


default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 13
Volume 13, Number 1, January 2022
- Avinash Chandra Pandey

, Ankur Kulhari, Deep Shikha Shukla:
Enhancing sentiment analysis using Roulette wheel selection based cuckoo search clustering method. 1-29 - Sneha Kanchan

, Garima Singh, Narendra S. Chaudhari:
SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems. 1-20 - Pratik Bhowal, Debanshu Banerjee

, Samir Malakar
, Ram Sarkar
:
A two-tier ensemble approach for writer dependent online signature verification. 21-40 - Nehal A. Mansour, Ahmed I. Saleh, Mahmoud Mohammed Badawy

, Hesham A. Ali:
Accurate detection of Covid-19 patients based on Feature Correlated Naïve Bayes (FCNB) classification strategy. 41-73 - Jiuhong Yu, Mengfei Wang, Jinfan Liu, Karlo Abnoosian

:
Service management mechanisms in the internet of things: an organized and thorough study. 75-86 - Ng Kim-Soon, Alyaa Idrees Abdulmaged

, Salama A. Mostafa
, Mazin Abed Mohammed
, Fadia Abdalla Musbah, Rabei Raad Ali
, Oana Geman:
A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems. 87-104 - Kumud Tripathi

, K. Sreenivasa Rao:
VOP detection for read and conversation speech using CWT coefficients and phone boundaries. 105-116 - Shengnan Tian, Xiang Li

, Jiaming Liu, Hongguang Ma
, Haitao Yu:
A short-turning strategy to alleviate bus bunching. 117-128 - Abdelazim G. Hussien

:
An enhanced opposition-based Salp Swarm Algorithm for global optimization and engineering problems. 129-150 - S. Immaculate Shyla

, S. S. Sujatha:
Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm. 151-163 - Marcelo Rosano Dallagassa

, Cleiton dos Santos Garcia
, Edson Emílio Scalabrin, Sergio Ossamu Ioshii
, Deborah Ribeiro Carvalho:
Opportunities and challenges for applying process mining in healthcare: a systematic mapping study. 165-182 - Kurakula Arun Kumar

, Karthikeyan Jayaraman:
Review on implementation of IoT for environmental condition monitoring in the agriculture sector. 183-200 - Abbas Al-Refaie

, Ahmad Al-Hawadi
:
Optimal fuzzy repairs' scheduling and sequencing of failure types over multiple periods. 201-217 - Osamah Shihab Albahri

, A. A. Zaidan, B. B. Zaidan
, Ahmed Shihab Albahri
, Ali H. Mohsin, K. I. Mohammed, M. A. Alsalem:
New mHealth hospital selection framework supporting decentralised telemedicine architecture for outpatient cardiovascular disease-based integrated techniques: Haversine-GPS and AHP-VIKOR. 219-239 - S. Oudaya Coumar

:
Miniaturized DGS based multi-band pass filters for satellite applications. 241-249 - B. Chitra

, S. S. Kumar:
Recent advancement in cervical cancer diagnosis for automated screening: a detailed review. 251-269 - Ke Wang

, Xinwei Tang, Shulian Zhao, Yuchen Zhou:
Simultaneous detection and tracking using deep learning and integrated channel feature for ambint traffic light recognition. 271-281 - Maha Driss

:
WS-ADVISING: a Reusable and reconfigurable microservices-based platform for effective academic advising. 283-294 - Arunodaya Raj Mishra

, Pratibha Rani, Kiran Pandey
:
Fermatean fuzzy CRITIC-EDAS approach for the selection of sustainable third-party reverse logistics providers using improved generalized score function. 295-311 - Nimra Zaheer

, Saeed-Ul Hassan
, Mohsen Ali
, Mudassir Shabbir:
Optimal school site selection in Urban areas using deep neural networks. 313-327 - Serif Özlü, Faruk Karaaslan

:
Correlation coefficient of T-spherical type-2 hesitant fuzzy sets and their applications in clustering analysis. 329-357 - Afnan M. Alhassan

, Wan Mohd Nazmee Wan Zainon
:
Atom Taylor Bird Swarm algorithm-based deep belief network for incremental classification using medical data. 359-380 - Elena Díaz, Catalina Fernández-Plaza, Inés Abad

, Ana Alonso
, Celestino González
, Irene Díaz
:
Machine learning as a tool to study the influence of chronodisruption in preterm births. 381-392 - Deepak Kshirsagar

, Sandeep Kumar
:
A feature reduction based reflected and exploited DDoS attacks detection system. 393-405 - Hitesh Mohapatra

, Amiya Kumar Rath:
IoE based framework for smart agriculture. 407-424 - Tejinder Singh Lakhwani, Kartick Mohanta

, Arindam Dey, Sankar Prasad Mondal, Anita Pal:
Some operations on Dombi neutrosophic graph. 425-443 - Mutaz A. B. Al-Tarawneh

:
Bi-objective optimization of application placement in fog computing environments. 445-468 - Liqiang Wu, Xiaoyuan Yang, Minqing Zhang, Xu An Wang:

IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. 469-482 - Hassan N. Noura

, Ola Salman
, Raphaël Couturier, Ali Chehab
:
Novel one round message authentication scheme for constrained IoT devices. 483-499 - Tanmoy Mahapatra

, Madhumangal Pal
:
An investigation on m-polar fuzzy threshold graph and its application on resource power controlling system. 501-514 - Prince Silas Kwesi Oberko

, Victor-Hillary Kofi Setornyo Obeng, Hu Xiong:
A survey on multi-authority and decentralized attribute-based encryption. 515-533 - Muhammad Umer

, Imran Ashraf, Saleem Ullah
, Arif Mehmood
, Gyu Sang Choi:
COVINet: a convolutional neural network approach for predicting COVID-19 from chest X-ray images. 535-547 - Hamed Golabian, Jamal Arkat

, Reza Tavakkoli-Moghaddam, Hiwa Faroughi:
A multi-verse optimizer algorithm for ambulance repositioning in emergency medical service systems. 549-570 - Sujit Kumar Samanta

, Kousik Das
:
Computing stationary distributions of the D-MAP/D-MSP(a, b) /1 queueing system. 571-590 - Razieh Rastgoo

, Kourosh Kiani
, Sergio Escalera
:
Real-time isolated hand sign language recognition using deep networks and SVD. 591-611 - Wei Zhang, Zhishuo Zhang

, Hu Xiong, Zhiguang Qin:
PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. 613-627 - Shiva Asadianfam

, Mahboubeh Shamsi
, Abdolreza Rasouli Kenari:
Hadoop Deep Neural Network for offending drivers. 659-671 - Hossein Abbasimehr

, Reza Paki
:
Improving time series forecasting using LSTM and attention models. 673-691 - Usharani Chelladurai

, Seethalakshmi Pandian:
A novel blockchain based electronic health record automation system for healthcare. 693-703
Volume 13, Number 2, February 2022
- Po-Chou Shih, Yang Zhang, Xizhao Zhou:

Monitor system and Gaussian perturbation teaching-learning-based optimization algorithm for continuous optimization problems. 705-720 - Saiyed Umer

, Ranjeet Kumar Rout
, Chiara Pero
, Michele Nappi:
Facial expression recognition with trade-offs between data augmentation and deep learning features. 721-735 - (Withdrawn) Flexible big data approach for geospatial analysis. 737-756

- (Withdrawn) Spectrogram analysis of ECG signal and classification efficiency using MFCC feature extraction technique. 757-767

- Uma Narayanan

, Varghese Paul, Shelbi Joseph:
Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. 769-787 - Gouranga Mandal

, Diptendu Bhattacharya
, Parthasarathi De
:
Real-time fast low-light vision enhancement for driver during driving at night. 789-798 - Yuan Ren, Long Yu

, Shengwei Tian, Junlong Cheng
, Zhiqi Guo, Yanhan Zhang:
Serial attention network for skin lesion segmentation. 799-810 - Sudeep Varshney, Chiranjeev Kumar

, Abhishek Swaroop:
Pipeline surveillance along the international border using hybrid optimization algorithm. 811-819 - Utku Kaya

, Mehmet Fidan
:
Parametric and nonparametric correlation ranking based supervised feature selection methods for skin segmentation. 821-833 - Zikrija Avdagic, Amir Smajevic, Samir Omanovic

, Ingmar Besic
:
Path route layout design optimization using genetic algorithm: based on control mechanisms for on-line crossover intersection positions and bit targeted mutation. 835-847 - Maha Driss

, Safa Ben Atitallah
, Amal Albalawi
, Wadii Boulila
:
Req-WSComposer: a novel platform for requirements-driven composition of semantic web services. 849-865 - Nivedita Patel, Shireen Patel, Sapan H. Mankad

:
Impact of autoencoder based compact representation on emotion detection from audio. 867-885 - N. M. Saravana Kumar

, E. Suryaprabha, K. Hariprasath
:
Machine learning based hybrid model for energy efficient secured transmission in wireless sensor networks. 887-902 - Baiju P. S.

