


default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 10
Volume 10, Number 1, January 2019
- Lucio Ciabattoni

, Gabriele Foresi, Andrea Monteriù
, Lucia Pepa
, Daniele Proietti Pagnotta
, Luca Spalazzi
, Federica Verdini:
Real time indoor localization integrating a model based pedestrian dead reckoning on smartphone and BLE beacons. 1-12 - Aparajita Nanda, Pankaj Kumar Sa, Dushyant Singh Chauhan, Banshidhar Majhi:

A person re-identification framework by inlier-set group modeling for video surveillance. 13-25 - Jong-Hyun Park:

Resource recommender system based on psychological user type indicator. 27-39 - Sang-Seok Yun, Quang Nguyen, JongSuk Choi:

Recognition of emergency situations using audio-visual perception sensor network for ambient assistive living. 41-55 - Lakmini P. Malasinghe

, Naeem Ramzan
, Keshav P. Dahal
:
Remote patient monitoring: a comprehensive study. 57-76 - Farzaneh Mirzapour, Mostafa Lakzaei, Gohar Varamini

, Milad Teimourian, Noradin Ghadimi:
A new prediction model of battery and wind-solar output in hybrid power system. 77-87 - Peter Sarcevic

, Zoltán Kincses
, Szilveszter Pletl
:
Online human movement classification using wrist-worn wireless sensors. 89-106 - Mina Ghafouri vaighan, Mohammad Ali Jabraeil Jamali

:
A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks. 107-123 - Anupam Mukherjee

, Goutam Panigrahi, Samarjit Kar
, Manoranjan Maiti:
Constrained covering solid travelling salesman problems in uncertain environment. 125-141 - Chikh Ramdane

, Salim Chikhi:
Clustered negative selection algorithm and fruit fly optimization for email spam detection. 143-152 - Prosanta Gope:

Anonymous mutual authentication with location privacy support for secure communication in M2M home network services. 153-161 - Ou Ruan

, Qingping Wang, Zihao Wang:
Provably leakage-resilient three-party password-based authenticated key exchange. 163-173 - Baofang Hu, Hong Wang, Xiaomei Yu, Weihua Yuan, Tianwen He:

Sparse network embedding for community detection and sign prediction in signed social networks. 175-186 - Jing Zhao

, Bin Wei, Yang Su:
Communication-efficient revocable identity-based signature from multilinear maps. 187-198 - Sidharth B. Bhorge

, Ramchandra R. Manthalkar
:
Recognition of vision-based activities of daily living using linear predictive coding of histogram of directional derivative. 199-214 - Bilgin Avenoglu

, P. Erhan Eren:
A context-aware and workflow-based framework for pervasive environments. 215-237 - Giancarlo Nota

, Rossella Aiello:
The interaction type approach to relationships management. 239-253 - Ugo Erra

, Nicola Capece
:
Engineering an advanced geo-location augmented reality framework for smart mobile devices. 255-265 - Prabukumar Manoharan

, Loganathan Agilandeeswari
, Ganesan Kaliyaperumal:
An intelligent lung cancer diagnosis system using cuckoo search optimization and support vector machine classifier. 267-293 - Lingling Zeng, Wei Ren

, Yuling Chen, Min Lei:
LMDGW: a novel matrix based dynamic graph watermark. 295-304 - Xiang Li:

Intelligent transportation systems in big data. 305-306 - Yunxiao Ye, Jinsuo Zhang

, Zanghong Huang, Jian Chai:
A new information fusion method of forecasting. 307-314 - Yi Su

, Wei Sun:
Dynamic differential models for studying traffic flow and density. 315-320 - Ruonan Wang, Jian Zhou

, Xiajie Yi
, Athanasios A. Pantelous
:
Solving the green-fuzzy vehicle routing problem using a revised hybrid intelligent algorithm. 321-332 - Xiaofeng Xu

, Yuping Sun, Jue Wang:
Multi-task transportation scheduling model with backhauls based on hub and spoke in collaborative logistics network. 333-343 - Liyao Wu, Weimin Ma, Yan Yang

, Ke Wang
:
A competitive analysis approach for route choice with uncertain travel times and blocked nodes. 345-355 - Baojie Chen, Yajuan Liu

, Tianyong Zhou:
An entropy based solid transportation problem in uncertain environment. 357-363 - Zhihong Li, Wangtu Ato Xu

:
Path decision modelling for passengers in the urban rail transit hub under the guidance of traffic signs. 365-372 - Bo Wang

, Jianling Huang, Jie Xu:
Capacity optimization and allocation of an urban rail transit network based on multi-source data. 373-383 - Hao Zhang, Qian Zhang

, Wenhao Chen:
Bi-level programming model of truck congestion pricing at container terminals. 385-394 - Jing Wang, Haotian Liu:

Snow removal resource location and allocation optimization for urban road network recovery: a resilience perspective. 395-408 - Yi-Rui Deng

, Yao Zheng, Jianping Li:
Route optimization model in collaborative logistics network for mixed transportation problem considered cost discount based on GATS. 409-416
Volume 10, Number 2, February 2019
- Guijun Wang, Guoying Zhang:

Matching localization algorithm of nonlinear T-S fuzzy system constructed by the piecewise linear function. 417-427 - Jindan Zhang, Baocang Wang, Fatos Xhafa, Xu An Wang

, Cong Li:
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. 429-438 - Minghu Wu, Xiang Li, Cong Liu, Min Liu, Nan Zhao, Juan Wang, Xiangkui Wan, Zheheng Rao, Li Zhu:

Robust global motion estimation for video security based on improved k-means clustering. 439-448 - Prajna Parimita Dash

, Dipti Patra:
Efficient visual tracking using multi-feature regularized robust sparse coding and quantum particle filter based localization. 449-462 - Alket Cecaj

, Marco Mamei:
Investigating economic activity concentration patterns of co-agglomerations through association rule mining. 463-476 - Hanen Idoudi

, Ons Mabrouk, Pascale Minet, Leïla Azouz Saïdane:
Cluster-based scheduling for cognitive radio sensor networks. 477-489 - Wajdi Farhat

, Souhir Sghaier, Hassene Faiedh, Chokri Souani
:
Design of efficient embedded system for road sign recognition. 491-507 - Yuechuan Wei

, Peng Xu, Yisheng Rong:
Related-key impossible differential cryptanalysis on lightweight cipher TWINE. 509-517 - Miralda Cuka, Donald Elmazi

, Kevin Bylykbashi
, Evjola Spaho
, Makoto Ikeda, Leonard Barolli:
Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks. 519-529 - Mirfa Manzoor, Walayat Hussain

, Osama Sohaib
, Farookh Khadeer Hussain, Salem Alkhalaf
:
Methodological investigation for enhancing the usability of university websites. 531-549 - Rabindra Kumar Barik, Harishchandra Dubey

, Kunal Mankodiya
, Sapana Sasane, Chinmaya Misra
:
GeoFog4Health: a fog-based SDI framework for geospatial health big data analysis. 551-567 - Mohamed El Fissaoui

, Abderrahim Beni Hssane, Mostafa Saadi
:
Energy efficient and fault tolerant distributed algorithm for data aggregation in wireless sensor networks. 569-578 - Kai Zhu

, Jiayu Shen, Xuelian Yao:
A three-echelon supply chain with asymmetric information under uncertainty. 579-591 - Rakesh Ranjan Swain

, Pabitra Mohan Khilar, Tirtharaj Dash
:
Neural network based automated detection of link failures in wireless sensor networks and extension to a study on the detection of disjoint nodes. 593-610 - Dongqing Xu

, Jianhua Chen, Qin Liu
:
Provably secure anonymous three-factor authentication scheme for multi-server environments. 611-627 - Kuei Min Wang, Lin Hui:

Smart environment effectiveness analysis of a pursuit and evasion scenario. 629-639 - Devender Kumar

, Satish Chand, Bijendra Kumar
:
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. 641-660 - Goutham Reddy Alavalapati

, Ashok Kumar Das
, Vanga Odelu, Awais Ahmad, Ji Sun Shin:
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment. 661-680 - Prateek Gupta

, Ajay K. Sharma:
Designing of energy efficient stable clustering protocols based on BFOA for WSNs. 681-700 - Salvatore Rampone

, Alessio Valente
:
Assessment of desertification vulnerability using soft computing methods. 701-707 - Abdelaziz Ouadah

