default search action
International Journal of Computers Communications & Control, Volume 14
Volume 14, Number 1, 2019
- Changshun Du, Lei Huang:
Sentiment Analysis Method based on Piecewise Convolutional Neural Network and Generative Adversarial Network. 7-20 - Omar A. Hammood, Mohd Nizam, Muamer Nafaa, Waleed A. Hammood:
RESP: Relay Suitability-based Routing Protocol for Video Streaming in Vehicular Ad Hoc Networks. 21-38 - Germán Adolfo Montoya, Yezid Donoso:
A Prediction Algorithm based on Markov Chains for finding the Minimum Cost Path in a Mobile WSNs. 39-55 - Dan Noje, Radu Catalin Tarca, Ioan Dzitac, Nicolae Pop:
IoT Devices Signals Processing based on Multi-dimensional Shepard Local Approximation Operators in Riesz MV-algebras. 56-62 - Sever Gabriel Racz, Radu-Eugen Breaz, Octavian Bologa, Melania Tera, Valentin Stefan Oleksik:
Using an Adaptive Network-based Fuzzy Inference System to Estimate the Vertical Force in Single Point Incremental Forming. 63-77 - Haiping Ren, Shixiao Xiao, Hui Zhou:
A Chi-square Distance-based Similarity Measure of Single-valued Neutrosophic Set and Applications. 78-89 - Zenonas Turskis, Simona Dzitac, Ausra Stankiuviene, Ritoldas Sukys:
A Fuzzy Group Decision-making Model for Determining the Most Influential Persons in the Sustainable Prevention of Accidents in the Construction SMEs. 90-106 - Qianqian Zhang, Shifeng Liu, Daqing Gong, Qun Tu:
A Latent-Dirichlet-Allocation Based Extension for Domain Ontology of Enterprise's Technological Innovation. 107-123 - Shuai Zhang, Yong Chen, Xiaoling Huang, Yishuai Cai:
Text Classification of Public Feedbacks using Convolutional Neural Network Based on Differential Evolution Algorithm. 124-134
Volume 14, Number 2, 2019
- Xiaolong Feng, Jing Gao:
Gene Sequences Parallel Alignment Model Based on Multiple Inputs and Outputs. 141-153 - Adrian-Catalin Florea, Razvan Andonie:
Weighted Random Search for Hyperparameter Optimization. 154-169 - Yue Huang:
Heterogeneous Data Clustering Considering Multiple User-provided Constraints. 170-182 - C. Jothikumar, Revathi Venkataraman:
EODC: An Energy Optimized Dynamic Clustering Protocol for Wireless Sensor Network using PSO approach. 183-198 - Leixiao Li, Jing Gao, Ren Mu:
Optimal Data File Allocation for All-to-All Comparison in Distributed System: A Case Study on Genetic Sequence Comparison. 199-211 - Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo:
Performance Analysis of RAW Impact on IEEE 802.11ah Standard affected by Doppler Effect. 212-219 - Haiping Ren, Manfeng Liu, Hui Zhou:
Extended TODIM Method for MADM Problem under Trapezoidal Intuitionistic Fuzzy Environment. 220-232 - R. Senthilkumar, G. M. Tamilselvan, S. Kanithan, N. Arun Vignesh:
Routing in WSNs Powered by a Hybrid Energy Storage System through a CEAR Protocol Based on Cost Welfare and Route Score Metric. 233-252 - Alexandru Tugui, Daniela Danciulescu, Mihaela-Simona Subtirelu:
The Biological as a Double Limit for Artificial Intelligence: Review and Futuristic Debate. 253-271 - Fushen Yang, Changshun Du, Lei Huang:
Ensemble Sentiment Analysis Method based on R-CNN and C-RNN with Fusion Gate. 272-285
Volume 14, Number 3, 2019
- Kemal Alic, Mihael Mohorcic, Ales Svigelj:
Network and Traffic Design Aspects in Network-Coding-Enabled Wireless Networks. 293-310 - Mo Chen:
Research on Key Technology of Web Hierarchical Topic Detection and Evolution Based on Behaviour Tracking Analysis. 311-328 - Yukun Dong, Jiantao Zhang, Zhen Li, Yong Hu, Yong Deng:
Combination of Evidential Sensor Reports with Distance Function and Belief Entropy in Fault Diagnosis. 329-343 - Wei Hu, Wenhui Yao, Yawei Hu, Huanhao Li:
Selection of Cluster Heads for Wireless Sensor Network in Ubiquitous Power Internet of Things. 344-358 - Gu-Min Jeong, Kyoungwoo Lee, Sang-Il Choi, Sang-Hoon Ji, Nikil D. Dutt:
Effect of Soft Errors in Iterative Learning Control and Compensation using Cross-layer Approach. 359-374 - Michael Miranda, Renato Salinas, Ulrich Raff, Oscar Magna:
Wavelet Design for Automatic Real-Time Eye Blink Detection and Recognition in EEG Signals. 375-387 - Attila Simo, Constantin Barbulescu, Stefan Kilyeni, Claudia Dragos:
Manufacturing Process Monitoring in Terms of Energy Management Improving. 388-400 - Xiaoru Song, Song Gao, Chaobo Chen, Zepeng Gao:
Enhanced Fireworks Algorithm-Auto Disturbance Rejection Control Algorithm for Robot Fish Path Tracking. 401-418 - Yuhe Wang, Peili Qiao, Zhiyong Luo, Guanglu Sun, Guangze Wang:
Reliability Assessment Model for Industrial Control System Based on Belief Rule Base. 419-436 - Jie Zhao, Yong Deng:
Performer selection in Human Reliability analysis: D numbers approach. 437-452
Volume 14, Number 4, 2019
- Gubba Balakrishna, Nageswara Rao Moparthi:
ESBL: Design and Implement A Cloud Integrated Framework for IoT Load Balancing. 459-474 - Benchun Cao, Yanchun Liang, Shinichi Yoshida, Renchu Guan:
Facial Expression Decoding based on fMRI Brain Signal. 475-488 - Dan Chang, Hao Yu Gui, Rui Fan, Ze Zhou Fan, Ji Tian:
Application of Improved Collaborative Filtering in the Recommendation of E-commerce Commodities. 489-502 - Wei Hu, Huanhao Li, Wenhui Yao, Yawei Hu:
Energy Optimization for WSN in Ubiquitous Power Internet of Things. 503-517 - Waleed Nazih, Yasser Hifny, Wail Elkilani, Tamer Abdelkader, Hossam El Deen Mostafa Faheem:
Efficient Detection of Attacks in SIP Based VoIP Networks Using Linear l1-SVM Classifier. 518-529 - Doan Perdana, Aji Nur Sanyoto, Gustommy Bisono:
Performance Evaluation and Comparison of Scheduling Algorithms on 5G Networks using Network Simulator. 530-539 - Dewen Seng, Jiaxin Liu, Xuefeng Zhang, Jing Chen, Xujian Fang:
Top-N Recommendation Based on Mutual Trust and Influence. 540-556 - Yunlei Sun, Huiquan Gong, Yucong Li, Dalin Zhang:
Hyperparameter Importance Analysis based on N-RReliefF Algorithm. 557-573 - Linyan Xue, Xiaoke Zhang, Fei Xie, Shuang Liu, Peng Lin:
Frequent Patterns Algorithm of Biological Sequences based on Pattern Prefix-tree. 574-589 - Xuefeng Zhang, Xiuli Chen, Dewen Seng, Xujian Fang:
A Factored Similarity Model with Trust and Social Influence for Top-N Recommendation. 590-607
Volume 14, Number 5, 2019
- Jin Hua, Lile He, Zhiqiang Kang, Keding Yan:
A Force/Position Hybrid Controller for Rehabilitation Robot. 615-628 - Arturas Kaklauskas, Domnica Dzitac, Jurate Sliogeriene, Natalija Lepkova, Ingrida Vetloviene:
VINERS Method for the Multiple Criteria Analysis and Neuromarketing of Best Places to Live. 629-646 - Yonal Kirsal:
Exploring Analytical Models for Performability Evaluation of Virtualized Servers using Dynamic Resource. 647-659 - Tao Lin, Peng Wu, Fengmei Gao, Tianshu Wu:
Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation. 660-671 - Baoyu Liu, Yong Deng:
Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory. 672-691 - D. Ha Vu, Shoudao Huang, T. Diep Tran, Vu Thi Yen, Cuong Van Pham:
A Robust Adaptive Control using Fuzzy Neural Network for Robot Manipulators with Dead-Zone. 692-710 - Xinxin Wang, Zeshui Xu, Ioan Dzitac:
Bibliometric Analysis on Research Trends of International Journal of Computers Communications & Control. 711-732 - Hualong Xie, Yao Xie, Fei Li:
Design, Modeling and Control of Bionic Knee in Artificial Leg. 733-752 - Lian Zhou, Fuyuan Xiao:
DCM: D Number Extended Cognitive Map. Application on Location Selection in SCM. 753-771
Volume 14, Number 6, 2019
- Jianwu Jiang, Zhi Chen, Yihuai Wang, Tao Peng, Shilang Zhu, Lianmin Shi:
Parameter Estimation for PMSM based on a Back Propagation Neural Network Optimized by Chaotic Artificial Fish Swarm Algorithm. 615-632 - Yang Li, Zeshui Xu, Xinxin Wang, Florin Gheorghe Filip:
Studies in Informatics and Control: A Bibliometric Analysis from 2008 to 2019. 633-652 - Fangyao Liu, Yayu Peng, Zhengxin Chen, Yong Shi:
Modeling of Characteristics on Artificial Intelligence IQ Test: a Fuzzy Cognitive Map-Based Dynamic Scenario Analysis. 653-669 - Ajeet Singh, Anurag Jain:
An Empirical Study of AML Approach for Credit Card Fraud Detection-Financial Transactions. 670-690 - Jangiti Siva Prashanth, Satyanarayana V. Nandury:
A Cluster-based Approach for Minimizing Energy Consumption by Reducing Travel Time of Mobile Element in WSN. 691-709 - Mohammad Hashemi Tabatabaei, Maghsoud Amiri, Mohammad Ghahremanloo, Mehdi Keshavarz Ghorabaee, Edmundas Kazimieras Zavadskas, Jurgita Antucheviciene:
Hierarchical Decision-making using a New Mathematical Model based on the Best-worst Method. 710-725 - Phuc Huu Truong, Sujeong You, Sang-Hoon Ji, Gu-Min Jeong:
Wearable System for Daily Activity Recognition Using Inertial and Pressure Sensors of a Smart Band and Smart Shoes. 726-742 - Donatas Vitkus, Zilvinas Steckevicius, Nikolaj Goranin, Diana Kalibatiene, Antanas Cenys:
Automated Expert System Knowledge Base Development Method for Information Security Risk Analysis. 743-758 - Minjuan Zhong, Liang Tan, Xilong Qu:
Identification of Opinion Spammers using Reviewer Reputation and Clustering Analysis. 759-772
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.