Journal Contents: International Journal of Software Innovation (IJSI)

View the International Journal of Software Innovation (IJSI) home page for complete details.
Volume 10 (2022)
Issue 1
Article 3
Improving Software Design by Mitigating Code Smells (pages 1-21)
Randeep Singh (Maharishi Markandeshwar (Deemed) University, India), Amit Kumar Bindal (Maharishi Markandeshwar (Deemed) University, India), Ashok Kumar (Maharishi Markandeshwar (Deemed) University, India)
Article 5
XHDLNet Classification of Virus-Borne Diseases for Chest X-Ray Images Using a Hybrid Deep Learning Approach (pages 1-14)
Srishti Choubey (MATS University, Raipur, India), Snehlata Barde (MATS University, Raipur, India), Abhishek Badholia (School of Engineering and Information Technology, Raipur, India)
Article 5
Dynamic Butterfly ACM for Risk Optimization on the Real-Time Unix Operating System (pages 1-16)
Abhishek Asthana (Shri Rawatpura Sarkar University, India), Padma Lochan Pradhan (Shri Rawatpura Sarkar University, India)
Article 6
A Support System for Collecting/Selecting Topics in Chat Using Context/Physiological Information (pages 1-15)
Keiko Yamamoto (Kyoto Institute of Technology, Japan), Shunya Furuta (Kyoto Institute of Technology, Japan), Yoshihiro Tsujino (Kyoto Institute of Technology, Japan)
Article 6
Stereo Seam Coupling and Depth Distortion Score in 3D Image Retargeting Using DMA Algorithm (pages 1-10)
Mahendra Tulsiram Jagtap (Lingaya's Vidyapeeth, India), Dineshkumar Jawalkar (Lingaya's Vidyapeeth, India)
Article 7
Economics of Software Testing Using Discrete Approach (pages 1-13)
Avinash K. Shrivastava (International Management Institute, Kolkata, West Bengal, India), Ruchi Sharma (International Management Institute, Kolkata, West Bengal, India)
Article 7
E-Monitoring System: Analyzing the Benefits and Effects of an E-Monitoring System in the Banks of Kerala (pages 1-19)
Bharathiveena V. (Department of Management, Noorul Islam Centre for Higher Education, Kumaracoil, India), Janardhanan Pillai (Faculty of Management, Noorul Islam Centre for Higher Education, Kumaracoil, India)
Article 8
Requirements Metamodeling for Self-Adaptive Embedded Systems (pages 1-24)
Zina Mecibah (ReLaCS2 Laboratory, University of Oum El Bouaghi, Algeria), Fateh Boutekkouk (ReLaCS2 Laboratory, University of Oum el Bouaghi, Algeria)
Article 8
The Factors Affecting Continuous Usage Intention of Computer-Aided Engineering (CAE) Software (pages 1-13)
Yong Won Cho (Soongsil University, South Korea), Dae Sik Kim (Soongsil University, South Korea), Huy Tung Phuong (Soongsil University, South Korea), Gwangyong Gim (Soongsil University, South Korea)
Article 9
Analysis of Psychological Distress During COVID-19 Among Professionals (pages 1-17)
Supriya Raheja (Amity University, Noida, India)
Article 9
TOE Model Analysis for AI Vision Open API (pages 1-16)
Hyun-Ho Jang (Soongsil University, South Korea), Huy Tung Phuong (Soongsil University, South Korea), Thi-Thanh-Thao Vo (Vietnam-Korea University of Information and Communication Technology, The University of Danang, Vietnam), Gwangyong Gim (Soongsil University, South Korea)
Article 10
Detection of Sexually Harassing Tweets in Hindi Using Deep Learning Methods (pages 1-15)
Tarun Jain (Manipal University, India), Rishabh Jain (Infoedge India Limited, India), Shivaji Ray Chaudhuri (Manipal University, India), Shrey Upadhyay (Manipal University, India), Arjun Singh (Manipal University, India), Vivek K. Verma (Manipal University, India), Aditya Sinha (Manipal University, India)
Article 11
SBCSim: Classification and Prioritization of Similarities Between Versions (pages 1-18)
Ritu Garg (Indira Gandhi Delhi Technical University for Women, India), Rakesh Kumar Singh (Indira Gandhi Delhi Technical University for Women, India)
Article 12
Depression Detection Model in Social Network Content: A Survey (pages 1-12)
Esraa M. Rabie (Mathematics and Computer Science Department, Faculty of Science, Beni-Suef University, Beni-Suef, Egypt), Atef F. Hashem (Department of Mathematics and Statistics, College of Science, Imam, Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia), Fahad Kamal Alsheref (Information Systems Department, Faculty of Computers and Artificial Intelligence, Beni-Suef University, Beni-Suef, Egypt)
Article 12
A Survey on Characterizing the Empirical Analysis, Proposed Approaches, and Research Trends for Architectural Decay (pages 1-18)
Ahmed Baabad (Hadhramout University, Yemen), Hazura Binti Zulzalil (Universiti Putra Malaysia, Malaysia), Saadah Hassan (Universiti Putra Malaysia, Malaysia), Salmi Binti Baharom (Universiti Putra Malaysia, Malaysia)
Article 13
Efficient Scheduling of Jobs and Allocation of Resources in Cloud Computing (pages 1-13)
Sandeep Gajanan Sutar (Visvesvaraya Technological University (VTU), India), Kumarswamy S. (University Visvesvaraya College of Engineering, India)
Article 13
A Survey of Digital Image Watermarking Techniques in Spatial, Transform, and Hybrid Domains (pages 1-21)
K. Prabha (Department of Computer Science, Nesamony Memorial Christian College, Marthandam affiliated to Manonmaniam Sundaranar University, Tirunelveli, India), I. Shatheesh Sam (Department of PG Computer Science, Nesamony Memorial Christian College, Marthandam affiliated to Manonmaniam Sundaranar University, Tirunelveli, India)
Article 13
Geolocation-Based Mobile Application (pages 1-12)
Twana Mustafa (Firat University, Turkey), Zardasht Abdulaziz Shwany (Erbil Polytechnic University, Iraq), Shwan Hadi Saeed (Salahaddin University, Iraq), Karwan Khoshnaw (Erbil Polytechnic University, Iraq), Shayda Khudhur Ismail (Network Department, Information and Communication Technology Directory, Higher Education and Scientific Research, Erbil, Iraq), Rzgar Farooq Rashid (Department of Medical Laboratory Science, College of Science Knowledge University, Erbil, Iraq)
Article 14
A Comprehensive Fault Prediction Model for Improving Software Reliability (pages 1-16)
Kamlesh Kumar Raghuvanshi (Ramanujan College, University of Delhi, India), Arun Agarwal (Ramanujan College, University of Delhi, India), Khushboo Jain (DIT University, India), Amit Kumar Singh (BBAU, Lucknow, India)
Article 14
Construction of Fuzzy Database and Analysis Interface Using Fuzzy Graphs for Management System Operation Analysis (pages 1-16)
Yasunori Shiono (Tokyo University of Technology, Japan), Toshihiro Yoshizumi (Kaetsu University, Japan), Takaaki Goto (Toyo University, Japan), Tadaaki Kirishima (Toyo University, Japan), Kensei Tsuchida (Toyo University, Japan)
Article 14
A Two-Level Multi-Modal Analysis for Depression Detection From Online Social Media (pages 1-22)
Dhrubasish Sarkar (Amity University, India), Piyush Kumar (Amity University, India), Poulomi Samanta (Amity University, India), Suchandra Dutta (Digital University, India), Moumita Chatterjee (Aliah University, India)
Article 14
Text-Dependent and Text-Independent Writer Identification Approaches: Challenges and Future Directions (pages 1-23)
Rajandeep Kaur (National Institute of Technology, Jalandhar, India), Rajneesh Rani (National Institute of Technology, Jalandhar, India), Roop Pahuja (National Institute of Technology, Jalandhar, India)
Article 15
Accurate and Language Agnostic Code Clone Detection by Measuring Edit Distance of ANTLR Parse Tree (pages 1-22)
Sanjay B. Ankali (KLE College of Engineering and Technology, Chikodi, India), Latha Parthiban (Pondicherry University Community College, India)
Article 15
C-HUIM: A Novel Framework for Customized High-Utility Itemset Mining (pages 1-11)
Sandipkumar Chandrakant Sagare (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India), Dattatraya Vishnu Kodavade (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India)
Article 16
An Early Predictive and Recovery Mechanism for Scheduled Outages in Service-Based Systems (SBS) (pages 1-35)
Swati Goel (Jawaharlal Nehru University, India), Ratneshwer Gupta (Jawaharlal Nehru University, India)
Article 16
Depression Identification Through Tweet Clusters (pages 1-14)
Abhishek Masand (Manipal University Jaipur, India), Suryansh Chauhan (Manipal University Jaipur, India), Tarun Jain (Manipal University Jaipur, India)
Article 17
A Metaheuristic Optimization Approach-Based Anomaly Detection With Lasso Regularization (pages 1-11)
Vivek Kumar Verma (Manipal University Jaipur, India), Payal Garg (G. L. Bajaj Institute of Technology and Management, India), Pradeep Kumar Tiwari (Manipal University Jaipur, India), Tarun K. Jain (Manipal University Jaipur, India)
Article 18
A Study on the Relationship Between Government Regulations and Innovation Efficiency in Information and Communication Technology (ICT) Industry (pages 1-12)
Jaeho Shin (Hansung University, South Korea), Yeongjun Kim (Incheon National University, South Korea), Changhee Kim (Incheon National University, South Korea)
Article 18
Face Recognition Through Multi-Resolution Images (pages 1-15)
Hazar Mliki (MIRACL-ENET'Com, University of Sfax, Tunisia), Emna Fendri (MIRACl-FS, University of Sfax, Tunisia), Ahmed Chebil (MIRACl-FS, University of Sfax, Tunisia)
Article 18
Multi-Platform Application to Explore Avalanche Information for Bahang Region (pages 1-9)
Neha Ajit Kushe (SNDT Women's University, India), Ganesh M. Magar (SNDT Women's University, India)
Article 19
Optimal Routing for Vehicles and Pedestrians in the Urban Area (pages 1-18)
Gitae Kim (Hanbat National University, South Korea), Jinsik Choe (Hanbat National University, South Korea)
Article 19
A Comparative Study of Machine Learning Techniques for Android Malware Detection (pages 1-13)
Mohamed Guendouz (GeCoDe Laboratory, Dr. Moulay Tahar University of Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Dr. Moulay Tahar University of Saida, Algeria)
Article 19
Hybrid Autoscaling Strategy on Container-Based Cloud Platform (pages 1-12)
Truong-Xuan Do (Thuy Loi University, Vietnam), Vu Khanh Ngo Tan (University of Economics Ho Chi Minh City, Vietnam)
Article 20
Article 20
A Hybrid Siamese-LSTM (Long Short-Term Memory) for Classification of Alzheimer's Disease (pages 1-14)
Aparna M. (VIT-AP University, India), Srinivasa B. Rao (VIT-AP University, India)
Article 20
Hybrid Representation to Locate Vulnerable Lines of Code (pages 1-19)
Mohammed Zagane (University Mustapha Stambouli of Mascara, Algeria), Mamdouh Alenezi (Prince Sultan University, Riyadh, Saudi Arabia), Mustapha Kamel Abdi (Université Oran 1, Algeria)
Article 20
Determining Optimal Release and Testing Stop Time of a Software Using Discrete Approach (pages 1-13)
Avinash K. Shrivastava (International Management Institute, Kolkata, India), Ruchi Sharma (International Management Institute, Kolkata, India)
Article 21
A Machine Learning-Based Framework for Diagnosis of Breast Cancer (pages 1-11)
Ravi Kumar Sachdeva (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India), Priyanka Bathla (Chandigarh University, Punjab, India)
Article 21
A Survey on Brain Tumor Segmentation and Classification (pages 1-21)
T.A. Jemimma (Department of Computer Science, Nesamony Memorial Christian College affiliated to ManonmaniamSundaranar University, Tirunelveli, India), Y. Jacob Vetharaj (Department of Computer Science, Nesamony Memorial Christian College affiliated to Manonmaniam Sundaranar University, Tirunelveli, India)
Article 21
Class Imbalance Learning to Heterogeneous Cross-Software Projects Defect Prediction (pages 1-18)
Rohit Vashisht (Jamia Millia Islamia, India), Syed Afzal Murtaza Rizvi (Jamia Millia Islamia, India)
Article 21
Forward Kinematic Analysis of 6-R Industrial Robot Using Active Sampled Neural Network Regressor (pages 1-14)
Kesaba P. (IGIT Sarang, India), Bibhuti Bhusan Choudhury (IGIT Sarang, India)
Article 22
Analysis of Cognitive Levels of Questions With Bloom's Taxonomy: A Case Study (pages 1-22)
Ravi Lourdusamy (Sacred Heart College, Tirupattur, India), Poovizhi Magendiran (Sacred Heart College, Tirupattur, India), Clayton Michael Fonceca (Sacred Heart College, Tirupattur, India)
Article 22
A Performance Improvement Model for Cloud Computing Using Simulated Annealing Algorithm (pages 1-17)
Geeta Singh (Dr. A. P. J. Abdul Kalam Technical University, Lucknow, India), Santosh Kumar (ABES Engineering College, Ghaziabad, India), Shiva Prakash (Madan Mohan Malaviya University of Technology, Gorakhpur, India)
Article 22
An Efficient Approach of Vehicle Detection Based on Deep Learning Algorithms and Wireless Sensors Networks (pages 1-16)
Cherifa Nakkach (National Engineering School of Tunis, Tunisia), Amira Zrelli (National Engineering School of Tunis, Tunisia), Tahar Ezzdine (National Engineering School of Tunis, Tunisia)
Article 22
A Scalable Real-Time Agent-Based Information Retrieval Engine (pages 1-14)
Falah Hassan Ali Al-Akashi (University of Kufa, Iraq), Diana Inkpen (University of Ottawa, Canada)
Article 23
Orrs Orchestration of a Resource Reservation System Using Fuzzy Theory in High-Performance Computing: Lifeline of the Computing World (pages 1-28)
Ashish Tiwari (National Institute of Technology, Kurukshetra, India), Ritu Garg (National Institute of Technology, Kurukshetra, India)
Article 23
Bio-Inspired Multi-Level Hybrid Crypto System (pages 1-16)
Padmapriya M. K. (New Horizon College of Engineering, India), Pamela Vinitha Eric (Presidency University, India)
Article 23
An Empirical Study on Continuous Usage Intention of Food Delivery Apps (pages 1-11)
Donghyuk Jo (Soongsil University, South Korea), Seul-Ki Lee (Soongsil Universtiy, South Korea)
Article 23
Deep Learning-Based Tomato's Ripe and Unripe Classification System (pages 1-20)
Prasenjit Das (Dept. of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, India), Jay Kant Pratap Singh Yadav (Dept. of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad,, India), Laxman Singh (Dept. of Electronics and Communication Engineering, Noida Institute of Engg. & Technology (NIET), Greater Noida, India)
Article 23
Automata-Based Approach to Manage Self-Adaptive Component-Based Architectures (pages 1-22)
Abdelfetah Saadi (University of Science and Technology Houari Boumediene, Algeria), Youcef Hammal (University of Science and Technology Houari Boumediene, Algeria), Mourad Chabane Oussalah (LS2N, Faculté des Sciences de Nantes, France)