, Allel Hadjali, Fahima Nader, Karim Benouaret:
SEFAP: an efficient approach for ranking skyline web services. 709-725 - Antonio Maña, Hristo Koshutanski

:
Special issue on "Recent advances in ambient intelligence towards a smart and human-centered internet of things". 727-729 - Biying Fu

, Florian Kirchbuchner
, Julian von Wilmsdorff, Tobias Grosse-Puppendahl, Andreas Braun, Arjan Kuijper:
Performing indoor localization with electric potential sensing. 731-746 - Matthias Ruben Mettel, Michael Alekseew, Carsten Stocklöw, Andreas Braun

:
Designing and evaluating safety services using depth cameras. 747-759 - Christina Jaschinski

, Somaya Ben Allouch
:
Listening to the ones who care: exploring the perceptions of informal caregivers towards ambient assisted living applications. 761-778 - Shin'ichi Konomi

, Tomoyo Sasao, Simo Hosio
, Kaoru Sezaki:
Using ambient WiFi signals to find occupied and vacant houses in local communities. 779-789 - Norbert A. Streitz

:
Beyond 'smart-only' cities: redefining the 'smart-everything' paradigm. 791-812 - Julian von Wilmsdorff, Florian Kirchbuchner

, Biying Fu, Andreas Braun, Arjan Kuijper:
An experimental overview on electric field sensing. 813-824
Volume 10, Number 3, March 2019
- Stefan Wolfgang Pickl, Bo Tao, T. Warren Liao

, Fei Tao
:
Editorial for the special issue on "Intelligent Computing and System towards Smart Manufacturing". 825-827 - Zhigang Wen, Dan Liu, Xiaoqing Liu

, Ling Zhong, You Lv, Yinglin Jia:
Deep learning based smart radar vision system for object recognition. 829-839 - Bin Qian, Qian-Qian Wang, Rong Hu, Zhi-Jie Zhou, Chuanqiang Yu, Zhiguo Zhou:

An effective soft computing technology based on belief-rule-base and particle swarm optimization for tipping paper permeability measurement. 841-850 - Jinjiang Wang

, Kebo Wang, Yangshen Wang, Zuguang Huang, Ruijuan Xue:
Deep Boltzmann machine based condition prediction for smart manufacturing. 851-861 - Guiwu Wei

, Zuopeng Zhang
:
Some single-valued neutrosophic Bonferroni power aggregation operators in multiple attribute decision making. 863-882 - Chen Yang, Shulin Lan

, George Q. Huang
:
Revenue sharing model in New Hong Kong's warehousing business paradigm. 883-892 - Wei Jiang, Gongping Wu, Lianqing Yu, Hong Jun Li, Wei Chen:

Manipulator multi-objective motion optimization control for high voltage power cable mobile operation robot. 893-905 - Liang Guo, Chao Zhang:

Dual-process modeling and control method for new product collaborative design based on petri net. 907-921 - Jinsong Yu

, Weiqi Tang, Diyin Tang, Jiuqing Wan, Jingjing Liu:
An approach to predicpt discharge voltage of lithium-ion batteries under dynamic loading conditions. 923-936 - Jian Jin, Ping Ji

, Sixing Yan:
Comparison of series products from customer online concerns for competitive intelligence. 937-952 - Feng Xiang, Yuanyuan Huang, Zhang Zhi, Guozhang Jiang, Ying Zuo

:
Research on ECBOM modeling and energy consumption evaluation based on BOM multi-view transformation. 953-967 - Zijian Wu

, Kaili Yang, Jiangxin Yang, Yanlong Cao, Yi Gan:
Energy-efficiency-oriented scheduling in smart manufacturing. 969-978 - Beibei Fan, Wenwei Yang, Zaifang Zhang:

Solving the two-stage hybrid flow shop scheduling problem based on mutant firefly algorithm. 979-990 - Zongfeng Zou, Ying Qian

:
Wireless sensor network routing method based on improved ant colony algorithm. 991-998 - Cui-Lin Zhang

, Junqiang Wang
, Cheng-Wu Zhang:
Two-agent scheduling on a single parallel-batching machine to minimize the weighted sum of the agents' makespans. 999-1007 - Kai Zhang, Ting Qu, Dajian Zhou, Matthias Thürer

, Yang Liu
, Duxian Nie, Congdong Li, George Q. Huang
:
IoT-enabled dynamic lean control mechanism for typical production systems. 1009-1023 - Xiaorong Gong, Chao Yin, Xiaobin Li

:
A grey correlation based supply-demand matching of machine tools with multiple quality factors in cloud manufacturing environment. 1025-1038 - Xiaobin Li

, Peijie Zhuang, Chao Yin:
A metadata based manufacturing resource ontology modeling in cloud manufacturing systems. 1039-1047 - Xiaoxia Li, Fazhi He, Weidong Li:

A cloud-terminal-based cyber-physical system architecture for energy efficient machining process optimization. 1049-1064 - Lei Wang, Chen Guo

, Yibing Li, Baigang Du, Shunsheng Guo:
An outsourcing service selection method using ANN and SFLA algorithms for cement equipment manufacturing enterprises in cloud manufacturing. 1065-1079 - Yan Yang, Tianliang Hu

, Yingxin Ye, Wenbin Gao, Chengrui Zhang
:
A knowledge generation mechanism of machining process planning using cloud technology. 1081-1092 - Shan Ren, Xibin Zhao, Binbin Huang, Zhe Wang, Xiaoyu Song:

A framework for shopfloor material delivery based on real-time manufacturing big data. 1093-1108 - Chenglei Zhang

, Buyun Sheng, Xiyan Yin, Feiyu Zhao
, Yao Shu:
Research and development of off-line services for the 3D automatic printing machine based on cloud manufacturing. 1109-1128 - Weichao Luo, Tianliang Hu

, Chengrui Zhang
, Yongli Wei:
Digital twin for CNC machine tool: modeling and using strategy. 1129-1140 - Yu Zheng

, Sen Yang, Huanchong Cheng:
An application framework of digital twin and its case study. 1141-1153 - Jiewu Leng

, Hao Zhang, Douxi Yan, Qiang Liu
, Xin Chen
, Ding Zhang:
Digital twin-driven manufacturing cyber-physical system for parallel controlling of smart workshop. 1155-1166 - Buyun Sheng, Feiyu Zhao

, Chenglei Zhang
, Xiyan Yin, Yao Shu:
Parameterized representation and solution method of the lightweight 3D model virtual assembly constraint. 1167-1187 - Jiapeng Guo, Ning Zhao

, Lin Sun, Zhang Saipeng:
Modular based flexible digital twin for factory design. 1189-1200 - Lilan Liu

, Xiang Wan, Zenggui Gao
, Xiaolong Li, Bowen Feng:
Research on modelling and optimization of hot rolling scheduling. 1201-1216 - Zhinan Zhang

, Xin Wang, Xiaohan Wang, Fan Cui, Hui Cheng:
A simulation-based approach for plant layout design and production planning. 1217-1230 - Huanchong Cheng

, Dianliang Wu, Xiumin Fan:
Modeling and simulation of sheet-metal part deformation in virtual assembly. 1231-1240 - Xiaojun Liu

, Liang Tang, Yang Yi, Zhonghua Ni:
Intelligent design based on holographic model using parametric design method. 1241-1255 - Buyun Sheng, Xiyan Yin

, Chenglei Zhang
, Feiyu Zhao
, Zhenqiang Fang, Zheng Xiao:
A rapid virtual assembly approach for 3D models of production line equipment based on the smart recognition of assembly features. 1257-1270
Volume 10, Number 4, April 2019
- Kok-Lim Alvin Yau, David Chieng

, Junaid Qadir
, Qiang Ni:
Towards enhancement of communication systems, networks and applications for smart environment. 1271-1273 - Mahmoud Mezghani:

An efficient multi-hops clustering and data routing for WSNs based on Khalimsky shortest paths. 1275-1288 - Deepak Kumar Sharma

, Sanjay Kumar Dhurandher, Divyansh Agarwal, Kunal Arora:
kROp: k-Means clustering based routing protocol for opportunistic networks. 1289-1306 - Deepak Kumar Sharma

