JAIHC - volume 13 - 2022 论文列表 |
点击这里查看 Journal of Ambient Intelligence and Humanized Computing 的JCR分区、影响因子等信息 |
Dingding Yu Xianliang Hu Kewei Liang Jun Ying
An integrated converter topology for torque ripple minimization in BLDC motor using an ITSA technique.Bapayya Naidu Kommula Venkata Reddy Kota
Big consumer opinion data understanding for Kano categorization in new product development.Ke-Jia Chen Jian Jin Jiayi Luo
A Markov chain model for IEEE 802.15.4 in time critical wireless sensor networks under periodic traffic with reneging packets.Hossein Hadadian Nejad Yousefi Yousef Seifi Kavian Alimorad Mahmoudi
Some novel q-rung orthopair fuzzy correlation coefficients based on the statistical viewpoint with their applications.Surender Singh Abdul Haseeb Ganie
Novel image encryption algorithm using fractional chaos and cellular neural network.Farhan Musanna Deepak Dangwal Sanjeev Kumar
A blockchain-based secure routing protocol for opportunistic networks.Sanjay K. Dhurandher Jagdeep Singh Petros Nicopolitidis Raghav Kumar Geetanshu Gupta
An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream.Basma Abd El-Rahiem Mohamed Amin Ahmed Sedik Fathi E. Abd El-Samie Abdullah M. Iliyasu
Adaptive trapezoid region intercept histogram based Otsu method for brain MR image segmentation.Leyi Xiao Chaodong Fan Honglin Ouyang Andrea F. Abate Shaohua Wan
Interactive multilevel programming approaches in neutrosophic environments.Sui-Zhi Luo Witold Pedrycz Lining Xing
Sign language digits and alphabets recognition by capsule networks.Hongwang Xiao Yun Yang Ke Yu Jiao Tian Xinyi Cai Usman Muhammad Jinjun Chen
Cost, energy, and response delay awareness-solution for cloud resources management: proposition of a predictive dynamic algorithm for VMs allocation over a distributed cloud infrastructure.Eya Dhib Khaled Boussetta Nawel Zangar Nabil Tabbane
Emergency decision support modeling under generalized spherical fuzzy Einstein aggregation information.Shahzaib Ashraf Saleem Abdullah Ronnason Chinram
Modeling and optimizing a multi-period closed-loop supply chain for pricing, warranty period, and quality management.Fatemeh Keshavarz-Ghorbani Alireza Arshadi Khamseh
Smart streetlights in Smart City: a case study of Sheffield.Eisley Dizon Bernardi Pranggono
COVID-19 classification using deep feature concatenation technique.Waleed Saad Wafaa A. Shalaby Mona Shokair Fathi E. Abd El-Samie Moawad I. Dessouky Essam Abdellatef
Significance driven inverse distance weighted filter to restore impulsive noise corrupted X-ray image.Bharat Garg Prashant Singh Rana Vijaypal Singh Rathor
Probabilistic neural network based efficient bandwidth allocation in wireless sensor networks.A. D. C. Navin Dhinnesh T. Sabapathi
LSTM and CNN based ensemble approach for spoof detection task in automatic speaker verification systems.Mohit Dua Chhavi Jain Sushil Kumar
Incorporating individual and group privacy preferences in the internet of things.Khaled Alanezi Shivakant Mishra
An edge-aware based adaptive multi-feature set extraction for stereo matching of binocular images.Qazi Mazhar ul Haq Chang-Hong Lin Shanq-Jang Ruan Derlis Gregor
An optimal remote sensing image enhancement with weak detail preservation in wavelet domain.Rajni Sharma M. Ravinder Nitin Sharma Kanchan Sharma
An elitism based self-adaptive multi-population Poor and Rich optimization algorithm for grouping similar documents.Thirumoorthy Karpagalingam K. Muneeswaran
Markovian working vacation queue with imperfect service, balking and retrial.Madhu Jain Sibasish Dhibar Sudeep Singh Sanga
Evidence approach imprecise intervals: extensions and evaluation measures. A feature-level fusion based improved multimodal biometric recognition system using ear and profile face.Partha Pratim Sarangi Deepak Ranjan Nayak Madhumita Panda Banshidhar Majhi
