


default search action
International Journal of Computers Communications & Control, Volume 14
Volume 14, Number 1, 2019
- Changshun Du, Lei Huang:

Sentiment Analysis Method based on Piecewise Convolutional Neural Network and Generative Adversarial Network. 7-20 - Omar A. Hammood, Mohd Nizam, Muamer Nafaa, Waleed A. Hammood

:
RESP: Relay Suitability-based Routing Protocol for Video Streaming in Vehicular Ad Hoc Networks. 21-38 - Germán Adolfo Montoya, Yezid Donoso:

A Prediction Algorithm based on Markov Chains for finding the Minimum Cost Path in a Mobile WSNs. 39-55 - Dan Noje

, Radu Catalin Tarca
, Ioan Dzitac, Nicolae Pop:
IoT Devices Signals Processing based on Multi-dimensional Shepard Local Approximation Operators in Riesz MV-algebras. 56-62 - Sever Gabriel Racz

, Radu-Eugen Breaz
, Octavian Bologa, Melania Tera
, Valentin Stefan Oleksik
:
Using an Adaptive Network-based Fuzzy Inference System to Estimate the Vertical Force in Single Point Incremental Forming. 63-77 - Haiping Ren, Shixiao Xiao, Hui Zhou:

A Chi-square Distance-based Similarity Measure of Single-valued Neutrosophic Set and Applications. 78-89 - Zenonas Turskis

, Simona Dzitac
, Ausra Stankiuviene, Ritoldas Sukys:
A Fuzzy Group Decision-making Model for Determining the Most Influential Persons in the Sustainable Prevention of Accidents in the Construction SMEs. 90-106 - Qianqian Zhang, Shifeng Liu, Daqing Gong, Qun Tu:

A Latent-Dirichlet-Allocation Based Extension for Domain Ontology of Enterprise's Technological Innovation. 107-123 - Shuai Zhang

, Yong Chen, Xiaoling Huang, Yishuai Cai
:
Text Classification of Public Feedbacks using Convolutional Neural Network Based on Differential Evolution Algorithm. 124-134
Volume 14, Number 2, 2019
- Xiaolong Feng, Jing Gao:

Gene Sequences Parallel Alignment Model Based on Multiple Inputs and Outputs. 141-153 - Adrian-Catalin Florea, Razvan Andonie

:
Weighted Random Search for Hyperparameter Optimization. 154-169 - Yue Huang

:
Heterogeneous Data Clustering Considering Multiple User-provided Constraints. 170-182 - C. Jothikumar, Revathi Venkataraman

:
EODC: An Energy Optimized Dynamic Clustering Protocol for Wireless Sensor Network using PSO approach. 183-198 - Leixiao Li, Jing Gao, Ren Mu:

Optimal Data File Allocation for All-to-All Comparison in Distributed System: A Case Study on Genetic Sequence Comparison. 199-211 - Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo

:
Performance Analysis of RAW Impact on IEEE 802.11ah Standard affected by Doppler Effect. 212-219 - Haiping Ren, Manfeng Liu, Hui Zhou:

Extended TODIM Method for MADM Problem under Trapezoidal Intuitionistic Fuzzy Environment. 220-232 - R. Senthilkumar

, G. M. Tamilselvan
, S. Kanithan, N. Arun Vignesh
:
Routing in WSNs Powered by a Hybrid Energy Storage System through a CEAR Protocol Based on Cost Welfare and Route Score Metric. 233-252 - Alexandru Tugui

, Daniela Danciulescu
, Mihaela-Simona Subtirelu:
The Biological as a Double Limit for Artificial Intelligence: Review and Futuristic Debate. 253-271 - Fushen Yang

, Changshun Du, Lei Huang:
Ensemble Sentiment Analysis Method based on R-CNN and C-RNN with Fusion Gate. 272-285
Volume 14, Number 3, 2019
- Kemal Alic

, Mihael Mohorcic
, Ales Svigelj
:
Network and Traffic Design Aspects in Network-Coding-Enabled Wireless Networks. 293-310 - Mo Chen:

Research on Key Technology of Web Hierarchical Topic Detection and Evolution Based on Behaviour Tracking Analysis. 311-328 - Yukun Dong, Jiantao Zhang, Zhen Li, Yong Hu, Yong Deng:

Combination of Evidential Sensor Reports with Distance Function and Belief Entropy in Fault Diagnosis. 329-343 - Wei Hu, Wenhui Yao, Yawei Hu, Huanhao Li:

Selection of Cluster Heads for Wireless Sensor Network in Ubiquitous Power Internet of Things. 344-358 - Gu-Min Jeong

, Kyoungwoo Lee, Sang-Il Choi, Sang-Hoon Ji, Nikil D. Dutt
:
Effect of Soft Errors in Iterative Learning Control and Compensation using Cross-layer Approach. 359-374 - Michael Miranda

, Renato Salinas, Ulrich Raff, Oscar Magna:
Wavelet Design for Automatic Real-Time Eye Blink Detection and Recognition in EEG Signals. 375-387 - Attila Simo

, Constantin Barbulescu
, Stefan Kilyeni, Claudia Dragos:
Manufacturing Process Monitoring in Terms of Energy Management Improving. 388-400 - Xiaoru Song, Song Gao, Chaobo Chen, Zepeng Gao:

Enhanced Fireworks Algorithm-Auto Disturbance Rejection Control Algorithm for Robot Fish Path Tracking. 401-418 - Yuhe Wang, Peili Qiao, Zhiyong Luo, Guanglu Sun, Guangze Wang:

Reliability Assessment Model for Industrial Control System Based on Belief Rule Base. 419-436 - Jie Zhao, Yong Deng:

Performer selection in Human Reliability analysis: D numbers approach. 437-452
Volume 14, Number 4, 2019
- Gubba Balakrishna, Nageswara Rao Moparthi

:
ESBL: Design and Implement A Cloud Integrated Framework for IoT Load Balancing. 459-474 - Benchun Cao, Yanchun Liang, Shinichi Yoshida, Renchu Guan

:
Facial Expression Decoding based on fMRI Brain Signal. 475-488 - Dan Chang, Hao Yu Gui, Rui Fan, Ze Zhou Fan, Ji Tian:

Application of Improved Collaborative Filtering in the Recommendation of E-commerce Commodities. 489-502 - Wei Hu, Huanhao Li, Wenhui Yao, Yawei Hu:

Energy Optimization for WSN in Ubiquitous Power Internet of Things. 503-517 - Waleed Nazih

, Yasser Hifny, Wail Elkilani
, Tamer Abdelkader
, Hossam El Deen Mostafa Faheem
:
Efficient Detection of Attacks in SIP Based VoIP Networks Using Linear l1-SVM Classifier. 518-529 - Doan Perdana, Aji Nur Sanyoto, Gustommy Bisono:

Performance Evaluation and Comparison of Scheduling Algorithms on 5G Networks using Network Simulator. 530-539 - Dewen Seng, Jiaxin Liu, Xuefeng Zhang, Jing Chen, Xujian Fang:

Top-N Recommendation Based on Mutual Trust and Influence. 540-556 - Yunlei Sun

, Huiquan Gong, Yucong Li, Dalin Zhang
:
Hyperparameter Importance Analysis based on N-RReliefF Algorithm. 557-573 - Linyan Xue, Xiaoke Zhang, Fei Xie, Shuang Liu, Peng Lin:

Frequent Patterns Algorithm of Biological Sequences based on Pattern Prefix-tree. 574-589 - Xuefeng Zhang, Xiuli Chen, Dewen Seng, Xujian Fang:

A Factored Similarity Model with Trust and Social Influence for Top-N Recommendation. 590-607
Volume 14, Number 5, 2019
- Jin Hua, Lile He, Zhiqiang Kang, Keding Yan:

A Force/Position Hybrid Controller for Rehabilitation Robot. 615-628 - Arturas Kaklauskas

, Domnica Dzitac
, Jurate Sliogeriene, Natalija Lepkova, Ingrida Vetloviene:
VINERS Method for the Multiple Criteria Analysis and Neuromarketing of Best Places to Live. 629-646 - Yonal Kirsal:

Exploring Analytical Models for Performability Evaluation of Virtualized Servers using Dynamic Resource. 647-659 - Tao Lin, Peng Wu, Fengmei Gao, Tianshu Wu:

Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation. 660-671 - Baoyu Liu, Yong Deng:

Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory. 672-691 - D. Ha Vu

, Shoudao Huang, T. Diep Tran, Vu Thi Yen, Cuong Van Pham:
A Robust Adaptive Control using Fuzzy Neural Network for Robot Manipulators with Dead-Zone. 692-710 - Xinxin Wang, Zeshui Xu, Ioan Dzitac:

Bibliometric Analysis on Research Trends of International Journal of Computers Communications & Control. 711-732 - Hualong Xie, Yao Xie, Fei Li:

Design, Modeling and Control of Bionic Knee in Artificial Leg. 733-752 - Lian Zhou, Fuyuan Xiao:

DCM: D Number Extended Cognitive Map. Application on Location Selection in SCM. 753-771
Volume 14, Number 6, 2019
- Jianwu Jiang, Zhi Chen, Yihuai Wang, Tao Peng, Shilang Zhu, Lianmin Shi:

Parameter Estimation for PMSM based on a Back Propagation Neural Network Optimized by Chaotic Artificial Fish Swarm Algorithm. 615-632 - Yang Li, Zeshui Xu

, Xinxin Wang, Florin Gheorghe Filip:
Studies in Informatics and Control: A Bibliometric Analysis from 2008 to 2019. 633-652 - Fangyao Liu, Yayu Peng

, Zhengxin Chen, Yong Shi:
Modeling of Characteristics on Artificial Intelligence IQ Test: a Fuzzy Cognitive Map-Based Dynamic Scenario Analysis. 653-669 - Ajeet Singh

, Anurag Jain:
An Empirical Study of AML Approach for Credit Card Fraud Detection-Financial Transactions. 670-690 - Jangiti Siva Prashanth, Satyanarayana V. Nandury

:
A Cluster-based Approach for Minimizing Energy Consumption by Reducing Travel Time of Mobile Element in WSN. 691-709 - Mohammad Hashemi Tabatabaei

, Maghsoud Amiri
, Mohammad Ghahremanloo
, Mehdi Keshavarz-Ghorabaee
, Edmundas Kazimieras Zavadskas, Jurgita Antucheviciene
:
Hierarchical Decision-making using a New Mathematical Model based on the Best-worst Method. 710-725 - Phuc Huu Truong, Sujeong You, Sang-Hoon Ji, Gu-Min Jeong

:
Wearable System for Daily Activity Recognition Using Inertial and Pressure Sensors of a Smart Band and Smart Shoes. 726-742 - Donatas Vitkus, Zilvinas Steckevicius, Nikolaj Goranin, Diana Kalibatiene

, Antanas Cenys
:
Automated Expert System Knowledge Base Development Method for Information Security Risk Analysis. 743-758 - Minjuan Zhong, Liang Tan, Xilong Qu:

Identification of Opinion Spammers using Reviewer Reputation and Clustering Analysis. 759-772

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