, Sudhish N. George
:
l1/2 regularized joint low rank and sparse recovery technique for illumination map estimation in low light image enhancement. 903-920 - Udayakumar Allimuthu

, K. Mahalakshmi:
Intelligent route discovery towards rushing attacks in ad hoc wireless networks. 921-960 - Varun Gupta

, Monika Mittal, Vikas Mittal, Yatender Chaturvedi:
Detection of R-peaks using fractional Fourier transform and principal component analysis. 961-972 - Khalid M. Hosny

, Sara T. Kamal, Mohamed M. Darwish:
Novel encryption for color images using fractional-order hyperchaotic system. 973-988 - Syed Muhammad Hur Rizvi, Tahir Syed, Jalaluddin Qureshi

:
Real-time forecasting of petrol retail using dilated causal CNNs. 989-1000 - P. Chinnasamy

, P. Deepalakshmi
:
HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. 1001-1019 - Abhrajyoti Das, Abhilash Kumar Das, Nirmalya Kar

:
A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture. 1021-1036 - Muhammad Ehatisham-ul-Haq

, Muhammad Awais Azam, Fiza Murtaza
, Yasar Amin, Qiang Fu
:
S-THAD: a framework for sensor-based temporal human activity detection from continuous data streams. 1037-1051 - Vylala Anoop, Plakkottu Radhakrishnan Bipin:

Exploitation whale optimization based optimal offloading approach and topology optimization in a mobile ad hoc cloud environment. 1053-1072 - Ragab A. El-Sehiemy

:
A novel single/multi-objective frameworks for techno-economic operation in power systems using tunicate swarm optimization technique. 1073-1091 - Aadel Howedi, Ahmad Lotfi

, Amir Pourabdollah:
Employing entropy measures to identify visitors in multi-occupancy environments. 1093-1106 - Jaya Mukhopadhyay, Vikash Kumar Singh

, Sajal Mukhopadhyay, Anita Pal, Abhishek Kumar:
A truthful budget feasible mechanism for IoT-based participatory sensing with incremental arrival of budget. 1107-1124 - Jaya Lakshmi Arikatla, G. N. Swamy, M. N. Giri Prasad:

Dynamic Coordinative Estimation Enhancement in Cognitive Radio Network. 1125-1136 - Javed Imran, Balasubramanian Raman:

Three-stream spatio-temporal attention network for first-person action and interaction recognition. 1137-1152 - Manoj Kumar Malik

, Ajit Singh, Abhishek Swaroop:
A planned scheduling process of cloud computing by an effective job allocation and fault-tolerant mechanism. 1153-1171 - Mahmood Eghtesadifard

, Fatemeh Jozan:
A systematic literature review on the blood supply chain: exploring the trend and future research directions. 1173-1200 - Mahdi Esmailnia Kivi, Vahid Majidnezhad

:
A novel swarm intelligence algorithm inspired by the grazing of sheep. 1201-1213 - Osama S. Faragallah

, Walid El Shafai, Ahmed I. Sallam, Ibrahim F. Elashry, El-Sayed El-Rabaie
, Ashraf Afifi
, Mohammed Abdullatif Alzain
, Jehad F. Al-Amri, Fathi E. Abd El-Samie, Hala S. El-sayed
:
Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. 1215-1239 - Chinmoy Biswas

, Ratna Dutta:
Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix. 1241-1254
Volume 13, Number 3, March 2022
- Mohammed Atiquzzaman

, Jin Li, Witold Pedrycz:
Special issue on new advanced techniques in security of artificial intelligence. 1255-1257 - Wei Gao, Li Yan, Yingfang Li, Bo Yang:

Network performance analysis from binding number prospect. 1259-1267 - Aramesh Rezaeian

, Marzieh Rezaeian, Seyede Fatemeh Khatami, Fatemeh Khorashadizadeh
, Farshid Pouralizadeh Moghaddam:
Prediction of mortality of premature neonates using neural network and logistic regression. 1269-1277 - Wei Zhang

, Xianzhong Gao, Chifu Yang, Feng Jiang, Zhiyuan Chen
:
A object detection and tracking method for security in intelligence of unmanned surface vehicles. 1279-1291 - Juan Wang, Meng Wang

, Qingling Liu, Guanxiang Yin, Yuejin Zhang
:
Deep anomaly detection in expressway based on edge computing and deep learning. 1293-1305 - Meng Wang

, Tong Chen, Fei Du, Juan Wang, Guanxiang Yin, Yuejin Zhang
:
Research on adaptive beacon message transmission power in VANETs. 1307-1319 - Shaomin Tang

, Guixiong Liu, Zhiyu Lin, Xiaobing Li:
Multi-station test scheduling optimization method for industrial robot servo system. 1321-1337 - Yanli Wang, Yilei Wang, Zhaojie Wang

, Guoyu Yang, Xiaomei Yu:
Research cooperations of blockchain: toward the view of complexity network. 1339-1352 - Fengyin Li, Zhongxing Liu, Yilei Wang, Nan Wu, Jiguo Yu, Chongzhi Gao, Huiyu Zhou:

Aitac: an identity-based traceable anonymous communication model. 1353-1362 - Xinyu Zhang, Yujun Liu, Yuling Chen

:
A new entropic criterion model in rational secure two-party computation. 1363-1372 - Xiajiong Shen, Jiyong Yang, Lei Zhang

, Geying Yang
:
An interactive role learning and discovery model for multi-department RBAC building based on attribute exploration. 1373-1382 - Ming Wan, Jinfang Li, Kai Wang

, Bailing Wang:
Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis. 1383-1396 - Xiao Sun, Jindong Xu

, Yongli Ma, Tianyu Zhao, Shifeng Ou, Lizhi Peng:
Blind image separation based on attentional generative adversarial network. 1397-1404 - Xinying Yu, Fengyin Li

, Tao Li, Nan Wu, Hua Wang, Huiyu Zhou:
Trust-based secure directed diffusion routing protocol in WSN. 1405-1417 - Hongwei Ye, Xiaozhang Liu

, Chunlai Li:
DSCAE: a denoising sparse convolutional autoencoder defense against adversarial examples. 1419-1429 - Gang Han, Tiantian Zhang

, Yinghui Zhang, Guowen Xu
, Jianfei Sun, Jin Cao:
Verifiable and privacy preserving federated learning without fully trusted centers. 1431-1441 - Xiao Sun, Jindong Xu

, Yongli Ma, Tianyu Zhao, Shifeng Ou:
Single-channel blind source separation based on attentional generative adversarial network. 1443-1450 - Shuzhuang Zhang

, Yaning Zhang
, Min Zhou, Lizhi Peng:
Community detection based on similarities of communication behavior in IP networks. 1451-1461 - Ling Zhang, Wenchao Jiang

, Wen Xiang:
Dictionary learning based on structural self-similarity and convolution neural network. 1463-1470 - B. M. Pampapathi

, M. Nageswara Guptha
, M. S. Hema
:
Data distribution and secure data transmission using IANFIS and MECC in IoT. 1471-1484 - Zhaohui Yuan, Yuqin Zhu, Mei He, Qingping Cao:

Towards accurate seismic events detection using motion sensors on smartphones. 1485-1494 - Hui Dou, Yuling Chen

, Yixian Yang, Yangyang Long:
A secure and efficient privacy-preserving data aggregation algorithm. 1495-1503 - Ying Shi, Shuyi Huang

, Jungang Lou
:
A characteristic standardization method for circuit input vectors based on Hash algorithm. 1505-1513 - Pengcheng Li, Zhangyu Li, Xiongwen Pang

, Hui Wang, Weiwei Lin, Wentai Wu
:
Multi-scale residual denoising GAN model for producing super-resolution CTA images. 1515-1524 - Yungen Wei, Zheng Gong, Shunzhi Yang, Kai Ye, Yamin Wen:

EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting. 1525-1535 - Mohammed Alshehri

:
APP-NTS: a network traffic similarity-based framework for repacked Android apps detection. 1537-1546 - Yan Ren