An end to end system for subtitle text extraction from movie videos.Hossam Elshahaby Mohsen Rashwan
Similarity measure of the interval-valued fuzzy numbers and its application in risk analysis in paddy cultivation.Mridul Krishna Gogoi Rituparna Chutia
Classification of Arabic healthcare questions based on word embeddings learned from massive consultations: a deep learning approach.Hossam Faris Maria Habib Mohammad Faris Alaa Alomari Pedro A. Castillo Manal Alomari
Oppositional firefly optimization based optimal feature selection in chronic kidney disease classification using deep neural network.Jerlin Rubini Lambert Eswaran Perumal
Hesitant fuzzy power Maclaurin symmetric mean operators in the framework of Dempster-Shafer theory for multiple criteria decision making.Yanru Zhong Liangbin Cao Huanan Zhang Yuchu Qin Meifa Huang Xiaonan Luo
Extended matrix factorization with entity network construction for recommendation.Jinmao Xu Lei Tan Daofu Gong Fenlin Liu
FriendCare-AAL: a robust social IoT based alert generation system for ambient assisted living. Wi-Fi assisted 5G D2D communications in unlicensed spectrum.Babul P. Tewari Sasthi C. Ghosh
A new approach to q-linear Diophantine fuzzy emergency decision support system for COVID19.Alaa Omran Almagrabi Saleem Abdullah Maria Shams Yasser D. Al-Otaibi Shahzaib Ashraf
Sang-Youn Kim Yu-Joon Kim Dong-Soo Choi Byeong-Seok Shin
Design of recommendation system for tourist spot using sentiment analysis based on CNN-LSTM. Agent grouping recommendation method in edge computing.Kayumiy Shokh Jakhon Haitao Guo Kyungeun Cho
GUI-based software modularization through module clustering in edge computing based IoT environments. Visualization of knowledge map for monitoring knowledge diagnoses.Jae-Young Choi Jee-Hyong Lee Younghwa Cho Suntae Kim Jeong-Ah Kim Seang-Yong Lee
Multiple vehicle tracking and classification system with a convolutional neural network. Analysis of user satisfaction of shared bicycles based on SEM.Xiaomei Xia Huipeng Jiang Jin Wang
Trusted information project platform based on blockchain for sharing strategy. Special issue on user behavior analysis in edge computing based Internet-of-Things.Young-Sik Jeong Jin Wang Neil Y. Yen
An ant colony optimization algorithm with adaptive greedy strategy to optimize path problems.Wei Li Le Xia Ying Huang Soroosh Mahmoodi
An efficient lattice-based linkable ring signature scheme with scalability to multiple layer.Yan Ren Haipeng Guan Qiuxia Zhao
APP-NTS: a network traffic similarity-based framework for repacked Android apps detection. EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting.Yungen Wei Zheng Gong Shunzhi Yang Kai Ye Yamin Wen
Multi-scale residual denoising GAN model for producing super-resolution CTA images.Pengcheng Li Zhangyu Li Xiongwen Pang Hui Wang Weiwei Lin Wentai Wu
A characteristic standardization method for circuit input vectors based on Hash algorithm.Ying Shi Shuyi Huang Jungang Lou
A secure and efficient privacy-preserving data aggregation algorithm.Hui Dou Yuling Chen Yixian Yang Yangyang Long
Towards accurate seismic events detection using motion sensors on smartphones.Zhaohui Yuan Yuqin Zhu Mei He Qingping Cao
Data distribution and secure data transmission using IANFIS and MECC in IoT.B. M. Pampapathi M. Nageswara Guptha M. S. Hema
Dictionary learning based on structural self-similarity and convolution neural network.Ling Zhang Wenchao Jiang Wen Xiang
Community detection based on similarities of communication behavior in IP networks.Shuzhuang Zhang Yaning Zhang Min Zhou Lizhi Peng
Single-channel blind source separation based on attentional generative adversarial network.Xiao Sun Jindong Xu Yongli Ma Tianyu Zhao Shifeng Ou
