Special Issue "Selected Papers from IIKII 2019 Conferences in Computers"

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: closed (31 March 2020).

Special Issue Editors

Prof. Dr. Teen­-Hang Meen
E-Mail Website
Guest Editor
Department of Electronic Engineering National Formosa University, Yunlin 632, Taiwan
Interests: IOT devices; photovoltaic devices; STEM education
Special Issues, Collections and Topics in MDPI journals
Prof. Dr. Charles Tijus
E-Mail Website
Guest Editor
Director of the Cognitions Humaine et Artificielle Laboratory, Professeur de Psychologie Cognitive, Université Paris 8, Paris 93526, France
Interests: internet of objects; data mining; brain–computer interaction
Special Issues, Collections and Topics in MDPI journals
Prof. Dr. Kuo-Kuang Fan
E-Mail Website
Guest Editor
Department of Digital Media Design, National Yunlin University of Science and Technology, Yunlin 640, Taiwan
Interests: human–computer interaction; machine learning; data mining
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The International Institute of Knowledge Innovation and Invention (IIKII, http://www.iikii.org) is an institute in Taiwan that promotes the exchange of innovations and inventions and establishes a communication platform for international innovations and research. This year, IIKII is cooperating with the IEEE Tainan Section Sensors Council to hold IEEE conferences, such as IEEE ECICE 2019 (http://2019.ecice.asia) and IEEE ICCCE 2019 (http://www.iccce.asia). The booming economic development in Asia, particularly the leading manufacturing industries from automobile, machinery, computer, communication, consumer product, and flat panel display to semiconductor and micro/nano areas, have attracted intense attention among universities, research institutions, and many industrial corporations. These two conferences aim to provide a broad international forum for world researchers, engineers, and professionals working in the areas of Computation, Communication, and Internet Technologies to discuss and exchange various scientific, technical, and management aspects across the wide spectrum of society.

This Special Issue entitled “Selected Papers from IIKII 2019 conferences” aims to select excellent papers from the IIKII 2019 conferences. The theme of the Special Issue is focusing on emerging technologies. Papers with innovative ideas or research results in all aspects of Computation, Communication, and Internet Technologies are encouraged to submit. We invite investigators to contribute original research articles, as well as review articles, to this Special Issue. Potential topics include but are not limited to:

  • Computer science and engineering
  • Computers and computation
  • Information systems
  • Software, graphics, programming
  • Computer hardware and peripheral device
  • Computer networking and Internet
  • Applied mathematics
  • Security
  • Communications and control
  • Computers in simulation

Schedule

Manuscript Due: 31 March 2020
First Round of Reviews: 15 May 2020
Second Round of Reviews: 30 June 2020
Acceptance of Final papers and Publication: 31 July 2020

Prof. Dr. Teen­-Hang Meen
Prof. Dr. Charles Tijus
Prof. Dr. Kuo-Kuang Fan
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Computer science and engineering
  • Computers and computation
  • Computer hardware and peripheral devices
  • Computer networking and Internet
  • Communications and control

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Dynamic Boundary of P-Set and Intelligent Acquisition for Two Types of Information Fusion
Computers 2020, 9(1), 3; https://doi.org/10.3390/computers9010003 - 16 Jan 2020
Cited by 2 | Viewed by 2385
Abstract
The development of information technology brings the challenge of data redundancy and data shortage to information fusion. Based on the dynamic boundary characteristics of p-set, this paper analyzes the structure and generation of p-augmented matrix, and then analyzes the dynamic generation of information [...] Read more.
The development of information technology brings the challenge of data redundancy and data shortage to information fusion. Based on the dynamic boundary characteristics of p-set, this paper analyzes the structure and generation of p-augmented matrix, and then analyzes the dynamic generation of information equivalence class, and then proposes an intelligent acquisition algorithm of information equivalence class based on matrix reasoning. In addition, this paper analyzes two types of information fusion, namely information redundancy fusion and information supplement fusion. Then, the relationship among redundant information fusion, supplementary information fusion, and information equivalence classes is analyzed. Finally, this paper presents the application of intelligent acquisition of information equivalence class in information retrieval. Full article
(This article belongs to the Special Issue Selected Papers from IIKII 2019 Conferences in Computers)
Show Figures

Figure 1

Article
Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks
Computers 2019, 8(4), 88; https://doi.org/10.3390/computers8040088 - 04 Dec 2019
Cited by 3 | Viewed by 3006
Abstract
Most existing approaches for solving the distributed denial-of-service (DDoS) problem focus on specific security mechanisms, for example, network intrusion detection system (NIDS) detection and firewall configuration, rather than on the packet routing approaches to defend DDoS threats by new flow management techniques. To [...] Read more.
Most existing approaches for solving the distributed denial-of-service (DDoS) problem focus on specific security mechanisms, for example, network intrusion detection system (NIDS) detection and firewall configuration, rather than on the packet routing approaches to defend DDoS threats by new flow management techniques. To defend against DDoS attacks, the present study proposes a modified particle swarm optimization (PSO) scheme based on an IP traceback (IPTBK) technique, designated as PSO-IPTBK, to solve the IP traceback problem. Specifically, this work focuses on analyzing the detection of DDoS attacks to predict the possible attack routes in a distributed network. In the proposed approach, the PSO-IPTBK identifies the source of DDoS attacks by reconstructing the probable attack routes from collected network packets. The performance of the PSO-IPTBK algorithm in reconstructing the attack route was investigated through a series of simulations using OMNeT++ 5.5.1 and the INET 4 Framework. The results show that the proposed scheme can determine the most possible route between the attackers and the victim to defend DDoS attacks. Full article
(This article belongs to the Special Issue Selected Papers from IIKII 2019 Conferences in Computers)
Show Figures

Figure 1

Back to TopTop