default search action
International Journal of Information and Communication Technology, Volume 14
Volume 14, Number 1, 2019
- Mei Zhang, Xingxing Peng:
Detection and filling of pseudo-hole in complex curved surface objects. 1-15 - Simin Mo, Jianchao Zeng, Weibin Xu, Chaoli Sun:
A modified extended particle swarm optimisation algorithm to solve the directing orbits of chaotic systems. 16-30 - Sara Tedmori:
Privacy preserving method for knowledge discovered by data mining. 31-45 - Zhenghua Xin, Ma Lu, Guolong Chen, Hong Li, Qixiang Song, Meng Xiao, Liangyi Hu:
Design and development of smart fishing poles using ICT enabled systems. 46-57 - Aidong Xu, Lefeng Cheng, Xiaobin Guo, Ganyang Jian, Tao Yu, Wenxiao Wei, Li Yu:
Development and application research of smart distribution district based on IDTT-B new-type transformer terminal unit. 58-80 - Zhi Bai, Yigang He:
Recognition of the anti-collision algorithm for RFID systems based on tag grouping. 81-88 - Abdallah Meraoumia, Hakim Bendjenna, Salim Chitroub:
Towards a robust palmprint representation for person identification. 89-109 - Peng Wang, Ke Gong, Shuai-Bin Lian, Qiu-Ju Sun, Wen-Xia Huang:
Robust adaptive array processing based on modified multistage Wiener filter algorithm. 110-124
Volume 14, Number 2, 2019
- Shivangi Surati, Devesh C. Jinwala, Sanjay Garg:
Improving multidimensional point query search using multi-way peer-to-peer tree network. 125-138 - Fotios Gioulekas, Constantinos Petrou, Athanasios Vgenis, Michael K. Birbas:
Low-complexity LDPC-convolutional codes based on cyclically shifted identity matrices. 139-158 - Na Li, Nitaigour Premchand Mahalik:
A big data and cloud computing specification, standards and architecture: agricultural and food informatics. 159-174 - Anvar Narzullaev, Mohd Hasan Selamat, Khaironi Yatim Sharif, Zahriddin Muminov:
Wi-Fi received signal strength-based hyperbolic location estimation for indoor positioning systems. 175-188 - Ying Zhang, Jiajun Li, Baofei Xia:
Design and implementation of ITS information acquisition system under IoS environment. 189-203 - Changyu Li, Yang Zhao:
Traffic route optimisation based on clouding computing parallel ACS. 204-217 - Hirokazu Ozaki:
Optimal configuration of M-for-N shared spare-server systems. 218-235 - Liandong Lin, Cheng-Jun Qiu:
Target coverage algorithm with energy constraint for wireless sensor networks. 236-250 - Zhixiang Hou, Jiakun Gao:
Safety message data transmission model and congestion control scheme in VANET. 251-261
Volume 14, Number 3, 2019
- Zaineb Bahaoui, Hakim el Fadili, Khalid Zenkouar, Hassan Qjidaa, Arsalane Zarghili:
Image analysis by efficient Gegenbauer moments computation for 3D objects reconstruction. 263-276 - Aymen Ghilen, Mostafa Azizi:
Integration of a quantum scheme for key distribution and authentication within EAP-TLS protocol. 277-294 - Yun Wu, Zuoxun Zeng:
A rapid detection method of earthquake infrasonic wave based on decision-making tree and the BP neural network. 295-307 - Nattiya Khaitiyakun, Teerapat Sanguankotchakorn, Kanchana Kanchanasut:
Data dissemination on MANET by repeatedly transmission via CDN nodes. 308-326 - Chaoping Guo, Xiaoyan Li, Wei Li, Hongyang Li:
Suboptimal joint user equipment pairing and power control for device-to-device communications underlaying cellular networks. 327-335 - Sourour Maalem, Nacereddine Zarour:
A cognitive approach of collaborative requirements validation based on action theory. 336-355 - Lingxiao Huang, Lanxiang Zheng, Hefang Jing, Xuande Zhang, Chunguang Li:
Approach to terrain pretreatment for the Yazidang reservoir based on image processing. 356-372 - Zhi-ying Xu, YiJiang Zhang:
A novel imbalanced data classification algorithm based on fuzzy rule. 373-384
Volume 14, Number 4, 2019
- Long Pan, Jiwei Qin, Liejun Wang:
A personalised recommendation algorithm based on probabilistic neural networks. 385-402 - Sridevi Saralaya, Rio G. L. D'Souza, Vishwas Saralaya:
Temporal impact analysis and adaptation for service-based systems. 403-426 - Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui:
Considering the environment's characteristics in wireless networks simulations: case of the simulator NS2 and the WSN. 427-438 - Maarouf Korichi, Abdallah Meraoumia, Kamal Eddine Aiadi:
Improved biometric identification system using a new scheme of 3D local binary pattern. 439-455 - Changyun Li, Qingqing Zhang, Pinjie He, Zhibing Wang, Li Chen:
An agricultural data storage mechanism based on HBase. 456-469 - Jafar Abukhait, Ma'en Saleh:
A real-time multi-agent system for cryptographic key generation using imaging-based textural features. 470-484 - Zheng Yu, Dangdang Dai, Zhiyong Zha, Yixi Wang, Hao Feng:
Research on equalisation scheduling algorithm for network channel under the impact of big data. 485-498 - Jiwei Qin, Qinghua Zheng:
Modelling of learner behaviour in massive open online video-on-demand services. 499-511
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.