Verifiable and privacy preserving federated learning without fully trusted centers.Gang Han Tiantian Zhang Yinghui Zhang Guowen Xu Jianfei Sun Jin Cao
DSCAE: a denoising sparse convolutional autoencoder defense against adversarial examples.Hongwei Ye Xiaozhang Liu Chunlai Li
Trust-based secure directed diffusion routing protocol in WSN.Xinying Yu Fengyin Li Tao Li Nan Wu Hua Wang Huiyu Zhou
Blind image separation based on attentional generative adversarial network.Xiao Sun Jindong Xu Yongli Ma Tianyu Zhao Shifeng Ou Lizhi Peng
Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis.Ming Wan Jinfang Li Kai Wang Bailing Wang
An interactive role learning and discovery model for multi-department RBAC building based on attribute exploration.Xiajiong Shen Jiyong Yang Lei Zhang Geying Yang
A new entropic criterion model in rational secure two-party computation.Xinyu Zhang Yujun Liu Yuling Chen
Aitac: an identity-based traceable anonymous communication model.Fengyin Li Zhongxing Liu Yilei Wang Nan Wu Jiguo Yu Chongzhi Gao Huiyu Zhou
Research cooperations of blockchain: toward the view of complexity network.Yanli Wang Yilei Wang Zhaojie Wang Guoyu Yang Xiaomei Yu
Multi-station test scheduling optimization method for industrial robot servo system.Shaomin Tang Guixiong Liu Zhiyu Lin Xiaobing Li
Research on adaptive beacon message transmission power in VANETs.Meng Wang Tong Chen Fei Du Juan Wang Guanxiang Yin Yuejin Zhang
Deep anomaly detection in expressway based on edge computing and deep learning.Juan Wang Meng Wang Qingling Liu Guanxiang Yin Yuejin Zhang
A object detection and tracking method for security in intelligence of unmanned surface vehicles.Wei Zhang Xianzhong Gao Chifu Yang Feng Jiang Zhiyuan Chen
Prediction of mortality of premature neonates using neural network and logistic regression.Aramesh Rezaeian Marzieh Rezaeian Seyede Fatemeh Khatami Fatemeh Khorashadizadeh Farshid Pouralizadeh Moghaddam
Network performance analysis from binding number prospect. Special issue on new advanced techniques in security of artificial intelligence.Osama S. Faragallah Walid El Shafai Ahmed I. Sallam Ibrahim F. Elashry El-Sayed El-Rabaie Ashraf Afifi Mohammed Abdullatif Alzain Jehad F. Al-Amri Fathi E. Abd El-Samie Hala S. El-sayed
A novel swarm intelligence algorithm inspired by the grazing of sheep.Mahdi Esmailnia Kivi Vahid Majidnezhad
A systematic literature review on the blood supply chain: exploring the trend and future research directions.Mahmood Eghtesadifard Fatemeh Jozan
A planned scheduling process of cloud computing by an effective job allocation and fault-tolerant mechanism.Manoj Kumar Malik Ajit Singh Abhishek Swaroop
Three-stream spatio-temporal attention network for first-person action and interaction recognition.Javed Imran Balasubramanian Raman
Dynamic Coordinative Estimation Enhancement in Cognitive Radio Network.Jaya Lakshmi Arikatla G. N. Swamy M. N. Giri Prasad
A truthful budget feasible mechanism for IoT-based participatory sensing with incremental arrival of budget.Jaya Mukhopadhyay Vikash Kumar Singh Sajal Mukhopadhyay Anita Pal Abhishek Kumar
Employing entropy measures to identify visitors in multi-occupancy environments.Aadel Howedi Ahmad Lotfi Amir Pourabdollah
A novel single/multi-objective frameworks for techno-economic operation in power systems using tunicate swarm optimization technique. Exploitation whale optimization based optimal offloading approach and topology optimization in a mobile ad hoc cloud environment.Vylala Anoop Plakkottu Radhakrishnan Bipin
S-THAD: a framework for sensor-based temporal human activity detection from continuous data streams.Muhammad Ehatisham-ul-Haq Muhammad Awais Azam Fiza Murtaza Yasar Amin Qiang Fu
