


default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 10
Volume 10, Number 1, January 2019
- Lucio Ciabattoni
, Gabriele Foresi, Andrea Monteriù
, Lucia Pepa
, Daniele Proietti Pagnotta
, Luca Spalazzi
, Federica Verdini:
Real time indoor localization integrating a model based pedestrian dead reckoning on smartphone and BLE beacons. 1-12 - Aparajita Nanda, Pankaj Kumar Sa, Dushyant Singh Chauhan, Banshidhar Majhi:
A person re-identification framework by inlier-set group modeling for video surveillance. 13-25 - Jong-Hyun Park:
Resource recommender system based on psychological user type indicator. 27-39 - Sang-Seok Yun, Quang Nguyen, JongSuk Choi:
Recognition of emergency situations using audio-visual perception sensor network for ambient assistive living. 41-55 - Lakmini P. Malasinghe
, Naeem Ramzan
, Keshav P. Dahal
:
Remote patient monitoring: a comprehensive study. 57-76 - Farzaneh Mirzapour, Mostafa Lakzaei, Gohar Varamini
, Milad Teimourian, Noradin Ghadimi:
A new prediction model of battery and wind-solar output in hybrid power system. 77-87 - Peter Sarcevic
, Zoltán Kincses
, Szilveszter Pletl
:
Online human movement classification using wrist-worn wireless sensors. 89-106 - Mina Ghafouri vaighan, Mohammad Ali Jabraeil Jamali
:
A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks. 107-123 - Anupam Mukherjee
, Goutam Panigrahi, Samarjit Kar
, Manoranjan Maiti:
Constrained covering solid travelling salesman problems in uncertain environment. 125-141 - Chikh Ramdane
, Salim Chikhi:
Clustered negative selection algorithm and fruit fly optimization for email spam detection. 143-152 - Prosanta Gope:
Anonymous mutual authentication with location privacy support for secure communication in M2M home network services. 153-161 - Ou Ruan
, Qingping Wang, Zihao Wang:
Provably leakage-resilient three-party password-based authenticated key exchange. 163-173 - Baofang Hu, Hong Wang, Xiaomei Yu, Weihua Yuan, Tianwen He:
Sparse network embedding for community detection and sign prediction in signed social networks. 175-186 - Jing Zhao
, Bin Wei, Yang Su:
Communication-efficient revocable identity-based signature from multilinear maps. 187-198 - Sidharth B. Bhorge
, Ramchandra R. Manthalkar
:
Recognition of vision-based activities of daily living using linear predictive coding of histogram of directional derivative. 199-214 - Bilgin Avenoglu
, P. Erhan Eren:
A context-aware and workflow-based framework for pervasive environments. 215-237 - Giancarlo Nota
, Rossella Aiello:
The interaction type approach to relationships management. 239-253 - Ugo Erra
, Nicola Capece
:
Engineering an advanced geo-location augmented reality framework for smart mobile devices. 255-265 - Prabukumar Manoharan
, Loganathan Agilandeeswari
, Ganesan Kaliyaperumal:
An intelligent lung cancer diagnosis system using cuckoo search optimization and support vector machine classifier. 267-293 - Lingling Zeng, Wei Ren
, Yuling Chen, Min Lei:
LMDGW: a novel matrix based dynamic graph watermark. 295-304 - Xiang Li:
Intelligent transportation systems in big data. 305-306 - Yunxiao Ye, Jinsuo Zhang
, Zanghong Huang, Jian Chai:
A new information fusion method of forecasting. 307-314 - Yi Su
, Wei Sun:
Dynamic differential models for studying traffic flow and density. 315-320 - Ruonan Wang, Jian Zhou
, Xiajie Yi
, Athanasios A. Pantelous
:
Solving the green-fuzzy vehicle routing problem using a revised hybrid intelligent algorithm. 321-332 - Xiaofeng Xu
, Yuping Sun, Jue Wang:
Multi-task transportation scheduling model with backhauls based on hub and spoke in collaborative logistics network. 333-343 - Liyao Wu, Weimin Ma, Yan Yang
, Ke Wang
:
A competitive analysis approach for route choice with uncertain travel times and blocked nodes. 345-355 - Baojie Chen, Yajuan Liu
, Tianyong Zhou:
An entropy based solid transportation problem in uncertain environment. 357-363 - Zhihong Li, Wangtu Ato Xu
:
Path decision modelling for passengers in the urban rail transit hub under the guidance of traffic signs. 365-372 - Bo Wang
, Jianling Huang, Jie Xu:
Capacity optimization and allocation of an urban rail transit network based on multi-source data. 373-383 - Hao Zhang, Qian Zhang
, Wenhao Chen:
Bi-level programming model of truck congestion pricing at container terminals. 385-394 - Jing Wang, Haotian Liu:
Snow removal resource location and allocation optimization for urban road network recovery: a resilience perspective. 395-408 - Yi-Rui Deng
, Yao Zheng, Jianping Li:
Route optimization model in collaborative logistics network for mixed transportation problem considered cost discount based on GATS. 409-416
Volume 10, Number 2, February 2019
- Guijun Wang, Guoying Zhang:
Matching localization algorithm of nonlinear T-S fuzzy system constructed by the piecewise linear function. 417-427 - Jindan Zhang, Baocang Wang, Fatos Xhafa, Xu An Wang
, Cong Li:
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. 429-438 - Minghu Wu, Xiang Li, Cong Liu, Min Liu, Nan Zhao, Juan Wang, Xiangkui Wan, Zheheng Rao, Li Zhu:
Robust global motion estimation for video security based on improved k-means clustering. 439-448 - Prajna Parimita Dash
, Dipti Patra:
Efficient visual tracking using multi-feature regularized robust sparse coding and quantum particle filter based localization. 449-462 - Alket Cecaj
, Marco Mamei:
Investigating economic activity concentration patterns of co-agglomerations through association rule mining. 463-476 - Hanen Idoudi
, Ons Mabrouk, Pascale Minet, Leïla Azouz Saïdane:
Cluster-based scheduling for cognitive radio sensor networks. 477-489 - Wajdi Farhat
, Souhir Sghaier, Hassene Faiedh, Chokri Souani
:
Design of efficient embedded system for road sign recognition. 491-507 - Yuechuan Wei
, Peng Xu, Yisheng Rong:
Related-key impossible differential cryptanalysis on lightweight cipher TWINE. 509-517 - Miralda Cuka, Donald Elmazi
, Kevin Bylykbashi
, Evjola Spaho
, Makoto Ikeda, Leonard Barolli:
Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks. 519-529 - Mirfa Manzoor, Walayat Hussain
, Osama Sohaib
, Farookh Khadeer Hussain, Salem Alkhalaf
:
Methodological investigation for enhancing the usability of university websites. 531-549 - Rabindra Kumar Barik, Harishchandra Dubey
, Kunal Mankodiya
, Sapana Sasane, Chinmaya Misra
:
GeoFog4Health: a fog-based SDI framework for geospatial health big data analysis. 551-567 - Mohamed El Fissaoui
, Abderrahim Beni Hssane, Mostafa Saadi
:
Energy efficient and fault tolerant distributed algorithm for data aggregation in wireless sensor networks. 569-578 - Kai Zhu
, Jiayu Shen, Xuelian Yao:
A three-echelon supply chain with asymmetric information under uncertainty. 579-591 - Rakesh Ranjan Swain
, Pabitra Mohan Khilar, Tirtharaj Dash
:
Neural network based automated detection of link failures in wireless sensor networks and extension to a study on the detection of disjoint nodes. 593-610 - Dongqing Xu
, Jianhua Chen, Qin Liu
:
Provably secure anonymous three-factor authentication scheme for multi-server environments. 611-627 - Kuei Min Wang, Lin Hui:
Smart environment effectiveness analysis of a pursuit and evasion scenario. 629-639 - Devender Kumar
, Satish Chand, Bijendra Kumar
:
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. 641-660 - Goutham Reddy Alavalapati
, Ashok Kumar Das
, Vanga Odelu, Awais Ahmad, Ji Sun Shin:
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment. 661-680 - Prateek Gupta
, Ajay K. Sharma:
Designing of energy efficient stable clustering protocols based on BFOA for WSNs. 681-700 - Salvatore Rampone
, Alessio Valente
:
Assessment of desertification vulnerability using soft computing methods. 701-707 - Abdelaziz Ouadah
, Allel Hadjali, Fahima Nader, Karim Benouaret:
SEFAP: an efficient approach for ranking skyline web services. 709-725 - Antonio Maña, Hristo Koshutanski
:
Special issue on "Recent advances in ambient intelligence towards a smart and human-centered internet of things". 727-729 - Biying Fu
, Florian Kirchbuchner
, Julian von Wilmsdorff, Tobias Grosse-Puppendahl, Andreas Braun, Arjan Kuijper:
Performing indoor localization with electric potential sensing. 731-746 - Matthias Ruben Mettel, Michael Alekseew, Carsten Stocklöw, Andreas Braun
:
Designing and evaluating safety services using depth cameras. 747-759 - Christina Jaschinski
, Somaya Ben Allouch
:
Listening to the ones who care: exploring the perceptions of informal caregivers towards ambient assisted living applications. 761-778 - Shin'ichi Konomi
, Tomoyo Sasao, Simo Hosio
, Kaoru Sezaki:
Using ambient WiFi signals to find occupied and vacant houses in local communities. 779-789 - Norbert A. Streitz
:
Beyond 'smart-only' cities: redefining the 'smart-everything' paradigm. 791-812 - Julian von Wilmsdorff, Florian Kirchbuchner
, Biying Fu, Andreas Braun, Arjan Kuijper:
An experimental overview on electric field sensing. 813-824
Volume 10, Number 3, March 2019
- Stefan Wolfgang Pickl, Bo Tao, T. Warren Liao
, Fei Tao
:
Editorial for the special issue on "Intelligent Computing and System towards Smart Manufacturing". 825-827 - Zhigang Wen, Dan Liu, Xiaoqing Liu
, Ling Zhong, You Lv, Yinglin Jia:
Deep learning based smart radar vision system for object recognition. 829-839 - Bin Qian, Qian-Qian Wang, Rong Hu, Zhi-Jie Zhou, Chuanqiang Yu, Zhiguo Zhou:
An effective soft computing technology based on belief-rule-base and particle swarm optimization for tipping paper permeability measurement. 841-850 - Jinjiang Wang
, Kebo Wang, Yangshen Wang, Zuguang Huang, Ruijuan Xue:
Deep Boltzmann machine based condition prediction for smart manufacturing. 851-861 - Guiwu Wei
, Zuopeng Zhang
:
Some single-valued neutrosophic Bonferroni power aggregation operators in multiple attribute decision making. 863-882 - Chen Yang, Shulin Lan
, George Q. Huang
:
Revenue sharing model in New Hong Kong's warehousing business paradigm. 883-892 - Wei Jiang, Gongping Wu, Lianqing Yu, Hong Jun Li, Wei Chen:
Manipulator multi-objective motion optimization control for high voltage power cable mobile operation robot. 893-905 - Liang Guo, Chao Zhang:
Dual-process modeling and control method for new product collaborative design based on petri net. 907-921 - Jinsong Yu
, Weiqi Tang, Diyin Tang, Jiuqing Wan, Jingjing Liu:
An approach to predicpt discharge voltage of lithium-ion batteries under dynamic loading conditions. 923-936 - Jian Jin, Ping Ji
, Sixing Yan:
Comparison of series products from customer online concerns for competitive intelligence. 937-952 - Feng Xiang, Yuanyuan Huang, Zhang Zhi, Guozhang Jiang, Ying Zuo
:
Research on ECBOM modeling and energy consumption evaluation based on BOM multi-view transformation. 953-967 - Zijian Wu
, Kaili Yang, Jiangxin Yang, Yanlong Cao, Yi Gan:
Energy-efficiency-oriented scheduling in smart manufacturing. 969-978 - Beibei Fan, Wenwei Yang, Zaifang Zhang:
Solving the two-stage hybrid flow shop scheduling problem based on mutant firefly algorithm. 979-990 - Zongfeng Zou, Ying Qian
:
Wireless sensor network routing method based on improved ant colony algorithm. 991-998 - Cui-Lin Zhang, Junqiang Wang
, Cheng-Wu Zhang:
Two-agent scheduling on a single parallel-batching machine to minimize the weighted sum of the agents' makespans. 999-1007 - Kai Zhang, Ting Qu, Dajian Zhou, Matthias Thürer
, Yang Liu
, Duxian Nie, Congdong Li, George Q. Huang
:
IoT-enabled dynamic lean control mechanism for typical production systems. 1009-1023 - Xiaorong Gong, Chao Yin, Xiaobin Li
:
A grey correlation based supply-demand matching of machine tools with multiple quality factors in cloud manufacturing environment. 1025-1038 - Xiaobin Li
, Peijie Zhuang, Chao Yin:
A metadata based manufacturing resource ontology modeling in cloud manufacturing systems. 1039-1047 - Xiaoxia Li, Fazhi He, Weidong Li:
A cloud-terminal-based cyber-physical system architecture for energy efficient machining process optimization. 1049-1064 - Lei Wang, Chen Guo
, Yibing Li, Baigang Du, Shunsheng Guo:
An outsourcing service selection method using ANN and SFLA algorithms for cement equipment manufacturing enterprises in cloud manufacturing. 1065-1079 - Yan Yang, Tianliang Hu
, Yingxin Ye, Wenbin Gao, Chengrui Zhang:
A knowledge generation mechanism of machining process planning using cloud technology. 1081-1092 - Shan Ren, Xibin Zhao, Binbin Huang, Zhe Wang, Xiaoyu Song:
A framework for shopfloor material delivery based on real-time manufacturing big data. 1093-1108 - Chenglei Zhang
, Buyun Sheng, Xiyan Yin, Feiyu Zhao
, Yao Shu:
Research and development of off-line services for the 3D automatic printing machine based on cloud manufacturing. 1109-1128 - Weichao Luo, Tianliang Hu
, Chengrui Zhang, Yongli Wei:
Digital twin for CNC machine tool: modeling and using strategy. 1129-1140 - Yu Zheng
, Sen Yang, Huanchong Cheng:
An application framework of digital twin and its case study. 1141-1153 - Jiewu Leng
, Hao Zhang, Douxi Yan, Qiang Liu
, Xin Chen
, Ding Zhang:
Digital twin-driven manufacturing cyber-physical system for parallel controlling of smart workshop. 1155-1166 - Buyun Sheng, Feiyu Zhao
, Chenglei Zhang
, Xiyan Yin, Yao Shu:
Parameterized representation and solution method of the lightweight 3D model virtual assembly constraint. 1167-1187 - Jiapeng Guo, Ning Zhao
, Lin Sun, Zhang Saipeng:
Modular based flexible digital twin for factory design. 1189-1200 - Lilan Liu
, Xiang Wan, Zenggui Gao
, Xiaolong Li, Bowen Feng:
Research on modelling and optimization of hot rolling scheduling. 1201-1216 - Zhinan Zhang
, Xin Wang, Xiaohan Wang, Fan Cui, Hui Cheng:
A simulation-based approach for plant layout design and production planning. 1217-1230 - Huanchong Cheng
, Dianliang Wu, Xiumin Fan:
Modeling and simulation of sheet-metal part deformation in virtual assembly. 1231-1240 - Xiaojun Liu
, Liang Tang, Yang Yi, Zhonghua Ni:
Intelligent design based on holographic model using parametric design method. 1241-1255 - Buyun Sheng, Xiyan Yin
, Chenglei Zhang
, Feiyu Zhao
, Zhenqiang Fang, Zheng Xiao:
A rapid virtual assembly approach for 3D models of production line equipment based on the smart recognition of assembly features. 1257-1270
Volume 10, Number 4, April 2019
- Kok-Lim Alvin Yau, David Chieng
, Junaid Qadir
, Qiang Ni:
Towards enhancement of communication systems, networks and applications for smart environment. 1271-1273 - Mahmoud Mezghani:
An efficient multi-hops clustering and data routing for WSNs based on Khalimsky shortest paths. 1275-1288 - Deepak Kumar Sharma
