


default search action
KSII Transactions on Internet and Information Systems, Volume 17
Volume 17, Number 1, January 2023
- Jeonghyun Yun, Taejung Park:

An Analysis of University Students' Needs for Learning Support Functions of Learning Management System Augmented with Artificial Intelligence Technology. 1-15 - JaHyung Koo, LanMi Hwang, HooHyun Kim, Taehee Kim, JinHyang Kim, HeeSeok Song:

Machine learning-based nutrient classification recommendation algorithm and nutrient suitability assessment questionnaire. 16-30
- Jinho Kim, Jaiill Lee

, Eunyoung Yang, Seokjoong Kang:
Technology forecasting from the perspective of integration of technologies: Drone technology. 31-50
- Dilip Kumar Sharma

, Bhuvanesh Singh
, Saurabh Agarwal
, Hyunsung Kim, Raj Sharma:
FakedBits- Detecting Fake Information on Social Platforms using Multi-Modal Features. 51-73
- Wangke Yu, Shuhua Wang:

Identity-Based Key Management Scheme for Smart Grid over Lattice. 74-96 - Juanli Kuang, Ying Guo, Lang Li:

IIoTBC: A Lightweight Block Cipher for Industrial IoT Security. 97-119 - Khaled H. Abuhmaidan, Ahmad K. Kayed, Maryam Alrisia:

Steganography: A Flexible Embedded Randomization Technique. 120-144 - Reetu Gupta, Priyesh Kanungo, Nirmal Dagdee:

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment. 145-164 - Wen Chen, Lang Li, Ying Guo:

DABC: A dynamic ARX-based lightweight block cipher with high diffusion. 165-184
- Yingying Fang, Qi Zhang:

Grant-Free Random Access in Multicell Massive MIMO Systems with Mixed-Type Devices: Backoff Mechanism Optimizations under Delay Constraints. 185-201 - Guosheng Li:

Optimal Power Allocation for NOMA-based Cellular Two-Way Relaying. 202-215 - B. Vijayalakshmi

, S. Thanga Ramya, K. Ramar:
Multivariate Congestion Prediction using Stacked LSTM Autoencoder based Bidirectional LSTM Model. 216-238 - Waleed Raza

, Xuefei Ma, Houbing Song, Amir Ali
, Habib Zubairi, Kamal Acharya
:
Long Short-Term Memory Neural Network assisted Peak to Average Power Ratio Reduction for Underwater Acoustic Orthogonal Frequency Division Multiplexing Communication. 239-260 - Yixin Xu, Fulai Liu, Zixuan Zhang, Zhenxing Sun:

Uplink Achievable Rate analysis of Massive MIMO Systems in Transmit-correlated Ricean Fading Environments. 261-279 - Yuna Sim, Seungseok Sin, Jihun Cho, Sangmi Moon, Young-Hwan You, Cheol Hong Kim, Intae Hwang:

Beam Tracking Method Using Unscented Kalman Filter for UAV-Enabled NR MIMO-OFDM System with Hybrid Beamforming. 280-294
Volume 17, Number 2, February 2023
- M. R. Amal, P. Venkadesh:

R2NET: Storage and Analysis of Attack Behavior Patterns. 295-311
- M. Hema

, S. Kanaga Suba Raja
:
A Quantitative Approach to Minimize Energy Consumption in Cloud Data Centres using VM Consolidation Algorithm. 312-334 - Hongxia Zhao, Yongjie Wang, Maolin Li:

Knee-driven many-objective sine-cosine algorithm. 335-352
- Haocong Cai, Zhigang Wu, Min Chen:

Design of STM32-based Quadrotor UAV Control System. 353-368 - Jayanta Kumar Ray, Ardhendu Shekhar Biswas, Arpita Sarkar, Rabindranath Bera, Sanjib Sil, Monojit Mitra:

Relaying of 4G Signal over 5G Suitable for Disaster Management following 3GPP Release 18 Standard. 369-390
- Mengfei Wang, Weixing Wang, Sheng Feng, Limin Li:

Adaptive Multi-class Segmentation Model of Aggregate Image Based on Improved Sparrow Search Algorithm. 391-411 - Chenghua Liu, Anhong Wang:

Adaptive High-order Variation De-noising Method for Edge Detection with Wavelet Coefficients. 412-434 - Yihao Fu, Liquan Shen, Tianyi Chen:

3D-Distortion Based Rate Distortion Optimization for Video-Based Point Cloud Compression. 435-449
- Yiran Zhang, Huizheng Geng, Yanyan Xu, Li Su, Fei Liu:

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment. 450-470 - Yixiang Fang, Kai Tu, Kai Wu, Yi Peng, Yunqing Shi:

PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation. 471-485 - Wei Fang

, Xuelei Jia, Wen Zhang, Victor S. Sheng:
A New Distributed Log Anomaly Detection Method based on Message Middleware and ATT-GRU. 486-503 - F. Syed Anwar Hussainy

, Senthil Kumar Thillaigovindan:
An Integrated Accurate-Secure Heart Disease Prediction (IAS) Model using Cryptographic and Machine Learning Methods. 504-519
- Ashok J

, Sowmia K. R, Jayashree K, Priya Vijay:
A Novel Grasshopper Optimization-based Particle Swarm Algorithm for Effective Spectrum Sensing in Cognitive Radio Networks. 520-541
- HyungTae Kim, Duk-Yeon Lee, Dongwoon Choi, Jaehyeon Kang

, Dong-Wook Lee:
Parallel Implementations of Digital Focus Indices Based on Minimax Search Using Multi-Core Processors. 542-558 - Taemin Hwang, Jieun Kim, Minjoon Kim

:
A Distributed Real-time 3D Pose Estimation Framework based on Asynchronous Multiviews. 559-575 - Eunchan Kim

, Yonghyun Lee
, Jiwoong Choi, Byungjoon Yoo, Kum Ju Chae, Chang Hyun Lee:
Machine Learning-based Prediction of Relative Regional Air Volume Change from Healthy Human Lung CTs. 576-590 - Chohee Bae, Sojung Oh, Sohyun Joo, Jiyeon Joo, KyungLyul Lee:

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits. 591-608 - Myeonggi Hong, Junho Park, Jeonghyeon Chang, Seongju Hong:

Demand Survey Method for Commercialization of Police Science Technology and Equipment. 609-625 - Sojung Oh, Eunjin Kim, Eunji Lee

, Yeongseong Kim, Gibum Kim:
Standard Model for Mobile Forensic Image Development. 626-643 - Qianfeng Lin

, Jooyoung Son:
A Close Contact Tracing Method Based on Bluetooth Signals Applicable to Ship Environments. 644-662 - Daekyeong Nam, Gyunghyun Choi:

The Identification of Emerging Technologies of Automotive Semiconductor. 663-677
Volume 17, Number 3, March 2023
- Quoc Tuan Hoang, Xuan Hien Pham, Anh Vu Le, Trung Thanh Bui:

Artificial Intelligence-Based Breast Nodule Segmentation Using Multi-Scale Images and Convolutional Network. 678-700 - Juan Wang, Liquan Guo, Minghu Wu, Guanhai Chen, Zishan Liu, Yonggang Ye, Zetao Zhang:

Instance segmentation with pyramid integrated context for aerial objects. 701-720 - Hongshuang Ma, Qicheng Liu:

In-depth Recommendation Model Based on Self-Attention Factorization. 721-739 - Wenqi Xu, Yuesheng Liu, Ziyang Zhong, Yang Chen, Jinfeng Xia, Yunjie Chen:

Ship Number Recognition Method Based on An improved CRNN Model. 740-753 - Lianhong Yuan, Yuan Yuan, Jun Liu:

A Deep Learning Algorithm for Fusing Action Recognition and Psychological Characteristics of Wrestlers. 754-774
- Naveen Zehra Quazilbash, Zaheeruddin Asif, Saman Rizvi:

Variations in Neural Correlates of Human Decision Making - a Case of Book Recommender Systems. 775-793
- Yin Ren, Aihuang Guo, Chunlin Song:

Multi-Slice Joint Task Offloading and Resource Allocation Scheme for Massive MIMO Enabled Network. 794-815
- Xiaochun Zhang, Zhiyu Zhou:

Illumination correction via improved grey wolf optimizer for regularized random vector functional link network. 816-839 - Qiang Gao, Zhicheng He, Xu Jia, Yinghong Xie, Xiaowei Han:

Lightweight high-precision pedestrian tracking algorithm in complex occlusion scenarios. 840-860 - Haifeng Sima, Yushuang Xu, Minmin Du, Meng Gao, Jing Wang:

Saliency-Assisted Collaborative Learning Network for Road Scene Semantic Segmentation. 861-880 - Yan Wang, Jitae Shin:

ISFRNet: A Deep Three-stage Identity and Structure Feature Refinement Network for Facial Image Inpainting. 881-895
- Ying Hu

, Liang Zhu, Jianwei Zhang, Zengyu Cai, Jihui Han:
Migration and Energy Aware Network Traffic Prediction Method Based on LSTM in NFV Environment. 896-915
- Huifen Feng, Ying Liu, Xincheng Yan

, Na Zhou, Zhihong Jiang:
A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism. 916-937 - Guangyong Gao, Min Wang:

A novel watermarking scheme for authenticating individual data integrity of WSNs. 938-957 - Yang Luo, Jing Peng, Hong Su, Tao Wu, Xi Wu:

Collaborative Modeling of Medical Image Segmentation Based on Blockchain Network. 958-979
- Xiujian Yang, Lina Wang:

An ANN-based Intelligent Spectrum Sensing Algorithm for Space-based Satellite Networks. 980-998 - Jiangli Zeng, Sanya Liu, Hui Wang:

Generalized Distributed Multiple Turbo Coded Cooperative Differential Spatial Modulation. 999-1021
- Ji Min Kim, Seo Yeon Lee, Won Sang Lee:

Discovering AI-enabled convergences based on BERT and topic network. 1022-1034 - Chang-Kyo Lee, Dong Hyun Lee, Junseok Kim, Xiaoying Lei, Seung Hyong Rhee:

Q-Learning based Collision Avoidance for 802.11 Stations with Maximum Requirements. 1035-1048
Volume 17, Number 4, April 2023
- Gyu-Sung Ham, Mingoo Kang, Sucktae Joung, Su-Chong Joo:

Edge Computing-Based Medical Information Platform for Automatic Authentication Using Patient Situations. 1049-1065 - Yadong Liu, Yuesheng Liu, Ziyang Zhong, Yang Chen, Jinfeng Xia, Yunjie Chen:

Depth tracking of occluded ships based on SIFT feature matching. 1066-1079 - Minsu Jeong, Namhwa Lee, Byuk Sung Ko, Inwhee Joe:

Ensemble Deep Learning Model using Random Forest for Patient Shock Detection. 1080-1099
- Tianhao Zhao, Linjie Wu, Di Wu, Jianwei Li, Zhihua Cui:

Multi-factor Evolution for Large-scale Multi-objective Cloud Task Scheduling. 1100-1122 - Dae-Kug Lee, Seok-Ho Yoon, Jae-Hyeok Kwak, Choong-Ho Cho, Dong-Hoon Lee:

Sustainable Smart City Building-energy Management Based on Reinforcement Learning and Sales of ESS Power. 1123-1146 - Hasnain Ali Almashhadani, Xiaoheng Deng, Osamah R. Al-Hwaidi, Sarmad T. Abdul-Samad

, Mohammed M. Ibrahim, Suhaib N. Abdul Latif:
Design of A new Algorithm by Using Standard Deviation Techniques in Multi Edge Computing with IoT Application. 1147-1161 - Fangfang Gu, Keshen Jiang, Yu Ding, Xuexiu Fan:

Predicting Urban Tourism Flow with Tourism Digital Footprints Based on Deep Learning. 1162-1181
- Tiantian Wang, Jing Wang, Haipeng Wang, Jie Meng, Chunlei Yu, Shuxia Wang:

Adaptive-and-Resolvable Fractional Repetition Codes Based on Hypergraph. 1182-1199 - JinQuan Wang, YiJun Wang, Guangwen Liu, Guifen Chen:

A Model Stacking Algorithm for Indoor Positioning System using WiFi Fingerprinting. 1200-1215
- YeJin Wee, OnSeok Lee:

Proposal for a Sensory Integration Self-system based on an Artificial Intelligence Speaker for Children with Developmental Disabilities: Pilot Study. 1216-1233 - Pan Wu, Zhen Hua, Jinjiang Li:

PATN: Polarized Attention based Transformer Network for Multi-focus image fusion. 1234-1257
- Muthakshi S

, Mahesh K:
Long-Term Container Allocation via Optimized Task Scheduling Through Deep Learning (OTS-DL) And High-Level Security. 1258-1275
- J. Samuel Manoharan:

A Metaheuristic Approach Towards Enhancement of Network Lifetime in Wireless Sensor Networks. 1276-1295 - Lou Chen, Guo Rui:

Generalized SCAN Bit-Flipping Decoding Algorithm for Polar Code. 1296-1309
Volume 17, Number 5, May 2023
- Deris Stiawan, Susanto, Abdi Bimantara, Mohd Yazid Idris, Rahmat Budiarto

:
IoT botnet attack detection using deep autoencoder and artificial neural networks. 1310-1338 - Gengyu Ge, Junke Li, Zhong Qin:

Mobile Robot Localization in Geometrically Similar Environment Combining Wi-Fi with Laser SLAM. 1339-1355
- Mohammad Ayub Latif, Muhammad Khalid Khan, Umema Hani:

Using Standard Deviation with Analogy-Based Estimation for Improved Software Effort Prediction. 1356-1376 - Muhammad Saeed, Naeem Ahmed

, Abid Mehmood
, Muhammad Aftab, Rashid Amin, Shahid Kamal:
Sentiment Analysis for COVID-19 Vaccine Popularity. 1377-1395 - Quoc-Dai Luong Tran

, Dinh-Hong Vu, Anh-Cuong Le, Ashwin Ittoo:
Contextual Modeling in Context-Aware Conversation Systems. 1396-1412 - Thi-Linh Ho, Anh-Cuong Le, Dinh-Hong Vu:

Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection. 1413-1432
- Yueheng Mao, Bin Song, Zhiyong Zhang, Wenhou Yang, Yu Lan:

Multi-classification Sensitive Image Detection Method Based on Lightweight Convolutional Neural Network. 1433-1449
- Nur Afiqah Suzelan Amir

, Wan Ainun Mior Othman, Kok Bin Wong:
Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network. 1450-1470 - Ali M. Allam:

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System. 1471-1483 - A. Ezil Sam Leni

, R. Shankar, R. Thiagarajan, Vishal Ratansing Patil:
Block-chain based Secure Data Access over Internet of Health Application Things (IHoT). 1484-1502
- Xiangping Kong, Yu Wang, Lei Zhang, Yulong Shang, Ziyan Jia:

Active and Passive Beamforming for IRS-Aided Vehicle Communication. 1503-1515
Volume 17, Number 6, June 2023
- Younghwa Lee, Il-Sik Chang, Suseong Oh, Youngjin Nam, Youngteuk Chae, GeonYoung Choi, Goo-Man Park:

Hierarchical Flow-Based Anomaly Detection Model for Motor Gearbox Defect Detection. 1516-1529 - Shiyu Liu

, Hongyan Qiao, Lianhong Yuan, Yuan Yuan, Jun Liu:
Research on data augmentation algorithm for time series based on deep learning. 1530-1544 - Jonghwan Park, Jaegi Son, Dongmin Kim:

Resource Metric Refining Module for AIOps Learning Data in Kubernetes Microservice. 1545-1559
- C. Sathish, C. Yesubai Rubavathi:

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme. 1600-1619
- Yeo Chan Yoon

, Soo Kyun Kim:
Gated Multi-channel Network Embedding for Large-scale Mobile App Clustering. 1620-1634 - Xingchen Lu

, Dahai Jing, Defu Jiang, Ming Liu, Yiyue Gao, Chenyong Tian:
Time-Matching Poisson Multi-Bernoulli Mixture Filter For Multi-Target Tracking In Sensor Scanning Mode. 1635-1656
- Damodharan Kuttiyappan, V. Rajasekar

:
Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier. 1657-1673 - Xinzhu Liu, Zhiguo Qu, Xiubo Chen, Xiaojun Wang:

Special Quantum Steganalysis Algorithm for Quantum Secure Communications Based on Quantum Discriminator. 1674-1688 - Mu Chen, Lu Chen, Zhipeng Shao, Zaojian Dai, Nige Li, Xingjie Huang, Qian Dang, Xinjian Zhao:

A Source Code Cross-site Scripting Vulnerability Detection Method. 1689-1705
- N. Nithiyanandam, C. Mahesh, S. P. Raja, S. Jeyapriyanga, T. Selva Banu Priya

:
Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks. 1706-1727 - Hyungbae Park

, Joongjin Kook:
DDCP: The Dynamic Differential Clustering Protocol Considering Mobile Sinks for WSNs. 1728-1742 - Ming Li, Xiaolin Zhang, Rongchen Sun, Zengmao Chen, Chenghao Liu:

A Novel Self-Learning Filters for Automatic Modulation Classification Based on Deep Residual Shrinking Networks. 1743-1758
Volume 17, Number 7, July 2023
- Tinglong Tang, Yunqiao Guo, Qixin Li, Mate Zhou, Wei Huang, Yirong Wu:

Chinese-clinical-record Named Entity Recognition using IDCNN-BiLSTM-Highway Network. 1759-1772 - Irfan Khan

, Xianchao Zhang, Ramesh Kumar Ayyasamy
, Rahman Ali
:
AutoFe-Sel: A Meta-learning based methodology for Recommending Feature Subset Selection Algorithms. 1773-1793 - Yongjun Choi, Beomjoo Seo, Shinjin Kang, Jongin Choi:

Study on 2D Sprite *3.Generation Using the Impersonator Network. 1794-1806
- Ayed Ahmad Hamdan Al-Radaideh, Mohd Shafry Mohd Rahim, Wad Ghaban, Majdi Bsoul, Mohammad Shahid Kamal

, Naveed Abbas
:
Arabic Words Extraction and Character Recognition from Picturesque Image Macros with Enhanced VGG-16 based Model Functionality Using Neural Networks. 1807-1822
- Fangmin Xu, Jinzhao Fu, Haiyan Cao, Zhirui Hu:

RIS Selection and Energy Efficiency Optimization for Irregular Distributed RIS-assisted Communication Systems. 1823-1840
- Yuantian Xia, Xupeng Kou

, Weie Jia, Shuhan Lu, Longhe Wang, Lin Li:
CenterNet Based on Diagonal Half-length and Center Angle Regression for Object Detection. 1841-1857 - Dalwon Jang, Jaewon Lee, Jong-Seol Lee:

Web-based synthetic-aperture radar data management system and land cover classification. 1858-1872
- Venkatesh Sivaprakasam, Vartika Kulshrestha, Lawrence Livingston Godlin Atlas

, Senthilnathan Arumugam:
An Improved Coyote Optimization Algorithm-Based Clustering for Extending Network Lifetime in Wireless Sensor Networks. 1873-1893 - Zheng Zhao

, Xiaoya Fan, Xin Xie, Qian Mao, Qi Zhao:
AP-SDN: Action Program enabled Software-Defined Networking Architecture. 1894-1915
- S. B. Gopal, C. Poongodi:

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm. 1916-1934 - Chao Ma, Xiaojun Jin, Song Luo, Yifei Wei, Xiaojun Wang:

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing. 1935-1950
- S. Velmurugan

, P. Ezhumalai, E. A. Mary Anita:
Artificial Neural Network with Firefly Algorithm-Based Collaborative Spectrum Sensing in Cognitive Radio Networks. 1951-1975
Volume 17, Number 8, August 2023
- Yuantian Xia, Shuhan Lu, Longhe Wang, Lin Li:

Center point prediction using Gaussian elliptic and size component regression using small solution space for object detection. 1976-1995 - Tianjiao Liang, Weiguo Pan, Hong Bao, Xinyue Fan, Han Li:

Bird's Eye View Semantic Segmentation based on Improved Transformer for Automatic Annotation. 1996-2015 - Lei Han, Yiziting Zhu, Yuwen Chen, Guoqiong Huang, Bin Yi:

LightGBM and XGBoost Learning Method for Postoperative Critical Illness Key Indicators Analysis. 2016-2029 - Bijay Gaudel, Deepanjal Shrestha, Niosh Basnet, Neesha Rajkarnikar, Seung Ryul Jeong, Donghai Guan:

Link Prediction in Bipartite Network Using Composite Similarities. 2030-2052
- Zhiming Shi:

Video Quality Assessment based on Deep Neural Network. 2053-2067 - Lijun Zhao

, Ke Wang, Jinjing Zhang, Jialong Zhang, Anhong Wang:
Color-Image Guided Depth Map Super-Resolution Based on Iterative Depth Feature Enhancement. 2068-2082
- Jinqi Su, Lin He, Runtao Ren

, Qilei Liu:
Reliable blockchain-based ring signature protocol for online financial transactions. 2083-2100 - Xiaonan Li, Guimin Zhang

, Qingbao Li, Ping Zhang, Zhifeng Chen, Jinjin Liu, Shudan Yue
:
Cross-architecture Binary Function Similarity Detection based on Composite Feature Model. 2101-2123 - Min Woo Kim, Il-Hwan Kim, Jaehyoun Kim, Oh Jeong Ha, Jinsook Chang, Sangdon Park:

A Study on the Protection of Biometric Information against Facial Recognition Technology. 2124-2139
- Bharathiraja S, S. Selvamuthukumaran

, V. Balaji
:
Energy Efficient Cluster Head Selection and Routing Algorithm using Hybrid Firefly Glow-Worm Swarm Optimization in WSN. 2140-2156 - Daofu Liu, Rui Guo:

Minimum Row Weight and Polar Spectrum Based Puncture Polar Codes Construction Algorithm. 2157-2169 - Jianxiong Li, Hailong Jiang:

Research on The SWIPT System Throughput Based on Interference Signal Energy Collecting. 2170-2187 - Majidha Fathima K. M.

, M. Suganthi, N. Santhiyakumari:
Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network. 2188-2208 - Sunhee Kim:

Improved Metal Object Detection Circuits for Wireless Charging System of Electric Vehicles. 2209-2221
- Yu Cheng

, Sangwoo Park, Inseop Lee, Changryong Kim, Sanghun Sul:
Brand Fandom Dynamic Analysis Framework based on Customer Data in Online Communities. 2222-2240 - Ha Sung Hwang, Liucun Zhu

, Qin Cui:
Development and Validation of a Digital Literacy Scale in the Artificial Intelligence Era for College Students. 2241-2258 - Jongwon Kim, Eunbi Park, Sungyoon Cho, Kiwon Kwon, Young Myoung Ko:

Probabilistic Modeling of Fish Growth in Smart Aquaculture Systems. 2259-2277 - Hyunhak Song, Sungyoon Cho, Wongi Jeon, Kyungwon Park, Jaedong Shim, Kiwon Kwon:

A Typo Correction System Using Artificial Neural Networks for a Text-based Ornamental Fish Search Engine. 2278-2291 - Sunggeun Han, Jaegwang Lee, Inho Jeon, Jeongcheol Lee, Hoon Choi:

Data Framework Design of EDISON 2.0 Digital Platform for Convergence Research. 2292-2313
Volume 17, Number 9, September 2023
- Bangcheng Zhang, Shuo Gao, Zhong Zheng, Guanyu Hu:

Aeroengine performance degradation prediction method considering operating conditions. 2314-2333 - Haein Lee

, Hae Sun Jung, Seon Hong Lee, Jang Hyun Kim:
Robust Sentiment Classification of Metaverse Services Using a Pre-trained Language Model with Soft Voting. 2334-2347 - Jiaquan Zhou, Wei Wei:

Research on detecting moving targets with an improved Kalman filter algorithm. 2348-2360 - Shuo Xiao, Yiting Xu, Chaogang Tang, Zhenzhen Huang:

A Dual-scale Network with Spatial-temporal Attention for 12-lead ECG Classification. 2360-2376
- Ahmad Abusukhon:

Intelligent Shoes for Detecting Blind Falls Using the Internet of Things. 2377-2398 - Yajun Zhang, Jun Wu, Bing Wang, Hongkai Wang, Xiaohui Shang:

Performance Analysis of Energy-Efficient Secure Transmission for Wireless Powered Cooperative Networks with Imperfect CSI. 2399-2418
- Bo Chen, Guimei Pang, Zhengtao Xiang, Hang Tao

, Yufeng Chen:
Load Allocation Strategy for Command and Control Networks based on Interdependence Strength. 2419-2435 - Khalid Krayz allah, Nor Azman Ismail, Layla Hasan

, Wad Ghaban, Nadhmi Gazem, Maged Nasser:
Adaptable Web Search User Interface Model for the Elderly. 2436-2475
- Di Gai, Heng Luo, Jing He, Pengxiang Su

, Zheng Huang, Song Zhang, Zhijun Tu:
MLSE-Net: Multi-level Semantic Enriched Network for Medical Image Segmentation. 2458-2482 - Muhammad Tahir Rasheed

, Daming Shi:
Pixel-Wise Polynomial Estimation Model for Low-Light Image Enhancement. 2483-2504 - Huy-Hoang Dinh, Hong-Quan Do

, Tung Trung Doan, Cuong Le, Ngo Xuan Bach, Tu Minh Phuong
, Viet-Vu Vu:
FGW-FER: Lightweight Facial Expression Recognition with Attention. 2505-2528
- Chit-Jie Chew, Po-Yao Wang, Jung-San Lee:

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination. 2529-2549 - Xueyan Liu, Ruirui Sun, Linpeng Li, Wenjing Li, Tao Liu:

Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data. 2550-2572
- Weijian Zhou, Azharul Islam

, KyungHi Chang:
Real-time RL-based 5G Network Slicing Design and Traffic Model Distribution: Implementation for V2X and eMBB Services. 2573-2589 - Jihyung Kim, Yuna Sim, Sangmi Moon, Intae Hwang:

Beam Selection Algorithm Utilizing Fingerprint DB Based on User Types in UAV Support Systems. 2590-2608
Volume 17, Number 10, October 2023
- Qiannan Guo, Jinzhe Yan

:
The Impact of Online Reviews on Hotel Ratings through the Lens of Elaboration Likelihood Model: A Text Mining Approach. 2609-2626 - Huimin Wu, Yongcan Liu, Haozhe Yang, Zhongxiang Xie, Xianchao Chen, Mingzhi Wen, Aite Zhao:

An Attention-based Temporal Network for Parkinson's Disease Severity Rating using Gait Signals. 2627-2642 - Ruhui Zhang, Pengcheng Xu

, Kang Kang, You Yang:
Geometric and Semantic Improvement for Unbiased Scene Graph Generation. 2643-2657
- Dongzhi Cao, Peng Liang, Tongjuan Wu, Shiqiang Zhang, Zhenhu Ning:

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things. 2658-2681 - Liang Guo

, Yue Wang, Yixing Zhang, Caihong Zhou, Kexin Xu, Shaopeng Wang:
A new model and testing verification for evaluating the carbon efficiency of server. 2682-2700
- Elumalaivasan Poongavanam, Padmanathan Kasinathan, Karunanithi Kandasamy

, S. P. Raja:
Energy Forecasting Information System of Optimal Electricity Generation using Fuzzy-based RERNN with GPC. 2701-2717 - Phuoc Tran, Duy Khanh Nguyen, Tram Tran, Bay Vo:

Using Syntax and Shallow Semantic Analysis for Vietnamese Question Generation. 2718-2731
- Liang Li, Xinjie Yang, Yuanjie Zheng, Jiazhi Yang:

A Novel Social Aware Reverse Relay Selection Scheme for Underlaying Multi-Hop D2D Communications. 2732-2749 - Zhi Pan, Hee Jun Cho, Dong Hyuk Jo:

Determinants of Live Commerce Acceptance: Focusing on the Extended Technology Acceptance Model (TAM). 2750-2767
- Rui Wang, Rong Hua:

Generating Radiology Reports via Multi-feature Optimization Transformer. 2768-2787
- M. Mohanasundari

, V. Chandrasekaran, S. Anitha:
Brain Tumor Detection Based on Amended Convolution Neural Network Using MRI Images. 2788-2808 - Min Jeong Lee, In Seop Na:

Enhancing Similar Business Group Recommendation through Derivative Criteria and Web Crawling. 2809-2821
- A. Syed Ismail, D. Pradeep, Ashok J

:
Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment. 2822-2843 - B. Mohinder Singh

, N. Jaisankar:
Efficient and Secure Sound-Based Hybrid Authentication Factor with High Usability. 2844-2861 - Chuanhao Yang, Pin-Chang Su, Tai-Chang Su:

A Novel Electronic Voting Mechanism Based on Blockchain Technology. 2862-2882
- Xin Liu, Mingcong Zeng, Yarong Liu, Mei Wang, Xiyu Song:

Anti-Reactive Jamming Technology Based on Jamming Utilization. 2883-2902
Volume 17, Number 11, November 2023
- Yue Li:

Knowledge Recommendation Based on Dual Channel Hypergraph Convolution. 2903-2323 - Enoch Frimpong, Zhiguang Qin, Regina Esi Turkson, Bernard Mawuli Cobbinah, Edward Yellakuor Baagyere, Edwin Kwadwo Tenagyei:

Enhancing Alzheimer's Disease Classification using 3D Convolutional Neural Network and Multilayer Perceptron Model with Attention Network. 2924-2944 - Xiangyi Zhou, Zhijie Zhou, Xiaoxia Han, Zhichao Ming, Yanshan Bian:

Evaluating LIMU System Quality with Interval Evidence and Input Uncertainty. 2945-2965 - Kang Nyeon Lee, Haein Lee

, Jang Hyun Kim, Youngsang Kim, Seon Hong Lee:
Comparing Social Media and News Articles on Climate Change: Different Viewpoints Revealed. 2966-2986 - Bonghyun Kim:

Implementation of Falling Accident Monitoring and Prediction System using Real-time Integrated Sensing Data. 2987-3002
- Emre Karakoç, Celal Çeken:

Secure SLA Management Using Smart Contracts for SDN-Enabled WSN. 3003-3029
- Ning Wang, Huiqing Wang, Xiaoting Wang:

Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment. 3030-3049 - Ya-Jun Leng, Zhi Wang, Dan Peng, Huan Zhang:

APMDI-CF: An Effective and Efficient Recommendation Algorithm for Online Users. 3050-3063
- Slim Kammoun, Rahma Bouaziz, Faisal Saeed

, Sultan Noman Qasem
, Tawfik Al Hadhrami:
HaptiSole: Wearable Haptic System in Vibrotactile Guidance Shoes for Visually Impaired Wayfinding. 3064-3082
- Juhyoung Sung, Sungyoon Cho, Wongi Jeon, Yangseob Kim, Kiwon Kwon, Deuk-Young Jeong

:
Recirculating Aquaculture System Design and Water Treatment Analysis based on CFD Simulation. 3083-3098
- Sivasankaran Pichandi, Gomathy Balasubramanian, Venkatesh Chakrapani:

Stress Level Based Emotion Classification Using Hybrid Deep Learning Algorithm. 3099-3120 - Sanghyun Byun, Bumsoo Kim, Wonseop Shin

, Yonghoon Jung, Sanghyun Seo:
Transfer Learning based Parameterized 3D Mesh Deformation with 2D Stylized Cartoon Character. 3121-3144
- Long Cheng, Jiayin Guan:

An Indoor Localization Algorithm based on Improved Particle Filter and Directional Probabilistic Data Association for Wireless Sensor Network. 3145-3162
- Hui Jin, Zhaoyang Li, Ruiqin Hu, Jinglei Tan, Hongqi Zhang:

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight. 3163-3181 - S. Poorani, R. Anitha

:
Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management. 3182-3203
- Wei Liu, Xinxin Ma, Haoting Yan, Zhongnian Li, Shouyin Liu:

Joint Antenna Selection and Multicast Precoding in Spatial Modulation Systems. 3204-3217
Volume 17, Number 12, December 2023
- Leiruo Zhou, Yunlong Duan, Wei Wei:

Research on the Financial Data Fraud Detection of Chinese Listed Enterprises by Integrating Audit Opinions. 3218-3241 - Hung-Cuong Trinh, Van-Huy Pham

, Anh H. Vo:
Remaining Useful Life Estimation based on Noise Injection and a Kalman Filter Ensemble of modified Bagging Predictors. 3242-3265
- Mingzi Chen, Xin Wei, Xuguang Zhang, Lei Ye:

Affection-enhanced Personalized Question Recommendation in Online Learning. 3266-3285
- Boyang Xu, Daxin Dong:

Informatization, Public Service Supply, and China's Inbound Tourism Development. 3286-3309
- Kawan Faiq Ahmed, Asaad Mubdir Jassim Al-Hindawi

:
450 Gbps Low-cost Intensity Modulation with Direct Detection (IM/DD) Wave Length Division Multiplexing (WDM-PON) for 5G Fronthaul. 3310-3329 - So-Hyang Bak, Kwanghoon Pio Kim

:
An AutoML-driven Antenna Performance Prediction Model in the Autonomous Driving Radar Manufacturing Process. 3330-3344 - Beomjoo Seo:

A Case Study of Combining Two Cross-platform Development Frameworks for Storybook Mobile App. 3345-3363
- Jing Han, Weiyu Wang, Yuqi Lin, Xueqiang Lyu:

MRU-Net: A remote sensing image segmentation network for enhanced edge contour Detection. 3364-3382 - Dongdong Jia, Meili Zhou, Wei Wei, Dong Wang, Zongwen Bai:

A Novel Two-Stage Training Method for Unbiased Scene Graph Generation via Distribution Alignment. 3383-3397
- C. A. Yogaraja

, K. Sheela Shobana Rani:
Key-based dynamic S-Box approach for PRESENT lightweight block cipher. 3398-3415
- Yuanguang Wu, Lusheng Wang, Caihong Kai, Min Peng:

Dynamics-Based Location Prediction and Neural Network Fine-Tuning for Task Offloading in Vehicular Networks. 3416-3435

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














