


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2016
- Ayman Al-Dmour
, Mohammed Abuhelaleh, Ahmed Musa, Hasan Al-Shalabi:
An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping. J. Inf. Process. Syst. 12(2): 322-331 (2016) - Mohammed Hatem Ali Al-Hooti, Supeno Djanali, Tohari Ahmad
:
Audio Data Hiding Based on Sample Value Modification Using Modulus Function. J. Inf. Process. Syst. 12(3): 525-537 (2016) - Ibtissem Bekkouche
, Fizazi Hadria
:
A New Image Clustering Method Based on the Fuzzy Harmony Search Algorithm and Fourier Transform. J. Inf. Process. Syst. 12(4): 555-576 (2016) - Mohamed Belaoued
, Smaine Mazouzi:
A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features. J. Inf. Process. Syst. 12(4): 644-660 (2016) - Kheira Zineb Bousmaha, Mustapha Kamel Rahmouni, Belkacem Kouninef, Lamia Hadrich Belguith
:
A Hybrid Approach for the Morpho-Lexical Disambiguation of Arabic. J. Inf. Process. Syst. 12(3): 358-380 (2016) - Leila Boussaad, Mohamed Benmohammed, Redha Benzid:
Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis. J. Inf. Process. Syst. 12(3): 392-409 (2016) - Sang-Seon Byun:
An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks. J. Inf. Process. Syst. 12(1): 73-82 (2016) - Chantana Chantrapornchai, Paingruthai Nusawat
:
Two Machine Learning Models for Mobile Phone Battery Discharge Rate Prediction Based on Usage Patterns. J. Inf. Process. Syst. 12(3): 436-454 (2016) - Hao Chao, Cheng Song:
Landmark-Guided Segmental Speech Decoding for Continuous Mandarin Speech Recognition. J. Inf. Process. Syst. 12(3): 410-421 (2016) - Sang-Yong Choi, Daehyeok Kim, Yongmin Kim:
ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks. J. Inf. Process. Syst. 12(3): 422-435 (2016) - Ammar Chouchane, Mebarka Belahcene, Abdelmalik Ouamane, Salah Bourennane:
Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification. J. Inf. Process. Syst. 12(3): 468-488 (2016) - Yasmine Derdour, Kechar Bouabdellah, Mohamed Fayçal Khelfi:
Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks. J. Inf. Process. Syst. 12(2): 275-294 (2016) - Christian Gerber, Mokdong Chung:
Number Plate Detection with a Multi-Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices. J. Inf. Process. Syst. 12(1): 100-108 (2016) - Premanand Pralhad Ghadekar
, Nilkanth B. Chopade
:
Content Based Dynamic Texture Analysis and Synthesis Based on SPIHT with GPU. J. Inf. Process. Syst. 12(1): 46-56 (2016) - Moneeb Gohar, Seok Joo Koh:
Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks. J. Inf. Process. Syst. 12(2): 196-213 (2016) - Kuldeep Gurjar, Yang-Sae Moon:
Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance. J. Inf. Process. Syst. 12(2): 234-248 (2016) - Sunghyu Han, Il-Yong Lee, Jung-Ho Ahn:
Two-Dimensional Joint Bayesian Method for Face Verification. J. Inf. Process. Syst. 12(3): 381-391 (2016) - Fei Hao
, Doo-Soon Park, Sangyeon Woo, Se Dong Min, Sewon Park:
Treatment Planning in Smart Medical: A Sustainable Strategy. J. Inf. Process. Syst. 12(4): 711-723 (2016) - Yanyan Hou, Xiuzhen Wang, Sanrong Liu:
A Multiple Features Video Copy Detection Algorithm Based on a SURF Descriptor. J. Inf. Process. Syst. 12(3): 502-510 (2016) - Sad-Houari Nawal, Noria Taghezout:
A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm. J. Inf. Process. Syst. 12(4): 688-710 (2016) - Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim, Yoo-Joo Choi:
Interactive Authoring Tool for Mobile Augmented Reality Content. J. Inf. Process. Syst. 12(4): 612-630 (2016) - Jayaprakash Kar
, Manoj Ranjan Mishra
:
Mitigating Threats and Security Metrics in Cloud Computing. J. Inf. Process. Syst. 12(2): 226-233 (2016) - Sajid Ullah Khan, Wang Yin Chai, Chai Soo See, Amjad Khan:
X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach. J. Inf. Process. Syst. 12(1): 35-45 (2016) - Muhammad Sajjad Khan, Insoo Koo:
The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks. J. Inf. Process. Syst. 12(2): 295-309 (2016) - Alireza Khatamian, Hamid R. Arabnia
:
Survey on 3D Surface Reconstruction. J. Inf. Process. Syst. 12(3): 338-357 (2016) - Ravinder Kumar, Pravin Chandra
, Madasu Hanmandlu:
A Robust Fingerprint Matching System Using Orientation Features. J. Inf. Process. Syst. 12(1): 83-99 (2016) - Salima Lalani, Dharmapal Dronacharya Doye:
A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique. J. Inf. Process. Syst. 12(4): 681-687 (2016) - Sangmin Lee, Dongho Kim:
The Effects of Industry Classification on a Successful ERP Implementation Model. J. Inf. Process. Syst. 12(1): 169-181 (2016) - Jeong Kyu Lee, Seo Yeon Moon, Jong Hyuk Park:
HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet. J. Inf. Process. Syst. 12(3): 489-501 (2016) - Meeyeon Lee, Ye-Seul Park, Jung-Won Lee:
Image-Centric Integrated Data Model of Medical Information by Diseases: Two Case Studies for AMI and Ischemic Stroke. J. Inf. Process. Syst. 12(4): 741-753 (2016)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-06-20 23:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