, Sanjay Kumar Dhurandher, Divyansh Agarwal, Kunal Arora:
kROp: k-Means clustering based routing protocol for opportunistic networks. 1289-1306 - Deepak Kumar Sharma
, Deepika Kukreja, Samarth Chugh, Shubham Kumaram:
Supernode routing: a grid-based message passing scheme for sparse opportunistic networks. 1307-1324 - Uthman Baroudi
, Manaf Bin-Yahya
, Meshaan Alshammari, Umair Yaqoub:
Ticket-based QoS routing optimization using genetic algorithm for WSN applications in smart grid. 1325-1338 - Nassir Harrag
, Allaoua Refoufi, Abdelghani Harrag
:
New NSGA-II-based OLSR self-organized routing protocol for mobile ad hoc networks. 1339-1359 - Manjeet Singh
, Surender Kumar Soni:
Fuzzy based novel clustering technique by exploiting spatial correlation in wireless sensor network. 1361-1378 - Celimuge Wu
, Tsutomu Yoshinaga, Dabhur Bayar, Yusheng Ji:
Learning for adaptive anycast in vehicular delay tolerant networks. 1379-1388 - Ahmed Musa
, Virigilio Gonzalez, Dante Barragan:
A new strategy to optimize the sensors placement in wireless sensor networks. 1389-1399 - Zahid Afzal, Peer Azmat Shah
, Khalid M. Awan
, Zahoor-Ur Rehman:
Optimum bandwidth allocation in wireless networks using differential evolution. 1401-1412 - Eunsam Kim, Jinsung Kim, Choonhwa Lee:
Efficient neighbor selection through connection switching for P2P live streaming. 1413-1423 - Vicky Kumar
, Ashok Kumar:
Improved network lifetime and avoidance of uneven energy consumption using load factor. 1425-1432 - Vicky Kumar
, Ashok Kumar:
Improving reporting delay and lifetime of a WSN using controlled mobile sinks. 1433-1441 - S. Hamed Javadi
, Abdolreza Mohammadi:
Fire detection by fusing correlated measurements. 1443-1451 - Robert Steele, Luis Gabriel Jaimes:
Crowdsensing sub-populations in a region. 1453-1462 - Raihan Ur Rasool
, Maleeha Najam, Hafiz Farooq Ahmad, Hua Wang
, Zahid Anwar:
A novel JSON based regular expression language for pattern matching in the internet of things. 1463-1481 - Xipu Zhang, Choonhwa Lee, Sumi Helal
:
iPOJO flow: a declarative service workflow architecture for ubiquitous cloud applications. 1483-1494 - Mario Arzamendia, I. Espartza, Daniel Gutiérrez-Reina, Sergio Toral, Derlis Gregor
:
Comparison of Eulerian and Hamiltonian circuits for evolutionary-based path planning of an autonomous surface vehicle for monitoring Ypacarai Lake. 1495-1507 - Abdul Majeed, Raihan Ur Rasool
, Farooq Ahmad, Masoom Alam, Nadeem Javaid
:
Near-miss situation based visual analysis of SIEM rules for real time network security monitoring. 1509-1526 - Amina Makhlouf
, Isma Boudouane, Nadia Saadia, Amar Ramdane-Cherif:
Ambient assistance service for fall and heart problem detection. 1527-1546 - Harikrishna Pillutla
, Amuthan Arjunan:
Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing. 1547-1559 - Jingang Liu
, Lishan Ke:
New efficient identity based encryption without pairings. 1561-1570 - Antar Shaddad Abdul-Qawy
, Srinivasulu Tadisetty
:
SEES: a scalable and energy-efficient scheme for green IoT-based heterogeneous wireless nodes. 1571-1596 - Daghan L. Acay
, Liz Sonenberg, Gil Tidhar
:
Formalizing tool use in intelligent environments. 1597-1610 - Carlos Julio Moya Jutinico, Carlos Enrique Montenegro-Marín
, Daniel Burgos, Rubén González Crespo
:
Natural language interface model for the evaluation of ergonomic routines in occupational health (ILENA). 1611-1619 - Kgotlaetsile Mathews Modieginyane, Reza Malekian
, Babedi B. Letswamotse:
Flexible network management and application service adaptability in software defined wireless sensor networks. 1621-1630 - Mimoza Durresi, Anisa Subashi, Arjan Durresi
, Leonard Barolli, Kazunori Uchida:
Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring. 1631-1640 - Mohamed Abdel-Basset
, Asmaa Atef, Abdel-Nasser Hussein:
Some appraisal criteria for multi-mode scheduling problem. 1641-1654 - Asif Khan
, Nadeem Javaid
, Adnan Ahmad
, Mariam Akbar, Zahoor Ali Khan, Manzoor Ilahi:
A priority-induced demand side management system to mitigate rebound peaks using multiple knapsack. 1655-1678
Volume 10, Number 5, May 2019
- Zheng Xu, Yunhuai Liu, Neil Y. Yen:
Special issue on the intelligent sensing on mobile computing and wireless communications. 1679-1680 - Rong Wang, Jingye Cai, Xiang Yu, Jianchun Jiang:
Temporal-correlation-based compressive channel estimation for universal filtered multicarrier system over fast-fading channels. 1681-1692 - Chun Shi, Shu-Qian He, Zheng-Jie Deng, Xian-Feng Zhang, Chong Shen:
Adaptive access mechanism with delta estimation algorithm of traffic loads for supporting weighted priority in IEEE 802.11e WLANs. 1693-1702 - Yong Zhang, Liyi Zhang, Jianfeng Han, Zhe Ban, Yi Yang:
An indoor gas leakage source localization algorithm using distributed maximum likelihood estimation in sensor networks. 1703-1712 - Wei Li, Changwu Xu, Yue He, Liguo Chen, Lining Sun, Guoqiang Fang:
Actual deviation correction based on weight improvement for 10-unit Dolph-Chebyshev array antennas. 1713-1726 - Zheng Guan, Zhijun Yang, Min He, Wenhua Qian:
Energy-efficient analysis of an IEEE 802.11 PCF MAC protocol based on WLAN. 1727-1737 - Mingchuan Zhang, Ping Xie, Junlong Zhu, Qingtao Wu, Ruijuan Zheng, Hongke Zhang:
NCPP-based caching and NUR-based resource allocation for information-centric networking. 1739-1745 - Xiao Chen, Jingfeng Guo, Xiao Pan, Chunying Zhang:
Link prediction in signed networks based on connection degree. 1747-1757 - Hua Yang, Zhimei Li, Zhiyong Liu:
A method of routing optimization using CHNN in MANET. 1759-1768 - Wenyuan Wang, Yue Xiu, Zhongpei Zhang:
FDD massive MIMO downlink channel estimation with complex hybrid generalized approximate message passing algorithm. 1769-1786 - Yongming Huang, Kexin Tian, Ao Wu, Guobao Zhang
:
Feature fusion methods research based on deep belief networks for speech emotion recognition under noise condition. 1787-1798 - Aiping Wu
, Qingqing Fu, Saleh Muhamed Mwachaka, Xiaoying He:
Numerical modeling of electromagnetic wave logging while drilling in deviated well. 1799-1809 - Li Li
, Vijayan Sugumaran
:
A cognitive-based AES model towards learning written English. 1811-1820 - Chengli Zhang, Wenping Ma, Feifei Zhao:
Trapdoor function based on the Ring-LWE and applications in communications. 1821-1827 - Wei Zhang, Zeyu He, Li Min Ma, Rami Salem, Lu Han:
AP load balance strategy in face of high user density. 1829-1839 - S. M. Sombolestan, Armin Rasooli
, Saeed Khodaygan:
Optimal path-planning for mobile robots to find a hidden target in an unknown environment based on machine learning. 1841-1850 - Afshin Naseri, Nima Jafari Navimipour
:
A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm. 1851-1864 - Amal Louati, Le Hoang Son, Habib Chabchoub
:
Smart routing for municipal solid waste collection: a heuristic approach. 1865-1884 - A. Arul Mary, K. Chitra:
OGSO-DR: oppositional group search optimizer based efficient disaster recovery in a cloud environment. 1885-1895 - Taher Delkesh, Mohammad Ali Jabraeil Jamali
:
EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs. 1897-1914 - Heteng Zhang
, Feilong Tang, Leonard Barolli:
Efficient flow detection and scheduling for SDN-based big data centers. 1915-1926 - Rafal Kozik
, Michal Choras, Damian Puchalski, Rafal Renk:
Q-Rapids framework for advanced data analysis to improve rapid software development. 1927-1936 - Fan Liu
, Xingshe Zhou, Zhu Wang, Hongbo Ni, Tianben Wang:
OSA-weigher: an automated computational framework for identifying obstructive sleep apnea based on event phase segmentation. 1937-1954 - Salvatore Venticinque, Alba Amato
:
A methodology for deployment of IoT application in fog. 1955-1976 - Nikolay Andreevich Moldovyan, Alexander Andreevich Moldovyan, Duc Tam Nguyen, Nam Hai Nguyen, Cong Manh Tran
, Minh Nguyen Hieu:
Pseudo-probabilistic block ciphers and their randomization. 1977-1984 - Kriti Bhushan, Brij B. Gupta
:
Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. 1985-1997 - S. Rasouli D. Maryam
, Shahram Payandeh:
A novel depth image analysis for sleep posture estimation. 1999-2014 - Ankit Kumar Jain
, Brij B. Gupta
:
A machine learning based approach for phishing detection using hyperlinks information. 2015-2028 - Renchu Guan
, Xu Wang, Maurizio Marchese, Mary Qu Yang, Yanchun Liang, Chen Yang:
Feature space learning model. 2029-2040 - Ferdinando Di Martino, Salvatore Sessa:
Fragile watermarking tamper detection via bilinear fuzzy relation equations. 2041-2061 - Shib Sankar Sana
, Holman Ospina-Mateus
, Fabian Gazabón Arrieta, Jaime Acevedo Chedid
:
Application of genetic algorithm to job scheduling under ergonomic constraints in manufacturing industry. 2063-2090
Volume 10, Number 6, June 2019
- Oresti Banos
, Ramón Hervás
:
Ubiquitous computing for health applications. 2091-2093 - Iván González
, Jesús Fontecha, José Bravo:
Relationship between stride interval variability and aging: use of linear and non-linear estimators for gait variability assessment in assisted living environments. 2095-2109 - Carlos Bailon
, Miguel Damas
, Héctor Pomares
, Oresti Banos
:
SPIRA: an automatic system to support lower limb injury assessment. 2111-2123 - Alberto G. Salguero
, Javier Medina, Pablo Delatorre
, Macarena Espinilla
:
Methodology for improving classification accuracy using ontologies: application in the recognition of activities of daily living. 2125-2142 - Jan Wohlfahrt-Laymann, Hermie Hermens, Claudia Villalonga
, Miriam M. R. Vollenbroek-Hutten
, Oresti Banos
:
MobileCogniTracker - A mobile experience sampling tool for tracking cognitive behaviour. 2143-2160 - Tania Mondéjar
, Ramón Hervás
, Esperanza Johnson
, Carlos Gutiérrez, José Miguel Latorre
:
Analyzing EEG waves to support the design of serious games for cognitive training. 2161-2174 - Anas Samara
, Leo Galway, Raymond R. Bond
, Hui Wang
:
Affective state detection via facial expression analysis within a human-computer interaction context. 2175-2184 - Víctor López-Jaquero
, Francisco Montero Simarro
, Miguel A. Teruel
:
Influence awareness: considering motivation in computer-assisted rehabilitation. 2185-2197 - Netzahualcóyotl Hernández
, Bert Arnrich
, Jesús Favela, Cem Ersoy
, Batur Burcu Demiray, Jesús Fontecha:
A multi-site study on walkability, data sharing and privacy perception using mobile sensing data gathered from the mk-sense platform. 2199-2211 - Francisco J. Gutierrez
, Diego Muñoz
, Sergio F. Ochoa, José M. Tapia:
Assembling mass-market technology for the sake of wellbeing: a case study on the adoption of ambient intelligent systems by older adults living at home. 2213-2233 - Aman Bansal, Apoorv Gupta, Deepak Kr. Sharma
, Varshika Gambhir:
IICAR-Inheritance Inspired Context Aware Routing Protocol for opportunistic networks. 2235-2253 - Yong-Hwan Lee, Sung-Il Bang:
Improved image retrieval and classification with combined invariant features and color descriptor. 2255-2264 - Hasan Jalili
, Mohammad Kazem Sheikh-El-Eslami, Mohsen Parsa Moghaddam, Pierluigi Siano
:
Modeling of demand response programs based on market elasticity concept. 2265-2276 - Shelza Suri
, Ritu Vijay:
A synchronous intertwining logistic map-DNA approach for color image encryption. 2277-2290 - Takanori Hara
, Masahiro Sasabe
, Shoji Kasahara
:
Geographical risk analysis based path selection for automatic, speedy, and reliable evacuation guiding using evacuees' mobile devices. 2291-2300 - Mohit Dua
, Rajesh Kumar Aggarwal, Mantosh Biswas
:
GFCC based discriminatively trained noise robust continuous ASR system for Hindi language. 2301-2314 - Majid Mobini, Mohammad Reza Zahabi
:
Design and analysis of a DCSK-based cognitive radio system using hybrid underlay/overlay transmission. 2315-2325 - K. Sumangali, Ch. Aswani Kumar
:
Concept Lattice Simplification in Formal Concept Analysis Using Attribute Clustering. 2327-2343 - You-Shyang Chen, Heng-Hsing Chu, Arun Kumar Sangaiah
:
Identifying ambient service location problems and its application using a humanized computing model. 2345-2359 - K. S. Rajesh, S. S. Dash:
Load frequency control of autonomous power system using adaptive fuzzy based PID controller optimized on improved sine cosine algorithm. 2361-2373 - Mrim Alnfiai
, Srinivas Sampalli:
BraillePassword: accessible web authentication technique on touchscreen devices. 2375-2391 - Vahid Amin Ghafari
, Honggang Hu
:
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a. 2393-2400 - Alok Kumar
, Alwyn Roshan Pais
:
A new combinatorial design based key pre-distribution scheme for wireless sensor networks. 2401-2416 - Chunqin Zhang, Chao Wang
, Zhiming Zhang, Dazeng Tian:
A novel technique for multiple attribute group decision making in interval-valued hesitant fuzzy environments with incomplete weight information. 2417-2433 - Carlos Guerrero
, Isaac Lera, Carlos Juiz:
A lightweight decentralized service placement policy for performance optimization in fog computing. 2435-2452 - Hao Wang, Kaiju Li:
SRS-LM: differentially private publication for infinite streaming data. 2453-2466 - Cristian Ramírez-Atencia
, David Camacho
:
Constrained multi-objective optimization for multi-UAV planning. 2467-2484 - Osama Sohaib
, Hiralkumari Solanki, Navkiran Dhaliwa, Walayat Hussain
, Muhammad Asif
:
Integrating design thinking into extreme programming. 2485-2492
Volume 10, Number 7, July 2019
- Haroon Malik, Ansar-Ul-Haque Yasar
, Elhadi M. Shakshuki:
Towards augmenting ambient systems networks and technologies. 2493-2494 - El-Sayed M. El-Alfy
, Amer G. Binsaadoon:
Automated gait-based gender identification using fuzzy local binary patterns with tuned parameters. 2495-2504 - Markel Iglesias-Urkia
, Adrián Orive
, Aitor Urbieta
, Diego Casado-Mansilla
:
Analysis of CoAP implementations for industrial Internet of Things: a survey. 2505-2518 - Simin Cai, Barbara Gallina, Dag Nyström, Cristina Seceleanu
, Alf Larsson
:
Tool-supported design of data aggregation processes in cloud monitoring systems. 2519-2535 - Jakub Mísek, Filip Zavoral
:
Semantic analysis of ambiguous types in dynamic languages. 2537-2544 - Michele Ruta, Floriano Scioscia, Agnese Pinto, Filippo Gramegna
, Saverio Ieva, Giuseppe Loseto
, Eugenio Di Sciascio:
CoAP-based collaborative sensor networks in the Semantic Web of Things. 2545-2562 - Sultan Anwar, Tarek R. Sheltami
, Elhadi M. Shakshuki, Menshawi K. Menshawi:
A framework for single and multiple anomalies localization in pipelines. 2563-2575 - Faouzi Kamoun, Fatma Outay
:
IP/MPLS networks with hardened pipes: service concepts, traffic engineering and design considerations. 2577-2584 - Ítalo Santiago Vega, João José Neto
