2016
2016
Volume 10, Number 2, 2016 February
-
- Improved Bat Algorithm for Reliability-Redundancy Allocation Problems, Yubao Liu (pp. 1-12).
- Security Threats on Mobile Devices and their Effects: Estimations for the Future, Murat Yesilyurt, Yildiray Yalman (pp. 13-26).
- Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments, Xiao Jinke (pp. 27-38).
- Combination Weighting Method Based on Maximizing Deviations and Normalized Constraint Condition, Fulian Yin, Lu Lu, Jianping Chai and Yanbing Yang (pp. 39-51).
- A View on LSB Based Audio Steganography, Ratul Chowdhury, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay and Tai-hoon Kim (pp. 51-62).
- Vehicle Scheduling Optimization Based on Chaos Ant Colony Algorithm in Emergency Rescue, Lingxia Liu, Xuexia Gao and Qiang Song (pp. 63-74).
- Improvement Framework of Korean Certification System for Cloud Service Focus on Security, Hangoo Jeon, Young-Gi Min and Kwang-Kyu Seo (pp. 75-84).
- Research on the Strategy of Role Management Based on Grid Environment, Yi He Liu, Yu Ping Qin, Shuang Zhang (pp. 95-94).
- Research on Ant Colony Algorithm Optimization Neural Network Weights Blind Equalization Algorithm, Yanxiang Geng, Liyi Zhang, Yunshan Sun, Yao Zhang, Nan Yang and Jiawei Wu (pp. 95-104).
- Application of Audio Watermarking Procedures for Mix Music, Youngseok Lee, Jongweon Kim (pp. 105-114).
- The Lightweight Ownership Transfer Protocol using Physically Unclonable Function, Xuejun Zhang, Wanlu Huang, He Xu and Yu Wang (pp. 115-128).
- Multi-sensor Information Fusion Steady-State Kalman Estimator for Systems with System Errors and Sensor Errors, Yun Li, Ming Zhao, Gang Hao (pp. 129-140).
- Security Enhancement Scheme supporting range queries on encrypted DB for Secure e-Navigation Era, Donghyeok Lee and Namje Park (pp. 141-150).
- The Improvement of the Design Standard of Overloaded Highway, Dou Yuanming, Zhang Jingjing and Hu Chao (pp. 151-162).
- Cryptanalysis of a Biometric-based Multi-Server Authentication Scheme, Tao Wan, Nan Jiang, Jianfeng Ma, Lin Yang (pp. 163-170).
- On the Deployment of Citizens’ Privacy Preserving Collective Intelligent eBusiness Models in Smart Cities, Artemis Avgerou, Panayotis E. Nastou, Dimitra Nastouli, Panos M. Pardalos and Yannis C. Stamatiou (pp. 171-184).
- Dynamic Assessment of Business Performance in Green Supply Chain based on Analytic Hierarchy Process Method, Xueling Nie (pp. 185-196).
- Evaluating Teaching Quality in Higher Education: Analytical Modelling and Computerized Implementation, Jingyun Zheng (pp. 197-204).
- A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map, Shouvik Chakraborty, Arindrajit Seal, Mousomi Roy, Kalyani Mali (pp. 205-216).
- Effective and Secure Access Control for Multi-Authority Cloud Storage Systems, Lin Xin, Xingming Sun, Zhangjie Fu, Liang-Ao Zhang and Jie Xi (pp. 217-236).
- Network Traffic Classification using Genetic Algorithms based on Support Vector Machine, Jie Cao, Zhiyi Fang (pp. 237-246).
- User Action-based Financial Fraud Detection Method by SVDD, Seong-Ho An, Kihyo Nam, Mun-Kweon Jeong, Yong-Rak Choi (pp. 247-254).
- Study on Multimedia Teaching and the Reform of College Physical Education: Evaluation of Teaching Effect, Lifeng Xu (pp. 255-266).
- Effects of Salt Water Drip Irrigation on Jujube Roots Soil Available Nitrogen Distribution: A Security Assurance Perspective, Xingpeng Wang, Tiecheng Bai, Jinhu Zhi and Zhaoyang Li (pp. 267-278).
- A Study to Examine the Superiority of CSAVK, AVK over Conventional Encryption with a Single Key, Rajat S Goswami, Swarnendu K Chakraborty, Chandan T Bhunia (pp. 279-286).
- An Electronic Cash System Based on Certificateless Group Signature, Liang Yan, Zhang Xiao and Zheng Zhi-ming (pp. 287-300).
- Cryptographic Protocols for Secure Cloud Computing, S. A. Alhumrani and Jayaprakash Kar (pp. 301-310).
- Research on the Security Enhanced Smart Hardware Assisted Regression Analysis and Health Monitoring Technique based Expanded Training Exercise Effect Evaluation Model, Kejin Shi (pp. 311-324).
- An Improved Event Scenario Correlation Method for Multi-Source Security Log, Qianyun Wang, Shuyu Chen, Hancui Zhang and Tianshu Wu (pp. 325-340).
- AL-Museelem Waleed, Li Chunlin, “User Privacy and Security in Cloud Computing”,(pp. 341-352).
- Novel Quantum-Inspired Co-evolutionary Algorithm, Ming Shao, Liang Zhou (pp. 353-364).
- An Extension Approach for Threat Detection and Defense of Software-Defined Networking, Hui Xu, Chunzhi Wang and Hongwei Chen (pp. 365-374).
- Network Security in Embedded System Using TLS, Vivek Negi, Himanshu Verma, Ipsita Singh, Aditya Vikram, Kanika Malik, Archana Singh, Gaurav Verma (pp. 375-384).
- Smartly Time of Arrival Interpretation in the Wide Band Ranging System, Xiaolin Liang, Hao Zhang, Tingting Lv, T. Aaron Gulliver (pp. 385-410).
- A Hybrid Key Establishment Scheme for Wireless Sensor Networks, Jianmin Zhang, Qingmin Cui, Rui Yang (pp. 411-422).
- Secure Linear Feedback Shift Register based IPv6 in VANET, Abhishek singh, Shekhar Verma and Geetam Singh Tomar (pp. 423-436).
- A Novel Intelligent Recommendation Algorithm based on Web Data Mining Technique under the Background of Deep Neural Network, Changchun Yang, Jun Wang, Min Yuan, Chenyang Lei (pp. 432-450).