


default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 13
Volume 13, Number 1, January 2022
- Avinash Chandra Pandey
, Ankur Kulhari, Deep Shikha Shukla:
Enhancing sentiment analysis using Roulette wheel selection based cuckoo search clustering method. 1-29 - Sneha Kanchan
, Garima Singh, Narendra S. Chaudhari:
SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems. 1-20 - Pratik Bhowal, Debanshu Banerjee
, Samir Malakar
, Ram Sarkar
:
A two-tier ensemble approach for writer dependent online signature verification. 21-40 - Nehal A. Mansour, Ahmed I. Saleh, Mahmoud Mohammed Badawy, Hesham A. Ali:
Accurate detection of Covid-19 patients based on Feature Correlated Naïve Bayes (FCNB) classification strategy. 41-73 - Jiuhong Yu, Mengfei Wang, Jinfan Liu, Karlo Abnoosian
:
Service management mechanisms in the internet of things: an organized and thorough study. 75-86 - Ng Kim-Soon, Alyaa Idrees Abdulmaged
, Salama A. Mostafa
, Mazin Abed Mohammed
, Fadia Abdalla Musbah, Rabei Raad Ali
, Oana Geman:
A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems. 87-104 - Kumud Tripathi
, K. Sreenivasa Rao:
VOP detection for read and conversation speech using CWT coefficients and phone boundaries. 105-116 - Shengnan Tian, Xiang Li
, Jiaming Liu, Hongguang Ma, Haitao Yu:
A short-turning strategy to alleviate bus bunching. 117-128 - Abdelazim G. Hussien
:
An enhanced opposition-based Salp Swarm Algorithm for global optimization and engineering problems. 129-150 - S. Immaculate Shyla
, S. S. Sujatha:
Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm. 151-163 - Marcelo Rosano Dallagassa
, Cleiton dos Santos Garcia
, Edson Emílio Scalabrin, Sergio Ossamu Ioshii, Deborah Ribeiro Carvalho:
Opportunities and challenges for applying process mining in healthcare: a systematic mapping study. 165-182 - Kurakula Arun Kumar
, Karthikeyan Jayaraman:
Review on implementation of IoT for environmental condition monitoring in the agriculture sector. 183-200 - Abbas Al-Refaie
, Ahmad Al-Hawadi
:
Optimal fuzzy repairs' scheduling and sequencing of failure types over multiple periods. 201-217 - Osamah Shihab Albahri
, A. A. Zaidan, B. B. Zaidan
, Ahmed Shihab Albahri
, Ali H. Mohsin, K. I. Mohammed, M. A. Alsalem:
New mHealth hospital selection framework supporting decentralised telemedicine architecture for outpatient cardiovascular disease-based integrated techniques: Haversine-GPS and AHP-VIKOR. 219-239 - S. Oudaya Coumar
:
Miniaturized DGS based multi-band pass filters for satellite applications. 241-249 - B. Chitra
, S. S. Kumar:
Recent advancement in cervical cancer diagnosis for automated screening: a detailed review. 251-269 - Ke Wang
, Xinwei Tang, Shulian Zhao, Yuchen Zhou:
Simultaneous detection and tracking using deep learning and integrated channel feature for ambint traffic light recognition. 271-281 - Maha Driss
:
WS-ADVISING: a Reusable and reconfigurable microservices-based platform for effective academic advising. 283-294 - Arunodaya Raj Mishra
, Pratibha Rani, Kiran Pandey
:
Fermatean fuzzy CRITIC-EDAS approach for the selection of sustainable third-party reverse logistics providers using improved generalized score function. 295-311 - Nimra Zaheer
, Saeed-Ul Hassan
, Mohsen Ali
, Mudassir Shabbir:
Optimal school site selection in Urban areas using deep neural networks. 313-327 - Serif Özlü, Faruk Karaaslan
:
Correlation coefficient of T-spherical type-2 hesitant fuzzy sets and their applications in clustering analysis. 329-357 - Afnan M. Alhassan
, Wan Mohd Nazmee Wan Zainon
:
Atom Taylor Bird Swarm algorithm-based deep belief network for incremental classification using medical data. 359-380 - Elena Díaz, Catalina Fernández-Plaza, Inés Abad
, Ana Alonso, Celestino González, Irene Díaz
:
Machine learning as a tool to study the influence of chronodisruption in preterm births. 381-392 - Deepak Kshirsagar
, Sandeep Kumar
:
A feature reduction based reflected and exploited DDoS attacks detection system. 393-405 - Hitesh Mohapatra
, Amiya Kumar Rath:
