callback( { "result":{ "query":":facetid:toc:\"db/journals/mta/mta77.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"68.44" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"1479", "@dc":"1479", "@oc":"1479", "@id":"43462938", "text":":facetid:toc:db/journals/mta/mta77.bht" } }, "hits":{ "@total":"1479", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"2453139", "info":{"authors":{"author":[{"@pid":"95/5846-1","text":"Jian Shen 0001"},{"@pid":"188/1398","text":"Shaohua Chang"},{"@pid":"95/2446-1","text":"Qi Liu 0001"},{"@pid":"48/5700-6","text":"Jun Shen 0006"},{"@pid":"78/7662","text":"Yongjun Ren"}]},"title":"Implicit authentication protocol and self-healing key management for WBANs.","venue":"Multim. Tools Appl.","volume":"77","number":"9","pages":"11381-11401","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/0001C0SR18","doi":"10.1007/S11042-017-5559-Z","ee":"https://doi.org/10.1007/s11042-017-5559-z","url":"https://dblp.org/rec/journals/mta/0001C0SR18"}, "url":"URL#2453139" }, { "@score":"1", "@id":"2453140", "info":{"authors":{"author":[{"@pid":"03/5189-1","text":"Tao Lu 0001"},{"@pid":"192/8499","text":"Yingjie Guan"},{"@pid":"89/8077","text":"Yanduo Zhang"},{"@pid":"63/8386","text":"Shenming Qu"},{"@pid":"70/2057","text":"Zixiang Xiong"}]},"title":"Robust and efficient face recognition via low-rank supported extreme learning machine.","venue":"Multim. Tools Appl.","volume":"77","number":"9","pages":"11219-11240","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/0001GZQX18","doi":"10.1007/S11042-017-5475-2","ee":"https://doi.org/10.1007/s11042-017-5475-2","url":"https://dblp.org/rec/journals/mta/0001GZQX18"}, "url":"URL#2453140" }, { "@score":"1", "@id":"2453141", "info":{"authors":{"author":[{"@pid":"49/1326-2","text":"Navjot Singh 0002"},{"@pid":"139/0559","text":"Rinki Arya"},{"@pid":"30/6573","text":"R. K. Agrawal 0001"}]},"title":"Performance enhancement of salient object detection using superpixel based Gaussian mixture model.","venue":"Multim. Tools Appl.","volume":"77","number":"7","pages":"8511-8529","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/0002AA18","doi":"10.1007/S11042-017-4748-0","ee":"https://doi.org/10.1007/s11042-017-4748-0","url":"https://dblp.org/rec/journals/mta/0002AA18"}, "url":"URL#2453141" }, { "@score":"1", "@id":"2453142", "info":{"authors":{"author":[{"@pid":"02/3108-2","text":"Pradeep Kumar 0002"},{"@pid":"181/4611","text":"Rajkumar Saini"},{"@pid":"82/5415","text":"Partha Pratim Roy 0001"},{"@pid":"97/7630","text":"Debi Prosad Dogra"}]},"title":"A position and rotation invariant framework for sign language recognition (SLR) using Kinect.","venue":"Multim. Tools Appl.","volume":"77","number":"7","pages":"8823-8846","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/0002S0D18","doi":"10.1007/S11042-017-4776-9","ee":"https://doi.org/10.1007/s11042-017-4776-9","url":"https://dblp.org/rec/journals/mta/0002S0D18"}, "url":"URL#2453142" }, { "@score":"1", "@id":"2453143", "info":{"authors":{"author":[{"@pid":"18/1763-4","text":"Lei Huang 0004"},{"@pid":"36/4256-3","text":"Bin Luo 0003"}]},"title":"Video-based salient object detection via spatio-temporal difference and coherence.","venue":"Multim. Tools Appl.","volume":"77","number":"9","pages":"10685-10699","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/0004L18","doi":"10.1007/S11042-017-4822-7","ee":"https://doi.org/10.1007/s11042-017-4822-7","url":"https://dblp.org/rec/journals/mta/0004L18"}, "url":"URL#2453143" }, { "@score":"1", "@id":"2453144", "info":{"authors":{"author":[{"@pid":"40/3934-4","text":"Dong Wang 0004"},{"@pid":"28/8547","text":"Meng Yi"},{"@pid":"29/3081-35","text":"Fan Yang 0035"},{"@pid":"01/4960","text":"Erik Blasch"},{"@pid":"168/2960","text":"Carolyn Sheaff"},{"@pid":"29/2868","text":"Genshe