, Haipeng Guan, Qiuxia Zhao:
An efficient lattice-based linkable ring signature scheme with scalability to multiple layer. 1547-1556 - Wei Li, Le Xia, Ying Huang

, Soroosh Mahmoodi:
An ant colony optimization algorithm with adaptive greedy strategy to optimize path problems. 1557-1571 - Young-Sik Jeong, Jin Wang, Neil Y. Yen:

Special issue on user behavior analysis in edge computing based Internet-of-Things. 1573-1574 - Eunhee Lee

, Yongik Yoon:
Trusted information project platform based on blockchain for sharing strategy. 1575-1585 - Xiaomei Xia, Huipeng Jiang, Jin Wang

:
Analysis of user satisfaction of shared bicycles based on SEM. 1587-1601 - HyungJun Kim

:
Multiple vehicle tracking and classification system with a convolutional neural network. 1603-1614 - Jae-Young Choi

, Jee-Hyong Lee, Younghwa Cho, Suntae Kim, Jeong-Ah Kim, Seang-Yong Lee:
Visualization of knowledge map for monitoring knowledge diagnoses. 1615-1623 - Yeong-Seok Seo

, Jun-Ho Huh
:
GUI-based software modularization through module clustering in edge computing based IoT environments. 1625-1639 - Kayumiy Shokh Jakhon, Haitao Guo, Kyungeun Cho

:
Agent grouping recommendation method in edge computing. 1641-1651 - Hyeon-woo An

, Nammee Moon
:
Design of recommendation system for tourist spot using sentiment analysis based on CNN-LSTM. 1653-1663 - Sang-Youn Kim, Yu-Joon Kim, Dong-Soo Choi

, Byeong-Seok Shin
:
Frequency based tactile rendering method for pin-array tactile devices. 1665-1672 - Shee-Ihn Kim, Seung-Hee Kim

:
E-commerce payment model using blockchain. 1673-1685
Volume 13, Number 4, April 2022
- Alaa Omran Almagrabi, Saleem Abdullah, Maria Shams

, Yasser D. Al-Otaibi, Shahzaib Ashraf:
A new approach to q-linear Diophantine fuzzy emergency decision support system for COVID19. 1687-1713 - Babul P. Tewari

, Sasthi C. Ghosh:
Wi-Fi assisted 5G D2D communications in unlicensed spectrum. 1715-1734 - Nancy Gulati

, Pankaj Deep Kaur
:
FriendCare-AAL: a robust social IoT based alert generation system for ambient assisted living. 1735-1762 - Jinmao Xu, Lei Tan, Daofu Gong

, Fenlin Liu:
Extended matrix factorization with entity network construction for recommendation. 1763-1775 - Yanru Zhong, Liangbin Cao, Huanan Zhang, Yuchu Qin

, Meifa Huang
, Xiaonan Luo:
Hesitant fuzzy power Maclaurin symmetric mean operators in the framework of Dempster-Shafer theory for multiple criteria decision making. 1777-1797 - Jerlin Rubini Lambert

, Eswaran Perumal
:
Oppositional firefly optimization based optimal feature selection in chronic kidney disease classification using deep neural network. 1799-1810 - Hossam Faris, Maria Habib

, Mohammad Faris, Alaa Alomari, Pedro A. Castillo
, Manal Alomari:
Classification of Arabic healthcare questions based on word embeddings learned from massive consultations: a deep learning approach. 1811-1827 - Mridul Krishna Gogoi, Rituparna Chutia

:
Similarity measure of the interval-valued fuzzy numbers and its application in risk analysis in paddy cultivation. 1829-1852 - Hossam Elshahaby

, Mohsen A. Rashwan:
An end to end system for subtitle text extraction from movie videos. 1853-1865 - Partha Pratim Sarangi, Deepak Ranjan Nayak

, Madhumita Panda, Banshidhar Majhi:
A feature-level fusion based improved multimodal biometric recognition system using ear and profile face. 1867-1898 - Fred Petry

, Ronald R. Yager:
Evidence approach imprecise intervals: extensions and evaluation measures. 1899-1906 - Madhu Jain

, Sibasish Dhibar
, Sudeep Singh Sanga
:
Markovian working vacation queue with imperfect service, balking and retrial. 1907-1923 - Thirumoorthy Karpagalingam

, K. Muneeswaran:
An elitism based self-adaptive multi-population Poor and Rich optimization algorithm for grouping similar documents. 1925-1939 - Rajni Sharma, M. Ravinder, Nitin Sharma

, Kanchan Sharma:
An optimal remote sensing image enhancement with weak detail preservation in wavelet domain. 1941-1952 - Qazi Mazhar ul Haq

, Chang-Hong Lin, Shanq-Jang Ruan, Derlis Gregor:
An edge-aware based adaptive multi-feature set extraction for stereo matching of binocular images. 1953-1967 - Khaled Alanezi

, Shivakant Mishra:
Incorporating individual and group privacy preferences in the internet of things. 1969-1984 - Mohit Dua

, Chhavi Jain, Sushil Kumar:
LSTM and CNN based ensemble approach for spoof detection task in automatic speaker verification systems. 1985-2000 - A. D. C. Navin Dhinnesh

, T. Sabapathi
:
Probabilistic neural network based efficient bandwidth allocation in wireless sensor networks. 2001-2012 - Bharat Garg

, Prashant Singh Rana
, Vijaypal Singh Rathor
:
Significance driven inverse distance weighted filter to restore impulsive noise corrupted X-ray image. 2013-2024 - Waleed Saad

, Wafaa A. Shalaby, Mona Shokair, Fathi E. Abd El-Samie, Moawad I. Dessouky, Essam Abdellatef:
COVID-19 classification using deep feature concatenation technique. 2025-2043 - Eisley Dizon, Bernardi Pranggono

:
Smart streetlights in Smart City: a case study of Sheffield. 2045-2060 - Fatemeh Keshavarz-Ghorbani, Alireza Arshadi Khamseh:

Modeling and optimizing a multi-period closed-loop supply chain for pricing, warranty period, and quality management. 2061-2089 - Shahzaib Ashraf

, Saleem Abdullah, Ronnason Chinram
:
Emergency decision support modeling under generalized spherical fuzzy Einstein aggregation information. 2091-2117 - Eya Dhib

, Khaled Boussetta, Nawel Zangar, Nabil Tabbane:
Cost, energy, and response delay awareness-solution for cloud resources management: proposition of a predictive dynamic algorithm for VMs allocation over a distributed cloud infrastructure. 2119-2129 - Hongwang Xiao

, Yun Yang, Ke Yu, Jiao Tian, Xinyi Cai, Muhammad Usman, Jinjun Chen:
Sign language digits and alphabets recognition by capsule networks. 2131-2141 - Sui-Zhi Luo, Witold Pedrycz, Lining Xing:

Interactive multilevel programming approaches in neutrosophic environments. 2143-2159 - Leyi Xiao, Chaodong Fan, Honglin Ouyang, Andrea F. Abate, Shaohua Wan

:
Adaptive trapezoid region intercept histogram based Otsu method for brain MR image segmentation. 2161-2176 - Basma Abd El-Rahiem

, Mohamed Amin
, Ahmed Sedik
, Fathi E. Abd El-Samie, Abdullah M. Iliyasu:
An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream. 2177-2189 - Sanjay K. Dhurandher, Jagdeep Singh

, Petros Nicopolitidis, Raghav Kumar, Geetanshu Gupta:
A blockchain-based secure routing protocol for opportunistic networks. 2191-2203 - Farhan Musanna, Deepak Dangwal, Sanjeev Kumar

:
Novel image encryption algorithm using fractional chaos and cellular neural network. 2205-2226 - Surender Singh

, Abdul Haseeb Ganie
:
Some novel q-rung orthopair fuzzy correlation coefficients based on the statistical viewpoint with their applications. 2227-2252 - Hossein Hadadian Nejad Yousefi, Yousef Seifi Kavian

, Alimorad Mahmoudi:
A Markov chain model for IEEE 802.15.4 in time critical wireless sensor networks under periodic traffic with reneging packets. 2253-2268 - Kejia Chen, Jian Jin, Jiayi Luo:

Big consumer opinion data understanding for Kano categorization in new product development. 2269-2288 - Bapayya Naidu Kommula, Venkata Reddy Kota:

An integrated converter topology for torque ripple minimization in BLDC motor using an ITSA technique. 2289-2308 - Dingding Yu, Xianliang Hu, Kewei Liang

