


default search action
Intelligent Automation & Soft Computing, Volume 22
Volume 22, Number 1, 2016
- Ouiem Bchir, Mohamed Maher Ben Ismail:

Generic Evaluation Metrics for Hyperspectral Data Unmixing. 1-16 - Mingxin Hou, Li Jiang, Hong Liu, Zhaopeng Chen:

Signal Processing for Noise and Online Force Modeling Detection for a Robot Hand Based on EtherCAT Communication. 17-31 - A. Sureshkumar, S. Muruganand, P. Balakrishnan:

Design and Development of a Virtual Instrument for Hazardous Environment Monitoring and Control Using Lab VIEW. 33-44 - Behrooz Safarinejadian, Mohiyeddin Mozaffari

:
Mobile Agent Based Distributed EM Algorithm For Data Clustering In Sensor Networks. 45-60 - Li Wang, Xiaoning Zhu, Zhengyu Xie:

Rail Mounted Gantry Crane Scheduling In Rail-Truck Transshipment Terminal. 61-73 - Muhammad Asif

, Attaullah Y. Memon
, Muhammad Junaid Khan:
Output Feedback Control For Trajectory Tracking Of Wheeled Mobile Robot. 75-87 - Dong Huang, Yong Yang, Lun Tang, Ju Zhang, Xiang Wang:

A Joint Optimal Hand-Off And Stability Methodology In Multi-Flow Priority-Based Heterogeneous Networks. 89-96 - Hei-Chia Wang, Che-Tsung Yang

:
Enhanced Particle Swarm Optimization With Self-Adaptation Based On Fitness-Weighted Acceleration Coefficients. 97-110 - Wei-Dong Xie, Zhijun Fu, Wen-Fang Xie:

Adaptive Nonlinear Systems Identification via Discrete Multi-Time Scales Dynamic Neural Networks. 111-123 - Othman M.-K. Alsmadi, Za'er Salim Abo-Hammour, Dia I. Abu-Al-Nadi, Saleh Saraireh:

Soft Computing Techniques for Reduced Order Modelling: Review and Application. 125-142 - Dong Huang, Yong Yang, Lun Tang, Ju Zhang, Xiang Wang:

An Approximation Method Of Optimal Scheduling For Multicommodity Flows In Cloud-Service Scenarios. 143-152 - Damien Ennis, Sergiu M. Dascalu, Frederick C. Harris Jr.

:
Leveraging Clustering Techniques to Facilitate Metagenomic Analysis. 153-165
Volume 22, Number 2, 2016
Articles
- Adeleke Raheem Ajiboye, Ruzaini Abdullah Arshah

, Hongwu Qin:
Using an Enhanced Feed-Forward BP Network for Predictive Model Building from Students' Data. 169-175
- Erik Cuevas, Eduardo Santuario, Daniel Zaldivar, Marco Antonio Pérez Cisneros

:
An Improved Evolutionary Algorithm for Reducing the Number of Function Evaluations. 177-192
- Masumeh Maleki, Nasim Nourafza, Saeed Setayeshi

:
A Novel Approach for Designing a Cognitive Sugarscape Cellular Society Using An Extended Moren Network. 193-201 - R. Rohini, R. K. Gnanamurthy

:
Performance Analysis to Improve Quality of Service Using Cluster Based Hidden Node Detection Algorithm in Wireless Sensor Networks. 203-209 - Delbert Tesar:

Next Wave of Technology. 211-225
- Dong Ren, Simon X. Yang

:
Intelligent Automation with Applications to Agriculture. 227-228 - Songjian Dan, Simon X. Yang

, Fengchun Tian, Lie Den:
Classification of Orange Growing Locations Based on the Near-infrared Spectroscopy Using Data Mining. 229-236 - Wei Wei, Wenbin Wu, Zhengguo Li, Peng Yang, Qingbo Zhou:

Selecting the Optimal NDVI Time-Series Reconstruction Technique for Crop Phenology Detection. 237-247 - Shun Ren, Haiye Yu, Linlin Wang, Lei Zhang:

Clustering Detection Algorithm of Plant Leaf Relative Lesion Area Based on Improved GA. 249-254 - Huifang Wang, Zhiguo Huo, Guangsheng Zhou, Li Wu, Haikuan Feng

:
Monitoring and Forecasting Winter Wheat Freeze Injury and Yield from Multi-Temporal Remotely Sensed Data. 255-260 - Kai Ma, Jihua Wang, Zehua Chen, Xiaobo Zhu, Ligang Pan:

A Method for Extending the Geostatistical Functions in Spatial Information Processing. 261-266 - Tingyao Jiang, Peng Lei, Qin Qin:

An Application of SVM-Based Classification in Landslide Stability. 267-271 - Tao Huang

, Ying Gu, Jiang Liu, Yunjie Liu:
Time Efficient Virtual Network Embedding Algorithm. 273-280 - Xiaobo Ding, Zhong Ma, Xinfa Dai:

Scheduling Parallel Soft Real-Time VM in Dynamic Workloads. 281-287 - Anping Xiong, Chunxiang Xu:

Cloud Storage Access Control Scheme of Ciphertext Algorithm Based on Digital Envelope. 289-294 - Yousheng Zhou, Han Guo, Feng Wang, Wenjun Luo:

Multi-Key Searchable Encryption with Designated Server. 295-301 - Kai Wang, Youjin Zhao, Qingyu Xiong, Xiling Shen, Min Fan, Min Gao

:
Video Recognition of Human Fall Based on Spatiotemporal Features. 303-309 - Li Fei, Aina Qin:

A New Simpler Third-Order Chaotic System and its Circuit Implementation. 311-316 - Lvwen Huang, Dongjian He, Zhiyong Zhang, Peng Zhang:

Path Navigation For Indoor Robot With Q-Learning. 317-323 - Xiaohui Chen

, Mengjiao Zhang, Kai Ruan, Canfeng Gong, Yinyin Zhang, Simon X. Yang
:
A Ranging Model Based on BP Neural Network. 325-329 - Jun Yang

, Hong Zhang
, Jianting Zhou, Bojian Xu, Aicheng Shan:
Discussing the Initial Temperature Difference Correction Method for Vibrational Chord Strain Gauge in Bridge Construction Monitoring. 331-339
Volume 22, Number 3, 2016
Special Section on Advanced Technologies for Homeland and Cyber Defense
- Ravi S. Sandhu:

Foreword. 341 - Ilsun You, Gansen Zhao, Ram Krishnan

:
Special Section on Advanced Technologies for Homeland and Cyber Defense. 343-344 - Hongyang Yan, Jin Li, Xuan Li, Gansen Zhao, Sun-Young Lee, Jian Shen:

Secure Access Control of E-Health System with Attribute-Based Encryption. 345-352 - YongJe Choi, Dooho Choi

, Hoonjae Lee, JaeCheol Ha:
An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation. 353-363 - Minwoo Kim, Jihyun Bang, Taekyoung Kwon:

LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices. 365-369 - In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Minsoo Ryu, Eul Gyu Im:

Malware Analysis and Classification Using Sequence Alignments. 371-377 - Suwan Park, Changho Seo, Jeong Hyun Yi

:
Cyber threats to mobile messenger apps from identity cloning. 379-387 - Tianhan Gao, Ling Tan, Peiyu Qiao, Kangbin Yim:

An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network. 389-396 - Yijun Mao, Yue Zhang

, Min-Rong Chen, Yongbiao Li, Yiju Zhan:
Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense. 397-403 - In-Hyun Cho, Kyungho Lee:

Advanced Risk Measurement Approach to Insider Threats in Cyberspace. 405-413 - Chin-Ling Chen, Yeong-Lin Lai, Chih-Cheng Chen, Chunyi Zheng, Li-Chih Chang:

A Non-Repudiated and Intelligent RFID Medication Safety Management System. 415-421 - Kun-Lin Tsai

, Fang-Yie Leu, Shun-Hung Tsai
:
Data Encryption Method Using Environmental Secret Key with Server Assistance. 423-430
- Zhen Ma, De-gan Zhang, Si Liu, Wen-bin Li:

New AODV Routing Method for Mobile Wireless Mesh Network (MWMN). 431-438 - Nwe Nwe Htay Win, Mingcheng Qu, Gang Cui, Saif-Ur Rehman, Xiufeng Wang:

Service Level Agreement Mapping and Provider Selection Using Annotated Semantic Information to WS-Agreement. 439-448 - Haruna Chiroma, Sameem Abdul Kareem

, Ahmad Shukri Mohd Noor
, Adamu I. Abubakar, Nader Sohrabi Safa
, Nor Liyana Mohd Shuib
, Mukhtar Fatihu Hamza, Abdulsalam Ya'u Gital, Tutut Herawan
:
A Review on Artificial Intelligence Methodologies for the Forecasting of Crude Oil Price. 449-462 - Zafer Civelek, Murat Lüy