Article 24
CIAFP: A Change Impact Analysis with Fault Prediction for Object-Oriented Software (pages 1-19)
Dharmveer Kumar Yadav (Katihar Engineering College, Katihar, India), Chandrashekhar Azad (National Institute of Technology, Jamshedpur, India), Jagannath Singh (Kalinga Institute of Industrial Technology, Bhubaneswar, India), Dibya Ranjan Das Adhikary (Siksha ‘O' Anusandhan (Deemed), Bhubaneswar, India)
Article 24
Androscanreg 2.0: Enhancement of Android Applications Analysis in a Flexible Blockchain Environment (pages 1-28)
Abdellah Ouaguid (Hassan II University, Morocco), Fadwa Fathi (Hassan II University, Morocco), Mouad Zouina (Mohammed V University of Rabat, Morocco), Mohammed Ouzzif (Hassan II University, Morocco), Noreddine Abghour (Hassan II University, Morocco)
Article 24
Assistive Technology-Based Solution for Hearing Impairment Using Smartphones (pages 1-17)
Vasu Mehra (JSS Academy of Technical Education, India), Dhiraj Pandey (JSS Academy of Technical Education, India)
Article 24
Empirical Analysis of Pair Programming Using Bloom's Taxonomy and Programmer Rankers Algorithm to Improve the Software Metrics in Agile Development (pages 1-15)
Regis Anne W. (PSG College of Technololgy, India), Carolin Jeeva S. (Karunya Institute of Technology and Sciences, India)
Article 25
Embedding Secret Data in Digital Media Using Texture Synthesis (pages 1-15)
Suraj Krishna Patil (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India), Prashantkumar Marutirao Gavali (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India), Alankar Shantaram Shelar (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India), Sandipkumar Chandrakant Sagare (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India)
Article 25
Colorectal Cancer Disease Classification Using Mobilenetv2 Based on Deep Learning (pages 1-18)
Mallela Siva Naga Raju (VIT-AP University, India), Mallela Siva B. Srinivasa Rao (VIT-AP University, India)
Article 25
Failure Prediction Approach in Agile Software Development (pages 1-11)
Bulqees Alajaleen (Isra University, Jordan), Aysh Alhroob (Isra University, Jordan)
Article 26
Finding Optimal Transport Route and Retail Outlet Location Using Mobile Phone Location Data (pages 1-20)
Giridhar Maji (Asansol Polytechnic, West Bengal, India), Soumya Sen (Soumya Sen, A. K. Choudhury School of Information Technology, University of Calcutta, West Bengal, India)
Article 26
Defect Detection in Printed Circuit Boards Using Leaky-LeNet 5 (pages 1-13)
Jithendra P. R. Nayak (GSSS Institute of Engineering and Technology for Women, India), Parameshachari B. D. (Nitte Meenakshi Institute of Technology, India)
Article 27
Popularity Prediction of Video Content Over Cloud-Based CDN Using End User Interest (pages 1-13)
Rohit Kumar Gupta (Manipal University Jaipur, India), Shabbir Kurabadwala (Manipal University Jaipur, India), Pradeep Kumar Tiwari (Manipal University Jaipur, India), Ankit Mundra (Manipal University Jaipur, India)
Article 27
Development of APP-Controlled Hydraulic Damping Adjustment System for Bike Front Fork (pages 1-16)
Hsiung-Cheng Lin (National Chin-Yi University of Technology, Taiwan), Ming-Dian Wang (National Chin-Yi University of Technology, Taiwan), Jun-Wei Chen (National Chin-Yi University of Technology, Taiwan), Hong-Ming Chen (Chienkuo Technology University, Taiwan)
Article 27
An Intelligent System for Parkinson's Diagnosis Using Hybrid Feature Selection Approach (pages 1-13)
Rohit Lamba (ECE Department, MMEC, Maharishi Markandeshwar (Deemed), India), Tarun Gulati (ECE Department, MMEC, Maharishi Markandeshwar (Deemed), India), Anurag Jain (School of Computer Sciences, University of Petroleum and Energy Studies, Dehradun, India)
Article 28
Prioritizing COVID-19 Vaccine Delivery for the Indian Population (pages 1-21)
Meet Singh (Amity University, Kolkata, India), Subrata Modak (Maryland Institute of Technology and Management, India), Dhrubasish Sarkar (Amity University, Kolkata, India)
Article 28
Development of Bresenham-Based Step Compensation Algorithm for Manipulator Trajectory Planning (pages 1-16)
Yan Zhang (Hebei University of Science and Technology, China), Jianbing Han (Hebei University of Science and Technology, China), Hsiung-Cheng Lin (National Chin-Yi University of Technology, Taiwan), Yuqing Jin (Hebei University of Science and Technology, China), Zihang Gu (Hebei University of Science and Technology, China)
Article 28
A Hybrid Approach for Feature Selection Based on Correlation Feature Selection and Genetic Algorithm (pages 1-17)
Pooja Rani (MMEC and MMICTBM, Maharishi Markandeshwar (Deemed), India), Rajneesh Kumar (Department of CSE, MMEC, Maharishi Markandeshwar (Deemed), India), Anurag Jain (School of Computer Sciences, University of Petroleum and Energy Studies, Dehradun, India)
Article 29
Scene Categorization From Indoor-Outdoor Images Using Hybrid MAMF-Based Deep Convolutional Neural Networks (pages 1-21)
Jayamala Dhananjay Pakhare (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India), Mahadev D. Uplane (Savitribai Phule, Pune University, India)
Article 29
Evaluation and Ranking of E-Government Websites Using Weighted-Combinative Distance-Based Assessment Approach (pages 1-15)
Aakash Gupta (Gateway Institute of Engineering and Technology, India), Mohit Bansal (Gateway Institute of Engineering and Technology, India)
Article 30
Social Interaction With Software Connectors and the Function of Facade Component in Secure Application Logic (pages 1-15)
Faisal Nabi (University of Southern Queensland, Australia), Jianming Yong (University of Southern Queensland, Australia), Xiaohui Tao (University of Southern Queensland, Australia)
Article 30
Exploring the Antecedents for Continuance Intention of Electronic Litigation Systems (pages 1-12)
Donghyuk Jo (Soongsil University, South Korea), Hyeon Cheol Kim (Soongsil University, South Korea)
Article 31
Formal Verification and Implementation of an E-Voting System (pages 1-22)
Said Meghzili (University Center Abdelhafid Boussouf-Mila, Algeria), Allaoua Chaoui (University Constantine 2-Abdelhamid Mehri, Algeria), Raida Elmansouri (University Constantine 2-Abdelhamid Mehri, Algeria), Bardis Nadjla Alloui (University Constantine 2-Abdelhamid Mehri, Algeria), Amina Bouabsa (University Constantine 2-Abdelhamid Mehri, Algeria)
Article 32
Generation of Unusual Plasma Discharge Video by Generative Adversarial Network (pages 1-24)
Tran Vo Khanh Ngan (Kyoto Institute of Technology, Japan), Teruhisa Hochin (Kyoto Institute of Technology, Japan), Hiroki Nomiya (Kyoto Institute of Technology, Japan), Hideya Nakanishi (National Institute for Fusion Science, Japan), Mamoru Shoji (National Institute for Fusion Science, Japan)
Article 32
A SWOT Analysis of Software Requirement Validation Techniques (pages 1-24)
Boluwaji Ade Akinnuwesi (University of Eswatini, Eswatini), Stephen Gbenga Fashoto (University of Eswatini, Eswatini), Elliot Mbunge (University of Eswatini, Eswatini), Petros Mashwama (University of Eswatini, Eswatini), Patrick Adeomo Owate (Lagos State University, Nigeria)
Article 33
Highly-Accurate Temperature-Compensated Pneumatic Measurement Using Piezoresistive Pressure Sensor (pages 1-14)
Hsiung-Cheng Lin (National Chin-Yi University of Technology, Taiwan), Wei-Zhi Chen (National Chin-Yi University of Technology, Taiwan), Wei-Chieh Shih (National Chin-Yi University of Technology, Taiwan)
Article 34
Hybrid Method for Semantic Similarity Computation Using Weighted Components in Ontology (pages 1-12)
Kanishka N. Kamble (Shivaji University, India), Suresh K. Shirgave (DKTE Society's Textile and Engineering Institute, India)
Article 35
Software Defects Prediction Model with Self Improved Optimization (pages 1-21)
Shantappa G Gollagi (Department of Computer Science and Engineering, KLE Society's, KLE College of Engineering and Technology, Chikodi, Karnataka & Visvesvaraya Technological University, Belagavi, Karnataka, India), Jeneetha Jebanazer J (Department of Electronics and Communication Engineering, Panimalar Engineering College Chennai), Sridevi Sakhamuri (Department of ECM, Koneru Lakshmaiah Education Foundation)
Article 58
Impact of ICT-Based Tools on Team Effectiveness of Virtual Software Teams Working From Home Due to the COVID-19 Lockdown: An Empirical Study (pages 1-20)
Uday Kanike (Georgia State University, USA), Yusen Xia (Georgia State University, USA)
Article 59
Impact of SNS Behavior on Social Commerce Purchase Intention: Focusing on the Mediating Effect of Social Capital (pages 1-12)
Henry Ofori (Ajou University, South Korea), Juyoung Kang (Ajou University, South Korea)
Article 61
Smart Black Box DVR System in IT-Based Vehicle Emergency Rescue Environment (pages 1-10)
Sun-O Choi (Graduate School, Soongsil University, South Korea), Jongbae Kim (Soongsil University, South Korea)
Article 62
Two-Way Emergency Message Protocol in M-VANETs (pages 1-16)
Deepak Choudhary (Dr. B. R. Ambedkar National Institute of Technology, India), Roop Pahuja (Dr. B. R. Ambedkar National Institute of Technology, India)
Article 62
Deep Belief Neural Network (DBNN)-Based Categorization of Uncertain Data Streams (pages 1-18)
G. Jaya Raju (Sri Vasavi Engineering College, India), G. Samuel Vara Prasad Raju (Andhra University, India)
Article 63
Voice of Startups: What Technology Business Incubators Are Expected to Offer and Differences Between Korea and China (pages 1-13)
Li Wang (Qingdao Agricultural University, China), SungMin Bae (Hanbat National University, South Korea)
Article 63
A Systematic Literature Review on Test Case Prioritization Techniques (pages 1-36)
Harendra Singh (Department of Computer Science and Engineering, Dr. A. P. J. Abdul Kalam Technical University, Lucknow, India), Laxman Singh (Department of Electronics and Communication Engineering, Noida Institute of Engineering and Technology, Greater Noida, India), Shailesh Tiwari (Krishna Engineering College, Ghaziabad, India)
Article 64
Measuring Local Economy Efficiency With Two-Stage Bootstrap DEA: Evidence From Municipal Currency in South Korea (pages 1-14)
Hee Jay Kang (Kumoh National Institute of Technology, South Korea), Changhee Kim (Incheon National University, South Korea), Jiyoon Son (Incheon National University, South Korea)
Article 64
A Study on Autonomous Driving Simulation Using a Deep Learning Process Model (pages 1-11)
Symphorien Karl Yoki Donzia (Daegu Catholic University, South Korea), Haeng-Kon Kim (Daegu Catholic University, South Korea)
Article 65
An Improved Random Forest Based on Feature Selection and Feature Weighting for Case Retrieval in CBR Systems: Application to Medical Data (pages 1-20)
Ilhem Tarchoune (Badji Mokhtar University, Algeria), Akila Djebbar (Badji Mokhtar University, Algeria), Hayet Farida Merouani (Badji Mokhtar University, Algeria), Doha Hadji (Badji Mokhtar University, Algeria)
Article 65
The SOF Programming Paradigm: A Sequence of Pure Functions (pages 1-14)
Antoine Bossard (Kanagawa University, Japan)
Article 66
The Quality Improvement of Medical Tourism Education Service in Korea: Focusing on the Comparative Evaluation of Students and Experts (pages 1-12)
Harim Byun (Soongsil University, South Korea), Jongwoo Park (Soongsil University, South Korea)
Article 66
Information Extraction From the Agricultural and Weather Domains Using Deep Learning Approaches (pages 1-12)
Sunil Kumar (University of Petroleum and Energy Studies, India), Hanumat Sastry G. (University of Petroleum and Energy Studies, India), Venkatadri Marriboyina (Amity University, India)
Article 67
Healthcare Data Analytics Using Power BI (pages 1-10)
Nikita Sharma (Novel Medicare Solutions Private Limited, Kolkata, India), Dhrubasish Sarkar (Amity University, Kolkata, India)
Article 68
Machine Learning Model to Predict Automated Testing Adoption (pages 1-15)
Muhammad Nouman Noor (Hitec University, Taxila, Pakistan), Tamim Ahmed Khan (Bahria University, Islamabad, Pakistan), Farah Haneef (Quaid-i-Azam University, Islamabad, Pakistan), Muhammad Ismail Ramay (National Defence University, Islamabad, Pakistan)
Article 69
Factors Affecting Successful Implementation of Smart Manufacturing Systems (pages 1-18)
Jaehyeon Jun (Korea Institute for Defense Analyses, South Korea), Insu Cho (SunMoon University, South Korea)
Article 69
Detection and Classification of Brain Tumors From MRI Images Using a Deep Convolutional Neural Network Approach (pages 1-25)
Brahami Menaouer (National Polytechnic School of Oran, Algeria), Kebir Nour El-Houda (National Polytechnic School of Oran, Algeria), Dermane Zoulikha (National Polytechnic School of Oran, Algeria), Sabri Mohammed (National Polytechnic School of Oran, Algeria), Nada Matta (University of Technology of Troyes, France)
Article 70
Traffic Data Collection and Visualization Tool for Knowledge Discovery Using Google Maps (pages 1-12)
Iftekhar Hossain (University of Dhaka, Bangladesh), Naushin Nower (University of Dhaka, Bangladesh)
Article 71
A Novel Sentence Completion System for Punjabi Using Deep Neural Networks (pages 1-25)
Gurjot Singh Mahi (Punjabi University, Patiala, India), Amandeep Verma (Punjabi University, Patiala, India)
Article 72
ICHC Framework: NoSql Data Model and a Microservices-Based Solution for a Cultural Heritage Platform (pages 1-16)
Ouadie Abdelmoumni (Sidi Mohamed Ben Abdellah University, Morocco), Noureddine Chenfour (Sidi Mohamed Ben Abdellah University, Morocco)
Article 74
Keystroke-Based Biometric Authentication in Mobile Applications (pages 1-16)
Fatima Kabli (Laboratoire de Recherche en Technologie de Fabrication Mécanique, Algeria), Sad houari Nawal (Laboratoire d'Informatique Oran, Algeria), Matoug Afaf (Ecole Nationale Polytechnique d'Oran, Algeria)
Article 75
Trans_Proc: A Reconfigurable Processor to Implement The Linear Transformations (pages 1-16)
Atri Sanyal (Amity University, Kolkata, India), Amitabha Sinha (Maulana Abul Kalam Azad University of Technology, West Bengal, India)
Article 76
Developing Accessible Websites for Differently Abled People Using Open Source Tools (pages 1-21)
Prajwal S. Shirur (JSS Academy of Technical Education, Noida, India), Saksham Raghuvanshi (JSS Academy of Technical Education, Noida, India), Vikram Bali (IMS Engineering College, Ghaziabad, India)