IoE based framework for smart agriculture. 407-424 - Tejinder Singh Lakhwani, Kartick Mohanta, Arindam Dey, Sankar Prasad Mondal, Anita Pal:
Some operations on Dombi neutrosophic graph. 425-443 - Mutaz A. B. Al-Tarawneh
:
Bi-objective optimization of application placement in fog computing environments. 445-468 - Liqiang Wu, Xiaoyuan Yang, Minqing Zhang, Xu An Wang:
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. 469-482 - Hassan N. Noura
, Ola Salman
, Raphaël Couturier, Ali Chehab
:
Novel one round message authentication scheme for constrained IoT devices. 483-499 - Tanmoy Mahapatra
, Madhumangal Pal
:
An investigation on m-polar fuzzy threshold graph and its application on resource power controlling system. 501-514 - Prince Silas Kwesi Oberko
, Victor-Hillary Kofi Setornyo Obeng, Hu Xiong:
A survey on multi-authority and decentralized attribute-based encryption. 515-533 - Muhammad Umer
, Imran Ashraf, Saleem Ullah
, Arif Mehmood, Gyu Sang Choi:
COVINet: a convolutional neural network approach for predicting COVID-19 from chest X-ray images. 535-547 - Hamed Golabian, Jamal Arkat
, Reza Tavakkoli-Moghaddam, Hiwa Faroughi:
A multi-verse optimizer algorithm for ambulance repositioning in emergency medical service systems. 549-570 - Sujit Kumar Samanta
, Kousik Das
:
Computing stationary distributions of the D-MAP/D-MSP(a, b) /1 queueing system. 571-590 - Razieh Rastgoo
, Kourosh Kiani
, Sergio Escalera
:
Real-time isolated hand sign language recognition using deep networks and SVD. 591-611 - Wei Zhang, Zhishuo Zhang
, Hu Xiong, Zhiguang Qin:
PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. 613-627 - Shiva Asadianfam
, Mahboubeh Shamsi
, Abdolreza Rasouli Kenari:
Hadoop Deep Neural Network for offending drivers. 659-671 - Hossein Abbasimehr
, Reza Paki:
Improving time series forecasting using LSTM and attention models. 673-691 - Usharani Chelladurai
, Seethalakshmi Pandian:
A novel blockchain based electronic health record automation system for healthcare. 693-703
Volume 13, Number 2, February 2022
- Po-Chou Shih, Yang Zhang, Xizhao Zhou:
Monitor system and Gaussian perturbation teaching-learning-based optimization algorithm for continuous optimization problems. 705-720 - Saiyed Umer
, Ranjeet Kumar Rout
, Chiara Pero
, Michele Nappi:
Facial expression recognition with trade-offs between data augmentation and deep learning features. 721-735 - (Withdrawn) Flexible big data approach for geospatial analysis. 737-756
- (Withdrawn) Spectrogram analysis of ECG signal and classification efficiency using MFCC feature extraction technique. 757-767
- Uma Narayanan
, Varghese Paul, Shelbi Joseph:
Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. 769-787 - Gouranga Mandal
, Diptendu Bhattacharya
, Parthasarathi De:
Real-time fast low-light vision enhancement for driver during driving at night. 789-798 - Yuan Ren, Long Yu
, Shengwei Tian, Junlong Cheng
, Zhiqi Guo, Yanhan Zhang:
Serial attention network for skin lesion segmentation. 799-810 - Sudeep Varshney, Chiranjeev Kumar, Abhishek Swaroop:
Pipeline surveillance along the international border using hybrid optimization algorithm. 811-819 - Utku Kaya
, Mehmet Fidan
:
Parametric and nonparametric correlation ranking based supervised feature selection methods for skin segmentation. 821-833 - Zikrija Avdagic, Amir Smajevic, Samir Omanovic
, Ingmar Besic
:
Path route layout design optimization using genetic algorithm: based on control mechanisms for on-line crossover intersection positions and bit targeted mutation. 835-847 - Maha Driss
, Safa Ben Atitallah
, Amal Albalawi
, Wadii Boulila
:
Req-WSComposer: a novel platform for requirements-driven composition of semantic web services. 849-865 - Nivedita Patel, Shireen Patel, Sapan H. Mankad
:
Impact of autoencoder based compact representation on emotion detection from audio. 867-885 - N. M. Saravana Kumar
, E. Suryaprabha, K. Hariprasath
:
Machine learning based hybrid model for energy efficient secured transmission in wireless sensor networks. 887-902 - Baiju P. S.
