


default search action
Journal of Intelligent Systems, Volume 31
Volume 31, Number 1, 2022
- Firas Mohammed Aswad

, Ali Noori Kareem, Ahmed Mahmood Khudhur
, Bashar Ahmed Khalaf, Salama A. Mostafa
:
Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction. 1-14 - Lei Zhang, Zheng Wen Lai, Mohd Asif Shah

:
Construction of 3D model of knee joint motion based on MRI image registration. 15-26 - Essa Ibrahim Essa, Mshari A. Asker, Fidan T. Sedeeq:

Evaluating OADM network simulation and an overview based metropolitan application. 27-39 - Amer S. Elameer, Mustafa Musa Jaber

, Sura Khalil Abd:
Radiography image analysis using cat swarm optimized deep belief networks. 40-54 - Dimah Hussein Alahmadi, Fatmah Abdulrahman Baothman

, Mona M. Alrajhi, Fatimah S. Alshahrani, Hawazin Z. Albalawi:
Comparative analysis of blockchain technology to support digital transformation in ports and shipping. 55-69 - Jeffrey O. Agushaka, Absalom E. Ezugwu

:
Evaluation of several initialization methods on arithmetic optimization algorithm performance. 70-94 - Saif Mohammed Ali, Amer S. Elameer, Mustafa Musa Jaber

:
IoT network security using autoencoder deep neural network and channel access algorithm. 95-103 - Menghan Ding:

Application of visual elements in product paper packaging design: An example of the "squirrel" pattern. 104-112 - Jia Guo:

Deep learning approach to text analysis for human emotion detection from big data. 113-126 - Thanh-Trung Trinh, Masaomi Kimura:

Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model. 127-147 - Qin Qiu:

The application of neural network algorithm and embedded system in computer distance teach system. 148-158 - Yijun Wu, Yonghong Qin:

Machine translation of English speech: Comparison of multiple algorithms. 159-167 - Fouad H. Awad, Ali Al-Kubaisi, Maha Mahmood:

Large-scale timetabling problems with adaptive tabu search. 168-176 - Hong Wang, Lixia Hao, Amit Sharma

, Ashima Kukkar
:
Automatic control of computer application data processing system based on artificial intelligence. 177-192 - Lanfei Zhao, Qidan Zhu:

Edge detail enhancement algorithm for high-dynamic range images. 193-206 - Minshun Zhang, Juntao Fan, Amit Sharma

, Ashima Kukkar
:
Data mining applications in university information management system development. 207-220 - Li Ting, Mudassir Khan

, Ashutosh Sharma
, Mohd. Dilshad Ansari
:
A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing. 221-236 - Qianqian Pan, Gang Yang:

Application of mining algorithm in personalized Internet marketing strategy in massive data environment. 237-244 - Xiaopeng Li:

Suitability evaluation method of urban and rural spatial planning based on artificial intelligence. 245-259 - Yanghui Zhong, Xiaorui Yue:

On the correction of errors in English grammar by deep learning. 260-270 - Jianlan Lyu:

Writing assistant scoring system for English second language learners based on machine learning. 271-288 - Ningjie Liao:

Research on intelligent interactive music information based on visualization technology. 289-297 - Xuezhong Wu:

Dynamic evaluation of college English writing ability based on AI technology. 298-309 - Lanfei Zhao, Qidan Zhu:

Image denoising algorithm of social network based on multifeature fusion. 310-320 - Hailong Cui, Bo Zhan:

Automatic recognition method of installation errors of metallurgical machinery parts based on neural network. 321-331 - Ahmad Salim, Wisam K. Jummar

, Farah Maath Jasem
, Mohammed Yousif
:
Eurasian oystercatcher optimiser: New meta-heuristic algorithm. 332-344 - Qihao Yang:

An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities. 345-355 - Safa Ali Lafta, Mohammed Qadir Ismael

:
Trip generation modeling for a selected sector in Baghdad city using the artificial neural network. 356-369 - Ahmed Saifullah Sami, Mohd Shafry Mohd Rahim:

Trainable watershed-based model for cornea endothelial cell segmentation. 370-392 - Manju Kondath, David Peter Suseelan, Sumam Mary Idicula:

Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience. 393-406 - Ann Varghese, Midhun Muraleedharan Sylaja

