Digital Library
Vol. 14, No. 7, July 31, 2020
[Regular Papers]
Artificial Intelligence & Big Data
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Scenic Image
- Big data
- Ancient city
- Content Analysis Method
- Social Network Analysis
- Entropy Weight Method
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
IoT & Application
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Services & Management
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Demographic characteristics
- Information Retrieval
- search engine results pages
- User Behaviors
- Web search engines
Information Systems
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Phase-generated carrier
- fiber-optic interferometric sensors
- carrier phase delay synchronization
- orthogonal phase-locked
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Information-centric networking
- Network cache
- Content poisoning attacks
- Content Verification
- Verification overhead
Multimedia & Computer Vision
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Face Image-based Seed
- Feature Extraction Ensemble
- Bio-Key Generation
- Biometric Cryptography
- Multivariate Quadratic-based Post-Quantum Cryptography
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Ensemble clustering
- supplementary information
- reconstructed mapping coefficient
- Information entropy
- Spearman coefficient
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Depth video
- intra prediction
- Versatile Video Coding (VVC)
- fast coding algorithm
- mode decision
- early termination
Gun-Yoon Shin,
Sung-Sam Hong,
Dong-Wook Kim,
Cheol-Hun Hwang,
Myung-Mook Han,
Hwayoung Kim,
Young jae Kim
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Networking
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Security & Privacy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Mixed kernel function
- Particle Swarm Optimization
- kernel principal component analysis
- Extreme Learning Machine
- Intrusion Detection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Network Anomaly Detection
- data balancing
- recursive feature addition
- parameters combination optimization
- random forests
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Wireless Communication
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives