DOI QR코드

DOI QR Code

Advanced Big Data Analysis, Artificial Intelligence & Communication Systems

  • Jeong, Young-Sik (Dept. of Multimedia Engineering, Dongguk University) ;
  • Park, Jong Hyuk (Dept. of Computer Science and Engineering, Seoul National University of Science & Technology (SeoulTech))
  • Received : 2019.01.24
  • Accepted : 2019.02.19
  • Published : 2019.02.28

Abstract

Recently, big data and artificial intelligence (AI) based on communication systems have become one of the hottest issues in the technology sector, and methods of analyzing big data using AI approaches are now considered essential. This paper presents diverse paradigms to subjects which deal with diverse research areas, such as image segmentation, fingerprint matching, human tracking techniques, malware distribution networks, methods of intrusion detection, digital image watermarking, wireless sensor networks, probabilistic neural networks, query processing of encrypted data, the semantic web, decision-making, software engineering, and so on.

Keywords

References

  1. Y. Wang and X. Xu, "An improved level set method to image segmentation based on saliency," Journal of Information Processing Systems, vol. 15, no. 1, pp. 7-21, 2019. https://doi.org/10.3745/JIPS.02.0105
  2. K. Khongkraphan, "An efficient fingerprint matching by multiple reference points," Journal of Information Processing Systems, vol. 15, no. 1, pp. 22-33, 2019, https://doi.org/10.3745/JIPS.04.0098
  3. J. Zhu, F. Yu, M. Sun, D. Zhao, and Q. Geng, "Foreign detection based on wavelet transform algorithm with image analysis mechanism in the inner wall of the tube," Journal of Information Processing Systems, vol. 15, no. 1, pp. 34-46, 2019. https://doi.org/10.3745/JIPS.02.0106
  4. J. Park and S. Lee, "A study on an automatic multi-focus system for cell observation," Journal of Information Processing Systems, vol. 15, no. 1, pp. 47-54, 2019. https://doi.org/10.3745/JIPS.04.0099
  5. J. Li and M. Hou, "HRSF: single disk failure recovery for liberation code based storage systems," Journal of Information Processing Systems, vol. 15, no. 1, pp. 55-66, 2019. https://doi.org/10.3745/JIPS.01.0035
  6. S. M. Ramachandra, H. S. Jayanna, and Ramegowda "Hierarchical graph based segmentation and consensus based human tracking technique," Journal of Information Processing Systems, vol. 15, no. 1, pp. 67-90, 2019. https://doi.org/10.3745/JIPS.04.0100
  7. H. Chao, C. Song, B. Y. Lu, and Y. L. Liu, "Feature extraction based on DBN-SVM for tone recognition," Journal of Information Processing Systems, vol. 15, no. 1, pp. 91-99, 2019. https://doi.org/10.3745/JIPS.04.0101
  8. S. Y. Choi, C. G. Lim, and Y. M. Kim, "Automated link tracing for classification of malicious websites in malware distribution networks," Journal of Information Processing Systems, vol. 15, no. 1, pp. 100-115, 2019. https://doi.org/10.3745/JIPS.03.0107
  9. L. Zhao and Y. Long, "An improved PSO algorithm for the classification of multiple power quality disturbances," Journal of Information Processing Systems, vol. 15, no. 1, pp. 116-126, 2019. https://doi.org/10.3745/JIPS.04.0102
  10. S. C. Oh and M. Choi, "A simple and effective combination of user-based and item-based recommendation methods" Journal of Information Processing Systems, vol. 15, no. 1, pp. 127-136, 2019. https://doi.org/10.3745/JIPS.01.0036
  11. R. Zhang and X. Xiao, "An intrusion detection method based on changes of antibody concentration in immune response," Journal of Information Processing Systems, vol. 15, no. 1, pp. 137-150, 2019. https://doi.org/10.3745/JIPS.03.0108
  12. Y. Lee and S. Park, "MBS-LVM: a high-performance logical volume manager for memory bus-connected storages over NUMA servers," Journal of Information Processing Systems, vol. 15, no. 1, pp. 151-158, 2019. https://doi.org/10.3745/JIPS.01.0037
  13. M. A. I. Mahmoud and H. Ren, "Forest fire detection and identification using image processing and SVM," Journal of Information Processing Systems, vol. 15, no. 1, pp. 159-168, 2019. https://doi.org/10.3745/JIPS.01.0038
  14. J. Panyavaraporn and P. Horkaew, "Wavelet-based digital image watermarking by using Lorenz chaotic signal localization," Journal of Information Processing Systems, vol. 15, no. 1, pp. 169-180, 2019. https://doi.org/10.3745/JIPS.03.0109
  15. H. S. Sim, "A study on the development and effect of smart manufacturing system in PCB line," Journal of Information Processing Systems, vol. 15, no. 1, pp. 181-188, 2019. https://doi.org/10.3745/JIPS.04.0103
  16. L. Chen, Y. Wang, and C. Su, "Simulation study on measuring pulverized coal concentration in power plant boiler," Journal of Information Processing Systems, vol. 15, no. 1, pp. 189-202, 2019. https://doi.org/ 10.3745/JIPS.04.0104
  17. J. S. Terence and G. Purushothaman, "A novel technique to detect malicious packet dropping attacks in wireless sensor networks," Journal of Information Processing Systems, vol. 15, no. 1, pp. 203-216, 2019. https://doi.org/10.3745/JIPS.03.0110
  18. J. H. Huh and K. Seo, "Digitalization of seafarer's book for authentication and e-navigation," Journal of Information Processing Systems, vol. 15, no. 1, pp. 217-232, 2019. https://doi.org/10.3745/JIPS.04.0105