, Francisco Supino Marcondes
:
DInAton with OC2-RD2 - A didactic and interactive language for the construction of adaptive automata in active learning environments. 2585-2592 - Hassan Y. A. Abutair
, Abdelfettah Belghith
, Saad Al-Ahmadi
:
CBR-PDS: a case-based reasoning phishing detection system. 2593-2606 - Aida Akbarzadeh, Majid Bayat, Behnam Zahednejad
, Ali Payandeh, Mohammad Reza Aref:
A lightweight hierarchical authentication scheme for internet of things. 2607-2619 - Darshak Sundar, Siddharth Sendil, Vasanth Subramanian, Vidhya Balasubramanian
:
WALE: a weighted adaptive location estimation algorithm. 2621-2632 - Yang Su
, Junwei Shen, Min-Qing Zhang:
A high security and efficiency protection of confidentiality and integrity for off-chip memory. 2633-2643 - Valère Plantevin
, Abdenour Bouzouane, Bruno Bouchard
, Sébastien Gaboury:
Towards a more reliable and scalable architecture for smart home environments. 2645-2656 - Xuerui Cao, Linmin Hu
, Zhenzhen Li:
Reliability analysis of discrete time series-parallel systems with uncertain parameters. 2657-2668 - You-Shyang Chen, Huan-Ming Chuang, Arun Kumar Sangaiah
, Chien-Ku Lin, Wen-Bin Huang:
A study for project risk management using an advanced MCDM-based DEMATEL-ANP approach. 2669-2681 - Ismael Posada Trobo, Vicente García-Díaz
, Jordán Pascual Espada, Rubén González Crespo
, Pablo Moreno-Ger
:
Rapid modeling of human-defined AI behavior patterns in games. 2683-2692 - Praveen Kumar Premkamal
, Syam Kumar Pasupuleti
, P. J. A. Alphonse:
A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. 2693-2707 - Hamed Hosseinnia
, Daryoush Nazarpour, Vahid Talavat:
Multi-objective optimization framework for optimal planning of the microgrid (MG) under employing demand response program (DRP). 2709-2730 - Abdelhak Boulaalam
:
Internet of things: new classification model of intelligence. 2731-2744 - Ferdinando Di Martino
, Salvatore Sessa:
Multi-level fuzzy transforms image compression. 2745-2756 - Elias Ruiz, Venet Osmani, Luis Enrique Sucar, Oscar Mayora
:
Detecting dressing failures using temporal-relational visual grammars. 2757-2770 - Tin-Chih Toly Chen
, Yi-Chi Wang
:
An incremental learning and integer-nonlinear programming approach to mining users' unknown preferences for ubiquitous hotel recommendation. 2771-2780 - Hossein Pazhoumand-Dar:
FAME-ADL: a data-driven fuzzy approach for monitoring the ADLs of elderly people using Kinect depth maps. 2781-2803 - Maha Alafeef
, Mohammad Fraiwan
:
On the diagnosis of idiopathic Parkinson's disease using continuous wavelet transform complex plot. 2805-2815 - Munish Manas, Aniruddha Sinha, Shubham Sharma, Md Rahat Mahboob:
A novel approach for IoT based wearable health monitoring and messaging system. 2817-2828 - Alberto Postiglione
, Giustino De Bueriis:
On Web's contact structure. 2829-2841 - Yajing Tan, Xiaoyu Ji, Sen Yan:
New models of supply chain network design by different decision criteria under hybrid uncertainties. 2843-2853 - Hany Kasban
, Sherief Hashima
:
Adaptive Radiographic Image Compression Technique using Hierarchical Vector Quantization and Huffman Encoding. 2855-2867 - Shokoofeh Mikaeeli Mamaghani, Mohammad Ali Jabraeil Jamali
:
A load-balanced congestion-aware routing algorithm based on time interval in wireless network-on-chip. 2869-2882 - Luigi Catuogno
, Clemente Galdi, Daniel Riccio:
Off-line enterprise rights management leveraging biometric key binding and secure hardware. 2883-2894 - Ahthasham Sajid
, Khalid Hussain
, Syed Bilal Hussain Shah, Tahir Iqbal, Imran Baig
:
History and buffer rule based (forward chaining/data driven) intelligent system for storage level big data congestion handling in smart opportunistic network. 2895-2905
Volume 10, Number 8, August 2019
- Brij B. Gupta
, Dharma P. Agrawal, Shingo Yamaguchi:
Deep learning models for human centered computing in fog and mobile edge networks. 2907-2911 - Yilei Wang, Shuaifeng Zhang, Yi Tang, Qingtang Su, Beijing Chen:
Rational adversary with flexible utility in secure two-party computation. 2913-2927 - Ning Cao, Guofu Li
, Pengjia Zhu, Qian Sun, Yingying Wang, Jing Li, Maoling Yan, Yongbin Zhao:
Handling the adversarial attacks - A machine learning's perspective. 2929-2943 - Xiao Yu, Yu-an Tan, Zhizhuo Sun, Jingyu Liu, Chen Liang, Quanxin Zhang
:
A fault-tolerant and energy-efficient continuous data protection system. 2945-2954 - Jingling Zhou, Feng Wang, Jianrong Xu, Yun Yan, Huiqing Zhu:
A novel character segmentation method for serial number on banknotes with complex background. 2955-2969 - Jianjun Shi, Weixing Ji, Zhiwei Gao, Yujin Gao, Yizhuo Wang, Xinyi Liao, Feng Shi:
Ontology-based code snippets management in a cloud environment. 2971-2985 - Jun Xu, Hui Liu, Weiran Shao, Kai Deng
:
Quantitative 3-D shape features based tumor identification in the fog computing architecture. 2987-2997 - Li Yang, Jiaxue Wang, Chongzhi Gao, Tong Li:
A crisis information propagation model based on a competitive relation. 2999-3009 - Pingting Hao, Liang Hu, Jingyan Jiang, Xilong Che, Tong Li, Kuo Zhao:
Framework for replica placement over cooperative edge networks. 3011-3021 - Liaoliang Jiang, Yuting Cheng, Li Yang, Jing Li, Hongyang Yan, Xiaoqin Wang:
A trust-based collaborative filtering algorithm for E-commerce recommendation system. 3023-3034 - Wei Wang
, Mengxue Zhao, Jigang Wang:
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. 3035-3043 - Zhiwei Zhang, Xiaofeng Chen, Jin Li, Xiaoling Tao, Jianfeng Ma:
HVDB: a hierarchical verifiable database scheme with scalable updates. 3045-3057 - Hong Zhao, Yi Wang
, Jiahui Song, Ge Gao:
The pollutant concentration prediction model of NNP-BPNN based on the INI algorithm, AW method and neighbor-PCA. 3059-3065 - Chijun Zhang, Zhanwei Du, Qing Cai, Limin Yu, Zhaohui Li, Yuan Bai:
Assignment optimization of pandemic influenza antiviral drugs in Urban pharmacies. 3067-3074 - Jianping Zhang, Jinling Zhao, Hong Zhou
:
Immediate schedule adjustment models and their semi-definite relaxation in project scheduling with temporary resource shortage. 3075-3081 - Lorenzo Fernández Maimó
, Alberto Huertas Celdrán
, Manuel Gil Pérez
, Félix J. García Clemente
, Gregorio Martínez Pérez:
Dynamic management of a deep learning-based anomaly detection system for 5G networks. 3083-3097 - Juan Chen, Zhihong Tian
, Xiang Cui, Lihua Yin, Xianzhi Wang
:
Trust architecture and reputation evaluation for internet of things. 3099-3107 - Qiuli Chen, Xianglin Wei, Fei Dai, Ming He:
A reliable routing protocol against hotspots and burst for UASN-based fog systems. 3109-3121 - Yuan Bai, Zhanwei Du, Chijun Zhang, Xuehua Zhao
:
Sentinel surveillance of traffic conditions with multilayer network. 3123-3131 - Chien-Ming Chen
, King-Hang Wang
, Kuo-Hui Yeh, Bin Xiang, Tsu-Yang Wu
:
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. 3133-3142 - Ran Xu, Yanrong Wang, Wenbin Wang, Yongxin Ding:
Evolutionary game analysis for third-party governance of environmental pollution. 3143-3154 - Rehab Ali Ibrahim, Ahmed A. Ewees
, Diego Oliva
, Mohamed Abd El Aziz
, Songfeng Lu:
Improved salp swarm algorithm based on particle swarm optimization for feature selection. 3155-3169 - Jiayu Shen, Yuanguo Zhu:
A parallel-machine scheduling problem with periodic maintenance under uncertainty. 3171-3179 - Bin Guo, Yao Zhang, Xinli Cao:
Well-being of residents in old residential quarters based on multi-sorted Logit model. 3181-3191 - Xiaolin Liang
, Jianqin Deng:
Detection of stationary human target via contactless radar networks. 3193-3200 - Biqin Hu, Bin Yang:
A particle swarm optimization algorithm for multi-row facility layout problem in semiconductor fabrication. 3201-3210 - Mohammad Reza Mortazavi, Kamran Raissi, Seyed Hamed Hashemi Mehne
:
A probabilistic approach to classification of human performance during interaction with a standard flight tasks simulator. 3211-3230 - Li Cai, Pengqiu Hu, Zefu Tan:
Research on the effect of large-scale electric vehicle based on smart wearable equipment access to grid. 3231-3237 - Ting Guo, Changwei Tan, Qiang Li, Guoxian Cui, Hongguang Li:
Estimating leaf chlorophyll content in tobacco based on various canopy hyperspectral parameters. 3239-3247 - Jinrong He
, Yingzhou Bi, Bin Liu, Zhigao Zeng:
Graph-dual Laplacian principal component analysis. 3249-3262 - Mat Hussin Ab Talib
, Intan Zaurah Mat Darus, Pakharuddin Mohd. Samin:
Fuzzy logic with a novel advanced firefly algorithm and sensitivity analysis for semi-active suspension system using magneto-rheological damper. 3263-3278 - Fang Rong, Yajuan Zhang, Zhuang Wang, Yu Li:
Influencing factors of consumer willingness to pay for cold chain logistics: an empirical analysis in China. 3279-3285 - (Withdrawn) Developing brain abnormality recognize system using multi-objective pattern producing neural network. 3287-3295
- Ke Xu, Jianxin Liu
, Jun Miao, Fengrui Liu:
An improved SIFT algorithm based on adaptive fractional differential. 3297-3305 - Meihong Wu, Zhiling Hong:
Subjective quality assessment of stereo image compression based on stereoscopic fusion in binocular vision. 3307-3314 - Yumeng Zhang
, Li Luo, Jianchao Yang, Dunhu Liu, Ruixiao Kong, Ya-bing Feng:
A hybrid ARIMA-SVR approach for forecasting emergency patient flow. 3315-3323
Volume 10, Number 9, September 2019
- Alfredo Cuzzocrea:
Big data intelligence. 3325-3327 - Nyan Lin
, Brian M. Kurkoski, Yasuo Tan, Yuto Lim
:
Data sharing among wireless client devices in cooperative manner with minimum transmissions. 3329-3338 - Hiba Jadallah, Zaher Al Aghbari
:
Spatial cloaking for location-based queries in the cloud. 3339-3347 - Abdelkader Laouid, Abdelnasser Dahmani, Hani Ragab Hassen, Ahcène Bounceur, Reinhardt Euler, Farid Lalem, Abdelkamel Tari:
A self-managing volatile key scheme for wireless sensor networks. 3349-3364 - Enrique Festijo, Younchan Jung
, Marnel Peradilla
:
Software-defined security controller-based group management and end-to-end security management. 3365-3382 - Alfredo Cuzzocrea, Mohamed Medhat Gaber, Edoardo Fadda
, Giorgio Mario Grasso
:
An innovative framework for supporting big atmospheric data analytics via clustering-based spatio-temporal analysis. 3383-3398 - Chaobo He
, Shuangyin Liu, Lei Zhang, Jianhua Zheng:
A fuzzy clustering based method for attributed graph partitioning. 3399-3407 - Mondher Sendi, Mohamed Nazih Omri
, Mourad Abed
:
Discovery and tracking of temporal topics of interest based on belief-function and aging theories. 3409-3425 - Yunjuan Wang, Kezhen Zhang, Yong Deng
:
Base belief function: an efficient method of conflict management. 3427-3437 - Cheng-Li Liu
, Kuo-Wei Su, Shiaw-Tsyr Uang:
The effects of layout types and spatial information display types on presence and spatial identification for the elderly in the 3D virtual art gallery. 3439-3451 - Jianjun Wu
, Xia Sun, Ziqiang Wang:
Shearlet feature manifold for face recognition. 3453-3460 - Chang-Hee Kang, Hyun-Jee Yang, Hyoung-Kyu Song:
Cooperative communication system with multiple relays for performance improvement in wireless communication system. 3461-3467 - Hamid Reza Boveiri
, Raouf Khayami
, Mohamed Elhoseny
, Gunasekaran Manogaran:
An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications. 3469-3479 - P. Raghunathan, E. Logashanmugam
:
Position servo controller design and implementation using low cost eddy current sensor for single axis active magnetic bearing. 3481-3492 - A. Aranganathan
, Chethamangalathu Damodharaprabhu Suriyakala:
An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks. 3493-3503 - Kevin Bouchard
, Jeremy Lapalu, Bruno Bouchard
, Abdenour Bouzouane:
Clustering of human activities from emerging movements - A flocking based unsupervised mining approach. 3505-3517 - Ankita Bisht, Mohit Dua
, Shelza Dua:
A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. 3519-3531 - Chiranjibe Jana
, Madhumangal Pal, Jian-qiang Wang:
Bipolar fuzzy Dombi aggregation operators and its application in multiple-attribute decision-making process. 3533-3549 - Siyuan Du, Hua Zhang, Hualin Xu, Jirui Yang, Oscar Tu:
To make the travel healthier: a new tourism personalized route recommendation algorithm. 3551-3562 - Rahul Malik, Renu Dhir, Sudesh Kumar Mittal
:
Remote sensing and landsat image enhancement using multiobjective PSO based local detail enhancement. 3563-3571 - Chiranjib Sur
:
DeepSeq: learning browsing log data based personalized security vulnerabilities and counter intelligent measures. 3573-3602 - Zhiping Zhou, Ping Wang, Zhicong Li:
A quadratic residue-based RFID authentication protocol with enhanced security for TMIS. 3603-3615 - Sandeep Rathor
, Rakesh Singh Jadon
:
Acoustic domain classification and recognition through ensemble based multilevel classification. 3617-3627 - Bogdan Okresa Duric
, Jaime Andres Rincon, Carlos Carrascosa
, Markus Schatten
, Vicente Julián
:
MAMbO5: a new ontology approach for modelling and managing intelligent virtual environments based on multi-agent systems. 3629-3641 - Sharif Naser Makhadmeh, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar
, Syibrah Naim
:
Multi-objective power scheduling problem in smart homes using grey wolf optimiser. 3643-3667 - Elham Besharati, Marjan Naderan
, Ehsan Namjoo
:
LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. 3669-3692 - Jia Zhai
, Hui Yu:
Robust coordination of supply chain with loss aversion. 3693-3707 - Abdeslam Mehenni, Zaia Alimazighi, Tarek Bouktir
, Mohamed Ahmed-Nacer:
An optimal big data processing for smart grid based on hybrid MDM/R architecture to strengthening RE integration and EE in datacenter. 3709-3722 - Syed W. Haider
, Guijun Zhuang, Shahid Ali
:
Identifying and bridging the attitude-behavior gap in sustainable transportation adoption. 3723-3738
Volume 10, Number 10, October 2019
- Gwanggil Jeon, Awais Ahmad, Salvatore Cuomo
, Wei Wu:
Special issue on bio-medical signal processing for smarter mobile healthcare using big data analytics. 3739-3745 - Malathi Devarajan
, V. Subramaniyaswamy
, Vijayakumar Varadarajan, Logesh Ravi
:
Fog-assisted personalized healthcare-support system for remote patients with diabetes. 3747-3760 - Min He, Zheng Guan
, Zhangyong Wu, Liang Lü, Zhaoxu Zhou, Marco Anisetti, Ernesto Damiani:
A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema. 3761-3774 - Fasee Ullah
, Zaka Ullah, Sheeraz Ahmad, Ihtesham Ul Islam, Saeed Ur Rehman, Javed Iqbal
:
Traffic priority based delay-aware and energy efficient path allocation routing protocol for wireless body area network. 3775-3794 - Fakhri Alam Khan
