Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 12
Volume 12, Number 1, January 2021
- Elhadi M. Shakshuki, Ansar-Ul-Haque Yasar:
Special issue on advances in data intelligence and modelling. 1-3 - Youssef Wageeh, Hussam El-Din Mohamed, Ali Fadl, Omar Anas, Noha ElMasry, Ayman Nabil, Ayman Atia:
YOLO fish detection with Euclidean tracking in fish farms. 5-12 - Husnu S. Narman, Haroon Malik, Govind Yatnalkar:
An enhanced ride sharing model based on human characteristics, machine learning recommender system, and user threshold time. 13-26 - Binh Minh Nguyen, Bao Hoang, Thieu Nguyen, Giang Nguyen:
nQSV-Net: a novel queuing search variant for global space search and workload modeling. 27-46 - Selvine G. Mathias, Sebastian Schmied, Daniel Grossmann:
A framework for monitoring multiple databases in industries using OPC UA. 47-56 - Sebastian Handrich, Laslo Dinges, Ayoub Al-Hamadi, Philipp Werner, Frerk Saxen, Zaher Al Aghbari:
Simultaneous prediction of valence / arousal and emotion categories and its application in an HRC scenario. 57-73 - Wadii Basmi, Azedine Boulmakoul, Lamia Karim, Ahmed Lbath:
Distributed and scalable platform architecture for smart cities complex events data collection: Covid19 pandemic use case. 75-83 - Siham G. Farrag, Nabil Sahli, Moulay Youssef El-Hansali, Elhadi M. Shakshuki, Ansar Yasar, Haroon Malik:
STIMF: a smart traffic incident management framework. 85-101 - Luk Knapen, Johan Holmgren:
Optimal bicycle trip impediments resolution by data fusion. 103-120 - Ruurd Buijs, Thomas Koch, Elenna R. Dugundji:
Using neural nets to predict transportation mode choice: Amsterdam network change analysis. 121-135 - Jullian van Kampen, Eric J. Pauwels, Rob van der Mei, Elenna R. Dugundji:
Understanding the relation between travel duration and station choice behavior of cyclists in the metropolitan region of Amsterdam. 137-145 - Chao Chen, Flora D. Salim, Luís Moreira-Matias, Sha Zhao:
Special issue on vehicles as sensing devices: from observations to actionable insights. 147-149 - Osman Abul, Batuhan Karatas:
Can driving patterns predict identity and gender? 151-166 - Yong Wang, Zhiqiang Zhang, Dong Liu:
An optimization model for the transportation network with hierarchical structure: the case of China Post. 167-182 - Chaohu Luo, Xi Yu, Wenjuan Luo, Manman Zhang, Taolue Long, Qingshan Wang, Qi Wang, Wei Huang:
A moving energy-based routing in DTNs with speed heterogeneity. 183-192 - Xuli Rao, Feng Lin, Zhide Chen, Jiaxu Zhao:
Distracted driving recognition method based on deep convolutional neural network. 193-200 - Jianpei Zhang, Qing Yang, Yiran Shen, Yong Wang, Xu Yang, Bo Wei:
A differential privacy based probabilistic mechanism for mobility datasets releasing. 201-212 - Wenjian Yang, Yu-e Sun, He Huang, Yang Du, Danlei Huang, Tao Tao, Yonglong Luo:
Persistent transportation traffic volume estimation with differential privacy. 213-231 - Lingqiu Zeng, Guangyan He, Qingwen Han, Sheng Cheng, Lei Ye, Xiaochang Hu:
RRCF: an abnormal pulse diagnosis factor for road abnormal hotspots detection. 233-243 - Hongju Cheng, Leihuo Wu, Ruixing Li, Fangwan Huang, Chunyu Tu, Zhiyong Yu:
Data recovery in wireless sensor networks based on attribute correlation and extremely randomized trees. 245-259
- Ke Xiao, Kai Liu, Xincao Xu, Yi Zhou, Liang Feng:
Efficient fog-assisted heterogeneous data services in software defined VANETs. 261-273 - Safa Saadaoui, Aamre Khalil, Mohamed Tabaa, Mouhamad Chehaitly, Fabrice Monteiro, Abbas Dandache:
Improved many-to-one architecture based on discrete wavelet packet transform for industrial IoT applications using channel coding. 275-283 - Sumedha Arora, Anju Bala:
An ensembled data frequency prediction based framework for fast processing using hybrid cache optimization. 285-301 - Akshay Rameshbhai Gupta, Jitendra Agrawal:
The multi-demeanor fusion based robust intrusion detection system for anomaly and misuse detection in computer networks. 303-319 - Enas F. Rawashdeh, Ibrahim Aljarah, Hossam Faris:
A cooperative coevolutionary method for optimizing random weight networks and its application for medical classification problems. 321-342 - Manali Gupta, Shirshu Varma:
Optimal placement of UAVs of an aerial mesh network in an emergency situation. 343-358 - Emmanuel Fokides:
My avatar and I. A study on avatars, personality traits, self-attributes, and their perceived importance. 359-373 - S. R. Balaji, S. Karthikeyan, R. Manikandan:
Object detection using Metaheuristic algorithm for volley ball sports application. 375-385 - Anuradha Banerjee, Abu Sufian:
Smart-Green-Mult (SGM): overhear from topological kingpins in software defined wireless sensor networks. 387-404 - Anandhi Bagirathan, Jerritta Selvaraj, Anusuya Gurusamy, Himangshu Das:
Recognition of positive and negative valence states in children with autism spectrum disorder (ASD) using discrete wavelet transform (DWT) analysis of electrocardiogram signals (ECG). 405-416 - J. Jithish, Sriram Sankaran, Krishnashree Achuthan:
A Decision-centric approach for secure and energy-efficient cyber-physical systems. 417-441 - Zheng-Yi Chai, Ya-Lun Li, Sifeng Zhu:
P-MOIA-RS: a multi-objective optimization and decision-making algorithm for recommendation systems. 443-454 - Sindhu Devunooru, Abeer Alsadoon, P. W. Chandana Prasad, Azam Beg:
Deep learning neural networks for medical image segmentation of brain tumours for diagnosis: a recent review and taxonomy. 455-483 - M. Mohamed Divan Masood, A. R. Arunarani, D. Manjula, Vijayan Sugumaran:
An efficient algorithm for identifying (ℓ, d) motif from huge DNA datasets. 485-495 - Anna Drewek-Ossowicka, Mariusz Pietrolaj, Jacek Ruminski:
A survey of neural networks usage for intrusion detection systems. 497-514 - Hossein Abbasimehr, Mostafa Shabani:
A new framework for predicting customer behavior in terms of RFM by considering the temporal aspect based on time series techniques. 515-531 - Geetanjali Rathee, M. Balasaraswathi, K. Prabhu Chandran, Sharmi Dev Gupta, C. S. Boopathi:
A secure IoT sensors communication in industry 4.0 using blockchain technology. 533-545 - Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Muhammad Najam-ul-Islam, Saleem Iqbal, Arsalan Arshad:
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. 547-566 - Luca Greco, Pierluigi Ritrovato, Mario Vento:
On the use of semantic technologies for video analytics. 567-587 - Hoill Jung, Kyungyong Chung:
Social mining-based clustering process for big-data integration. 589-600 - Barbara Cardone, Ferdinando Di Martino:
GIS-based hierarchical fuzzy multicriteria decision-making method for urban planning. 601-615 - Tao Wang, Jinyan Cai, Yafeng Meng, Sai Zhu, Meng Lv, Zexi Li:
Reliability evaluation method for warm standby embryonic cellular array. 617-634 - Montadar Abas Taher, Hussein Sultan Radhi, Ahmed K. Jameil:
Enhanced F-OFDM candidate for 5G applications. 635-652 - Mohammed Azmi Al-Betar:
A β-hill climbing optimizer for examination timetabling problem. 653-666 - Iztok Fister Jr., Dusan Fister, Iztok Fister:
Topology-based generation of sport training sessions. 667-678 - Mohammed Amine Benmahdjoub, Abdelkader Mezouar, Larbi Boumediene, Youcef Saidi:
Transport electrification based on embedded electrical network and smart synchronization device. 679-690 - Monalisa Mishra, Prasenjit Choudhury, Bibudhendu Pati:
Modified ride-NN optimizer for the IoT based plant disease detection. 691-703 - Jiandong Zhou, Xiang Li:
Multi-period mean-semi-entropy portfolio management with transaction costs and bankruptcy control. 705-715 - Bandar Alotaibi, Munif Alotaibi:
Consensus and majority vote feature selection methods and a detection technique for web phishing. 717-727 - Ye Jiang, Qiong Zhou, Shuyan Xiao, Minqian Qian, Zhaoneng Jiang, Jian Liu, Wenfei Yin, Lu Jia:
Optimized deployment method and performance evaluation of gas sensor network based on field experiment. 729-744 - Jinghua Zhao, Da-Lin Zeng, Shuang Liang, Huilin Kang, Qinming Liu:
Prediction model for stock price trend based on recurrent neural network. 745-753 - Shasha Li, Tiejun Cui:
Research on the system function-structure analysis based on its implicit relation. 755-767 - E. Arul:
Deep nonlinear regression least squares polynomial fit to detect malicious attack on IoT devices. 769-779 - (Withdrawn) Parallel deep convolutional neural network for content based medical image retrieval. 781-795
- Jun Cai, Shunxiang Zhang, Hongze Zhu, Guangli Zhu:
Building the summarization model of micro-blog topic. 797-809 - Ravi Gatti, Shivashankar:
Improved resource allocation scheme for optimizing the performance of cell-edge users in LTE-A system. 811-819 - Md. Al Maruf, Akramul Azim:
Requirements-preserving design automation for multiprocessor embedded system applications. 821-833 - Jayalekshmi Sumathi, R. Leela Velusamy:
A review on distributed cluster based routing approaches in mobile wireless sensor networks. 835-849 - Maysam Abbasi, Ehsan Abbasi, Behnam Mohammadi-Ivatloo:
Single and multi-objective optimal power flow using a new differential-based harmony search algorithm. 851-871 - Songyut Phoemphon, Chakchai So-In, Phet Aimtongkham, Tri Gia Nguyen:
An energy-efficient fuzzy-based scheme for unequal multihop clustering in wireless sensor networks. 873-895 - B. Pandeeswari, Sutha Joypaul, Parvathy Meenakshi Sundaram:
A novel synthetic aperture radar image change detection system using radial basis function-based deep convolutional neural network. 897-910 - Jizhou Zhu, Wenqian Liu, Yuan Liu, Di Wang, Shan Qu, Ya-Qiong Duan, Jie Yao:
Smart city oriented optimization of residential blocks on intensive urban sensing data based on fuzzy evaluation algorithm. 911-921 - Xiren Li:
Artificial intelligence neural network based on intelligent diagnosis. 923-931 - Yaoyao He, Jinhong Wan:
Flood hazard assessment based on fuzzy clustering iterative model and chaotic particle swarm optimization. 933-942 - Anwesha Mukherjee, Shreya Ghosh, Aabhas Behere, Soumya K. Ghosh, Rajkumar Buyya:
Internet of Health Things (IoHT) for personalized health care using integrated edge-fog-cloud network. 943-959 - Mohsen Alizadeh Bidgoli, Ali Reza Payravi, Ali Ahmadian, Weijia Yang:
Optimal day-ahead scheduling of autonomous operation for the hybrid micro-grid including PV, WT, diesel generator, and pump as turbine system. 961-977 - J. Govindarajan, G. Kousalya:
Cooperative flow regulation protocol for real-time and non-real-time applications over satellite network. 979-990 - Jayavignesh Thyagarajan, Suganthi Kulanthaivelu:
A joint hybrid corona based opportunistic routing design with quasi mobile sink for IoT based wireless sensor network. 991-1009 - Zhoufeng Wang, Jianwei Xu, Yujun Wang, Xiangqi He:
Study of the key technology on the Geo-hazard spatial information sharing platform in Meizoseismal Region of Wenchuan Earthquake Zone. 1011-1022 - I-Ching Hsu, Chun-Cheng Chang:
Integrating machine learning and open data into social Chatbot for filtering information rumor. 1023-1037 - Kiran Khatter:
Interval valued trapezoidal neutrosophic set: multi-attribute decision making for prioritization of non-functional requirements. 1039-1055 - Siddharth Bhalerao, Irshad Ahmad Ansari, Anil Kumar:
A secure image watermarking for tamper detection and localization. 1057-1068 - Tejeswara Rao Nartu, Mani Sankar Matta, Surapu Prasada Rao, Boddepalli Srinivasa Rao:
Comparative study of Pareto optimal multi objective cuckoo search algorithm and multi objective particle swarm optimization for power loss minimization incorporating UPFC. 1069-1080 - Pankaj Upadhyay, Jitender Kumar Chhabra:
Multilevel thresholding based image segmentation using new multistage hybrid optimization algorithm. 1081-1098 - Jagdish Chand Bansal, Shitu Singh:
A better exploration strategy in Grey Wolf Optimizer. 1099-1118 - Mat Hussin Ab Talib, Intan Zaurah Mat Darus, Pakharuddin Mohd. Samin, Hanim Mohd Yatim, Mohd Ibthisham Ardani, Nik Mohd Ridzuan Shaharuddin, Muhamad Sukri Hadi:
Vibration control of semi-active suspension system using PID controller with advanced firefly algorithm and particle swarm optimization. 1119-1137 - Anagha Rajput, Vinoth Babu Kumaravelu:
FCM clustering and FLS based CH selection to enhance sustainability of wireless sensor networks for environmental monitoring applications. 1139-1159 - Arpit Jain, Ashok Kumar:
Desmogging of still smoggy images using a novel channel prior. 1161-1177 - Trang Hong Son, Tran Van Lang, Nguyen Huynh Tuong, Ameur Soukhal:
Resolution for bounded-splitting jobs scheduling problem on a single machine in available time-windows. 1179-1196 - Kalimuthu Vivekanandan, Narayanan Praveena:
Hybrid convolutional neural network (CNN) and long-short term memory (LSTM) based deep learning model for detecting shilling attack in the social-aware network. 1197-1210 - N. Hemavathy, P. Indumathi:
Deep learning-based hybrid dynamic biased track (DL-HDBT) routing for under water acoustic sensor networks. 1211-1225 - Sohan Kumar Pande, Sanjaya Kumar Panda, Satyabrata Das:
Dynamic service migration and resource management for vehicular clouds. 1227-1247 - Ankit Thakkar, Ritika Lohiya:
Attack classification using feature selection techniques: a comparative study. 1249-1266 - Saugata Roy, Nabajyoti Mazumdar, Rajendra Pamula:
An energy and coverage sensitive approach to hierarchical data collection for mobile sink based wireless sensor networks. 1267-1291 - (Withdrawn) Hybrid Grey Wolf: Bald Eagle search optimized support vector regression for traffic flow forecasting. 1293-1304
- Lin Lin:
Low power consumption and reliability of wireless communication network in intelligent parking system. 1305-1313 - Nebojsa Gavrilovic, Alok Mishra:
Software architecture of the internet of things (IoT) for smart city, healthcare and agriculture: analysis and improvement directions. 1315-1336 - Zexue Wang, Qidong Wan, Yangmei Qin, Senqing Fan, Zeyi Xiao:
Research on intelligent algorithm for alerting vehicle impact based on multi-agent deep reinforcement learning. 1337-1347 - K. Maheswari, T. Baranidharan, S. Karthik, T. Sumathi:
Modelling of F3I based feature selection approach for PCOS classification and prediction. 1349-1362 - Pratibha Mahajan, Pankaj Deep Kaur:
Three-tier IoT-edge-cloud (3T-IEC) architectural paradigm for real-time event recommendation in event-based social networks. 1363-1386 - Abhinav Bhandari, Krishan Kumar, Amrit Lal Sangal, Sunny Behal:
An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks. 1387-1406 - Atif Mahmood, Miss Laiha Mat Kiah, Saaidal Razalli Azzuhri, Muhammad Mustafa Kamal, Tillal Eldabi, Adnan N. Qureshi, Zati Hakim Azizul, Muhammad Reza Z'aba:
Wireless backhaul network's capacity optimization using time series forecasting approach. 1407-1418 - Shreeya Swagatika Sahoo, Sujata Mohanty, Banshidhar Majhi:
A secure three factor based authentication scheme for health care systems using IoT enabled devices. 1419-1434 - Kumar Debasis, M. P. Singh, Rajat Gupta:
An energy saving medium access control protocol for wireless sensor networks. 1435-1448 - Mohammad Pishnamazzadeh, Mohammad Mehdi Sepehri, Atefeh Panahi, Parisa Moodi:
Reallocation of unoccupied beds among requesting wards. 1449-1469 - Alok Kumar, Neha Bansal, Alwyn Roshan Pais:
A partial key pre-distribution based en-route filtering scheme for wireless sensor networks. 1471-1486 - Sahil Sholla, Roohie Naaz Mir, Mohammad Ahsan Chishti:
A neuro fuzzy system for incorporating ethics in the internet of things. 1487-1501 - R. Suganya, R. Kanagavalli:
Gradient flow-based deep residual networks for enhancing visibility of scenery images degraded by foggy weather conditions. 1503-1516 - Guoshen Ding, Yanli Qiao, Weining Yi, Wei Fang, Lili Du:
Fruit fly optimization algorithm based on a novel fluctuation model and its application in band selection for hyperspectral image. 1517-1539 - Tugçe Aydin, Serdar Enginoglu:
Interval-valued intuitionistic fuzzy parameterized interval-valued intuitionistic fuzzy soft sets and their application in decision-making. 1541-1558
Volume 12, Number 2, February 2021
- Mukaram Safaldin, Mohammed Otair, Laith Mohammad Abualigah:
Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. 1559-1576 - Abdolsalam Ghaderi, Morteza Momeni:
A multi-period maximal coverage model for locating simultaneous ground and air emergency medical services facilities. 1577-1600 - Mohammad Reza Keyvanpour, Mehrnoush Barani Shirzad, Samaneh Mehmandoost:
CID: a novel clustering-based database intrusion detection algorithm. 1601-1612 - Zahra Fereidooni, Hooman Tahayori, Ali Bahadori-Jahromi:
A hybrid model-based method for leak detection in large scale water distribution networks. 1613-1629 - Wael Mohammad Alenazy, Abdullah Saleh Alqahtani:
Gravitational search algorithm based optimized deep learning model with diverse set of features for facial expression recognition. 1631-1646 - Raj Vikram, Ditipriya Sinha, Debashis De, Ayan Kumar Das:
PAFF: predictive analytics on forest fire using compressed sensing based localized Ad Hoc wireless sensor networks. 1647-1665 - Xiaofeng Li, Dong Li, Yuanbei Deng, Jinming Xing:
Intelligent mining algorithm for complex medical data based on deep learning. 1667-1678 - Wahiba Larbi-Mezeghrane, Ali Larbi, Louiza Bouallouche-Medjkoune, Djamil Aïssani:
Geometric and decentralized approach for localization in wireless sensor network. 1679-1691 - Haibin Yu, Wenyan Jia, Li Zhang, Mian Pan, Yuanyuan Liu, Mingui Sun:
A hierarchical parallel fusion framework for egocentric ADL recognition based on discernment frame partitioning and belief coarsening. 1693-1715 - R. Thanga Selvi, I. Muthulakshmi:
Modelling the map reduce based optimal gradient boosted tree classification algorithm for diabetes mellitus diagnosis system. 1717-1730 - Abdelouahab Amira, Abdelouahid Derhab, ElMouatez Billah Karbab, Omar Nouali, Farrukh Aslam Khan:
TriDroid: a triage and classification framework for fast detection of mobile threats in android markets. 1731-1755 - V. Savitha, N. Karthikeyan, S. Karthik, R. Sabitha:
A distributed key authentication and OKM-ANFIS scheme based breast cancer prediction system in the IoT environment. 1757-1769 - Karesiddaiah Shobha, Nickolas Savarimuthu:
Clustering based imputation algorithm using unsupervised neural network for enhancing the quality of healthcare data. 1771-1781 - Afshin Abbaspour, Ali Jahan