Chen"},{"@pid":"93/3488","text":"Haibin Ling"}]},"title":"Online single target tracking in WAMI: benchmark and evaluation.","venue":"Multim. Tools Appl.","volume":"77","number":"9","pages":"10939-10960","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/0004YYBSCL18","doi":"10.1007/S11042-018-5666-5","ee":"https://doi.org/10.1007/s11042-018-5666-5","url":"https://dblp.org/rec/journals/mta/0004YYBSCL18"}, "url":"URL#2453144" }, { "@score":"1", "@id":"2453145", "info":{"authors":{"author":[{"@pid":"07/2616-6","text":"Santosh Kumar 0006"},{"@pid":"11/4030","text":"Sanjay Kumar Singh"},{"@pid":"10/7647-1","text":"Amit Kumar Singh 0001"},{"@pid":"124/6409","text":"Shrikant Tiwari"},{"@pid":"158/4357","text":"Ravi Shankar Singh"}]},"title":"Privacy preserving security using biometrics in cloud computing.","venue":"Multim. Tools Appl.","volume":"77","number":"9","pages":"11017-11039","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/0006SSTS18","doi":"10.1007/S11042-017-4966-5","ee":"https://doi.org/10.1007/s11042-017-4966-5","url":"https://dblp.org/rec/journals/mta/0006SSTS18"}, "url":"URL#2453145" }, { "@score":"1", "@id":"2453146", "info":{"authors":{"author":[{"@pid":"64/6025-78","text":"Wei Li 0078"},{"@pid":"35/5570","text":"Kangshun Li"},{"@pid":"219/1544","text":"Luyan Guo"},{"@pid":"62/2964-1","text":"Ying Huang 0001"},{"@pid":"05/6904-3","text":"Yu Xue 0003"}]},"title":"A new validity index adapted to fuzzy clustering algorithm.","venue":"Multim. Tools Appl.","volume":"77","number":"9","pages":"11339-11361","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/0078LGHX18","doi":"10.1007/S11042-017-5550-8","ee":"https://doi.org/10.1007/s11042-017-5550-8","url":"https://dblp.org/rec/journals/mta/0078LGHX18"}, "url":"URL#2453146" }, { "@score":"1", "@id":"2453147", "info":{"authors":{"author":[{"@pid":"20/8875","text":"Reza Abazari"},{"@pid":"51/1146","text":"Mehrdad Lakestani"}]},"title":"A hybrid denoising algorithm based on shearlet transform method and Yaroslavsky's filter.","venue":"Multim. Tools Appl.","volume":"77","number":"14","pages":"17829-17851","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbazariL18","doi":"10.1007/S11042-018-5648-7","ee":"https://doi.org/10.1007/s11042-018-5648-7","url":"https://dblp.org/rec/journals/mta/AbazariL18"}, "url":"URL#2453147" }, { "@score":"1", "@id":"2453148", "info":{"authors":{"author":[{"@pid":"181/3836","text":"Nidaa Hasan Abbas"},{"@pid":"82/1395","text":"Sharifah Mumtazah Syed Ahmad"},{"@pid":"181/3794","text":"Sajida Parveen"},{"@pid":"78/10718","text":"Wan Azizun Wan Adnan"},{"@pid":"48/8899","text":"Abd. Rahman Ramli"}]},"title":"Design of high performance copyright protection watermarking based on lifting wavelet transform and bi empirical mode decomposition.","venue":"Multim. Tools Appl.","volume":"77","number":"19","pages":"24593-24614","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbbasAPAR18","doi":"10.1007/S11042-017-5488-X","ee":"https://doi.org/10.1007/s11042-017-5488-x","url":"https://dblp.org/rec/journals/mta/AbbasAPAR18"}, "url":"URL#2453148" }, { "@score":"1", "@id":"2453149", "info":{"authors":{"author":[{"@pid":"31/9751","text":"Qaisar Abbas"},{"@pid":"32/9196","text":"Mostafa E. A. Ibrahim"},{"@pid":"88/4279","text":"M. Arfan Jaffar"}]},"title":"Video scene analysis: an overview and challenges on deep learning algorithms.","venue":"Multim. Tools Appl.","volume":"77","number":"16","pages":"20415-20453","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbbasIJ18","doi":"10.1007/S11042-017-5438-7","ee":"https://doi.org/10.1007/s11042-017-5438-7","url":"https://dblp.org/rec/journals/mta/AbbasIJ18"}, "url":"URL#2453149" }, { "@score":"1", "@id":"2453150", "info":{"authors":{"author":[{"@pid":"201/2508","text":"Taoufik Ben Abdallah"},{"@pid":"79/3996","text":"Radhouane Guermazi"},{"@pid":"53/6442","text":"Mohamed