


default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 11
Volume 11, Number 1, January 2020
- David Camacho

, Gema Bello Orgaz:
Special issue on computational intelligence for social mining. 1-3 - Naeem Shahabi Sani, Mohammad Manthouri

, Faezeh Farivar
:
A multi-objective ant colony optimization algorithm for community detection in complex networks. 5-21 - Balkis Abidi

, Sadok Ben Yahia
, Charith Perera:
Hybrid microaggregation for privacy preserving data mining. 23-38 - Ana Valdivia

, Eugenio Martínez-Cámara
, Iti Chaturvedi
, María Victoria Luzón, Erik Cambria
, Yew-Soon Ong
, Francisco Herrera:
What do people think about this monument? Understanding negative reviews via deep learning, clustering and descriptive rules. 39-52 - Konstantinos F. Xylogiannopoulos

, Panagiotis Karampelas
, Reda Alhajj:
A password creation and validation system for social media platforms based on big data analytics. 53-73 - Khac-Hoai Nam Bui

, Sungrae Cho
, Jason J. Jung, Joongheon Kim
, O-Joun Lee
, Woongsoo Na:
A novel network virtualization based on data analytics in connected environment. 75-86 - Nadia Derbas, Emmanuelle Dusserre, Muntsa Padró

, Frédérique Segond:
Eventfully Safapp: hybrid approach to event detection for social media mining. 87-95 - Nikhil Kumar Singh

, Deepak Singh Tomar
, Arun Kumar Sangaiah
:
Sentiment analysis: a review and comparative analysis over social media. 97-117 - Haithem Mezni

, Sofiane Ait Arab, Djamal Benslimane, Karim Benouaret:
An evolutionary clustering approach based on temporal aspects for context-aware service recommendation. 119-138 - Nadia Chouchani

, Mourad Abed
:
Enhance sentiment analysis on social networks with social influence analytics. 139-149 - Samarjit Roy

, Dhiman Sarkar, Debashis De
:
Entropy-aware ambient IoT analytics on humanized music information fusion. 151-171 - Ping Ji, Shanxin Zhang, Zhiping Zhou:

A decomposition-based ant colony optimization algorithm for the multi-objective community detection. 173-188 - Javed Imran, Balasubramanian Raman:

Evaluating fusion of RGB-D and inertial sensors for multimodal human action recognition. 189-208 - Asmaa H. Rabie

, Shereen H. Ali
, Ahmed I. Saleh, Hesham A. Ali:
A fog based load forecasting strategy based on multi-ensemble classification for smart grids. 209-236 - Gozde Yolcu, Ismail Oztel, Serap Kazan

, Cemil Öz, Filiz Bunyak
:
Deep learning-based face analysis system for monitoring customer interest. 237-248 - Muhammad Saidu Aliero, Imran Ghani, Kashif Naseer Qureshi

, Mohd. Foad Rohani:
An algorithm for detecting SQL injection vulnerability using black-box testing. 249-266 - Tarun Kumar Sharma

, Ajith Abraham:
Artificial bee colony with enhanced food locations for solving mechanical engineering design problems. 267-290 - Sunil Kumar Singh, Prabhat Kumar:

A comprehensive survey on trajectory schemes for data collection using mobile elements in WSNs. 291-312 - Apurva S. Kittur

, Alwyn Roshan Pais
:
A trust model based batch verification of digital signatures in IoT. 313-327 - Gajanan K. Birajdar

, Mukesh D. Patil
:
Speech/music classification using visual and spectral chromagram features. 329-347 - Oussama Kerdjidj

, Naeem Ramzan
, Khalida Ghanem, Abbes Amira, Fatima Chouireb:
Fall detection and human activity classification using wearable sensors and compressed sensing. 349-361 - Soojung Lee

:
Using entropy for similarity measures in collaborative filtering. 363-374 - Harish Garg

, Rishu Arora
:
Maclaurin symmetric mean aggregation operators based on t-norm operations for the dual hesitant fuzzy soft set. 375-410 - Hyunhee Park

:
MLP modeling for search advertising price prediction. 411-417 - Amani Elaoud, Walid Barhoumi

, Ezzeddine Zagrouba
, Brahim Agrebi:
Skeleton-based comparison of throwing motion for handball players. 419-431 - Shoba Sivapatham

, Rajavel Ramadoss:
A new Genetic Algorithm based fusion scheme in monaural CASA system to improve the performance of the speech. 433-446
Volume 11, Number 2, February 2020
- Yong Jin, Yongjun Liu, Wen Si:

Editorial for the special issue on "intelligent agent distributed signal processing for IoT". 447-449 - Bing Liu:

Text sentiment analysis based on CBOW model and deep learning in big data environment. 451-458 - Xiaoye Xi, Jianfei Zhao, Tingzhang Liu

, Limin Yan:
Distributed-observer-based fault diagnosis and fault-tolerant control for time-varying discrete interconnected systems. 459-482 - Dingyou Lei, Peng Zhang, Yinggui Zhang, Yangkun Xia, Shuo Zhao:

Research on optimization of multi stage yard crane scheduling based on genetic algorithm. 483-494 - Li-na Sun:

An improved apriori algorithm based on support weight matrix for data mining in transaction database. 495-501 - Yuan Shu, Fuxi Zhu:

An edge computing offloading mechanism for mobile peer sensing and network load weak balancing in 5G network. 503-510 - Guorui Chen:

Frame rate up-conversion algorithm based on adaptive-agent motion compensation combined with semantic feature analysis. 511-518 - Li-xia Luo:

Information fusion for wireless sensor network based on mass deep auto-encoder learning and adaptive weighted D-S evidence synthesis. 519-526 - Shan Zhong

, Qiming Fu, Kaijian Xia, Shengrong Gong, Yufeng Yao:
Online model-learning algorithm from samples and trajectories. 527-537 - Zengzhen Shao

, Yancong Li
, Xiao Wang, Xuechen Zhao, Yanhui Guo:
Research on a new automatic generation algorithm of concept map based on text analysis and association rules mining. 539-551 - Shuai Yan, Rui Wang

, Jianbiao Bai, Wenda Wu, Davide Elmo:
An alternative approach to determine cycle length of roadway excavation in coal mines. 553-560 - Guofeng Ren, Xueying Zhang, Shufei Duan:

Articulatory and acoustic analyses of Mandarin sentences with different emotions for speaking training of dysphonic disorders. 561-571 - Qing Zhang, Dilong Xu:

Security authentication technology based on dynamic Bayesian network in Internet of Things. 573-580 - Chao Wang:

Web cache intelligent replacement strategy combined with GDSF and SVM network re-accessed probability prediction. 581-587 - Jun Zhang, Jihang Yin, Tianyi Xu, Ziyang Gao, Honggang Qi, Hongsheng Yin:

The optimal game model of energy consumption for nodes cooperation in WSN. 589-599 - Tianwu Zhang, Wei-ping Li, Lu Wang, Jie Yang:

Social recommendation algorithm based on stochastic gradient matrix decomposition in social network. 601-608 - Xiaobo Xue, Yonghong Tan:

Multi crowd fast power control algorithm based on neighborhood opportunistic learning. 609-615 - Guiming Shi, Jidong Suo:

Internet of things control mechanism based on controlled object information perception and multimode image signal processing. 617-622 - Xingmin Ma

, Xianwei Zhou, Fengping An:
Bi-dimensional empirical mode decomposition (BEMD) and the stopping criterion based on the number and change of extreme points. 623-633 - Meng Shang

, Hui Li
, Chulwoo Lee, Yongho Shin:
To strengthen the relationship and the long term trading orientation between the relationship quality and the B-SERVQUAL: focus on the logistics intelligent equipment manufacturing industry. 635-646 - Junqin Cao, Xueying Zhang, Chunmei Zhang, Jiapeng Feng:

Improved convolutional neural network combined with rough set theory for data aggregation algorithm. 647-654 - Feng Zhang:

Intelligent task allocation method based on improved QPSO in multi-agent system. 655-662 - Tapan Senapati

, Ronald R. Yager:
Fermatean fuzzy sets. 663-674 - Vishal Passricha, Rajesh Kumar Aggarwal

:
A comparative analysis of pooling strategies for convolutional neural network based Hindi ASR. 675-691 - Maha Alafeef

, Mohammad Fraiwan
:
Smartphone-based respiratory rate estimation using photoplethysmographic imaging and discrete wavelet transform. 693-703 - Mian Muhammad Mubasher

, S. Waqar Jaffry:
Modeling of individual differences in driver behavior. 705-718 - Avinash Chandra Pandey

, Dharmveer Singh Rajpoot
, Mukesh Saraswat:
Feature selection method based on hybrid data transformation and binary binomial cuckoo search. 719-738 - Rajesh Joshi

:
A new multi-criteria decision-making method based on intuitionistic fuzzy information and its application to fault detection in a machine. 739-753 - Alessio Bonadio, Francesco Chiti

, Romano Fantacci, Vincenzo Vespri:
An integrated framework for blockchain inspired fog communications and computing in internet of vehicles. 755-762 - Banaja Mohanty

:
Hybrid flower pollination and pattern search algorithm optimized sliding mode controller for deregulated AGC system. 763-776 - Pragya Kuchhal, Sanjay K. Dhurandher, Isaac Woungang, Vinesh Kumar

, Satbir Jain, Sahil Gupta, Leonard Barolli:
Pareto set based optimized routing in opportunistic network. 777-797 - Paul Elmore

, Derek Anderson, Frederick E. Petry
:
Evaluation of heterogeneous uncertain information fusion. 799-811 - Routhu Srinivasa Rao

, Tatti Vaishnavi
, Alwyn Roshan Pais
:
CatchPhish: detection of phishing websites by inspecting URLs. 813-825 - Shiwei Li