, Sudhish N. George
:
l1/2 regularized joint low rank and sparse recovery technique for illumination map estimation in low light image enhancement. 903-920 - Udayakumar Allimuthu
, K. Mahalakshmi:
Intelligent route discovery towards rushing attacks in ad hoc wireless networks. 921-960 - Varun Gupta
, Monika Mittal, Vikas Mittal, Yatender Chaturvedi:
Detection of R-peaks using fractional Fourier transform and principal component analysis. 961-972 - Khalid M. Hosny
, Sara T. Kamal, Mohamed M. Darwish:
Novel encryption for color images using fractional-order hyperchaotic system. 973-988 - Syed Muhammad Hur Rizvi, Tahir Syed, Jalaluddin Qureshi
:
Real-time forecasting of petrol retail using dilated causal CNNs. 989-1000 - P. Chinnasamy
, P. Deepalakshmi:
HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. 1001-1019 - Abhrajyoti Das, Abhilash Kumar Das, Nirmalya Kar
:
A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture. 1021-1036 - Muhammad Ehatisham-ul-Haq
, Muhammad Awais Azam, Fiza Murtaza
, Yasar Amin, Qiang Fu
:
S-THAD: a framework for sensor-based temporal human activity detection from continuous data streams. 1037-1051 - Vylala Anoop, Plakkottu Radhakrishnan Bipin:
Exploitation whale optimization based optimal offloading approach and topology optimization in a mobile ad hoc cloud environment. 1053-1072 - Ragab A. El-Sehiemy
:
A novel single/multi-objective frameworks for techno-economic operation in power systems using tunicate swarm optimization technique. 1073-1091 - Aadel Howedi, Ahmad Lotfi
, Amir Pourabdollah:
Employing entropy measures to identify visitors in multi-occupancy environments. 1093-1106 - Jaya Mukhopadhyay, Vikash Kumar Singh
, Sajal Mukhopadhyay, Anita Pal, Abhishek Kumar:
A truthful budget feasible mechanism for IoT-based participatory sensing with incremental arrival of budget. 1107-1124 - Jaya Lakshmi Arikatla, G. N. Swamy, M. N. Giri Prasad:
Dynamic Coordinative Estimation Enhancement in Cognitive Radio Network. 1125-1136 - Javed Imran, Balasubramanian Raman:
Three-stream spatio-temporal attention network for first-person action and interaction recognition. 1137-1152 - Manoj Kumar Malik
, Ajit Singh, Abhishek Swaroop:
A planned scheduling process of cloud computing by an effective job allocation and fault-tolerant mechanism. 1153-1171 - Mahmood Eghtesadifard
, Fatemeh Jozan:
A systematic literature review on the blood supply chain: exploring the trend and future research directions. 1173-1200 - Mahdi Esmailnia Kivi, Vahid Majidnezhad
:
A novel swarm intelligence algorithm inspired by the grazing of sheep. 1201-1213 - Osama S. Faragallah
, Walid El Shafai, Ahmed I. Sallam, Ibrahim F. Elashry, El-Sayed El-Rabaie
, Ashraf Afifi
, Mohammed Abdullatif Alzain
, Jehad F. Al-Amri, Fathi E. Abd El-Samie, Hala S. El-sayed
:
Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. 1215-1239 - Chinmoy Biswas
, Ratna Dutta:
Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix. 1241-1254
Volume 13, Number 3, March 2022
- Mohammed Atiquzzaman, Jin Li, Witold Pedrycz:
Special issue on new advanced techniques in security of artificial intelligence. 1255-1257 - Wei Gao, Li Yan, Yingfang Li, Bo Yang:
Network performance analysis from binding number prospect. 1259-1267 - Aramesh Rezaeian