Hammami"}]},"title":"Facial-expression recognition based on a low-dimensional temporal feature space.","venue":"Multim. Tools Appl.","volume":"77","number":"15","pages":"19455-19479","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbdallahGH18","doi":"10.1007/S11042-017-5354-X","ee":"https://doi.org/10.1007/s11042-017-5354-x","url":"https://dblp.org/rec/journals/mta/AbdallahGH18"}, "url":"URL#2453150" }, { "@score":"1", "@id":"2453151", "info":{"authors":{"author":[{"@pid":"215/9584","text":"Eltaf Abdalsalam"},{"@pid":"116/3459","text":"Mohd Zuki Yusoff"},{"@pid":"64/1737","text":"Aamir Saeed Malik"},{"@pid":"180/5407","text":"Mohammad Rida Bahloul"},{"@pid":"215/9611","text":"Dalia Mahmoud"},{"@pid":"224/3690","text":"Ibrahim Khalil Adam"}]},"title":"Comparison of EEG signal decomposition methods in classification of motor-imagery BCI.","venue":"Multim. Tools Appl.","volume":"77","number":"16","pages":"21305-21327","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbdalsalamYMBMA18","doi":"10.1007/S11042-017-5586-9","ee":"https://doi.org/10.1007/s11042-017-5586-9","url":"https://dblp.org/rec/journals/mta/AbdalsalamYMBMA18"}, "url":"URL#2453151" }, { "@score":"1", "@id":"2453152", "info":{"authors":{"author":[{"@pid":"177/6094","text":"Assem M. Abdelhakim"},{"@pid":"227/1961","text":"M. H. Saad"},{"@pid":"254/0424","text":"Mahmoud Sayed"},{"@pid":"353/0637","text":"Hassan Ibrahim Saleh"}]},"title":"Optimized SVD-based robust watermarking in the fractional Fourier domain.","venue":"Multim. Tools Appl.","volume":"77","number":"21","pages":"27895-27917","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbdelhakimSSS18","doi":"10.1007/S11042-018-6014-5","ee":"https://doi.org/10.1007/s11042-018-6014-5","url":"https://dblp.org/rec/journals/mta/AbdelhakimSSS18"}, "url":"URL#2453152" }, { "@score":"1", "@id":"2453153", "info":{"authors":{"author":[{"@pid":"161/8047","text":"Lotfi Abdi"},{"@pid":"39/6920","text":"Aref Meddeb"}]},"title":"Driver information system: a combination of augmented reality, deep learning and vehicular Ad-hoc networks.","venue":"Multim. Tools Appl.","volume":"77","number":"12","pages":"14673-14703","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbdiM18","doi":"10.1007/S11042-017-5054-6","ee":"https://doi.org/10.1007/s11042-017-5054-6","url":"https://dblp.org/rec/journals/mta/AbdiM18"}, "url":"URL#2453153" }, { "@score":"1", "@id":"2453154", "info":{"authors":{"author":[{"@pid":"83/8082","text":"Alireza Abdollahpouri"},{"@pid":"218/7499","text":"Reyhan Qavami"},{"@pid":"63/7943","text":"Parham Moradi"}]},"title":"On the synthetic dataset generation for IPTV services based on user behavior.","venue":"Multim. Tools Appl.","volume":"77","number":"7","pages":"8475-8493","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbdollahpouriQM18","doi":"10.1007/S11042-017-4746-2","ee":"https://doi.org/10.1007/s11042-017-4746-2","url":"https://dblp.org/rec/journals/mta/AbdollahpouriQM18"}, "url":"URL#2453154" }, { "@score":"1", "@id":"2453155", "info":{"authors":{"author":[{"@pid":"195/0818","text":"Sani M. Abdullahi"},{"@pid":"52/3620-1","text":"Hongxia Wang 0001"}]},"title":"Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals.","venue":"Multim. Tools Appl.","volume":"77","number":"16","pages":"20753-20782","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbdullahiW18","doi":"10.1007/S11042-017-5509-9","ee":"https://doi.org/10.1007/s11042-017-5509-9","url":"https://dblp.org/rec/journals/mta/AbdullahiW18"}, "url":"URL#2453155" }, { "@score":"1", "@id":"2453156", "info":{"authors":{"author":[{"@pid":"184/4418","text":"Masoumeh Rezaei Abkenar"},{"@pid":"93/346","text":"M. Omair Ahmad"}]},"title":"Salient region detection using efficient wavelet-based textural feature maps.","venue":"Multim. Tools