Content
January 2024, Volume 19, Issue 1
- 1-12 Exploration of College Students' Learning Adaptability Under the Background of Wisdom Education
by Henan Zhang & Xiangzhe Liu - 1-14 Research on VRP Model Optimization of Cold Chain Logistics Under Low-Carbon Constraints
by Ruixue Ma & Qiang Zhu - 1-14 GA-BP Optimization Using Hybrid Machine Learning Algorithm for Thermopile Temperature Compensation
by Ye Aifen & Lin Shuwan & Wang Huan - 1-15 Personalized Recommendation Method of E-Commerce Products Based on In-Depth User Interest Portraits
by Jingyi Li & Shaowu Bao - 1-15 Multimedia Human-Computer Interaction Method in Video Animation Based on Artificial Intelligence Technology
by Linran Sun & Nojun Kwak - 1-16 Securities Quantitative Trading Strategy Based on Deep Learning of Industrial Internet of Things
by Yi Tang & Xiaoning Wang & Wenyan Wang - 1-18 Application of QGA-BP Neural Network in Debt Risk Assessment of Government Platforms
by Qingping Li & Ming Liu & Yao Zhang - 1-18 Supplier Evaluation in Supply Chain Environment Based on Radial Basis Function Neural Network
by Shilin Liu & Guangbin Yu & Youngchul Kim - 1-18 An Equation Model on the Professional Knowledge and Confidence for Future Employment of Students in Programs Supported With Emerging Technologies
by XiFeng Liao - 1-19 Quantitative Evaluation Method of Psychological Quality of College Teachers Based on Fuzzy Logic
by Liangqun Yang & Jian Li - 1-19 Marketing Strategy of Private Enterprises Based on Bayesian Dynamic Panel Model of Machine Learning Algorithms
by Siyu Sun & Juan Long - 1-20 Emotional Behavior Analysis of Music Course Evaluation Based on Online Comment Mining
by Nan Li - 1-20 Manufacturing Process Optimization in the Process Industry
by Shilin Liu & Hanlie Cheng
January 2023, Volume 18, Issue 1
- 1-13 The Construction of Network Domain Name Security Access Identification System Based on Artificial Intelligence
by Lin Li - 1-14 Sports Work Strategy of College Counselors Based on MySQL Database Big Data Analysis
by Xiao Zhang & Ali Yu & Xin Wang & Xue Zhang - 1-14 Application of Big Data Privacy Protection Based on Edge Computing in the Prediction of Martial Arts Training Movement Trajectory
by Xing Li & ZhiYing Cui & FeiFei Zhang & Li Li - 1-15 Data Collection and Analysis in Physical Education Practical Teaching Based on Internet of Things
by Yang Xu & Min Liu - 1-15 Power System Relay Protection Based on Faster R-CNN Algorithm
by Yong Liu & Zhengbiao Jing - 1-15 Matching Prediction of Teacher Demand and Training Based on SARIMA Model Based on Neural Network
by Jianliu Zhu - 1-16 Echo State Network-Based Content Prediction for Mobile Edge Caching Networks
by Zengyu Cai & Xi Chen & Jianwei Zhang & Liang Zhu & Xinhua Hu - 1-16 The Economic Development Model and Strategy Selection of the Internet of Things Based on Big Data
by Xuelin Chen & Xia Zhao & Na Ye - 1-16 Exploration on Portfolio Selection and Risk Prediction in Financial Markets Based on SVM Algorithm
by Xinyu Han & Dianqi Yao - 1-16 Application of Long-Term Poverty Alleviation Mechanism in Chengde From the Perspective of Big Data Based on Computational Neural Model Fuzzy Algorithm
by Yanjie Zhu & Chunzheng Fu - 1-16 Application of Big Data in Entrepreneurship and Innovation Education for Higher Vocational Teaching
by Long Chen & Jiang He - 1-16 The Rating of Basketball Players' Competitive Performance Based on RBF-EVA Method
by Jian Jia & Hua Chen - 1-17 Predicting the Success of a Startup in Information Technology Through Machine Learning
by Edilberto Vasquez & José Santisteban & David Mauricio - 1-17 Analysis of Application and Creation Skills of Story-Based MV Micro Video and Big Multimedia Data in Music Communication