, Deepika Kukreja, Samarth Chugh, Shubham Kumaram:
Supernode routing: a grid-based message passing scheme for sparse opportunistic networks. 1307-1324 - Uthman Baroudi

, Manaf Bin-Yahya
, Meshaan Alshammari, Umair Yaqoub:
Ticket-based QoS routing optimization using genetic algorithm for WSN applications in smart grid. 1325-1338 - Nassir Harrag

, Allaoua Refoufi, Abdelghani Harrag
:
New NSGA-II-based OLSR self-organized routing protocol for mobile ad hoc networks. 1339-1359 - Manjeet Singh

, Surender Kumar Soni:
Fuzzy based novel clustering technique by exploiting spatial correlation in wireless sensor network. 1361-1378 - Celimuge Wu

, Tsutomu Yoshinaga, Dabhur Bayar, Yusheng Ji:
Learning for adaptive anycast in vehicular delay tolerant networks. 1379-1388 - Ahmed Musa

, Virigilio Gonzalez, Dante Barragan:
A new strategy to optimize the sensors placement in wireless sensor networks. 1389-1399 - Zahid Afzal, Peer Azmat Shah

, Khalid M. Awan
, Zahoor-Ur Rehman
:
Optimum bandwidth allocation in wireless networks using differential evolution. 1401-1412 - Eunsam Kim, Jinsung Kim, Choonhwa Lee:

Efficient neighbor selection through connection switching for P2P live streaming. 1413-1423 - Vicky Kumar

, Ashok Kumar:
Improved network lifetime and avoidance of uneven energy consumption using load factor. 1425-1432 - Vicky Kumar

, Ashok Kumar:
Improving reporting delay and lifetime of a WSN using controlled mobile sinks. 1433-1441 - S. Hamed Javadi

, Abdolreza Mohammadi:
Fire detection by fusing correlated measurements. 1443-1451 - Robert Steele, Luis Gabriel Jaimes:

Crowdsensing sub-populations in a region. 1453-1462 - Raihan Ur Rasool

, Maleeha Najam, Hafiz Farooq Ahmad, Hua Wang
, Zahid Anwar:
A novel JSON based regular expression language for pattern matching in the internet of things. 1463-1481 - Xipu Zhang, Choonhwa Lee, Sumi Helal

:
iPOJO flow: a declarative service workflow architecture for ubiquitous cloud applications. 1483-1494 - Mario Arzamendia, I. Espartza, Daniel Gutiérrez-Reina, Sergio Toral, Derlis Gregor

:
Comparison of Eulerian and Hamiltonian circuits for evolutionary-based path planning of an autonomous surface vehicle for monitoring Ypacarai Lake. 1495-1507 - Abdul Majeed, Raihan Ur Rasool

, Farooq Ahmad, Masoom Alam, Nadeem Javaid
:
Near-miss situation based visual analysis of SIEM rules for real time network security monitoring. 1509-1526 - Amina Makhlouf

, Isma Boudouane, Nadia Saadia, Amar Ramdane-Cherif:
Ambient assistance service for fall and heart problem detection. 1527-1546 - Harikrishna Pillutla

, Amuthan Arjunan
:
Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing. 1547-1559 - Jingang Liu

, Lishan Ke:
New efficient identity based encryption without pairings. 1561-1570 - Antar Shaddad Abdul-Qawy

, Srinivasulu Tadisetty
:
SEES: a scalable and energy-efficient scheme for green IoT-based heterogeneous wireless nodes. 1571-1596 - Daghan L. Acay

, Liz Sonenberg, Gil Tidhar
:
Formalizing tool use in intelligent environments. 1597-1610 - Carlos Julio Moya Jutinico, Carlos Enrique Montenegro-Marín

, Daniel Burgos, Rubén González Crespo
:
Natural language interface model for the evaluation of ergonomic routines in occupational health (ILENA). 1611-1619 - Kgotlaetsile Mathews Modieginyane, Reza Malekian

, Babedi B. Letswamotse:
Flexible network management and application service adaptability in software defined wireless sensor networks. 1621-1630 - Mimoza Durresi, Anisa Subashi, Arjan Durresi

, Leonard Barolli, Kazunori Uchida:
Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring. 1631-1640 - Mohamed Abdel-Basset

, Asmaa Atef, Abdel-Nasser Hussein:
Some appraisal criteria for multi-mode scheduling problem. 1641-1654 - Asif Khan

, Nadeem Javaid
, Adnan Ahmad
, Mariam Akbar
, Zahoor Ali Khan, Manzoor Ilahi:
A priority-induced demand side management system to mitigate rebound peaks using multiple knapsack. 1655-1678
Volume 10, Number 5, May 2019
- Zheng Xu, Yunhuai Liu, Neil Y. Yen:

Special issue on the intelligent sensing on mobile computing and wireless communications. 1679-1680 - Rong Wang, Jingye Cai, Xiang Yu, Jianchun Jiang:

Temporal-correlation-based compressive channel estimation for universal filtered multicarrier system over fast-fading channels. 1681-1692 - Chun Shi, Shu-Qian He, Zheng-Jie Deng, Xian-Feng Zhang, Chong Shen:

Adaptive access mechanism with delta estimation algorithm of traffic loads for supporting weighted priority in IEEE 802.11e WLANs. 1693-1702 - Yong Zhang, Liyi Zhang, Jianfeng Han, Zhe Ban, Yi Yang:

An indoor gas leakage source localization algorithm using distributed maximum likelihood estimation in sensor networks. 1703-1712 - Wei Li, Changwu Xu, Yue He, Liguo Chen, Lining Sun, Guoqiang Fang:

Actual deviation correction based on weight improvement for 10-unit Dolph-Chebyshev array antennas. 1713-1726 - Zheng Guan, Zhijun Yang, Min He, Wenhua Qian:

Energy-efficient analysis of an IEEE 802.11 PCF MAC protocol based on WLAN. 1727-1737 - Mingchuan Zhang, Ping Xie, Junlong Zhu, Qingtao Wu, Ruijuan Zheng, Hongke Zhang:

NCPP-based caching and NUR-based resource allocation for information-centric networking. 1739-1745 - Xiao Chen, Jingfeng Guo, Xiao Pan, Chunying Zhang:

Link prediction in signed networks based on connection degree. 1747-1757 - Hua Yang, Zhimei Li, Zhiyong Liu:

A method of routing optimization using CHNN in MANET. 1759-1768 - Wenyuan Wang, Yue Xiu, Zhongpei Zhang:

FDD massive MIMO downlink channel estimation with complex hybrid generalized approximate message passing algorithm. 1769-1786 - Yongming Huang, Kexin Tian, Ao Wu, Guobao Zhang

:
Feature fusion methods research based on deep belief networks for speech emotion recognition under noise condition. 1787-1798 - Aiping Wu

, Qingqing Fu, Saleh Muhamed Mwachaka, Xiaoying He:
Numerical modeling of electromagnetic wave logging while drilling in deviated well. 1799-1809 - Li Li

, Vijayan Sugumaran
:
A cognitive-based AES model towards learning written English. 1811-1820 - Chengli Zhang, Wenping Ma, Feifei Zhao:

Trapdoor function based on the Ring-LWE and applications in communications. 1821-1827 - Wei Zhang, Zeyu He, Li Min Ma, Rami Salem, Lu Han:

AP load balance strategy in face of high user density. 1829-1839 - S. M. Sombolestan, Armin Rasooli

, Saeed Khodaygan:
Optimal path-planning for mobile robots to find a hidden target in an unknown environment based on machine learning. 1841-1850 - Afshin Naseri, Nima Jafari Navimipour

:
A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm. 1851-1864 - Amal Louati, Le Hoang Son, Habib Chabchoub

:
Smart routing for municipal solid waste collection: a heuristic approach. 1865-1884 - A. Arul Mary, K. Chitra:

OGSO-DR: oppositional group search optimizer based efficient disaster recovery in a cloud environment. 1885-1895 - Taher Delkesh, Mohammad Ali Jabraeil Jamali

:
EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs. 1897-1914 - Heteng Zhang

, Feilong Tang, Leonard Barolli:
Efficient flow detection and scheduling for SDN-based big data centers. 1915-1926 - Rafal Kozik

, Michal Choras, Damian Puchalski, Rafal Renk:
Q-Rapids framework for advanced data analysis to improve rapid software development. 1927-1936 - Fan Liu

