default search action
Journal of Information Science and Engineering, Volume 38
Volume 38, Number 1, January 2022
- Kun Niu, Changgen Peng, Youliang Tian, Weijie Tan:
K -implicit Tracking Data Publishing Scheme against Geo-matching Attacks. 1-16 - Qinghua Zhu, Jiajie Huang, Yan Hou:
Multi-objective Scheduling of Cloud Data Centers Prone to Failures. 17-39 - Priyanka Kumari, Sudip Kumar Sahana:
PSO-DQ: An Improved Routing Protocol Based on PSO using Dynamic Queue Mechanism for MANETs. 41-56 - Kang Xiang, Youliang Tian, Sheng Gao, Changgen Peng, Weijie Tan:
Game-based Theory Rational Delegation Learning Scheme. 57-82 - Samir Berrani, Ali Yachir, Saïd Mahmoudi, Badis Djamaa, Mohamed Aissani:
Towards a New Semantic Model for Service-Based IoT Applications. 83-100 - Pankaj Kumar Mishra, Shashi Kant Verma:
ABCRF: Atomic Bond Connectivity Based Range Optimized Fuzzy Clustering Algorithm for WSN. 101-120 - Liang Zhu, Liping Yu, Zengyu Cai, Xiaowei Liu, Jianwei Zhang:
K -Anonymous Based Anti-Positioning Security Strategy in Mobile Networks. 121-138 - Zhao Li, Yuyu Hu, Zhendong Hu, Jingling Li, Shitong Zhu, Yang Xu:
Incremental-Compensation based Low-Cost Offline Robust Topology Control for Micro/Nano Satellite Network. 139-164 - Jiuren Qin, Kai Gao, Lujie Zhong, Shujie Yang:
Q-Learning based and Energy-Aware Multipath Congestion Control in Mobile Wireless Network. 165-183
- Hsiu-Chuan Huang, Zhi-Kai Zhang, Chung-Kuan Chen, Wei-da Hong, Jui-Chien Jao, Shiuhpyng Shieh:
Adaptive Entry Point Discovery for Web Vulnerability Scanning. 185-205
- Rashmeet Toor, Inderveer Chana:
DIDACE: Literature Mining and Exploration of Disease-Diet Associations. 207-221 - Fan Guo, Junfeng Qiu, Jin Tang, Weiqing Li:
Traffic Image Dehazing Using Sky Segmentation and Color Space Conversion. 223-251 - Hao-Chiang Shao, Lu-Hung Hsu, Yung-Chang Chen, Ying-Chu Huang, Shih-Ting Huang:
Drosophila Brain Aligner: Registering 3D Point Clouds in 2D Parameterization Domain. 253-271
Volume 38, Number 2, March
- Chorng-Shiuh Koong, Zih-Yu Wei, Chun-Hsien Chen, Cheng-Yan Guo:
Online Judgment System for Assessing C Program Structure. 275-294 - Gregorius Airlangga, Alan Liu:
Investigating Software Domain Impact in Requirements Quality Attributes Prediction. 295-316 - Chien-Hung Liu, Wen-Yew Liang, Ming-Yi Tsai, Wei-Che Chang, Woei-Kae Chen:
A Novel Approach to Automate IoT Testing of Gateways and Devices. 317-341 - Vishal Pradhan, Joydip Dhar, Ajay Kumar:
Testing-Effort based NHPP Software Reliability Growth Model with Change-point Approach. 343-355 - Jutarporn Intasara, Chu-Ti Lin:
Evaluating the Influence on Fault Localization Caused by Test Suite Reduction in Continuous Integration Process. 357-374 - Bao-An Nguyen, Hsi-Min Chen, Chyi-Ren Dow, Yan-Ting Chen, Hoang-Thanh Duong:
Identification and Validation of Web Themes: A DOM-Structure Matching Approach. 375-395
- Tomson Devis, Manju Manuel:
Design and Implementation of a Smart Cost-effective Hearing Aid using Fractional Interpolated Filters. 397-412 - Dieu Vu, Khang Truong, Khanh Nguyen, Ngo Van Linh, Khoat Than:
Revisiting Supervised Word Embeddings. 413-427 - Wang Gao, Hongtao Deng, Xun Zhu, Yuwei Wang:
TRGM: Generating Informative Responses for Open Domain Dialogue Systems. 429-444 - Minh-Tuan Nguyen, Jin-Huang Huang:
Location Estimation of Receivers in an Audio Room using Deep Learning with a Convolution Neural Network. 445-461
- Ye-In Chang, Stephen Shei-Dei Yang, Yao-Chi Chuang, Jun-Hong Shen, Chi-Chih Lin, Chia-En Li:
Automatic Classification of Uroflow Patterns via the Grading-based Approach. 463-477 - Khaled Jouini:
Aggregates Selection in Replicated Document-Oriented Databases. 479-496
Volume 38, Number 3, May
- Wen-Hsing Lai, Siou-Lin Wang:
Monaural Instrument Sound Segregation by Stacked Recurrent Neural Network. 499-515 - Pablo López Diéguez, Von-Wun Soo:
VAE+NN: Interpolation Composition by Direct Estimation of Encoded Vectors Against Linear Sampling of Latent Space. 517-529 - Kuei-Chien Chiu, Chih-Sung Lai, Hsing-Hui Chu, DucHanh Tran Thi, Rung-Ching Chen:
Exploring the Effect of Social Networking Service on Homestay Intention in Vietnam by GM(1, N) and Multiple Regression Analysis. 531-546 - Li-Pin Xiao, Po-Ruey Lei, Wen-Chih Peng:
Hybrid Embedding of Multi-Behavior Network and Product-Content Knowledge Graph for Tourism Product Recommendation. 547-570 - Junjie Shan, Yoko Nishihara, Akira Maeda, Ryosuke Yamanishi:
Question Generation for Reading Comprehension Test Complying with Types of Question. 571-589 - Masahiro Shioda, Takeshi Ito:
Improving Mini-Shogi Engine Using Self-play and Possibility of White's Advantage. 591-603 - Yihong Han, Ryosuke Yamanishi, Yoko Nishihara:
Lyrics Retrieval for Tourist Attractions Based on Shared Word-embedding Vectors. 605-618
- Fatma Zohra Lebib, Hakima Mellah, Abdelkrim Meziane:
A Multi-Dimensional Source Selection Based on Topic Modelling. 619-644 - Zhan Guo, Okan K. Ersoy, Xuefeng Yan:
L∞ Metric based Multi-Objective Differential Evolution Algorithm and its Industrial Application. 645-663 - Cheng-Zen Yang, Kun-Yu Chen, Anh-Hien Dao:
Bug Severity Assessment Based on Weighted Multi-Facet Features with Particle Swarm Optimization. 665-680
- Krit Sriporn, Cheng-Fa Tsai, Paohsi Wang:
Analyzing Tourist Behavior in Virtual Museums Using Intelligent Approach with Feature Selection. 681-695 - Si-Yu Chen, Ning Wang:
Discovering Entity Columns of Web Tables Effectively and Efficiently. 697-711
Volume 38, Number 4, July
- Yan-Jing Wu, Tsang-Ling Sheu, Pei-Hsun Chan:
Dynamic Slot Allocation in Restricted Access Window for IEEE 802.11ah Networks. 697-708
- Huma Hayat Khan, Muhammad Noman Malik, Youseef Alotaibi:
Trust Issues in Crowdsourced Software Engineering: An Empirical Study. 715-733
- Chun-Liang Jhong, Hsin-Lung Wu:
Efficient Provably Algorithms for Boundary Bin-Pair Selection Problem. 735-748 - Chi-Shiang Wang, Fang-Yi Su, Jung-Hsien Chiang:
MedCheX: An Efficient COVID-19 Detection Model for Clinical Usage. 749-759 - Mohammad Amin Adibi:
DCGAEL: An Optimized Ensemble Learning using a Discrete-Continuous Bi-level Genetic Algorithm. 761-774 - Jr-Chang Chen, Shih-Chieh Tang, I-Chen Wu:
Monte-Carlo Simulation for Mahjong. 775-790 - Houda Benhar, Mohamed Hosni, Ali Idri:
Univariate and Multivariate Filter Feature Selection for Heart Disease Classification. 791-803
- Xiaonian Wu, Ying-Xin Li, Lingchen Li, Yongzhuang Wei, Runlian Zhang:
Impossible Differential Cryptanalysis of BORON. 805-819
- Hanumantha Rao Bitra, Palanisamy Ponnusamy:
Analytic Form of Expression for a Capacity in an Adaptive Spatial Modulation Systems. 821-832 - Hsiu-Chunj Pan, Hsun Su, Shin-Shin Kao:
On the 2-Vertex-Fault Hamiltonicity for Graphs Satisfying Ore's Theorem. 833-857 - Ravi Shankar, Ayaz Ahmad, Saminathan Veerappan, Manoj Kumar Beuria, Patteti Krishna, Sudhansu Sekhar Singh, V. Gokula Krishnan:
Examination of User Pairing NOMA System Considering the DQN Scheme over Time-Varying Fading Channel Conditions. 859-875
- Summiya A. Pathan, C. Noorullah Shariff, Yogesh Kumar Sharma:
Towards the Rear Attuned Defense Scheme Embark Upon Selfish Mining. 877-892
- Po-Chun Kuo, Yu-Wei Chen, Yuan-Che Hsu, Chen-Mou Cheng, Wen-Ding Li, Bo-Yin Yang:
High Performance Post-Quantum Key Exchange on FPGAs. 1211-1229
Volume 38, Number 5, September
- Annu Priya, Sudip Kumar Sahana:
An Optimized Modelling and Simulation on Task Scheduling for Multi-Processor System using Hybridized ACO-CVOA. 895-907 - Ing Ming Chew, Wei Kitt Wong, Jobrun Nandong:
Optimization Analysis of Nonlinear Process Using Genetic Algorithm. 909-921 - Ihsan Kaya, Gürkan Isik, Ali Karasan, Fatma Kutlu Gündogdu, Hayri Baraçli:
Evaluation of Potential Locations for Hydropower Plants by Using a Fuzzy Based Methodology Consists of Two-Dimensional Uncertain Linguistic Variables. 923-935 - I Ketut Agung Enriko, Ali Zaenal Abidin, Azizah Syifalianti Noor:
LoRaWAN Implementation for Smart Electric Meter in Rural Area. 937-949 - I Ketut Agung Enriko, Fariz Alemuda, Daniel Adrianto:
An Approach to Monitor Vaccine Quality During Distribution Using Internet of Things. 951-962 - Jonathan Then Sien Phang, King Hann Lim, Po Ken Pang:
Skeletal Joint-based Regressive 3D Human Reconstruction from Partial Point Clouds. 963-975
- Agung Tri Arta Hariyanto, Kuochen Wang, Wei-Chung Tsai, Chi-Tsung Chen:
Improving ECG SVEB Detection using EMD with Resampling based on LSTM. 977-1000 - Mohammed Dwaikat, Mohammed Awad:
Hybrid Model for Coronary Artery Disease Classification Based on Neural Networks and Evolutionary Algorithms. 1001-1020 - Dayana David:
Ambience Retaining Enhancement Algorithm for Uneven Illumination Images using Nonlinear Pixel Level Intensity Transfer Function (AREA). 1021-1034
- G. H. J. Lanel, T. M. K. K. Jinasena, B. A. K. Welihinda:
Semidirect Products of Finite Groups in Public-Key Cryptographic Protocols. 1035-1050 - Jun-Rui Wang, Xing Xie, Yu-Chi Chen:
A Generic Construction of Designated Verifier Signature from Standard Cryptographic Algorithms. 1051-1063
- Hsing-Yu Chen, Yu-Chun Lin, Duen-Ren Liu, Tzeng-Feng Liu:
Online Product Recommendations based on Diversity and Latent Association Analysis on News and Products. 1065-1085
Volume 38, Number 6, November
- YungYu Zhuang, Jui-Hsiang Kao, Kuan-Shang Liu, Chia-Yu Lin:
Using User-Defined Domain-Specific Visual Languages to Modularize Programs for Conducting Experiments. 1089-1108 - Hsi-Min Chen, Bao-An Nguyen, Chyi-Ren Dow, Nien-Lin Hsueh, An-Chi Liu:
Exploring Time-Related Micro-Behavioral Patterns in a Python Programming Online Course. 1109-1131 - Wen-Tin Lee, Meng-Hsien Wu, Zhun-Wei Liu, Shin-Jie Lee:
A Microservices Orchestration Library based on PHP and RESTful API. 1133-1147 - Chien-Hung Liu, Shu-Ling Chen:
An Operation-Injection Approach to Detect Runtime Permission Crashes of Android Apps. 1149-1169 - YungYu Zhuang, Yao-Nang Tseng:
A Novel Detection Method for the Security Vulnerability of Time-of-Check to Time-of-Use. 1171-1188 - Po-Wen Chi, Yu Zheng, Wei-Yang Chang, Ming-Hung Wang:
SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks. 1189-1211 - Frank S. C. Tseng, Annie Y. H. Chou:
Spatiotemporal Data Warehousing for Event Tracking Applications. 1213-1241 - Riley Byrd, Kulin Damani, Hongjia Che, Anthony Calandra, Dae-Kyoo Kim:
A Systematic Literature Review of Volumetric 3D Model Reconstruction Methodologies Using Generative Adversarial Networks. 1243-1263 - Ting-Yu Lin, Ching-Yuan Wang, Ya-Pei Tuan, Meng-Hsun Tsai, Yean-Ru Chen:
A Study on Traffic Asymmetry for Detecting DDoS Attack in P4-based SDN. 1265-1283 - Shang-Pin Ma, Chia-Yu Li, Wen-Tin Lee, Shin-Jie Lee:
Microservice Migration Using Strangler Fig Pattern and Domain-Driven Design. 1285-1303 - Wen-Tin Lee, Chuan-Chun Huang:
Deformable Convolutional Neuron Network Model for Detecting Tables and Columns from Document Images. 1305-1315
- Yi-Ting Huang, Ting-Yi Chen, Shun-Wen Hsiao, Yeali S. Sun:
Learning Dynamic Malware Representation from Common Behavior. 1317-1334
- Ravi Shankar, Manoj Kumar Beuria, Gopal Ramchandra Kulkarni, Abu Sarwar Zamani, Patteti Krishna, V. Gokula Krishnan:
Examination of the DL Based Ubiquitous Multiple Input Multiple Output U/L NOMA System Considering Robust Fading Channel Conditions for Military Communication Scenario. 1335-1355
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.