Appl.","volume":"77","number":"13","pages":"16291-16317","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbkenarA18","doi":"10.1007/S11042-017-5199-3","ee":"https://doi.org/10.1007/s11042-017-5199-3","url":"https://dblp.org/rec/journals/mta/AbkenarA18"}, "url":"URL#2453156" }, { "@score":"1", "@id":"2453157", "info":{"authors":{"author":[{"@pid":"175/6188","text":"Ilyass Abouelaziz"},{"@pid":"32/2812","text":"Mohammed El Hassouni"},{"@pid":"27/1589","text":"Hocine Cherifi"}]},"title":"Blind 3D mesh visual quality assessment using support vector regression.","venue":"Multim. Tools Appl.","volume":"77","number":"18","pages":"24365-24386","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbouelazizHC18","doi":"10.1007/S11042-018-5706-1","ee":"https://doi.org/10.1007/s11042-018-5706-1","url":"https://dblp.org/rec/journals/mta/AbouelazizHC18"}, "url":"URL#2453157" }, { "@score":"1", "@id":"2453158", "info":{"authors":{"author":[{"@pid":"50/9943","text":"Qusai Q. Abuein"},{"@pid":"79/9944","text":"Mohammed Q. Shatnawi"},{"@pid":"21/451","text":"Muneer O. Bani Yassein"},{"@pid":"120/5508","text":"Reem Mahafza"}]},"title":"Intelligent system for visual web content analytics: A new approach and case study.","venue":"Multim. Tools Appl.","volume":"77","number":"14","pages":"17557-17571","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AbueinSYM18","doi":"10.1007/S11042-017-4740-8","ee":"https://doi.org/10.1007/s11042-017-4740-8","url":"https://dblp.org/rec/journals/mta/AbueinSYM18"}, "url":"URL#2453158" }, { "@score":"1", "@id":"2453159", "info":{"authors":{"author":[{"@pid":"136/7822","text":"Aditya Acharya"},{"@pid":"89/3858","text":"Sukadev Meher"}]},"title":"Composite high frequency predictive scheme for efficient 2-D up-scaling performance.","venue":"Multim. Tools Appl.","volume":"77","number":"2","pages":"2153-2189","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AcharyaM18","doi":"10.1007/S11042-017-4346-1","ee":"https://doi.org/10.1007/s11042-017-4346-1","url":"https://dblp.org/rec/journals/mta/AcharyaM18"}, "url":"URL#2453159" }, { "@score":"1", "@id":"2453160", "info":{"authors":{"author":[{"@pid":"140/1900","text":"Loganathan Agilandeeswari"},{"@pid":"94/5034-3","text":"Ganesan Kaliyaperumal"}]},"title":"RST invariant robust video watermarking algorithm using quaternion curvelet transform.","venue":"Multim. Tools Appl.","volume":"77","number":"19","pages":"25431-25474","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AgilandeeswariK18","doi":"10.1007/S11042-018-5800-4","ee":"https://doi.org/10.1007/s11042-018-5800-4","url":"https://dblp.org/rec/journals/mta/AgilandeeswariK18"}, "url":"URL#2453160" }, { "@score":"1", "@id":"2453161", "info":{"authors":{"author":[{"@pid":"122/2684","text":"Waquar Ahmad"},{"@pid":"33/501","text":"Harish Karnick"},{"@pid":"88/5193","text":"Rajesh M. Hegde"}]},"title":"Client-wise cohort set selection by combining speaker- and phoneme-specific I-vectors for speaker verification.","venue":"Multim. Tools Appl.","volume":"77","number":"7","pages":"8273-8294","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AhmadKH18","doi":"10.1007/S11042-017-4723-9","ee":"https://doi.org/10.1007/s11042-017-4723-9","url":"https://dblp.org/rec/journals/mta/AhmadKH18"}, "url":"URL#2453161" }, { "@score":"1", "@id":"2453162", "info":{"authors":{"author":[{"@pid":"184/4129","text":"Hasnah Ahmad"},{"@pid":"89/4458","text":"Navrati Saxena"},{"@pid":"33/4379-1","text":"Abhishek Roy 0001"},{"@pid":"74/1771","text":"Pradipta De"}]},"title":"Battery-aware rate adaptation for extending video streaming playback time.","venue":"Multim. Tools Appl.","volume":"77","number":"18","pages":"23877-23908","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AhmadSRD18","doi":"10.1007/S11042-017-5603-Z","ee":"https://doi.org/10.1007/s11042-017-5603-z","url":"https://dblp.org/rec/journals/mta/AhmadSRD18"}, "url":"URL#2453162" }, { "@score":"1", "@id":"2453163", "info":{"authors":{"author":[{"@pid":"03/103","text":"Jamil