by Xi Zhang & Yue Cui - 1-17 Thinking on Construction of Intelligent Auxiliary Physical Exercise Mode Under National Fitness Plan
by Cheng Xu - 1-17 A Course Recommendation Algorithm for a Personalized Online Learning Platform for Students From the Perspective of Deep Learning
by Zhengmeng Xu & Hai Lin & Meiping Wu - 1-17 Basketball Footwork and Application Supported by Deep Learning Unsupervised Transfer Method
by Yu Feng & Hui Sun - 1-17 A TBGAV-Based Image-Text Multimodal Sentiment Analysis Method for Tourism Reviews
by Ke Zhang & Shunmin Wang & Yuanyu Yu - 1-18 A Meta-Analysis of Facebook-Assisted Learning Outcomes in Different Countries or Regions
by Liheng Yu & Wei Xu & Paisan Sukjairungwattana & Zhonggen Yu - 1-18 Classroom Design and Application of Art Design Education Based on Artificial Intelligence
by Yawen Zhao & Licheng Gao - 1-19 Influence of Agriculture M(i) Services on Rice Planting Costs on Chinese Family Farms
by Zhang Cheng & Ni Hu - 1-20 Deep Semantic-Level Cross-Domain Recommendation Model Based on DSV-CDRM
by Xuewei Lai & Qingqing Jie - 1-23 Implementation of a Web Application and GIS Electronic Atlas for Teaching in Open Education
by Saule Kairollovna Damekova & Lyubov Nikolaevna Karassyova & Nurlan Amirovich Medetov & Zamzagul Manapovna Ozhibayeva & Bozhidar Tsvetkov - 1-25 Evaluating the User Interface and Usability Approaches for E-Learning Systems
by Jehad Saad Alqurni - 1-26 Assessing the Usability of E-Learning Software Among University Students: A Study on Student Satisfaction and Performance
by Jehad Alqurni
January 2022, Volume 17, Issue 1
- 1-10 An Attendance System Using the Face Extraction and Recognition Technique Using PCA Algorithm
by Mazin S. Mohammed & Raya Basil Alothman - 1-11 Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML
by Dharmendra Kumar Singh Singh & Nithya N. & Rahunathan L. & Preyal Sanghavi & Ravirajsinh Sajubha Vaghela & Poongodi Manoharan & Mounir Hamdi & Godwin Brown Tunze - 1-13 Microclustering-Based Multi-Class Classification on Imbalanced Multi-Relational Datasets
by Hemlata Pant & Reena Srivastava - 1-14 Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology
by Sekar S. & Annamalai Solayappan & Srimathi J. & S. Raja & Durga S. & Poongodi Manoharan & Mounir Hamdi & Godwin Brown Tunze - 1-14 Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network
by Tamil Selvi P. & Kishore Balasubramaniam & Vidhya S. & Jayapandian N. & Ramya K. & Poongodi M. & Mounir Hamdi & Godwin Brown Tunze - 1-15 Winning the War on Terror: Using “Top-K” Algorithm and CNN to Assess the Risk of Terrorists
by Yaojie Wang & Xiaolong Cui & Peiyong He - 1-15 Time Effective Cloud Resource Scheduling Method for Data-Intensive Smart Systems
by Jiguang Duan & Yan Li & Liying Duan & Amit Sharma - 1-15 A New Internet of Things (IoT) Framework for Public Sectors
by Sara Jeza Alotaibi - 1-16 Research on System Risks of “Internet + Supply Chain Finance” Based on SNA, Dynamic Evolutionary Game, and Bayesian Learning Principle Simulation
by Ji Lu Liu & Ni Hu & Cheng Zhang - 1-17 Extracting Entity Synonymous Relations via Context-Aware Permutation Invariance
by Nan Yan & Subin Huang & Chao Kong - 1-17 MHDNNL: A Batch Task Optimization Scheduling Algorithm in Cloud Computing
by Qirui Li & Zhiping Peng & Delong Cui & Jianpeng Lin & Jieguang He - 1-18 An Integrated Remote Control-Based Human-Robot Interface for Education Application
by Xue-xi Duan & Yun-ling Wang & Wei-shan Dou & Rajeev Kumar & Nitin Saluja - 1-19 SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches
by Romil Rawat & Bhagwati Garg & Kiran Pachlasiya & Vinod Mahor & Shrikant Telang & Mukesh Chouhan & Surendra Kumar Shukla & Rina Mishra - 1-19 Predicting Academic Performance of Immigrant Students Using XGBoost Regressor