, Jianqiang Wang
, Yuzhao Zhang:
Simulation study on pedestrian strategy choice based on direction fuzzy visual field. 827-843 - Jie Xu

, You Wu, Limin Jia, Yong Qin:
A reckoning algorithm for the prediction of arriving passengers for subway station networks. 845-864 - Mohsen Mohammadi

, Saeed Khodaygan
:
An algorithm for numerical nonlinear optimization: Fertile Field Algorithm (FFA). 865-878 - Mahnaz Noroozi

, Ziba Eslami:
Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks. 879-890 - Jianrui Chen

, Danwei Liu, Fei Hao
, Hua Wang:
Community detection in dynamic signed network: an intimacy evolutionary clustering algorithm. 891-900 - Sarika Sharma, Smarajit Ghosh:

FIS and hybrid ABC-PSO based optimal capacitor placement and sizing for radial distribution networks. 901-916
Volume 11, Number 3, March 2020
- Ansar-Ul-Haque Yasar

, Haroon Malik, Elhadi M. Shakshuki:
Guest editorial: towards enhancing ambient systems, networks and technologies. 917-918 - Iness Ahriz

, Jean-Michel Douin, Frédéric Lemoine, Anne Wei:
Performance evaluations in optical and wireless networks for CONDOR project. 919-928 - Euripides G. M. Petrakis

, Filippos Antonopoulos, Stelios Sotiriadis, Nik Bessis
:
iPACS: a physical access control system as a service and mobile application. 929-943 - José Dias, António Grilo

:
Multi-hop LoRaWAN uplink extension: specification and prototype implementation. 945-959 - Aneta Poniszewska-Maranda

, Radoslaw Matusiak, Natalia Kryvinska
, Ansar-Ul-Haque Yasar
:
A real-time service system in the cloud. 961-977 - Julius Zemgulys, Vidas Raudonis, Rytis Maskeliunas

, Robertas Damasevicius:
Recognition of basketball referee signals from real-time videos. 979-991 - Adam Harmon, Eric J. Miller:

Microsimulating labour market job-worker matching. 993-1006 - Benjamin Eze, Craig E. Kuziemsky, Liam Peyton:

A configurable identity matching algorithm for community care management. 1007-1020 - AbdulAziz AbdulGhaffar

, Saud Mohammad Mostafa
, Ammar Alsaleh, Tarek R. Sheltami
, Elhadi M. Shakshuki:
Internet of Things based multiple disease monitoring and health improvement system. 1021-1029 - Haroon Malik, Wael Zatar

:
Agent based routing approach to support structural health monitoring-informed, intelligent transportation system. 1031-1043 - Dhanasekaran Raghavan, Muthusamy Hariharan, Xiong Li:

Special issue on "Brain computing for healthcare and wellness applications". 1045 - Yonglin Xu, Shaofei Wu, Mingqing Wang, Yuntao Zou

:
Design and implementation of distributed RSA algorithm based on Hadoop. 1047-1053 - Minghao Zhu, Liguo Shao:

An analysis on the economic cooperation and the industrial synergy of the main river region: from the perspective of the Yangtze river economic zone. 1055-1064 - Rashad Elhabob

, Yanan Zhao, Iva Sella, Hu Xiong:
An efficient certificateless public key cryptography with authorized equality test in IIoT. 1065-1083 - Seyyed-Mahdi Hosseini-Motlagh

, Mohammad Reza Ghatreh Samani
, Shamim Homaei
:
Blood supply chain management: robust optimization, disruption risk, and blood group compatibility (a real-life case). 1085-1104 - Fateme Moslehi, Abdorrahman Haeri

:
A novel hybrid wrapper-filter approach based on genetic algorithm, particle swarm optimization for feature subset selection. 1105-1127 - Said Talbi, Abdelmadjid Bouabdallah:

Interest-based trust management scheme for social internet of things. 1129-1140 - Parviz Asghari, Elnaz Soleimani, Ehsan Nazerfard

:
Online human activity recognition employing hierarchical hidden Markov models. 1141-1152 - Heng Wang, Yunhong Wang, Weixin Li, Di Huang:

Example based facial aging simulation via facial detail transfer. 1153-1162 - Naween Kumar

, Dinesh Dash
:
Flow based efficient data gathering in wireless sensor network using path-constrained mobile sink. 1163-1175 - Tao Ding, Guangrong Yan, Yi Lei, Xiangyu Xu:

A niching behaviour-based algorithm for multi-level manufacturing service composition optimal-selection. 1177-1189 - Vinícius Gomes Ferreira, Edna Dias Canedo

:
Design sprint in classroom: exploring new active learning tools for project-based learning approach. 1191-1212 - Toly Chen

, Yu-Cheng Wang
:
Interval fuzzy number-based approach for modeling an uncertain fuzzy yield learning process. 1213-1223 - Yong Liu, Xueqing Li:

The application of an amended FCA method on knowledge acquisition and representation for interpreting meteorological services. 1225-1239 - Türker Tuncer, Sengül Dogan

:
Pyramid and multi kernel based local binary pattern for texture recognition. 1241-1252 - Sanjiban Sekhar Roy

, Pijush Samui, Ishan Nagtode, Hemant Jain, Vishal Shivaramakrishnan, Behnam Mohammadi-Ivatloo
:
Forecasting heating and cooling loads of buildings: a comparative performance analysis. 1253-1264 - Muhammad Tahir Abbas, Muhammad Afaq

, Wang-Cheol Song:
SD-IoV: SDN enabled routing for internet of vehicles in road-aware approach. 1265-1280 - Jyoti Bhola

, Surender Kumar Soni, Gagandeep Kaur Cheema:
Genetic algorithm based optimized leach protocol for energy efficient wireless sensor networks. 1281-1288 - P. S. Sneha, Syam Sankar

, Ashok S. Kumar:
A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. 1289-1308 - Anvita Gupta, Dilbag Singh

, Manjit Kaur:
An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. 1309-1324 - Vikas Srivastava, Sachin Tripathi, Karan Singh

, Le Hoang Son:
Energy efficient optimized rate based congestion control routing in wireless sensor network. 1325-1338 - Javad Pashaei Barbin

, Saleh Yousefi
, Behrooz Masoumi
:
Efficient service recommendation using ensemble learning in the internet of things (IoT). 1339-1350 - Xinyang Deng, Xin Xin, Tianhan Gao:

A location privacy protection scheme based on random encryption period for VSNs. 1351-1359
Volume 11, Number 4, April 2020
- Hector John T. Manaligod, Michael Joseph S. Diño

, Supratip Ghose, Jungsoo Han:
Context computing for internet of things. 1361-1363 - Amira Hakim

, Abdelkrim Amirat, Mourad Chabane Oussalah:
Non-intrusive contextual dynamic reconfiguration of ambient intelligent IoT systems. 1365-1376 - Jinsul Kim, Yonggwan Won, Changwoo Yoon, Jin-Young Kim, Sangho Park, JaeCheol Ryou

, Linh Van Ma:
A Context-aware adaptive algorithm for ambient intelligence DASH at mobile edge computing. 1377-1385 - Kyungyong Chung, Hyun Yoo, Do-Eun Choe

:
Ambient context-based modeling for health risk assessment using deep neural network. 1387-1395 - Hong Jin, Haiyan Wang, Chi Gong

, Luxing Liu
:
A study on the influencing factors of consumer information-seeking behavior in the context of ambient intelligence. 1397-1404 - Seong-Taek Park, GuoZhong Li

, Jae-Chang Hong:
A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning. 1405-1412 - Chang Liu

, Eun-Mi Park, Fengzhen Jiang:
Examining effects of context-awareness on ambient intelligence of logistics service quality: user awareness compatibility as a moderator. 1413-1420 - Jungsun Jang

, Hyungjong Noh, Yeonsoo Lee, Soo-Min Pantel, Hae-Chang Rim:
Narrative context-based data-to-text generation for ambient intelligence. 1421-1429 - T. H. Feiroz Khan

, D. Siva Kumar:
Ambient crop field monitoring for improving context based agricultural by mobile sink in WSN. 1431-1439 - YeongWook Yang

, Danial Hooshyar
, Jaechoon Jo
, Heuiseok Lim:
A group preference-based item similarity model: comparison of clustering techniques in ambient and context-aware recommender systems. 1441-1449 - Joo-Chang Kim, Kyungyong Chung:

Neural-network based adaptive context prediction model for ambient intelligence. 1451-1458 - C. Uthaya Kumar, S. Kamalraj:

Ambient intelligence architecture of MRPM context based 12-tap further desensitized half band FIR filter for EEG signal. 1459-1466 - K. S. Kuppusamy:

PassContext and PassActions: transforming authentication into multi-dimensional contextual and interaction sequences. 1467-1494 - Rudresh Dwivedi

, Somnath Dey, Mukul Anand Sharma, Apurv Goel:
A fingerprint based crypto-biometric system for secure communication. 1495-1509 - Sourabh Bharti

, K. K. Pattanaik
, Anshul Pandey
:
Contextual outlier detection for wireless sensor networks. 1511-1530 - Vikash Kumar Singh

, Sajal Mukhopadhyay, Fatos Xhafa
, Aniruddh Sharma:
A budget feasible peer graded mechanism for iot-based crowdsourcing. 1531-1551 - Salvador Cobos-Guzman

, Elena Verdú
, Enrique Herrera-Viedma, Rubén González Crespo
:
Fuzzy logic expert system for selecting robotic hands using kinematic parameters. 1553-1564 - Mostafa Esmaeeli

, Sajjad Golshannavaz, Pierluigi Siano
:
Determination of optimal reserve contribution of thermal units to afford the wind power uncertainty. 1565-1576 - Javier Rodríguez-Vidal