, Jun Ying:
A parallel algorithm for multi-AGV systems. 2309-2323
Volume 13, Number 5, May 2022
- Robert Steele, Trevor Hillsgrove, Navid Khoshavi, Luis Gabriel Jaimes

:
A survey of cyber-physical system implementations of real-time personalized interventions. 2325-2342 - Kallol Roy:

Optimal energy management of micro grid connected system: a hybrid approach. 2343-2354 - Partha Sarathi Barma, Joydeep Dutta, Anupam Mukherjee

, Samarjit Kar:
A multi-objective ring star vehicle routing problem for perishable items. 2355-2380 - Sepideh Adabi, Hamed Farhadinasab, Puria Rad Jahanbani:

A genetic algorithm-based approach to create a safe and profitable marketplace for cloud customers. 2381-2413 - Kanika Goyal, Amitoj Singh

, Virender Kadyan:
A comparison of Laryngeal effect in the dialects of Punjabi language. 2415-2428 - Shruti Goel

, Rakhee Kulshrestha
:
Queueing based spectrum management in cognitive radio networks with retrial and heterogeneous service classes. 2429-2437 - K. Aseem

, S. Selva Kumar:
Hybrid k-means Grasshopper Optimization Algorithm based FOPID controller with feed forward DC-DC converter for solar-wind generating system. 2439-2462 - Anas M. Al-Oraiqat

, Oleksandr Ulichev
, Yelyzaveta Meleshko
, Hazim Saleh Al-Rawashdeh, Oleksii Smirnov
, Liudmyla I. Polishchuk
:
Modeling strategies for information influence dissemination in social networks. 2463-2477 - Sreemana Datta, Sonal Kumar

, Ditipriya Sinha, Ayan Kumar Das:
BSSFFS: blockchain-based sybil-secured smart forest fire surveillance. 2479-2510 - Riyaz Shaik, S. Venkatramaphanikumar

:
Sentiment analysis with word-based Urdu speech recognition. 2511-2531 - Esra Akgül

, Yilmaz Delice, Emel Kizilkaya Aydogan
, Fatih Emre Boran:
An application of fuzzy linguistic summarization and fuzzy association rule mining to Kansei Engineering: a case study on cradle design. 2533-2563 - Fariba Goodarzian

, Farzad Bahrami
, Davood Shishebori:
A new location-allocation-problem for mobile telecommunication rigs model under crises and natural disasters: a real case study. 2565-2583 - E. Manohar

, E. Anandha Banu, D. Shalini Punithavathani:
Composite analysis of web pages in adaptive environment through Modified Salp Swarm algorithm to rank the web pages. 2585-2600 - (Withdrawn) A new sequence optimization algorithm based on particle swarm for machine learning. 2601-2619

- Samira Goudarzi

, Mohammad Sharif
, Farid Karimipour
:
A context-aware dimension reduction framework for trajectory and health signal analyses. 2621-2635 - Durga S.

, Esther Daniel
, P. Getzi Jeba Leelipushpam:
A novel request state aware resource provisioning and intelligent resource capacity prediction in hybrid mobile cloud. 2637-2650 - Hicham Talhaoui

, Tarek Ameid, Abdelhalim Kessal
:
Energy eigenvalues and neural network analysis for broken bars fault diagnosis in induction machine under variable load: experimental study. 2651-2665 - Navid Khaledian

, Farhad Mardukhi
:
CFMT: a collaborative filtering approach based on the nonnegative matrix factorization technique and trust relationships. 2667-2683 - Seyed Nadi Mohamed Khosroshahi, Seyed Naser Razavi, Amin Babazadeh Sangar

, Kambiz Majidzadeh:
Deep neural networks-based offline writer identification using heterogeneous handwriting data: an evaluation via a novel standard dataset. 2685-2704 - Virender Kadyan, Puneet Bawa

, Taniya Hasija
:
In domain training data augmentation on noise robust Punjabi Children speech recognition. 2705-2721 - (Withdrawn) Extracting the cervical cancer cell region through super pixel segmentation. 2723-2733

- Sheikh Nooruddin

, Md. Milon Islam
, Falguni Ahmed Sharna, Husam Y. Al-Hetari, Muhammad Nomani Kabir
:
Sensor-based fall detection systems: a review. 2735-2751 - Federico Cassioli

, Laura Angioletti
, Michela Balconi
:
Tracking eye-gaze in smart home systems (SHS): first insights from eye-tracking and self-report measures. 2753-2762 - Hassan Habib, Rashid Amin

, Bilal Ahmed, Abdul Hannan:
Hybrid algorithms for brain tumor segmentation, classification and feature extraction. 2763-2784 - Ali Shahidinejad

, Mostafa Ghobaei-Arani
:
A metaheuristic-based computation offloading in edge-cloud environment. 2785-2794 - (Withdrawn) Enhancement of network lifetime by fuzzy based secure CH clustered routing protocol for mobile wireless sensor network. 2795-2805

- Huawei Tong

, Yun Zhu, Juliano Pierezan, Youyun Xu, Leandro dos Santos Coelho
:
Chaotic Coyote Optimization Algorithm. 2807-2827 - Dharmendra Singh Rajput, Syed Muzamil Basha

, Qin Xin, Thippa Reddy Gadekallu
, Rajesh Kaluri, Kuruva Lakshmanna, Praveen Kumar Reddy Maddikunta
:
Providing diagnosis on diabetes using cloud computing environment to the people living in rural areas of India. 2829-2840 - Akif Khan

, Shah Khusro
:
A mechanism for blind-friendly user interface adaptation of mobile apps: a case study for improving the user experience of the blind people. 2841-2871 - Ferdinando Di Martino, Salvatore Sessa

:
A classification algorithm based on multi-dimensional fuzzy transforms. 2873-2885 - A. Mirzaei Rahimi, Amir Ziaeddini

, Shu Gonglee:
A novel approach to efficient resource allocation in load-balanced cellular networks using hierarchical DRL. 2887-2901 - Ibrahim Isik

, Mehmet Bilal Er, Esme Isik
:
Analysis and classification of the mobile molecular communication systems with deep learning. 2903-2919
Volume 13, Number 6, June 2022
- Jinghua Wu, Fujuan Zhang, Jiali Han, Yan Li

, Yi Sun
:
Agent-based automated persuasion with adaptive concessions tuned by emotions. 2921-2935 - Jing Xiao, Haichao Li, Guangzhuo Qu, Hamido Fujita

, Yang Cao, Jia Zhu
, Changqin Huang
:
Hope: heatmap and offset for pose estimation. 2937-2949 - Yichao Wang, Lang Qin:

Research on state prediction method of tobacco curing process based on model fusion. 2951-2961 - Xiaolin Liang, Weifeng Zhu, Jiawen Sun, Jianqin Deng:

SFA-based ELM for remote detection of stationary objects. 2963-2981 - Soheila Nikpour, Shahrokh Asadi:

A dynamic hierarchical incremental learning-based supervised clustering for data stream with considering concept drift. 2983-3003 - Yu Bai

, Michael Bain:
Optimizing weighted lazy learning and Naive Bayes classification using differential evolution algorithm. 3005-3024 - Niam Abdulmunim Al-Thanoon, Omar Saber Qasim, Zakariya Yahya Algamal

:
Improving nature-inspired algorithms for feature selection. 3025-3035 - Daniele Spoladore

, Atieh Mahroo
, Alberto Trombetta
, Marco Sacco
:
DOMUS: a domestic ontology managed ubiquitous system. 3037-3052 - Shi Dong

, Mudar Sarem:
NOCD: a new overlapping community detection algorithm based on improved KNN. 3053-3063 - Surya Thangavel

, Chitra Selvi Shokkalingam:
The IoT based embedded system for the detection and discrimination of animals to avoid human-wildlife conflict. 3065-3081 - Mu-Yen Chen

, Jing-Rong Chang, Long-Sheng Chen
, En-Li Shen:
The key successful factors of video and mobile game crowdfunding projects using a lexicon-based feature selection approach. 3083-3101 - S. Palanikumar

, S. Albert Jerome
, J. P. Jayan
:
Automatic detection of solitary pulmonary nodules using superpixels segmentation based iterative clustering approach. 3103-3118 - Muhammad Saqlain Rehan, Furqan Rustam

, Saleem Ullah
, Safdar Hussain, Arif Mehmood
, Gyu Sang Choi:
Employees reviews classification and evaluation (ERCE) model using supervised machine learning approaches. 3119-3136 - Gehad Ismail Sayed