by Selvaprabu Jeganathan & Arun Raj Lakshminarayanan & Nandhakumar Ramachandran & Godwin Brown Tunze - 1-20 Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach
by Romil Rawat & Sanjaya Kumar Sarangi & Yagya Nath Rimal & P. William & Snehil Dahima & Sonali Gupta & K. Sakthidasan Sankaran - 1-20 A Semantic and Smart Framework for Handling Multilingual Linguistic Knowledge: A Framework and Case Implementation
by Mariem Neji & Fatma Ghorbel & Bilel Gargouri & Nada Mimouni & Elisabeth Métais - 1-21 A Secure Data Transfer Approach With an Efficient Key Management Over Cloud
by Lalit Mohan Gupta & Hitendra Garg & Abdus Samad - 1-21 Research Trends on Business Process Management in Higher Education and Recommendations for Vietnam
by Anh Hoang & Kha Van Phan & Vijender Kumar Solanki - 1-23 On Cost-Aware Heterogeneous Cloudlet Deployment for Mobile Edge Computing
by Hengzhou Ye & Fengyi Huang & Wei Hao - 1-23 Intelligent Anti-Jamming Decision Algorithm of Bivariate Frequency Hopping Pattern Based on DQN With PER and Pareto
by Jiasheng Zhu & Zhijin Zhao & Shilian Zheng - 1-23 Sentiment Analysis on Movie Reviews Dataset Using Support Vector Machines and Ensemble Learning
by Razia Sulthana A. & Jaithunbi A. K. & Haritha Harikrishnan & Vijayakumar Varadarajan - 1-23 Autocorrelation Regression Model Analysis and Selection of Cross-Border RMB Settlement From 2011 to 2020
by Cheng Zhang & Ni Hu & Qiang Yan - 1-24 Relationship Between Personality Patterns and Harmfulness: Analysis and Prediction Based on Sentence Embedding
by Kazuyuki Matsumoto & Ryota Kishima & Seiji Tsuchiya & Tomoki Hirobayashi & Minoru Yoshida & Kenji Kita - 1-25 Binary Self-Adaptive Salp Swarm Optimization-Based Dynamic Load Balancing in Cloud Computing
by Bivasa Ranjan Parida & Amiya Kumar Rath & Hitesh Mohapatra - 1-25 Multi-Objective Optimization-Oriented Resource Allocation in the Fog Environment: A New Hybrid Approach
by Sonti Harika & B. Chaitanya Krishna - 1-25 Biometric Cloud Services for Web-Based Examinations: An Empirical Approach
by Meennapa Rukhiran & Sorapak Pukdesree & Paniti Netinant - 1-25 Development of Mobile Learning English Web Application: Adoption of Technology in the Digital Teaching and Learning Framework
by Meennapa Rukhiran & Arpaporn Phokajang & Paniti Netinant - 1-30 Smart Contracts Security Threats and Solutions
by Senou Mahugnon Rosaire & Degila Jules
October 2021, Volume 16, Issue 4
- 1-34 Deadline-Constrained Cost-Effective Load-Balanced Improved Genetic Algorithm for Workflow Scheduling
by Sandeep Kumar Bothra & Sunita Singhal & Hemlata Goyal - 35-51 A Long Short-Term Memory Neural Network for Daily NO2 Concentration Forecasting
by Bingchun Liu & Xiaogang Yu & Qingshan Wang & Shijie Zhao & Lei Zhang - 52-73 An Improved Sentiment Analysis Approach to Detect Radical Content on Twitter
by kamel Ahsene Djaballah & Kamel Boukhalfa & Omar Boussaid & Yassine Ramdane - 74-98 Conventional and Evolutionary Order Reduction Techniques for Complex Systems
by Abha Kumari & C. B. Vishwakarma
July 2021, Volume 16, Issue 3
- 1-20 FaD-CODS Fake News Detection on COVID-19 Using Description Logics and Semantic Reasoning
by Kartik Goel & Charu Gupta & Ria Rawal & Prateek Agrawal & Vishu Madaan - 21-38 Analyzing Linguistic Features for Classifying Why-Type Non-Factoid Questions
by Manvi Breja & Sanjay Kumar Jain - 39-53 A Robust Lightweight Data Security Model for Cloud Data Access and Storage
by Pajany M. & Zayaraz G. - 54-73 An Adaptable Secure Scheme in Mobile Ad hoc Network to Protect the Communication Channel From Malicious Behaviours
by Srilakshmi R. & Jaya Bhaskar M.