, Xingshe Zhou, Zhu Wang
, Hongbo Ni, Tianben Wang:
OSA-weigher: an automated computational framework for identifying obstructive sleep apnea based on event phase segmentation. 1937-1954 - Salvatore Venticinque, Alba Amato

:
A methodology for deployment of IoT application in fog. 1955-1976 - Nikolay Andreevich Moldovyan, Alexander Andreevich Moldovyan, Duc Tam Nguyen, Nam Hai Nguyen, Cong Manh Tran

, Minh Nguyen Hieu:
Pseudo-probabilistic block ciphers and their randomization. 1977-1984 - Kriti Bhushan, Brij B. Gupta

:
Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. 1985-1997 - S. Rasouli D. Maryam

, Shahram Payandeh:
A novel depth image analysis for sleep posture estimation. 1999-2014 - Ankit Kumar Jain

, Brij B. Gupta
:
A machine learning based approach for phishing detection using hyperlinks information. 2015-2028 - Renchu Guan

, Xu Wang, Maurizio Marchese, Mary Qu Yang, Yanchun Liang, Chen Yang:
Feature space learning model. 2029-2040 - Ferdinando Di Martino, Salvatore Sessa:

Fragile watermarking tamper detection via bilinear fuzzy relation equations. 2041-2061 - Shib Sankar Sana

, Holman Ospina-Mateus
, Fabian Gazabón Arrieta, Jaime Acevedo Chedid
:
Application of genetic algorithm to job scheduling under ergonomic constraints in manufacturing industry. 2063-2090
Volume 10, Number 6, June 2019
- Oresti Banos

, Ramón Hervás
:
Ubiquitous computing for health applications. 2091-2093 - Iván González

, Jesús Fontecha, José Bravo:
Relationship between stride interval variability and aging: use of linear and non-linear estimators for gait variability assessment in assisted living environments. 2095-2109 - Carlos Bailon

, Miguel Damas
, Héctor Pomares
, Oresti Banos
:
SPIRA: an automatic system to support lower limb injury assessment. 2111-2123 - Alberto G. Salguero

, Javier Medina, Pablo Delatorre
, Macarena Espinilla
:
Methodology for improving classification accuracy using ontologies: application in the recognition of activities of daily living. 2125-2142 - Jan Wohlfahrt-Laymann, Hermie Hermens, Claudia Villalonga

, Miriam M. R. Vollenbroek-Hutten
, Oresti Banos
:
MobileCogniTracker - A mobile experience sampling tool for tracking cognitive behaviour. 2143-2160 - Tania Mondéjar

, Ramón Hervás
, Esperanza Johnson
, Carlos Gutiérrez, José Miguel Latorre
:
Analyzing EEG waves to support the design of serious games for cognitive training. 2161-2174 - Anas Samara

, Leo Galway, Raymond R. Bond
, Hui Wang
:
Affective state detection via facial expression analysis within a human-computer interaction context. 2175-2184 - Víctor López-Jaquero

, Francisco Montero Simarro
, Miguel A. Teruel
:
Influence awareness: considering motivation in computer-assisted rehabilitation. 2185-2197 - Netzahualcóyotl Hernández

, Bert Arnrich
, Jesús Favela, Cem Ersoy
, Batur Burcu Demiray, Jesús Fontecha:
A multi-site study on walkability, data sharing and privacy perception using mobile sensing data gathered from the mk-sense platform. 2199-2211 - Francisco J. Gutierrez

, Diego Muñoz
, Sergio F. Ochoa, José M. Tapia:
Assembling mass-market technology for the sake of wellbeing: a case study on the adoption of ambient intelligent systems by older adults living at home. 2213-2233 - Aman Bansal, Apoorv Gupta, Deepak Kr. Sharma

, Varshika Gambhir:
IICAR-Inheritance Inspired Context Aware Routing Protocol for opportunistic networks. 2235-2253 - Yong-Hwan Lee, Sung-Il Bang:

Improved image retrieval and classification with combined invariant features and color descriptor. 2255-2264 - Hasan Jalili

, Mohammad Kazem Sheikh-El-Eslami, Mohsen Parsa Moghaddam, Pierluigi Siano
:
Modeling of demand response programs based on market elasticity concept. 2265-2276 - Shelza Suri

, Ritu Vijay:
A synchronous intertwining logistic map-DNA approach for color image encryption. 2277-2290 - Takanori Hara

, Masahiro Sasabe
, Shoji Kasahara
:
Geographical risk analysis based path selection for automatic, speedy, and reliable evacuation guiding using evacuees' mobile devices. 2291-2300 - Mohit Dua

, Rajesh Kumar Aggarwal, Mantosh Biswas
:
GFCC based discriminatively trained noise robust continuous ASR system for Hindi language. 2301-2314 - Majid Mobini

, Mohammad Reza Zahabi
:
Design and analysis of a DCSK-based cognitive radio system using hybrid underlay/overlay transmission. 2315-2325 - K. Sumangali, Ch. Aswani Kumar

:
Concept Lattice Simplification in Formal Concept Analysis Using Attribute Clustering. 2327-2343 - You-Shyang Chen, Heng-Hsing Chu, Arun Kumar Sangaiah

:
Identifying ambient service location problems and its application using a humanized computing model. 2345-2359 - K. S. Rajesh, S. S. Dash:

Load frequency control of autonomous power system using adaptive fuzzy based PID controller optimized on improved sine cosine algorithm. 2361-2373 - Mrim Alnfiai

, Srinivas Sampalli:
BraillePassword: accessible web authentication technique on touchscreen devices. 2375-2391 - Vahid Amin Ghafari

, Honggang Hu
:
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a. 2393-2400 - Alok Kumar

, Alwyn Roshan Pais
:
A new combinatorial design based key pre-distribution scheme for wireless sensor networks. 2401-2416 - Chunqin Zhang, Chao Wang

, Zhiming Zhang, Dazeng Tian:
A novel technique for multiple attribute group decision making in interval-valued hesitant fuzzy environments with incomplete weight information. 2417-2433 - Carlos Guerrero

, Isaac Lera, Carlos Juiz:
A lightweight decentralized service placement policy for performance optimization in fog computing. 2435-2452 - Hao Wang, Kaiju Li:

SRS-LM: differentially private publication for infinite streaming data. 2453-2466 - Cristian Ramírez-Atencia

, David Camacho
:
Constrained multi-objective optimization for multi-UAV planning. 2467-2484 - Osama Sohaib

, Hiralkumari Solanki, Navkiran Dhaliwa, Walayat Hussain
, Muhammad Asif
:
Integrating design thinking into extreme programming. 2485-2492
Volume 10, Number 7, July 2019
- Haroon Malik, Ansar-Ul-Haque Yasar

, Elhadi M. Shakshuki:
Towards augmenting ambient systems networks and technologies. 2493-2494 - El-Sayed M. El-Alfy

, Amer G. Binsaadoon:
Automated gait-based gender identification using fuzzy local binary patterns with tuned parameters. 2495-2504 - Markel Iglesias-Urkia

, Adrián Orive
, Aitor Urbieta
, Diego Casado-Mansilla
:
Analysis of CoAP implementations for industrial Internet of Things: a survey. 2505-2518 - Simin Cai

, Barbara Gallina, Dag Nyström, Cristina Seceleanu
, Alf Larsson
:
Tool-supported design of data aggregation processes in cloud monitoring systems. 2519-2535 - Jakub Mísek, Filip Zavoral

:
Semantic analysis of ambiguous types in dynamic languages. 2537-2544 - Michele Ruta, Floriano Scioscia

, Agnese Pinto, Filippo Gramegna
, Saverio Ieva, Giuseppe Loseto
, Eugenio Di Sciascio:
CoAP-based collaborative sensor networks in the Semantic Web of Things. 2545-2562 - Sultan Anwar, Tarek R. Sheltami

, Elhadi M. Shakshuki, Menshawi K. Menshawi:
A framework for single and multiple anomalies localization in pipelines. 2563-2575 - Faouzi Kamoun, Fatma Outay

:
IP/MPLS networks with hardened pipes: service concepts, traffic engineering and design considerations. 2577-2584 - Ítalo Santiago Vega, João José Neto

, Francisco Supino Marcondes
:
DInAton with OC2-RD2 - A didactic and interactive language for the construction of adaptive automata in active learning environments. 2585-2592 - Hassan Y. A. Abutair