, Jorge Carrillo-de-Albornoz
, Enrique Amigó, Laura Plaza
, Julio Gonzalo
, Felisa Verdejo:
Automatic generation of entity-oriented summaries for reputation management. 1577-1591 - Ali Ghaffari

:
Hybrid opportunistic and position-based routing protocol in vehicular ad hoc networks. 1593-1603 - Ashish Kumar Bhandari

:
A logarithmic law based histogram modification scheme for naturalness image contrast enhancement. 1605-1627 - Árpád Török

, Zsolt Szalay
, Gábor Uti, Bence Verebélyi:
Modelling the effects of certain cyber-attack methods on urban autonomous transport systems, case study of Budapest. 1629-1643 - Suliman A. Alsuhibany

:
Usability and shoulder surfing vulnerability of pattern passwords on mobile devices using camouflage patterns. 1645-1655 - Yavuz Inal, Rita Ismailova

:
Effect of human development level of countries on the web accessibility and quality in use of their municipality websites. 1657-1667 - C. Kalaiarasy

, N. Sreenath, A. Amuthan
:
An effective variant ring signature-based pseudonym changing mechanism for privacy preservation in mixed zones of vehicular networks. 1669-1681 - Shahrbanou Arianmehr, Mohammad Ali Jabraeil Jamali

:
HybTGR: a hybrid routing protocol based on topological and geographical information in vehicular ad hoc networks. 1683-1695 - Wenlin Han, Yang Xiao

:
Edge computing enabled non-technical loss fraud detection for big data security analytic in Smart Grid. 1697-1708 - Kerem Küçük

, Cüneyt Bayilmis
, Ahmet Furkan Sonmez, Sezgin Kaçar:
Crowd sensing aware disaster framework design with IoT technologies. 1709-1725 - Hossein Pazhoumand-Dar, Leisa J. Armstrong

, Amiya Kumar Tripathy
:
Detecting deviations from activities of daily living routines using kinect depth maps and power consumption data. 1727-1747 - Mostafa Amin-Naji

, Ali Aghagolzadeh
, Mehdi Ezoji:
CNNs hard voting for multi-focus image fusion. 1749-1769 - Geeta Sharma

, Sheetal Kalra
:
Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications. 1771-1794
Volume 11, Number 5, May 2020
- Amit Kumar Singh

, Zhihan Lv
, Huimin Lu, Xiaojun Chang
:
Guest editorial: Recent trends in multimedia data-hiding: a reliable mean for secure communications. 1795-1797 - (Withdrawn) An efficient watermarking technique for tamper detection and localization of medical images. 1799-1808

- (Withdrawn) Video transcoding scheme of multimedia data-hiding for multiform resources based on intra-cloud. 1809-1819

- (Withdrawn) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. 1821-1833

- (Withdrawn) Hybrid domain watermarking technique for copyright protection of images using speech watermarks. 1835-1857

- (Withdrawn) A study on user recognition using 2D ECG based on ensemble of deep convolutional neural networks. 1859-1867

- (Withdrawn) A robust blind watermarking framework based on Dn structure. 1869-1887

- (Withdrawn) A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. 1889-1901

- Zhenkun Bao, Yanqing Guo, Xiaolong Li, Yi Zhang, Meng Xu, Xiangyang Luo

:
Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. 1903 - (Withdrawn) Effect of identity mapping, transfer learning and domain knowledge on the robustness and generalization ability of a network: a biometric based case study. 1905-1922

- Jin Su Kim, Sung Hyuck Kim, Sung Bum Pan:

Personal recognition using convolutional neural network with ECG coupling image. 1923-1932 - (Withdrawn) Efficient user authentication protocol for distributed multimedia mobile cloud environment. 1933-1956

- (Withdrawn) Identifying tiny faces in thermal images using transfer learning. 1957-1966

- Immanuel Amirtharaj, Tai Groot, Behnam Dezfouli

:
Profiling and improving the duty-cycling performance of Linux-based IoT devices. 1967-1995 - Francesco Leotta

, Massimo Mecella
, Daniele Sora
:
Visual process maps: a visualization tool for discovering habits in smart homes. 1997-2025 - Vincenzo Carletti

, Antonio Greco, Alessia Saggese
, Mario Vento:
An intelligent flying system for automatic detection of faults in photovoltaic plants. 2027-2040 - Bingyi Kang

, Pengdan Zhang, Zhenyu Gao, Gyan Chhipi-Shrestha, Kasun Hewage, Rehan Sadiq:
Environmental assessment under uncertainty using Dempster-Shafer theory and Z-numbers. 2041-2060 - Xin Xie, Songlin Ge, Mingye Xie, Fengping Hu, Nan Jiang:

An improved industrial sub-pixel edge detection algorithm based on coarse and precise location. 2061-2070 - WanJun Yin, Dinesh Mavaluru

, Munir Ahmed, Mazhar Abbas, Aida Darvishan:
Application of new multi-objective optimization algorithm for EV scheduling in smart grid through the uncertainties. 2071-2103 - Syed Fahad Tahir, Labiba Gillani Fahad, Kashif Kifayat

:
Key feature identification for recognition of activities performed by a smart-home resident. 2105-2115 - Ashish Singh, Kakali Chatterjee:

An adaptive mutual trust based access control model for electronic healthcare system. 2117-2136 - Nabil Abdoun

, Safwan El Assad, Olivier Déforges, Rima Assaf, Mohamad Khalil
:
Design and security analysis of two robust keyed hash functions based on chaotic neural networks. 2137-2161 - Prabhat Kumar Panda

, Sudipta Chattopadhyay:
An improved authentication and security scheme for LTE/LTE-A networks. 2163-2185 - Dong Qiao

, Kai-wen Shen, Jian-qiang Wang
, Tie-Li Wang:
Multi-criteria PROMETHEE method based on possibility degree with Z-numbers under uncertain linguistic environment. 2187-2201
Volume 11, Number 6, June 2020
- Elhadi M. Shakshuki, Haroon Malik, Ansar-Ul-Haque Yasar

:
Special issue on ubiquitous computing in the IoT revolution. 2203-2204 - Khalid El Makkaoui

, Abdellah Ezzati
, Abderrahim Beni Hssane, Slimane Ouhmad:
Fast Cloud-Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing. 2205-2214 - Ling Chen

, Mingchu Li
, Ling Qin, Yingmo Jie:
A game-theoretic approach for channel security against active time-varying attacks based on artificial noise. 2215-2224 - Donghyun Kim, Taeho Lee, Sejun Kim, Byung Jun Lee, Hee Yong Youn:

Adaptive packet scheduling in IoT environment based on Q-learning. 2225-2235 - Marc Parveau

, Mehdi Adda
:
Toward a user-centric classification scheme for extended reality paradigms. 2237-2249 - Chun-Wei Tsai, Shin-Jui Liu:

An effective hyper-dense deployment algorithm via search economics. 2251-2262 - Ahmad Hassan Afridi

, Ansar Yasar
, Elhadi M. Shakshuki:
Facilitating research through serendipity of recommendations. 2263-2275 - Felix Beierle, Vinh Thuy Tran, Mathias Allemand, Patrick Neff, Winfried Schlee, Thomas Probst

, Johannes Zimmermann
, Rüdiger Pryss
:
What data are smartphone users willing to share with researchers? 2277-2289 - Jeong-A Kim, Do Gun Park, Jongpil Jeong

:
Design and performance evaluation of cost-effective function-distributed mobility management scheme for software-defined smart factory networking. 2291-2307 - Xu Liu, Hibat-Allah Ounifi, Abdelouahed Gherbi

, Wubin Li, Mohamed Cheriet:
A hybrid GPU-FPGA based design methodology for enhancing machine learning applications performance. 2309-2323 - Haroon Malik, Anam Mazhar:

EyeCom: an IoT based affordable wearable solution for paralyzed people to interact with machines. 2325-2336 - Himanshu Agrawal, Ruchi Dhall, K. S. S. Iyer, Vijayalakshmi Chetlapalli:

An improved energy efficient system for IoT enabled precision agriculture. 2337-2348 - Xiao-Xin Li, Pengyi Hao, Lin He, Yuanjing Feng:

Image gradient orientations embedded structural error coding for face recognition with occlusion. 2349-2367 - Luis Albert Zavala-Mondragón

, Bishal Lamichhane
, Lu Zhang, Gerard de Haan:
CNN-SkelPose: a CNN-based skeleton estimation algorithm for clinical applications. 2369-2380 - Hua Shi, Liang Wang, Xiao-Yang Li, Hu-Chen Liu

:
A novel method for failure mode and effects analysis using fuzzy evidential reasoning and fuzzy Petri nets. 2381-2395 - Babedi B. Letswamotse, Reza Malekian, Kgotlaetsile Mathews Modieginyane:

Adaptable QoS provisioning for efficient traffic-to-resource control in software defined wireless sensor networks. 2397-2405 - Vincenzo Carletti

, Antonio Greco, Alessia Saggese
, Mario Vento:
An effective real time gender recognition system for smart cameras. 2407-2419 - S. Mani Kuchibhatla

, D. Padmavathi, R. Srinivasa Rao:
Adaptive technique for PQ analysis in renewable sources with grid integrated SSFC. 2421-2434 - Yacine Atif

, Kanna AlFalahi, Tshering Wangchuk
, Birgitta Lindström:
A fuzzy logic approach to influence maximization in social networks. 2435-2451 - Najmeh Neysani Samany, Mahmoud Reza Delavar, Nicholas Chrisman:

Developing FIA5 to FSTPR25 for modeling spatio-temporal relevancy in context-aware wayfinding systems. 2453-2466 - Patricia Pons

, Javier Jaen:
Interactive spaces for children: gesture elicitation for controlling ground mini-robots. 2467-2488 - John Oyekan, Windo Hutabarat, Christopher Turner

, C. Arnoult, Ashutosh Tiwari
:
Using Therbligs to embed intelligence in workpieces for digital assistive assembly. 2489-2503 - Xuejian Zhao

, Xiaoxiao Xiong, Zhe Sun, Xinhui Zhang, Zhixin Sun:
An immune clone selection based power control strategy for alleviating energy hole problems in wireless sensor networks. 2505-2518 - Imadeddine Harzelli, Arezki Menacer, Tarek Ameid:

A fault monitoring approach using model-based and neural network techniques applied to input-output feedback linearization control induction motor. 2519-2538 - Suman Banerjee, Mamata Jenamani, Dilip Kumar Pratihar:

Maximizing the earned benefit in an incentivized social networking environment: a community-based approach. 2539-2555 - Maha Alafeef

, Mohammad Fraiwan
, Hussain Alkhalaf, Ziad Audat
:
Shannon entropy and fuzzy C-means weighting for AI-based diagnosis of vertebral column diseases. 2557-2566 - Mohammadreza Ghaderi

, Vahid Tabataba Vakili
, Mansour Sheikhan:
FGAF-CDG: fuzzy geographic routing protocol based on compressive data gathering in wireless sensor networks. 2567-2589 - Maria Pia D'Arienzo, Alexander N. Dudin

, Sergey A. Dudin
, Rosanna Manzo
:
Analysis of a retrial queue with group service of impatient customers. 2591-2599 - Zeynep Batmaz, Burcu Yurekli Yilmazel, Cihan Kaleli

:
Shilling attack detection in binary data: a classification approach. 2601-2611 - Hamed Ahmadzade

, Rong Gao:
Covariance of uncertain random variables and its application to portfolio optimization. 2613-2624
Volume 11, Number 7, July 2020
- Vijay Kumar

, Avneet Kaur:
Binary spotted hyena optimizer and its application to feature selection. 2625-2645 - Isma Boudouane, Amina Makhlouf, Mohamed Aures Harkat, Mohamed Zakaria Hammouche, Nadia Saadia, Amar Ramdane-Cherif:

Fall detection system with portable camera. 2647-2659 - Hanane Amirat

, Nasreddine Lagraa, Philippe Fournier-Viger
, Youcef Ouinten:
NextRoute: a lossless model for accurate mobility prediction. 2661-2681 - Qiannan Xu, Li Zhu, Tao Dai, Lei Guo, Sisi Cao:

Non-negative matrix factorization for implicit aspect identification. 2683-2699 - Pradeep Raj Krishnappa Babu

, Uttama Lahiri:
Classification approach for understanding implications of emotions using eye-gaze. 2701-2713 - Meetha V. Shenoy, Anupama Karuppiah, Narayan Suresh Manjarekar

:
A lightweight ANN based robust localization technique for rapid deployment of autonomous systems. 2715-2730 - Shahzaib Ashraf

, Saleem Abdullah, Tahir Mahmood
:
Spherical fuzzy Dombi aggregation operators and their application in group decision making problems. 2731-2749 - R. Raj Priyadarshini

, N. Sivakumar
:
Enhancing coverage and connectivity using energy prediction method in underwater acoustic WSN. 2751-2760 - P. L. Lekshmy, M. Abdul Rahiman

:
A sanitization approach for privacy preserving data mining on social distributed environment. 2761-2777 - Manisha Manjul

, Rajesh Mishra, Karan Singh
, Le Hoang Son, Mohamed Abdel-Basset
, Pham Huy Thong:
Single rate based extended logarithmic multicast congestion control. 2779-2791 - Alessandra De Paola

, Pierluca Ferraro
, Giuseppe Lo Re
, Marco Morana, Marco Ortolani:
A fog-based hybrid intelligent system for energy saving in smart buildings. 2793-2807 - Amaal R. Al Shorman

, Hossam Faris
, Ibrahim Aljarah
:
Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. 2809-2825 - Sangeetha Rajaram

, Tanmoy Maitra
, Satyanarayana Vollala
, N. Ramasubramanian, Ruhul Amin
:
eUASBP: enhanced user authentication scheme based on bilinear pairing. 2827-2840 - Sultan Alamri

, David Taniar
, Kinh Nguyen, Abdullah Alamri:
C-tree: efficient cell-based indexing of indoor mobile objects. 2841-2857 - Andres Hernandez-Matamoros

, Hamido Fujita
, Mariko Nakano-Miyatake, Héctor M. Pérez Meana, Enrique Escamilla Hernández
:
Scheme fuzzy approach to classify skin tonalities through geographic distribution. 2859-2870 - Amin Kargar-Barzi

, Ali Mahani
:
H-V scan and diagonal trajectory: accurate and low power localization algorithms in WSNs. 2871-2882 - Jorge Arthur Schneider Aranda

, Lucas Pfeiffer Salomão Dias
, Jorge Luis Victória Barbosa
, Juliano Varella de Carvalho, João Elison da Rosa Tavares
, Maurício Campelo Tavares
:
Collection and analysis of physiological data in smart environments: a systematic mapping. 2883-2897 - Xinning Li, Zhiping Zhou:

A generalization model for multi-record privacy preservation. 2899-2912 - Chao Wu, Yaqian Li

, Zhibiao Zhao
, Bin Liu:
Research on image classification method of features of combinatorial convolution. 2913-2923 - Adnan Muhammad Shah, Xiangbin Yan, Syed Asad Ali Shah

, Gulnara Mamirkulova:
Mining patient opinion to evaluate the service quality in healthcare: a deep-learning approach. 2925-2942 - Fanyong Meng

, Yanwei Xu, Na Wang:
Correlation coefficients of dual hesitant fuzzy sets and their application in engineering management. 2943-2961 - Nikolaos Dipsis

, Kostas Stathis
:
A RESTful middleware for AI controlled sensors, actuators and smart devices. 2963-2986 - Shaimaa Omran

, Enas M. F. El Houby
:
Prediction of electrical power disturbances using machine learning techniques. 2987-3003 - Mahendra Singh, Chiranjeev Kumar

, Prem Nath:
Local P2P group (LPG) communication in structured mobile P2P networks. 3005-3019 - Harish Garg

:
Neutrality operations-based Pythagorean fuzzy aggregation operators and its applications to multiple attribute group decision-making process. 3021-3041
Volume 11, Number 8, August 2020
- Pierluigi Ritrovato, Luca Greco

:
Semantic-based technologies for video analysis in activity recognition, video surveillance and smart home domains. 3043-3044 - Joseph Rafferty

, Chris D. Nugent
, Jun Liu, Liming Chen
:
An approach to provide dynamic, illustrative, video-based guidance within a goal-driven smart home. 3045-3056 - Thanos G. Stavropoulos

, Georgios Meditskos, Stelios Andreadis
, Konstantinos Avgerinakis, Katerina Adam, Ioannis Kompatsiaris:
Semantic event fusion of computer vision and ambient sensor data for activity recognition to support dementia care. 3057-3072 - Mohd Halim Mohd Noor

, Zoran Salcic, Kevin I-Kai Wang:
Ontology-based sensor fusion activity recognition. 3073-3087 - Pier Luigi Mazzeo

, Paolo Spagnolo, Marco Leo, Pierluigi Carcagnì, Marco Del Coco, Cosimo Distante
:
Dense descriptor for visual tracking and robust update model strategy. 3089-3099 - Rui Huang, Wei Feng, Mingyuan Fan, Qing Guo

, Jizhou Sun:
Learning multi-path CNN for mural deterioration detection. 3101-3108 - Moisés Lodeiro-Santiago, Iván Santos-González, Pino Caballero-Gil

, Cándido Caballero-Gil:
Secure system based on UAV and BLE for improving SAR missions. 3109-3120 - Chang-Shing Lee

, Mei-Hui Wang, Yi-Lin Tsai, Li-Wei Ko, Bo-Yu Tsai
, Pi-Hsia Hung, Lu-An Lin, Naoyuki Kubota
:
Intelligent agent for real-world applications on robotic edutainment and humanized co-learning. 3121-3139 - Jia Wu

, Zhigang Chen, Ming Zhao:
An efficient data packet iteration and transmission algorithm in opportunistic social networks. 3141-3153 - Moumita Mishra, Sayan Kumar Roy

, Anwesha Mukherjee
, Debashis De
, Soumya K. Ghosh, Rajkumar Buyya
:
An energy-aware multi-sensor geo-fog paradigm for mission critical applications. 3155-3173 - Indrani Maiti, Tarni Mandal, Surapati Pramanik

:
Neutrosophic goal programming strategy for multi-level multi-objective linear programming problem. 3175-3186 - Martin G. Salido Ortega, Luis-Felipe Rodríguez

, J. Octavio Gutiérrez-García
:
Towards emotion recognition from contextual information using machine learning. 3187-3207 - Alessandro Aloisio

, Alfredo Navarra
, Leonardo Mostarda:
Energy consumption balancing in multi-interface networks. 3209-3219 - (Withdrawn) Digital watermarking techniques for image security: a review. 3221-3229

- Saeed Yaghoubi

, Seyyed-Mahdi Hosseini-Motlagh
, Sara Cheraghi, Niloofar Gilani Larimi
:
Designing a robust demand-differentiated platelet supply chain network under disruption and uncertainty. 3231-3258 - Sibo Ding:

Uncertain random quadratic bottleneck assignment problem. 3259-3264 - Shaimaa A. Hussein, Ahmed I. Saleh, Hossam El-Din Mostafa

:
A new fog based security strategy (FBS2) for reliable image transmission. 3265-3303 - Shuliang Lv, Xiaomeng Ma, Ruixian Yang:

Organization incentive driven by modeling of the co-opetition behavior in agent-based complex network. 3305-3313 - Thamer A. Alrawashdeh

, Mohammad W. Elbes, Ammar Almomani
, Fuad Ali El-Qirem, Abdelfatah Aref Tamimi:
User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT. 3315-3327 - Krishnamurthy Kamalanand

, Sujatha C. Manoharan, Ramakrishnan Swaminathan:
A Jacobian approach for calculating the Lyapunov exponents of short time series using support vector regression. 3329-3335 - Zengpeng Li, Jiuru Wang

, Wenyin Zhang:
Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications. 3337-3347 - Gaofeng Che

, Lijun Liu, Zhen Yu:
An improved ant colony optimization algorithm based on particle swarm optimization algorithm for path planning of autonomous underwater vehicle. 3349-3354 - Abdesselam Bougdira

, Ismail Akharraz, Abdelaziz Ahaitouf
:
A traceability proposal for industry 4.0. 3355-3369 - Xu Zhao, Wenju Zhang, Weijun He, Chuanchao Huang:

Research on customer purchase behaviors in online take-out platforms based on semantic fuzziness and deep web crawler. 3371-3385 - Pankaj Deep Kaur

, Pallavi Sharma:
IC-SMART: IoTCloud enabled Seamless Monitoring for Alzheimer Diagnosis and Rehabilitation SysTem. 3387-3403 - Mohammed Alweshah

, Aram Al-Daradkeh, Mohammed Azmi Al-Betar
, Ammar Almomani
, Saleh Oqeili:
β-Hill climbing algorithm with probabilistic neural network for classification problems. 3405-3416 - Ehsan FayaziBarjini, Davood Gharavian

, Mohammadbagher Shahgholian:
Target tracking in wireless sensor networks using NGEKF algorithm. 3417-3429 - Preeti Chandrakar

, Sonam Sinha, Rifaqat Ali
:
Cloud-based authenticated protocol for healthcare monitoring system. 3431-3447 - Elif Varol Altay

, Bilal Alatas
:
Performance analysis of multi-objective artificial intelligence optimization algorithms in numerical association rule mining. 3449-3469
Volume 11, Number 9, September 2020
- Zheng Xu, Qingyuan Zhou:

Special issue on multi-modal information learning and analytics for smart city. 3471-3472 - Jing Zhan, Xudong Fan, Jin Han, Yaqi Gao, Xiaoqing Xia, Qian Zhang:

CIADL: cloud insider attack detector and locator on multi-tenant network isolation: an OpenStack case study. 3473-3495 - Yangjun Ren:

Research on the green total factor productivity and its influencing factors based on system GMM model. 3497-3508 - Xiaofeng Qi, Tiejun Cui, Liangshan Shao, Yuyan Xing:

Research on intelligent classification of multi-attribute safety information and determination of operating environment. 3509-3520 - Xiaojun Wu, Jing Wu

:
Criteria evaluation and selection in non-native language MBA students admission based on machine learning methods. 3521-3533 - Jintao Yu, Zhen Yu, Mingli Ding, Wei Ye:

Research on the tenacity survivability of wireless sensor networks. 3535-3544 - Zhiguo Peng, Meifa Huang, Yanru Zhong, Zhemin Tang:

Construction of ontology for auto-interpretable tolerance semantics in skin model. 3545-3558 - Chuan Ma, Yancheng Liu, Chuan Wang, Qinjin Zhang

:
A neutral mutated operator applied for DE algorithms. 3559-3574 - Jinghua Zhao, Na Sun, Wanyun Cheng:

Logistics forum based prediction on stock index using intelligent data analysis and processing of online web posts. 3575-3584 - Ruobing Liu, Jianhui Yang, Chuanyang Ruan

:
Expected stock return and mixed frequency variance risk premium data. 3585-3596 - Xinchun Wang, Man Cheng, Yumin Liu:

Analysis of MAC protocol of wireless sensor network based on random multi-address access and three-probability joint-control. 3597-3606 - Xuejie Wang, Yanchao Ji, Jianze Wang, Yang Gao, Lei Qi:

Research on distribution network reconfiguration based on microgrid. 3607-3615 - Wenbin Zhao, Tongrang Fan, Zhixian Yin, Zijian Fu, Feng Wu:

An evaluation method of scientific research team influence based on heterogeneity and node similarity of content and structure. 3617-3626 - Xin Li

, Guyu Hu, Zhisong Pan:
An eigendecomposition method based on deep learning and probabilistic graph model. 3627-3637 - Liang Zhao, Weiguo Liu, Yong Wu:

Bid evaluation decision for major project based on analytic hierarchy process and data envelopment analysis cross-efficiency model. 3639-3647 - Teng Long:

Research on application of athlete gesture tracking algorithms based on deep learning. 3649-3657 - Xueqian Shang, Moxian Song, Kai Huang, Wen Jiang:

An improved evidential DEMATEL identify critical success factors under uncertain environment. 3659-3669 - Tomoyuki Ishida

, Tatsuya Ohyanagi:
Implementation and evaluation of a visualization and analysis system for historical disaster records. 3671-3686 - Vibha Nehra

, Ajay K. Sharma, Rajiv K. Tripathi:
I-DEEC: improved DEEC for blanket coverage in heterogeneous wireless sensor networks. 3687-3698 - Taibing Wei, Yuxin Chen:

Green building design based on BIM and value engineering. 3699-3706 - Faiza Nawaz, Varun Jeoti:

Efficient data delivery in dense reader environment of passive sensor network. 3707-3715 - Chiranjibe Jana

, G. Muhiuddin
, Madhumangal Pal:
Multiple-attribute decision making problems based on SVTNH methods. 3717-3733 - Taief Alaa Alamiedy

, Mohammed Anbar
, Zakaria N. M. Alqattan, Qusay M. Alzubi
:
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm. 3735-3756 - Fateme Moslehi, Abdorrahman Haeri

:
An evolutionary computation-based approach for feature selection. 3757-3769 - Mohit Dua

, Aishwarya Wesanekar, Vishwas Gupta, Mayank Bhola, Shelza Dua:
Differential evolution optimization of intertwining logistic map-DNA based image encryption technique. 3771-3786 - Yuting Li, Qingfeng Cheng

, Xinghua Li:
Analysis and improvement of a key exchange and authentication protocol in client-server environment. 3787-3799 - Amine Benamrane

, Imade Benelallam, El-Houssine Bouyakhf:
Constraint programming based techniques for medical resources optimization: medical internships planning. 3801-3810 - Ding-Hong Peng, Bo Peng, Tie-Dan Wang:

Reconfiguring IVHF-TOPSIS decision making method with parameterized reference solutions and a novel distance for corporate carbon performance evaluation. 3811-3832 - Evjola Spaho

:
Energy consumption analysis of different routing protocols in a Delay Tolerant Network. 3833-3839 - Zexue Wang, Qidong Wan, Yangmei Qin, Senqing Fan

, Zeyi Xiao:
Intelligent algorithm in a smart wearable device for predicting and alerting in the danger of vehicle collision. 3841-3852 - Routhu Srinivasa Rao

, Alwyn Roshan Pais
:
Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach. 3853-3872 - Madhu Jain

, Sudeep Singh Sanga
:
State dependent queueing models under admission control F-policy: a survey. 3873-3891
Volume 11, Number 10, October 2020
- Elhadi M. Shakshuki, Ansar-Ul-Haque Yasar

, Haroon Malik:
Special issue on advances in ambient intelligence and pervasive computing. 3893-3894 - Soufiane Maguerra, Azedine Boulmakoul, Lamia Karim, Hassan Badir

, Ahmed Lbath:
Towards a reactive system for managing big trajectory data. 3895-3906 - Pedro Martins, Maryam Abbasi

, Filipe Sá
, José Cecílio
, Francisco Morgado, Filipe Caldeira
:
Improving bluetooth beacon-based indoor location and fingerprinting. 3907-3919 - Youness Madani

, Hanane Ezzikouri
, Mohammed Erritali, Badr Hssina:
Finding optimal pedagogical content in an adaptive e-learning platform using a new recommendation approach and reinforcement learning. 3921-3936 - Jamal Mestoui, Mohammed El Ghzaoui

, Mohammed Fattah
, Abdelmounim Hmamou, Jaouad Foshi
:
Performance analysis of CE-OFDM-CPM Modulation using MIMO system over wireless channels. 3937-3945 - Siddardha Kaja, Elhadi M. Shakshuki, Sony Guntuka, Ansar-Ul-Haque Yasar

, Haroon Malik:
Acknowledgment scheme using cloud for node networks with energy-aware hybrid scheduling strategy. 3947-3962 - Karanbir Singh Ghai, Salimur Choudhury, Abdulsalam Yassine

:
Efficient algorithms to minimize the end-to-end latency of edge network function virtualization. 3963-3974 - Awatif Ragmani

, Amina Elomri
, Noreddine Abghour
, Khalid Moussaid
, Mohammed Rida
:
FACO: a hybrid fuzzy ant colony optimization algorithm for virtual machine scheduling in high-performance cloud computing. 3975-3987 - Leonardo Longhi, Mirco Nanni

:
Car telematics big data analytics for insurance and innovative mobility services. 3989-3999 - Savas Sahin

, Burak Sahan, Cihan Yolcu:
Developed APIs for communication ports and payment interfaces in real-time applications. 4001-4010 - Jian Zhao, Qingyuan Zhang, Liying Tian:

Market revenue prediction and error analysis of products based on fuzzy logic and artificial intelligence algorithms. 4011-4018 - Pin Shen Teh

, Ning Zhang
, Syh-Yuan Tan, Qi Shi
, Wee-How Khoh
, Raheel Nawaz
:
Strengthen user authentication on mobile devices by using user's touch dynamics pattern. 4019-4039 - Sougata Deb, Youheng Ou Yang, Matthew Chin Heng Chua, Jing Tian