April 2021, Volume 16, Issue 2
- 1-24 WDPMA: An MA-Based Model for Web Documents Prioritization
by Santosh Kumar & Ravi Kumar - 25-44 An Integer Linear Programming-Based Method for the Extraction of Ontology Alignment
by Naima El Ghandour & Moussa Benaissa & Yahia Lebbah - 45-57 Towards Efficient Big Data Storage With MapReduce Deduplication System
by Vijesh Joe & Jennifer S. Raj & Smys S. - 58-74 A Detector and Evaluation Framework of Abnormal Bidding Behavior Based on Supplier Portrait
by Xinqiang Ma & Xuewei Li & Baoquan Zhong & Yi Huang & Ye Gu & Maonian Wu & Yong Liu & Mingyi Zhang
January 2021, Volume 16, Issue 1
- 1-22 Programmable Implementation and Blockchain Security Scheme Based on Edge Computing Firework Model
by Bao Yi Qin & Zheng Hao & Zhao Qiang - 23-55 A New Pedestrian Feature Description Method Named Neighborhood Descriptor of Oriented Gradients
by Qian Liu & Feng Yang & XiaoFen Tang - 56-74 Spectral-Spatial Classification of Hyperspectral Image Based on Support Vector Machine
by Weiwei Yang & Haifeng Song - 75-94 Research and Application of a Multidimensional Association Rules Mining Method Based on OLAP
by Hairong Wang & Pan Huang & Xu Chen
October 2020, Volume 15, Issue 4
- 1-17 A Novel Algorithm for Distributed Data Stream Using Big Data Classification Model
by Yongxiao Qiu & Guanghui Du & Song Chai - 18-36 A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
by Muthukumaran V. & Ezhilmaran D. - 37-52 Spectral Clustering and Cost-Sensitive Deep Neural Network-Based Undersampling Approach for P2P Lending Data
by Pankaj Kumar Jadwal & Sonal Jain & Basant Agarwal - 53-71 Implementation of Web Log Mining Device Under Apriori Algorithm Improvement and Confidence Formula Optimization
by Lihua Zhu - 72-87 Integrity of E-Health Record Ensured With Context-Based Merkle Tree Through Temporal Shadow in Blockchain
by Charanya R. & Saravanaguru R. A. K.
July 2020, Volume 15, Issue 3
- 1-17 TBHM: A Secure Threshold-Based Encryption Combined With Homomorphic Properties for Communicating Health Records
by Lalit Mohan Gupta & Abdus Samad & Hitendra Garg - 18-33 Learning Models for Concept Extraction From Images With Drug Labels for a Unified Knowledge Base Utilizing NLP and IoT Tasks
by Sukumar Rajendran & Prabhu J. - 34-60 On Using Multiple Disabilities Profiles to Adapt Multimedia Documents: A Novel Graph-Based Method
by Asma Saighi & Zakaria Laboudi & Philippe Roose & Sébastien Laborie & Nassira Ghoualmi-Zine - 61-75 Analysis of Crime Data Using Neighbourhood Rough Sets
by Lydia J. Gnanasigamani & Seetha Hari - 76-101 FLCEER: Fuzzy Logic Cluster-Based Energy Efficient Routing Protocol for Underwater Acoustic Sensor Network
by Sathishkumar Natesan & Rajakumar Krishnan
April 2020, Volume 15, Issue 2
- 1-29 A Semantic Matching Strategy for Very Large Knowledge Bases Integration
by Antonio M. Rinaldi & Cristiano Russo & Kurosh Madani - 30-49 Dealing with Precise and Imprecise Temporal Data in Crisp Ontology
by Fatma Ghorbel & Fayçal Hamdi & Elisabeth Métais - 50-76 IoT-Based Smart Home Process Management Using a Workflow Approach
by Mohammed Eldjilali Ouldkablia & Bouabdellah Kechar & Samia Bouzefrane - 77-101 Using Query Expansion Techniques and Content-Based Filtering for Personalizing Analysis in Big Data
by Sadek Menaceur & Makhlouf Derdour & Abdelkrim Bouramoul - 102-113 eHealth Adoption on Patients' Pre-Consultation Waiting Time: A Comparative Assessment of Two District Hospitals in Abuja, Nigeria
by Iniobong Ekong & Oluwaseun Esan & Emeka Chukwu & Mohammed Kawu
January 2020, Volume 15, Issue 1
- 1-16 ThespisTRX: Causally-Consistent Read Transactions
by Carl Camilleri & Joseph G. Vella & Vitezslav Nezval - 17-34 A Novel Method to Dynamically Fix Threshold for Node Neighbourhood Based Link Prediction Techniques
by Anand Kumar Gupta & Neetu Sardana - 35-51 An Effective Recommender System Based on Clustering Technique for TED Talks
by Faiz Maazouzi & Hafed Zarzour & Yaser Jararweh - 52-63 Impact of Method Noise on SAR Image Despeckling
by Prabhishek Singh & Raj Shree - 64-74 Generating Summaries Through Unigram and Bigram: Text Summarization
by Nesreen Mohammad Alsharman & Inna V. Pivkina - 75-94 An Intelligent System for Predicting a User Access to a Web Based E-Learning System Using Web Mining
by Sathiyamoorthi V.