, Abdelfettah Belghith
, Saad Al-Ahmadi
:
CBR-PDS: a case-based reasoning phishing detection system. 2593-2606 - Aida Akbarzadeh, Majid Bayat

, Behnam Zahednejad
, Ali Payandeh, Mohammad Reza Aref:
A lightweight hierarchical authentication scheme for internet of things. 2607-2619 - Darshak Sundar, Siddharth Sendil, Vasanth Subramanian, Vidhya Balasubramanian

:
WALE: a weighted adaptive location estimation algorithm. 2621-2632 - Yang Su

, Junwei Shen, Min-Qing Zhang:
A high security and efficiency protection of confidentiality and integrity for off-chip memory. 2633-2643 - Valère Plantevin

, Abdenour Bouzouane, Bruno Bouchard
, Sébastien Gaboury
:
Towards a more reliable and scalable architecture for smart home environments. 2645-2656 - Xuerui Cao, Linmin Hu

, Zhenzhen Li:
Reliability analysis of discrete time series-parallel systems with uncertain parameters. 2657-2668 - You-Shyang Chen, Huan-Ming Chuang, Arun Kumar Sangaiah

, Chien-Ku Lin, Wen-Bin Huang:
A study for project risk management using an advanced MCDM-based DEMATEL-ANP approach. 2669-2681 - Ismael Posada Trobo, Vicente García-Díaz

, Jordán Pascual Espada, Rubén González Crespo
, Pablo Moreno-Ger
:
Rapid modeling of human-defined AI behavior patterns in games. 2683-2692 - Praveen Kumar Premkamal

, Syam Kumar Pasupuleti
, P. J. A. Alphonse:
A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. 2693-2707 - Hamed Hosseinnia

, Daryoush Nazarpour, Vahid Talavat:
Multi-objective optimization framework for optimal planning of the microgrid (MG) under employing demand response program (DRP). 2709-2730 - Abdelhak Boulaalam

:
Internet of things: new classification model of intelligence. 2731-2744 - Ferdinando Di Martino

, Salvatore Sessa:
Multi-level fuzzy transforms image compression. 2745-2756 - Elias Ruiz, Venet Osmani, Luis Enrique Sucar, Oscar Mayora

:
Detecting dressing failures using temporal-relational visual grammars. 2757-2770 - Tin-Chih Toly Chen

, Yi-Chi Wang
:
An incremental learning and integer-nonlinear programming approach to mining users' unknown preferences for ubiquitous hotel recommendation. 2771-2780 - Hossein Pazhoumand-Dar:

FAME-ADL: a data-driven fuzzy approach for monitoring the ADLs of elderly people using Kinect depth maps. 2781-2803 - Maha Alafeef

, Mohammad Fraiwan
:
On the diagnosis of idiopathic Parkinson's disease using continuous wavelet transform complex plot. 2805-2815 - Munish Manas, Aniruddha Sinha, Shubham Sharma, Md. Rahat Mahboob:

A novel approach for IoT based wearable health monitoring and messaging system. 2817-2828 - Alberto Postiglione

, Giustino De Bueriis:
On Web's contact structure. 2829-2841 - Yajing Tan, Xiaoyu Ji, Sen Yan:

New models of supply chain network design by different decision criteria under hybrid uncertainties. 2843-2853 - Hany Kasban

, Sherief Hashima
:
Adaptive Radiographic Image Compression Technique using Hierarchical Vector Quantization and Huffman Encoding. 2855-2867 - Shokoofeh Mikaeeli Mamaghani, Mohammad Ali Jabraeil Jamali

:
A load-balanced congestion-aware routing algorithm based on time interval in wireless network-on-chip. 2869-2882 - Luigi Catuogno

, Clemente Galdi, Daniel Riccio
:
Off-line enterprise rights management leveraging biometric key binding and secure hardware. 2883-2894 - Ahthasham Sajid

, Khalid Hussain
, Syed Bilal Hussain Shah, Tahir Iqbal, Imran Baig
:
History and buffer rule based (forward chaining/data driven) intelligent system for storage level big data congestion handling in smart opportunistic network. 2895-2905
Volume 10, Number 8, August 2019
- Brij B. Gupta

, Dharma P. Agrawal, Shingo Yamaguchi:
Deep learning models for human centered computing in fog and mobile edge networks. 2907-2911 - Yilei Wang, Shuaifeng Zhang, Yi Tang, Qingtang Su, Beijing Chen:

Rational adversary with flexible utility in secure two-party computation. 2913-2927 - Ning Cao, Guofu Li

, Pengjia Zhu, Qian Sun, Yingying Wang, Jing Li, Maoling Yan, Yongbin Zhao:
Handling the adversarial attacks - A machine learning's perspective. 2929-2943 - Xiao Yu, Yu-an Tan, Zhizhuo Sun, Jingyu Liu, Chen Liang, Quanxin Zhang

:
A fault-tolerant and energy-efficient continuous data protection system. 2945-2954 - Jingling Zhou, Feng Wang, Jianrong Xu, Yun Yan, Huiqing Zhu:

A novel character segmentation method for serial number on banknotes with complex background. 2955-2969 - Jianjun Shi, Weixing Ji, Zhiwei Gao, Yujin Gao, Yizhuo Wang, Xinyi Liao, Feng Shi:

Ontology-based code snippets management in a cloud environment. 2971-2985 - Jun Xu, Hui Liu, Weiran Shao, Kai Deng

:
Quantitative 3-D shape features based tumor identification in the fog computing architecture. 2987-2997 - Li Yang, Jiaxue Wang, Chongzhi Gao, Tong Li:

A crisis information propagation model based on a competitive relation. 2999-3009 - Pingting Hao, Liang Hu, Jingyan Jiang, Xilong Che, Tong Li, Kuo Zhao:

Framework for replica placement over cooperative edge networks. 3011-3021 - Liaoliang Jiang, Yuting Cheng, Li Yang, Jing Li, Hongyang Yan, Xiaoqin Wang:

A trust-based collaborative filtering algorithm for E-commerce recommendation system. 3023-3034 - Wei Wang

, Mengxue Zhao, Jigang Wang:
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. 3035-3043 - Zhiwei Zhang, Xiaofeng Chen, Jin Li, Xiaoling Tao, Jianfeng Ma:

HVDB: a hierarchical verifiable database scheme with scalable updates. 3045-3057 - Hong Zhao, Yi Wang

, Jiahui Song, Ge Gao:
The pollutant concentration prediction model of NNP-BPNN based on the INI algorithm, AW method and neighbor-PCA. 3059-3065 - Chijun Zhang, Zhanwei Du, Qing Cai, Limin Yu, Zhaohui Li, Yuan Bai:

Assignment optimization of pandemic influenza antiviral drugs in Urban pharmacies. 3067-3074 - Jianping Zhang, Jinling Zhao, Hong Zhou

:
Immediate schedule adjustment models and their semi-definite relaxation in project scheduling with temporary resource shortage. 3075-3081 - Lorenzo Fernández Maimó

, Alberto Huertas Celdrán
, Manuel Gil Pérez
, Félix J. García Clemente
, Gregorio Martínez Pérez:
Dynamic management of a deep learning-based anomaly detection system for 5G networks. 3083-3097 - Juan Chen, Zhihong Tian

, Xiang Cui, Lihua Yin
, Xianzhi Wang
:
Trust architecture and reputation evaluation for internet of things. 3099-3107 - Qiuli Chen, Xianglin Wei, Fei Dai, Ming He:

A reliable routing protocol against hotspots and burst for UASN-based fog systems. 3109-3121 - Yuan Bai, Zhanwei Du, Chijun Zhang, Xuehua Zhao

:
Sentinel surveillance of traffic conditions with multilayer network. 3123-3131 - Chien-Ming Chen

, King-Hang Wang
, Kuo-Hui Yeh, Bin Xiang, Tsu-Yang Wu
:
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. 3133-3142 - Ran Xu, Yanrong Wang, Wenbin Wang, Yongxin Ding:

Evolutionary game analysis for third-party governance of environmental pollution. 3143-3154 - Rehab Ali Ibrahim, Ahmed A. Ewees

, Diego Oliva
, Mohamed Abd El Aziz
, Songfeng Lu:
Improved salp swarm algorithm based on particle swarm optimization for feature selection. 3155-3169 - Jiayu Shen, Yuanguo Zhu:

A parallel-machine scheduling problem with periodic maintenance under uncertainty. 3171-3179 - Bin Guo, Yao Zhang, Xinli Cao:

Well-being of residents in old residential quarters based on multi-sorted Logit model. 3181-3191 - Xiaolin Liang

, Jianqin Deng:
Detection of stationary human target via contactless radar networks. 3193-3200 - Biqin Hu, Bin Yang:

A particle swarm optimization algorithm for multi-row facility layout problem in semiconductor fabrication. 3201-3210 - Mohammad Reza Mortazavi, Kamran Raissi, Seyed Hamed Hashemi Mehne

:
A probabilistic approach to classification of human performance during interaction with a standard flight tasks simulator. 3211-3230 - Li Cai, Pengqiu Hu, Zefu Tan:

Research on the effect of large-scale electric vehicle based on smart wearable equipment access to grid. 3231-3237 - Ting Guo, Changwei Tan, Qiang Li, Guoxian Cui, Hongguang Li:

Estimating leaf chlorophyll content in tobacco based on various canopy hyperspectral parameters. 3239-3247 - Jinrong He

, Yingzhou Bi, Bin Liu, Zhigao Zeng:
Graph-dual Laplacian principal component analysis. 3249-3262 - Mat Hussin Ab Talib

, Intan Zaurah Mat Darus, Pakharuddin Mohd. Samin:
Fuzzy logic with a novel advanced firefly algorithm and sensitivity analysis for semi-active suspension system using magneto-rheological damper. 3263-3278 - Fang Rong, Yajuan Zhang, Zhuang Wang, Yu Li:

Influencing factors of consumer willingness to pay for cold chain logistics: an empirical analysis in China. 3279-3285 - (Withdrawn) Developing brain abnormality recognize system using multi-objective pattern producing neural network. 3287-3295

- Ke Xu, Jianxin Liu

, Jun Miao, Fengrui Liu:
An improved SIFT algorithm based on adaptive fractional differential. 3297-3305 - Meihong Wu, Zhiling Hong:

Subjective quality assessment of stereo image compression based on stereoscopic fusion in binocular vision. 3307-3314 - Yumeng Zhang

, Li Luo, Jianchao Yang, Dunhu Liu, Ruixiao Kong, Ya-bing Feng:
A hybrid ARIMA-SVR approach for forecasting emergency patient flow. 3315-3323
Volume 10, Number 9, September 2019
- Alfredo Cuzzocrea:

Big data intelligence. 3325-3327 - Nyan Lin

, Brian M. Kurkoski, Yasuo Tan, Yuto Lim
:
Data sharing among wireless client devices in cooperative manner with minimum transmissions. 3329-3338 - Hiba Jadallah, Zaher Al Aghbari

:
Spatial cloaking for location-based queries in the cloud. 3339-3347 - Abdelkader Laouid, Abdelnasser Dahmani, Hani Ragab Hassen, Ahcène Bounceur, Reinhardt Euler, Farid Lalem, Abdelkamel Tari:

A self-managing volatile key scheme for wireless sensor networks. 3349-3364 - Enrique Festijo, Younchan Jung

, Marnel Peradilla
:
Software-defined security controller-based group management and end-to-end security management. 3365-3382 - Alfredo Cuzzocrea, Mohamed Medhat Gaber, Edoardo Fadda

, Giorgio Mario Grasso
:
An innovative framework for supporting big atmospheric data analytics via clustering-based spatio-temporal analysis. 3383-3398 - Chaobo He

, Shuangyin Liu, Lei Zhang, Jianhua Zheng:
A fuzzy clustering based method for attributed graph partitioning. 3399-3407 - Mondher Sendi, Mohamed Nazih Omri

, Mourad Abed
:
Discovery and tracking of temporal topics of interest based on belief-function and aging theories. 3409-3425 - Yunjuan Wang, Kezhen Zhang, Yong Deng

:
Base belief function: an efficient method of conflict management. 3427-3437 - Cheng-Li Liu

, Kuo-Wei Su, Shiaw-Tsyr Uang:
The effects of layout types and spatial information display types on presence and spatial identification for the elderly in the 3D virtual art gallery. 3439-3451 - Jianjun Wu

, Xia Sun, Ziqiang Wang:
Shearlet feature manifold for face recognition. 3453-3460 - Chang-Hee Kang, Hyun-Jee Yang, Hyoung-Kyu Song:

Cooperative communication system with multiple relays for performance improvement in wireless communication system. 3461-3467 - Hamid Reza Boveiri

, Raouf Khayami
, Mohamed Elhoseny
, Gunasekaran Manogaran:
An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications. 3469-3479 - P. Raghunathan, E. Logashanmugam

:
Position servo controller design and implementation using low cost eddy current sensor for single axis active magnetic bearing. 3481-3492 - A. Aranganathan

, Chethamangalathu Damodharaprabhu Suriyakala:
An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks. 3493-3503 - Kevin Bouchard

, Jeremy Lapalu, Bruno Bouchard
, Abdenour Bouzouane:
Clustering of human activities from emerging movements - A flocking based unsupervised mining approach. 3505-3517 - Ankita Bisht, Mohit Dua

, Shelza Dua:
A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. 3519-3531 - Chiranjibe Jana

, Madhumangal Pal, Jian-qiang Wang:
Bipolar fuzzy Dombi aggregation operators and its application in multiple-attribute decision-making process. 3533-3549 - Siyuan Du, Hua Zhang, Hualin Xu, Jirui Yang, Oscar Tu:

To make the travel healthier: a new tourism personalized route recommendation algorithm. 3551-3562 - Rahul Malik, Renu Dhir, Sudesh Kumar Mittal

:
Remote sensing and landsat image enhancement using multiobjective PSO based local detail enhancement. 3563-3571 - Chiranjib Sur

:
DeepSeq: learning browsing log data based personalized security vulnerabilities and counter intelligent measures. 3573-3602 - Zhiping Zhou, Ping Wang, Zhicong Li:

A quadratic residue-based RFID authentication protocol with enhanced security for TMIS. 3603-3615 - Sandeep Rathor

, Rakesh Singh Jadon
:
Acoustic domain classification and recognition through ensemble based multilevel classification. 3617-3627 - Bogdan Okresa Duric

, Jaime Andres Rincon, Carlos Carrascosa
, Markus Schatten
, Vicente Julián
:
MAMbO5: a new ontology approach for modelling and managing intelligent virtual environments based on multi-agent systems. 3629-3641 - Sharif Naser Makhadmeh, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar

, Syibrah Naim
:
Multi-objective power scheduling problem in smart homes using grey wolf optimiser. 3643-3667 - Elham Besharati, Marjan Naderan

, Ehsan Namjoo
:
LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. 3669-3692 - Jia Zhai

, Hui Yu:
Robust coordination of supply chain with loss aversion. 3693-3707 - Abdeslam Mehenni, Zaia Alimazighi, Tarek Bouktir

, Mohamed Ahmed-Nacer:
An optimal big data processing for smart grid based on hybrid MDM/R architecture to strengthening RE integration and EE in datacenter. 3709-3722 - Syed W. Haider

, Guijun Zhuang, Shahid Ali
:
Identifying and bridging the attitude-behavior gap in sustainable transportation adoption. 3723-3738
Volume 10, Number 10, October 2019
- Gwanggil Jeon, Awais Ahmad, Salvatore Cuomo

, Wei Wu:
Special issue on bio-medical signal processing for smarter mobile healthcare using big data analytics. 3739-3745 - Malathi Devarajan

, V. Subramaniyaswamy
, Vijayakumar Varadarajan, Logesh Ravi
:
Fog-assisted personalized healthcare-support system for remote patients with diabetes. 3747-3760 - Min He, Zheng Guan

, Zhangyong Wu, Liang Lü, Zhaoxu Zhou, Marco Anisetti, Ernesto Damiani:
A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema. 3761-3774 - Fasee Ullah

, Zaka Ullah, Sheeraz Ahmad, Ihtesham Ul Islam, Saeed Ur Rehman, Javed Iqbal
:
Traffic priority based delay-aware and energy efficient path allocation routing protocol for wireless body area network. 3775-3794 - Fakhri Alam Khan