, Ertugrul Çam
, Necaattin Barisçi
:
Control of Pitch Angle of Wind Turbine by Fuzzy Pid Controller. 463-471 - Chaohui Wang, Jian-qiang Wang:

A multi-criteria decision-making method based on triangular intuitionistic fuzzy preference information. 473-482 - Hongbo Zhang, Qing Lei, Bineng Zhong, Ji-Xiang Du, Jialin Peng

:
A Survey on Human Pose Estimation. 483-489 - Alma Y. Alanis

:
Real-Time Implementation of a Discrete Reduced Order Neural Observer: Linear Induction Motors Application. 491-498 - Omar Aguilar-Mejía

, Rubén Tapia-Olvera
, Antonio Valderrabano-Gonzalez
, Iván Rivas-Cambero
:
Adaptive neural network control of chaos in permanent magnet synchronous motor. 499-507 - Syafizwan Faroque, Ben Horan

, Husaini Adam, Mulyoto Pangestu
, Matthew A. Joordens
:
Haptic Technology for Micro-robotic Cell Injection Training Systems - A Review. 509-523 - Zhehuang Huang

, Yidong Chen:
An Integration Model of Semantic Annotation Based on Synergetic Neural Network. 525-532
Volume 22, Number 4, 2016
- Tao Huang

, Xiaonv Hu, Simon X. Yang
:
Networks based computing and automation. 533-534
- Hongyong Jia, Yue Chen, Julong Lan, Wei Yue, Zhiwei Wang:

Group-based fast data packet attribute authentication in the reconfigurable networks. 535-542 - Jiang Liu, Tao Huang

, Yuanming Xin, Jiannan Zhang, F. Richard Yu
, Yunjie Liu:
VLAN-reusing: A novel solution for efficient network virtualization. 543-549 - Wenbo Hu, Tao Huang

, Jian Ding, Jian Wang, Jiang Liu, Yunjie Liu:
Towards consistency of virtual machine migration in Software-Defined Network. 551-560 - Xiaolan Xie, Ruikun Liu, Xiaochun Cheng

, Xin Hu, Jinsheng Ni:
Trust-Driven and PSO-SFLA based job scheduling algorithm on Cloud. 561-566 - Lei Yang, Yu Dai, Bin Zhang:

Characterizing performance interference for performance crisis mitigation in the virtualized environment. 567-578 - Chunyan An

, Jiantao Zhou, Shuai Liu
, Kurt Geihs
:
A multi-tenant hierarchical modeling for cloud computing workload. 579-586 - Xiao Chen, Jian-Hui Jiang:

A method of virtual machine placement for fault-tolerant cloud applications. 587-597 - Jianjun Lei, Haiyang Bi, Ying Xia, Jun Huang, Hae-Young Bae:

An in-network data cleaning approach for wireless sensor networks. 599-604 - Xujie Li, HongLang Zhang, Wenna Zhang, Feng Yan:

A call admission control scheme on the uplink of D2D communications underlaying cellular networks. 605-612 - Mingxiang Guan, Le Wang, Liming Chen:

Channel allocation for hot spot areas in HAPS communication based on the prediction of mobile user characteristics. 613-620 - Junfeng Tian, Hongqiang Jiao:

A kind of dynamic software behavior trust model based on improved subjective logic. 621-629 - Bin Zhao, Jingsha He, Yixuan Zhang, Gongzheng Liu, Peng Zhai, Na Huang, Ruohong Liu:

Dynamic trust evaluation in open networks. 631-638 - Wei-Jin Jiang, Yusheng Xu, Hong Guo, C. C. Wang, Lianmei Zhang:

Multi agent system-based dynamic trust calculation model and credit management mechanism of online trading. 639-649 - Yu Yao, Zhao Zhang, Wei Yang, Fuxiang Gao:

Influence of removable devices on worm propagation under pulse quarantine strategy. 651-666 - Zhixian Tang, Jun Feng

, Zhonghua Zhu, Yaqing Shi, Jiamin Lu
:
RH: An improved AMH aggregate query method. 667-673 - Yunpeng Xiao

, Xingyu Lu, Yanbing Liu:
A parallel and distributed algorithm for role discovery in large-scale social networks. 675-681

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