October 2019, Volume 14, Issue 4
- 1-18 GANDIVA: Temporal Pattern Tree for Similarity Profiled Association Mining
by Vangipuram Radhakrishna & Puligadda Veereswara Kumar & Vinjamuri Janaki - 19-49 An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection
by Gunupudi Rajesh Kumar & Narsimha Gugulothu & Mangathayaru Nimmala - 50-63 Query Optimization in Crowd-Sourcing Using Multi-Objective Ant Lion Optimizer
by Deepak Kumar & Deepti Mehrotra & Rohit Bansal - 64-78 An Enhanced and Efficient Multi-View Clustering Trust Inference Approach by GA Model
by Ravichandran M & Subramanian K M & Jothikumar R - 79-100 Time-Based QoS Prediction and Rank Aggregation of Web Services
by V. Mareeswari & E. Sathiyamoorthy
July 2019, Volume 14, Issue 3
- 1-15 Enhanced Event Detection in Twitter Through Feature Analysis
by Dharini Ramachandran. & Parvathi R. - 16-36 Feature Optimization in Sentiment Analysis by Term Co-occurrence Fitness Evolution (TCFE)
by Sudarshan S. Sonawane & Satish R. Kolhe - 37-63 HBSD: A Hadoop Based Service Discovery Model for Enterprise Cloud Bus
by Gitosree Khan & Anirban Sarkar & Sabnam Sengupta - 64-77 A Customized Quality Model for Software Quality Assurance in Agile Environment
by Parita Jain & Arun Sharma & Laxmi Ahuja - 78-92 Toward a More Robust Home Automated System: Introducing a Voice Activation Technique via Pubnub
by Segun Aina & Samuel Dayo Okegbile & Adeniran Ishola Oluwaranti & Oghenerukome Brenda Okoro & Tayo Obasanya
April 2019, Volume 14, Issue 2
- 1-26 A Multicriteria Group Decision Support System: An Approach Based Agents and Web Services
by Nesrine Hamdani & Djamila Hamdadou - 27-40 Scalable l-Diversity: An Extension to Scalable k-Anonymity for Privacy Preserving Big Data Publishing
by Udai Pratap Rao & Brijesh B. Mehta & Nikhil Kumar - 41-51 A Novel Scalable Signature Based Subspace Clustering Approach for Big Data
by T. Gayathri & D. Lalitha Bhaskari - 52-73 An Adaptive Approach Towards Computation Offloading for Mobile Cloud Computing
by Archana Kero & Abhirup Khanna & Devendra Kumar & Amit Agarwal - 74-91 An Attribute-Based Assured Deletion Scheme in Cloud Computing
by Fangfang Shan & Hui Li & Fenghua Li & Yunchuan Guo & Jinbo Xiong - 92-117 An Improved Task Scheduling Mechanism Using Multi-Criteria Decision Making in Cloud Computing
by Suvendu Chandan Nayak & Chitaranjan Tripathy
January 2019, Volume 14, Issue 1
- 1-26 Dynamic Backfilling Algorithm to Increase Resource Utilization in Cloud Computing
by Suvendu Chandan Nayak & Sasmita Parida & Chitaranjan Tripathy & Prasant Kumar Pattnaik - 27-41 An Approach for Load Balancing in Cloud Computing Using JAYA Algorithm
by Subhadarshini Mohanty & Prashanta Kumar Patra & Mitrabinda Ray & Subasish Mohapatra - 42-65 A Systems Overview of Commercial Data Centers: Initial Energy and Cost Analysis
by Sardar Khaliq Uzaman & Atta ur Rehman Khan & Junaid Shuja & Tahir Maqsood & Faisal Rehman & Saad Mustafa - 66-84 An SVM-Based Ensemble Approach for Intrusion Detection
by Santosh Kumar Sahu & Akanksha Katiyar & Kanchan Mala Kumari & Govind Kumar & Durga Prasad Mohapatra - 85-111 A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network
by Pooja Chaudhary & B. B. Gupta & Shashank Gupta - 112-131 A Hybrid Pre-Post Constraint-Based Framework for Discovering Multi-Dimensional Association Rules Using Ontologies
by Emad Alsukhni & Ahmed AlEroud & Ahmad A. Saifan
October 2018, Volume 13, Issue 4
- 1-13 Mobile Apps Acceptability: A Meta-Analysis Model for Google Play