:
Gait identification using a new time-warped similarity metric based on smartphone inertial signals. 4041-4053 - Xinping Rao

, Zhi Li, Yanbo Yang:
Device-free passive wireless localization system with transfer deep learning method. 4055-4071 - Vincenzo Auletta, Diodato Ferraioli

, Vincenzo Savarese:
Manipulating an election in social networks through link addition. 4073-4088 - Dharminder Dharminder

, K. Prabhu Chandran:
LWESM: learning with error based secure communication in mobile devices using fuzzy extractor. 4089-4100 - Futian Weng

, Yinghao Chen
, Zheng Wang
, Muzhou Hou
, Jianshu Luo, Zhongchu Tian:
Gold price forecasting research based on an improved online extreme learning machine algorithm. 4101-4111 - Faruk Karaaslan

, Fatih Hunu:
Type-2 single-valued neutrosophic sets and their applications in multi-criteria group decision making based on TOPSIS method. 4113-4132 - Mohamed Fakhfakh, Lotfi Chaâri

, Nizar Fakhfakh:
Bayesian curved lane estimation for autonomous driving. 4133-4143 - Anice Jahanjoo

, Marjan Naderan
, Mohammad Javad Rashti:
Detection and multi-class classification of falling in elderly people by deep belief network algorithms. 4145-4165 - K. Sumathi, M. Balasaraswathi, C. S. Boopathi

, Mehtab Singh
, Jyoteesh Malhotra
, Dhasarathan Vigneswaran
:
Design of 3.84 Tbps hybrid WDM-PDM based inter-satellite optical wireless communication (IsOWC) system using spectral efficient orthogonal modulation scheme. 4167-4175 - Hanaa ZainEldin

, Mahmoud Badawy
, Mostafa A. El-Hosseini
, Hesham Arafat, Ajith Abraham:
An improved dynamic deployment technique based-on genetic algorithm (IDDT-GA) for maximizing coverage in wireless sensor networks. 4177-4194 - Ridvan Sahin

, Fatma Altun:
Decision making with MABAC method under probabilistic single-valued neutrosophic hesitant fuzzy environment. 4195-4212 - Shobha Bhatt, Amita Dev, Anurag Jain:

Confusion analysis in phoneme based speech recognition in Hindi. 4213-4238 - Yefei Zhang, Yichuan Wang

:
A novel energy-aware bio-inspired clustering scheme for IoT communication. 4239-4248 - Nayreet Islam, Akramul Azim

:
A situation-aware task model for adaptive real-time systems. 4249-4259 - Rathinaraja Jeyaraj, V. S. Ananthanarayana, Anand Paul

:
Fine-grained data-locality aware MapReduce job scheduler in a virtualized environment. 4261-4272 - Saeid Jedari Jazebi, Ali Ghaffari

:
RISA: routing scheme for Internet of Things using shuffled frog leaping optimization algorithm. 4273-4283 - Süleyman Eken

:
An exploratory teaching program in big data analysis for undergraduate students. 4285-4304
Volume 11, Number 11, November 2020
- Karthigai Kumar, Anand Paul

, Joy Iong-Zong Chen:
Special issue on "Wearable computing techniques for smart health". 4305 - Bo Zhang

, Qian Li, Jinyao Yan:
The unfairness of UDP traffic in routers with different buffer units. 4307-4319 - Xi Li, Tianjiang Wang:

A long time tracking with BIN-NST and DRN. 4321-4327 - Xijian Fan, Qiaolin Ye, Xubing Yang, Sruti Das Choudhury:

Robust blood pressure estimation using an RGB camera. 4329-4336 - Yunhua Yin, Huifang Li:

RGB-D object recognition based on the joint deep random kernel convolution and ELM. 4337-4346 - Masood Ahmad

, Abdul Hameed
, Fasee Ullah
, Ishtiaq Wahid, Saeed Ur Rehman, Hasan Ali Khattak
:
A bio-inspired clustering in mobile adhoc networks for internet of things based on honey bee and genetic algorithm. 4347-4361 - Syed Aziz Shah

, Dou Fan, Aifeng Ren
, Nan Zhao, Xiaodong Yang
, Shujaat Ali Khan Tanoli:
Seizure episodes detection via smart medical sensing system. 4363-4375 - S. K. Sathya Lakshmi Preetha, R. Dhanalakshmi, Rajagopal Kumar

, Sangar Si:
Efficient parent selection for RPL using ACO and coverage based dynamic trickle techniques. 4377-4391 - Rachna Kumari, Mainak Mukhopadhyay:

Design of GPS antijamming algorithm using adaptive array antenna to mitigate the noise and interference. 4393-4403 - Paulo Novais

, Gabriel Villarrubia-González
:
Challenges and trends in Ambient Intelligence. 4405-4408 - Carlos Alberto Lopez-Castaño

, Luis Fernando Castillo
:
Value creation system in the connected home ecosystem. 4409-4419 - Francisco Laport

, Emilio Serrano
, Javier Bajo
:
A multi-agent architecture for mobile sensing systems. 4439-4451 - Vinith Chauhan

, Surender Kumar Soni:
Mobile sink-based energy efficient cluster head selection strategy for wireless sensor networks. 4453-4466 - José Luís Casteleiro-Roca

, Marco Gomes
, Juan Albino Méndez Pérez, Héctor Alaiz-Moretón
, María del Carmen Meizoso-López, Benigno Antonio Rodríguez-Gómez, José Luís Calvo-Rolle
:
Electromyogram prediction during anesthesia by using a hybrid intelligent model. 4467-4476 - Jorge Meira

, Rui Andrade
, Isabel Praça
, João Carneiro
, Verónica Bolón-Canedo, Amparo Alonso-Betanzos, Goreti Marreiros
:
Performance evaluation of unsupervised techniques in cyber-attack anomaly detection. 4477-4489 - Gonçalo San-Payo, João Carlos Ferreira

, Pedro Santos, Ana Lúcia Martins
:
Machine learning for quality control system. 4491-4500 - Cesar L. Gonzalez, Jorge L. Zapotecatl, Carlos Gershenson

, Juan M. Alberola, Vicente Julián
:
A robustness approach to the distributed management of traffic intersections. 4501-4512 - Arturo S. García

, Patricia Fernández-Sotos
, Antonio Fernández-Caballero
, Elena Navarro
, José Miguel Latorre
, Roberto Rodríguez-Jiménez, Pascual González:
Acceptance and use of a multi-modal avatar-based tool for remediation of social cognition deficits. 4513-4524 - Javier Pérez-Marcos

, Lucía Martín Gómez
, Diego M. Jiménez-Bravo
, Vivian F. López Batista
, María N. Moreno García
:
Hybrid system for video game recommendation based on implicit ratings and social networks. 4525-4535 - Ignacio Aliaga, Juan F. De Paz

, Vicente Vera
, Alvaro Enrique Garcia
, Javier Bajo:
Prediction and failure analysis of composite resin restorations in the posterior sector applied in teaching dental students. 4537-4544 - Tahir Majeed

, Aline E. Stämpfli
, Andreas Liebrich, René Meier:
What is of interest for tourists in an alpine destination: personalized recommendations for daily activities based on view data. 4545-4556 - Paola Espinoza-Arias

, María Poveda-Villalón
, Óscar Corcho
:
Using LOT methodology to develop a noise pollution ontology: a Spanish use case. 4557-4568 - Manuel Rodrigues

, Vasco Monteiro, Bruno Fernandes
, Fábio Silva
, Cesar Analide
, Ricardo Santos
:
A gamification framework for getting residents closer to public institutions. 4569-4581 - Pablo Chamoso

, Álvaro Bartolomé, David García-Retuerta, Javier Prieto
, Fernando De la Prieta
:
Profile generation system using artificial intelligence for information recovery and analysis. 4583-4592 - Inès Raïssa Djouela Kamgang

, Ghayet El Mouna Zhioua, Nabil Tabbane:
A slice-based decentralized NFV framework for an end-to-end QoS-based dynamic resource allocation. 4593-4611 - Seyed Morteza Pournaghi, Majid Bayat

, Yaghoub Farjami
:
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. 4613-4641 - Sanjaya Kumar Panda

, Sourav Kumar Bhoi, Munesh Singh
:
A collaborative filtering recommendation algorithm based on normalization approach. 4643-4665 - Huaming Chen

, Jun Shen
, Lei Wang, Jiangning Song
:
A framework towards data analytics on host-pathogen protein-protein interactions. 4667-4679 - Vandana Reddy, P. Gayathri:

Energy efficient data transmission in WSN thru compressive slender penetrative etiquette. 4681-4693 - Mohammad Bagher Fakhrzad

, Mohammad Reza Firoozpour, Hasan Hosseininasab, Ahmad Sadeghieh:
Realistic ranking of exclusive supplier strategies based on the evaluation of real value of the risks in the supply chain. 4695-4712 - Felipe Taliar Giuntini

, Mirela T. Cazzolato, Maria de Jesus Dutra dos Reis, Andrew Thomas Campbell, Agma J. M. Traina, Jó Ueyama
:
A review on recognizing depression in social networks: challenges and opportunities. 4713-4729 - (Withdrawn) Real-time personalization and recommendation in Adaptive Learning Management System. 4731-4741

- A. Sampathkumar, Ravi Rastogi

, Srinivas Arukonda
, Achyut Shankar
, Sandeep Kautish
, M. Sivaram
:
An efficient hybrid methodology for detection of cancer-causing gene using CSC for micro array data. 4743-4751 - S. Nagaraj, E. Mohanraj:

A novel fuzzy association rule for efficient data mining of ubiquitous real-time data. 4753-4763 - Nitesh A. Funde

, Meera M. Dhabu, Parag S. Deshpande:
CLOES: cross-layer optimal energy scheduling mechanism in a smart distributed multi-microgrid system. 4765-4783 - Amrita Jyoti

