default search action
Journal of Information Science and Engineering, Volume 39
Volume 39, Number 1, January 2023
- Wenjin Hu, Jiahao Meng, Li Jia, Fuliang Zeng, Panpan Xue:
Weakly Supervised Semantic Segmentation for Headdress of Thangka Images. 1-18 - Jia-Xin Hu, Yu Song, Yi-Yao Zhang:
Adoption of Gesture Interactive Robot in Music Perception Education with Deep Learning Approach. 19-37 - Yinghao Kong:
Precise Displacement Measurement of Long-Span Spatial Structure of Buildings via Deep Learning and Machine Vision Technology. 39-54 - Yang Liu, Cun Shang Fan, Peng-Xin Liu:
Research on Digital Media Intelligent Art Creation Based on the Fusion of Virtual Reality and Semantic Features. 55-66 - Guiying Zhu:
No-Reference Image Quality Assessment Based on Natural Scene Statistics in NSCT Domain and Spatial Domain. 67-89
- Supriya Sridharan, Swaminathan Venkataraman, K. Somasundaram:
A Novel Variable Lie Hypergraph Technique for Cluster Based Routing in Opportunistic Networks. 91-109 - Ajay K. Gupta, Udai Shanker:
A Predicted Region Enrooted Approach for Efficient Caching in Mobile Environment. 111-127 - Lincoln Herbert Teixeira, Árpád Huszák:
Reinforcement Learning in Path Lifetime Routing Algorithm for VANETs. 129-147 - Fang Ren, Mingyu Yu, Haiyan Xiu, Wei Hou:
A New Symmetric Information Hiding Scheme Based on Cover Randomness. 149-166 - Yi-Chuan Wang, Gui-Ling Zhang, Ya-Ling Zhang:
Analysis of SQL Injection based on Petri Net in Wireless Network. 167-181 - Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh:
Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. 183-195
- Maria I. Ortega, Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina:
A Systematic Analysis of Security in Blockchain. 197-222 - Xiafei Yan, Xu Zheng:
Research on Secrecy Law Based on Blockchain Encrypted Traceability Technology. 223-235
Volume 39, Number 2, March 2023
- Chung-Ming Huang, Jheng-Yuan Yu:
Leader-Controlled Real Time and Synchronous Multimedia Presentation for Wireless Mobile Group Touring Services using the Multi-Access Edge Computing (MEC) Technique. 239-267
- Shih-Yu Huang, Chia-Hui Wang:
Cost-Effective Smartphone-Camera-Based Scheme to Distinguish Drivers from Passengers for Texting-While-Driving. 269-289 - Zhi-Yu Hong, Zongmin Ma:
Inconsistency Detection in Knowledge Graph with Entity and Path Semantics. 291-303 - Wei Lin, Liang-Chih Yu:
Scarce Resource Dimensional Sentiment Analysis UsingDomain-distilled BERT. 305-321 - Zhigao Zhang, Xiaoxu Song, Bin Wang, Chuansheng Dong:
Outer Product Enhanced Embedding Information for Recommendation. 323-337 - Jiunn-Tsair Fang, Yu-Liang Tu, Pao-Chi Chang:
Fast Intra Coding Partition Decisions for Feature Video Coding. 339-352 - Ray-Ming Chen:
A Partition-induced Hereditary Metric for Equivalence Classes - Theory and Application. 353-373
- K. Tamilarasan, Jeevaa Katiravan:
An Analytical Approach on User Rate Maximization in Two-Way Relay Communication using NOMA. 375-388 - R. Ponni, T. Jayasankar, K. Vinothkumar:
Investigations on Underwater Acoustic Sensor Networks Framework for RLS Enabled LoRa Networks in Disaster Management Applications. 389-406 - Yan-Jing Wu, Tsang-Ling Sheu, Wei-Luen Li:
HetNet with Overlapping Small Cells for 5G IoT Networks. 407-421
- Xin Xing, Ning Wang:
Entity Matching based on Attribute-aware and Multi-Perspective Similarity Measurement. 423-438 - Shu-Ying Lin, Hui-Yu Lin:
Bond Price Prediction Using Technical Indicators and Machine Learning Techniques. 439-455 - Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao:
You Only Learn One Representation: Unified Network for Multiple Tasks. 691-709
Volume 39, Number 3, May 2023
- Iuon-Chang Lin, Yu-Wen Wang, Ting-Xuan Tai:
A Grid-Based Key Pre-Distribution Scheme Using Dependent Keys in Wireless Sensor Networks. 459-472 - Chun-I Fan, Hsin-Nan Kuo, Yung-Sheng Tu, Yuan-Chi Chei, Chu-Chia Chuang, Yu-Chun Tseng, Arijit Karati:
A Secure Cloud Gaming System. 473-487 - Hsiu-Ling Chu, Yu-Chen Dai, Wei-Bin Lee, Ting-Shen Hsieh, Ming-Hung Wang:
Characterizing Behaviors of Sockpuppets in Online Political Discourses. 489-506 - Ruei-Hau Hsu, Lu-Chin Wang, Hsiang-Shian Fan:
Universally Secure Device-to-Device Communications with Privacy Protection and Fine-grained Access Control Based on 5G-enabled Multi-access Edge Computing. 507-524 - Ray-I Chang, Yen-Ting Chang, Chia-Hui Wang:
Outsourced K-means Clustering for High-Dimensional Data Analysis based on Homomorphic Encryption. 525-548 - Ajai John Chemmanam, Bijoy Antony Jose, Asif Moopan:
A Multi-Tasking Model for Object Detection, Instance Segmentation and Keypoint Estimation Tasks. 549-560 - Sheena Kurian K, Sheena Mathew:
High Impact of Rough Set and KMeans Clustering Methods in Extractive Summarization of Journal Articles. 561-574 - Dhanashri Narayan Wategaonkar:
Energy-Efficient Reliable Sector-based Clustering Scheme to Improve the Lifetime of WSN. 575-591 - Mahima Poonia, Rakesh Kumar Bajaj:
On Complex Fuzzy Matrix with Algebraic Operations, Similarity Measure and its Application in Identification of Reference Signal. 593-607 - Seema Safar, Babita Roslind Jose, T. Santhanakrishnan:
Enriching Aspect-based Recommendation System using Social Relation-Item Interaction. 609-621 - Himanshu Dhumras, Rakesh Kumar Bajaj:
On Assembly Robotic Design Evaluation Problem Using Enhanced Quality Function Deployment with q -Rung Orthopair Fuzzy Set Theoretic Environment. 623-636
- Zhifang Liu:
Using Artificial Intelligence in IC Substrate Production Predicting. 637-654
- Yuan-Hao Lin, Chia-Hui Chang, Hsiu-Min Chuang:
EventGo! Mining Events through Semi-Supervised Event Title Recognition and Pattern-based Venue/Date Coupling. 655-670 - Ting-Yi J. T. Kuo, Anthony J. T. Lee:
A Dialogue Model for Customer Support Services. 671-689 - Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao:
You Only Learn One Representation: Unified Network for Multiple Tasks. 691-709 - Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh:
Designing Network Design Strategies Through Gradient Path Analysis. 975-995
Volume 39, Number 4, July 2023
- Christine Dewi, Rung-Ching Chen, Hui Yu, Xiaoyi Jiang:
XAI for Image Captioning using SHAP. 711-724 - Jing Zhu, Ru-Chun Jia:
Research on Data Security Monitoring Method Based on CP-ABE. 725-738 - Meirong Zheng, Ru-Chun Jia:
Research on Secure Transmission of Heterogeneous Networks. 739-757 - Haibo Yu, Tao Zhang, Wenhuan Zhu, Li Zhang, Jiali Jin:
High-resolution Noise Artifact Tracking network for Image Splicing Forgery Detection. 759-775 - Jianxin Li, Jie Liu, Chao Li, Wenliang Cao, Bin Li, Fei Jiang, Jinyu Huang, Yingxia Guo, Yang Liu:
Violence Detection Method Based on Convolution Neural Network and Trajectory. 777-796 - Che-Nan Kuo, Yu-Da Lin, Duc-Man Nguyen, Yu-Huei Cheng:
Based on Decision Tree Model to Analyze the Influencing Factors of Customer's Insurance Transactions. 797-807 - Fei Jiang, Xiao-Ya Ma, Yi Yi Li, Jian-Xin Li, Wen-Liang Cao, Jin Tong, Qiu Yan Chen, Hai-Fang Chen, Zi Xuan Fu:
How Deep Learning Affect Price Forecasting of Agricultural Supply Chain? 809-823 - Qian Du, Zhao-Feng Wu, Jun Wang, Wenwu Xie, Ya-Lan Li:
A Novel Joint Frequency Offset Estimation Scheme for OFDM System. 825-838 - Yunli Cheng, Hainie Meng, Yu-Qiang Chen, Yan-Xian Tan, Jian-Lan Guo:
Research on Network Information Security Management System Based on Face Recognition. 839-854 - Yanjun Zhu, Ting Zhu, Jianxin Li, Wenliang Cao, Peng Yong, Fei Jiang, Jie Liu:
Classify Text-based Email Using Naive Bayes Method With Small Sample. 855-868 - Siron Anita Susan T., B. Nithya:
Firefly Based Energy Efficient Routing of Charging Request in Wireless Rechargeable Sensor Network. 869-884
- Poonam T. Agarkar, Manish D. Chawhan, Kishor D. Kulat, Pratik Ramesh Hajare:
MECT-PSO: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks. 885-908 - Ravinder Ahuja, S. C. Sharma:
B 2 GRUA: BERTweet Bi-Directional Gated Recurrent Unit with Attention Model for Sarcasm Detection. 909-933 - Haixia Hou, Daojun Liang, Mingqiang Zhang, Dongfeng Yuan:
A Densely Stacked Attention Method for Cyberattack Detection. 935-950
- Hung-Yi Lin, Rong-Chang Chen:
Heuristic Feature Selection with Classification Efficiency Using Soft Cluster Analysis for Biological Datasets. 951-973
- Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh:
Designing Network Design Strategies Through Gradient Path Analysis. 975-995
Volume 39, Number 5, September 2023
- Bao-An Nguyen, Hoang-Thanh Duong, Ling-Ling Tsao, Hsi-Min Chen:
An Educational Card Game Approach to Motivating the Learning of Software Engineering. 999-1022 - Kuo-Hsun Hsu, Zi-Deng Meng, Andrew Weian Hou:
The Evaluation of Aspect-Based Refactoring Method with Design Patterns through GQM. 1023-1036 - Han-Lin Lu, Ren-Jie Zhuang, Shih-Kun Huang:
Fuzz Testing Process Visualization. 1037-1059 - Chia-Yu Lin, Shin-Jie Lee:
An Efficient Autoscaling Cross-Browser Testing Cloud Platform based on Selenium Grid, Kubernetes and KEDA. 1061-1077 - Po-Shen Lin, Nai-Wei Lin, Ming-Hsien Yeh, Chia-Chou Yeh, Hung-Pin Chiu, Mei-Chun Wu:
Syndrome Differentiation for Deficiency Syndromes in Traditional Chinese Medicine Based on Fuzzy Sets. 1079-1100 - Chiung Hon Lee, Tsung-Ju Lee, Yu-Sheng Chiang, Shih-Yi Yuan, Jyh-Hwa Liou:
Design and Implement an Intelligent System for Stock Investment Decision Making. 1101-1116 - Wen-Tin Lee, Zhun-Wei Liu:
Microservices-based DevSecOps Platform using Pipeline and Open Source Software. 1117-1128 - Shu-Ling Chen, Chien-Hung Liu, Wen-Quan Xiao:
A Feedback-Directed Approach to Crawl Android Apps for Increasing Code Coverage. 1129-1153
- Ming-Shium Hsieh, Hideo Yokota, Ming-Dar Tsai:
Volume Manipulations for Assisting Joint Surgery Diagnoses and Simulations. 1155-1168
- Shitong Fu, Zhiqiang Yao:
Privacy Risk Estimation of Online Social Networks. 1169-1183
- Hui-Kuo Yang, Bing-Li Su, Wen-Chih Peng:
SADEM: An Effective Supervised Anomaly Detection Ensemble Model for Alert Account Detection. 1185-1207 - Shu-Ying Lin, An-Chi Wang:
Self-Attention Recurrent Conditional Generative Adversarial Networks for Corporate Credit Rating Prediction. 1209-1230
Volume 39, Number 6, November 2023
- Chien-Yao Wang, I-Hau Yeh, Hong-Yuan Mark Liao:
You Only Learn One Representation: Unified Network for Multiple Tasks. 691-709 - Chien-Yao Wang, Hong-Yuan Mark Liao, I-Hau Yeh:
Designing Network Design Strategies Through Gradient Path Analysis. 975-995 - V. Gokula Krishnan, Abdul P. A. Saleem, N. Kirubakaran, Sankaradass Veeramalai, ATA Kishore Kumar, C. Jehan, J. Deepa, G. Dhanalakshmi:
Ensemble Deep Learning Classifier with Optimized Cluster Head Selection for NIDS in MANET. 1233-1246 - Gaofeng Hong, Wei Su, Xindi Hou, Lisheng Ma:
A Green Cluster-based Traffic Information Acquisition Method in Vehicular Networks. 1247-1263 - Xifeng Wang, Limin Sun, Chao Wang, Hongsong Zhu, Lian Zhao, Shujie Yang, Changqiao Xu:
Intelligent Connected Vehicle Security: Threats, Attacks and Defenses. 1265-1303 - Xianchuan Ling, Zhang Xin, Huiru Wang, Guozhu Zhao, Huanhuan Zhao, Sheng-Hui Zhao, Zenghui Ding:
A Schizophrenia Screening Method Based on Fine-grained Voice Features and Network Isolation Privacy Protection. 1305-1319 - Shiyang Ma, Yulong Shen, Xuewen Dong, Wei Tong, Lingxiao Yang:
Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process. 1321-1339 - Bao Gui, Sheng-Hui Zhao, Gui-Lin Chen, Bin Yang:
Rate Fairness Maximization via a DRL Algorithm in Vehicular Networks. 1341-1355 - Muhammet Pakyürek, Selman Kulac:
A Dynamic Optimization based Algorithm for Pilot Assignment in Massive MIMO. 1357-1369 - Mehdi Merouane:
Convenient Detection Method for Anonymous Networks "I2P vs Tor". 1371-1382 - Ravi Kumar Suggala, M. Vamsi Krishna, Sangram Keshari Swain:
Discover the New Factor for Dengue Fever Outbreaks and Predicted using Bayes Network-PSO (BN-PSO). 1383-1401 - Yi-Yuan Chen, Kuochen Wang, Hao-Wei Chung, Chien-Chih Chen, Bohau Huang, I-Wei Lu:
Multi-Person Pose Estimation using an Ordinal Depth-Guided Convolutional Neural Network. 1403-1420 - Xiaowen Zhang, Jing Shan, Wen-Yi Tang, Li Yan, Zongmin Ma:
Inconsistency Detection for Spatiotemporal Knowledge Graph with Entity Semantics and Spatiotemporal Features. 1421-1436 - Duen-Ren Liu, Yang Huang, Ching-Yi Tseng, Shin-Jye Lee:
Hybrid Generative Adversarial Networks for News Recommendation. 1437-1457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.