, Sadaf Shaheen, Muhammad Asif, Atta Ur Rahman, Muhammad Imran, Saeed Ur Rehman:
Towards reliable and trustful personal health record systems: a case of cloud-dew architecture based provenance framework. 3795-3808 - Ihtesham Ul Islam, Khalil Ullah

, Muhammad Afaq
, Muhammad Hasanain Chaudary, Muhammad Kashif Hanif
:
Spatio-temporal sEMG image enhancement and motor unit action potential (MUAP) detection: algorithms and their analysis. 3809-3819 - Abdullah Khan

, Rahmat Shah, Muhammad Imran, Asfandyar Khan, Javed Iqbal Bangash
, Shah Khalid:
An alternative approach to neural network training based on hybrid bio meta-heuristic algorithm. 3821-3830 - Jungryul Seo, Teemu Henrikki Laine, Kyung-Ah Sohn

:
Machine learning approaches for boredom classification using EEG. 3831-3846 - Pyoung Won Kim

:
Ambient intelligence in a smart classroom for assessing students' engagement levels. 3847-3852 - Bing Han

, Yiyuan Han, Xinbo Gao
, Lixia Zhang:
Boundary constraint factor embedded localizing active contour model for medical image segmentation. 3853-3862 - Shumayla Yaqoob, Ata Ullah, Muhammad Akbar, Muhammad Imran, Muhammad Shoaib:

Congestion avoidance through fog computing in internet of vehicles. 3863-3877 - Nana Tian

, Liyun Zhang, Zunbo Li, Jianjun Liu, Guohua Lei, Yanyan Ma:
Big data of clinical manifestations combined with neuroelectrophysiologic features in the early diagnosis of motor neuron disease. 3879-3888 - Amare Anagaw, Yang-Lang Chang

:
A new complement naïve Bayesian approach for biomedical data classification. 3889-3897 - Chi Yang, Xiaomin Yang, Feng Yang:

A system based on Hadoop for radar data analysis. 3899-3913 - Aditya Duneja, Thendral Puyalnithi, Madhu Viswanatham Vankadara

, Naveen K. Chilamkurti
:
Analysis of inter-concept dependencies in disease diagnostic cognitive maps using recurrent neural network and genetic algorithms in time series clinical data for targeted treatment. 3915-3923 - Marium Azhar, Hassan Dawood

, Hussain Dawood
, Gulraiz Iqbal Choudhary, Ali Kashif Bashir
, Sajjad Hussain Chauhdary
:
Detail-preserving switching algorithm for the removal of random-valued impulse noise. 3925-3945 - Farhan Hussain

, Mian Ilyas Ahmad, Sajid Anwar, Aimal Khan, Pyoung Won Kim
:
Efficient motion estimation using two-bit transform and modified multilevel successive elimination. 3947-3953 - Fabio Mendoza Palechor

, Maria Luiza Recena Menezes, Anita Pinheiro Sant'Anna, Miguel Ortiz Barrios
, Anas Samara
, Leo Galway:
Affective recognition from EEG signals: an integrated data-mining approach. 3955-3974 - Junchao Wang, Kaining Han, Anastasios Alexandridis

, Zeljko Zilic, Jinzhao Lin, Yu Pang, Xiaomin Yang:
A baseband processing ASIC for body area networks. 3975-3982 - Adhiyaman Manickam, Devarasan Ezhilmaran

, Gunasekaran Manogaran, Naveen K. Chilamkurti, Vijayarajan Vijayan, Shubham Saraff, R. Dinesh Jackson Samuel
, Raja Krishnamoorthy:
Bio-medical and latent fingerprint enhancement and matching using advanced scalable soft computing models. 3983-3995 - Alberto Poncela

, Francisco J. Coslado, Bernardo García, Manuel Fernández
, José Jaime Ariza, Gloria Peinado, Carlos Demetrio, Francisco Sandoval:
Smart care home system: a platform for eAssistance. 3997-4021 - Longfei Zheng, Yu Wang, D. Jude Hemanth, Arun Kumar Sangaiah

, Fuqian Shi
:
Data augmentation on mice liver cirrhosis microscopic images employing convolutional neural networks and support vector machine. 4023-4032 - Chettupally Anil Carie, Mingchu Li, Bhaskar Marapelli

, Prakasha Reddy
, Hayat Dino Bedru, Moneeb Gohar:
Cognitive radio assisted WSN with interference aware AODV routing protocol. 4033-4042 - Fabio Campioni, Salimur Choudhury

, Fadi Al-Turjman:
Scheduling RFID networks in the IoT and smart health era. 4043-4057 - Rencan Nie, Min He

, Jinde Cao, Dongming Zhou, Zifei Liang:
Pulse coupled neural network based MRI image enhancement using classical visual receptive field for smarter mobile healthcare. 4059-4070 - Shahzad Yousaf

, Imran Shafi, Sadia Din
, Anand Paul
, Jamil Ahmad:
A big data analytical framework for analyzing solar energy receptors using evolutionary computing approach. 4071-4083 - Uvais Qidwai

, Junaid Chaudhry, Sohail Jabbar
, Hafiz Maher Ali Zeeshan, Naeem Janjua
, Shehzad Khalid:
Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems. 4085-4097 - (Withdrawn) Melanoma segmentation using bio-medical image analysis for smarter mobile healthcare. 4099-4120

- Mário W. L. Moreira

, Joel J. P. C. Rodrigues
, Francisco H. C. Carvalho, Naveen K. Chilamkurti, Jalal Al-Muhtadi
, Victor M. Denisov:
Biomedical data analytics in mobile-health environments for high-risk pregnancy outcome prediction. 4121-4134 - (Withdrawn) Artificial neural network based classification of lung nodules in CT images using intensity, shape and texture features. 4135-4149

- Ashraf Darwish

, Aboul Ella Hassanien
, Mohamed Elhoseny
, Arun Kumar Sangaiah
, Khan Muhammad
:
The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. 4151-4166 - Muhammad Babar

, Fahim Arif:
Real-time data processing scheme using big data analytics in internet of things based smart transportation environment. 4167-4177 - Mahreen Kiran

, Imran Ahmed
, Nazish Khan, Goutham Reddy Alavalapati
:
Chest X-ray segmentation using Sauvola thresholding and Gaussian derivatives responses. 4179-4195 - Saba Sultan, Ali Javed, Aun Irtaza, Hassan Dawood, Hussain Dawood

, Ali Kashif Bashir
:
A hybrid egocentric video summarization method to improve the healthcare for Alzheimer patients. 4197-4206
Volume 10, Number 11, November 2019
- Muhammad Khalil Afzal, Wazir Zada Khan

, Tariq Umer
, Byung-Seo Kim, Shui Yu
:
Editorial of cross-layer design issues, challenges and opportunities for future intelligent heterogeneous networks. 4207-4208 - Sankalita Biswas, Sanjay Dhar Roy

, Aniruddha Chandra
:
Cross-layer energy model for beacon-enabled 802.15.4 networks. 4209-4224 - Nadeem Javaid

, Zaheer Ahmad, Arshad Sher
, Zahid Wadud, Zahoor Ali Khan, Syed Hassan Ahmed
:
Fair energy management with void hole avoidance in intelligent heterogeneous underwater WSNs. 4225-4241 - Moufida Rahmani

, Mahfoud Benchaïba:
PCSM: an efficient multihop proximity aware clustering scheme for mobile peer-to-peer systems. 4243-4260 - WanJun Yin, Dinesh Mavaluru

, Munir Ahmed, Mazhar Abbas, Aida Darvishan:
Correction to: Application of new multi-objective optimization algorithm for EV scheduling in smart grid through the uncertainties. 4261 - Patrizia Ribino

, Carmelo Lodato
:
A distributed fuzzy system for dangerous events real-time alerting. 4263-4282 - Raghavendra Kumar Chunduri

, Aswani Kumar Cherukuri
:
Scalable formal concept analysis algorithms for large datasets using Spark. 4283-4303 - Ahnaf Munir

, Md. Tahmid Rahman Laskar, Md. Sakhawat Hossen
, Salimur Choudhury
:
A localized fault tolerant load balancing algorithm for RFID systems. 4305-4317 - Dario Ortega Anderez

, Ahmad Lotfi
, Caroline S. Langensiepen, Kofi Appiah:
A multi-level refinement approach towards the classification of quotidian activities using accelerometer data. 4319-4330 - Giovannina Albano

