


default search action
Ingénierie des Systèmes d'Information, Volume 24
Volume 24, Number 1, February 2019
- Shereen El-Feky, Tarek H. M. Abou-El-Enien:

Hybrid Algorithm for Rough Multi-level Multi-objective Decision Making Problems. 1-17 - Shraddha R. Khonde

, Ulagamuthalvi Venugopal:
Hybrid Architecture for Distributed Intrusion Detection System. 19-28 - Dasheng Zhang, Jing Tan, Han Tian, Zhongzheng Wang, Wenjun Guo:

Aquifer Parameter Inversion by Artificial Fish Swarm Algorithm Based on Quantum Theory. 29-33 - Fei Cai, Xiaohui Mou, Xin Zhang, Jie Chen, Jin Li, Wenpeng Xu:

Network Adjacency Matrix Blocked-compressive Sensing: A Novel Algorithm for Link Prediction. 35-42 - Lenin Kanagasabai:

Brachytrupes Algorithm for Solving Optimal Reactive Power Problem. 43-46 - Kurapati Praveena, Gudla Sirisha, Satukumati Babu, Panchala Rao:

Efficient Method in Association Rule Hiding for Privacy Preserving with Data Mining Approach. 47-50 - Pandluri Dhanalakshmi:

A Novel Frequent Pattern Mining Technique for Prediction of User Behavior on Web Stream Data. 51-56 - Na Jiang, Jiyuan Li:

Adaptive Speech Enhancement Algorithm Based on Hilbert-Huang Transform. 57-60 - Qing Cheng, Jinpu Jiao, Honghua Chen, Fen Xu:

Application of Impulse Response Method in Identifying the Causes of Gold Price Fluctuation. 61-66 - Srabanti Maji

, Soumen Kanrar
:
SpliceCombo: A Hybrid Technique Efficiently Use for Principal Component Analysis of Splice Site Prediction. 67-75 - Dudekula Rafi, Chettiar Bharathi:

A Case Study of Medical Data Classification Using Hybrid Adboost KNN along with Krill Herd Algorithm (KHA). 77-81 - Gokul Yenduri

, Naralasetti Veeranjaneyulu:
An Analysis of Maintainability Index Influencing Metrics and Their Behavior on Similar Open Source Gaming Application Developed in C, C++ and, JAVA. 83-87 - Ligang Cong, Huamin Yang, Xiaoqiang Di:

Storage Allocation Plan for Routing Nodes in Delay Tolerant Network. 89-94 - Suresh Satukumati, Shivaprasad Satla, Raghu Kogila

:
Feature Extraction Techniques for Chronic Kidney Disease Identification. 95-99 - Bingkun Dong, Xiaoning Zhu

, Rui Yan, Changlu Zhang:
Evaluation of Third-party Reverse Logistics Providers Based on Extension Superiority Method. 101-105 - Chippada Nagamani

, Suneetha Chittineni
:
Efficient Neighborhood Density Based Outlier Detection Inside a Sub Network with High Dimensional Data. 107-111 - Arepalli Peda Gopi

, Vejendla Lakshman Narayana, Rachakonda Venkatesh
, Nanduri Kumar:
Certified Node Frequency in Social Network Using Parallel Diffusion Methods. 113-117 - Hong Zhou, Kun-Ming Yu:

A Novel Wireless Sensor Network Data Aggregation Algorithm Based on Self-organizing Feature Mapping Neutral Network. 119-123 - Jyostna Devi Bodapati, Naralasetti Veeranjaneyulu, Nagur Shareef Shaik

:
Sentiment Analysis from Movie Reviews Using LSTMs. 125-129
Volume 24, Number 2, April 2019
- Narges Hasanzadeh, Yahya Forghani:

Improving the Accuracy of M-distance Based Nearest Neighbor Recommendation System by Using Ratings Variance. 131-137 - Komanduri Venkata Sesha Sai Rama Krishna, Bhanu Prakash Battula:

Intrusion Detection System Employing Multi-level Feed Forward Neural Network along with Firefly Optimization (FMLF2N2). 139-145 - Yuhe Wang, Peili Qiao, Haibin Chen, Zhiyong Luo, Guanglu Sun:

The Reliability Assessment of ICS Based on Evidential Reasoning and Semi-quantitative Information. 147-154 - Hongyan Chu, Liting Xu, Yuexin Liu:

An Optimal Power Allocation Algorithm for Cognitive Radio Networks Based on Maximum Rate and Interference Constraint. 155-159 - Rupa Chiramdasu

:
Extended Statistical Analysis on Multimedia Concealed Data Detections. 161-165 - Tingting Shi:

Spatial Data Mining and Big Data Analysis of Tourist Travel Behavior. 167-172 - Ummadi Reddy, Pandluri Dhanalakshmi, Pallela Reddy:

Image Segmentation Technique Using SVM Classifier for Detection of Medical Disorders. 173-176 - (Withdrawn) Secured Data Representation in Images Using Graph Wavelet Transformation Technique. 177-181

- Biyao Zhang, Kaisong Zhang, Luo Zhong, Xuan Ya Zhang:

Research on Dirichlet Process Mixture Model for Clustering. 183-189 - Bo Guan, Minghui Liu:

A Novel Video Compression Algorithm Based on Wireless Sensor Network. 191-196 - Bulla Premamayudu, Leela Inturu, Gajula Ramesh

:
New Reliability Routing Path for Detects Malicious Link. 197-200 - Bendaoud Mebarek, Mourad Keddam

:
Prediction Model for Studying the Growth Kinetics of Fe2B Boride Layers during Boronizing. 201-205 - Xu Qiao, Feng Yang, Jing Zheng:

Ground Penetrating Radar Weak Signals Denoising via Semi-soft Threshold Empirical Wavelet Transform. 207-213 - Aljia Bouzidi, Nahla Haddar, Kais Haddar:

Traceability and Synchronization Between BPMN and UML Use Case Models. 215-228
Volume 24, Number 3, June 2019
- Shaimaa M. Elembaby, Vidan F. Ghoneim

, Manal Abdel Wahed:
ANOVAG3: A Hybrid Algorithm for Inferring Gene Regulatory Network Using Time Series Gene Expression Data. 229-232 - Hanumantha Rao Sama

, Vasanta Kumar Vemuri, Srinivasa Rao Talagadadeevi, Srinivasa Kumar Bhavirisetti:
Analysis of an N-policy MX/M/1 Two-phase Queueing System with State-dependent Arrival Rates and Unreliable Server. 233-240 - Hongsong Wang

, Jiangyan Zhu:
A Quadtree Spatial Index Method with Inclusion Relations and Its Application in Landcover Database Update. 241-247 - Qingju Jiao, Yuanyuan Jin:

Multi-scale View Reveals Easily Detectable Community in Complex Networks. 249-253 - Jyostna Devi Bodapati, Venkata Rama Krishna Sajja, Nirupama Bhat Mundukur

, Naralasetti Veeranjaneyulu:
Robust Cluster-then-label (RCTL) Approach for Heart Disease Prediction. 255-260 - Sankaranarayanan Murugan, Govindarajan Kulanthaivel, Venugopal Ulagamuthalvi:

Selection of Test Case Features Using Fuzzy Entropy Measure and Random Forest. 261-268 - Yanhong Guo, Shuai Jiang

, Feiting Chen, Yaocong Li, Chunyu Luo:
Borrower-lender Information Fusion for P2P Lending: A Nonparametric Approach. 269-279 - Ghada M. A. Soliman, Tarek H. M. Abou-El-Enien, Eid Emary, Motaz M. H. Khorshid:

A Hybrid Modified Whale Optimization Algorithm with Simulated Annealing for Terrorism Prediction. 281-287 - Soumen Kanrar

, Soamdeep Singha:
Content Delivery Through Hybrid Architecture in Video on Demand System. 289-301 - Tingting Lei, Guangtian Zou:

Interactive Design of Commercial Space Signage System Based on Object Detection. 303-311 - Yongli Liu, Ling Pang, Xiuli Lu:

Click-through Rate Prediction Based on Mobile Computing and Big Data Analysis. 313-319 - Saeid Masoumi

, Ali Mahjur:
Collaborative Component Interaction. 321-329 - Lu Bai, Chenglie Du:

Design and Simulation of a Collision-free Path Planning Algorithm for Mobile Robots Based on Improved Ant Colony Optimization. 331-336 - Leixiao Li, Jing Gao, Hui Wang, Dan Deng, Hao Lin

:
Construction and Optimization of a File Distribution Model for All-to-All Comparison of Big Dataset. 337-342 - Garima Verma

, Rupak Chakraborty:
A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment. 343-351 - Anup Gade, Nirupama Bhat Mundukur

, Nita Thakare:
Adaptive League Championship Algorithm (ALCA) for Independent Task Scheduling in Cloud Computing. 353-359
Volume 24, Number 4, August 2019
- Lelai Shi, Suhui Liu, Slobodan Petrovic:

Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce. 361-365 - Kundharu Saddhono, Cahyo Hasanudin

, Ayu Fitrianingsih
:
The Ability to Think Creatively on SSCS Using Schoology Apps, How is the Student's Language Metacognitive Awareness? 367-375 - Junzhen Meng, Junran Zhang

:
A Fast Algorithm for Particle Stacking. 377-384 - Suneetha Bulla, Bobba Rao:

Performance and Cost Analysis of Web Application in Elastic Cloud Environment. 385-389 - Kalpana Polisetty, Kiran Kumar Paidipati

, Jyostna Devi Bodapati:
Modelling of Monthly Rainfall Patterns in the North-West India Using SVM. 391-395 - Hai-juan Zang, Yan Huang, Hongbo Cao, Chenchen Li:

A Novel Privacy Protection Protocol for Vehicular Ad Hoc Networks Based on Elliptic Curve Bilinear Mapping. 397-402 - Gottumukkala Himabindu, Chinta Anuradha

, Patnala Murty:
Feature Extraction Techniques in Associate with Opposition Based Whale Optimization Algorithm. 403-410 - Santhosh Kumar Veeramalla

, Venkata Talari:
Estimation of Neural Sources from EEG Measurements Using Sequential Monte Carlo Method. 411-417 - Feifei Wang, Haifeng Hu:

An Improved Energy-Efficient Cluster Routing Protocol for Wireless Sensor Network. 419-424 - Neha Bansal, Arun Sharma

, R. K. Singh:
An Evolving Hybrid Deep Learning Framework for Legal Document Classification. 425-431 - Jian Yu:

Design of a Privacy-Preserving Algorithm for Peer-to-Peer Network Based on Differential Privacy. 433-437 - Tahtah Hocine, Arif Salem:

Modified Flower Pollination Algorithm Constrained Optimal Power Flow. 439-444 - Anil Kurra, Usha Rani Nelakuditi:

Design of a Reliable Current Starved Inverter Based Arbiter Physical Unclonable Functions (PUFs) for Hardware Cryptography. 445-454
Volume 24, Number 5, October 2019
- Taner Tuncer

, Okan Yar:
Fuzzy Logic-Based Smart Parking System. 455-461 - Sanaz Moezzi, Mehrdad Jalali

, Yahya Forghani:
TWSVC+: Improved Twin Support Vector Machine-Based Clustering. 463-471 - Jiali Liu, Kai Li:

An Information System of Clinical Pathway Management Based on the Integration Between Knowledge Management and Learning Organization. 473-480 - Subramanian Balaji, Yesudhas Harold Robinson

, Eanoch Golden Julie:
GBMS: A New Centralized Graph Based Mirror System Approach to Prevent Evaders for Data Handling with Arithmetic Coding in Wireless Sensor Networks. 481-490 - Xu Cheng, Chenyuan Zhao:

Prediction of Tourist Consumption Based on Bayesian Network and Big Data. 491-496 - Kaustuv Deb, Sonali Banerjee, Rudra Chatterjee, Atanu Das, Rajib Bag:

Educational Website Ranking Using Fuzzy Logic and K-Means Clustering Based Hybrid Method. 497-506 - Theyyagura Reddy, Bulla Premamayudu:

Vehicle Insurance Model Using Telematics System with Improved Machine Learning Techniques: A Survey. 507-512 - Alem Abdelkader, Youcef Dahmani, Bendaoud Bendaoud:

Skyline Computation for Improving Naïve Bayesian Classifier in Intrusion Detection System. 513-518 - Mengxia Li, Ruiquan Liao, Yong Dong:

Adaptive Determination of Time Delay in Grey Prediction Model with Time Delay. 519-524 - Xueling Li, Zhen Li:

A Hybrid Prediction Model for E-Commerce Customer Churn Based on Logistic Regression and Extreme Gradient Boosting Algorithm. 525-530 - Sake Madhu, Ranjit Midde, Gandikota Ramu

, Appawala Jayanthi, Jalari Somasekar
, Gajula Ramesh
, Pallela Reddy:
A Secured Framework to Protect Association Rules in the Big Data Environment Using Fuzzy Logic. 531-537 - Dasari Yakobu, Venkata Rami Reddy Chirra

, Venkatrama Phani Kumar Sistla
:
A Novel Energy Efficient Scheduling for VM Consolidation and Migration in Cloud Data Centers. 539-546 - Wei Liu:

Traffic Flow Prediction Based on Local Mean Decomposition and Big Data Analysis. 547-552 - Sayan Sikder

, Sanjeev Kumar Metya
, Rajat Subhra Goswami:
Exception-Tolerant Decision Tree / Rule Based Classifiers. 553-558
Volume 24, Number 6, December 2019
- Cahyo Hasanudin

, Ayu Fitrianingsih
, Kundharu Saddhono:
How is the Student's Negotiation Text in Collaborative Learning of Flipped Classroom and a CyberLink Power Director Media Apps. 559-567 - Md. Milon Islam

, Nieb Neom, Md. Samir Imtiaz, Sheikh Nooruddin
, Md. Repon Islam, Md. Rabiul Islam
:
A Review on Fall Detection Systems Using Data from Smartphone Sensors. 569-576 - Ruifang Xing, Yayun Fan, Wei Liu:

A Markov Chain-Based Overlapping Community Detection Algorithm for Complex Networks. 577-582 - Pradeep Venuthurumilli

, Sridhar Mandapati
:
An Energy and Deadline Aware Scheduling Using Greedy Algorithm for Cloud Computing. 583-590 - Mohamed Djerioui, Youcef Brik, Mohamed Ladjal

, Bilal Attallah:
Neighborhood Component Analysis and Support Vector Machines for Heart Disease Prediction. 591-595 - Caihong Zhang, Wei Xue, Ying Xin:

Design and Application of an Intelligent Patrol Algorithm for Forest Management and Protection Based on Global Positioning System. 597-602 - Dasari Yakobu, Hemantha Kumar Kalluri, Venkatesulu Dondeti:

An Enhanced Secure, Robust and Efficient Crypto Scheme for Ensuring Data Privacy in Public Cloud Using Obfuscation & Encryption. 603-609 - Anuj Kumar Yadav

, Ritika
, Madan Lal Garg:
Monitoring Based Security Approach for Cloud Computing. 611-617 - Wenxuan Wang:

Site Selection of Fire Stations in Cities Based on Geographic Information System (GIS) and Fuzzy Analytic Hierarchy Process (FAHP). 619-626 - Nirupama Bhat Mundukur

, Suvarna Buradagunta
, Kuruba Usha Rani:
A Novel Approach to Key Management Using Visual Cryptography. 627-632 - Sufen Zhang:

Classification of Urban Land Use Based on Graph Theory and Geographic Information System. 633-639

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