Article 77
Assigning the Test Case Priorities Using Butterfly Optimization Algorithm for Software Test (pages 1-15)
Nagaraj V. Dharwadkar (Rajarambapu Institute of Technology, Sakhrale, India), Srikant Shetgar (Rajarambapu Institute of Technology, Sakhrale, India), Manoj Patil (Vasavi College of Engineering, Hyderabad, India), Abhijeet P. Shah (Rajarambapu Institute of Technology, Islampur, India)
Article 77
A Study on the Factors Causing the Intention to Use a Smart Tolling System (pages 1-17)
Sung il Hur (Soar IT Corporation Co. Ltd., South Korea), Yong gi Park (Graduate School, Department of Business Administration, Soongsil University, South Korea), Jin won Jang (Ernst & Young Han Young, South Korea)
Article 77
A Secure Group Data Encryption Scheme in Intelligent Manufacturing Systems for IIoT (pages 1-12)
Ming Te Chen (National Chin-Yi University of Technology, Taiwan)
Article 78
A Hybrid Optimal Feature Extraction for Brain Tumor Segmentation (pages 1-15)
P. Santhosh Kumar (Research scholar , Department of ECE, Annamalai University. Chidambaram, Tamil nadu, India), V. P. Sakthivel. (Assistant Professor, Department of EEE. Government College of Engineering, Tamilnadu, India), Manda Raju (Associate Professor, Department of ECE Kakatiya Institute of Technology and Science, Warangal, India), P. D. Sathya (Assistant Professor, Department of ECE, Annamalai University, Chidambaram, Tamil nadu, India)
Article 78
Design and Implementation of IoT Platform Education System Based on Open Source Hardware (pages 1-10)
Sun-O Choi (Graduate School, Soongsil University, South Korea), Jongbae Kim (Soongsil University, South Korea)
Article 79
Sliding Window-Based High Utility Item-Sets Mining Over Data Stream Using Extended Global Utility Item-Sets Tree (pages 1-16)
P. Amaranatha Reddy (JNTUK, India), M. H. M. Krishna Prasad (JNTUK, India)
Article 79
Structural Relationship Between Environmental Uncertainty, Organizational Agility, and Business Performance in SMMEs (pages 1-12)
Donghyuk Jo (Soongsil University, South Korea), Yong-Sun Seo (Soongsil University, South Korea)
Article 80
Design of Authenticated and Trusted Academic Certification Using Blockchain Technology (pages 1-19)
Joseph Ofori-Mensah (The West African Examinations Council, Ghana), Winfred Yaokumah (University of Ghana, Ghana), Ebenezer Agyemang Sakyi (The West African Examinations Council, Ghana)
Article 81
Things-Net: A Hierarchical Petri Net Model for Internet of Things Systems (pages 1-27)
Samia Bouyakoub (University of Sciences and Technology Houari Boumediene, Algeria), Abdelkader Belkhir (University of Sciences and Technology Houari Boumediene, Algeria)
Article 81
A 3D Chaotic Dynamics-Assisted Color Image Authentication Technique in Multicore Milieu: Multicore Implementation of 3D RGB Steganography (pages 1-14)
Gaurav Gambhir (University of Kalyani, India), Monika Gambhir (Panipat Institute of Engineering and Technology, India), Jyotsna Kumar Mandal (University of Kalyani, India)
Article 82
A Hybrid System for Heart Disease Diagnosis Based on HPCBE Method (pages 1-14)
Pooja Rani (MMICTBM, Maharishi Markandeshwar (Deemed), Mullana, India), Rajneesh Kumar (Department of Computer Engineering, MMEC, Maharishi Markandeshwar (Deemed), Mullana, India), Anurag Jain (School of Computer Sciences, University of Petroleum and Energy Studies, Dehradun, India)
Article 82
Determinants of Intention to Use Ride-Hailing Services in Vietnam: An Integrated Model of Perceived Value and Trust Transfer Theory (pages 1-10)
Thao Thi Thanh Vo (Vietnam-Korea University of Information and Communication Technology, Vietnam), Trong Hung Van (Vietnam-Korea University of Information and Communication Technology, Vietnam)
Article 82
Prediction of Air Quality Using LSTM Recurrent Neural Network (pages 1-16)
Supriya Raheja (Amity University, Noida, India), Sahil Malik (Amity University, Noida, India)
Article 83
Adaptive Threshold and Directional Weighted Median Filter-Based Impulse Noise Removal Method for Images (pages 1-18)
Ashpreet (National Institute of Technology, Kurukshetra, India), Mantosh Biswas (National Institute of Technology, Kurukshetra, India)
Article 83
Contextual Fuzzy Ranking for Web Services Discovery in a Hybrid Architecture (pages 1-32)
Djallel Eddine Abdelli (University of Sciences and Technology, Houari Boumediene, Algeria), Bouyakoub M'hamed Fayçal (University of Sciences and Technology, Houari Boumediene, Algeria)
Article 84
Osmotic Message-Oriented Middleware for Internet of Things (pages 1-19)
Islam Gamal (Helwan University, Egypt)
Article 85
Determination of Melting Point of Chemical Substances Using Image Differencing Method (pages 1-10)
Anurag Shrivastava (DIT University, Dehradun, India), Rama Sushil (DIT University, Dehradun, India)
Article 85
Modeling Autonomic Systems: Review, Classification, and Research Challenges (pages 1-22)
Marwa Hachicha (ReDCAD, ENIS, University of Sfax,Tunisia), Riadh Ben Halima (ReDCAD, ENIS, University of Sfax,Tunisia), Ahmed Hadj Kacem (ReDCAD, ENIS, University of Sfax,Tunisia)
Article 86
Time-Critical Data Transmission Scheme in Wireless Sensor Networks Using Machine Learning Approach (pages 1-11)
Archana R. Raut (G. H. Raisoni College of Engineering, India), Sunanda P. Khandait (KDK College of Engineering, India), Snehalata S. Dongre (G. H. Raisoni College of Engineering, India)
Article 86
High Utility Item-Set Mining From Retail Market Data Stream With Various Discount Strategies (pages 1-15)
Amaranatha Reddy P. (Jawaharlal Nehru Technological University, Kakinada, India), Krishna Prasad M. H. M. (Jawaharlal Nehru Technological University, Kakinada, India)
Article 87
Knowledge Application to Crossover Operators in Genetic Algorithm for Solving the Traveling Salesman Problem (pages 1-20)
Pardeep Singh (University of Petroleum and Energy Studies, Dehradun, India), Rahul Kumar Singh (University of Petroleum and Energy Studies, Dehradun, India), Deepa Joshi (University of Petroleum and Energy Studies, Dehradun, India), Gourav Bathla (University of Petroleum and Energy Studies, Dehradun, India)
Article 87
Ensemble Deep Learning Intrusion Detection Model for Fog Computing Environments (pages 1-14)
Kalaivani K. (E. G. S. Pillay Engineering College, India), Chinnadurai M. (E. G. S. Pillay Engineering College, India)
Article 88
Use of Machine Learning to Detect Lung Cancer (pages 1-12)
Krishna Kadam (DKTE Ichalkaranji, India)
Article 89
XPS-MoSCoW: A Prioritization-Based Hybrid Agile Model of SCRUM and Extreme Programming (pages 1-15)
Prajval Mohan (Vellore Institute of Technology, Vellore, India), Pranav Narayan (Vellore Institute of Technology, Vellore, India), Mythili Thirugnanam (Vellore Institute of Technology, Vellore, India), Supratim Sarkar (Vellore Institute of Technology, Vellore, India)
Article 90
Self-Boosted With Dynamic Semi-Supervised Clustering Method for Imbalanced Big Data Classification (pages 1-24)
Akkala Abhilasha (Centurion University of Technology and Management, India), Annan Naidu P. (Centurion University of Technology and Management, India)
Article 91
Identifying Biased Reviews: An Analysis on Amazon Electronic Products (pages 1-10)
Md. Niaz Imtiaz (Pabna University of Science and Technology, Bangladesh), Md. Toukir Ahmed (Pabna University of Science and Technology, Bangladesh), Md. Rakib Hasan (Pabna University of Science and Technology, Bangladesh)
Article 92
Development of a Decision-Making Model to Provide Expert Assessment of the State of the Environment (pages 1-15)
Murtadha Rasol (Southern Federal University, Russia), Yuri Rogozov (Southern Federal University, Russia), Sergey Kucherov (Southern Federal University, Russia)
Article 93
A Sequential Comparative Analysis of Software Change Proneness Prediction Using Machine Learning (pages 1-16)
Raja Abbas (University of Bahrain, Bahrain), Fawzi Abdulaziz Albalooshi (University of Bahrain, Bahrain)
Article 94
Clustering of Template-Generated Webpages Using DOM Tree Paths of URLs (pages 1-24)
Tanveer I. Bagban (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India), Prakash Jayant Kulkarni (Walchand College of Engineering, Sangli, India)
Article 96
Swarm of Honey Bees for Association Rule Mining Using CUDA (pages 1-27)
Alankar Shantaram Shelar (DKTE Society's Textile and Engineering Institute, Ichalkaranji, India), Raj Kulkarni (Government College of Engineering, Karad, India)
Article 97
Software Quality Prediction Using Machine Learning (pages 1-35)
Bhoushika Desai (University of Mauritius, Mauritius), Roopesh Kevin Sungkur (University of Mauritius, Mauritius)
Issue 2
Special Issue on Applied Data Engineering and Systems
Guest Editorial Preface
Gwang-Yong Kim (Soongsil University, South Korea)
Article 0
Improved Fall Detection Model on GRU Using PoseNet (pages 1-11)
Hee-Yong Kang (Graduate School, Soongsil University, South Korea), Yoon-Kyu Kang (Graduate School, Soongsil University, South Korea), Jongbae Kim (Soongsil University, South Korea)
Article 1
SNI Field Blocking and Internet Censorship (pages 1-12)
JiYoung Jung (Soongsil University, South Korea), Minwoo Park (Soongsil University, South Korea), Hee Kyoung Shin (Soongsil University, South Korea), Yongtae Shin (Soongsil University, South Korea)
Article 2
Private Blockchain-Cloud System (PBCS) for Healthcare Services (pages 1-8)
Sangeeta Gupta (Chaitanya Bharathi Institute of Technology, India)
Article 92
A Mobile Game Algorithm for Programming Education (pages 1-10)
SunMyung Hwang (Daejeon University, South Korea), Hee Gyun Yeom (Daejeon University, South Korea)
Article 93
Analysis of Image Similarity Using CNN and ANNOY (pages 1-11)
Jun-Ki Hong (Pai Chai University, South Korea)
Article 94
Applying Niche Theory to Measure Uses and Gratifications of Social Media in Malaysia (pages 1-11)
Ha Jin Hwang (Sunway University, Malaysia), Haeng Kon Kim (Daegu Catholic University, South Korea), Monowar Mahmood (KIMEP University, Kazakhstan), Norazryana Mat Dawi (Sunway University, Malaysia)
Article 95
A Study on Improved Deep Learning Structure Based on DenseNet (pages 1-13)
Sang-Kwon Yun (Graduate School, Soongsil University, South Korea), Hye Jeong Kwon (Graduate School, Soongsil University, South Korea), Jongbae Kim (Soongsil University, South Korea)
Article 96
Union Filesystem Source Directory Protect Architecture (pages 1-13)
Sung Hwa Han (Tongmyong University, South Korea), Min Hye Jwa (Soongsil University, South Korea), Sang Bin Jeong (Soongsil University, South Korea), Gwangyong Gim (Soongsil University, South Korea)
Article 97
The Detection of Brand Identity and Image Using Semantic Network Analysis (pages 1-13)
Euntack Im (Soongsil University, South Korea), Dukjin Kim (Soongsil University, South Korea), Minhye Jwa (Soongsil University, South Korea), Gwangyong Gim (Soongsil University, South Korea)
Article 98
Frequency Acquisition Method for Measuring Strain of Vibration Wire Sensor (pages 1-11)
SungKwang Kim (Soongsil University, South Korea), YoungHwan Im (Soongsil University, South Korea)
Article 99
Cloud Computing Transformation Considering Operational Efficiency (pages 1-18)
JiYoung Jung (Soongsil University, South Korea), Yongtae Shin (Soongsil University, South Korea)
Issue 3
Issue 4
Volume 9 (2021)
Issue 1
Article 1
Big Data Management System for U-Healthcare (pages 1-11)
Yoki Karl (Daegu Catholic University, South Korea), Haeng Kon Kim (Daegu Catholic University, South Korea), Jong-Hak Lee (Daegu Catholic University, South Korea)
Article 2
Performance-Aware Approach for Software Risk Management Using Random Forest Algorithm (pages 12-19)
Alankrita Aggarwal (IKG Punjab Technical University, India), Kanwalvir Singh Dhindsa (Baba Banda Singh Bahadur Engineering College, India), P. K. Suri (Kurukshetra University, India)
Article 3
Using Dynamic Time Warping to Detect Clones in Software Systems (pages 20-36)
Mostefai Abdelkader (Dr. Tahar Moulay University of Saida, Algeria)
Article 4
A Collaborative Effort-Benefit-Value Analysis Model to Support Requirements Reuse for Software Requirements Prioritization (pages 37-51)
Ankita Gupta (Jaypee Institute of Information Technology, India), Chetna Gupta (Jaypee Institute of Information Technology, India)
Article 5
A Framework for Homogeneous Cross-Project Defect Prediction (pages 52-68)
Lipika Goel (Amity University, India), Mayank Sharma (Amity University, India), Sunil Kumar Khatri (Amity University, India), D. Damodaran (Center for Reliability, India)
Article 6
A Survey and Taxonomy of Intent-Based Code Search (pages 69-110)
Shailesh Kumar Shivakumar (IGNOU, India)
Issue 2
Article 1
Observer Patterns for Timed Properties (pages 1-17)
Djamila Baroudi (Computer Science Department, University of Abd El Hamid Ibn Badis, Mostaganem, Algeria), Safia Nait-Bahloul (LITIO Laboratory, University Oran 1, Ahmed Ben Bella, Algeria)
Article 2
Test Data Generation and Selection Using Levy Flight-Based Firefly Algorithm (pages 18-34)
Abhishek Pandey (University of Petroleum and Energy Studies, Dehradun, India & Birla Institute of Technology, Mesra, India), Soumya Banerjee (Conservatoire Nationale des Arts et Metiers, France & INRIA Paris, France)
Article 3
Usable Security and Privacy on Online Social Networks: Tools, Approaches, Studies, and Future Trends (pages 35-68)
Khalid Alemerien (Tafila Technical University, Jordan)
Article 4
DNA Fragment Assembly Using Hybridized Catfish PSO (pages 69-80)
G. Raja (National Institute of Technology, Trichy, India), U. Srinivasulu Reddy (National Institute of Technology, Trichy, India)
Article 5
A Novel Approach for Detection of Moving Objects in Complex Scenes Using Fuzzy Colour Difference Histogram (pages 81-101)
Prerna Dewan (National Institute of Technical Teachers Training and Research, India), Nivedita Nivedita (National Institute of Technical Teachers Training and Research, India), Rakesh Kumar (Central University of Haryana, India)
Article 6
A Review of Image Analysis Techniques for Adult Content Detection: Child Protection (pages 102-121)
Justice Kwame Appati (University of Ghana, Ghana), Kennedy Yaw Lodonu (University of Ghana, Ghana), Richmond Chris-Koka (University of Ghana, Ghana)