, Umberto Dello Iacono
:
GeoGebra in e-learning environments: a possible integration in mathematics and beyond. 4331-4343 - Sally M. El-Ghamrawy

, Aboul Ella Hassanien:
GWOA: a hybrid genetic whale optimization algorithm for combating attacks in cognitive radio network. 4345-4360 - Rami Halloush

, Hang Liu:
Modeling and performance evaluation of jamming-tolerant wireless systems. 4361-4375 - Shashank Gupta, Brij B. Gupta

:
Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions. 4377-4405 - Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini:

Failure detectors for crash faults in cloud. 4407-4415 - Imane Lamiche, Bin Guo, Yao Jing, Zhiwen Yu

, Abdenour Hadid:
A continuous smartphone authentication method based on gait patterns and keystroke dynamics. 4417-4430 - Yongwei Tang, Jingbo Zhao, Maoli Wang, Huijuan Hao, Xiaoning He, Yuxiao Meng:

Beidou navigation method based on intelligent computing and extended Kalman filter fusion. 4431-4438 - Haijun Zhang, Guohui Zhang

, Qiong Yan:
Digital twin-driven cyber-physical production system towards smart shop-floor. 4439-4453 - Yesudhas Harold Robinson

, Eanoch Golden Julie, Krishnan Saravanan
, Raghvendra Kumar, Le Hoang Son:
FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. 4455-4472 - Salah Zemmoudj, Nabila Bermad, Mawloud Omar:

Context-aware pseudonymization and authorization model for IoT-based smart hospitals. 4473-4490 - Mohit Gupta

, Narendra S. Chaudhari:
Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check. 4491-4501 - Sachin Kumar

, Marina I. Nezhurina:
An ensemble classification approach for prediction of user's next location based on Twitter data. 4503-4513 - Lijuan Liu, Rung-Ching Chen

, Qiangfu Zhao, Shunzhi Zhu:
Applying a multistage of input feature combination to random forest for improving MRT passenger flow prediction. 4515-4532 - Guomin Li, Xinyu Li, Liang Gao

, Bing Zeng:
Tasks assigning and sequencing of multiple AGVs based on an improved harmony search algorithm. 4533-4546 - Ashish Singh, Kakali Chatterjee:

Trust based access control model for securing electronic healthcare system. 4547-4565 - Mohammed Amoon

, Nirmeen A. El-Bahnasawy, Samy Sadi
, Manar Wagdi:
On the design of reactive approach with flexible checkpoint interval to tolerate faults in cloud computing systems. 4567-4577 - Mahdi Moodi, Mahdieh Ghazvini

:
A new method for assigning appropriate labels to create a 28 Standard Android Botnet Dataset (28-SABD). 4579-4593 - Jianwei Zhao, Yuancheng Xiang, Siyu Yang, Dongshun Zhang, Peng Yu:

The control of the movement of intelligent car based on self-adaptive non-linear algorithm. 4595-4602 - Amuthan Arjunan

, Kaviarasan Ramu
:
Weighted inertia-based dynamic virtual bat algorithm to detect NLOS nodes for reliable data dissemination in VANETs. 4603-4613 - Shubhanshi Singhal, Vishal Passricha, Pooja Sharma, Rajesh Kumar Aggarwal

:
Multi-level region-of-interest CNNs for end to end speech recognition. 4615-4624
Volume 10, Number 12, December 2019
- Ansar-Ul-Haque Yasar

, Haroon Malik, Elhadi M. Shakshuki:
Special issue on ubiquitous computing and NextGen context-fusion. 4625-4627 - Khalid El Makkaoui

, Abderrahim Beni Hssane, Abdellah Ezzati
:
Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing. 4629-4640 - Charles Yaacoub

, Malak Sarkis:
Joint source and channel coding with systematic polar codes for wireless sensor communication in next generation networks. 4641-4649 - Olivier Debauche

, Saïd Mahmoudi
, Andriamasinoro Lalaina Herinaina Andriamandroso, Pierre Manneback
, Jérôme Bindelle
, Frédéric Lebeau:
Cloud services integration for farm animals' behavior studies based on smartphones as activity sensors. 4651-4662 - Mahmud Al-Osta, Bali Ahmed, Abdelouahed Gherbi

:
Event driven and semantic based approach for data processing on IoT gateway devices. 4663-4678 - Riadh Karchoud, Philippe Roose, Marc Dalmau, Arantza Illarramendi

, Sergio Ilarri:
One app to rule them all: collaborative injection of situations in an adaptable context-aware application. 4679-4692 - Tooba Batool, Yves Vanrompay, An Neven

, Davy Janssens
, Geert Wets
:
CTASS: an intelligent framework for personalized travel behaviour advice to cardiac patients. 4693-4705 - Alberto Huertas Celdrán

, Manuel Gil Pérez
, Félix J. García Clemente
, Gregorio Martínez Pérez:
Towards the autonomous provision of self-protection capabilities in 5G networks. 4707-4720 - Muhammad Adnan

, Shahbaz Altaf
, Tom Bellemans
, Ansar-Ul-Haque Yasar
, Elhadi M. Shakshuki:
Last-mile travel and bicycle sharing system in small/medium sized cities: user's preferences investigation using hybrid choice model. 4721-4731 - Ahmad M. Shaheen, Tarek R. Sheltami

, Talal M. Al-Kharoubi
, Elhadi M. Shakshuki:
Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. 4733-4750 - Mihai Nadin

, Asma Naz
:
Architecture as service: a case of design on demand (DoD). 4751-4769 - Saman Tamizi, Ali Ghaffari

:
Inference search algorithm for optimizing scheduling and minimizing mean tardiness in parallel joint robots. 4771-4783 - Toly Chen

:
Ambient intelligence and ergonomics in Asia. 4785-4787 - César A. Collazos, Francisco L. Gutiérrez

, Jesús Gallardo
, Manuel Ortega
, Habib M. Fardoun, Ana Isabel Molina Díaz
:
Descriptive theory of awareness for groupware development. 4789-4818 - Beixin Xia, Zheng Jian, Ning-rong Tao:

An effective combined multivariate control chart based on support vector data description. 4819-4835 - Zahoor Ali Khan

, Ayesha Zafar, Sakeena Javaid, Sheraz Aslam, Muhammad Hassan Rahim, Nadeem Javaid
:
Hybrid meta-heuristic optimization based home energy management system in smart grid. 4837-4853 - (Withdrawn) The visual object tracking algorithm research based on adaptive combination kernel. 4855-4867

- Hyuncheol Kim, Jae-Ho Han, Soonhung Han:

Analysis of evacuation simulation considering crowd density and the effect of a fallen person. 4869-4879 - Hela Malouche

, Youssef Ben Halima
, Henda Ben Ghézala
:
Trust level estimation for cloud service composition with inter-service constraints. 4881-4899 - Songhita Misra

, Rabul Hussain Laskar:
Development of a hierarchical dynamic keyboard character recognition system using trajectory features and scale-invariant holistic modeling of characters. 4901-4923 - Francisco de Arriba-Pérez

, Juan M. Santos-Gago
, Manuel Caeiro-Rodríguez
, Mateo Ramos Merino
:
Study of stress detection and proposal of stress-related features using commercial-off-the-shelf wrist wearables. 4925-4945 - Ashish Girdhar

, Vijay Kumar
:
A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map. 4947-4961 - Vishal Kumar Arora

, Vishal Sharma, Monika Sachdeva
:
ACO optimized self-organized tree-based energy balance algorithm for wireless sensor network - AOSTEB. 4963-4975 - Mahesh Balaji

, Ch. Aswani Kumar
, G. Subrahmanya V. R. K. Rao:
Non-linear analysis of bursty workloads using dual metrics for better cloud resource management. 4977-4992 - Yoshitaka Sakurai, Yukino Ikegami, Motoki Sakai, Hiroshi Fujikawa, Setsuo Tsuruta, Avelino J. Gonzalez, Eriko Sakurai, Ernesto Damiani, Andrea Kutics, Rainer Knauf, Fulvio Frati

:
VICA, a visual counseling agent for emotional distress. 4993-5005 - Fanyong Meng, Na Wang, Yanwei Xu:

Interval neutrosophic preference relations and their application in virtual enterprise partner selection. 5007-5036

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














