default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 7
Volume 7, Number 1, February 2016
- Nirmalya Roy, Archan Misra, Diane J. Cook:
Ambient and smartphone sensor assisted ADL recognition in multi-inhabitant smart environments. 1-19 - Changsheng Wan, Juan Zhang, Bei Pei, Changsong Chen:
Efficient privacy-preserving third-party auditing for ambient intelligence systems. 21-27 - Xiaobo Liu, Guangjun Wang, Zhihua Cai, Harry Zhang:
Bagging based ensemble transfer learning. 29-36 - Jialing Han, Xiaohui Zhao, Chunyan Qiu:
A digital image watermarking method based on host image analysis and genetic algorithm. 37-45 - Giuseppe D'Aniello, Angelo Gaeta, Matteo Gaeta, Mario Lepore, Francesco Orciuoli, Orlando Troisi:
A new DSS based on situation awareness for smart commerce environments. 47-61 - Changji Wang, Dong-Yuan Shi, Xi-Lei Xu, Jian Fang:
An anonymous data access scheme for VANET using pseudonym-based cryptography. 63-71 - Chao Qu, Fagui Liu, Ming Tao, Dacheng Deng:
An OWL-S based specification model of dynamic entity services for Internet of Things. 73-82 - Alket Cecaj, Marco Mamei, Franco Zambonelli:
Re-identification and information fusion between anonymized CDR and social network data. 83-96 - Giorgio Graditi, Maria Luisa Di Silvestre, Diego La Cascia, Eleonora Riva Sanseverino, Gaetano Zizzo:
On multi-objective optimal reconfiguration of MV networks in presence of different grounding. 97-105 - Meng-Dar Shieh, Yu-En Yeh, Chih-Lung Huang:
Eliciting design knowledge from affective responses using rough sets and Kansei engineering system. 107-120 - Zhen Liu, Ruoyu Wang, Ming Tao:
SmoteAdaNL: a learning method for network traffic classification. 121-130 - Wei Guan, Cheng Wang, Yiqiao Cai, Huizhen Zhang:
Design and implementation of wireless monitoring network for temperature-humidity measurement. 131-138 - Jin Liu, Hui Tian, Jing Lu, Yonghong Chen:
Neighbor-index-division steganography based on QIM method for G.723.1 speech streams. 139-147
Volume 7, Number 2, April 2016
- Massimo Ficco:
Editorial: security and reliability of critical systems. 149-151 - Zhengjun Jing, Guoping Jiang, Chunsheng Gu, Zhimin Yu, Lingling Xu:
Anonymous authentication for circuits from correlation-relaxed two-to-one recoding. 153-161 - Jyh-Horng Wen, Jheng-Sian Li, Cheng-Ying Yang, Chun-Hung Chen, Hsing-Chung Chen, Chuan-Hsien Mao:
Localization scheme based on multistatic radar systems. 163-169 - Dominik Egarter, Andrea Monacchi, Tamer Khatib, Wilfried Elmenreich:
Integration of legacy appliances into home energy management systems. 171-185 - Adel Boukhadra, Karima Benatchba, Amar Balla:
Efficient distributed discovery and composition of OWL-S process model in P2P systems. 187-203 - Shan Xue, Li Xiong, Shufen Yang, Lu Zhao:
A self-adaptive multi-view framework for multi-source information service in cloud ITS. 205-220 - Wenjing Tang, Yilei Wang, Wei He:
An image segmentation algorithm based on improved multiscale random field model in wavelet domain. 221-228 - Zhendong Wu, Jie Yuan, Jianwu Zhang, Huaxin Huang:
A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation. 229-238 - Luigi Troiano, Cosimo Birtolo, Roberto Armenise:
Searching optimal menu layouts by linear genetic programming. 239-256 - Nan Jiang, Bin Li, Huan Chen, Tao Wan, Lingfeng Liu:
DWDH: directed and weighted dynamics of hierarchical wireless sensor networks. 257-265 - Seung-Yeon Kim, Hoon Jung Koo, Ha Yoon Song:
A study on influence of human personality to location selection. 267-285 - Basem Almadani:
QoS-aware real-time pub/sub middleware for drilling data management in petroleum industry. 287-299
Volume 7, Number 3, June 2016
- Ansar-Ul-Haque Yasar, Haroon Malik, Elhadi M. Shakshuki:
New advances in ambient information systems. 301-303 - Behailu Negash, Amir-Mohammad Rahmani, Tomi Westerlund, Pasi Liljeberg, Hannu Tenhunen:
LISA 2.0: lightweight internet of things service bus architecture using node centric networking. 305-319 - Etienne Alain Feukeu, Karim Djouani, Anish Mathew Kurien:
Doppler Shift Mitigation in a VANET using an IDDM approach. 321-332 - Guilherme W. Cassales, Andrea Schwertner Charão, Manuele Kirsch-Pinheiro, Carine Souveyet, Luiz Angelo Steffenel:
Improving the performance of Apache Hadoop on pervasive environments through context-aware scheduling. 333-345 - Tarek R. Sheltami, Abubakar Bala, Elhadi M. Shakshuki:
Wireless sensor networks for leak detection in pipelines: a survey. 347-356 - Ana M. Bernardos, Jose M. Sánchez, Javier I. Portillo, Xian Wang, Juan A. Besada, José R. Casar:
Design and deployment of a contactless hand-shape identification system for smart spaces. 357-370 - Yashar Fazili, Alireza Nafarieh, Muhammad H. Raza, Bill Robertson, William J. Philips:
The effect of adopting green SLA on key parameters of optical WDM networks. 371-384 - Michal Maciejewski, Josep Maria Salanova Grau, Joschka Bischoff, Miquel Angel Estrada Romeu:
Large-scale microscopic simulation of taxi services. Berlin and Barcelona case studies. 385-393 - Glenn Cich, Luk Knapen, Tom Bellemans, Davy Janssens, Geert Wets:
Threshold settings for TRIP/STOP detection in GPS traces. 395-413
- Olasimbo Ayodeji Arigbabu, Saif Mahmood, Sharifah Mumtazah Syed Ahmad, Abayomi A. Arigbabu:
Smile detection using hybrid face representation. 415-426 - Xiong Li, Kaihui Wang, Jian Shen, Saru Kumari, Fan Wu, Yonghua Hu:
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. 427-443 - Farrukh Shahzad, Tarek R. Sheltami, Elhadi M. Shakshuki:
Effect of network topology on localization algorithm's performance. 445-454
Volume 7, Number 4, August 2016
- Ansar-Ul-Haque Yasar, Haroon Malik, Elhadi M. Shakshuki, Zahoor Ali Khan:
Emerging technologies in ambient systems. 455-456 - Amy R. Wagoner, Eric T. Matson:
A task manager using an ontological framework for a HARMS-based system. 457-463 - Yi Xue, Ralph Deters:
Towards horizontally scalable apps - Resource sharing in the mobile cloud with CoAP. 465-473 - Boubaker Boulekrouche, Nafaâ Jabeur, Zaia Alimazighi:
Toward integrating grid and cloud-based concepts for an enhanced deployment of spatial data warehouses in cyber-physical system applications. 475-487 - Tarek R. Sheltami, Shehryar Khan, Elhadi M. Shakshuki, Menshawi K. Menshawi:
Continuous objects detection and tracking in wireless sensor networks. 489-508 - Haroon Malik, Ian J. Davis, Michael W. Godfrey, Douglas Neuse, Serge Mankovskii:
Connecting the dots: anomaly and discontinuity detection in large-scale systems. 509-522 - Mattias Nordahl, Boris Magnusson:
A lightweight data interchange format for internet of things with applications in the PalCom middleware framework. 523-532 - Pierluigi Siano, Debora Sarno, Lorena Straccia, Anna Teresa Marrazzo:
A novel method for evaluating the impact of residential demand response in a real time distribution energy market. 533-545 - Meng Bi, Jian Xu, Mo Wang, Fucai Zhou:
Anomaly detection model of user behavior based on principal component analysis. 547-554 - Ahmed-Chawki Chaouche, Amal El Fallah Seghrouchni, Jean-Michel Ilié, Djamel-Eddine Saïdouni:
Learning from situated experiences for a contextual planning guidance. 555-566 - Pavlos Kosmides, Konstantinos P. Demestichas, Evgenia F. Adamopoulou, Chara Remoundou, Ioannis V. Loumiotis, Michael E. Theologou, Miltiades E. Anagnostou:
Providing recommendations on location-based social networks. 567-578 - Lahcene Aid, Lynda Zaoui, Sid Ahmed Mokhtar Mostefaoui:
Using DEVS for modeling and simulation of ambient objects in intelligent buildings. 579-592 - Abid Sarwar, Jyotsna Suri, Mehbob Ali, Vinod Sharma:
Novel benchmark database of digitized and calibrated cervical cells for artificial intelligence based screening of cervical cancer. 593-606
Volume 7, Number 5, October 2016
- Ilsun You, Jin Li:
Special issue on security and privacy techniques in mobile cloud computing. 607-609 - Jian Xu, Fucai Zhou, Zhihao Jiang, Rui Xue:
Dynamic proofs of retrievability with square-root oblivious RAM. 611-621 - Minqing Zhang, Liqiang Wu, Xu An Wang, Xiaoyuan Yang:
Unidirectional IBPRE scheme from lattice for cloud computation. 623-631 - Chijun Zhang, Yongjian Yang, Zhanwei Du, Chuang Ma:
Particle swarm optimization algorithm based on ontology model to support cloud computing applications. 633-638 - Xin Li, Xin Liu:
Multi-segment and multi-stage projected tetrahedra. 639-648 - Feda AlShahwan, Maha Faisal, Godwin O. Ansa:
Security framework for RESTful mobile cloud computing Web services. 649-659 - Youngho Park, Chul Sur, Kyung Hyune Rhee:
Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. 661-671 - Hyochang Ahn, Yong-Hwan Lee:
Performance analysis of object recognition and tracking for the use of surveillance system. 673-679 - Chengyu Hu, Pengtao Liu, Shanqing Guo:
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs. 681-692 - Hsing-Chung Chen, Chuan-Hsien Mao, Yen-Tsung Lin, Tzu-Liang Kung, Chien-Erh Weng:
A secure group-based mobile chat protocol. 693-703 - Vasily Desnitsky, Igor V. Kotenko:
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge. 705-719
- Tao Ning, Ming Huang, Xu Liang, Hua Jin:
A novel dynamic scheduling strategy for solving flexible job-shop problems. 721-729 - Mehmet Sabir Kiraz:
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. 731-760
Volume 7, Number 6, December 2016
- Hsin-Chieh Wu, Toly Chen, Peng-Cheng Sung, Yu-Cheng Lin:
Ambient intelligence and ergonomics in Asia. 761-762 - Cheng-Li Liu, Shiaw-Tsyr Uang:
Effects of depth perception cues and display types on presence and cybersickness in the elderly within a 3D virtual store. 763-775 - Rung-Ching Chen, Chia-Fen Hsieh, Wei-Lun Chang:
Using ambient intelligence to extend network lifetime in wireless sensor networks. 777-788 - Toly Chen:
Embedding a back propagation network into fuzzy c-means for estimating job cycle time: wafer fabrication as an example. 789-800 - Abbas Al-Refaie, Toly Chen, Raed Al-Athamneh, Hsin-Chieh Wu:
Fuzzy neural network approach to optimizing process performance by using multiple responses. 801-816 - Kuo-Wei Su, Po-Hsin Huang, Po-Hung Chen, Ya-Ting Li:
The impact of formats and interactive modes on the effectiveness of mobile advertisements. 817-827 - Hsin-Chieh Wu, Min-Chi Chiu, Chia-Wei Peng:
Visual fatigue occurrence time when using hand-held intelligent devices. 829-835 - Chien-Chun Lu, Chinmei Chou, Akira Yasukouchi, Tomoaki Kozaki, Cheng-Yi Liu:
Effects of nighttime lights by LED and fluorescent lighting on human melatonin. 837-844 - Si-Jing Chen, Yen-Yu Kang, Chih-Long Lin:
Ergonomic evaluation of video game playing. 845-853 - Chu-Chai Henry Chan, Ying-Rown Hwang, Hsin-Chieh Wu:
Marketing segmentation using the particle swarm optimization algorithm: a case study. 855-863 - Chinmei Chou, Chien-Chun Lu, Ru-Yu Huang:
Effects of different ambient environments on human responses and work performance. 865-874 - Huicun Shen, Kun-Chieh Wang:
Affective product form design using fuzzy Kansei engineering and creativity. 875-888
- Ibrahim Mashal, Osama Alsaryrah, Tein-Yaw Chung:
Testing and evaluating recommendation algorithms in internet of things. 889-900 - Andrea Monacchi, Wilfried Elmenreich:
Assisted energy management in smart microgrids. 901-913
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.