Article 7
Comprehensive Approach to Implement E-Government Backend in Jordan Using Service-Oriented Architecture (pages 122-135)
Abdallah Qusef (Princess Sumaya University for Technology, Jordan), Abdallah Ayasrah (Princess Sumaya University for Technology, Jordan), Adnan Shaout (The University of Michigan, Dearborn, USA)
Article 8
Design and Development of Lightweight Operating System Framework for Smart Devices (pages 136-149)
Jasleen Kaur (Department of Computer Science and Engineering, Indira Gandhi Delhi Technical University for Women, India), S. R. N. Reddy (Department of Computer Science and Engineering, Indira Gandhi Delhi Technical University for Women, India)
Issue 3
Article 1
A New Novel Hybrid Dynamic Color Segmentation Model for Road Signs in Noisy Conditions (pages 1-22)
Akram Abdel Qader (Al-Zaytoonah University of Jordan, Jordan)
Article 2
An Assessment of Incorporating Log-Logistic Testing Effort Into Imperfect Debugging Delayed S-Shaped Software Reliability Growth Model (pages 23-41)
Nesar Ahmad (T. M. Bhagalpur Unversity, India), Aijaz Ahmad (T. M. Bhagalpur University, India), Sheikh Umar Farooq (University of Kashmir, India)
Article 3
Article 4
An Empirical Study on Filter Bubbles in the YouTube Comments Network: Using Social Network Analysis (pages 52-65)
Dukjin Kim (Soongsil University, South Korea), Wooyoung Lee (Soongsil University, South Korea), Dohyung Kim (Soongsil University, South Korea), Gwangyong Gim (Soongsil University, South Korea)
Article 5
Fault Localization With Data Flow Information and an Artificial Neural Network (pages 66-78)
Jun-Hyuk Jo (Department of Software Engineering, Jeonbuk National University, South Korea), Jihyun Lee (Department of Software Engineering, Jeonbuk National University, South Korea), Aman Jaffari (Department of Software Engineering, Jeonbuk National University, South Korea), Eunmi Kim (Department of Computer and Game, Howon University, South Korea)
Article 6
A Study of Optimized EEG Signal Induction/Extraction Techniques for Basic Motion Control of Personal Robots for Physically Impaired Users (pages 79-90)
JeongHoon Shin (Daegu Catholic University, South Korea), DongJun Lee (Daegu Catholic University, South Korea)
Article 7
Innovation Process for Problem Conceptualization (pages 91-103)
Sharon Andrews (University of Houston Clear Lake, USA)
Issue 4
Article 1
Selecting Suitable Students for Jobs Based on Their Capacity (pages 1-9)
Hien Phan (University of Economics, Ho Chi Minh City, Vietnam)
Article 2
The Influences of Technology on Digital Economy Development in Vietnam (pages 10-18)
Vu Khanh Ngo Tan (University of Economics, Ho Chi Minh City, Vietnam), Viet Phuong Truong (University of Economics, Ho Chi Minh City, Vietnam), Truong-Xuan Do (Thuy Loi University, Vietnam)
Article 3
Hybridized Ranking Model for Prioritizing Functional Software Requirements: Case Study Approach (pages 19-49)
Ishaya Peni Gambo (University of Tartu, Estonia and Obafemi Awolowo University, Ile-Ife, Nigeria), Rhoda Ikono (Obafemi Awolowo University, Ile-Ife, Nigeria), Olaronke Ganiat Iroju (Adeyemi College of Education, Ondo, Nigeria), Theresa Olubukola Omodunbi (Obafemi Awolowo University, Ile-Ife, Nigeria), Oswaldo Kenan Zohoun (Obafemi Awolowo University, Ile-Ife, Nigeria)
Article 4
Multi-Object Tracking Using Gradient-Based Learning Model in Video Surveillance (pages 50-66)
Mohana Priya D. (Alagappa University, India)
Article 5
KDA-Based WKNN-SVM Method for Activity Recognition System From Smartphone Data (pages 67-87)
Ihssane Menhour (University of Science and Technology Houari Boumediene (USTHB), Algeria), M'hamed Bilal Abidine (University of Science and Technology Houari Boumediene (USTHB), Algeria), Belkacem Fergani (University of Science and Technology Houari Boumediene (USTHB), Algeria), Hakim Lounis (Université du Québec à Montréal (UQAM), Canada)
Article 6
Mobility Markov Chain and Matrix-Based Location-Aware Cache Replacement Policy in Mobile Environment: MMCM-CRP (pages 88-106)
Ajay Kumar Gupta (M. M. M. University of Technology, India), Udai Shanker (M. M. M. University of Technology, India)
Article 7
Network Traffic Analysis Using Machine Learning Techniques in IoT Networks (pages 107-123)
Shailendra Mishra (College of Computer and Information Sciences, Majmaah University, Saudi Arabia)
Article 8
Multi-Objective Crow Search and Fruit Fly Optimization for Combinatorial Test Case Prioritization (pages 124-142)
Ram Gouda (Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, India), V. Chandraprakash (Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, India)
Article 9
A Study on Deep Learning Model Autonomous Driving Based on Big Data (pages 143-157)
Yoki Donzia Symphorien Karl (Daegu Catholic University, South Korea), Haeng-Kon Kim (Daegu Catholic University, South Korea), Young-Pil Geum (Daegu Catholic University, South Korea)
Article 10
Formal Analysis of Database Trigger Systems Using Event-B (pages 158-173)
Anh Hong Le (Hanoi University of Mining and Geology, Hanoi, Vietnam), To Van Khanh (VNU University of Engineering and Technology, Hanoi, Vietnam), Truong Ninh Thuan (VNU University of Engineering and Technology, Hanoi, Vietnam)
Article 68
Multi-Object Tracking Using Gradient-Based Learning Model in Video Surveillance (pages 1-17)
Mohana Priya D. (Alagappa University, India)
Volume 8 (2020)
Issue 1
Article 1
The Evaluation of Computer Algebra Systems Using Fuzzy Multi-Criteria Decision-Making Models: Fuzzy AHP and Fuzzy TOPSIS (pages 1-16)
Ilham Huseyinov (Istanbul Aydin University, Istanbul, Turkey), Feride Savaroglu Tabak (European University of Lefke, Lefka, Cyprus)
Article 2
An Approach for the Transformation and Verification of BPMN Models to Colored Petri Nets Models (pages 17-49)
Said Meghzili (MISC Laboratory, Computer Science Department, University of Constantine 2-Abdelhamid Mehri, Constantine, Algeria), Allaoua Chaoui (University of Constantine 2, Constantine, Algeria), Martin Strecker (IRIT, Toulouse University, Toulouse, France), Elhillali Kerkouche (Mohammed Seddik Ben Yahia University, Jijel, Algeria)
Article 3
Automatic Correction of Free Format MCQ Tests (pages 50-64)
Muaaz Habeek (University of Abdelhamid Mehri - Constantine 2, Constantine, Algeria), Charaf Eddine Dridi (University of Abdelhamid Mehri - Constantine 2, Constantine, Algeria), Mohamed Badeche (University of Abdelhamid Mehri -Constantine 2, Constantine, Algeria)
Article 4
Dynamic Management of Resources in Cloud Computing (pages 65-81)
Pradeep Kumar Tiwari (Manipal University Jaipur, Jaipur, India), Sandeep Joshi (Manipal University Jaipur, Jaipur, India)
Article 5
Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS (pages 82-91)
Suraj Krishna Patil (D.K.T.E. Society's Textile and Engineering Institute, Ichalkaranji, India), Sandipkumar Chandrakant Sagare (D.K.T.E. Society's Textile and Engineering Institute, Ichalkaranji, India), Alankar Shantaram Shelar (D.K.T.E. Society's Textile and Engineering Institute, Ichalkaranji, India)
Article 6
Visitor Design Pattern Using Reflection Mechanism (pages 92-107)
Bilal Hussein (Lebanese University, Beirut, Lebanon), Aref Mehanna (Lebanese University, Beirut, Lebanon), Yahia Rabih (Lebanese University, Beirut, Lebanon)
Issue 2
Article 1
Incremental Hierarchical Clustering for Data Insertion and Its Evaluation (pages 1-22)
Kakeru Narita (Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Yoshihiro Hayashi (Nitto Seiko Co., LTD., Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 2
Building Ant System for Multi-Faceted Test Case Prioritization: An Empirical Study (pages 23-37)
Manoj Kumar Pachariya (MCNUJC, Bhopal, Madhya Pradesh, India)
Article 3
Impulse Noise Detection and Removal Method Based on Modified Weighted Median (pages 38-53)
Ashpreet (Department of Computer Engineering, NIT, Kurukshetra, Haryana, India), Mantosh Biswas (Department of Computer Engineering, NIT, Kurukshetra, Haryana, India)
Article 4
A Dynamic Threshold Based Energy Efficient Method for Cloud Datacenters (pages 54-67)
Shally (Banasthali Vidyapith, Rajasthan, India), Sanjay Kumar Sharma (Banasthali Vidyapith, Rajasthan, India), Sunil Kumar (Manipal University Jaipur, Jaipur, India)
Article 5
Finding Useful Features for Facial Expression Recognition and Intensity Estimation by Neural Network (pages 68-84)
Naoki Imamura (Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 6
Agile Scrum Issues at Large-Scale Distributed Projects: Scrum Project Development At Large (pages 85-94)
Ayesha Khalid (University of Lahore, Lahore, Punjab, Pakistan), Shariq Aziz Butt (University of Lahore, Lahore, Punjab, Pakistan), Tauseef Jamal (PIEAS University, Islamabad, Pakistan), Saikat Gochhait (Symbiosis Institute of Digital and Telecom Management, Constituent of Symbiosis International (Deemed University), Pune, India)
Issue 3
Article 1
A Modified Parallel Heapsort Algorithm (pages 1-18)
Hiroaki Hirata (Kyoto Institute of Technology, Japan), Atsushi Nunome (Kyoto Institute of Technology, Japan)
Article 2
Decoupling Computation and Result Write-Back for Thread-Level Parallelization (pages 19-34)
Hiroaki Hirata (Kyoto Institute of Technology, Japan), Atsushi Nunome (Kyoto Institute of Technology, Japan)
Article 3
Capturing Spotaneous Software Evolution in a Social Coding Platform With Project-as-a-City Concept (pages 35-50)
Koji Toda (Fukuoka Institute of Technology, Japan), Haruaki Tamada (Faculty of Information Science and Engineering, Kyoto Sangyo University, Japan), Masahide Nakamura (Graduate School of System Informatics, Kobe University, Japan), Kenichi Matsumoto (Graduate School of Science and Technology, Nara Institute of Science and Technology, Japan)
Article 4
Verifiable Self-Selecting Secret Sharing Based on Elliptic Curves (pages 51-68)
Hichem Bouchakour Errahmani (Belhadj Bouchaib Center University of Ain Témouchent, Algeria & EEDIS Laboratory, Djilali Liabes University of Sidi Bel Abbes, Algeria), Hind Ikni (Belhadj Bouchaib Center University of Ain Témouchent, Algeria)
Article 5
Improving Cost for Data Migration in Cloud Computing Using Genetic Algorithm (pages 69-81)
Nitin Chawla (Amity University, India), Deepak Kumar (Amity University, India), Dinesh Kumar Sharma (University of Maryland, Eastern Shore, USA)
Article 6
A New Approach to Locate Software Vulnerabilities Using Code Metrics (pages 82-95)
Mohammed Zagane (Université Oran 1, Algeria), Mustapha Kamel Abdi (Université Oran 1, Algeria), Mamdouh Alenezi (Prince Sultan University, Riyadh, Saudi Arabia)
Article 7
Contrast Enhancement Using Optimum Threshold Selection (pages 96-118)
Geeta Rani (Manipal University Jaipur, Jaipur, India), Monika Agarwal (G.D. Goenka University, Gurugram, India)
Issue 4
Article 1
Downsizing the Semantic Gap in Contextual Image Retrieval System Using Superintend Gross Silhouette Descriptor: Superintend Gross Silhouette Descriptor (pages 1-20)
Girija G. Chiddarwar (Gitam University, Hyderabad, India), S.Phani Kumar (Gitam University, Hyderabad, India)
Article 2
Multi-View Model-Driven Projection to Facilitate the Control of the Evolution and Quality of the Architecture (pages 21-39)
Salim Kadri (LASTIC Laboratory, Department of Computer Science, University of Batna II, Fesdis, Algeria), Sofiane Aouag (LASTIC Laboratory, Department of Computer Science, University of Batna II, Fesdis, Algeria), Djalal Hedjazi (LASTIC Laboratory, Department of Computer Science, University of Batna II, Fesdis, Algeria)
Article 3
A Smart Security Drones for Farms Using Software Architecture (pages 40-49)
Yoki Karl (Daegu Catholic University, Gyeongsan, South Korea), Haeng-Kon Kim (Daegu Catholic University, Gyeongsan, South Korea), Jong-Halk Lee (Daegu Catholic University, Gyeongsan, South Korea)
Article 4
IoT Data Management Using Cloud Computing and Big Data Technologies (pages 50-58)
Sangeeta Gupta (Associate Professor in CSE, Chaitanya Bharathi Institute of Technology, Hyderabad, India), Raghuram Godavarti (Data Engineer, Hyderabad, India)
Article 5
Obtaining the Similarity Value of Human Body Motions Through Their Sub Motions (pages 59-77)
Truong Hong Ngan Pham (Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Kyoto Institute of Technology, Kyoto, Japan)
Article 6
A System for Predictive Data Analytics Using Sequential Rule Mining (pages 78-94)
Sandipkumar Chandrakant Sagare (D.K.T.E. Society's Textile and Engineering Institute, Ichalkaranji, India), Suresh Kallu Shirgave (D.K.T.E. Society's Textile and Engineering Institute, Ichalkaranji, India), Dattatraya Vishnu Kodavade (D.K.T.E. Society's Textile and Engineering Institute, Ichalkaranji, India)
Volume 7 (2019)
Issue 1
Special Issue on Intelligent Data Analysis and Management
Guest Editorial Preface
Gongzhu Hu (Central Michigan University, Mount Pleasant, USA)
Article 1
Natural Image Quality Assessment Based on Visual Biological Cognitive Mechanism (pages 1-26)
Run Zhang (Communication University of China, Beijing, China), Yongbin Wang (Communication University of China, Beijing, China)
Article 2
Optimal Operation of Multireservoir Systems by Enhanced Water Cycle Algorithm (pages 27-43)
Yanjun Kong (State Key Laboratory of Water Resource and Hydropower Engineering Science, Wuhan University, Wuhan, China), Yadong Mei (State Key Laboratory of Water Resource and Hydropower Engineering Science, Wuhan University, Wuhan, China), Weinan Li (State Key Laboratory of Water Resource and Hydropower Engineering Science, Wuhan University, Wuhan, China), Ben Yue (State Key Laboratory of Water Resource and Hydropower Engineering Science, Wuhan University, Wuhan, China), Xianxun Wang (State Key Laboratory of Water Resource and Hydropower Engineering Science, Wuhan University, Wuhan, China)
Article 3
A Scenario-Reconfigurable Simulator for Verifying Service-Oriented Cooperation Mechanisms and Policies of Connected Intelligent Vehicles (pages 44-62)
Kailong Zhang (School of Computer, Northwestern Polytechnical University, Xi'an, China), Xiaowu Li (School of Computer, Northwestern Polytechnical University, Xi'an, China), Ce Xie (School of Computer, Northwestern Polytechnical University, Xi'an, China), Yujia Wang (School of Computer, Northwestern Polytechnical University, Xi'an, China), Liuyang Li (School of Computer, Northwestern Polytechnical University, Xi'an, China), Chao Fei (School of Computer, Northwestern Polytechnical University, Xi'an, China), Arnaud de La Fortelle (Centre for Robotics, MINES ParisTech, Paris, France), Zongtao Duan (School of Information Engineering, Chang'An University, Xi'an, China)
