


default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 7
Volume 7, Number 1, February 2016
- Nirmalya Roy, Archan Misra

, Diane J. Cook:
Ambient and smartphone sensor assisted ADL recognition in multi-inhabitant smart environments. 1-19 - Changsheng Wan, Juan Zhang, Bei Pei, Changsong Chen:

Efficient privacy-preserving third-party auditing for ambient intelligence systems. 21-27 - Xiaobo Liu

, Guangjun Wang, Zhihua Cai, Harry Zhang:
Bagging based ensemble transfer learning. 29-36 - Jialing Han

, Xiaohui Zhao, Chunyan Qiu:
A digital image watermarking method based on host image analysis and genetic algorithm. 37-45 - Giuseppe D'Aniello

, Angelo Gaeta
, Matteo Gaeta
, Mario Lepore, Francesco Orciuoli
, Orlando Troisi:
A new DSS based on situation awareness for smart commerce environments. 47-61 - Changji Wang

, Dong-Yuan Shi, Xi-Lei Xu, Jian Fang:
An anonymous data access scheme for VANET using pseudonym-based cryptography. 63-71 - Chao Qu, Fagui Liu, Ming Tao, Dacheng Deng:

An OWL-S based specification model of dynamic entity services for Internet of Things. 73-82 - Alket Cecaj

, Marco Mamei, Franco Zambonelli:
Re-identification and information fusion between anonymized CDR and social network data. 83-96 - Giorgio Graditi, Maria Luisa Di Silvestre, Diego La Cascia, Eleonora Riva Sanseverino, Gaetano Zizzo

:
On multi-objective optimal reconfiguration of MV networks in presence of different grounding. 97-105 - Meng-Dar Shieh, Yu-En Yeh, Chih-Lung Huang:

Eliciting design knowledge from affective responses using rough sets and Kansei engineering system. 107-120 - Zhen Liu, Ruoyu Wang, Ming Tao:

SmoteAdaNL: a learning method for network traffic classification. 121-130 - Wei Guan, Cheng Wang, Yiqiao Cai, Huizhen Zhang:

Design and implementation of wireless monitoring network for temperature-humidity measurement. 131-138 - Jin Liu, Hui Tian

, Jing Lu, Yonghong Chen:
Neighbor-index-division steganography based on QIM method for G.723.1 speech streams. 139-147
Volume 7, Number 2, April 2016
- Massimo Ficco:

Editorial: security and reliability of critical systems. 149-151 - Zhengjun Jing

, Guoping Jiang, Chunsheng Gu, Zhimin Yu, Lingling Xu:
Anonymous authentication for circuits from correlation-relaxed two-to-one recoding. 153-161 - Jyh-Horng Wen, Jheng-Sian Li, Cheng-Ying Yang, Chun-Hung Chen, Hsing-Chung Chen

, Chuan-Hsien Mao:
Localization scheme based on multistatic radar systems. 163-169 - Dominik Egarter, Andrea Monacchi, Tamer Khatib, Wilfried Elmenreich:

Integration of legacy appliances into home energy management systems. 171-185 - Adel Boukhadra

, Karima Benatchba, Amar Balla
:
Efficient distributed discovery and composition of OWL-S process model in P2P systems. 187-203 - Shan Xue

, Li Xiong, Shufen Yang, Lu Zhao:
A self-adaptive multi-view framework for multi-source information service in cloud ITS. 205-220 - Wenjing Tang, Yilei Wang, Wei He:

An image segmentation algorithm based on improved multiscale random field model in wavelet domain. 221-228 - Zhendong Wu, Jie Yuan, Jianwu Zhang, Huaxin Huang:

A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation. 229-238 - Luigi Troiano, Cosimo Birtolo, Roberto Armenise:

Searching optimal menu layouts by linear genetic programming. 239-256 - Nan Jiang, Bin Li, Huan Chen, Tao Wan, Lingfeng Liu:

DWDH: directed and weighted dynamics of hierarchical wireless sensor networks. 257-265 - Seung-Yeon Kim, Hoon Jung Koo, Ha Yoon Song:

A study on influence of human personality to location selection. 267-285 - Basem Almadani

:
QoS-aware real-time pub/sub middleware for drilling data management in petroleum industry. 287-299
Volume 7, Number 3, June 2016
- Ansar-Ul-Haque Yasar

, Haroon Malik, Elhadi M. Shakshuki
:
New advances in ambient information systems. 301-303 - Behailu Negash, Amir-Mohammad Rahmani, Tomi Westerlund

