


default search action
Information Technology and Control, Volume 49
Volume 49, Number 1, March 2020
- Masoud Barati:

A Formal Technique for Composing Cloud Services. 5-27 - Sezer Coban:

Improving Autonomous Performance of a Passive Morphing Fixed Wing UAV. 28-35 - Shaheen Khatoon

, Lamis Abu Romman:
Domain Independent Automatic Labeling system for Large-scale Social Data using Lexicon and Web-based Augmentation. 36-54 - Jerry Moravec:

Hand contour classification using evolutionary algorithm. 55-79 - Guochen Niu, Licheng Wang, Zheng Tan:

Mismatch Removal Based on Gaussian Mixture Model for Aircraft Surface Texture Mapping. 80-87 - Liviu Popescu:

Applications of Optimal Control to Production Planning. 89-99 - Zhipeng Qiu

:
A Method for Finding Constrained Driver Nodes in Target Control of Network. 100-112 - Imran Mujaddid Rabbani, Muhammad Aslam

, Ana María Martínez Enríquez, Zeeshan Qudeer:
Service Association Factor (SAF) for Cloud Service Selection and Recommendation. 113-126 - Mina Hosseini Rad, Majid Abdolrazzagh-Nezhad

:
Data Cube Clustering with Improved DBSCAN based on Fuzzy Logic and Genetic Algorithm. 127-143 - Lazar Rakovic

:
Shadow IT - Systematic Literature Review. 144-160 - Qiong Wu, Xiumei Fan, Wei Wei, Marcin Wozniak

:
Dynamic Scheduling Algorithm for Delay-Sensitive Vehicular Safety Applications in Cellular Network. 161-178 - Bin Zhou, Dongjun Ye, Wei Wei, Marcin Wozniak

:
Alternating Direction Projections onto Convex Sets for Super-Resolution Image Reconstruction. 179-190
Volume 49, Number 2, June 2020
- Lu-I Chen, Heng Ma:

Multiclass Membership Determination Integrating an ID-Bound Method with Bloom Filter. 197-205 - Mario Dudjak

, Goran Martinovic
:
An API-first methodology for designing a microservice-based Backend as a Service platform. 206-223 - Ivan D. Jokic, Stevan Jokic, Vlado Delic, Zoran Peric:

One Solution of Extension of Mel-Frequency Cepstral Coefficients Feature Vector for Automatic Speaker Recognition. 224-236 - Yuxiang Sheng, Huawei Ma, Wei Xia:

A Pointer Neural Network for the Vehicle Routing Problem with Task Priority and Limited Resources. 237-248 - Milu Philip:

A Quantitative Approach to Analyze Modifiability in Software Architectural Design of Agile Application Systems. 249-259 - T. Sampradeepraj

, S. P. Raja
:
On Improving Reliability in Multicast Routing Protocol for Wireless Sensor Network. 260-274 - Tomas Vileiniskis, Rita Butkiene:

Applying Semantic Role Labeling and Spreading Activation Techniques for Semantic Information Retrieval. 275-288 - Qi Xie, Gengguo Cheng, Xiao Zhang, Lei Peng:

Feature Selection Using Improved Forest Optimization Algorithm. 289-301 - Qi Zhang, Bin Liu

:
Switching Stabilization for Nonlinear Networked Control Systems with Delays and Packet Losses. 302-316 - Aixue Qi, Lei Ding, Wenbo Liu:

A Meminductor-based Chaotic System. 317-332 - Thiyagarajan Perumal:

STATISTICAL MARKOV MODEL BASED NATURAL INSPIRED GLOWWORM SWARM MULTI-OBJECTIVE OPTIMIZATION FOR ENERGY EFFICIENT DATA DELIVERY IN MANET. 333-347 - Jing Zhang, Guo Wei, Nan Zhao, Jinliang Wang, Lei Wang:

New Product Information Diffusion in Firm-Hosted Online Communities Based on User Influence. 348-377
Volume 49, Number 3, September 2020
- Jian Zhang, Yihou Min:

Four-classes Human Emotion Recognition Via Entropy Characteristic and Random Forest。. 285-298 - Zengguo Sun, Rui Shi, Wei Wei:

Synthetic-Aperture Radar Image Despeckling based on Improved Non-Local Means and Non-Subsampled Shearlet Transform. 299-307 - Dost Muhammad Khan, Talal Aslam, Nadeem Akhtar