Ahmad"},{"@pid":"28/582","text":"Muhammad Sajjad"},{"@pid":"73/4067","text":"Seungmin Rho"},{"@pid":"66/3605","text":"Soon-il Kwon"},{"@pid":"32/10757","text":"Mi Young Lee"},{"@pid":"b/SungWookBaik","text":"Sung Wook Baik"}]},"title":"Determining speaker attributes from stress-affected speech in emergency situations with hybrid SVM-DNN architecture.","venue":"Multim. Tools Appl.","volume":"77","number":"4","pages":"4883-4907","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AhmadSRKLB18","doi":"10.1007/S11042-016-4041-7","ee":"https://doi.org/10.1007/s11042-016-4041-7","url":"https://dblp.org/rec/journals/mta/AhmadSRKLB18"}, "url":"URL#2453163" }, { "@score":"1", "@id":"2453164", "info":{"authors":{"author":[{"@pid":"159/6520","text":"Ali Ahmadvand"},{"@pid":"11/1373","text":"Mohammad Reza Daliri"},{"@pid":"205/3142","text":"Sayyed M. Zahiri"}]},"title":"Segmentation of brain MR images using a proper combination of DCS based method with MRF.","venue":"Multim. Tools Appl.","volume":"77","number":"7","pages":"8001-8018","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AhmadvandDZ18","doi":"10.1007/S11042-017-4696-8","ee":"https://doi.org/10.1007/s11042-017-4696-8","url":"https://dblp.org/rec/journals/mta/AhmadvandDZ18"}, "url":"URL#2453164" }, { "@score":"1", "@id":"2453165", "info":{"authors":{"author":[{"@pid":"224/7440","text":"Afsheen Ahmed"},{"@pid":"93/7081","text":"Rabia Latif"},{"@pid":"11/2132","text":"Seemab Latif"},{"@pid":"04/7436","text":"Haider Abbas"},{"@pid":"60/2458","text":"Farrukh Aslam Khan"}]},"title":"Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review.","venue":"Multim. Tools Appl.","volume":"77","number":"17","pages":"21947-21965","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AhmedLLAK18","doi":"10.1007/S11042-017-5540-X","ee":"https://doi.org/10.1007/s11042-017-5540-x","url":"https://dblp.org/rec/journals/mta/AhmedLLAK18"}, "url":"URL#2453165" }, { "@score":"1", "@id":"2453166", "info":{"authors":{"author":[{"@pid":"218/2623","text":"Ramsha Ahmed"},{"@pid":"123/2238","text":"Muhammad Mohsin Riaz"},{"@pid":"60/1980","text":"Abdul Ghafoor"}]},"title":"Attack resistant watermarking technique based on fast curvelet transform and Robust Principal Component Analysis.","venue":"Multim. Tools Appl.","volume":"77","number":"8","pages":"9443-9453","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AhmedRG18","doi":"10.1007/S11042-017-5128-5","ee":"https://doi.org/10.1007/s11042-017-5128-5","url":"https://dblp.org/rec/journals/mta/AhmedRG18"}, "url":"URL#2453166" }, { "@score":"1", "@id":"2453167", "info":{"authors":{"author":[{"@pid":"13/350","text":"Tauheed Ahmed"},{"@pid":"49/3071","text":"Monalisa Sarma"}]},"title":"An advanced fingerprint matching using minutiae-based indirect local features.","venue":"Multim. Tools Appl.","volume":"77","number":"15","pages":"19931-19950","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AhmedS18","doi":"10.1007/S11042-017-5444-9","ee":"https://doi.org/10.1007/s11042-017-5444-9","url":"https://dblp.org/rec/journals/mta/AhmedS18"}, "url":"URL#2453167" }, { "@score":"1", "@id":"2453168", "info":{"authors":{"author":[{"@pid":"207/0951","text":"N. Aishwarya"},{"@pid":"207/1151","text":"C. Bennila Thangammal"}]},"title":"An image fusion framework using morphology and sparse representation.","venue":"Multim. Tools Appl.","volume":"77","number":"8","pages":"9719-9736","year":"2018","type":"Journal Articles","access":"closed","key":"journals/mta/AishwaryaT18","doi":"10.1007/S11042-017-5562-4","ee":"https://doi.org/10.1007/s11042-017-5562-4","url":"https://dblp.org/rec/journals/mta/AishwaryaT18"}, "url":"URL#2453168" } ] } } } )