, Pasi Liljeberg, Hannu Tenhunen
:
LISA 2.0: lightweight internet of things service bus architecture using node centric networking. 305-319 - Etienne Alain Feukeu

, Karim Djouani
, Anish Mathew Kurien:
Doppler Shift Mitigation in a VANET using an IDDM approach. 321-332 - Guilherme W. Cassales, Andrea Schwertner Charão

, Manuele Kirsch-Pinheiro, Carine Souveyet, Luiz Angelo Steffenel
:
Improving the performance of Apache Hadoop on pervasive environments through context-aware scheduling. 333-345 - Tarek R. Sheltami

, Abubakar Bala
, Elhadi M. Shakshuki
:
Wireless sensor networks for leak detection in pipelines: a survey. 347-356 - Ana M. Bernardos

, Jose M. Sánchez, Javier I. Portillo, Xian Wang, Juan A. Besada
, José R. Casar:
Design and deployment of a contactless hand-shape identification system for smart spaces. 357-370 - Yashar Fazili

, Alireza Nafarieh, Muhammad H. Raza, Bill Robertson, William J. Philips:
The effect of adopting green SLA on key parameters of optical WDM networks. 371-384 - Michal Maciejewski, Josep Maria Salanova Grau

, Joschka Bischoff, Miquel Angel Estrada Romeu:
Large-scale microscopic simulation of taxi services. Berlin and Barcelona case studies. 385-393 - Glenn Cich, Luk Knapen

, Tom Bellemans
, Davy Janssens
, Geert Wets
:
Threshold settings for TRIP/STOP detection in GPS traces. 395-413
- Olasimbo Ayodeji Arigbabu

, Saif Mahmood, Sharifah Mumtazah Syed Ahmad, Abayomi A. Arigbabu
:
Smile detection using hybrid face representation. 415-426 - Xiong Li

, Kaihui Wang, Jian Shen, Saru Kumari
, Fan Wu
, Yonghua Hu:
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. 427-443 - Farrukh Shahzad

, Tarek R. Sheltami
, Elhadi M. Shakshuki
:
Effect of network topology on localization algorithm's performance. 445-454
Volume 7, Number 4, August 2016
- Ansar-Ul-Haque Yasar

, Haroon Malik, Elhadi M. Shakshuki
, Zahoor Ali Khan
:
Emerging technologies in ambient systems. 455-456 - Amy R. Wagoner, Eric T. Matson:

A task manager using an ontological framework for a HARMS-based system. 457-463 - Yi Xue, Ralph Deters

:
Towards horizontally scalable apps - Resource sharing in the mobile cloud with CoAP. 465-473 - Boubaker Boulekrouche, Nafaâ Jabeur

, Zaia Alimazighi:
Toward integrating grid and cloud-based concepts for an enhanced deployment of spatial data warehouses in cyber-physical system applications. 475-487 - Tarek R. Sheltami

, Shehryar Khan, Elhadi M. Shakshuki
, Menshawi K. Menshawi
:
Continuous objects detection and tracking in wireless sensor networks. 489-508 - Haroon Malik, Ian J. Davis, Michael W. Godfrey, Douglas Neuse, Serge Mankovskii:

Connecting the dots: anomaly and discontinuity detection in large-scale systems. 509-522 - Mattias Nordahl, Boris Magnusson:

A lightweight data interchange format for internet of things with applications in the PalCom middleware framework. 523-532 - Pierluigi Siano

, Debora Sarno
, Lorena Straccia, Anna Teresa Marrazzo:
A novel method for evaluating the impact of residential demand response in a real time distribution energy market. 533-545 - Meng Bi, Jian Xu

, Mo Wang, Fucai Zhou:
Anomaly detection model of user behavior based on principal component analysis. 547-554 - Ahmed-Chawki Chaouche

, Amal El Fallah Seghrouchni, Jean-Michel Ilié
, Djamel-Eddine Saïdouni:
Learning from situated experiences for a contextual planning guidance. 555-566 - Pavlos Kosmides, Konstantinos P. Demestichas

, Evgenia F. Adamopoulou
, Chara Remoundou, Ioannis V. Loumiotis, Michael E. Theologou, Miltiades E. Anagnostou:
Providing recommendations on location-based social networks. 567-578 - Lahcene Aid, Lynda Zaoui, Sid Ahmed Mokhtar Mostefaoui:

Using DEVS for modeling and simulation of ambient objects in intelligent buildings. 579-592 - Abid Sarwar, Jyotsna Suri, Mehbob Ali, Vinod Sharma

:
Novel benchmark database of digitized and calibrated cervical cells for artificial intelligence based screening of cervical cancer. 593-606
Volume 7, Number 5, October 2016
- Ilsun You, Jin Li:

Special issue on security and privacy techniques in mobile cloud computing. 607-609 - Jian Xu

, Fucai Zhou, Zhihao Jiang, Rui Xue:
Dynamic proofs of retrievability with square-root oblivious RAM. 611-621 - Minqing Zhang, Liqiang Wu, Xu An Wang

, Xiaoyuan Yang:
Unidirectional IBPRE scheme from lattice for cloud computation. 623-631 - Chijun Zhang, Yongjian Yang, Zhanwei Du, Chuang Ma:

Particle swarm optimization algorithm based on ontology model to support cloud computing applications. 633-638 - Xin Li, Xin Liu:

Multi-segment and multi-stage projected tetrahedra. 639-648 - Feda AlShahwan, Maha Faisal

, Godwin O. Ansa
:
Security framework for RESTful mobile cloud computing Web services. 649-659 - Youngho Park, Chul Sur, Kyung Hyune Rhee:

Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. 661-671 - Hyochang Ahn, Yong-Hwan Lee:

Performance analysis of object recognition and tracking for the use of surveillance system. 673-679 - Chengyu Hu, Pengtao Liu, Shanqing Guo:

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs. 681-692 - Hsing-Chung Chen

, Chuan-Hsien Mao, Yen-Tsung Lin, Tzu-Liang Kung, Chien-Erh Weng:
A secure group-based mobile chat protocol. 693-703 - Vasily Desnitsky

, Igor V. Kotenko
:
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge. 705-719
- Tao Ning, Ming Huang, Xu Liang, Hua Jin:

A novel dynamic scheduling strategy for solving flexible job-shop problems. 721-729 - Mehmet Sabir Kiraz

:
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. 731-760
Volume 7, Number 6, December 2016
- Hsin-Chieh Wu, Toly Chen

, Peng-Cheng Sung, Yu-Cheng Lin:
Ambient intelligence and ergonomics in Asia. 761-762 - Cheng-Li Liu

, Shiaw-Tsyr Uang:
Effects of depth perception cues and display types on presence and cybersickness in the elderly within a 3D virtual store. 763-775 - Rung-Ching Chen, Chia-Fen Hsieh, Wei-Lun Chang:

Using ambient intelligence to extend network lifetime in wireless sensor networks. 777-788 - Toly Chen

:
Embedding a back propagation network into fuzzy c-means for estimating job cycle time: wafer fabrication as an example. 789-800 - Abbas Al-Refaie

, Toly Chen
, Raed Al-Athamneh
, Hsin-Chieh Wu:
Fuzzy neural network approach to optimizing process performance by using multiple responses. 801-816 - Kuo-Wei Su, Po-Hsin Huang, Po-Hung Chen, Yating Li:

The impact of formats and interactive modes on the effectiveness of mobile advertisements. 817-827 - Hsin-Chieh Wu, Min-Chi Chiu, Chia-Wei Peng:

Visual fatigue occurrence time when using hand-held intelligent devices. 829-835 - Chien-Chun Lu, Chinmei Chou, Akira Yasukouchi, Tomoaki Kozaki, Cheng-Yi Liu:

Effects of nighttime lights by LED and fluorescent lighting on human melatonin. 837-844 - Si-Jing Chen, Yen-Yu Kang, Chih-Long Lin:

Ergonomic evaluation of video game playing. 845-853 - Chu-Chai Henry Chan

, Ying-Rown Hwang, Hsin-Chieh Wu:
Marketing segmentation using the particle swarm optimization algorithm: a case study. 855-863 - Chinmei Chou, Chien-Chun Lu, Ru-Yu Huang:

Effects of different ambient environments on human responses and work performance. 865-874 - Huicun Shen, Kun-Chieh Wang

:
Affective product form design using fuzzy Kansei engineering and creativity. 875-888
- Ibrahim Mashal

, Osama Alsaryrah
, Tein-Yaw Chung:
Testing and evaluating recommendation algorithms in internet of things. 889-900 - Andrea Monacchi, Wilfried Elmenreich:

Assisted energy management in smart microgrids. 901-913

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