, Ghada Khoriba
, Mohamed H. Haggag:
A novel Chaotic Equilibrium Optimizer Algorithm with S-shaped and V-shaped transfer functions for feature selection. 3137-3162 - Lantian Guo, Xiaoyan Cai, Haohua Qin, Fei Hao

, Sensen Guo
:
A content-sensitive citation representation approach for citation recommendation. 3163-3174 - Chiradeep Dey, Rajarshi Bose, Kushal Kanti Ghosh, Samir Malakar

, Ram Sarkar
:
LAGOA: Learning automata based grasshopper optimization algorithm for feature selection in disease datasets. 3175-3194 - Rajkumar Rajavel

, Sathish Kumar Ravichandran, Karthikeyan Harimoorthy
, Partheeban Nagappan
, Kanagachidambaresan Ramasubramanian Gobichettipalayam:
IoT-based smart healthcare video surveillance system using edge computing. 3195-3207 - Nitul Dutta, Hiren Kumar Deva Sarma:

Efficient mobility management in IP networks through three layered MIPv6. 3209-3227 - Maddali Arun Kumar

, P. Siddaiah:
Spectral efficiency enhancement of green metric cognitive radio network using novel channel design and intellectual African buffalo optimization. 3229-3243 - N. S. Pradeep, V. Aarthi, V. R. Sarma Dhulipala

:
Upgraded Max-Log-MAP algorithm using adaptive correction factors for decoders in AWGN and fading channel. 3245-3255 - Sara Kadhum Idrees, Ali Kadhum Idrees:

New fog computing enabled lossless EEG data compression scheme in IoT networks. 3257-3270 - M. Ganesan, S. Shankar:

High utility fuzzy product mining (HUFPM) using investigation of HUWAS approach. 3271-3281 - Farokhlagha Moazami

, Masoumeh Safkhani:
TBGODP+: improvement of TBGODP, a time bound group ownership delegation protocol. 3283-3302 - Atefe Alitaleshi

, Hamid Jazayeriy, Javad Kazemitabar:
Affinity propagation clustering-aided two-label hierarchical extreme learning machine for Wi-Fi fingerprinting-based indoor positioning. 3303-3317
Volume 13, Number 7, July 2022
- Akila Sarirete

, Zain A. Balfaqih
, Tayeb Brahimi, Miltiadis D. Lytras
, Anna Visvizi
:
Artificial intelligence and machine learning research: towards digital transformation at a global scale. 3319-3321 - Meng Zhao

, Liang Gao
, Xinyu Li
:
A random forest-based job shop rescheduling decision model with machine failures. 3323-3333 - Muammer Turkoglu

, Davut Hanbay
, Abdulkadir Sengür
:
Multi-model LSTM-based convolutional neural networks for detection of apple diseases and pests. 3335-3345 - Seyed Morteza Mousavi, Vahid Majidnezhad

, Avaz Naghipour:
A new intelligent intrusion detector based on ensemble of decision trees. 3347-3359 - Abdul Rahman A. Alsewari

, Robin Poston, Kamal Z. Zamli, Mohammed Balfaqih
, Khalid S. Aloufi:
Combinatorial test list generation based on Harmony Search Algorithm. 3361-3377 - Mustafa Sami Ahmed

, Nor Shahida Mohd Shah
, Fayad Ghawbar, Yasir Amer Jawhar, Akram A. Almohammedi
:
Filtered-OFDM with channel coding based on T-distribution noise for underwater acoustic communication. 3379-3392 - Mohammed Balfaqih

, Zain A. Balfaqih
, Vladimir D. Shepelev, Soltan Abed Alharbi
, Waheb A. Jabbar
:
An analytical framework for distributed and centralized mobility management protocols. 3393-3405 - Zain A. Balfaqih

:
Design and development of network simulator module for distributed mobility management protocol. 3407-3421 - Basem H. Ahmed

, Ayman S. Ghabayen
:
Review rating prediction framework using deep learning. 3423-3432 - Wasiat Khan, Mustansar Ali Ghazanfar, Muhammad Awais Azam

, Amin Karami, Khaled Hamed Alyoubi, Ahmed S. Alfakeeh:
Stock market prediction using machine learning classifiers and social media, news. 3433-3456 - Abdulghani Ali Ahmed

, Waheb A. Jabbar
, Ali Safaa Sadiq, Hiran Patel:
Deep learning-based classification model for botnet attack detection. 3457-3466 - Mohammad Savargiv

, Behrooz Masoumi
, Mohammad Reza Keyvanpour
:
A new ensemble learning method based on learning automata. 3467-3482 - Zhongda Tian

:
Echo state network based on improved fruit fly optimization algorithm for chaotic time series prediction. 3483-3502 - Zhu Zhang, Shu Zhan

, Haiyan Zhang, Xinke Li:
Joint model of entity recognition and relation extraction based on artificial neural network. 3503-3511 - Tingting Li

, Jia Lu:
Divide-and-conquer ensemble self-training method based on probability difference. 3513-3525 - Sneha Sharma

, Rinki Gupta
, Arun Kumar:
Trbaggboost: an ensemble-based transfer learning method applied to Indian Sign Language recognition. 3527-3537 - Abdulhamit Subasi

, Saeed Mian Qaisar
:
Surface EMG signal classification using TQWT, Bagging and Boosting for hand movement recognition. 3539-3554 - Abdulhamit Subasi

, Mohamed Fathy El-Amin
, Tarek Darwich, Mubarak Dossary:
Permeability prediction of petroleum reservoirs using stochastic gradient boosting regression. 3555-3564 - Fei Gao

, Xin Shen, Yisu Ge, Shufang Lu:
MT-IVSN: a novel model for vehicle re-identification. 3565-3576 - Mohammed Moness, Doaa Mahmoud

, Aziza I. Hussein
:
Real-time Mamdani-like fuzzy and fusion-based fuzzy controllers for balancing two-wheeled inverted pendulum. 3577-3593 - Sukhwinder Singh Dhillon, J. S. Lather, Gai-Ge Wang, P. Kaur, Lalitesh Kumar

:
Monarch butterfly optimized control with robustness analysis for grid tied centralized and distributed power generations. 3595-3608 - Faezeh Farivar, Mahdi Aliyari Shoorehdeli, Mohammad Manthouri:

Improved teaching-learning based optimization algorithm using Lyapunov stability analysis. 3609-3618 - Saeed Mian Qaisar

, Abdulhamit Subasi
:
Effective epileptic seizure detection based on the event-driven processing and machine learning for mobile healthcare. 3619-3631 - Ergün Yücesoy

:
Speaker age and gender classification using GMM supervector and NAP channel compensation method. 3633-3642 - M. Mourad Mabrook

, Hussein A. Taha, Aziza I. Hussein
:
Cooperative spectrum sensing optimization based adaptive neuro-fuzzy inference system (ANFIS) in cognitive radio networks. 3643-3654 - Yilun Han, Guoshan Li

, Tao Chen:
Design of intelligent surveillance system based on wireless ad-hoc network under special conditions. 3655-3667 - Ogbonna Michael Igwe, Yi Wang

, George C. Giakos, Jian Fu:
Human activity recognition in smart environments employing margin setting algorithm. 3669-3681 - Mohamed Amin Benatia

, David Baudry, Anne Louis:
Detecting counterfeit products by means of frequent pattern mining. 3683-3692 - Lamya Gaber, Aziza I. Hussein

, Hanafy Mahmoud, M. Mourad Mabrook, Mohammed Moness:
Computation of minimal unsatisfiable subformulas for SAT-based digital circuit error diagnosis. 3693-3711
Volume 13, Number 8, August 2022
- Anandkumar Ramakrishnan

, Ramanujam Kalpana:
A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm. 3713-3727 - Sunder Ali Khowaja

, Seok-Lyong Lee
:
Skeleton-based human action recognition with sequential convolutional-LSTM networks and fusion strategies. 3729-3746 - Bukhoree Sahoh

, Anant Choksuriwong:
A proof-of-concept and feasibility analysis of using social sensors in the context of causal machine learning-based emergency management. 3747-3763 - D. Angel

:
Application of graph domination to defend medical information networks against cyber threats. 3765-3770 - Cuilian You, Le Bo:

Option pricing based on a type of fuzzy process. 3771-3785 - Mohamed Sirajudeen

, R. Anitha
:
LDuAP: lightweight dual auditing protocol to verify data integrity in cloud storage servers. 3787-3805 - Zhiguo Qu