Article 4
Toward a Statistical Characterization of Computer Daihinmin (pages 63-79)
Seiya Okubo (School of Management & Information, University of Shizuoka, Shizuoka, Japan), Yuta Kado (Graduate School of Informatics and Engineering, University of Electro-Communications, Chofu, Japan), Yamato Takeuchi (Graduate School of Informatics and Engineering, University of Electro-Communications, Chofu, Japan), Mitsuo Wakatsuki (Graduate School of Informatics and Engineering, University of Electro-Communications, Chofu, Japan), Tetsuro Nishino (Graduate School of Informatics and Engineering, University of Electro-Communications, Chofu, Japan)
Article 5
Analysis of Perceptions on School Mottos as Proverbs Between Japanese and Indonesian (pages 80-103)
Rieko Fujita (International Institute of Applied Informatics, Tokyo, Japan), Tokuro Matsuo (Advanced Institute of Industrial Technology, Tokyo, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 6
Label Propagation Algorithm for the Slices Detection of a Ground-Glass Opacity Nodule (pages 104-118)
Weiwei Du (Information and Human Science, Kyoto Institute of Technology, Kyoto, Japan), Dandan Yuan (School of Electronics and Information Engineering, Tianjin Polytechnic University, Tianjin, China), Jianming Wang (School of Electronics and Information Engineering, Tianjin Polytechnic University, Tianjin, China), Xiaojie Duan (School of Electronics and Information Engineering, Tianjin Polytechnic University, Tianjin, China), Yanhe Ma (Tianjin Chest Hospital, Tianjin, China), Hong Zhang (Tianjin Chest Hospital, Tianjin, China)
Article 7
Dealing With Noise and Partial Volume Effects in Alzheimer Disease Brain Tissue Classification by a Fuzzy-Possibilistic Modeling Based on Fuzzy-Genetic Initialization (pages 119-143)
Lilia Lazli (CoFaMic Research Centre, Department of Computer Science, UQÀM, University of Quebec, Canada & Department of Electrical Engineering, ÉTS, University of Quebec, Canada), Mounir Boukadoum (CoFaMic Research Centre, Department of Computer Science, UQÀM, University of Quebec, Canada)
Issue 2
Special Issue on Advancements in Artificial Intelligence and Machine Learning Algorithms for Internet of Things, Cloud Computing and Big Data
Guest Editorial Preface
Gunasekaran Manogaran (University of California, Davis, USA), Naveen Chilamkurti (Department of Computer Science and Computer Engineering, LaTrobe University, Melbourne, Australia), Ching-Hsien Hsu (Department of Computer Science and Information Engineering, Chung Hua University, Taiwan)
Article 1
Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking: FlowClassify (pages 1-8)
Nithya Sampath (Vellore Institute of Technology, Vellore, India), Dinakaran M. (Vellore Institute of Technology, Vellore, India)
Article 2
A Novel Approach of Load Balancing and Task Scheduling Using Ant Colony Optimization Algorithm (pages 9-20)
Selvakumar A. (Manonmaniam Sundaranar University, Tirunelveli, India), Gunasekaran G. (J.N.N Institute of Engineering, Chennai, India)
Article 3
Internet of Things (IOT) in Healthcare – Smart Health and Surveillance, Architectures, Security Analysis and Data Transfer: A Review (pages 21-40)
Parthasarathy Panchatcharam (VIT University, Vellore, India), Vivekanandan S. (VIT University, Vellore, India)
Article 4
Network Support Data Analysis for Fault Identification Using Machine Learning (pages 41-49)
Shakila Basheer (King Khalid University, Abha, Saudi Arabia), Usha Devi Gandhi (VIT University, Vellore, India), Priyan M.K. (VIT University, Vellore, India), Parthasarathy P. (VIT University, Vellore, India)
Article 5
Stock Price Prediction Using Fuzzy Time-Series Population Based Gravity Search Algorithm (pages 50-64)
Srinivasan N. (Research Scholar, School of Computing, Sathyabama Institute of Science and Technology, Chennai, India), Lakshmi C. (Prof & Head, Department of Software Engineering, SRM Institute of Science and Technology, Chennai, India)
Issue 3
Article 1
Modeling Approach of Software Components Based on Use Cases (pages 1-28)
Fadoua Rehioui (University Soultan Moulay Slimane, Morocco)
Article 2
Text Steganography Approaches Using Similarity of English Font Styles (pages 29-50)
Sahar A. El Rahman (Electrical Engineering Department, Faculty of Engineering-Shoubra, Benha University, Cairo, Egypt and Computer Science Department, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia)
Article 3
Feasibility and Application of 3D-ORIGAMI Modeling System Utilizing Mobile Device (pages 51-64)
Risa Ogawa (Toyo University, Kawagoe, Japan), Takayuki Fujimoto (Toyo University, Kawagoe, Japan)
Article 4
Filter/Wrapper Methods for Gene Selection and Classification of Microarray Dataset (pages 65-80)
Norreddine Mekour (Norreddine Mekour,GeCoDe Laboratory, Department of Computer Science, Tahar Moulay University of Saida, Saida, Algeria), Reda Mohamed Hamou (GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida, Saida, Algeria), Abdelmalek Amine (GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida, Saida, Algeria)
Article 5
“Multiple Sightseeing Scheduling System” Enabling Tourist Guidance Specialized for Time Performance (pages 81-101)
Kazuya Murata (Toyo University, Hihashimatsuyama, Japan), Takayuki Fujimoto (Toyo University, Kawagoe, Japan)
Article 6
Energy Efficient Level by Level Scheduling for Multiple Workflows in Cloud (pages 102-117)
Ritu Garg (National Institute of Technology, Kurukshetra, India), Neha Shukla (Department of Computer Engineering, National Institute of Technology, Kurukshetra, India)
Article 7
Hybrid Technique for Complexity Analysis for Java Code (pages 118-133)
Mohammad Subhi Al-Batah (Faculty of Science and Information Technology, Jadara University, Irbid, Jordan), Nouh Alhindawi (Faculty of Science and Information Technology, Jadara University, Irbid, Jordan), Rami Malkawi (Department of Computer Information Systems, Yarmouk University, Jordan), Ahmad Al Zuraiqi (Jadara University, Irbid, Jordan)
Issue 4
Article 1
Towards Deep Learning-Based Approach for Detecting Android Malware (pages 1-24)
Jarrett Booz (Towson University, Towson, USA), Josh McGiff (Towson University, Towson, USA), William G. Hatcher (Towson University, Towson, USA), Wei Yu (Towson University, Towson, USA), James Nguyen (Towson University, Towson, USA), Chao Lu (Towson University, Towson, USA)
Article 2
Mutation Testing for Evaluating PHP Web Applications (pages 25-50)
Ahmad A. Saifan (Computer Information Systems Department, Faculty of IT, Yarmouk University, Irbid, Jordan), Mahmoud Bani Ata (Yarmouk University, Iribid, Jordan)
Article 3
Fruit Image Classification Using Convolutional Neural Networks (pages 51-70)
Shawon Ashraf (North South University, Dhaka, Bangladesh), Ivan Kadery (North South University, Dhaka, Bangladesh), Md Abdul Ahad Chowdhury (North South University, Dhaka, Bangladesh), Tahsin Zahin Mahbub (North South University, Dhaka, Bangladesh), Rashedur M. Rahman (Department of Electrical Engineering and Computer Science, North South University, Dhaka, Bangladesh)
Article 4
Approximate Algorithm for Solving the General Problem of Scheduling Theory With High Accuracy (pages 71-85)
Vardan Mkrttchian (HHH University, Brisbane, Australia), Safwan Al Salaimeh (Aqaba University of Technology, Aqaba, Jordan)
Article 5
Generalized Multi-Release Framework for Fault Prediction in Open Source Software (pages 86-107)
Shozab Khurshid (University of Kashmir, Srinagar, India), A.K. Shrivastava (International Management Institute, Kolkata, West Bengal, India), Javaid Iqbal (University of Kashmir, Srinagar, India)
Volume 6 (2018)
Issue 1
Article 1
A Novel Approach for Ontology-Based Feature Vector Generation for Web Text Document Classification (pages 1-10)
Mohamed K. Elhadad (Computer Engineering Department, Military Technical College, Cairo, Egypt), Khaled M. Badran (Computer Engineering Department, Military Technical College, Cairo, Egypt), Gouda I. Salama (Computer Engineering Department, Military Technical College, Cairo, Egypt)
Article 2
A Matching Approach to Factor Scores Based on Online Sponsored Search Auction (pages 11-30)
Xiaohui Li (Computer Science and Technology College, Harbin Engineering University, Harbin, China), Hongbin Dong (Computer Science and Technology College, Harbin Engineering University, Harbin, China), Yang Zhou (College of Humanities and Social Sciences, Harbin Engineering University, Harbin, China), Jun He (Department of Computer Science Aberystwyth University, Aberystwyth, UK)
Article 3
Determinants of Personal Health Information Disclosure: A Case of Mobile Application (pages 31-43)
Kanokwan Atchariyachanvanich (Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand), Nichaporn Mitinunwong (Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand), Butsaraporn Tamthong (Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand), Noboru Sonehara (Information and Society Research Division, National Institute of Informatics, Tokyo, Japan & Tsuda University, Tokyo, Japan)
Article 4
Evaluating the Understandability of Android Applications (pages 44-57)
Ahmad A. Saifan (Faculty of IT, Software Engineering Department, Yarmouk University, Irbid, Jordan), Hiba Alsghaier (Faculty of IT, Computer Information Systems Department, Yarmouk University, Irbid, Jordan), Khaled Alkhateeb (Yarmouk University, Irbid, Jordan)
Article 5
Fuzzy Mutual Information Feature Selection Based on Representative Samples (pages 58-72)
Omar A. M. Salem (Faculty of Computer Science and Informatics, Suez Canal University, Ismailia, Egypt), Liwei Wang (International School of Software, Wuhan University, Wuhan, China)
Issue 2
Article 1
A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations (pages 1-9)
Xiaoyi Zhou (Hainan University, Haikou, China), Jixin Ma (University of Greenwich, London, UK), Xiaoming Yao (Hainan University, Haikou, China), Honglei Li (Hainan University, Haikou, China)
Article 2
Specifying Knowledge Graph with Data Graph, Information Graph, Knowledge Graph, and Wisdom Graph (pages 10-25)
Yucong Duan (College of Information Science and Technology, Hainan University, Haikou, China), Lixu Shao (Hainan Unviersity, Haikou, China), Gongzhu Hu (Central Michigan University, Mount Pleasant, USA)
Article 3
Music Melodies Suited to Multiple Users' Feelings Composed by Asynchronous Distributed Interactive Genetic Algorithm (pages 26-36)
Kota Nomura (Fukuoka Institute of Technology, Fukuoka, Japan), Makoto Fukumoto (Fukuoka Institute of Technology, Fukuoka, Japan)
Article 4
Design Space Exploration for Implementing a Software-Based Speculative Memory System (pages 37-49)
Kohei Fujisawa (Kyoto Institute of Technology, Kyoto, Japan), Atsushi Nunome (Kyoto Institute of Technology, Kyoto, Japan), Kiyoshi Shibayama (Kyoto College of Graduate Studies for Informatics, Kyoto, Japan), Hiroaki Hirata (Kyoto Institute of Technology, Kyoto, Japan)
Article 5
A Centralized Autonomous System of Cooperation for UAVs- Monitoring and USVs- Cleaning (pages 50-76)
Salima Bella (Faculty of Exact and Applied Sciences, University of Oran1 Ahmed Ben Bella, Oran, Algeria), Assia Belbachir (Mechatronics Department, Polytechnic Institute of Advanced Sciences, IPSA, Ivry-sur-Seine Paris, France), Ghalem Belalem (Faculty of Exact and Applied Sciences, University of Oran1 Ahmed Ben Bella, Oran, Algeria)
Article 6
Protein Classification Using N-gram Technique and Association Rules (pages 77-89)
Fatima Kabli (GeCode Laboratory, Department of Computer Science Tahar Moulay University of Saïda, Saïda, Algeria), Reda Mohamed Hamou (GeCode Laboratory, Department of Computer Science Tahar Moulay University of Saïda, Saïda, Algeria), Abdelmalek Amine (GeCode Laboratory, Department of Computer Science Tahar Moulay University of Saïda, Saïda, Algeria)
Issue 3
Article 1
A Decision Tree Analysis of a Multi-Player Card Game With Imperfect Information (pages 1-17)
Masato Konishi (The University of Electro-Communications, Chofu, Tokyo, Japan), Seiya Okubo (University of Shizuoka, Shizuoka, Shizuoka, Japan), Tetsuro Nishino (The University of Electro-Communications, Chofu, Tokyo, Japan), Mitsuo Wakatsuki (The University of Electro-Communications, Chofu, Tokyo, Japan)
Article 2
Probably Secure Efficient Anonymous Credential Scheme (pages 18-35)
Chien-Nan Wu (National Sun Yat-sen University, Kaohsiung, Taiwan), Chun-I Fan (National Sun Yat-sen University, Kaohsiung, Taiwan), Jheng-Jia Huang (National Sun Yat-sen University, Kaohsiung, Taiwan), Yi-Fan Tseng (National Sun Yat-sen University, Kaohsiung, Taiwan), Hiroaki Kikuchi (Meiji University, Tokyo, Japan)
Article 3
A Multiple Phases Approach for Design Patterns Recovery Based on Structural and Method Signature Features (pages 36-52)
Mohammed Ghazi Al-Obeidallah (Department of Computing, University of Brighton, Brighton, UK), Miltos Petridis (Department of Computing, Middlesex University, London, UK), Stelios Kapetanakis (Department of Computing, University of Brighton, Brighton, UK)
Article 4
Unfolding Models for Asymmetric Dissimilarity Data With External Information Based on Path Structures (pages 53-66)
Kensuke Tanioka (Wakayama Medical University, Wakayama, Japan), Hiroshi Yadohisa (Doshisha University, Kyoto, Japan)
Article 5
A Method of Subtopic Classification of Search Engine Suggests by Integrating a Topic Model and Word Embeddings (pages 67-78)
Tian Nie (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan), Yi Ding (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan), Chen Zhao (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan), Youchao Lin (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan), Takehito Utsuro (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan)
Article 6
A Knowledge-Based Machine Translation Using AI Technique (pages 79-92)
Sahar A. El-Rahman (Benha University, Cairo, Egypt & Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia), Tarek A. El-Shishtawy (Benha University, Banha, Egypt), Raafat A. El-Kammar (Benha University, Banha, Egypt)
