ahad AlQabasani, Ahlem Ben Hassine

, Arif Bramantoro
, Asma AlMunchi:
Local Consistency Reinforcement for Enhancing Web Service Composition. 989-1016 - Khalid Benabbes, Khalid Housni

, Ali El Mezouary, Ahmed Zellou
:
Recommendation System Issues, Approaches and Challenges Based on User Reviews. 1017-1054 - Víctor Rampérez, Javier Soriano, David Lizcano, Carlos Miguel:

Automatic Evaluation and Comparison of Pub/Sub Systems Performance Improvements. 1055-1080 - Watchira Buranasing, Woraphon Lilakiatsakun:

Semantic Relation Extraction from Cultural Heritage Archives. 1081-1102 - Saeedeh Sadat Sajjadi Ghaemmaghami

, James Miller
:
Integrated-Block: A New Combination Model to Improve Web Page Segmentation. 1103-1144 - Sushmita Singh, Manvi Siwach

:
Handling Heterogeneous Data in Knowledge Graphs: A Survey. 1145-1186 - Hadi Ezaldeen, Sukant Kishoro Bisoy, Rachita Misra, Rawaa Alatrash:

Semantics-Aware Context-Based Learner Modelling Using Normalized PSO for Personalized E-learning. 1187-1224
- Anar Khuderchuluun, Munkh-Uchral Erdenebat

, Erkhembaatar Dashdavaa, Ki-Chul Kwon, Jong-Rae Jeong, Nam Kim:
Inverse-Directed Propagation-Based Hexagonal Hogel Sampling for Holographic Stereogram Printing System. 1225-1238 - Soyun Choi, Kyungsook Kim, Chayapol Kamyod

, Cheong Ghil Kim:
Ethical Use of Web-based Welfare Technology for Caring Elderly People Who Live Alone in Korea: A Case Study. 1239-1264 - Youngmo Kim

, Byeongchan Park
, Seok-Yoon Kim
:
A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network. 1265-1282 - Hyochang Ahn, Yong-Hwan Lee:

Vehicle Classification and Tracking Based on Deep Learning. 1283-1294
- Editorial. v

- K. M. Karthick Raghunath, V. Vinoth Kumar, Muthukumaran Venkatesan

, Krishna Kant Singh
, T. R. Mahesh, Akansha Singh
:
XGBoost Regression Classifier (XRC) Model for Cyber Attack Detection and Classification Using Inception V4. 1295-1322 - Sampathkumar Arumugam

, Shishir Kumar Shandilya, Nebojsa Bacanin
:
Federated Learning-Based Privacy Preservation with Blockchain Assistance in IoT 5G Heterogeneous Networks. 1323-1346 - Archana Patel, Narayan C. Debnath, Prashant Kumar Shukla

:
SecureOnt: A Security Ontology for Establishing Data Provenance in Semantic Web. 1347-1370 - Shishir Kumar Shandilya:

Paradigm Shift in Adaptive Cyber Defense for Securing the Web Data: The Future Ahead. 1371-1376
Volume 21, Number 5, 2022
- Tsung-Yin Ou, Wen-Lung Tsai:

Designing a Flow-based Mechanism for Accessing Electronic Health Records on a Cloud Environment. - Ruizhong Du, Yan Gao, Cui Liu:

Fine-grained Web Service Trust Detection: A Joint Method of Machine Learning and Blockchain.
- Kyu-Seok Shim, Yong-hwan Kim, Il Kwon Sohn, Eunjoo Lee, Kwang-il Bae, Wonhyuk Lee:

Design and Validation of Quantum Key Management System for Construction of KREONET Quantum Cryptography Communication. - Chanjin Park, Wonhyuk Lee

, Moon-Hyun Kim, Ung-Mo Kim, Taehong Kim, Seunghae Kim:
A Study on Traffic Prediction for the Backbone of Korea's Research and Science Network Using Machine Learning. - Gyudong Park, Gi-Yoon Jeon, Jong-Oh Kim:

A Study on Improvement of the Military IdAM Using Edge-Sovereign Identity (ESI). - Shikha Gupta, Atul Mishra

:
Publisher Side Profit Optimization Using Adaptive Keyword Weighted Sponsored Search Technique. - Jia-Huei Lin, Eric Jui-Lin Lu:

SPARQL Generation with an NMT-based Approach. - Samuel Santos, António Rito Silva

:
Microservices Identification in Monolith Systems: Functionality Redesign Complexity and Evaluation of Similarity Measures. - V. Diviya Prabha

, R. Rathipriya:
Competitive Capsule Network Based Sentiment Analysis on Twitter COVID'19 Vaccines. - Konstantinos I. Roumeliotis

, Nikolaos D. Tselikas:
An Effective SEO Techniques and Technologies Guide-map.
- Yanling Zhang, Ting Zhang:

Research Into the Security Threat of Web Application. - Nannan Zhao:

Research on Web GUI Image Recognition System Based on Improved Convolutional Neural Network.
- Gi Sung Oh, Won Jun Jeong, Sung-Jin Cho, Seok Hee Oh:

Parsimonious Approach to in Analyzing Brainwaves for VR Users. - Young Ghyu Sun, Soo Hyun Kim, Seongwoo Lee, Joonho Seon, SangWoon Lee, Cheong Ghil Kim, Jin Young Kim:

Performance of End-to-end Model Based on Convolutional LSTM for Human Activity Recognition. - Hyeong-Jin Kim, Min-Cheol Shin, Man-Wook Han, Chung-Pyo Hong, Ho-Woong Lee:

An Efficient Scheme to Obtain Background Image in Video for YOLO-based Static Object Recognition.
Volume 21, Number 6, 2022
- Kun Li, Liwei Jia, Xiaoming Shi:

Research on Cloud Computing Task Scheduling Based on PSOMC. 1749-1766 - Sang Hoon Lee, Hyun-Seok Hwang

, Su-Yeon Kim:
Identifying the Facilitating Factors for Web-based Trading: A Case Study of Blockchain & Cryptocurrency. 1767-1792 - Jonathan van de Ruitenbeek, Flavius Frasincar, Gianni Brauwers:

A Memory-Driven Neural Attention Model for Aspect-Based Sentiment Classification. 1793-1830 - Esha Khanna, Rashmi Popli, Naresh Chauhan:

Identification and Classification of Risk Factors in Distributed Agile Software Development. 1831-1852 - Ehsan Sharifi, Ahmad Abdollahzadeh Barforoush, Haider S. Al dabbagh:

A Systematic Mapping Study on Quality Attribute Traceability. 1853-1912 - Wei Jia, Xuan Wang, Jing Shan, Li Yan, Weinan Niu, Zongmin Ma:

Sequence Encoder-based Spatiotemporal Knowledge Graph Completion. 1913-1936 - Fabio Di Lauro

, Souhaila Serbout, Cesare Pautasso
:
A Large-scale Empirical Assessment of Web API Size Evolution. 1937-1980 - Kijin An, Eli Tilevich:

Adaptive Redistribution and Replication to Improve the Responsiveness of Mobile Web Apps. 1981-2010
Volume 21, Number 7, 2022
- R. Srinivasan, V. Ramachandran, Nagaraju Baydeti

:
Enhanced Clustering Technique for Efficient Identification of Independent Groups in Social Networks. 2011-2032
- Zhao-yin Jiang:

Simulation of Web Page Big Data Capture Method Based on WNN Optimized by Locust Algorithm. 2033-2048 - Yuhuan Feng, Chong You, Yanbing Li, Ya Zhang, Qingxia Wang:

Integration of Computer Virtual Reality Technology to College Physical Education. 2049-2072
- Jimao Guo, Yi Wang:

RDF Graph Summarization Based on Node Characteristic and Centrality. 2073-2094 - Steve Simske:

Editorial. v-vi
- Yannick-Ulrich Samen Tchantchou

:
A Semantic Similarity Measure for Scholarly Document Based on the Study of n-gram. 2095-2114 - Archana Nagelli

, B. Saleena:
Optimal Trained Bi-Long Short Term Memory for Aspect Based Sentiment Analysis with Weighted Aspect Extraction. 2115-2148 - Vishal Gupta

, Ashutosh Dixit, Shilpa Sethi
:
A Comparative Analysis of Sentence Embedding Techniques for Document Ranking. 2149-2186
- Petar Lachkov

, Lo'ai Tawalbeh
, Smriti Bhatt
:
Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing. 2187-2208 - Khulud Fisal Alenzi, Onytra Abbas Bashir Abbas

:
A Defensive Framework for Reflected XSS in Client-Side Applications. 2209-2230
Volume 21, Number 8, 2022
- Won Jun Jeong, Gi Sung Oh, Seok Hee Oh, Taeg Keun Whangbo:

Establishment of Production Standards for Web-based Metaverse Content: Focusing on Accessibility and HCI. 2231-2256
- Solomiia Fedushko

, Olha Trach, Yuriy Syerov
, Natalia Kryvinska
, Jennifer R. Calhoun:
Web Project Development: Emergency Management. 2257-2286 - Zhixuan Jia, Yushun Fan, Jia Zhang, Xing Wu, Chunyu Wei, Ruyu Yan:

A Multi-source Information Graph-based Web Service Recommendation Framework for a Web Service Ecosystem. 2287-2312 - Yiming Chen, Daiyi Li

, Li Yan, Zongmin Ma:
Two-stage Detection of Semantic Redundancies in RDF Data. 2313-2338 - Shivi Garg

, Niyati Baliyan:
MalVulDroid: Tracing Vulnerabilities from Malware in Android using Natural Language Processing. 2339-2362 - Aleksi Huotala

, Matti Luukkainen, Tommi Mikkonen
:
Benefits and Challenges of Isomorphism in Single-page Applications: Case Study and Review of Gray Literature. 2363-2404

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