, Marzieh Rezaeian, Seyede Fatemeh Khatami, Fatemeh Khorashadizadeh, Farshid Pouralizadeh Moghaddam:
Prediction of mortality of premature neonates using neural network and logistic regression. 1269-1277 - Wei Zhang
, Xianzhong Gao, Chifu Yang, Feng Jiang, Zhiyuan Chen
:
A object detection and tracking method for security in intelligence of unmanned surface vehicles. 1279-1291 - Juan Wang, Meng Wang
, Qingling Liu, Guanxiang Yin, Yuejin Zhang
:
Deep anomaly detection in expressway based on edge computing and deep learning. 1293-1305 - Meng Wang
, Tong Chen, Fei Du, Juan Wang, Guanxiang Yin, Yuejin Zhang
:
Research on adaptive beacon message transmission power in VANETs. 1307-1319 - Shaomin Tang
, Guixiong Liu, Zhiyu Lin, Xiaobing Li:
Multi-station test scheduling optimization method for industrial robot servo system. 1321-1337 - Yanli Wang, Yilei Wang, Zhaojie Wang, Guoyu Yang, Xiaomei Yu:
Research cooperations of blockchain: toward the view of complexity network. 1339-1352 - Fengyin Li, Zhongxing Liu, Yilei Wang, Nan Wu, Jiguo Yu, Chongzhi Gao, Huiyu Zhou:
Aitac: an identity-based traceable anonymous communication model. 1353-1362 - Xinyu Zhang, Yujun Liu, Yuling Chen
:
A new entropic criterion model in rational secure two-party computation. 1363-1372 - Xiajiong Shen, Jiyong Yang, Lei Zhang
, Geying Yang
:
An interactive role learning and discovery model for multi-department RBAC building based on attribute exploration. 1373-1382 - Ming Wan, Jinfang Li, Kai Wang
, Bailing Wang:
Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis. 1383-1396 - Xiao Sun, Jindong Xu
, Yongli Ma, Tianyu Zhao, Shifeng Ou, Lizhi Peng:
Blind image separation based on attentional generative adversarial network. 1397-1404 - Xinying Yu, Fengyin Li
, Tao Li, Nan Wu, Hua Wang, Huiyu Zhou:
Trust-based secure directed diffusion routing protocol in WSN. 1405-1417 - Hongwei Ye, Xiaozhang Liu
, Chunlai Li:
DSCAE: a denoising sparse convolutional autoencoder defense against adversarial examples. 1419-1429 - Gang Han, Tiantian Zhang
, Yinghui Zhang, Guowen Xu
, Jianfei Sun, Jin Cao:
Verifiable and privacy preserving federated learning without fully trusted centers. 1431-1441 - Xiao Sun, Jindong Xu
, Yongli Ma, Tianyu Zhao, Shifeng Ou:
Single-channel blind source separation based on attentional generative adversarial network. 1443-1450 - Shuzhuang Zhang
, Yaning Zhang
, Min Zhou, Lizhi Peng:
Community detection based on similarities of communication behavior in IP networks. 1451-1461 - Ling Zhang, Wenchao Jiang
, Wen Xiang:
Dictionary learning based on structural self-similarity and convolution neural network. 1463-1470 - B. M. Pampapathi
, M. Nageswara Guptha
, M. S. Hema
:
Data distribution and secure data transmission using IANFIS and MECC in IoT. 1471-1484 - Zhaohui Yuan, Yuqin Zhu, Mei He, Qingping Cao:
Towards accurate seismic events detection using motion sensors on smartphones. 1485-1494 - Hui Dou, Yuling Chen
, Yixian Yang, Yangyang Long:
A secure and efficient privacy-preserving data aggregation algorithm. 1495-1503 - Ying Shi, Shuyi Huang
, Jungang Lou
:
A characteristic standardization method for circuit input vectors based on Hash algorithm. 1505-1513 - Pengcheng Li, Zhangyu Li, Xiongwen Pang
, Hui Wang, Weiwei Lin, Wentai Wu
:
Multi-scale residual denoising GAN model for producing super-resolution CTA images. 1515-1524 - Yungen Wei, Zheng Gong, Shunzhi Yang, Kai Ye, Yamin Wen:
EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting. 1525-1535 - Mohammed Alshehri
:
APP-NTS: a network traffic similarity-based framework for repacked Android apps detection. 1537-1546 - Yan Ren
, Haipeng Guan, Qiuxia Zhao:
An efficient lattice-based linkable ring signature scheme with scalability to multiple layer. 1547-1556 - Wei Li, Le Xia, Ying Huang
, Soroosh Mahmoodi:
An ant colony optimization algorithm with adaptive greedy strategy to optimize path problems. 1557-1571 - Young-Sik Jeong, Jin Wang, Neil Y. Yen:
Special issue on user behavior analysis in edge computing based Internet-of-Things. 1573-1574 - Eunhee Lee
, Yongik Yoon:
Trusted information project platform based on blockchain for sharing strategy. 1575-1585 - Xiaomei Xia, Huipeng Jiang, Jin Wang
:
Analysis of user satisfaction of shared bicycles based on SEM. 1587-1601 - HyungJun Kim
:
Multiple vehicle tracking and classification system with a convolutional neural network. 1603-1614 - Jae-Young Choi
, Jee-Hyong Lee, Younghwa Cho, Suntae Kim, Jeong-Ah Kim, Seang-Yong Lee:
Visualization of knowledge map for monitoring knowledge diagnoses. 1615-1623 - Yeong-Seok Seo
, Jun-Ho Huh
:
GUI-based software modularization through module clustering in edge computing based IoT environments. 1625-1639 - Kayumiy Shokh Jakhon, Haitao Guo, Kyungeun Cho
:
Agent grouping recommendation method in edge computing. 1641-1651 - Hyeon-woo An
, Nammee Moon
:
Design of recommendation system for tourist spot using sentiment analysis based on CNN-LSTM. 1653-1663 - Sang-Youn Kim, Yu-Joon Kim, Dong-Soo Choi
, Byeong-Seok Shin
:
Frequency based tactile rendering method for pin-array tactile devices. 1665-1672 - Shee-Ihn Kim, Seung-Hee Kim
:
E-commerce payment model using blockchain. 1673-1685
Volume 13, Number 4, April 2022
- Alaa Omran Almagrabi, Saleem Abdullah, Maria Shams
, Yasser D. Al-Otaibi, Shahzaib Ashraf:
A new approach to q-linear Diophantine fuzzy emergency decision support system for COVID19. 1687-1713 - Babul P. Tewari
, Sasthi C. Ghosh:
Wi-Fi assisted 5G D2D communications in unlicensed spectrum. 1715-1734 - Nancy Gulati
, Pankaj Deep Kaur:
FriendCare-AAL: a robust social IoT based alert generation system for ambient assisted living. 1735-1762 - Jinmao Xu, Lei Tan, Daofu Gong
, Fenlin Liu:
Extended matrix factorization with entity network construction for recommendation. 1763-1775 - Yanru Zhong, Liangbin Cao, Huanan Zhang, Yuchu Qin
, Meifa Huang
, Xiaonan Luo:
Hesitant fuzzy power Maclaurin symmetric mean operators in the framework of Dempster-Shafer theory for multiple criteria decision making. 1777-1797 - Jerlin Rubini Lambert
, Eswaran Perumal
:
Oppositional firefly optimization based optimal feature selection in chronic kidney disease classification using deep neural network. 1799-1810 - Hossam Faris, Maria Habib
, Mohammad Faris, Alaa Alomari, Pedro A. Castillo
, Manal Alomari:
Classification of Arabic healthcare questions based on word embeddings learned from massive consultations: a deep learning approach. 1811-1827 - Mridul Krishna Gogoi, Rituparna Chutia
:
Similarity measure of the interval-valued fuzzy numbers and its application in risk analysis in paddy cultivation. 1829-1852