, Manish Shrimali
, Shailesh Tiwari
, Harivans Pratap Singh:
Cloud computing using load balancing and service broker policy for IT service: a taxonomy and survey. 4785-4814 - K. Sakthidasan Sankaran

, Natarajan Vasudevan, Ashok Verghese
:
ACIAR: application-centric information-aware routing technique for IOT platform assisted by wireless sensor networks. 4815-4825 - Ali Reza Hoseini, Seyed Farid Ghannadpour

, Roya Ghamari:
Sustainable supplier selection by a new possibilistic hierarchical model in the context of Z-information. 4827-4853 - Adeel Rafiq

, Muhammad Afaq
, Wang-Cheol Song:
Intent-based networking with proactive load distribution in data center using IBN manager and Smart Path manager. 4855-4872 - Saad M. Darwish

:
A bio-inspired credit card fraud detection model based on user behavior analysis suitable for business management in electronic banking. 4873-4887 - Hamid Ahmadi Beni, Asgarali Bouyer

:
TI-SC: top-k influential nodes selection based on community detection and scoring criteria in social networks. 4889-4908 - Giuseppe Albanese, Jean-Paul Calbimonte

, Michael Schumacher
, Davide Calvaresi
:
Dynamic consent management for clinical trials via private blockchain technology. 4909-4926 - Shusheng Ding, Tianxiang Cui

, Xihan Xiong, Ruibin Bai
:
Forecasting stock market return with nonlinearity: a genetic programming approach. 4927-4939 - Tingqing Ye

, Yuhan Liu:
Multivariate uncertain regression model with imprecise observations. 4941-4950 - Fatma M. Talaat

, Mohamed S. Saraya, Ahmed I. Saleh, Hesham A. Ali, Shereen H. Ali
:
A load balancing and optimization strategy (LBOS) using reinforcement learning in fog computing environment. 4951-4966 - Seyed Hossein Mirshojaee

, Behrooz Masoumi
, Esmaeil Zeinali:
MAMHOA: a multi-agent meta-heuristic optimization algorithm with an approach for document summarization issues. 4967-4982 - Zhiping Tan

, Dongbo Zhang
:
A fuzzy adaptive gravitational search algorithm for two-dimensional multilevel thresholding image segmentation. 4983-4994 - V. Gomathy

, Neelamadhab Padhy, Debabrata Samanta
, M. Sivaram, Vishal Jain
, Iraj Sadegh Amiri
:
Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. 4995-5001 - M. Sivaram, Geetanjali Rathee, Ravi Rastogi

, Mohammad Tabrez Quasim
, Hemraj Saini
:
A resilient and secure two-stage ITA and blockchain mechanism in mobile crowd sourcing. 5003-5016 - Sujit Das

, Bikashkoli Roy, Mohuya B. Kar, Samarjit Kar, Dragan Pamucar
:
Neutrosophic fuzzy set and its application in decision making. 5017-5029 - Pei Tao, Yanliang Pei, Mehmet Celenk

, Qingqing Fu
, Aiping Wu:
Adaptive image enhancement method using contrast limitation based on multiple layers BOHE. 5031-5043 - Ali Darvish Falehi:

Optimal robust disturbance observer based sliding mode controller using multi-objective grasshopper optimization algorithm to enhance power system stability. 5045-5063 - Ghizlane El Khattabi

, Imade Benelallam, El-Houssine Bouyakhf:
Maintaining ethical resolution in distributed constraint reasoning. 5065-5081 - Satyabrata Roy

, Umashankar Rawat
, Harsh Ajay Sareen, Sanjeet Kumar Nayak
:
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata. 5083-5102 - Yan He, Liang Feng Zhang

:
Cheater-identifiable homomorphic secret sharing for outsourcing computations. 5103-5113 - Chih-Hsing Chu

, Wei-Chen Chang, Yung-I Lin:
An exploratory study on computer-aided affective product design based on crowdsourcing. 5115-5127 - Badreddine Cherkaoui

, Abderrahim Beni Hssane, Mohammed Erritali:
Variable control chart for detecting black hole attack in vehicular ad-hoc networks. 5129-5138 - Antonio Bolufé Röhler

, Dania Tamayo-Vera:
Machine learning based metaheuristic hybrids for S-box optimization. 5139-5152 - Danilo Cavaliere

, Juan Antonio Morente-Molinera
, Sabrina Senatore
, Enrique Herrera-Viedma
:
An agent-based modeling for collective scene criticality assessment in multi-UV systems. 5153-5165 - Frédéric Lemoine

, Tatiana Aubonnet, Noëmie Simoni:
IoT composition based on self-controlled services. 5167-5186 - Utkarsh Mahadeo Khaire

, R. Dhanalakshmi
:
High-dimensional microarray dataset classification using an improved adam optimizer (iAdam). 5187-5204 - Khushboo Jain

, Anoop Kumar
:
An energy-efficient prediction model for data aggregation in sensor network. 5205-5216 - A. Amuthan

, R. Sendhil
:
Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing. 5217-5231 - R. B. Benisha, S. Raja Ratna

:
Detection of data integrity attacks by constructing an effective intrusion detection system. 5233-5244 - Totan Garai

, Harish Garg
, Tapan Kumar Roy:
A ranking method based on possibility mean for multi-attribute decision making with single valued neutrosophic numbers. 5245-5258 - John Paul Martin, A. Kandasamy, K. Chandrasekaran:

Mobility aware autonomic approach for the migration of application modules in fog computing environment. 5259-5278 - Parul Chaudhary, Gagan Singh

:
Fault mitigation through multi converter UPQC with hysteresis controller in grid connected wind system. 5279-5295 - Shweta Sengar, Xiaodong Liu:

Ensemble approach for short term load forecasting in wind energy system using hybrid algorithm. 5297-5314 - Dongxiao Chen, Jinjin Li, Rongde Lin:

Formal concept analysis of multi-scale formal context. 5315-5327 - Ling-Feng Shi, Chao-Xi Qiu, Dong-Jin Xin, Gong-Xu Liu

:
Gait recognition via random forests based on wearable inertial measurement unit. 5329-5340 - (Withdrawn) A framework for automatic detection of heart diseases using dynamic deep neural activation functions. 5341-5352

- Andrés Ovidio Restrepo Rodríguez

, Maddyzeth Ariza Riaño, Paulo Alonso Gaona-García
, Carlos Enrique Montenegro-Marín
, Rubén González Crespo
, Xing Wu:
Emotional characterization of children through a learning environment using learning analytics and AR-Sandbox. 5353-5367 - Amna Shifa

, Mamoona Naveed Asghar
, Adeel Ahmed
, Martin Fleury:
Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams. 5369-5397 - ZhiWei Peng, Wenxin Yu, Junnian Wang, Jing Wang, Yu Chen, XianKe He, Dan Jiang:

Dynamic analysis of seven-dimensional fractional-order chaotic system and its application in encrypted communication. 5399-5417 - Pengyu Wang

, Weichao Liu, Nan Liu, Youpeng You:
Digital twin-driven system for roller conveyor line: design and control. 5419-5431 - Dipanwita Thakur

, Suparna Biswas:
Smartphone based human activity monitoring and recognition using ML and DL: a comprehensive survey. 5433-5444 - Pratik Ahamed, Soumyadeep Kundu, Tauseef Khan, Vikrant Bhateja, Ram Sarkar

, Ayatullah Faruk Mollah
:
Handwritten Arabic numerals recognition using convolutional neural network. 5445-5457 - Mohammad Masdari, Saeid Barshandeh

:
Discrete teaching-learning-based optimization algorithm for clustering in wireless sensor networks. 5459-5476 - Erana Veerappa Dinesh Subramaniam

, Valarmathi Krishnasamy
:
A novel energy estimation model for constraint based task offloading in mobile cloud computing. 5477-5486 - Edward R. Sykes

:
A context-aware system using mobile applications and beacons for on-premise security environments. 5487-5511 - Vivek Kanwar

, Ashok Kumar:
DV-Hop based localization methods for additionally deployed nodes in wireless sensor network using genetic algorithm. 5513-5531 - Varatharaj Kalpana, R. Maheswar

, E. Nandakumar:
Multiple parametric fault diagnosis using computational intelligence techniques in linear filter circuit. 5533-5545 - (Withdrawn) An effective disease prediction system using incremental feature selection and temporal convolutional neural network. 5547-5560

- K. Kumaresan, P. Ganeshkumar:

Software reliability prediction model with realistic assumption using time series (S)ARIMA model. 5561-5568 - Xuanyi Zhou

, Wen Qi, Salih Ertug Ovur, Longbin Zhang, Yingbai Hu, Hang Su, Giancarlo Ferrigno, Elena De Momi
:
A novel muscle-computer interface for hand gesture recognition using depth vision. 5569-5580 - Azam Davahli, Mahboubeh Shamsi, Golnoush Abaei

:
Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. 5581-5609 - Ali Louati

, Hassen Louati
, Muneer Nusir, Benny Hardjono:
Multi-agent deep neural networks coupled with LQF-MWM algorithm for traffic control and emergency vehicles guidance. 5611-5627 - Bibi Ruqia

, Zahid Mehmood
, Rehan Mehmood Yousaf, Tanzila Saba, Muhammad Sardaraz
, Amjad Rehman
:
Query-by-visual-search: multimodal framework for content-based image retrieval. 5629-5648 - Raquel Hervás, Susana Bautista

, Gonzalo Méndez
, Paloma Galvan, Pablo Gervás:
Predictive composition of pictogram messages for users with autism. 5649-5664 - Jia Zhai

, Wenbo Xia, Hui Yu:
Capital-constrained supply chain with altruism and reciprocity. 5665-5676 - Roy Thankachan