, James Kurian:
Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification. 407-419 - Shenghuan Zhang, Ye Cheng:

Masking and noise reduction processing of music signals in reverberant music. 420-427 - Weifei Tian:

Emotional information transmission of color in image oil painting. 428-439 - Methaq Talib Gaata

, Muhanad Tahrir Younis
, Jamal N. Hasoon, Salama A. Mostafa
:
Hessenberg factorization and firework algorithms for optimized data hiding in digital images. 440-453 - Jing Niu, Roobaea Alroobaea

, Abdullah M. Baqasah
, Lavish Kansal:
Implementation of network information security monitoring system based on adaptive deep detection. 454-465 - Xiaoshu Wang, Suhua Zhao, Jingwen Liu, Liyan Wang:

College music teaching and ideological and political education integration mode based on deep learning. 466-476 - Yonggang Wang, Haiou Sun:

Behavior feature extraction method of college students' social network in sports field based on clustering algorithm. 477-488 - Songyang Li, Haipeng Yu, Miao Wang:

Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy. 489-500 - Yanjing Lu, Mudassir Khan

, Mohd. Dilshad Ansari
:
Face recognition algorithm based on stack denoising and self-encoding LBP. 501-510 - Wesam M. Jasim:

State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot. 511-519 - Ying Zhou, Guodong Zhao, Roobaea Alroobaea

, Abdullah M. Baqasah
, Rajan Miglani:
Research on data mining method of network security situation awareness based on cloud computing. 520-531 - Hongxia Li, Xin Tuo:

Research on an English translation method based on an improved transformer model. 532-540 - Vijay Paidi:

Short-term prediction of parking availability in an open parking lot. 541-554 - Gang Liu

, Hongbo Zhuang
:
Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm. 555-567 - Anup Bhat Brahmavar

, Harish Sheeranalli Venkatarama, Geetha Maiya:
PUC: parallel mining of high-utility itemsets with load balancing on spark. 568-588 - Qi Yao, Dayang Jiang, Xiancheng Ding:

Image retrieval based on weighted nearest neighbor tag prediction. 589-600 - Han Lai:

A comparative study of different neural networks in predicting gross domestic product. 601-610 - Jiehui Li:

Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data. 611-622 - Ping Wang:

A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences. 623-631 - S. Premkumar, A. N. Sigappi:

IoT-enabled edge computing model for smart irrigation system. 632-650 - Hua Ai, Yuhong Fan, Jilei Zhang, Kayhan Zrar Ghafoor:

Topology optimization of computer communication network based on improved genetic algorithm. 651-659 - Ying Wang, Korhan Cengiz

:
Implementation of the Spark technique in a matrix distributed computing algorithm. 660-671 - Mengyang Qin:

A study on automatic correction of English grammar errors based on deep learning. 672-680 - Jie Dong, Gui Li, Wenkai Ma, Jianshun Liu:

Personalized recommendation system based on social tags in the era of Internet of Things. 681-689 - Zihao Li, Yizhi Wang

, Zhong Yang, Xiaomin Tian, Lixin Zhai, Xiao Wu, Jianpeng Yu, Shanshan Gu, Lingyi Huang, Yang Zhang:
A novel fingerprint recognition method based on a Siamese neural network. 690-705 - B. Lokesh Reddy, Anith Nelleri:

Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging. 706-715 - Yinchun Chen:

A hidden Markov optimization model for processing and recognition of English speech feature signals. 716-725 - Thamer Alameri

, Ahmed Hazim Alhilali
, Nabeel Salih Ali, Jawad Kadhim Mezaal:
Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq. 726-738 - Ahmed Imad Abbas, Oday Y. M. Alhamadani, Mamoun Ubaid Mohammed:

The application of an artificial neural network for 2D coordinate transformation. 739-752 - Duan Yuanchuan, Diao Hang, Li Shi, Liu Kailin, Feng Yijie:

Auxiliary diagnosis study of integrated electronic medical record text and CT images. 753-766 - Bo Gao, Vipin Balyan

:
Construction of a financial default risk prediction model based on the LightGBM algorithm. 767-779 - Lanfei Zhao, Zhihua Chen:

CRNet: Context feature and refined network for multi-person pose estimation. 780-794 - Jian Zhang:

Supervision method of indoor construction engineering quality acceptance based on cloud computing. 795-805 - Xiaomei Niu:

Interactive 3D reconstruction method of fuzzy static images in social media. 806-816 - Shuai Ren, Defeng Chen, Yaodong Tao, Shuheng Xu, Gang Wang, Zhibin Yang:

Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining. 817-834 - Lounis Ouarda

, Malika Bourenane, Nacer Eddine Yousfi, Brahim Bouderah:
Improving the efficiency of intrusion detection in information systems. 835-854 - Nuha Qais Abdulmajeed, Belal Al-Khateeb

, Mazin Abed Mohammed
:
A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions. 855-875 - Ravinder Reddy Baireddy

, R. Nagaraja:
A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis. 876-890 - Hao Zheng, Chuanyuan Peng:

The impact of public health emergency governance based on artificial intelligence. 891-901 - Tameem Hameed Obaida, Hanan Abbas Salman

:
A novel method to find the best path in SDN using firefly algorithm. 902-914 - Zhongliang Yang:

Optimal loading method of multi type railway flatcars based on improved genetic algorithm. 915-926 - Xinxin Liu, Baojing Liu

, Chenye Han, Wei Li:
Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0. 927-943 - Mustafa Mohammed Jassim

, Mustafa Musa Jaber:
Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works. 944-964 - Hong Zhang, Rui Li, Chuncheng Shi:

Deep learning technology of Internet of Things Blockchain in distribution network faults. 965-978 - Tamilselvi Kesavan, Ramesh Kumar Krishnamoorthy:

An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction. 979-991 - Xiaojing Li:

Research on reform and breakthrough of news, film, and television media based on artificial intelligence. 992-1001 - Hanumanthu Bhukya

, Sadanandam Manchala:
Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework. 1002-1013 - Tao Wang, Li Wang, Pengfei Yan, Renu Popli, Poonam Rani, Rajeev Kumar

:
Application of embedded Linux in the design of Internet of Things gateway. 1014-1023 - Donghao Shi

:
Optimization of shared bike paths considering faulty vehicle recovery during dispatch. 1024-1036 - Luning Zhao:

The application of graphic language in animation visual guidance system under intelligent environment. 1037-1054 - Zhaoxia Li, Jianxing Zhu, K. Arumugam

, Jyoti Bhola, Rahul Neware:
Research on computer static software defect detection system based on big data technology. 1055-1064 - Qiang Zhang:

An optimized solution to the course scheduling problem in universities under an improved genetic algorithm. 1065-1073 - Yan Zhang, Arshpreet Kaur

, Vishal Jagota
, Rahul Neware:
Study on data mining method of network security situation perception based on cloud computing. 1074-1084 - Abdulrahman Abbas Mukhlif

, Belal Al-Khateeb
, Mazin Abed Mohammed:
An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges. 1085-1111 - Lirong Zhou, Anton Pljonkin

, Pradeep Kumar Singh:
Modeling and PID control of quadrotor UAV based on machine learning. 1112-1122 - Chao Chen, Danaysa Macías Hernández, Silega Nemuri Martinez:

Simulation design of automobile automatic clutch based on mechatronics. 1123-1132 - Akanksha Bansal Chopra

, Veer Sain Dixit:
An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system. 1133-1149 - Hua Ai, Jianwei Chai, Jilei Zhang, Shaweta Khanna, Kayhan Zrar Ghafoor:

Research on the application of search algorithm in computer communication network. 1150-1159 - Miao Wang, Zhenxi Fang, Weiguang Liu, Xiaotong Wang, Xiaodong Liu, Songyang Li:

Computing the inverse of cardinal direction relations between regions. 1160-1177 - Mahamed G. H. Omran

, Giovanni Iacca
:
An improved Jaya optimization algorithm with ring topology and population size reduction. 1178-1210 - Yan Jiang, Chuncai Bao:

Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0. 1211-1228 - Jintao Chen, Jianfeng Jiang, Binruo Zhu:

Iot-based power detection equipment management and control system. 1229-1245 - Zhiying Hu:

Estimation and application of matrix eigenvalues based on deep neural network. 1246-1261 - Dan Wu:

Brand image innovation design based on the era of 5G internet of things. 1262-1273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