, Sadaf Shaheen, Muhammad Asif, Atta Ur Rahman, Muhammad Imran, Saeed Ur Rehman:
Towards reliable and trustful personal health record systems: a case of cloud-dew architecture based provenance framework. 3795-3808 - Ihtesham Ul Islam, Khalil Ullah
, Muhammad Afaq
, Muhammad Hasanain Chaudary, Muhammad Kashif Hanif
:
Spatio-temporal sEMG image enhancement and motor unit action potential (MUAP) detection: algorithms and their analysis. 3809-3819 - Abdullah Khan, Rahmat Shah, Muhammad Imran, Asfandyar Khan, Javed Iqbal Bangash, Shah Khalid:
An alternative approach to neural network training based on hybrid bio meta-heuristic algorithm. 3821-3830 - Jungryul Seo, Teemu Henrikki Laine, Kyung-Ah Sohn
:
Machine learning approaches for boredom classification using EEG. 3831-3846 - Pyoung Won Kim
:
Ambient intelligence in a smart classroom for assessing students' engagement levels. 3847-3852 - Bing Han
, Yiyuan Han, Xinbo Gao
, Lixia Zhang:
Boundary constraint factor embedded localizing active contour model for medical image segmentation. 3853-3862 - Shumayla Yaqoob, Ata Ullah, Muhammad Akbar, Muhammad Imran, Muhammad Shoaib:
Congestion avoidance through fog computing in internet of vehicles. 3863-3877 - Nana Tian
, Liyun Zhang, Zunbo Li, Jianjun Liu, Guohua Lei, Yanyan Ma:
Big data of clinical manifestations combined with neuroelectrophysiologic features in the early diagnosis of motor neuron disease. 3879-3888 - Amare Anagaw, Yang-Lang Chang
:
A new complement naïve Bayesian approach for biomedical data classification. 3889-3897 - Chi Yang, Xiaomin Yang, Feng Yang:
A system based on Hadoop for radar data analysis. 3899-3913 - Aditya Duneja, Thendral Puyalnithi, Madhu Viswanatham Vankadara
, Naveen K. Chilamkurti
:
Analysis of inter-concept dependencies in disease diagnostic cognitive maps using recurrent neural network and genetic algorithms in time series clinical data for targeted treatment. 3915-3923 - Marium Azhar, Hassan Dawood
, Hussain Dawood
, Gulraiz Iqbal Choudhary, Ali Kashif Bashir
, Sajjad Hussain Chauhdary
:
Detail-preserving switching algorithm for the removal of random-valued impulse noise. 3925-3945 - Farhan Hussain
, Mian Ilyas Ahmad, Sajid Anwar, Aimal Khan, Pyoung Won Kim
:
Efficient motion estimation using two-bit transform and modified multilevel successive elimination. 3947-3953 - Fabio Mendoza Palechor
, Maria Luiza Recena Menezes, Anita Pinheiro Sant'Anna, Miguel Ortiz Barrios
, Anas Samara
, Leo Galway:
Affective recognition from EEG signals: an integrated data-mining approach. 3955-3974 - Junchao Wang, Kaining Han, Anastasios Alexandridis
, Zeljko Zilic, Jinzhao Lin, Yu Pang, Xiaomin Yang:
A baseband processing ASIC for body area networks. 3975-3982 - Adhiyaman Manickam, Devarasan Ezhilmaran
, Gunasekaran Manogaran, Naveen K. Chilamkurti, Vijayarajan Vijayan, Shubham Saraff, R. Dinesh Jackson Samuel
, Raja Krishnamoorthy:
Bio-medical and latent fingerprint enhancement and matching using advanced scalable soft computing models. 3983-3995 - Alberto Poncela
, Francisco J. Coslado, Bernardo García, Manuel Fernández
, José Jaime Ariza, Gloria Peinado, Carlos Demetrio, Francisco Sandoval:
Smart care home system: a platform for eAssistance. 3997-4021 - Longfei Zheng, Yu Wang, D. Jude Hemanth, Arun Kumar Sangaiah
, Fuqian Shi
:
Data augmentation on mice liver cirrhosis microscopic images employing convolutional neural networks and support vector machine. 4023-4032 - Chettupally Anil Carie, Mingchu Li, Bhaskar Marapelli
, Prakasha Reddy
, Hayat Dino Bedru, Moneeb Gohar:
Cognitive radio assisted WSN with interference aware AODV routing protocol. 4033-4042 - Fabio Campioni, Salimur Choudhury
, Fadi Al-Turjman:
Scheduling RFID networks in the IoT and smart health era. 4043-4057 - Rencan Nie, Min He
, Jinde Cao, Dongming Zhou, Zifei Liang:
Pulse coupled neural network based MRI image enhancement using classical visual receptive field for smarter mobile healthcare. 4059-4070 - Shahzad Yousaf
, Imran Shafi, Sadia Din
, Anand Paul
, Jamil Ahmad:
A big data analytical framework for analyzing solar energy receptors using evolutionary computing approach. 4071-4083 - Uvais Qidwai
, Junaid Chaudhry, Sohail Jabbar
, Hafiz Maher Ali Zeeshan, Naeem Janjua
, Shehzad Khalid:
Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems. 4085-4097 - (Withdrawn) Melanoma segmentation using bio-medical image analysis for smarter mobile healthcare. 4099-4120
- Mário W. L. Moreira
, Joel J. P. C. Rodrigues
, Francisco H. C. Carvalho, Naveen K. Chilamkurti, Jalal Al-Muhtadi, Victor M. Denisov:
Biomedical data analytics in mobile-health environments for high-risk pregnancy outcome prediction. 4121-4134 - (Withdrawn) Artificial neural network based classification of lung nodules in CT images using intensity, shape and texture features. 4135-4149
- Ashraf Darwish
, Aboul Ella Hassanien
, Mohamed Elhoseny
, Arun Kumar Sangaiah
, Khan Muhammad
:
The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. 4151-4166 - Muhammad Babar
, Fahim Arif:
Real-time data processing scheme using big data analytics in internet of things based smart transportation environment. 4167-4177 - Mahreen Kiran, Imran Ahmed, Nazish Khan, Goutham Reddy Alavalapati
:
Chest X-ray segmentation using Sauvola thresholding and Gaussian derivatives responses. 4179-4195 - Saba Sultan, Ali Javed, Aun Irtaza, Hassan Dawood, Hussain Dawood
, Ali Kashif Bashir
:
A hybrid egocentric video summarization method to improve the healthcare for Alzheimer patients. 4197-4206
Volume 10, Number 11, November 2019
- Muhammad Khalil Afzal, Wazir Zada Khan
, Tariq Umer
, Byung-Seo Kim, Shui Yu
:
Editorial of cross-layer design issues, challenges and opportunities for future intelligent heterogeneous networks. 4207-4208 - Sankalita Biswas, Sanjay Dhar Roy
, Aniruddha Chandra
:
Cross-layer energy model for beacon-enabled 802.15.4 networks. 4209-4224 - Nadeem Javaid
, Zaheer Ahmad, Arshad Sher
, Zahid Wadud, Zahoor Ali Khan, Syed Hassan Ahmed
:
Fair energy management with void hole avoidance in intelligent heterogeneous underwater WSNs. 4225-4241 - Moufida Rahmani
, Mahfoud Benchaïba:
PCSM: an efficient multihop proximity aware clustering scheme for mobile peer-to-peer systems. 4243-4260 - WanJun Yin, Dinesh Mavaluru
, Munir Ahmed, Mazhar Abbas, Aida Darvishan:
Correction to: Application of new multi-objective optimization algorithm for EV scheduling in smart grid through the uncertainties. 4261 - Patrizia Ribino
, Carmelo Lodato
:
A distributed fuzzy system for dangerous events real-time alerting. 4263-4282 - Raghavendra Kumar Chunduri
, Aswani Kumar Cherukuri
:
Scalable formal concept analysis algorithms for large datasets using Spark. 4283-4303 - Ahnaf Munir
, Md. Tahmid Rahman Laskar, Md. Sakhawat Hossen
, Salimur Choudhury
:
A localized fault tolerant load balancing algorithm for RFID systems. 4305-4317 - Dario Ortega Anderez
, Ahmad Lotfi
, Caroline S. Langensiepen, Kofi Appiah:
A multi-level refinement approach towards the classification of quotidian activities using accelerometer data. 4319-4330 - Giovannina Albano
, Umberto Dello Iacono
:
GeoGebra in e-learning environments: a possible integration in mathematics and beyond. 4331-4343 - Sally M. El-Ghamrawy