Article 7
Security Testing Framework for Web Applications (pages 93-117)
Layla Mohammed Alrawais (Prince Sultan University, Riyadh, Saudi Arabia), Mamdouh Alenezi (Prince Sultan University, Riyadh, Saudi Arabia), Mohammad Akour (Yarmouk University, Irbid, Jordan)
Issue 4
Article 1
Agent-Development Framework Based on Modular Structure to Research Disaster-Relief Activities (pages 1-15)
Shunki Takami (University of Tsukuba, Tsukuba, Japan), Kazuo Takayanagi (Aichi Institute of Technology, Toyota, Japan), Shivashish Jaishy (Aichi Institute of Technology, Toyota, Japan), Nobuhiro Ito (Aichi Institute of Technology, Toyota, Japan), Kazunori Iwata (Department of Business Administration, Aichi University, Nagoya, Japan)
Article 2
Using Non-Intrusive Environmental Sensing for ADLS Recognition in One-Person Household (pages 16-29)
Long Niu (Graduate School of System Informatics, Kobe University, Kobe, Japan), Sachio Saiki (Graduate School of System Informatics, Kobe University, Kobe, Japan), Masahide Nakamura (Graduate School of System Informatics, Kobe University, Kobe, Japan & RIKEN AIP, Tokyo, Japan)
Article 3
Unsupervised Estimation of Facial Expression Intensity for Emotional Scene Retrieval in Lifelog Videos (pages 30-45)
Shota Sakaue (Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 4
PRISM: Visualizing Personalized Real-Time Incident on Security Map (pages 46-58)
Takuhiro Kagawa (Graduate School of System Informatics, Kobe University, Kobe, Japan), Sachio Saiki (Graduate School of System Informatics, Kobe University, Kobe, Japan), Masahide Nakamura (Graduate School of System Informatics, Kobe University, Kobe, Japan & RIKEN AIP, Tokyo, Japan)
Article 5
A Preliminary Study on Adaptive Evolution Control Using Rank Correlation for Surrogate-Assisted Evolutionary Computation (pages 59-72)
Yudai Kuwahata (Kagoshima University, Kagoshima, Japan), Jun-ichi Kushida (Hiroshima City University, Hiroshima, Japan), Satoshi Ono (Kagoshima University, Kagoshima, Japan)
Article 6
Automatic Composition System Based on Melodic Outlines and Music Theory (pages 73-85)
Takayuki Yoshida (Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 7
Taxicab Geometry Based Analysis on Skyline for Business Intelligence (pages 86-102)
Partha Ghosh (Kingston School of Management & Science, West Bengal, India), Takaaki Goto (Ryutsu Keizai University, Chiba, Japan), Soumya Sen (University of Calcutta, West Bengal, India)
Article 8
Research on Facial Expression Recognition Technology Based on Convolutional-Neural-Network Structure (pages 103-116)
Junqi Guo (College of Information Science and Technology, Beijing Normal University, Beijing, China), Ke Shan (College of Information Science and Technology, Beijing Normal University, Beijing, China), Hao Wu (College of Information Science and Technology, Beijing Normal University, Beijing, China), Rongfang Bie (College of Information Science and Technology, Beijing Normal University, Beijing, China), Wenwan You (College of Information Science and Technology, Beijing Normal University, Beijing, China), Di Lu (College of Information Science and Technology, Beijing Normal University, Beijing, China)
Article 9
Improving the Bluetooth Hopping Sequence for Better Security in IoT Devices (pages 117-131)
Matt Sinda (Department of Computer Science, Central Michigan University, Mount Pleasant, USA), Tyler Danner (Department of Computer Science, Central Michigan University, Mount Pleasant, USA), Sean O'Neill (Department of Computer Science, Central Michigan University, Mount Pleasant, USA), Abeer Alqurashi (Department of Computer Science, Central Michigan University, Mount Pleasant, USA), Haeng-Kon Kim (Daegu Catholic University, Daegu, Korea)
Volume 5 (2017)
Issue 1
Article 1
OpenMP-Based Approach for High Level C Loops Synthesis (pages 1-16)
Emna Kallel (CES Laboratory, ENIS School, University of Sfax, Sfax, Tunisia), Yassine Aoudni (CES Laboratory, ENIS School, University of Sfax, Sfax, Tunisia), Mohamed Abid (CES Laboratory, ENIS School, University of Sfax, Sfax, Tunisia)
Article 2
Gaits Classification of Normal vs. Patients by Wireless Gait Sensor and Support Vector Machine (SVM) Classifier (pages 17-29)
Taro Nakano (Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, TX, USA & Department of Electrical & Electronic Engineering, Tokushima University, Tokushima, Japan), B.T. Nukala (Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, TX, USA), J. Tsay (Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, TX, USA), Steven Zupancic (Texas Tech University Health Sciences Center (TTUHSC), Lubbock, TX, USA), Amanda Rodriguez (Texas Tech University Health Sciences Center (TTUHSC), Lubbock, TX, USA), D.Y.C. Lie (Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, TX, USA & Texas Tech University Health Sciences Center (TTUHSC), Lubbock, TX, USA), J. Lopez (Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, TX, USA), Tam Q. Nguyen (Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, TX, USA & Texas Tech University Health Sciences Center (TTUHSC), Lubbock, TX, USA)
Article 3
VirtualCareGiver: Personalized Smart Elderly Care (pages 30-43)
Seiki Tokunaga (Graduate School of System Informatics, Kobe University, Kobe, Japan), Kazunari Tamamizu (Graduate School of System Informatics, Kobe University, Kobe, Japan), Sachio Saiki (Graduate School of System Informatics, Kobe University, Kobe, Japan), Masahide Nakamura (Graduate School of System Informatics, Kobe University, Kobe, Japan), Kiyoshi Yasuda (Chiba Rosai Hospital, Ichihara, Japan)
Article 4
How to Systematically Embed Cycles in Balanced Hypercubes (pages 44-56)
Hsuan-Han Chang (Department of Computer Science and Information Engineering, National Dong Hwa University, Shoufeng, Taiwan), Kuan-Ting Chen (Department of Computer Science and Information Engineering, National Dong Hwa University, Shoufeng, Taiwan), Pao-Lien Lai (Department of Computer Science and Information Engineering, National Dong Hwa University, Shoufeng, Taiwan)
Article 5
Head Pose Estimation and Motion Analysis of Public Speaking Videos (pages 57-71)
Rinko Komiya (Kyushu Institute of Technology, Iizuka, Japan), Takeshi Saitoh (Kyushu Institute of Technology, Iizuka, Japan), Miharu Fuyuno (Kyushu University, Fukuoka, Japan), Yuko Yamashita (Shibaura Institute of Technology, Tokyo, Japan), Yoshitaka Nakajima (Kyushu University, Fukuoka, Japan)
Issue 2
Article 1
Probabilistic Background Model by Density Forests for Tracking (pages 1-16)
Daimu Oiwa (Department of Computer Science, Chubu University, Kasugai, Japan), Shinji Fukui (Department of Computer Science, Aichi University of Education, Kariya, Japan), Yuji Iwahori (Department of Computer Science, Chubu University, Kasugai, Japan), Tsuyoshi Nakamura (Department of Computer Science and Engineering, Nagoya Institute of Technology, Nagoya, Japan), Boonserm Kijsirikul (Department of Computer Engineering, Chulalongkorn University, Bangkok, Thailand), M. K. Bhuyan (Department of Electronics and Electrical Engineering, Indian Institute of Technology Guwahati, Guwahati, India)
Article 2
Parallel Online Exact Summation of Floating-point Numbers by Applying MapReduce of Java8 (pages 17-32)
Naoshi Sakamoto (Tokyo Denki University, Tokyo, Japan)
Article 3
Recovering Polyp Shape from an Endoscope Image Using Two Light Sources (pages 33-54)
Hiroyasu Usami (Department of Computer Science, Chubu University, Kasugai, Japan), Yuji Iwahori (Department of Computer Science, Chubu University, Kasugai, Japan), Yuki Hanai (Department of Computer Science, Chubu University, Kasugai, Japan), Boonserm Kijsirikul (Department of Computer Engineering, Chulalongkorn University, Bangkok, Thailand), Kunio Kasugai (Department of Gastroenterology, Aichi Medical University, Nagakute, Japan)
Article 4
Collective Relocation for Associative Distributed Collections of Objects (pages 55-69)
Daisuke Fujishima (Graduate School of System Informatics, Kobe University, Kobe, Japan), Tomio Kamada (Advanced Institute for Computational Science, RIKEN, Wako, Japan)
Article 5
Automatic Recognition of Traffic Signs with 3D Distance Estimation for Intelligent Vehicles (pages 70-86)
Nadra Ben Romdhane (MIRACL, University of Sfax, Sfax, Tunisia), Hazar Mliki (MIRACL, University of Sfax, Sfax, Tunisia), Mohamed Hammami (MIRACL, University of Sfax, Sfax, Tunisia)
Issue 3
Article 1
Assessment of BAR: Breakdown Agent Replacement Algorithm for SCRAM (pages 1-17)
Shivashish Jaishy (Aichi Institute of Technology, Toyota, Japan), Yoshiki Fukushige (Aichi Institute of Technology, Toyota, Japan), Nobuhiro Ito (Aichi Institute of Technology, Toyota, Japan), Kazunori Iwata (Aichi University, Toyota, Japan), Yoshinobu Kawabe (Aichi Institute of Technology, Toyota, Japan)
Article 2
Vojta-Therapy: A Vision-Based Framework to Recognize the Movement Patterns (pages 18-32)
Muhammad Hassan Khan (Research Group of Pattern Recognition, University of Siegen, Siegen, Germany), Marcin Grzegorzek (Faculty of Informatics and Communication, University of Economics in Katowice, Katowice, Poland)
Article 3
An Improved Dynamic Load-Balancing Model (pages 33-48)
Wenqian Shang (School of Computer Science, Communication University of China, Beijing, China & Beijing Key Laboratory of Big Data in Security & Protection Industry,Beijing, China), Di Liu (Communication University of China, Beijing, China & Beijing Key Laboratory of Big Data in Security & Protection Industry, Beijing, China), Ligu Zhu (Communication University of China, Beijing, China & Beijing Key Laboratory of Big Data in Security & Protection Industry, Beijing, China), Dongyu Feng (Communication University of China, Beijing, China & Beijing Key Laboratory of Big Data in Security & Protection Industry, Beijing, China)
Article 4
A Video Recommendation Algorithm Based on Hyperlink-Graph Model (pages 49-63)
Songtao Shang (School of Computer Science, Communication University of China, Beijing, China), Wenqian Shang (School of Computer Science, Communication University of China, Beijing, China & Beijing Key Laboratory of Big Data in Security & Protection Industry,Beijing, China), Minyong Shi (School of Computer Science, Communication University of China, Beijing, China), Shuchao Feng (School of Science, Communication University of China, Beijing, China), Zhiguo Hong (School of Computer, Faculty of Science and Engineering, Communication University of China, Beijing, China)
Article 5
Line-of-Sight Detection Using Center of Gravity with Pixel Number Variation (pages 64-76)
Takahito Niwa (Aichi Institute of Technology, Toyota, Japan), Ippei Torii (Aichi Institute of Technology, Toyota, Japan), Naohiro Ishii (Aichi Institute of Technology, Toyota, Japan)
Article 6
The Library Big Data Research: Status and Directions (pages 77-88)
Shaochun Xu (Department of Computer Science, Algoma University, Sault Ste Marie, Canada), Wencai Du (Hainan University, Hainan, China & City University of Macao, Macao, China), Chunning Wang (National Geological Library of China, Beijing, China), Dapeng Liu (Gradient X, Santa Monica, CA, USA)
Article 7
Scaling Up Software Birthmarks Using Fuzzy Hashing (pages 89-102)
Takehiro Tsuzaki (Graduate School of Kyoto Sangyo University, Kyoto, Japan), Teruaki Yamamoto (Kyoto Sangyo University, Kyoto, Japan), Haruaki Tamada (Kyoto Sangyo University, Kyoto, Japan), Akito Monden (Okayama University, Okayama, Japan)
Issue 4
Article 1
Clustering Based on Two Layers for Abnormal Event Detection in Video Surveillance (pages 1-18)
Emna Fendri (Miracl-FS, Sfax University, Sfax, Tunisia), Najla Bouarada Ghrab (Miracl-ISIMS, Sfax University, Sfax, Tunisia), Mohamed Hammami (Miracl-FS, Sfax University, Sfax, Tunisia)
Article 2
Machine Learning Classification to Effort Estimation for Embedded Software Development Projects (pages 19-32)
Kazunori Iwata (Department of Business Administration, Aichi University, Nagoya, Japan), Toyoshiro Nakashima (Department of Culture-Information Studies, Sugiyama Jogakuen University, Nagoya, Japan), Yoshiyuki Anan (Process Innovation H.Q, Omron Software Co., Ltd., Kyoto, Japan), Naohiro Ishii (Department of Information Science, Aichi Institute of Technology, Nagoya, Japan)
Article 3
Enhanced Frequent Itemsets Based on Topic Modeling in Information Filtering (pages 33-43)
Than Than Wai (University of Computer Studies, Mandalay, Myanmar), Sint Sint Aung (University of Computer Studies, Mandalay, Myanmar)
Article 4
A Novel Approach for Ontology-Based Dimensionality Reduction for Web Text Document Classification (pages 44-58)
Mohamed K. Elhadad (Military Technical College, Cairo, Egypt), Khaled M. Badran (Military Technical College, Cairo, Egypt), Gouda I. Salama (Military Technical College, Cairo, Egypt)
Article 5
An Evaluative Review and Research Challenges of the Simulation in Cloud Environment (pages 59-73)
Fairouz Fakhfakh (ReDCAD Laboratory, University of Sfax, Sfax, Tunisia), Hatem Hadj Kacem (ReDCAD Laboratory, University of Sfax, Sfax, Tunisia), Ahmed Hadj Kacem (ReDCAD Laboratory, University of Sfax, Sfax, Tunisia)
Volume 4 (2016)
Issue 1
Article 1
Article 2
Metamorphic Relations Based Test Oracles for Image Processing Applications (pages 16-30)
Tahir Jameel (Beihang University, Beijing, China), Mengxiang Lin (Beihang University, Beijing, China), Liu Chao (Beihang University, Beijing, China)
Article 3
Energy-Efficient Computing Solutions for Internet of Things with ZigBee Reconfigurable Devices (pages 31-47)
Grzegorz Chmaj (Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, Las Vegas, NV, USA), Henry Selvaraj (Department of Electrical and Computer Engineering, University of Nevada, Las Vegas, Las Vegas, NV, USA)
Article 4
Multithreading MAS Platform for Real-Time Scheduling (pages 48-60)
Yaroslav Shepilov (SEC “Smart Solutions” Ltd., Samara, Russia), Daria Pavlova (SEC “Smart Solutions” Ltd., Samara, Russia), Daria Kazanskaia (SEC “Smart Solutions” Ltd., Samara, Russia)
Article 5
Using DRAM as Cache for Non-Volatile Main Memory Swapping (pages 61-71)
