default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 6
Volume 6, Number 1, February 2015
- Toly Chen, Chu-Chai Chan, Hsin-Chieh Wu, Yu-Cheng Lin:
Ambient intelligence and ergonomics in Asia. 1-2 - Ming-Tang Wang, Chih-Chieh Yang:
Concept design from random algorithms for design sketching. 3-11 - Abayomi Moradeyo Otebolaku, Maria Teresa Andrade:
Context-aware media recommendations for smart devices. 13-36 - Peng-Cheng Sung, Chun-Chin Hsu, Cheng-Lung Lee, Yuan-Shyi Peter Chiu, Huey-Long Chen:
Formulating grip strength and key pinch strength prediction models for Taiwanese: a comparison between stepwise regression and artificial neural networks. 37-46 - Chao-Tang Tseng, Ying-Lien Lee, Chien-Chih Chou:
An ambient intelligence system for water release scheduling in cascade hydropower systems. 47-55 - Hsin-Chieh Wu, Toly Chen:
CART-BPN approach for estimating cycle time in wafer fabrication. 57-67 - Imen Jemili, Dhouha Ghrab, Amine Dhraief, Abdelfettah Belghith, Bilel Derbel, Ahmad S. Al-Mogren, Hassan Mathkour:
CHRA: a coloring based hierarchical routing algorithm. 69-82 - Kevin Bing-Yung Wong, Tongda Zhang, Hamid K. Aghajan:
Extracting patterns of behavior from a network of binary sensors. 83-105 - Adrienne Heinrich, Frank H. van Heesch, Bhargava Puvvula, Mukul Rocque:
Video based actigraphy and breathing monitoring from the bedside table of shared beds. 107-120 - Lishan Ke, Zongxiang Yi, Yan Ren:
Improved broadcast encryption schemes with enhanced security. 121-129 - Can Xiang, Chunming Tang:
Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. 131-139 - Xiang Li, Lingling Wang:
On the study of fusion techniques for bad geological remote sensing image. 141-149
Volume 6, Number 2, April 2015
- Ana M. Bernardos, Boon-Chong Seet, Elisabetta Farella:
Special issue on "Personalization and situation awareness in smart environments". 151-152 - Udayanto Dwi Atmojo, Zoran A. Salcic, Kevin I-Kai Wang, HeeJong Park:
System-level approach to the design of ambient intelligence systems based on wireless sensor and actuator networks. 153-169 - Simone Chiappino, Pietro Morerio, Lucio Marcenaro, Carlo S. Regazzoni:
Bio-inspired relevant interaction modelling in cognitive crowd management. 171-192 - Ehsan Nazerfard, Diane J. Cook:
CRAFFT: an activity prediction model based on Bayesian networks. 193-205 - Paola Andrea Jaramillo Garcia, Luis Ignacio Lopera Gonzalez, Oliver Amft:
Using implicit user feedback to balance energy consumption and user comfort of proximity-controlled computer screens. 207-221 - Yacine Atif, Sujith Samuel Mathew, Abderrahmane Lakas:
Building a smart campus to support ubiquitous learning. 223-238 - Gian Luca Foresti, Manuela Farinosi, Marco Vernier:
Situational awareness in smart environments: socio-mobile and sensor data fusion for emergency response to disasters. 239-257 - Giuseppe Ghiani, Jussi Polet, Ville Antila, Jani Mäntyjärvi:
Evaluating context-aware user interface migration in multi-device environments. 259-277 - Susanna Pantsar-Syväniemi, Mari Ervasti, Kaarina Karppinen, Antti Väätänen, Virpi Oksman, Essi Kuure:
A situation-aware safety service for children via participatory design. 279-293
Volume 6, Number 3, June 2015
- Ansar-Ul-Haque Yasar, Zahoor Ali Khan, Elhadi M. Shakshuki:
Guest Editorial: new developments in ambient information systems. 295-296 - Gianni Fenu, Pier Luigi Pau:
Evaluating complex network indices for vulnerability analysis of a territorial power grid. 297-306 - Omar Marey, Jamal Bentahar, Ehsan Khosrowshahi Asl, Khalid Sultan, Rachida Dssouli:
Decision making under subjective uncertainty in argumentation-based agent negotiation. 307-323 - Radja Boukharrou, Ahmed-Chawki Chaouche, Amal El Fallah Seghrouchni, Jean-Michel Ilié, Djamel-Eddine Saïdouni:
Dealing with temporal failure in ambient systems: a dynamic revision of plans. 325-336 - Marco Lützenberger, Nils Masuch, Tobias Küster, Daniel Freund, Marcus Voß, Christopher-Eyk Hrabia, Denis Pozo, Johannes Fähndrich, Frank Trollmann, Jan Keiser, Sahin Albayrak:
A common approach to intelligent energy and mobility services in a smart city environment. 337-350 - Etienne Alain Feukeu, Karim Djouani, Anish Mathew Kurien:
Performance evaluation of the ADSA in a vehicular network: MAC approach in IEEE 802.11p. 351-360 - Samir Ouchani, Gabriele Lenzini:
Generating attacks in SysML activity diagrams by detecting attack surfaces. 361-373
Volume 6, Number 4, August 2015
- Haroon Malik, Ansar-Ul-Haque Yasar, Elhadi M. Shakshuki:
Guest editorial: new developments in future networked systems. 375-376 - Tiago Augusto Engel, Andrea Schwertner Charão, Manuele Kirsch-Pinheiro, Luiz Angelo Steffenel:
Performance improvement of data mining in Weka through multi-core and GPU acceleration: opportunities and pitfalls. 377-390 - Tarek Helmy, Ahmed Al-Nazer:
Semantic manipulation of user's queries and modeling the health and nutrition preferences. 391-405 - Salma Najar, Manuele Kirsch-Pinheiro, Carine Souveyet:
Service discovery and prediction on Pervasive Information System. 407-423 - Jason Jaskolka, Ridha Khédri, Khair Eddin Sabri:
Investigative support for information confidentiality. 425-451 - Yaser Jararweh, Mahmoud Al-Ayyoub, Ala Darabseh, Elhadj Benkhelifa, Mladen A. Vouk, Andy J. Rindos:
SDIoT: a software defined based internet of things framework. 453-461 - Alireza Nafarieh, Muhammad H. Raza, William Robertson:
A comprehensive analysis of QoS-based routing mechanisms over shared mesh protected optical infrastructures. 463-472
- Ye-Wang Chen, Jiong-Liang Wang, Yiqiao Cai, Ji-Xiang Du:
A method for Chinese text classification based on apparent semantics and latent aspects. 473-480 - Zewu Peng, Jingliang Liao, Yiqiao Cai:
Differential evolution with distributed direction information based mutation operators: an optimization technique for big data. 481-494 - Mohsen Amiribesheli, Asma Benmansour, Abdelhamid Bouchachia:
A review of smart homes in healthcare. 495-517 - Keita Matsuo, Donald Elmazi, Yi Liu, Shinji Sakamoto, Leonard Barolli:
A multi-modal simulation system for wireless sensor networks: a comparison study considering stationary and mobile sink and event. 519-529
Volume 6, Number 5, October 2015
- Fatos Xhafa, Xiaofeng Chen, Leonard Barolli:
Editorial preface for the special issue "Advances in security, privacy and trust technologies". 531-532 - Zhiguang Xiong, Kang Deng, Zhusong Liu, Yanping Liu, Xiaocui Yan:
The finite volume element method for a parameter identification problem. 533-539 - Jian Chen, Dongping Huang, Shuyue Hu, Yu Liu, Yi Cai, Huaqing Min:
An opinion mining framework for Cantonese reviews. 541-547 - Wei Zhang, Shuguang Liu, Weidong Zhong, Xiaoyuan Yang:
How to build a faster private information retrieval protocol? 549-555 - Xiaozhang Liu, Hongwei Ye:
Dual-kernel based 2D linear discriminant analysis for face recognition. 557-562 - Xuan Li, Guoji Zhang, Xia-Yan Zhang:
Image encryption algorithm with compound chaotic maps. 563-570 - Jiahai Wang, Chenglin Zhong, Ying Zhou, Yalan Zhou:
Multiobjective optimization algorithm with objective-wise learning for continuous multiobjective problems. 571-585 - Dong Liu:
A fault-tolerant architecture for ROIA in cloud. 587-595 - Caiyun Chen, Junshan Yu:
An adaptive algorithm for blind MMSE equalization of SIMO channels. 597-602
- Jihad Hamie, Benoît Denis, Raffaele D'Errico, Cédric Richard:
On-body TOA-based ranging error model for motion capture applications within wearable UWB networks. 603-612 - Franz Gravenhorst, Christoph Thiem, Bernd Tessendorf, Rolf Adelsberger, Bert Arnrich, Conny Draper, Richard M. Smith, Gerhard Tröster:
SonicSeat: design and evaluation of a seat position tracker based on ultrasonic sound measurements for rowing technique analysis. 613-622 - Ling Xu, Hailin Liu, Xinhua Yan, Shengping Liao, Xiaohong Zhang:
Optimization method for trajectory combination in surveillance video synopsis based on genetic algorithm. 623-633 - Donald Elmazi, Elis Kulla, Tetsuya Oda, Evjola Spaho, Shinji Sakamoto, Leonard Barolli:
A comparison study of two fuzzy-based systems for selection of actor node in wireless sensor actor networks. 635-645 - Mohamed Tarik Moutacalli, Abdenour Bouzouane, Bruno Bouchard:
The behavioral profiling based on times series forecasting for smart homes assistance. 647-659 - Baojiang Cui, Haifeng Jin, Zheli Liu, Jiangdong Deng:
Improved collaborative filtering with intensity-based contraction. 661-674 - Xiang Li, Ge Wang:
Optimal band selection for hyperspectral data with improved differential evolution. 675-688 - Chanjuan Liu, Hailin Zou, Caixia Li, Ying Liu, Yilei Wang, Shixiang Jia, Shusen Zhou:
An adaptive texture-preserved image denoising model. 689-697
Volume 6, Number 6, December 2015
- Xu An Wang, Jianfeng Ma, Xiaoyuan Yang:
A new proxy re-encryption scheme for protecting critical information systems. 699-711 - Salvatore Distefano:
Dependability assessment of critical systems. 713-720 - Zhiwei Gao, Yingxin Hu, Kai Lu:
CPTIAS: a new fast PKI authentication scheme based on certificate path trust index. 721-731 - Victor V. Toporkov, Anna S. Toporkova, Alexey Tselishchev, Dmitry Yemelyanov, Petr Potekhin:
Heuristic strategies for preference-based scheduling in virtual organizations of utility grids. 733-740 - Mario Sicuranza, Angelo Esposito, Mario Ciampi:
An access control model to minimize the data exchange in the information retrieval. 741-752 - Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services. 753-762 - Jianhua Yu, Xueli Wang, Wei Gao:
Improvement and applications of secure outsourcing of scientific computations. 763-772 - Domenico Pascarella, Salvatore Venticinque, Rocco Aversa, Massimiliano Mattei, Luciano Blasi:
Parallel and distributed computing for UAVs trajectory planning. 773-782 - Rafal Kozik, Michal Choras, Adam Flizikowski, Marianthi Theocharidou, Vittorio Rosato, Erich Rome:
Advanced services for critical infrastructures protection. 783-795 - Xiaoqing Tan, Xiaoqian Zhang, Jin Li:
Big data quantum private comparison with the intelligent third party. 797-806 - Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu:
A brief survey on secure multi-party computing in the presence of rational parties. 807-824 - Han Shen, Chongzhi Gao, Debiao He, Libing Wu:
New biometrics-based authentication scheme for multi-server environment in critical systems. 825-834 - Xin Xie, Yin Xu, Qing Liu, Fengping Hu, Tijian Cai, Nan Jiang, Huandong Xiong:
A study on fast SIFT image mosaic algorithm based on compressed sensing and wavelet transform. 835-843 - Xiangyang Li, Rong Li, Qiang Huang, Jiangao Luo:
Minimized-expansion based lossless image authentication algorithm. 845-854
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.