, Kunyi Wang, Min Zheng:
Secure quantum fog computing model based on blind quantum computation. 3807-3817 - Zongmin Jiang, Honghong Lv

, Yuanchao Li, Yangming Guo:
A novel application architecture of digital twin in smart grid. 3819-3835 - Raghu Ramamoorthy

, Menakadevi Thangavelu
:
An enhanced hybrid ant colony optimization routing protocol for vehicular ad-hoc networks. 3837-3868 - Aditya Kumar Sahu

:
A logistic map based blind and fragile watermarking for tamper detection and localization in images. 3869-3881 - Himani Pangasa, Shipra Aggarwal

:
Development of automated billing system in shopping malls. 3883-3891 - G. K. Sandhia

, S. V. Kasmir Raja:
Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography. 3893-3902 - Ebad Mirzaei, Massoud Hadian Dehkordi:

Simorgh, a fully decentralized blockchain-based secure communication system. 3903-3921 - Amir Kenarang, Mehrdad Farahani, Mohammad Manthouri

:
BiGRU attention capsule neural network for persian text classification. 3923-3933 - Garima Mahendru

, Anil K. Shukla
, L. M. Patnaik:
An optimal and adaptive double threshold-based approach to minimize error probability for spectrum sensing at low SNR regime. 3935-3944 - Hongbo Ni, Zhuang Li

, Ziqiang Shao, Mingzhe Guo, Junqi Liu:
RecogHypertension: early recognition of hypertension based on heart rate variability. 3945-3962 - Ghasan Ali Hussain

, Lukman Audah
:
A BCS code in the f-OFDM system: a promising candidate for 5G wireless communication systems. 3963-3972 - Monica Kaushik, Sindhu Hak Gupta

, Vipin Balyan
:
An approach to detect human body movement using different channel models and machine learning techniques. 3973-3987 - Aradhana Behura, M. Srinivas, Manas Ranjan Kabat:

Giraffe kicking optimization algorithm provides efficient routing mechanism in the field of vehicular ad hoc networks. 3989-4008 - Mohammed R. Elkobaisi

, Fadi Al Machot
:
Human emotion modeling (HEM): an interface for IoT systems. 4009-4017 - Ahmad Kazemifard, Jalal Chachi

:
MADM approach to analyse the performance of fuzzy regression models. 4019-4031 - N. Saranya, K. Srinivasan, S. K. Pravin Kumar:

Banana ripeness stage identification: a deep learning approach. 4033-4039 - Xudong Song, Yuyang Cong

, Yifan Song, Yilin Chen, Pan Liang:
A bearing fault diagnosis model based on CNN with wide convolution kernels. 4041-4056 - Chandrima Thakur

, Sudipta Chattopadhyay:
Secrecy performance of a novel energy efficient hybrid CIoT network with beacon-aided RF energy harvesting under dissimilar fading environments. 4057-4075 - Tarik K. Alafif, Bander A. Alzahrani, Yong Cao

, Reem Alotaibi
, Ahmed Barnawi, Min Chen:
Generative adversarial network based abnormal behavior detection in massive crowd videos: a Hajj case study. 4077-4088 - S. Paulraj, G. Tamilarasi:

Generalized ordered weighted harmonic averaging operator with trapezoidal neutrosophic numbers for solving MADM problems. 4089-4102 - Emre Çelik

:
Performance analysis of SSA optimized fuzzy 1PD-PI controller on AGC of renewable energy assisted thermal and hydro-thermal power systems. 4103-4122
Volume 13, Number 9, September 2022
- Xinming Wang, Weili Ding

, Shuangshuang Bian, Honghai Liu:
Action recognition through fusion of sEMG and skeletal data in feature level. 4125-4134 - Moumita Roy, Chandreyee Chowdhury

, Ghufran Ahmed, Nauman Aslam, Samiran Chattopadhyay, Saif ul Islam
:
Intra WBAN routing using Zipf's law and intelligent transmission power switching approach (ZITA). 4135-4149 - Rayees Ahmad Dar, Aroor Dinesh Dileep:

Small, narrow, and parallel recurrent neural networks for sentence representation in extractive text summarization. 4151-4157 - G. Joselin Retna Kumar, G. Pius Agbulu

, T. V. Rahul, A. V. Natarajan, K. Gokul:
A cloud-assisted mesh sensor network solution for public zone air pollution real-time data acquisition. 4159-4173 - Vanessa De Arriba López, Salvador Cobos-Guzman

:
Development of a deep learning model for recognising traffic sings focused on difficult cases. 4175-4187 - Soojung Lee

:
Fuzzy clustering with optimization for collaborative filtering-based recommender systems. 4189-4206 - Rakesh Ranjan

, Hari Shankar Prasad
:
A novel exponentially fitted finite difference method for a class of 2nd order singularly perturbed boundary value problems with a simple turning point exhibiting twin boundary layers. 4207-4221 - Sudeep Singh Sanga

, Madhu Jain
:
Fuzzy modeling of single server double orbit retrial queue. 4223-4234 - B. Satheesh Kumar, K. Seetharaman:

Content based video retrieval using deep learning feature extraction by modified VGG_16. 4235-4247 - Srinivasa Rao Gundu

, Charan Arur Panem, Anuradha Thimmapuram, Rajendra S. Gad:
Emerging computational challenges in cloud computing and RTEAH algorithm based solution. 4249-4263 - Shahrokh Vahabi

, Seyed Payam Mojab
, Mohammadreza Eslaminejad, Seyed Ebrahim Dashti
:
EAM: energy aware method for chain-based routing in wireless sensor network. 4265-4277 - Ab Rouf Khan

, Mohammad Ahsan Chishti:
βDSC2DAM: beta-dominating set centered Cluster-Based Data Aggregation mechanism for the Internet of Things. 4279-4296 - Sourabh Sharma

, Harish Sharma, Janki Ballabh Sharma:
A new optimization based color image watermarking using non-negative matrix factorization in discrete cosine transform domain. 4297-4319 - Jansi Rani Sella Veluswami

, K. R. Sarath Chandran, Akshaya Ranganathan, M. Chandrasekharan, B. Janani, G. Deepsheka:
Smart wearable model for predicting heart disease using machine learning. 4321-4332 - Rula A. Hamid, Ahmed Shihab Albahri

, Osamah Shihab Albahri
, A. A. Zaidan
:
Dempster-Shafer theory for classification and hybridised models of multi-criteria decision analysis for prioritisation: a telemedicine framework for patients with heart diseases. 4333-4367 - Thang Trung Nguyen, Thuan Thanh Nguyen

, Thai Dinh Pham:
Finding optimal solutions for reaching maximum power energy of hydroelectric plants in cascaded systems. 4369-4384 - Emre Avuçlu, Fatih Basçiftçi:

An interactive robot design to find missing people and inform their location by real-time face recognition system on moving images. 4385-4396 - M. Hena

, N. Jeyanthi:
Distributed authentication framework for Hadoop based bigdata environment. 4397-4414 - Fanyong Meng

, Binghua Dong:
Linguistic intuitionistic fuzzy PROMETHEE method based on similarity measure for the selection of sustainable building materials. 4415-4435 - Musab Coskun

, Özal Yildirim, Yakup Demir, U. Rajendra Acharya
:
Efficient deep neural network model for classification of grasp types using sEMG signals. 4437-4450 - Marco Romano

, Paloma Díaz
, Ignacio Aedo
:
Gamification-less: may gamification really foster civic participation? A controlled field experiment. 4451-4465 - Jian Zheng

:
Smooth manifold extraction in high-dimensional data using a deep model. 4467-4476 - Mohamed R. Shoaib

, Heba M. Emara, Mohamed Elwekeil
, Walid El Shafai, Taha E. Taha, Adel S. El-Fishawy
, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie:
Hybrid classification structures for automatic COVID-19 detection. 4477-4492 - Irfan Deli, Vakkas Uluçay

, Yadigar Polat:
N-valued neutrosophic trapezoidal numbers with similarity measures and application to multi-criteria decision-making problems. 4493-4518 - Waleed Alomoush

, Ayat Alrosan
, Yazan M. Alomari, Alaa A. Alomoush
, Ammar Almomani, Hammoudeh S. Alamri:
Fully automatic grayscale image segmentation based fuzzy C-means with firefly mate algorithm. 4519-4541 - Ali Seyfollahi