Hirotaka Kawata (Department of Computer Science, University of Tsukuba, Tsukuba, Japan), Gaku Nakagawa (Department of Computer Science, University of Tsukuba, Tsukuba, Japan), Shuichi Oikawa (Department of Computer Science, University of Tsukuba, Tsukuba, Japan)
Issue 2
Article 1
Service and Billing Management Method for ICT Services (pages 1-16)
Motoi Iwashita (Chiba Institute of Technology, Narashino, Japan), Shigeaki Tanimoto (Chiba Institute of Technology, Narashino, Japan)
Article 2
A Method Based on Self-Study Log Information for Improving Effectiveness of Classroom Component in Flipped Classroom Approach (pages 17-32)
Katsuyuki Umezawa (Hitachi, Ltd., Tokyo, Japan), Takashi Ishida (Takasaki City University of Economics, Takasaki, Japan), Michitaka Aramoto (Ad-Sol Nissin Corporation, Tokyo, Japan), Manabu Kobayashi (Shonan Institute of Technology, Fujisawa, Japan), Makoto Nakazawa (The University of Aizu, Aizuwakamatsu, Japan), Shigeichi Hirasawa (Waseda University, Tokyo, Japan)
Article 3
Cluster Analysis Using N-gram Statistics for Daihinmin Programs and Performance Evaluations (pages 33-57)
Seiya Okubo (School of Management & Information, University of Shizuoka, Shizuoka, Japan), Takaaki Ayabe (Graduate School of Electro-Communications, University of Electro-Communications, Chofu, Japan), Tetsuro Nishino (Graduate School of Informatics and Engineering, University of Electro-Communications, Chofu, Japan)
Article 4
A Decision Making Method Based on Society of Mind Theory in Multi-Player Imperfect Information Games (pages 58-70)
Mitsuo Wakatsuki (Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofu, Japan), Mari Fujimura (Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofu, Japan), Tetsuro Nishino (Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofu, Japan)
Article 5
Association Rule Mining and Audio Signal Processing for Music Discovery and Recommendation (pages 71-87)
Md. Mahfuzur Rahman Siddiquee (Department of Electrical and Computer Engineering, North South University, Dhaka, Bangladesh), Md. Saifur Rahman (Department of Electrical and Computer Engineering, North South University, Dhaka, Bangladesh), Shahnewaz Ul Islam Chowdhury (Department of Electrical and Computer Engineering, North South University, Dhaka, Bangladesh), Rashedur M. Rahman (Department of Electrical and Computer Engineering, North South University, Dhaka, Bangladesh)
Issue 3
Article 1
Big Data Analysis with Hadoop on Personalized Incentive Model with Statistical Hotel Customer Data (pages 1-21)
Sungchul Lee (Department of Computer Science, University of Nevada Las Vegas, Las Vegas, NV, USA), Eunmin Hwang (William F. Harrah College of Hotel Administration, University of Nevada Las Vegas, Las Vegas, NV, USA), Ju-Yeon Jo (Department of Computer Science, University of Nevada Las Vegas, Las Vegas, NV, USA), Yoohwan Kim (Department of Computer Science, University of Nevada Las Vegas, Las Vegas, NV, USA)
Article 2
SQL Scorecard for Improved Stability and Performance of Data Warehouses (pages 22-37)
Nayem Rahman (Intel Corporation, Hillsboro, OR, USA)
Article 3
Formalization of Expert Knowledge About the Usability of Web Pages Based on User Criteria Aggregation (pages 38-50)
Alexander Alfimtsev (Bauman Moscow State Technical University, Moscow, Russia), Sergey Sakulin (Bauman Moscow State Technical University, Moscow, Russia), Alexey Levanov (Bauman Moscow State Technical University, Moscow, Russia)
Article 4
Layered Architecture for Mobile Web Based Application: A Case Study of FNU Student Registration System (pages 51-64)
Bimal Aklesh Kumar (Fiji National University, Lautoka, Fiji)
Article 5
Characteristics of Analysis Methods for the Impression Evaluation Method by Space (pages 65-77)
Shunsuke Akai (Kyoto Institute of Technology, Kyoto, Japan & Kanden System Solutions Co., Inc., Osaka, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Issue 4
Article 1
Combining Indexing Units for Arabic Information Retrieval (pages 1-14)
Souheila Ben Guirat (LISI: Laboratory of Computer Science for Industrial Systems, Carthage University, Tunis, Tunisia & Jarir: Joint Group for Artificial Reasoning and Information Retrieval, Tunisia), Ibrahim Bounhas (LISI: Laboratory of Computer Science for Industrial Systems, Carthage University, Tunis, Tunisia & Jarir: Joint Group for Artificial Reasoning and Information Retrieval, Higher Institute of Documentation (ISD), La Manouba University, Manouba, Tunisia), Yahya Slimani (LISI: Laboratory of Computer Science for Industrial Systems, Carthage University, Tunis, Tunisia & Jarir: Joint Group for Artificial Reasoning and Information Retrieval, Higher Institute of Multimedia Arts of Manouba (ISAMM), La Manouba University, Manouba, Tunisia)
Article 2
Bilateral Histogram Equalization for Contrast Enhancement (pages 15-34)
Feroz Mahmud Amil (Institute of Information Technology, University of Dhaka, Dhaka, Bangladesh), Shanto Rahman (Institute of Information Technology, University of Dhaka, Dhaka, Bangladesh), Md. Mostafijur Rahman (Institute of Information Technology, University of Dhaka, Dhaka, Bangladesh), Emon Kumar Dey (Institute of Information Technology, University of Dhaka, Dhaka, Bangladesh)
Article 3
Exploration and Exploitation of Developers' Sentimental Variations in Software Engineering (pages 35-55)
Md Rakibul Islam (University of New Orleans, New Orleans, LA, USA), Minhaz F. Zibran (University of New Orleans, New Orleans, LA, USA)
Article 4
Test Case Reduction Using Data Mining Technique (pages 56-70)
Ahmad A. Saifan (Department of Computer Information Systems, Faculty of IT, Yarmouk University, Irbid, Jordan), Emad Alsukhni (Department of Computer Information Systems, Faculty of IT, Yarmouk University, Irbid, Jordan), Hanadi Alawneh (Department of Computer Information Systems, Faculty of IT, Yarmouk University, Irbid, Jordan), Ayat AL Sbaih (Department of Computer Information Systems, Faculty of IT, Yarmouk University, Irbid, Jordan)
Volume 3 (2015)
Issue 1
Article 1
An Industrial Case Study on Managing Variability with Traceability in Software Product Lines (pages 1-15)
Taeho Kim (Department of Computer Science, KAIST, Daejeon, Korea), Sungwon Kang (Department of Computer Science, KAIST, Daejeon, Korea)
Article 2
Analysis of a Code Review Tool Evolution: A Case Study of Rietveld to Gerrit (pages 16-35)
Osamu Mizuno (Graduate School of Science and Technology, Kyoto Institute of Technology, Kyoto, Japan), Junwei Liang (Graduate School of Science and Technology, Kyoto Institute of Technology, Kyoto, Japan)
Article 3
Fault-Prone Module Prediction Approaches Using Identifiers in Source Code (pages 36-49)
Osamu Mizuno (Graduate School of Science and Technology, Kyoto Institute of Technology, Kyoto, Japan), Naoki Kawashima (Graduate School of Science and Technology, Kyoto Institute of Technology, Kyoto, Japan), Kimiaki Kawamoto (Graduate School of Science and Technology, Kyoto Institute of Technology, Kyoto, Japan)
Article 4
Classification of Bug Injected and Fixed Changes Using a Text Discriminator (pages 50-62)
Akihisa Yamada (Graduate School of Science and Technology, Kyoto Institute of Technology, Kyoto, Japan), Osamu Mizuno (Graduate School of Science and Technology, Kyoto Institute of Technology, Kyoto, Japan)
Article 5
Proposals of a Method Detecting Learners' Difficult Points in Object Modeling Exercises and a Tool to Support the Method (pages 63-74)
Takafumi Tanaka (Graduate School of Education, Tokyo Gakugei University, Tokyo, Japan), Kazuki Mori (Graduate School of Engineering and Science, Shibaura Institute of Technology, Tokyo, Japan), Hiroaki Hashiura (Department of Computer and Information Engineering, Nippon Institute of Technology, Saitama, Japan), Atsuo Hazeyama (Department of Information Science, Tokyo Gakugei University, Tokyo, Japan), Seiichi Komiya (GRACE Center National Institute of Informatics, Tokyo, Japan)
Article 6
Restful Web Service and Web-Based Data Visualization for Environmental Monitoring (pages 75-94)
Sungchul Lee (Department of Computer Science, University of Nevada Las Vegas, Las Vegas, NV, USA), Ju-Yeon Jo (Department of Computer Science, University of Nevada Las Vegas, Las Vegas, NV, USA), Yoohwan Kim (Department of Computer Science, University of Nevada Las Vegas, Las Vegas, NV, USA)
Issue 2
Article 1
The Effects of the State of Union Address of USA Presidents to Their Performance Ratings (pages 1-12)
Carl Lee (Central Michigan University, MI, USA)
Article 3
Virtual Agent as a User Interface for Home Network System (pages 13-23)
Hiroyasu Horiuchi (Graduate School of System Informatics, Kobe University, Hyogo, Japan), Sachio Saiki (Graduate School of System Informatics, Kobe University, Hyogo, Japan), Shinsuke Matsumoto (Graduate School of System Informatics, Kobe University, Hyogo, Japan), Masahide Namamura (Graduate School of System Informatics, Kobe University, Hyogo, Japan)
Article 4
A Platform for Analyzing Behaviors of Service-Oriented Application Based on the Probabilistic Model Checking (pages 24-38)
Jinyu Kai (School of Computer Engineering and Science, Shanghai University, Shanghai, P.R. China & Shanghai Key Laboratory of Computer Software Evaluating and Testing, Shanghai, P.R. China), Huaikou Miao (School of Computer Engineering and Science, Shanghai University, Shanghai, P.R. China & Shanghai Key Laboratory of Computer Software Evaluating and Testing, Shanghai, P.R. China), Kun Zhao (School of Computer Engineering and Science, Shanghai University, Shanghai, P.R. China), Jiaan Zhou (School of Computer Engineering and Science, Shanghai University, Shanghai, P.R. China), Honghao Gao (Computing Center, Shanghai University, Shanghai, P.R. China)
Article 5
IDA: An Intelligent Document Analysis System for Evaluating Corporate Governance Practices Based on SEC Required Filings (pages 39-51)
Ying Zheng (Department of Computer Sciences, Towson University, Baltimore, MD, USA), Harry Zhou (Department of Computer Sciences, Towson University, Baltimore, MD, USA)
Issue 3
Article 1
An Emotional Scene Retrieval Framework for Lifelog Videos Using Ensemble Clustering (pages 1-13)
Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Atsushi Morikuni (Department of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 2
To Prevent Reverse-Enginnering Tools by Shuffling the Stack Status with Hook Mechanism (pages 14-25)
Kazumasa Fukuda (Kyoto Sangyo University, Kyoto, Japan), Haruaki Tamada (Kyoto Sangyo University, Kyoto, Japan)
Article 3
A Case Study of Dynamic Analysis to Locate Unexpected Side Effects Inside of Frameworks (pages 26-40)
Izuru Kume (Nara Institute of Science and Technology, Ikoma, Japan), Masahide Nakamura (Kobe University, Kobe, Japan), Naoya Nitta (Konan University, Kobe, Japan), Etsuya Shibayama (The University of Tokyo, Tokyo, Japan)
Article 4
A Source Code Plagiarism Detecting Method Using Sequence Alignment with Abstract Syntax Tree Elements (pages 41-56)
Hiroshi Kikuchi (Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofu, Japan), Takaaki Goto (Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofu, Japan), Mitsuo Wakatsuki (Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofu, Japan), Tetsuro Nishino (Graduate School of Informatics and Engineering, The University of Electro-Communications, Chofu, Japan)
Article 5
RuCAS: Rule-Based Framework for Managing Context-Aware Services with Distributed Web Services (pages 57-68)
Hiroki Takatsuka (Graduate School of System Informatics, Kobe University, Kobe, Japan), Sachio Saiki (Graduate School of System Informatics, Kobe University, Kobe, Japan), Shinsuke Matsumoto (Graduate School of System Informatics, Kobe University, Kobe, Japan), Masahide Namamura (Graduate School of System Informatics, Kobe University, Kobe, Japan)
Issue 4
Article 1
On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations (pages 1-17)
Cheng-Chieh Li (Tunghai University, Taichung, Taiwan), Jung-Chun Liu (Tunghai University, Taichung, Taiwan), Chu-Hsing Lin (Tunghai University, Taichung, Taiwan), Winston Lo (Tunghai University, Taichung, Taiwan)
Article 2
Design and Evaluation of Automated Scoring: Java Programming Assignments (pages 18-32)
Yuki Akahane (Graduate School of Engineering, Tokyo Denki University, Tokyo, Japan), Hiroki Kitaya (Graduate School of Engineering, Tokyo Denki University, Tokyo, Japan), Ushio Inoue (Graduate School of Engineering, Tokyo Denki University, Tokyo, Japan)
Article 3
HMM-Based Vietnamese Speech Synthesis (pages 33-47)
Son Trinh (The University of Information Technology, Ho Chi Minh City, Vietnam), Kiem Hoang (The University of Information Technology, Ho Chi Minh City, Vietnam)
Article 4
An Improved Motion-Sensing Based Monitoring System for Smart Health Care (pages 48-61)
Ruiling Gao (Department of Electrical and Computer Engineering, Tufts University, Medford, MA, USA), Minghuan Zhao (Department of Electrical and Computer Engineering, Tufts University, Medford, MA, USA), Zhihui Qiu (Department of Electrical and Computer Engineering, Tufts University, Medford, MA, USA), Yingzhou Yu (Department of Electrical and Computer Engineering, Tufts University, Medford, MA, USA), C. Hwa Chang (Department of Electrical and Computer Engineering, Tufts University, Medford, MA, USA)
Article 5
Recognition of Handwritten Hindi Text Using Middle Region of the Words (pages 62-71)
Naresh Kumar Garg (Giani Zail Singh Punjab Technical University Campus, Bathinda, India), Lakhwinder Kaur (Department of Computer Engineering, Punjabi University, Patiala, India), M. K. Jindal (Panjab University Regional Centre, Muktsar, India)
Article 6
Graph-Based Spam Image Detection for Mobile Phone Spam Image Filtering (pages 72-86)
So Yeon Kim (Department of Information and Computer Engineering, Ajou University, Suwon, South Korea), Kyung-Ah Sohn (Department of Information and Computer Engineering, Ajou University, Suwon, South Korea)
Volume 2 (2014)
Issue 1
Article 1
Computational Intelligence in Cross Docking (pages 1-8)
Bo Xing (University of Pretoria, South Africa)
Article 2
Modeling Business and Requirements Relationships to Facilitate the Identification of Architecturally Significant Requirements (pages 9-24)
Javier Berrocal (University of Extremadura, Caceres, Spain), Jose Garcia-Alonso (University of Extremadura, Spain), Juan Manuel Murillo (Universidad de Extremadura, Spain)
