default search action
Intelligent Automation & Soft Computing, Volume 22
Volume 22, Number 1, 2016
- Ouiem Bchir, Mohamed Maher Ben Ismail:
Generic Evaluation Metrics for Hyperspectral Data Unmixing. 1-16 - Mingxin Hou, Li Jiang, Hong Liu, Zhaopeng Chen:
Signal Processing for Noise and Online Force Modeling Detection for a Robot Hand Based on EtherCAT Communication. 17-31 - A. Sureshkumar, S. Muruganand, P. Balakrishnan:
Design and Development of a Virtual Instrument for Hazardous Environment Monitoring and Control Using Lab VIEW. 33-44 - Behrooz Safarinejadian, Mohiyeddin Mozaffari:
Mobile Agent Based Distributed EM Algorithm For Data Clustering In Sensor Networks. 45-60 - Li Wang, Xiaoning Zhu, Zhengyu Xie:
Rail Mounted Gantry Crane Scheduling In Rail-Truck Transshipment Terminal. 61-73 - Muhammad Asif, Attaullah Y. Memon, Muhammad Junaid Khan:
Output Feedback Control For Trajectory Tracking Of Wheeled Mobile Robot. 75-87 - Dong Huang, Yong Yang, Lun Tang, Ju Zhang, Xiang Wang:
A Joint Optimal Hand-Off And Stability Methodology In Multi-Flow Priority-Based Heterogeneous Networks. 89-96 - Hei-Chia Wang, Che-Tsung Yang:
Enhanced Particle Swarm Optimization With Self-Adaptation Based On Fitness-Weighted Acceleration Coefficients. 97-110 - Wei-Dong Xie, Zhijun Fu, Wen-Fang Xie:
Adaptive Nonlinear Systems Identification via Discrete Multi-Time Scales Dynamic Neural Networks. 111-123 - Othman M.-K. Alsmadi, Za'er Salim Abo-Hammour, Dia I. Abu-Al-Nadi, Saleh Saraireh:
Soft Computing Techniques for Reduced Order Modelling: Review and Application. 125-142 - Dong Huang, Yong Yang, Lun Tang, Ju Zhang, Xiang Wang:
An Approximation Method Of Optimal Scheduling For Multicommodity Flows In Cloud-Service Scenarios. 143-152 - Damien Ennis, Sergiu M. Dascalu, Frederick C. Harris Jr.:
Leveraging Clustering Techniques to Facilitate Metagenomic Analysis. 153-165
Volume 22, Number 2, 2016
Articles
- Adeleke Raheem Ajiboye, Ruzaini Abdullah Arshah, Hongwu Qin:
Using an Enhanced Feed-Forward BP Network for Predictive Model Building from Students' Data. 169-175
- Erik Cuevas, Eduardo Santuario, Daniel Zaldivar, Marco Antonio Pérez Cisneros:
An Improved Evolutionary Algorithm for Reducing the Number of Function Evaluations. 177-192
- Masumeh Maleki, Nasim Nourafza, Saeed Setayeshi:
A Novel Approach for Designing a Cognitive Sugarscape Cellular Society Using An Extended Moren Network. 193-201 - R. Rohini, R. K. Gnanamurthy:
Performance Analysis to Improve Quality of Service Using Cluster Based Hidden Node Detection Algorithm in Wireless Sensor Networks. 203-209 - Delbert Tesar:
Next Wave of Technology. 211-225
- Dong Ren, Simon X. Yang:
Intelligent Automation with Applications to Agriculture. 227-228 - Songjian Dan, Simon X. Yang, Fengchun Tian, Lie Den:
Classification of Orange Growing Locations Based on the Near-infrared Spectroscopy Using Data Mining. 229-236 - Wei Wei, Wenbin Wu, Zhengguo Li, Peng Yang, Qingbo Zhou:
Selecting the Optimal NDVI Time-Series Reconstruction Technique for Crop Phenology Detection. 237-247 - Shun Ren, Haiye Yu, Linlin Wang, Lei Zhang:
Clustering Detection Algorithm of Plant Leaf Relative Lesion Area Based on Improved GA. 249-254 - Huifang Wang, Zhiguo Huo, Guangsheng Zhou, Li Wu, Haikuan Feng:
Monitoring and Forecasting Winter Wheat Freeze Injury and Yield from Multi-Temporal Remotely Sensed Data. 255-260 - Kai Ma, Jihua Wang, Zehua Chen, Xiaobo Zhu, Ligang Pan:
A Method for Extending the Geostatistical Functions in Spatial Information Processing. 261-266 - Tingyao Jiang, Peng Lei, Qin Qin:
An Application of SVM-Based Classification in Landslide Stability. 267-271 - Tao Huang, Ying Gu, Jiang Liu, Yunjie Liu:
Time Efficient Virtual Network Embedding Algorithm. 273-280 - Xiaobo Ding, Zhong Ma, Xinfa Dai:
Scheduling Parallel Soft Real-Time VM in Dynamic Workloads. 281-287 - Anping Xiong, Chunxiang Xu:
Cloud Storage Access Control Scheme of Ciphertext Algorithm Based on Digital Envelope. 289-294 - Yousheng Zhou, Han Guo, Feng Wang, Wenjun Luo:
Multi-Key Searchable Encryption with Designated Server. 295-301 - Kai Wang, Youjin Zhao, Qingyu Xiong, Xiling Shen, Min Fan, Min Gao:
Video Recognition of Human Fall Based on Spatiotemporal Features. 303-309 - Li Fei, Aina Qin:
A New Simpler Third-Order Chaotic System and its Circuit Implementation. 311-316 - Lvwen Huang, Dongjian He, Zhiyong Zhang, Peng Zhang:
Path Navigation For Indoor Robot With Q-Learning. 317-323 - Xiaohui Chen, Mengjiao Zhang, Kai Ruan, Canfeng Gong, Yinyin Zhang, Simon X. Yang:
A Ranging Model Based on BP Neural Network. 325-329 - Jun Yang, Hong Zhang, Jianting Zhou, Bojian Xu, Aicheng Shan:
Discussing the Initial Temperature Difference Correction Method for Vibrational Chord Strain Gauge in Bridge Construction Monitoring. 331-339
Volume 22, Number 3, 2016
Special Section on Advanced Technologies for Homeland and Cyber Defense
- Ravi S. Sandhu:
Foreword. 341 - Ilsun You, Gansen Zhao, Ram Krishnan:
Special Section on Advanced Technologies for Homeland and Cyber Defense. 343-344 - Hongyang Yan, Jin Li, Xuan Li, Gansen Zhao, Sun-Young Lee, Jian Shen:
Secure Access Control of E-Health System with Attribute-Based Encryption. 345-352 - YongJe Choi, Dooho Choi, Hoonjae Lee, JaeCheol Ha:
An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation. 353-363 - Minwoo Kim, Jihyun Bang, Taekyoung Kwon:
LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices. 365-369 - In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Minsoo Ryu, Eul Gyu Im:
Malware Analysis and Classification Using Sequence Alignments. 371-377 - Suwan Park, Changho Seo, Jeong Hyun Yi:
Cyber threats to mobile messenger apps from identity cloning. 379-387 - Tianhan Gao, Ling Tan, Peiyu Qiao, Kangbin Yim:
An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network. 389-396 - Yijun Mao, Yue Zhang, Min-Rong Chen, Yongbiao Li, Yiju Zhan:
Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense. 397-403 - In-Hyun Cho, Kyungho Lee:
Advanced Risk Measurement Approach to Insider Threats in Cyberspace. 405-413 - Chin-Ling Chen, Yeong-Lin Lai, Chih-Cheng Chen, Chunyi Zheng, Li-Chih Chang:
A Non-Repudiated and Intelligent RFID Medication Safety Management System. 415-421 - Kun-Lin Tsai, Fang-Yie Leu, Shun-Hung Tsai:
Data Encryption Method Using Environmental Secret Key with Server Assistance. 423-430
- Zhen Ma, De-gan Zhang, Si Liu, Wen-bin Li:
New AODV Routing Method for Mobile Wireless Mesh Network (MWMN). 431-438 - Nwe Nwe Htay Win, Mingcheng Qu, Gang Cui, Saif-Ur Rehman, Xiufeng Wang:
Service Level Agreement Mapping and Provider Selection Using Annotated Semantic Information to WS-Agreement. 439-448 - Haruna Chiroma, Sameem Abdul Kareem, Ahmad Shukri Mohd Noor, Adamu I. Abubakar, Nader Sohrabi Safa, Nor Liyana Mohd Shuib, Mukhtar Fatihu Hamza, Abdulsalam Ya'u Gital, Tutut Herawan:
A Review on Artificial Intelligence Methodologies for the Forecasting of Crude Oil Price. 449-462 - Zafer Civelek, Murat Lüy, Ertugrul Çam, Necaattin Barisçi:
Control of Pitch Angle of Wind Turbine by Fuzzy Pid Controller. 463-471 - Chaohui Wang, Jian-qiang Wang:
A multi-criteria decision-making method based on triangular intuitionistic fuzzy preference information. 473-482 - Hongbo Zhang, Qing Lei, Bineng Zhong, Ji-Xiang Du, Jialin Peng:
A Survey on Human Pose Estimation. 483-489 - Alma Y. Alanis:
Real-Time Implementation of a Discrete Reduced Order Neural Observer: Linear Induction Motors Application. 491-498 - Omar Aguilar-Mejía, Rubén Tapia-Olvera, Antonio Valderrabano-Gonzalez, Iván Rivas-Cambero:
Adaptive neural network control of chaos in permanent magnet synchronous motor. 499-507 - Syafizwan Faroque, Ben Horan, Husaini Adam, Mulyoto Pangestu, Matthew A. Joordens:
Haptic Technology for Micro-robotic Cell Injection Training Systems - A Review. 509-523 - Zhehuang Huang, Yidong Chen:
An Integration Model of Semantic Annotation Based on Synergetic Neural Network. 525-532
Volume 22, Number 4, 2016
- Tao Huang, Xiaonv Hu, Simon X. Yang:
Networks based computing and automation. 533-534
- Hongyong Jia, Yue Chen, Julong Lan, Wei Yue, Zhiwei Wang:
Group-based fast data packet attribute authentication in the reconfigurable networks. 535-542 - Jiang Liu, Tao Huang, Yuanming Xin, Jiannan Zhang, F. Richard Yu, Yunjie Liu:
VLAN-reusing: A novel solution for efficient network virtualization. 543-549 - Wenbo Hu, Tao Huang, Jian Ding, Jian Wang, Jiang Liu, Yunjie Liu:
Towards consistency of virtual machine migration in Software-Defined Network. 551-560 - Xiaolan Xie, Ruikun Liu, Xiaochun Cheng, Xin Hu, Jinsheng Ni:
Trust-Driven and PSO-SFLA based job scheduling algorithm on Cloud. 561-566 - Lei Yang, Yu Dai, Bin Zhang:
Characterizing performance interference for performance crisis mitigation in the virtualized environment. 567-578 - Chunyan An, Jiantao Zhou, Shuai Liu, Kurt Geihs:
A multi-tenant hierarchical modeling for cloud computing workload. 579-586 - Xiao Chen, Jian-Hui Jiang:
A method of virtual machine placement for fault-tolerant cloud applications. 587-597 - Jianjun Lei, Haiyang Bi, Ying Xia, Jun Huang, Hae-Young Bae:
An in-network data cleaning approach for wireless sensor networks. 599-604 - Xujie Li, HongLang Zhang, Wenna Zhang, Feng Yan:
A call admission control scheme on the uplink of D2D communications underlaying cellular networks. 605-612 - Mingxiang Guan, Le Wang, Liming Chen:
Channel allocation for hot spot areas in HAPS communication based on the prediction of mobile user characteristics. 613-620 - Junfeng Tian, Hongqiang Jiao:
A kind of dynamic software behavior trust model based on improved subjective logic. 621-629 - Bin Zhao, Jingsha He, Yixuan Zhang, Gongzheng Liu, Peng Zhai, Na Huang, Ruohong Liu:
Dynamic trust evaluation in open networks. 631-638 - Wei-Jin Jiang, Yusheng Xu, Hong Guo, C. C. Wang, Lianmei Zhang:
Multi agent system-based dynamic trust calculation model and credit management mechanism of online trading. 639-649 - Yu Yao, Zhao Zhang, Wei Yang, Fuxiang Gao:
Influence of removable devices on worm propagation under pulse quarantine strategy. 651-666 - Zhixian Tang, Jun Feng, Zhonghua Zhu, Yaqing Shi, Jiamin Lu:
RH: An improved AMH aggregate query method. 667-673 - Yunpeng Xiao, Xingyu Lu, Yanbing Liu:
A parallel and distributed algorithm for role discovery in large-scale social networks. 675-681
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.