, Hamid Abeshloo, Ali Ghaffari
:
Enhancing mobile crowdsensing in Fog-based Internet of Things utilizing Harris hawks optimization. 4543-4558 - K. Gavaskar

, M. Sankara Narayanan, M. Sreenidhi Nachammal, K. Vignesh:
Design and comparative analysis of SRAM array using low leakage controlled transistor technique with improved delay. 4559-4568 - (Withdrawn) RETRACTED ARTICLE: Dominating set based virtual backbone cluster scheduling for ensuring energy efficiency in asymmetric radio WSN. 4569

- (Withdrawn) RETRACTED ARTICLE: Identification of lesion using an efficient hybrid algorithm for MRI brain image segmentation. 4571

- (Withdrawn) RETRACTED ARTICLE: Effective routing and security strategies through principle component regression analysis in disruption tolerant network. 4573

Volume 13, Number 10, October 2022
- Ji Su Park, Francesco Colace, Yang Xiao

, Jong Hyuk Park:
Special issue on ambient intelligence, IoT, and Smart City. 4575-4577 - Temesgen Seyoum Alemayehu, Jai-Hoon Kim

, We-Duke Cho:
Optimal replacement model for the physical component of safety critical smart-world CPSs. 4579-4590 - Cho Youn Lee, Jin Gon Shon

, Ji Su Park
:
An edge detection-based eGAN model for connectivity in ambient intelligence environments. 4591-4600 - Sooyoung Kang, Seungjoo Kim

:
CIA-level driven secure SDLC framework for integrating security into SDLC process. 4601-4624 - Ki Jung Yi, Young-Sik Jeong:

Smart factory: security issues, challenges, and solutions. 4625-4638 - Ashutosh Dhar Dwivedi

, Rajani Singh, Uttam Ghosh
, Raghava Rao Mukkamala, Amr Tolba
, Omar Said
:
Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things. 4639-4649 - Sankar Sennan, Somula Ramasubbareddy, Ashish Kr. Luhach

, Waleed S. Alnumay
, Pushpita Chatterjee:
NCCLA: new caledonian crow learning algorithm based cluster head selection for Internet of Things in smart cities. 4651-4661 - Jia-Wei Chang, Neil Yuwen Yen

, Jason C. Hung:
Design of a NLP-empowered finance fraud awareness model: the anti-fraud chatbot for fraud detection and fraud classification as an instance. 4663-4679 - Nasr Almurisi, Srinivasulu Tadisetty

:
Cloud-based virtualization environment for IoT-based WSN: solutions, approaches and challenges. 4681-4703 - Seungmin Lee

, Daejin Park
:
Abnormal beat detection from unreconstructed compressed signals based on linear approximation in ECG signals suitable for embedded IoT devices. 4705-4717 - Marwa Mokni

, Sonia Yassa, Jalel Eddine Hajlaoui, Rachid Chelouah
, Mohamed Nazih Omri:
Cooperative agents-based approach for workflow scheduling on fog-cloud computing. 4719-4738 - Hossein Lotfi:

Optimal sizing of distributed generation units and shunt capacitors in the distribution system considering uncertainty resources by the modified evolutionary algorithm. 4739-4758 - Mohammad Fraiwan

, Luay Fraiwan
, Mohanad Alkhodari, Omnia Hassanin
:
Recognition of pulmonary diseases from lung sounds using convolutional neural networks and long short-term memory. 4759-4771 - Banoth Ravi

, Jaisingh Thangaraj:
Performance evaluation of multi service provisioning for multi-hop cooperative data dissemination in SDHVN. 4773-4786 - Imen Trabelsi

, Filipo Studzinski Perotto, Usman Malik
:
Training universal background models with restricted data for speech emotion recognition. 4787-4797 - J. Barsana Banu

, J. Jeyashanthi, A. Thameem Ansari
:
DTC-IM drive using adaptive neuro fuzzy inference strategy with multilevel inverter. 4799-4821 - Sreenanda Raut

, Madhumangal Pal:
Fuzzy intersection graph: a geometrical approach. 4823-4847 - Zhenyu Zhang

, Xuejun Zhao, Yong Qin, Hongyun Si
, Lixin Zhou:
Interval type-2 fuzzy TOPSIS approach with utility theory for subway station operational risk evaluation. 4849-4863 - Shraddha Suratkar

, Kunjal Shah
, Aditya Sood
, Anay Loya
, Dhaval Bisure
, Umesh Patil
, Faruk Kazi
:
An adaptive honeypot using Q-Learning with severity analyzer. 4865-4876 - Ali Mohammad Alqudah

, Shoroq Qazan, Lina Al-Ebbini, Hiam Alquran
, Isam Abu-Qasmieh:
ECG heartbeat arrhythmias classification: a comparison study between different types of spectrum representation and convolutional neural networks architectures. 4877-4907 - Ali Raza Khoso

, Aminah Md Yusof, Shabir Hussain Khahro, Nur Izie Adiana Binti Abidin, Nafees Ahmed Memon:
Automated two-stage continuous decision support model using exploratory factor analysis-MACBETH-SMART: an application of contractor selection in public sector construction. 4909-4939 - Zhixin Zhou, Zhidong Zhao, Guohua Hui, Yanjun Deng, Yu Zhang:

Simulating study on linear time-dependent optimization WSN based on stochastic resonance. 4941-4952 - Aakash Choudhury, Arjav Choudhury

, Umashankar Subramanium, S. Balamurugan
:
HealthSaver: a neural network based hospital recommendation system framework on flask webapplication with realtime database and RFID based attendance system. 4953-4966 - Maryam Azarkesht, Fatemeh Afsari

:
Instance reweighting and dynamic distribution alignment for domain adaptation. 4967-4987
Volume 13, Number 11, November 2022
- Huimin Lu, Mohsen Guizani, Imrich Chlamtac:

Special Issue on Computational Cognition and Perception for Humanized Computing. 4989 - Haitao Cheng

, Zong-Min Ma
, Peng Li:
A fuzzy spatial description logic for the semantic web. 4991-5009 - Zhiqiang Tian, Xiangyu Si, Yaoyue Zheng, Zhang Chen, Xiaojian Li:

Multi-step medical image segmentation based on reinforcement learning. 5011-5022 - Chunyan Ma, Junwu Zhu, Yujie Li, Jianru Li, Yi Jiang, Xin Li:

Single image super resolution via wavelet transform fusion and SRFeat network. 5023-5031 - Yuantao Chen

, Jiajun Tao, Linwu Liu, Jie Xiong, Runlong Xia, Jingbo Xie, Qian Zhang, Kai Yang:
Research of improving semantic image segmentation based on a feature fusion model. 5033-5045 - Wanpei Chen, Yanting Qiao, Yujie Li:

Inception-SSD: An improved single shot detector for vehicle detection. 5047-5053 - Zheng Liu

, Xin Kang, Shun Nishide, Fuji Ren:
Vowel priority lip matching scheme and similarity evaluation model based on humanoid robot Ren-Xin. 5055-5066 - Haixia Xiong, Weihua Ou, Zengxian Yan, Jianping Gou

, Quan Zhou, Anzhi Wang:
Modality-specific matrix factorization hashing for cross-modal retrieval. 5067-5081 - Yunbo Lv, Junwu Zhu, Yi Jiang:

Using EGDL to represent domain knowledge for imperfect information automated negotiations. 5083-5091 - Fangqing Sheng, Yang Zhang

, Cheng Shi, Mengyuan Qiu, Shuaizhen Yao:
Xi'an tourism destination image analysis via deep learning. 5093-5102 - Zhaoxin Yue

, Ping Ai, Dingbo Yuan, Chuansheng Xiong:
Ensemble approach for mid-long term runoff forecasting using hybrid algorithms. 5103-5122 - Bander A. Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, Wenjing Xiao

, Min Chen, Abdullah Al-Barakati
:
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment. 5123-5135 - Heyou Chang, Fanlong Zhang, Guangwei Gao, Hao Zheng:

Graph-structure constraint and Schatten p-norm-based unsupervised domain adaptation for image classification. 5137-5149 - Xin Jin, Pengyue Deng, Xinxin Li, Kejun Zhang, Xiaodong Li, Quan Zhou, Shujiang Xie, Xi Fang:

Sun-sky model estimation from outdoor images. 5151-5162 - Mei Wang

, Wenbin Chai, Changfeng Xu, Lihong Dong, Yuancheng Li, Pai Wang, Xuebin Qin:
An edge computing method using a novel mode component for power transmission line fault diagnosis in distribution network. 5163-5176 - Zhenlong Du

