- 2015
- Mishal Almazrooie, Azman Samsudin, Manmeet Mahinderjit Singh:
Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map. J. Inf. Process. Syst. 11(2): 310 (2015) - Chaimae Anibou, Mohamed Nabil Saidi, Driss Aboutajdine:
Classification of Textured Images Based on Discrete Wavelet Transform and Information Fusion. J. Inf. Process. Syst. 11(3): 421-437 (2015) - Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain, Mushtaq Ali:
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities. J. Inf. Process. Syst. 11(4): 601-615 (2015) - Udayan Baruah, Shyamanta M. Hazarika:
A Dataset of Online Handwritten Assamese Characters. J. Inf. Process. Syst. 11(3): 325-341 (2015) - Souad Bekkouch, Kamel Mohamed Faraoun:
Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms. J. Inf. Process. Syst. 11(3): 406-420 (2015) - Nawel Bendimerad, Kechar Bouabdellah:
Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage. J. Inf. Process. Syst. 11(4): 509-527 (2015) - Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki, Driss Aboutajdine:
Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms. J. Inf. Process. Syst. 11(4): 495-508 (2015) - Nadia Boumkheld, Mounir Ghogho, Mohammed El Koutbi:
Energy Consumption Scheduling in a Smart Grid Including Renewable Energya Smart Grid Including Renewable Energy. J. Inf. Process. Syst. 11(1): 116-124 (2015) - Siwoo Byun, Seok-Woo Jang:
A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases. J. Inf. Process. Syst. 11(3): 389-405 (2015) - Sang-Il Choi, Sanghun Lee, Seok Joo Koh, Sang-Kyu Lim, Insu Kim, Tae Gyu Kang:
Fast Device Discovery for Remote Device Management in Lighting Control Networks. J. Inf. Process. Syst. 11(1): 125-133 (2015) - Amine Dahane, Berrached Nasr-Eddine, Abdelhamid Loukil:
A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm. J. Inf. Process. Syst. 11(2): 205-228 (2015) - Majdi Dammak, Ali Wali, Adel M. Alimi:
Viewer's Affective Feedback for Video Summarization. J. Inf. Process. Syst. 11(1): 76-94 (2015) - Maheshi B. Dissanayake, Dilanga L. B. Abeyrathna:
Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments. J. Inf. Process. Syst. 11(3): 483 (2015) - Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Tran Nguyen Le, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen, Thanh Ha Lê:
Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam. J. Inf. Process. Syst. 11(4): 556-572 (2015) - Aly Mohamed El-Semary, Mohamed Mostafa Abdel-Azim:
Counter Chain: A New Block Cipher Mode of Operation. J. Inf. Process. Syst. 11(2): 266-279 (2015) - Yongbin Gao, Hyo Jong Lee:
Viewpoint Unconstrained Face Recognition Based on Affine Local Descriptors and Probabilistic Similarity. J. Inf. Process. Syst. 11(4): 643 (2015) - Govind P. Gupta, Manoj Misra, Kumkum Garg:
An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks. J. Inf. Process. Syst. 11(1): 148 (2015) - Bong-Joo Jang, Suk Hwan Lee, Sanghun Lim, Ki-Ryong Kwon:
Biological Infectious Watermarking Model for Video Copyright Protection. J. Inf. Process. Syst. 11(2): 280-294 (2015) - Young-Ae Jeon, Sangsung Choi, Dae-Young Kim, Kwang-il Hwang:
An Adaptive Superframe Duration Allocation Algorithm for Resource-Efficient Beacon Scheduling. J. Inf. Process. Syst. 11(2): 295-309 (2015) - Haejae Jung:
A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags. J. Inf. Process. Syst. 11(1): 95-103 (2015) - Hyun-Syug Kang:
A Real-Time Integrated Hierarchical Temporal Memory Network for the Real-Time Continuous Multi-Interval Prediction of Data Streams. J. Inf. Process. Syst. 11(1): 39-56 (2015) - Seung-Shik Kang:
Word Similarity Calculation by Using the Edit Distance Metrics with Consonant Normalization. J. Inf. Process. Syst. 11(4): 573-582 (2015) - Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang, Kimoon Jeong:
WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection. J. Inf. Process. Syst. 11(2): 229-238 (2015) - Danielle H. Lee:
Personalizing Information Using Users' Online Social Networks: A Case Study of CiteULike. J. Inf. Process. Syst. 11(1): 1-21 (2015) - Hyoung-Gyu Lee, So-Young Park, Hae-Chang Rim, Do-Gil Lee, Hong-Woo Chun:
A Maximum Entropy-Based Bio-Molecular Event Extraction Model that Considers Event Generation. J. Inf. Process. Syst. 11(2): 248-265 (2015) - Chang Liu, Sang-Hwa Chung, Han-You Jeong, Ik-Joo Jung:
An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks. J. Inf. Process. Syst. 11(3): 465-482 (2015) - Nandini Malhotra, Geeta Nagpal:
Genetic Symmetric Key Generation for IDEA. J. Inf. Process. Syst. 11(2): 239-247 (2015) - Fatemeh Momenipour Moghadam, Mohammad Reza Keyvanpour:
Comparative Study of Various Persian Stemmers in the Field of Information Retrieval. J. Inf. Process. Syst. 11(3): 450-464 (2015) - Manar Mohaisen:
A Review of Fixed-Complexity Vector Perturbation for MU-MIMO. J. Inf. Process. Syst. 11(3): 354-369 (2015) - Tam Nguyen, Gueesang Lee:
A Lightweight and Effective Music Score Recognition on Mobile Phones. J. Inf. Process. Syst. 11(3): 438-449 (2015)