DOI QR코드

DOI QR Code

New Approaches to Advanced Network and Image Processing


Abstract

Keywords

References

  1. W. Pedrycz, "Granular bidirectional and multidirectional associative memories: towards a collaborative buildup of granular mappings," Journal of Information Processing Systems, vol. 13, no. 3, pp. 435-447, 2017. http://doi.org/10.3745/JIPS.02.0058.
  2. L. Wang, C. Wang, and X. Zhou, "Blind image quality assessment on Gaussian blur images," Journal of Information Processing Systems, vol. 13, no. 3, pp. 448-463, 2017. http://doi.org/10.3745/JIPS.02.0059.
  3. L. J. Karam, T. Ebrahimi, S. S. Hemami, T. N. Pappas, R. J. Safranek, Z. Wang, and A. B. Watson, "Introduction to the issue on visual media quality assessment," IEEE Journal of Selected Topics in Signal Processing, vol. 3, no. 2, pp. 189-192, 2009. https://doi.org/10.1109/JSTSP.2009.2015485
  4. H. H. Bu, N. C. Kim, C. J. Moon, and J. H. Kim, "Content-based image retrieval using combined color and texture features extracted by multi-resolution multi-direction filtering," Journal of Information Processing Systems, vol. 13, no. 3, pp. 464-475, 2017. http://doi.org/10.3745/JIPS.02.0060.
  5. Y. D. Chun, N. C. Kim, and I. H. Jang, "Content-based image retrieval using multiresolution color and texture features," IEEE Transactions on Multimedia, vol. 10, no. 6, pp. 1073-1084, 2008. https://doi.org/10.1109/TMM.2008.2001357
  6. S. Agarwal, A. K. Verma, and P. Singh, "Content based image retrieval using discrete wavelet transform and edge histogram Descriptor," in Proceedings of International Conference on Information Systems and Computer Networks, Mathura, India, 2013, pp. 19-23.
  7. S. B. Rathod and V. K. Reddy, "NDynamic framework for secure VM migration over cloud computing," Journal of Information Processing Systems, vol. 13, no. 3, pp. 476-490, 2017. http://doi.org/10.3745/JIPS.01.0015.
  8. H. Jin, W. Gao, S. Wua, X. Shi, X. Wu, and F. Zhou, "Optimizing the live migration of virtual machine by CPU scheduling," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1088-1096, 2011. https://doi.org/10.1016/j.jnca.2010.06.013
  9. D. Loreti and A. Ciampolini, "A decentralized approach for virtual infrastructure management in cloud datacenters," International Journal on Advances in Intelligent Systems, vol. 7, no. 3-4, pp. 507-518, 2014.
  10. P. Chu, S. Cho, S. Sim, K. Kwak, and K. Cho, "A fast ground segmentation method for 3D point cloud," Journal of Information Processing Systems, vol. 13, no. 3, pp. 491-499, 2017. http://doi.org/10.3745/JIPS.02.0061.
  11. L. Zhao and N. Chen, "An improved zone-based routing protocol for heterogeneous wireless sensor networks", Journal of Information Processing Systems, vol. 13, no. 3, pp. 500-517, 2017. http://doi.org/10.3745/JIPS.03.0072.
  12. H. I. Kim, H. Yang, M. Yoon, and J. W. Chang, "Development of a CUBRID-based distributed parallel query processing system," Journal of Information Processing Systems, vol. 13, no. 3, pp. 518-532, 2017. http://doi.org/10.3745/JIPS.01.0016.
  13. CUBRID Shard [Online]. Available: http://www.cubrid.com/manual/91/shard.html.
  14. Q. Meng, X. Yu, C. Yao, X. Li, P. Li, and X. Zhao, "Improvement of OPW-TR algorithm for compressing GPS trajectory data," Journal of Information Processing Systems, vol. 13, no. 3, pp. 533-545, 2017. http://doi.org/10.3745/JIPS.03.0073.
  15. H. Jung and N. Kim, "Multicast tree construction with user-experienced quality for multimedia mobile networks," Journal of Information Processing Systems, vol. 13, no. 3, pp. 546-558, 2017. http://doi.org/10.3745/JIPS.01.0017.
  16. M. M. Singh, P. J. Ng, K. M. Yap, M. H. Husin, and N. H. A. H. Malim, "Cyberbullying and a mobile game app? An initial perspective on an alternative solution," Journal of Information Processing Systems, vol. 13, no. 3, pp. 559-572, 2017. http://doi.org/10.3745/JIPS.04.0033.
  17. European Network and Information Security Agency, "Cyber-bullying and online grooming: helping to protect against the risks," 2011 [Online]. Available: https://www.enisa.europa.eu/publications/Cyber-Bullying%20and%20Online%20Grooming.
  18. R. Dredge, J. Gleeson, and X. P. Garcia, "Cyberbullying in social networking sites: an adolescent victim's perspective," Computers in Human Behavior, vol. 36, pp. 13-20, 2014. https://doi.org/10.1016/j.chb.2014.03.026
  19. T. Zhu, X. Zou, and J. Pan, "Query with SUM aggregate function on encrypted floating-point numbers in cloud," Journal of Information Processing Systems, vol. 13, no. 3, pp. 573-589, 2017. http://doi.org/10.3745/JIPS.04.0034.
  20. J. H. Jun, M. J. Kim, Y. S. Jang, and S. H. Kim "Fire detection using multi-channel information and gray level cooccurrence matrix image features," Journal of Information Processing Systems, vol. 13, no. 3, pp. 590-598, 2017. http://doi.org/10.3745/JIPS.02.0062.
  21. S. A. Ali, M. J. Jawad, and M. A. Naser, "Copyright protection for digital image by watermarking technique," Journal of Information Processing Systems, vol. 13, no. 3, pp. 599-617, 2017. http://doi.org/10.3745/JIPS.03.0074.
  22. S. Gan, J. Zhou, and K. Wei, "HESnW: History Encounters-Based Spray-and-Wait routing protocol for delay tolerant network", Journal of Information Processing Systems, vol. 13, no. 3, pp. 618-629, 2017. http://doi.org/10.3745/JIPS.03.0075.
  23. S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss, "Delay-tolerant networking: an approach to interplanetary internet," IEEE Communications Magazine, vol. 41, no. 6, pp. 128-136, 2003.
  24. K. Fall, "A delay-tolerant network architecture for challenged internets," in Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications, Karlsruhe, Germany, 2003, pp. 27-34.
  25. J. Cao, Y. Zhang, L. Xie, and G. Cao, "Consistency of cooperative caching in mobile peer-to-peer systems over MANET," International Journal of Parallel Emergent and Distributed Systems, vol. 21, no. 3, pp. 573-579, 2006.
  26. I. H. Lee and H. Lee, "Achievable rate analysis for opportunistic non-orthogonal multiple access-based cooperative relaying systems," Journal of Information Processing Systems, vol. 13, no. 3, pp. 630-642, 2017. http://doi.org/10.3745/JIPS.03.0076.
  27. Z. Ding, Z. Yang, P. Fan, and H. V. Poor, "On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users," IEEE Signal Processing Letters, vol. 21, no. 12, pp. 1501-1505, 2014. https://doi.org/10.1109/LSP.2014.2343971
  28. H. T. Do and S. Y. Chung, "Linear beamforming and superposition coding with common information for the Gaussian MIMO broadcast channel," IEEE Transactions on Communications, vol. 57, no. 8, pp. 2484-2494, 2009. https://doi.org/10.1109/TCOMM.2009.08.070419