A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture.Abhrajyoti Das Abhilash Kumar Das Nirmalya Kar
HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. Real-time forecasting of petrol retail using dilated causal CNNs.Syed Muhammad Hur Rizvi Tahir Syed Jalaluddin Qureshi
Novel encryption for color images using fractional-order hyperchaotic system.Khalid M. Hosny Sara T. Kamal Mohamed M. Darwish
Detection of R-peaks using fractional Fourier transform and principal component analysis.Varun Gupta Monika Mittal Vikas Mittal Yatender Chaturvedi
Intelligent route discovery towards rushing attacks in ad hoc wireless networks.Udayakumar Allimuthu K. Mahalakshmi
l1/2 regularized joint low rank and sparse recovery technique for illumination map estimation in low light image enhancement. Machine learning based hybrid model for energy efficient secured transmission in wireless sensor networks.N. M. Saravana Kumar E. Suryaprabha K. Hariprasath
Impact of autoencoder based compact representation on emotion detection from audio.Nivedita Patel Shireen Patel Sapan H. Mankad
Req-WSComposer: a novel platform for requirements-driven composition of semantic web services.Maha Driss Safa Ben Atitallah Amal Albalawi Wadii Boulila
Path route layout design optimization using genetic algorithm: based on control mechanisms for on-line crossover intersection positions and bit targeted mutation.Zikrija Avdagic Amir Smajevic Samir Omanovic Ingmar Besic
Parametric and nonparametric correlation ranking based supervised feature selection methods for skin segmentation. Pipeline surveillance along the international border using hybrid optimization algorithm.Sudeep Varshney Chiranjeev Kumar Abhishek Swaroop
Serial attention network for skin lesion segmentation.Yuan Ren Long Yu Shengwei Tian Junlong Cheng Zhiqi Guo Yanhan Zhang
Real-time fast low-light vision enhancement for driver during driving at night.Gouranga Mandal Diptendu Bhattacharya Parthasarathi De
Decentralized blockchain based authentication for secure data sharing in Cloud-IoT.Uma Narayanan Varghese Paul Shelbi Joseph
Spectrogram analysis of ECG signal and classification efficiency using MFCC feature extraction technique.Yalamanchili Arpitha G. L. Madhumathi N. Balaji
Flexible big data approach for geospatial analysis. Facial expression recognition with trade-offs between data augmentation and deep learning features. Monitor system and Gaussian perturbation teaching-learning-based optimization algorithm for continuous optimization problems.Usharani Chelladurai Seethalakshmi Pandian
Improving time series forecasting using LSTM and attention models. Hadoop Deep Neural Network for offending drivers.Shiva Asadianfam Mahboubeh Shamsi Abdolreza Rasouli Kenari
PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system.Wei Zhang Zhishuo Zhang Hu Xiong Zhiguang Qin
Real-time isolated hand sign language recognition using deep networks and SVD.Razieh Rastgoo Kourosh Kiani Sergio Escalera
Computing stationary distributions of the D-MAP/D-MSP(a, b) /1 queueing system.Sujit Kumar Samanta Kousik Das
A multi-verse optimizer algorithm for ambulance repositioning in emergency medical service systems.Hamed Golabian Jamal Arkat Reza Tavakkoli-Moghaddam Hiwa Faroughi
COVINet: a convolutional neural network approach for predicting COVID-19 from chest X-ray images.Muhammad Umer Imran Ashraf Saleem Ullah Arif Mehmood Gyu Sang Choi
A survey on multi-authority and decentralized attribute-based encryption.Prince Silas Kwesi Oberko Victor-Hillary Kofi Setornyo Obeng Hu Xiong
An investigation on m-polar fuzzy threshold graph and its application on resource power controlling system.Tanmoy Mahapatra Madhumangal Pal
Novel one round message authentication scheme for constrained IoT devices.Hassan N. Noura Ola Salman Raphaël Couturier Ali Chehab