by Usman Shehzaib & Javed Ferzund & Muhammad Asif - 14-34 Formal Specification of Adaptable Semantic Web Services Composition
by Rihab Ben Lamine & Raoudha Ben Jemaa & Ikram Amous Ben Amor - 35-60 Modular Ontologies Composition: Levenshtein-Distance-Based Concepts Structure Comparison
by Hanen Abbes & Faïez Gargouri - 61-77 Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks
by Akashdeep Bhardwaj & Sam Goundar - 78-103 Privacy-Preserving Orchestrated Web Service Composition with Untrusted Brokers
by Imen Khabou & Mohsen Rouached & Alexandre Viejo & David Sánchez - 104-123 An Unsupervised Approach for Determining Link Specifications
by Khayra Bencherif & Mimoun Malki & Djamel Amar Bensaber
July 2018, Volume 13, Issue 3
- 1-13 Skipnet-Octree Based Indexing Technique for Cloud Database Management System
by Shweta Malhotra & Mohammad Najmud Doja & Bashir Alam & Mansaf Alam - 14-34 Energy Efficient Scheduling for Multiple Workflows in Cloud Environment
by Ritu Garg & Neha Shukla - 35-53 Analysis and Development of Load Balancing Algorithms in Cloud Computing
by Deepa Bura & Meeta Singh & Poonam Nandal - 54-72 Resource Scheduling and Load Balancing Fusion Algorithm with Deep Learning Based on Cloud Computing
by Xiaojing Hou & Guozeng Zhao - 73-84 Research on O2O Platform and Promotion Algorithm of Sports Venues Based on Deep Learning Technique
by Kaiyan Han & Qin Wang - 85-98 A Deep Learning Solution for Multimedia Conference System Assisted by Cloud Computing
by Wei Zhang & Huiling Shi & Xinming Lu & Longquan Zhou - 99-111 Real-Time Streaming Data Analysis Using a Three-Way Classification Method for Sentimental Analysis
by Srinidhi Hiriyannaiah & G.M. Siddesh & K.G. Srinivasa
April 2018, Volume 13, Issue 2
- 1-10 Heuristic Based Coverage Aware Load Balanced Clustering in WSNs and Enablement of IoT
by Surjit Singh & Rajeev Mohan Sharma - 11-23 A MapReduce-Based User Identification Algorithm in Web Usage Mining
by Mitali Srivastava & Rakhi Garg & P.K. Mishra - 24-36 A Novel Approach for Multi-Cloud Storage for Mobile Devices
by Rajeev Kumar Bedi & Jaswinder Singh & Sunil Kumar Gupta - 37-47 Big Data Handling Over Cloud for Internet of Things
by Tarun Goyal & Rakesh Rathi & Vinesh Kumar Jain & Emmanuel Shubhakar Pilli & Arka Prokash Mazumdar - 48-55 Security Against Network Layer Attacks for Hierarchal Mesh Environments
by Geetanjali Rathee & Hemraj Saini - 56-69 PowKMeans: A Hybrid Approach for Gray Sheep Users Detection and Their Recommendations
by Honey Jindal & Shalini Agarwal & Neetu Sardana
January 2018, Volume 13, Issue 1
- 1-19 MCWDF: Micro Chunk Based Web Delivery Framework
by Shailesh Shivakumar & Venkata Suresh Pachigolla - 20-38 Access to Device Reachability Data as a Component of Horizontal M2M Service Platform
by Evelina Pencheva - 39-49 Research and Implementation of a Modern Agricultural Greenhouse Cultivation System Based on Internet of Things
by Shouying Lin & Shuyuan Li & Qijie Feng & Tengyue Zou - 50-68 A Dynamic and Adaptable Service Composition Architecture in the Cloud Based on a Multi-Agent System
by Abdelhak Merizig & Okba Kazar & Maite Lopez-Sanchez - 69-80 Optimal Strategy in Queueing Systems in Emergency Department
by Zeng Hui & Tian Ruiling & Liu Yupeng & Hou Yumei
October 2017, Volume 12, Issue 4
- 1-21 Real-Time Unspecified Major Sub-Events Detection in the Twitter Data Stream That Cause the Change in the Sentiment Score of the Targeted Event
by Ritesh Srivastava & M.P.S. Bhatia - 22-41 A Model Transformation Approach for Specifying Real-Time Systems and Its Verification Using RT-Maude