, Salman Qadri, Imran Mujaddid Rabbani, Muhammad Aslam:
Black Hole Attack Prevention in Mobile Ad-hoc Network (MANET) using Ant Colony Optimization Technique. 308-319 - Ming Yue

, Yigao Ning:
WIP Vehicle Control Method Based on Improved Artificial Potential Field Subject to Multi-obstacle Environment. 320-334 - Yan Xu, Jiangtao Dong, Zishuo Han, Peiguang Wang:

Multichannel Correlation Clustering Target Detection. 335-345 - Sundarakrishnan, B. Jaison, S. P. Raja

:
Secured Color Image Compression based on Compressive Sampling and Lü System. 346-369 - R. Lakshmana Kumar

, N. Kannammal, Sujatha Krishnamoorthy, Seifedine Nimer Kadry:
Semantics Based Clustering through Cover-Kmeans with OntoVsm for Information Retrieval. 370-380 - Paulius Dapkus, Liudas Mazeika

, Vytautas Sliesoraitis:
A study of supervised combined neural-network-based ultrasonic method for reconstruction of spatial distribution of material properties. 381-394 - Qiannan Wu, Qianqian Zhang

, Ruizhi Sun, Li Li, Huiyu Mu
, Feiyu Shang:
Adaptive density peak clustering based on dimensional-free and reverse k-nearest neighbors. 395-411 - Ming Ren, Heyan Huang, Esmaiel Mirabdollahi:

Finite-Time Consensus Using an Adaptive Terminal Sliding Mode Control Subjected to Input Saturation. 412-420 - Genggeng Liu, Lin Xie, Chi-Hua Chen

:
Unsupervised Text Feature Learning via Deep Variational Auto-encoder. 421-437 - Haichuan Zhang, Jingwen Sun, Baolong Yang, Yinghu Shi, Zhanying Li

:
Optimal search and rescue route design using an improved ant colony optimization. 438-447
Volume 49, Number 4, December 2020
- Haoping Wang, Maobo Hu, Yang Tian, Ivan Simeonov

, Lyudmila Kabaivanova, Nikolai D. Christov
:
Kalman Filter based Newton Extremum Seeking Control for Maximum Gases Production Rates of Anaerobic Digestion Process. 455-463 - Yuh-Min Tseng, Jui-Di Wu, Sen-Shan Huang, Tung-Tso Tsai:

Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server. 464-481 - Jurgita Kapociute-Dzikiene, Senait Gebremichael Tesfagergish:

Part-of-Speech Tagging via Deep Neural Networks for Northern-Ethiopic Languages. 482-494 - Muhammad Mansoor, Zahoor-Ur Rehman

, Muhammad Shaheen
, Muhammad Attique Khan
, Mohamed Habib:
Deep Learning based Semantic Similarity Detection using Text Data. 495-510 - Mofeed Turky Rashid

, Abdulmuttalib Turky Rashid
, Ammar A. Aldair
:
Multi-Node Localization and Identity Estimation Based Multi-Beacon Searching Algorithm. 511-529 - Da Wang, Tianwen Sun, Yi Zhang:

Fractals analysis and control for a kind of three-species ecosystem with symmetrical coupled predatory behavior. 530-540 - Chunzhi Wang, Nataliya Shakhovska, Anatoliy Sachenko, Myroslav Komar:

A New Approach for Missing Data Imputation in Big Data Interface. 541-555 - P. Elamparithi

, K. Ruba Soundar
:
Trusted Sensing Model for Mobile Ad HoC Network Using Differential Evolution Algorithm. 556-563 - Jibran Mir, Azhar Mahmood

:
Movie Aspects Identification Model for Aspect Based Sentiment Analysis. 564-582 - Wala Zaaboub, Lotfi Tlig, Mounir Sayadi, Basel Solaiman:

Neural Network-based System for Automatic Passport Stamp Classification. 583-607 - Jingwei Li, Duanyu Teng, Jinwei Lin:

A Two-stage Strategy to Optimize Energy Consumption for Latency-critical Workload under QoS Constraint. 608-621 - Samuel Chen

, Shengyi Xie
, Qingqiang Chen
:
Integrated Embedding Approach for Knowledge Base Completion with CNN. 622-642

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














