JISE
Journal of Information Science and Engineering
Vol. 35 No. 2 (March 2019)
REGULAR
Computer Systems
1. A Buffered Genetic Algorithm for Automated Branch Coverage in Software Testing
T. MANIKUMAR,A. JOHN SANJEEV KUMAR........ pp. 245-273
AI, Machine Learning, and Pattern Recognition
2. Iris Recognition System Based on Fractal Dimensions Using Improved Box Counting
EBRAHIMI EBRAHIMI,MOHAMMAD BAGHER TAVAKOLI,FARBOD SETOUDEH........ pp. 275-290
3. Robust Speaker Verification via RPCA under Additive Noise
MING-HE WANG,ER-HUA ZHANG,ZHEN-MIN TANG........ pp. 291-305
4. A Deterministic Approach for Finding the
T
Onset Parameter of Flatten
T
Wave in ECG
UZAIR IQBAL,YING-WAH TEH,MUHAMMAD HABIB UR REHMAN,QURATULAIN MASTOI........ pp. 307-321
Theoretical Computer Science and Information Theory
5. Real-time Auditing of the Runtime Environment for Cloud Computing Platforms
GWAN-HWAN HWANG,KUN-YIH HUANG,BO-SIAN LIAO,YI-LING YUAN,HUNG-FU CHEN........ pp. 323-339
6. An Efficient Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings
LING XIONG,TU PENG,PENG PENG,HONG-BIN LIANG,ZHI-CAI LIU........ pp. 341-360
Network and Communication
7. IMBF – Counteracting Denial-of-Sleep Attacks in 6LowPAN Based Internet of Things
A. JAHIR HUSAIN,M. A. MALUK MOHAMED........ pp. 361-374
8. An Adaptive Broadcast and Multicast Traffic Cutting Framework to Improve Ethernet Efficiency by SDN
YOU-CHIUN WANG,HAN HUA........ pp. 375-392
9. Analysis of Energy Efficiency for MIMO Wireless Network using Manifold Techniques
AHMED ALZAHRANI,VIJEY THAYANANTHAN........ pp. 393-409
Database and Engineering
10. Analyzing the Dynamics of Stock Network for Recommanding Stock Portfolio
YUN-JUNG LEE,GYUN WOO........ pp. 411-427
11. Guest Recommendation for Holding Social Activities Among Friends Through Social Platforms
CHIH-HUA TAI........ pp. 429-445
12. DSM: A Low-Overhead, High-Performance, Dynamic Stream Mapping Approach for MongoDB
TRONG-DAT NGUYEN,SANG-WON LEE........ pp. 447-469
13. An Efficient Search Algorithm for Fingerprint Databases
GUANG-HO CHA........ pp. 471-484