by Messaoud Bendiaf & Mustapha Bourahla & Malika Boudia & Seidali Rehab - 42-55 Study on Secure Dynamic Covering Algorithm for E-Logistics Information in a Cloud Computing Platform
by Yan He - 56-71 The Big Data Processing of HF Sky-Wave Radar Sea Echo for Detection of Sea Moving Targets
by Qianzhao Lei & Zhensen Wu & Lixin Guo & Junmei Fan & Senlin Geng - 72-86 HDAC High-Dimensional Data Aggregation Control Algorithm for Big Data in Wireless Sensor Networks
by Zeyu Sun & Xiaohui Ji
July 2017, Volume 12, Issue 3
- 1-10 Image Recognition of Rapeseed Pests Based on Random Forest Classifier
by Li Zhu & Minghu Wu & Xiangkui Wan & Nan Zhao & Wei Xiong - 11-27 Personalized Recommendation Mechanism Based on Collaborative Filtering in Cloud Computing Environment
by Xinling Tang & Hongyan Xu & Yonghong Tan & Yanjun Gong - 28-41 Navigation Path Detection for Cotton Field Operator Robot Based on Horizontal Spline Segmentation
by Dongchen Li & Shengyong Xu & Yuezhi Zheng & Changgui Qi & Pengjiao Yao - 42-50 Design of Vision Measurement Device for Seeding Robot based on Ant Colony Algorithm and Nonlinear Circuit System
by Liu Xiaojie & Zhu Hongjin & Fan Honghui & Zhang Min - 51-61 PID Control Algorithm Based on Genetic Algorithm and its Application in Electric Cylinder Control
by Geng Zhang & Xiansheng Gong & Xirui Chen - 62-73 An Efficient Spatiotemporal Approach for Moving Object Detection in Dynamic Scenes
by Min Liu & Yang Liu & Cong Liu & Juan Wang & Minghu Wu - 74-82 Research on the Information Construction of Accounting Audit Based on the Big Data of Computer
by Dongmei Lin - 83-96 Design and Implementation of Wireless Voltage Monitoring System Based on Zigbee
by Luo Xiaohui
April 2017, Volume 12, Issue 2
- 1-25 A New Method for Building Probabilistic Ontology (Prob-Ont)
by Emna Hlel & Salma Jamoussi & Abdelmajid Ben Hamadou - 26-48 Semantic Reconciliation of Electronic Health Records Using Semantic Web Technologies
by Karim El Guemhioui & Steven A. Demurjian - 49-65 Approaches and Principles for UX Web Experiences: A Case Study Approach
by Fernando Almeida & José Augusto Monteiro
January 2017, Volume 12, Issue 1
- 1-18 Semantic Mediation in MedPeer: An Ontology-Based Heterogeneous Data Sources Integration System
by Naïma Souâd Ougouti & Haféda Belbachir & Youssef Amghar - 19-36 A Novel Approach to Construct Semantic Mashup using Patterns
by Khayra Bencherif & Djamel Amar Bensaber & Mimoun Malki - 37-56 Semantic / Fuzzy Information Retrieval System
by Mounira Chkiwa & Anis Jedidi & Faiez Gargouri
October 2016, Volume 11, Issue 4
- 1-23 Enhancing Interface Understandability as a Means for Better Discovery of Web Services
by Usama Mahmoud Maabed & Ahmed El-Fatatry & Adel El-Zoghabi - 24-42 A Constraint Programming Approach for Web Log Mining
by Amina Kemmar & Yahia Lebbah & Samir Loudni - 43-62 Provenance in Web Feed Mash-Up Systems
by Watsawee Sansrimahachai
July 2016, Volume 11, Issue 3
- 1-14 Image Mosaicing Using Binary Edge Detection Algorithm in a Cloud-Computing Environment
by Abdullah Alamareen & Omar Al-Jarrah & Inad A. Aljarrah - 15-31 Using Enhanced Lexicon-Based Approaches for the Determination of Aspect Categories and Their Polarities in Arabic Reviews
by Mohammad Al Smadi & Islam Obaidat & Mahmoud Al-Ayyoub & Rami Mohawesh & Yaser Jararweh - 32-49 Polarity Classification of Arabic Sentiments
by Mohammed N. Al-Kabi & Heider A. Wahsheh & Izzat M. Alsmadi - 50-64 Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