, Haiyang Shen, Xiaoli Li, Meng Wang:
3D building fabrication with geometry and texture coordination via hybrid GAN. 5177-5188 - Yang Xu, Binglu Wang, Shuwen Liu, Yi Bu, Jun Wang, Ruijun Liu

:
Intelligent transportation systems design based on mass customization. 5189-5198 - Guoming Lu, Lizong Zhang

, Minjie Jin, Pancheng Li, Xi Huang:
Entity alignment via knowledge embedding and type matching constraints for knowledge graph inference. 5199-5209 - B. Anusha

, P. Geetha:
Identification of gene variant associated with Parkinson's disease using genomic databases. 5211-5224 - Shuangxun Ma

, Qinghai Zheng, Yuehu Liu:
Essential multi-view graph learning for clustering. 5225-5236 - Wei Tian, Zhe Chen, Jie Shen, Fengchen Huang, Lizhong Xu

:
Underwater sonar image denoising through nonconvex total variation regularization and generalized Kullback-Leibler fidelity. 5237-5251 - Xia Dong, Song Deng, Dong Wang:

A short-term power load forecasting method based on k-means and SVM. 5253-5267 - Yongzhong Cao, Yameng Hao

, Bin Li, Jie Xue:
Depression prediction based on BiAttention-GRU. 5269-5277 - Iván González, José Gabriel Urzaiz Lares

, Cristina Seceleanu
:
Special issue on Ambient Intelligence in the IoT: Convergence Trends and Challenges (AmIIoT). 5279-5281 - Govind P. Gupta

, Binit Saha:
Load balanced clustering scheme using hybrid metaheuristic technique for mobile sink based wireless sensor networks. 5283-5294 - Parvaneh Asghari

, Amir Masoud Rahmani
, Hamid Haj Seyyed Javadi:
Privacy-aware cloud service composition based on QoS optimization in Internet of Things. 5295-5320 - Maximiliano Canché, Sergio F. Ochoa

, Daniel Perovich, Francisco J. Gutierrez
:
Analysis of notations for modeling user interaction scenarios in ubiquitous collaborative systems. 5321-5333 - Ángel G. Andrade

, José M. Ramírez, Marcela D. Rodríguez
:
Informing the design of a LoRa™-based digital bracelet for the timely assistance of indigents. 5335-5350 - Luis Cabañero

, Ramón Hervás
, José Bravo, Luis Rodriguez-Benitez, Chris D. Nugent:
eeglib: computational analysis of cognitive performance during the use of video games. 5351-5362 - Alberto L. Morán, Cristina Ramírez-Fernández, Victoria Meza-Kubo

:
Design of smart objects of fear with a taxonomy of factors affecting the user experience of exposure therapy systems for small-animal phobias. 5363-5375 - Antonio Benítez-Guijarro, Zoraida Callejas, Manuel Noguera

, Kawtar Benghazi:
Architecting dietary intake monitoring as a service combining NLP and IoT. 5377-5389 - Felipe Rodríguez, Sergio F. Ochoa

, Francisco J. Gutierrez
:
Supporting asymmetric interaction in the age of social media. 5391-5404 - Nayra Rodríguez-Pérez, Josué Toledo-Castro, Pino Caballero-Gil

, Iván Santos-González, Candelaria Hernández-Goya
:
Secure ambient intelligence prototype for airports. 5405-5417 - Oihane Gómez-Carmona

, Juan Sádaba
, Diego Casado-Mansilla
:
Enhancing street-level interactions in smart cities through interactive and modular furniture. 5419-5432 - Gustavo López

, Luis A. Guerrero:
A conceptual framework for smart device-based notifications. 5433-5445
Volume 13, Number 12, December 2022
- S. Mohanalakshmi

, C. K. Morarji
, S. Soban:
Locust based genetic classifier for the diagnosis of diabetic retinopathy. 5447-5463 - J. Raja, N. Mookhambika:

A novel energy harvesting with middle-order weighted probability (EHMoWP) for performance improvement in wireless sensor network (WSN). 5465-5476 - Kumar Parasuraman, Silambarasan Karunagaran

, Raghavendran Srinivasan:
NACO predicated hybrid model of internet of things and cloud computing to manage immensely colossal data in health accommodations applications. 5477-5490 - Bushra Batool

, Shougi Suliman Abosuliman
, Saleem Abdullah, Shahzaib Ashraf:
EDAS method for decision support modeling under the Pythagorean probabilistic hesitant fuzzy aggregation information. 5491-5504 - Sukanta Nama, Apu Kumar Saha

, Sushmita Sharma:
Performance up-gradation of Symbiotic Organisms Search by Backtracking Search Algorithm. 5505-5546 - Mehdi Asadi

:
Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches. 5547-5561 - Mansour Abedian, Atefeh Amindoust

, Reza Maddahi, Javid Jouzdani:
A Nash equilibrium based decision-making method for performance evaluation: a case study. 5563-5579 - Ritesh Vyas

, Tirupathiraju Kanumuri, Gyanendra Sheoran
, Pawan Dubey
:
Accurate feature extraction for multimodal biometrics combining iris and palmprint. 5581-5589 - Tipu Sultan Haque

, Avishek Chakraborty, Sankar Prasad Mondal, Shariful Alam
:
New exponential operational law for measuring pollution attributes in mega-cities based on MCGDM problem with trapezoidal neutrosophic data. 5591-5608 - Vivekanandan Dharmalingam

, Dhananjay Kumar
:
Hybrid feature selection model for classification of lung disorders. 5609-5625 - Abhilasha Chaudhuri

, Tirath Prasad Sahu
:
Binary Jaya algorithm based on binary similarity measure for feature selection. 5627-5644 - G. Saranraj, K. Selvamani, P. Malathi:

A novel data aggregation using multi objective based male lion optimization algorithm (DA-MOMLOA) in wireless sensor network. 5645-5653 - Karthika Kuppusamy

, Chandra Eswaran:
Convolutional and Deep Neural Networks based techniques for extracting the age-relevant features of the speaker. 5655-5667 - Marco Manca, Fabio Paternò

, Carmen Santoro:
Remote monitoring of end-user created automations in field trials. 5669-5697 - Junhua Chen

, Shufan Ma
, Ying Wu
:
International carbon financial market prediction using particle swarm optimization and support vector machine. 5699-5713 - Beniamino Di Martino

, Dario Branco
, Luigi Colucci Cante
, Salvatore Venticinque, Reinhard Scholten, Bas Bosma:
Semantic and knowledge based support to business model evaluation to stimulate green behaviour of electric vehicles' drivers and energy prosumers. 5715-5737 - Aamir Arsalan

, Muhammad Majid
:
A study on multi-class anxiety detection using wearable EEG headband. 5739-5749 - S. Jeba Berlin

, Mala John
:
Vision based human fall detection with Siamese convolutional neural networks. 5751-5762 - Manoj Sharma

, Naresh Kumar
:
Improved hepatocellular carcinoma fatality prognosis using ensemble learning approach. 5763-5777 - Pawan Singh

, Ram Shringar Raw
, Suhel Ahmad Khan
:
Link risk degree aided routing protocol based on weight gradient for health monitoring applications in vehicular ad-hoc networks. 5779-5801 - Ping Xiong, Guirong Li, Wei Ren, Tianqing Zhu

:
LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing. 5803-5818 - Pinjala N. Malleswari

, Ch. Hima Bindu
, K. Satya Prasad:
A hybrid EMD-DWT based algorithm for detection of QRS complex in electrocardiogram signal. 5819-5827 - Vaishali Yadav

, Ashwani Kumar Yadav, Manjit Kaur, Dilbag Singh:
Trigonometric mutation and successful-parent-selection based adaptive asynchronous differential evolution. 5829-5846 - Muhammad Arif, Jianer Chen, Guojun Wang, Hafiz Tayyab Rauf:

Cognitive population initialization for swarm intelligence and evolutionary computing. 5847-5860 - Fan Liu

, Fei Wang, Yuhua Ding, Sai Yang:
SOM-based binary coding for single sample face recognition. 5861-5871 - Mankour Mohamed

, Yahiaoui Merzoug, Sami Ben Slama:
New strategy to enhance AC grid performance with SVC device in an optimal location. 5873-5884 - E. B. Priyanka

, S. Thangavel:
Multi-type feature extraction and classification of leakage in oil pipeline network using digital twin technology. 5885-5901

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