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.Liqiang Wu Xiaoyuan Yang Minqing Zhang Xu An Wang
Bi-objective optimization of application placement in fog computing environments. Some operations on Dombi neutrosophic graph.Tejinder Singh Lakhwani Kartick Mohanta Arindam Dey Sankar Prasad Mondal Anita Pal
IoE based framework for smart agriculture.Hitesh Mohapatra Amiya Kumar Rath
A feature reduction based reflected and exploited DDoS attacks detection system.Deepak Kshirsagar Sandeep Kumar
Machine learning as a tool to study the influence of chronodisruption in preterm births.Elena Díaz Catalina Fernández-Plaza Inés Abad Ana Alonso Celestino González Irene Díaz
Atom Taylor Bird Swarm algorithm-based deep belief network for incremental classification using medical data.Afnan M. Alhassan Wan Mohd Nazmee Wan Zainon
Correlation coefficient of T-spherical type-2 hesitant fuzzy sets and their applications in clustering analysis. Optimal school site selection in Urban areas using deep neural networks.Nimra Zaheer Saeed-Ul Hassan Mohsen Ali Mudassir Shabbir
Fermatean fuzzy CRITIC-EDAS approach for the selection of sustainable third-party reverse logistics providers using improved generalized score function.Arunodaya Raj Mishra Pratibha Rani Kiran Pandey
WS-ADVISING: a Reusable and reconfigurable microservices-based platform for effective academic advising. Simultaneous detection and tracking using deep learning and integrated channel feature for ambint traffic light recognition.Ke Wang Xinwei Tang Shulian Zhao Yuchen Zhou
Recent advancement in cervical cancer diagnosis for automated screening: a detailed review. Miniaturized DGS based multi-band pass filters for satellite applications. New mHealth hospital selection framework supporting decentralised telemedicine architecture for outpatient cardiovascular disease-based integrated techniques: Haversine-GPS and AHP-VIKOR.Osamah Shihab Albahri A. A. Zaidan B. B. Zaidan Ahmed Shihab Albahri Ali H. Mohsin K. I. Mohammed M. A. Alsalem
Optimal fuzzy repairs' scheduling and sequencing of failure types over multiple periods.Abbas Al-Refaie Ahmad Al-Hawadi
Review on implementation of IoT for environmental condition monitoring in the agriculture sector.Kurakula Arun Kumar Karthikeyan Jayaraman
Opportunities and challenges for applying process mining in healthcare: a systematic mapping study.Marcelo Rosano Dallagassa Cleiton dos Santos Garcia Edson Emílio Scalabrin Sergio Ossamu Ioshii Deborah Ribeiro Carvalho
Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm.S. Immaculate Shyla S. S. Sujatha
An enhanced opposition-based Salp Swarm Algorithm for global optimization and engineering problems. A short-turning strategy to alleviate bus bunching.Shengnan Tian Xiang Li Jiaming Liu Hongguang Ma Haitao Yu
VOP detection for read and conversation speech using CWT coefficients and phone boundaries.Kumud Tripathi K. Sreenivasa Rao
A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems.Ng Kim-Soon Alyaa Idrees Abdulmaged Salama A. Mostafa Mazin Abed Mohammed Fadia Abdalla Musbah Rabei Raad Ali Oana Geman
Service management mechanisms in the internet of things: an organized and thorough study.Jiuhong Yu Mengfei Wang Jinfan Liu Karlo Abnosian
Accurate detection of Covid-19 patients based on Feature Correlated Naïve Bayes (FCNB) classification strategy.Nehal A. Mansour Ahmed I. Saleh Mahmoud Mohammed Badawy Hesham A. Ali
A two-tier ensemble approach for writer dependent online signature verification.Pratik Bhowal Debanshu Banerjee Samir Malakar Ram Sarkar
SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems. Enhancing sentiment analysis using Roulette wheel selection based cuckoo search clustering method.