by Nabeel Khan & Adil Al-Yasiri - 65-78 Privacy Preserving Framework to Support Mobile Government Services
by Muder Almiani & Abdul Razaque & Ayman Al Dmour
April 2016, Volume 11, Issue 2
- 1-13 A Novel Cache Replacement Policy for Web Proxy Caching System Using Web Usage Mining
by V. Sathiyamoorthi - 14-38 Alignment Evolution under Ontology Change
by Ahmed Zahaf & Mimoun Malki - 39-50 Extracting Usage Patterns from Power Usage Data of Homes' Appliances in Smart Home using Big Data Platform
by Ali Reza Honarvar & Ashkan Sami - 51-62 Disambiguating the Twitter Stream Entities and Enhancing the Search Operation Using DBpedia Ontology: Named Entity Disambiguation for Twitter Streams
by N. Senthil Kumar & Dinakaran Muruganantham
January 2016, Volume 11, Issue 1
- 1-21 An Approach Based on Service Components for Adapting Web-Oriented Applications
by Soumia Bendekkoum & Mahmoud Boufaida & Lionel Seinturier - 22-43 A Similarity Measure across Ontologies for Web Services Discovery
by Aissa Fellah & Mimoun Malki & Atilla Elci - 44-76 Access Control and Information Flow Control for Web Services Security
by Saadia Kedjar & Abdelkamel Tari & Peter Bertok
October 2015, Volume 10, Issue 4
- 1-19 An Approach to Data Annotation for Internet of Things
by Ivaylo Atanasov & Anastas Nikolov & Evelina Pencheva & Rozalina Dimova & Martin Ivanov - 20-43 A Decentralized Framework for Semantic Web Services Discovery Using Mobile Agent
by Nadia Ben Seghir & Okba Kazar & Khaled Rezeg - 44-66 TemporalClassifier: Classification of Implicit Query on Temporal Profiles
by Rahul Pradhan & Dilip Kumar Sharma
July 2015, Volume 10, Issue 3
- 1-16 Research on Fault Diagnosis Method Using Improved Multi-Class Classification Algorithm and Relevance Vector Machine
by Kun Wu & Jianshe Kang & Kuo Chi - 17-32 Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart
by Qingyu Chen & Longsheng Wu & Li Li & Xuhan Ma & Xu An Wang - 33-45 A Study on Components and Features in Face Detection
by Yang Hua-Chun & Xu An Wang - 46-63 A High-Capacity Covering Code for Voice-Over-IP Steganography
by Hui Tian & Jie Qin & Yongfeng Huang & Xu An Wang & Jin Liu & Yonghong Chen & Tian Wang & Yiqiao Cai - 64-81 An Improved Multilinear Map and its Applications
by Chunsheng Gu - 82-102 An Additively Homomorphic Encryption over Large Message Space
by Hu Chen & Yupu Hu & Zhizhu Lian & Huiwen Jia & Xu An Wang
April 2015, Volume 10, Issue 2
- 1-15 Development and Testing of New E-Learning Hypermedia System
by Lamia Mahnane & Mohamed Hafidi - 16-42 HOD2MLC: Hybrid Ontology Design and Development Model with Lifecycle
by Rishi Kanth Saripalle & Steven A. Demurjian & Michael Blechner & Thomas Agresta - 43-61 An Agent-Mediated Platform for Business Processes
by Hoa Khanh Dam & Aditya Ghose & Mohammad Qasim
January 2015, Volume 10, Issue 1
- 1-30 Checking Opacity of Vulnerable Critical Systems On-The-Fly
by Amina Bourouis & Kais Klai & Yamen El Touati & Nejib Ben Hadj-Alouane - 31-46 C-SCRIP: Collaborative Security Pattern Integration Process
by Rahma Bouaziz & Fatma Krichen & Bernard Coulette - 47-74 A Complete Security Framework for Wireless Sensor Networks: Theory and Practice
by Christophe Guyeux & Abdallah Makhoul & Ibrahim Atoui & Samar Tawbi & Jacques M. Bahi
October 2014, Volume 9, Issue 4
- 1-12 Diagnosis and Classification of Chronic Renal Failure Utilising Intelligent Data Mining Classifiers
by Abeer Y. Al-Hyari & Ahmad M. Al-Taee & Majid A. Al-Taee