Article 3
Reduction of Defect Misclassification of Electronic Board Using Multiple SVM Classifiers (pages 25-36)
Takuya Nakagawa (Chubu University, Aichi, Japan), Yuji Iwahori (Chubu University, Aichi, Japan), M. K. Bhuyan (Indian Institute of Technology Guwahati, Assam, India)
Article 4
Reusable Business Tier Components: Based on CLI and Driven by a Single Wide Typed Service (pages 37-60)
Óscar Mortágua Pereira (Instituto de Telecomunicações, DETI – University of Aveiro, Portugal), Rui L. Aguiar (Instituto de Telecomunicações, DETI – University of Aveiro, Portugal), Maribel Yasmina Santos (Centro Algoritmi, DSI – University of Minho, Guimarães, Portugal)
Article 5
Analog Learning Neural Network using Two-Stage Mode by Multiple and Sample Hold Circuits (pages 61-72)
Masashi Kawaguchi (Suzuka National College of Technology, Suzuka, Japan), Naohiro Ishii (Aichi Institute of Technology, Aichi, Japan), Takashi Jimbo (Nagoya Institute of Technology, Aichi, Japan)
Article 6
The Multi-Agents Architecture for Emotion Recognition: Case of Information Retrieval System (pages 73-85)
Mohamed Néji (University of Sfax, National Engineering School of Sfax (ENIS), Sfax, Tunisia), Ali Wali (University of Sfax, National Engineering School of Sfax (ENIS), Sfax, Tunisia), Adel M. Alimi (University of Sfax, National Engineering School of Sfax (ENIS), Sfax, Tunisia)
Article 7
Automated Evaluation of Interest Point Detectors (pages 86-105)
Simon R. Lang (School of Computer Science, Engineering and Mathematics, Flinders University, Adelaide, Australia), Martin H. Luerssen (School of Computer Science, Engineering and Mathematics, Flinders University, Adelaide, Australia), David M. W. Powers (School of Computer Science, Engineering and Mathematics, Flinders University, Adelaide, Australia)
Issue 2
Article 1
Temporal Join with Hilbert Curve Mapping and Adaptive Buffer Management (pages 1-19)
Jaime Raigoza (California State University, Chico, CA, USA), Junping Sun (Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, USA)
Article 2
Proxy-Monitor: An Integration of Runtime Verification with Passive Conformance Testing (pages 20-42)
Sébastien Salva (Clermont-Ferrand University, Aubière, France), Tien-Dung Cao (School of Engineering, Tan Tao University, Long An, Vietnam)
Article 3
Investigation of ANFIS and FFBNN Recognition Methods Performance in Tamil Speech Word Recognition (pages 43-53)
S. Rojathai (Kalasalingam University, Madurai, India), M. Venkatesulu (Kalasalingam University, Madurai, India)
Article 4
Analysis and Evaluation of Software Artifact Reuse Environments (pages 54-65)
Sajjad Mahmood (Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia), Moataz Ahmed (Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia), Mohammad Alshayeb (Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia)
Issue 3
Article 1
Rice Paper Classification Study Based on Signal Processing and Statistical Methods in Image Texture Analysis (pages 1-14)
Haotian Zhai (Electronic Engineering Department, Jinan University, Guangzhou, China), Hongbin Huang (Electronic Engineering Department, Jinan University, Guangzhou, China), Shaoyan He (Electronic Engineering Department, Jinan University, Guangzhou, China), Weiping Liu (Electronic Engineering Department, Jinan University, Guangzhou, China)
Article 2
Development and Technology Research on System Used for Colour Inspection in Traditional Chinese Medicine (pages 15-25)
Dongmei Zheng (Wenai Song, Software School, North University of China, Taiyuan, China), Zhendong Dai (Institute of Bio-Inspired Structure and Surface Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China), Hongmo Wang (School of Chinese Medicine, Capital University of Medical Sciences, Beijing, China)
Article 3
Preliminary Evaluation of a Software Security Learning Environment (pages 26-39)
Atsuo Hazeyama (Department of Information Science, Tokyo Gakugei University, Japan), Masahito Saito (Graduate School of Education, Tokyo Gakugei University, Japan)
Article 4
Estimating Interval of the Number of Errors for Embedded Software Development Projects (pages 40-50)
Kazunori Iwata (Department of Business Administration, Aichi University, Nagoya, Japan), Toyoshiro Nakasima (Department of Culture-Information Studies, Sugiyama Jogakuen University, Nagoya, Japan), Yoshiyuki Anan (Process Innovation H.Q, Omron Software Co., Ltd., Japan), Naohiro Ishii (Department of Information Science, Aichi Institute of Technology, Toyota, Japan)
Issue 4
Article 1
LAKE: Using Log Files Recorded during Program Execution (pages 1-12)
Shaochun Xu (Department of Computer Science, Algoma University, Saul Ste. Marie, ON, Canada), Dapeng Liu (Gradient X, Santa Monica, CA, USA)
Article 2
Generation of Concurrency Control Program by Extending Functions in Genetic Programming (pages 13-27)
Teruhisa Hochin (Kyoto Institute of Technology, Kyoto, Japan), Tatsuya Saigo (Kyoto Institute of Technology, Kyoto, Japan), Shinji Tamura (Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Kyoto Institute of Technology, Kyoto, Japan)
Article 3
New Approach to Speedup Dynamic Program Parallelization Analysis (pages 28-47)
Sudhakar Sah (Symbiosis Institute of Research and Innovation, Lavale, Pune, India & Samsung SDS, Seoul, South Korea), Vinay G. Vaidya (KPIT Technologies, Hinjawadi, Pune, India)
Article 4
Analysis Method Based on Impression Words for Impression Evaluation Method by Space (pages 48-59)
Shunsuke Akai (Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Kyoto Institute of Technology, Kyoto, Japan)
Article 5
Increasing the Accuracy of Software Fault Prediction using Majority Ranking Fuzzy Clustering (pages 60-71)
Golnoush Abaei (University Technology Malaysia, Johor, Malaysia), Ali Selamat (UTM-IRDA Digital Media Centre, K-Economy Research Alliance UTM & University Technology Malaysia, Johor, Malaysia)
Article 6
On Temporal Summation in Chaotic Neural Network with Incremental Learning (pages 72-84)
Toshinori Deguchi (Gifu National College of Technology, Gifu, Japan), Toshiki Takahashi (Gifu National College of Technology, Gifu, Japan), Naohiro Ishii (Aichi Institute of Technology, Toyota, Japan)
Volume 1 (2013)
Issue 1
Article 1
Coordination Languages and Models for Open Distributed Systems (pages 1-13)
Chia-Chu Chiang (Department of Computer Science, University of Arkansas, Little Rock, AR, USA), Roger Lee (Department of Computer Science, Central Michigan University, Mount Pleasant, MI, USA)
Article 2
Mouth Shape Detection Based on Template Matching and Optical Flow for Machine Lip Reading (pages 14-25)
Tsuyoshi Miyazaki (Department of Information and Computer Science, Kanagawa Institute of Technology, Atsugi, Kanagawa, Japan), Toyoshiro Nakashima (Department Culture-Information Studies, Sugiyama Jogakuen University, Chikusa, Nagoya, Aichi, Japan), Naohiro Ishii (Department of Information Science, Aichi Institute of Technology, Yakusa, Toyota, Aichi, Japan)
Article 3
Formalization of UML Composition in OCL (pages 26-40)
Hector M. Chavez (Department of Computer Science, Western Michigan University, Kalamazoo, MI, USA), Wuwei Shen (Department of Computer Science, Western Michigan University, Kalamazoo, MI, USA)
Article 4
2-SQUARE: A Web-Based Enhancement of SQUARE Privacy and Security Requirements Engineering (pages 41-53)
Alan Lai (College of Agricultural and Environmental Science, University of California, Davis, CA, USA), Cui Zhang (Department of Computer Science, California State University, Sacramento, CA, USA), Senad Busovaca (Department of Computer Science, California State University, Sacramento, CA, USA)
Article 5
Speech Synthesis of Emotions Using Vowel Features (pages 54-67)
Kanu Boku (Graduate School of Life and Environmental Sciences, Kyoto Prefectural University, Sakyo-ku Kyoto, Japan), Taro Asada (Graduate School of Life and Environmental Sciences, Kyoto Prefectural University, Sakyo-ku Kyoto, Japan), Yasunari Yoshitomi (Graduate School of Life and Environmental Sciences, Kyoto Prefectural University, Sakyo-ku Kyoto, Japan), Masayoshi Tabuse (Graduate School of Life and Environmental Sciences, Kyoto Prefectural University, Sakyo-ku Kyoto, Japan)
Article 6
An Empirical Study on Novice Programmer’s Behaviors with Analysis of Keystrokes (pages 68-87)
Dapeng Liu (GradientX, Santa Monica, CA, USA), Shaochun Xu (Department of Computer Science, Algoma University, Sault Ste Marie, ON, Canada), Huafu Liu (Department of Computer Science, Changsha University, Changsha, China)
Issue 2
Article 1
An Approach to Co-Dependent Value Based Internet Advertisement Auction (pages 1-15)
Satoshi Takahashi (University of Tsukuba, Tsukuba, Ibaraki Prefecture, Japan), Tokuro Matsuo (Advanced Institute of Industrial Technology, Tokyo, Japan), Roger Y. Lee (Software Engineering and Information Technology Institute, Central Michigan University, Mt. Pleasant, MI, USA)
Article 2
The Efficiency of Interactive Differential Evolution in Creation of Sound Contents: In Comparison with Interactive Genetic Algorithm (pages 16-27)
Makoto Fukumoto (Fukuoka Institute of Technology, Fukuoka, Japan), Ryota Yamamoto (Fukuoka Institute of Technology, Fukuoka, Japan), Shintaro Ogawa (Fukuoka Institute of Technology, Fukuoka, Japan)
Article 3
A Strategy for Managing Complexity of the Global Market and Prototype Real-Time Scheduler for LEGO Supply Chain (pages 28-39)
Bjorn Madsen (LEGO System, Billund, Denmark), George Rzevski (Multi-Agent Technology Ltd., London, England, UK), Petr Skobelev (Multi-Agent Technology Ltd., Samara, Russia), Alexander Tsarev (Smart Solutions Ltd., Samara, Russia)
Article 4
Vector Operations in Neural Network Computations (pages 40-52)
Naohiro Ishii (Aichi Institute of Technology, Toyota, Japan), Toshinori Deguchi (Gifu National College of Technology, Gifu, Japan), Masashi Kawaguchi (Suzuka National College of Technology, Suzuka, Japan), Hiroshi Sasaki (Fukui University of Technology, Fukui, Japan)
Article 5
Estimation of Factor Scores of Impressions of Question and Answer Statements (pages 53-66)
Yuya Yokoyama (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 6
Person Identification Using Top-View Image with Depth Information (pages 67-79)
Daichi Kouno (Department of Artifical Intelligence, Kyushu Institute of Technology, Iizuka, Fukuoka, Japan), Kazutaka Shimada (Department of Artifical Intelligence, Kyushu Institute of Technology, Iizuka, Fukuoka, Japan), Tsutomu Endo (Department of Artifical Intelligence, Kyushu Institute of Technology, Iizuka, Fukuoka, Japan)
Issue 3
Article 1
Research on Measuring Semantic Correlation Based on the Wikipedia Hyperlink Network (pages 1-11)
Feiyue Ye (School of Computer Engineering and Science, Shanghai University, Shanghai, China), Feng Zhang (School of Computer Engineering and Science, Shanghai University, Shanghai, China)
Article 2
CTSA: Concurrent Tuple Set Architecture Extending Concurrency to Call Level Interfaces (pages 12-33)
Óscar Mortágua Pereira (Instituto de Telecomunicações, DETI – University of Aveiro, Aveiro, Portugal), Rui L. Aguiar (Instituto de Telecomunicações, DETI – University of Aveiro, Aveiro, Portugal), Maribel Yasmina Santos (Centro Algoritmi, DSI – University of Minho, Guimarães, Portugal)
Article 3
A Comparative Analysis of Reliability Assessment Methods for Web-based Software (pages 34-47)
Jinhee Park (Korea Advanced Institute of Science and Technology, Daejeon, South Korea), Yeong-Seok Seo (Korea Advanced Institute of Science and Technology, Daejeon, South Korea), Jongmoon Baik (Korea Advanced Institute of Science and Technology, Daejeon, South Korea)
Article 4
Platform Independent Analysis of Probabilities on Multithreaded Programs (pages 48-65)
Yuting Chen (School of Software, Shanghai Jiao Tong University, Shanghai, China & Shanghai Key Laboratory of Computer Software Testing & Evaluating, Shanghai, China )
Article 5
Formal Specification and Implementation of Priority Queue using Stream Functions (pages 66-75)
Gongzhu Hu (Central Michigan University, Mount Pleasant, MI, USA), Jin Zhang (Hainan University, Haikou, China), Roger Lee (Department of Computer Science, Central Michigan University, Mount Pleasant, MI, USA)
Social Software and the Evolution of User Expertise: Future Trends in Knowledge Creation and Dissemination
Book Review
Ana Azevedo (Algoritmi R&D Center, University of Minho, Braga, Portugal & ISCAP, Polytechnic Institute of Porto, Porto, Portugal)
Issue 4
Article 1
Unsupervised Emotional Scene Detection from Lifelog Videos Using Cluster Ensembles (pages 1-15)
Hiroki Nomiya (Department of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Atsushi Morikuni (Department of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Department of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 2
Improvement of Estimation of Objective Scores of Answer Statements Posted at Q&A Sites (pages 16-30)
Yuya Yokoyama (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
Article 3
A Comparative Analysis of Reliability Assessment Methods for Web-Based Software (pages 31-44)
Jinhee Park (Korea Advanced Institute of Science and Technology, Daejeon, South Korea), Yeong-Seok Seo (Korea Advanced Institute of Science and Technology, Daejeon, South Korea), Jongmoon Baik (Korea Advanced Institute of Science and Technology, Daejeon, South Korea)
Article 4
Construction of Shadow Model by Robust Features to Illumination Changes (pages 45-55)
Shuya Ishida (Chubu University, Kasugai, Japan), Shinji Fukui (Aichi University of Education, Kariya, Japan), Yuji Iwahori (Chubu University, Kasugai, Japan), M. K. Bhuyan (Department of Electronics and Electrical Engineering, Indian Institutes of Technology, Guwahati, Assam, India), Robert J. Woodham (Department of Computer Science, University of British Columbia, Vancouver, Canada)
Article 5
Are Socio-Economic, Health Infrastructure, and Demographic Factors Associated with Infant Mortality in Russia? (pages 56-72)
Carl Lee (Department of Mathematics, Central Michigan University, Mount Pleasant, MI, USA), Sergey Soshnikov (Federal Research Institute for Health Organization and Informatics of Ministry of Health of the Russian Federation, Moscow, Russia), Sergey Vladimirov (Independent Laboratory SQLab, Moscow, Russia)