, R. Sethunadh, P. M. Ameer
:
Despeckling of polarimetric SAR images using optimized bandelet transform and GCV thresholding. 5677-5690 - (Withdrawn) Deep learning based big medical data analytic model for diabetes complication prediction. 5691-5702

- Prabira Kumar Sethy

, Nalini Kanta Barpanda
, Amiya Kumar Rath, Santi Kumari Behera:
Nitrogen Deficiency Prediction of Rice Crop Based on Convolutional Neural Network. 5703-5711 - Yang-Kun Ou

, Yu-Lin Wang, Hua-Cheng Chang, Shih-Yin Yen, Yu-Hua Zheng, Bih-O. Lee
:
Development of virtual reality rehabilitation games for children with attention-deficit hyperactivity disorder. 5713-5720 - Kamlesh Kumar Rana

, Sachin Tripathi, Ram Shringar Raw
:
Inter-vehicle distance-based location aware multi-hop routing in vehicular ad-hoc network. 5721-5733 - Arwa E. Abulwafa, Ahmed I. Saleh, Hesham A. Ali, Mohamed S. Saraya:

A fog based ball tracking (FB2T) system using intelligent ball bees. 5735-5754 - Madhu Jain

, Pankaj Kumar
, Rakesh Kumar Meena:
Fuzzy metrics and cost optimization of a fault-tolerant system with vacationing and unreliable server. 5755-5770 - Tanmoy Mahapatra

, Ganesh Ghorai
, Madhumangal Pal:
Fuzzy fractional coloring of fuzzy graph with its application. 5771-5784 - Asif Khan

, Nadeem Javaid
:
TACMA: total annual cost minimization algorithm for optimal sizing of hybrid energy systems. 5785-5805
Volume 11, Number 12, December 2020
- Elhadi M. Shakshuki, Ansar-Ul-Haque Yasar

, Haroon Malik:
Applications of machine learning in pervasive systems. 5807-5808 - Marc Schickler, Manfred Reichert, Philip Geiger, Jens Winkler, Thomas Funk, Micha Weilbach, Rüdiger Pryss

:
Flexible development of location-based mobile augmented reality applications with AREA. 5809-5824 - Amir Modarresi, John Symons:

Resilience and technological diversity in smart homes. 5825-5843 - Tsubasa Nose, Koji Kitamura, Mikiko Oono, Yoshifumi Nishida, Michiko Ohkura

:
Data-driven child behavior prediction system based on posture database for fall accident prevention in a daily living space. 5845-5855 - Siham G. Farrag

, Moulay Youssef El-Hansali, Ansar-Ul-Haque Yasar
, Elhadi M. Shakshuki, Haroon Malik:
A microsimulation-based analysis for driving behaviour modelling on a congested expressway. 5857-5874 - Anass Sebbar

, Karim Zkik
, Youssef Baddi
, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani:
MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context. 5875-5894 - Ahmed Bali, Mahmud Al-Osta, Soufiene Ben Dahsen, Abdelouahed Gherbi

:
Rule based auto-scalability of IoT services for efficient edge device resource utilization. 5895-5912 - Do Gun Park, Jin Woo Oh, Jongpil Jeong:

SFSH: a novel smart factory SDN-layer handoff scheme in 5G-enabled mobile networks. 5913-5925 - Mehdi Adda

, Linda Aliane:
HoBAC: fundamentals, principles, and policies. 5927-5941 - Ahmad Lotfi, Amir Pourabdollah, Diego Resende Faria

:
Special issue on human behaviour monitoring, interpretation and understanding. 5943-5945 - Diksha Hooda

, Rinkle Rani:
Ontology driven human activity recognition in heterogeneous sensor measurements. 5947-5960 - Athina Tsanousa

, Georgios Meditskos, Stefanos Vrochidis
, Lefteris Angelis:
A novel feature selection method based on comparison of correlations for human activity recognition problems. 5961-5975 - Christian Hirt

, Marcel Eckard, Andreas M. Kunz
:
Stress generation and non-intrusive measurement in virtual environments using eye tracking. 5977-5989 - Eleni Makri, Dimitris Spiliotopoulos

, Costas Vassilakis
, Dionisis Margaris
:
Human behaviour in multimodal interaction: main effects of civic action and interpersonal and problem-solving skills. 5991-6006 - Silvia Rossi

, Giovanni Acampora
, Mariacarla Staffa
:
Working together: a DBN approach for individual and group activity recognition. 6007-6019 - Jhonatan Kobylarz, Jordan J. Bird, Diego R. Faria, Eduardo Parente Ribeiro

, Anikó Ekárt
:
Thumbs up, thumbs down: non-verbal human-robot interaction through real-time EMG classification via inductive and supervised transductive transfer learning. 6021-6031 - Bojan Kerous

, Richard Bartecek
, Robert Roman
, Petr Sojka
, Ondrej Becev
, Fotis Liarokapis
:
Examination of electrodermal and cardio-vascular reactivity in virtual reality through a combined stress induction protocol. 6033-6042 - Xiwen Liu, Haiming Chen

, Antonio Montieri
, Antonio Pescapè:
Human behavior sensing: challenges and approaches. 6043-6058 - Zaineb Liouane, Tayeb Lemlouma, Philippe Roose, Frédéric Weis, Hassani Messaoud:

An intelligent knowledge system for designing, modeling, and recognizing the behavior of elderly people in smart space. 6059-6075 - Gadelhag Mohmed, Ahmad Lotfi, Amir Pourabdollah:

Enhanced fuzzy finite state machine for human activity modelling and recognition. 6077-6091 - Dimitrios Menychtas

, Alina Glushkova, Sotiris Manitsaris
:
Analyzing the kinematic and kinetic contributions of the human upper body's joints for ergonomics assessment. 6093-6105 - Barbara Leporini, Michele Rosellini, Nicola Forgione

:
Designing assistive technology for getting more independence for blind people when performing everyday tasks: an auditory-based tool as a case study. 6107-6123 - Raquel Justo

, Leila Ben Letaifa
, Cristina Palmero, Eduardo Gonzalez-Fraile
, Anna Torp Johansen, Alain Vázquez, Gennaro Cordasco
, Stephan Schlögl, Begoña Fernández-Ruanova
, Micaela Rodrigues da Silva, Sergio Escalera, Mikel de Velasco
, Jofre Tenorio-Laranga, Anna Esposito
, Maria Korsnes, M. Inés Torres
:
Analysis of the interaction between elderly people and a simulated virtual coach. 6125-6140 - Wei Wei, Jinsong Wu, Chunsheng Zhu:

Special issue on machine learning for robotics. 6141-6143 - Xuehong Sun:

Kinematics model identification and motion control of robot based on fast learning neural network. 6145-6154 - Yini Wang:

Robot algorithm based on neural network and intelligent predictive control. 6155-6166 - Ying Yan:

Error recognition of robot kinematics parameters based on genetic algorithms. 6167-6176 - Xuanang Chen, Peijun Gao:

Path planning and control of soccer robot based on genetic algorithm. 6177-6186 - Deping Chen:

Fuzzy obstacle avoidance optimization of soccer robot based on an improved genetic algorithm. 6187-6198 - Ruihua Gao:

Inverse kinematics solution of Robotics based on neural network algorithms. 6199-6209 - Kaijun Wu

, Wenqin Li, Dicong Wang:
Bifurcation of modified HR neural model under direct current. 6211-6221 - Robertas Damasevicius, Rytis Maskeliunas

, Gintautas Narvydas, Ruta Narbutaite, Dawid Polap
, Marcin Wozniak
:
Intelligent automation of dental material analysis using robotic arm with Jerk optimized trajectory. 6223-6234 - Tianchi Ye, Zhongbao Luo, Guiping Wang:

Adaptive sliding mode control of robot based on fuzzy neural network. 6235-6247 - Jiyue Wang, Yonggang Zhu, Renlong Qi, Xigui Zheng, Wei Li:

Adaptive PID control of multi-DOF industrial robot based on neural network. 6249-6260 - Hui Ding:

Motion path planning of soccer training auxiliary robot based on genetic algorithm in fixed-point rotation environment. 6261-6270 - Xinming Li:

Robot target localization and interactive multi-mode motion trajectory tracking based on adaptive iterative learning. 6271-6282 - Hui Tian, Huiqin Li, Zhihua Yuan, Xiaojuan Liu, Yingjie Li, Yuyan Qi, Pan Ding

:
Research and analysis of factors affecting bending performance of multi-cavity flexible actuator. 6283-6292 - K. Manikanda Kumaran

, M. Chinnadurai:
Cloud-based robotic system for crowd control in smart cities using hybrid intelligent generic algorithm. 6293-6306 - S. Periyanayagi, A. Azhagu Jaisudhan Pazhani

, V. Sumathy:
Enhanced humanoid assisted human interaction model based on linear structural modeling for knowledge representation. 6307-6318 - Jing Li, Fan Yang

:
Task assignment strategy for multi-robot based on improved Grey Wolf Optimizer. 6319-6335 - Tingyang Li, Yinghua Song, Xiaotang Xia

:
Research on remote control algorithm for parallel implicit domain robot patrol inspection on 3D unstructured grid. 6337-6347 - Yajia Li:

Multimodal visual image processing of mobile robot in unstructured environment based on semi-supervised multimodal deep network. 6349-6359 - Chunyu Tong:

Three-dimensional reconstruction of the dribble track of soccer robot based on heterogeneous binocular vision. 6361-6372 - Ramadoss Janarthanan

, Srinath Doss
, R. Balamurali:
Robotic-based nonlinear device fault detection with sensor fault and limited capacity for communication. 6373-6385 - Prases Kumar Mohanty

:
An intelligent navigational strategy for mobile robots in uncertain environments using smart cuckoo search algorithm. 6387-6402

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