, Aboul Ella Hassanien:
GWOA: a hybrid genetic whale optimization algorithm for combating attacks in cognitive radio network. 4345-4360 - Rami Halloush
, Hang Liu:
Modeling and performance evaluation of jamming-tolerant wireless systems. 4361-4375 - Shashank Gupta, Brij B. Gupta
:
Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions. 4377-4405 - Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini:
Failure detectors for crash faults in cloud. 4407-4415 - Imane Lamiche, Bin Guo, Yao Jing, Zhiwen Yu
, Abdenour Hadid:
A continuous smartphone authentication method based on gait patterns and keystroke dynamics. 4417-4430 - Yongwei Tang, Jingbo Zhao, Maoli Wang, Huijuan Hao, Xiaoning He, Yuxiao Meng:
Beidou navigation method based on intelligent computing and extended Kalman filter fusion. 4431-4438 - Haijun Zhang, Guohui Zhang
, Qiong Yan:
Digital twin-driven cyber-physical production system towards smart shop-floor. 4439-4453 - Yesudhas Harold Robinson
, Eanoch Golden Julie, Krishnan Saravanan
, Raghvendra Kumar, Le Hoang Son:
FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. 4455-4472 - Salah Zemmoudj, Nabila Bermad, Mawloud Omar:
Context-aware pseudonymization and authorization model for IoT-based smart hospitals. 4473-4490 - Mohit Gupta
, Narendra S. Chaudhari:
Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check. 4491-4501 - Sachin Kumar
, Marina I. Nezhurina:
An ensemble classification approach for prediction of user's next location based on Twitter data. 4503-4513 - Lijuan Liu, Rung-Ching Chen
, Qiangfu Zhao, Shunzhi Zhu:
Applying a multistage of input feature combination to random forest for improving MRT passenger flow prediction. 4515-4532 - Guomin Li, Xinyu Li, Liang Gao
, Bing Zeng:
Tasks assigning and sequencing of multiple AGVs based on an improved harmony search algorithm. 4533-4546 - Ashish Singh, Kakali Chatterjee:
Trust based access control model for securing electronic healthcare system. 4547-4565 - Mohammed Amoon
, Nirmeen A. El-Bahnasawy, Samy Sadi, Manar Wagdi:
On the design of reactive approach with flexible checkpoint interval to tolerate faults in cloud computing systems. 4567-4577 - Mahdi Moodi, Mahdieh Ghazvini
:
A new method for assigning appropriate labels to create a 28 Standard Android Botnet Dataset (28-SABD). 4579-4593 - Jianwei Zhao, Yuancheng Xiang, Siyu Yang, Dongshun Zhang, Peng Yu:
The control of the movement of intelligent car based on self-adaptive non-linear algorithm. 4595-4602 - Amuthan Arjunan, Kaviarasan Ramu
:
Weighted inertia-based dynamic virtual bat algorithm to detect NLOS nodes for reliable data dissemination in VANETs. 4603-4613 - Shubhanshi Singhal, Vishal Passricha, Pooja Sharma, Rajesh Kumar Aggarwal
:
Multi-level region-of-interest CNNs for end to end speech recognition. 4615-4624
Volume 10, Number 12, December 2019
- Ansar-Ul-Haque Yasar
, Haroon Malik, Elhadi M. Shakshuki:
Special issue on ubiquitous computing and NextGen context-fusion. 4625-4627 - Khalid El Makkaoui
, Abderrahim Beni Hssane, Abdellah Ezzati
:
Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing. 4629-4640 - Charles Yaacoub
, Malak Sarkis:
Joint source and channel coding with systematic polar codes for wireless sensor communication in next generation networks. 4641-4649 - Olivier Debauche
, Saïd Mahmoudi
, Andriamasinoro Lalaina Herinaina Andriamandroso, Pierre Manneback
, Jérôme Bindelle
, Frédéric Lebeau:
Cloud services integration for farm animals' behavior studies based on smartphones as activity sensors. 4651-4662 - Mahmud Al-Osta, Bali Ahmed, Abdelouahed Gherbi
:
Event driven and semantic based approach for data processing on IoT gateway devices. 4663-4678 - Riadh Karchoud, Philippe Roose, Marc Dalmau, Arantza Illarramendi
, Sergio Ilarri:
One app to rule them all: collaborative injection of situations in an adaptable context-aware application. 4679-4692 - Tooba Batool, Yves Vanrompay, An Neven
, Davy Janssens
, Geert Wets
:
CTASS: an intelligent framework for personalized travel behaviour advice to cardiac patients. 4693-4705 - Alberto Huertas Celdrán
, Manuel Gil Pérez
, Félix J. García Clemente
, Gregorio Martínez Pérez:
Towards the autonomous provision of self-protection capabilities in 5G networks. 4707-4720 - Muhammad Adnan
, Shahbaz Altaf
, Tom Bellemans
, Ansar-Ul-Haque Yasar
, Elhadi M. Shakshuki:
Last-mile travel and bicycle sharing system in small/medium sized cities: user's preferences investigation using hybrid choice model. 4721-4731 - Ahmad M. Shaheen, Tarek R. Sheltami
, Talal M. Al-Kharoubi
, Elhadi M. Shakshuki:
Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. 4733-4750 - Mihai Nadin
, Asma Naz
:
Architecture as service: a case of design on demand (DoD). 4751-4769 - Saman Tamizi, Ali Ghaffari
:
Inference search algorithm for optimizing scheduling and minimizing mean tardiness in parallel joint robots. 4771-4783 - Toly Chen
:
Ambient intelligence and ergonomics in Asia. 4785-4787 - César A. Collazos, Francisco L. Gutiérrez
, Jesús Gallardo
, Manuel Ortega
, Habib M. Fardoun, Ana Isabel Molina Díaz
:
Descriptive theory of awareness for groupware development. 4789-4818 - Beixin Xia, Zheng Jian, Ning-rong Tao:
An effective combined multivariate control chart based on support vector data description. 4819-4835 - Zahoor Ali Khan
, Ayesha Zafar, Sakeena Javaid, Sheraz Aslam, Muhammad Hassan Rahim, Nadeem Javaid
:
Hybrid meta-heuristic optimization based home energy management system in smart grid. 4837-4853 - (Withdrawn) The visual object tracking algorithm research based on adaptive combination kernel. 4855-4867
- Hyuncheol Kim, Jae-Ho Han, Soonhung Han:
Analysis of evacuation simulation considering crowd density and the effect of a fallen person. 4869-4879 - Hela Malouche
, Youssef Ben Halima
, Henda Ben Ghézala
:
Trust level estimation for cloud service composition with inter-service constraints. 4881-4899 - Songhita Misra
, Rabul Hussain Laskar:
Development of a hierarchical dynamic keyboard character recognition system using trajectory features and scale-invariant holistic modeling of characters. 4901-4923 - Francisco de Arriba-Pérez
, Juan M. Santos-Gago
, Manuel Caeiro Rodríguez
, Mateo Ramos Merino:
Study of stress detection and proposal of stress-related features using commercial-off-the-shelf wrist wearables. 4925-4945 - Ashish Girdhar
, Vijay Kumar
:
A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map. 4947-4961 - Vishal Kumar Arora
, Vishal Sharma, Monika Sachdeva
:
ACO optimized self-organized tree-based energy balance algorithm for wireless sensor network - AOSTEB. 4963-4975 - Mahesh Balaji
, Ch. Aswani Kumar
, G. Subrahmanya V. R. K. Rao:
Non-linear analysis of bursty workloads using dual metrics for better cloud resource management. 4977-4992 - Yoshitaka Sakurai, Yukino Ikegami, Motoki Sakai, Hiroshi Fujikawa, Setsuo Tsuruta, Avelino J. Gonzalez, Eriko Sakurai, Ernesto Damiani, Andrea Kutics, Rainer Knauf, Fulvio Frati
:
VICA, a visual counseling agent for emotional distress. 4993-5005 - Fanyong Meng, Na Wang, Yanwei Xu:
Interval neutrosophic preference relations and their application in virtual enterprise partner selection. 5007-5036

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.