


default search action
Information Technology and Control, Volume 50
Volume 50, Number 1, March 2021
- Hani Alquhayz

, Mahdi Jemmali
:
Max-Min Processors Scheduling. 5-12 - Binbin Shi, Xun Li, Tingting Nie, Kaibin Zhang, Wenjie Wang:

Multi-object Recognition Method Based on Improved YOLOv2 Model. 13-27 - Yaser Chaaban:

Packet Analysis: a Model Implementation of a Special Communication Protocol Using Micro Programming. 28-44 - Cr Rathish

, K. Karpagavadivu, P. Sindhuja
, A. Kousalya:
A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET. 45-54 - K. Sundara Krishnan

, S. P. Raja
, B. Jaison:
A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing. 55-75 - Qinge Wu, Xing Wang, Zhiwu Chen, Hu Chen, Dong Sun, Zhenyu Han:

Application of Fuzzy Pushdown Automaton on Prediction of Quality Control for Spinning Yarn. 76-88 - Zengguo Sun, Mingmin Zhao, Bai Jia:

A GF-3 SAR Image Dataset of Road Segmentation. 89-101 - Veera Anusuya, V. Gomathi

:
An Efficient Technique for Disease Prediction by Using Enhanced Machine Learning Algorithms for Categorical Medical Dataset. 102-122 - Muhammad Tayyib Awan, Muhammad Amir, Sarmad Maqsood

, Musyyab Yousufi, Suheel Abdullah, Muhammad Irfan:
Modified Block Compressed Sensing for Extraction of Fetal Electrocardiogram from Mother Electrocardiogram Using Block Compressed Sensing Based Guided FOCUSS and FAST-Independent Component. 123-137 - Mujeeb ur Rehman

, Dost Muhammad Khan:
A Novel Density-based Technique for Outlier Detection of High Dimensional Data Utilizing Full Feature Space. 138-152 - Lizhi Cui, Peichao Zhao, Bingfeng Li, Xinwei Li, Keping Wang, Yi Yang, Xuhui Bu, Shumin Fei:

A Stopping Criterion for the Training Process of the Specific Signal Generator. 153-170 - Shanmuganathan Vimal

, L. Kalaivani, Seifedine Nimer Kadry, Annamalai Suresh, Yesudhas Harold Robinson
, Sangsoon Lim:
EECCRN: Energy Enhancement with CSS Approach Using Q-Learning and Coalition Game Modelling in CRN. 171-187 - Samia Riaz, Muhammad Waqas Anwar, Irfan Riaz, Yunyoung Nam, Muhammad Attique Khan

:
Visibility Restoration Using Generalized Haze-Lines. 188-207
Volume 50, Number 2, June 2021
- Taweechai Nuntawisuttiwong, Natasha Dejdumrong:

An Approximation of Bézier Curves by a Sequence of Circular Arcs. 213-223 - Te-Yuan Lin, Chiou-Shann Fuh:

Quantum-Resistant Network for Classical Client Compatibility. 224-235 - Guoai Xu, Jiangtao Yuan, Guosheng Xu, Xingxing Jia:

A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier. 236-246 - Xuliang Duan

, Bing Guo, Yan Shen, Yuncheng Shen, Xiangqian Dong, Hong Zhang:
Research on Data Currency Rule and Quality Evaluation. 247-263 - Ali Durdu:

Nested Two-Layer RGB Based Reversible Image Steganography Method. 264-283 - Chenn-Jung Huang, Kai-Wen Hu, Hsing Yi Ho, Hung-Wen Chuang:

Congestion-Preventing Routing and Charging Scheduling Mechanism for Electric Vehicles in Dense Urban Areas. 284-307 - Tb. Ai Munandar, Sumiati, Vidila Rosalina:

Predictive Model for Heart Disease Diagnosis Based on Multinomial Logistic Regression. 308-318 - Wenlu Ma, Han Liu

:
Least Squares Support Vector Machine Regression Based on Sparse Samples and Mixture Kernel Learning. 319-331 - Seyed Yahya Zahedi Fard, Mohammad Karim Sohrabi, Vahid Ghods:

Energy-Aware and Proactive Host Load Detection in Virtual Machine Consolidation. 332-341 - Venkatesan Rajinikanth

, Seifedine Nimer Kadry, Yunyoung Nam:
Convolutional-Neural-Network Assisted Segmentation and SVM Classification of Brain Tumor in Clinical MRI Slices. 342-356 - Novak Zagradjanin, Aleksandar Rodic

, Dragan Pamucar
, Bojan Pavkovic
:
Cloud-Based Multi-Robot Path Planning in Complex and Crowded Environment Using Fuzzy Logic and Online Learning. 357-374 - Waheed Iqbal, Waqas Ilyas Malik, Faisal Bukhari, Khaled Mohamad Almustafa

, Zubiar Nawaz:
Big Data Full-Text Search Index Minimization Using Text Summarization. 375-389 - Yongwen Du, Xiquan Zhang, Wenxian Zhang, Zhangmin Wang:

Whale Optimization Algorithm with Applications to Power Allocation in Interference Networks. 390-405
Volume 50, Number 3, September 2021
- Akhilesh Kumar Shrivas, Amit Kumar Dewangan, S. M. Ghosh, Devendra Singh:

Development of Proposed Ensemble Model for Spam e-mail Classification. - Atif Ali

, Yaser Hafeez, Sadia Ali, Shariq Hussain
, Shunkun Yang, Arif Jamal Malik, Aaqif Afzaal Abbasi
:
A Data Mining Technique to Improve Configuration Prioritization Framework for Component-Based Systems: An Empirical Study. 424-442 - Thamer A. Alrawashdeh, Fuad Ali El-Qirem, Ahmad Althunibat

, Roba Alsoub:
A Prioritization Approach for Regression Test Cases Based on a Revised Genetic Algorithm. 443-457 - Gang Sun, Zhongxin Wang, Jia Zhao:

Automatic Text Summarization Using Deep Reinforcement Learning and Beyond. 458-469 - Raed T. Al-Zubi, Mohammad Q. Alawad, Abdulraheem A. Kreishan, Khalid A. Darabkh:

ERP-DDA: Event Reporting Protocol Based on Distributed Data Aggregation for Wireless Sensor Networks. 470-484 - Oscar Loyola, John Kern, Claudio Urrea

:
Novel Algorithm for Agent Navigation Based on Intrinsic Motivation Due to Boredom. 485-494 - Deris Stiawan, Somame Morianus Daely, Ahmad Heryanto

, Nurul Afifah
, Mohd Yazid Idris, Rahmat Budiarto
:
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm. 495-506 - Atif Mehmood, Inam Ul Hasan Shaikh

, Ahsan Ali:
Application of Deep Reinforcement Learning for Tracking Control of 3WD Omnidirectional Mobile Robot. 507-521 - Huiyu Mu, Ruizhi Sun

, Gang Yuan, Yun Wang:
Abnormal Human Behavior Detection in Videos: A Review. 522-545 - J. Kumarnath

, Krishnan Batri:
Optimized Traffic Grooming through modified PSO based Iterative Hungarian algorithm in Optical Networks. 546-557 - Zoran Peric, Bojan Denic

, Milan S. Savic
, Milan R. Dincic
, Darko Mihajlov:
Quantization of Weights of Neural Networks with Negligible Decreasing of Prediction Accuracy. 558-569 - Jiaxing Guo

, Chunxiang Gu, Xi Chen, Siqi Lu
, Fushan Wei:
Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations. 570-587 - Xuhui Bu, Rui Hou

, Yanling Yin, Wei Yu, Jiahao Geng:
Distributed Iterative Learning Formation control for Nonholonomic Multiple Wheeled Mobile Robots with Channel Noise. 588-600
Volume 50, Number 4, December 2021
- Egidijus R. Vaidogas:

Bayesian Processing of Data on Bursts of Pressure Vessels. 607-626 - Shariq Bashir

, Daphne Teck Ching Lai:
Mining Approximate Frequent Itemsets Using Pattern Growth Approach. 627-644 - George Klington, K. Ramesh, Seifedine Nimer Kadry:

Cost-Effective Watermarking Scheme for Authentication of Digital Fundus Images in Healthcare Data Management. 645-655 - Chhayarani Ram Kinkar, Yogendra Kumar Jain:

Low Latency Based Convolutional Recurrent Neural Network Model for Speech Command Recognition. 656-673 - Bora Aslan, Kerem Atasen:

COVID-19 Information Sharing with Blockchain. 674-685 - B. Uma Maheswari

, R. Sonia
, M. P. Rajakumar
, J. Ramya:
Novel Machine Learning for Human Actions Classification Using Histogram of Oriented Gradients and Sparse Representation. 686-705 - Shaofeng Lin, Zengguo Sun, Xuejun Peng, Lin Ni, Genfeng Wen, Weirong Chen, Zheng Lu, Qianfu Chen:

Brightness Compensation for GF-3 SAR Images Based on Cycle-Consistent Adversarial Networks. 706-721 - Weixing Wang, Fredrik Bergholm, Keli Hu, L. Zhao, S. Feng, Angyan Tu, E. Fan:

Lane Line Extraction in Raining Weather Images by Ridge Edge Detection with Improved MSR and Hessian Matrix. 722-735 - Ludmila Vesjolaja, Bjørn Glemmestad, Bernt Lie:

Comparison of Feedback Control Strategies for Operation of Granulation Loops. 736-751 - Muchao Chen, Yanxiang He:

Wire Rope Weak Defect Signal Processing Methods Based on Improved SVD and Phase Space Reconstruction. 752-768 - Zhong Hong, Jianmin Jiang, Hongping Shu:

Analyzing Isolation in Mobile Systems. 769-785 - Alen Salkanovic

, Sandi Ljubic
, Ljubisa Stankovic
, Jonatan Lerga
:
Analysis of Cryptography Algorithms Implemented in Android Mobile Application. 786-807 - Dorde Stakic

, Miodrag Zivkovic
, Ana Anokic
:
A Reduced Variable Neighborhood Search Approach to the Heterogeneous Vector Bin Packing Problem. 808-826

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














