default search action
Ingénierie des Systèmes d'Information, Volume 24
Volume 24, Number 1, February 2019
- Shereen El-Feky, Tarek H. M. Abou-El-Enien:
Hybrid Algorithm for Rough Multi-level Multi-objective Decision Making Problems. 1-17 - Shraddha R. Khonde, Ulagamuthalvi Venugopal:
Hybrid Architecture for Distributed Intrusion Detection System. 19-28 - Dasheng Zhang, Jing Tan, Han Tian, Zhongzheng Wang, Wenjun Guo:
Aquifer Parameter Inversion by Artificial Fish Swarm Algorithm Based on Quantum Theory. 29-33 - Fei Cai, Xiaohui Mou, Xin Zhang, Jie Chen, Jin Li, Wenpeng Xu:
Network Adjacency Matrix Blocked-compressive Sensing: A Novel Algorithm for Link Prediction. 35-42 - Lenin Kanagasabai:
Brachytrupes Algorithm for Solving Optimal Reactive Power Problem. 43-46 - Kurapati Praveena, Gudla Sirisha, Satukumati Babu, Panchala Rao:
Efficient Method in Association Rule Hiding for Privacy Preserving with Data Mining Approach. 47-50 - Pandluri Dhanalakshmi:
A Novel Frequent Pattern Mining Technique for Prediction of User Behavior on Web Stream Data. 51-56 - Na Jiang, Jiyuan Li:
Adaptive Speech Enhancement Algorithm Based on Hilbert-Huang Transform. 57-60 - Qing Cheng, Jinpu Jiao, Honghua Chen, Fen Xu:
Application of Impulse Response Method in Identifying the Causes of Gold Price Fluctuation. 61-66 - Srabanti Maji, Soumen Kanrar:
SpliceCombo: A Hybrid Technique Efficiently Use for Principal Component Analysis of Splice Site Prediction. 67-75 - Dudekula Rafi, Chettiar Bharathi:
A Case Study of Medical Data Classification Using Hybrid Adboost KNN along with Krill Herd Algorithm (KHA). 77-81 - Gokul Yenduri, Naralasetti Veeranjaneyulu:
An Analysis of Maintainability Index Influencing Metrics and Their Behavior on Similar Open Source Gaming Application Developed in C, C++ and, JAVA. 83-87 - Ligang Cong, Huamin Yang, Xiaoqiang Di:
Storage Allocation Plan for Routing Nodes in Delay Tolerant Network. 89-94 - Suresh Satukumati, Shivaprasad Satla, Raghu Kogila:
Feature Extraction Techniques for Chronic Kidney Disease Identification. 95-99 - Bingkun Dong, Xiaoning Zhu, Rui Yan, Changlu Zhang:
Evaluation of Third-party Reverse Logistics Providers Based on Extension Superiority Method. 101-105 - Chippada Nagamani, Suneetha Chittineni:
Efficient Neighborhood Density Based Outlier Detection Inside a Sub Network with High Dimensional Data. 107-111 - Arepalli Peda Gopi, Vejendla Lakshman Narayana, Rachakonda Venkatesh, Nanduri Kumar:
Certified Node Frequency in Social Network Using Parallel Diffusion Methods. 113-117 - Hong Zhou, Kun-Ming Yu:
A Novel Wireless Sensor Network Data Aggregation Algorithm Based on Self-organizing Feature Mapping Neutral Network. 119-123 - Jyostna Devi Bodapati, Naralasetti Veeranjaneyulu, Shaik Nagur Shareef:
Sentiment Analysis from Movie Reviews Using LSTMs. 125-129
Volume 24, Number 2, April 2019
- Narges Hasanzadeh, Yahya Forghani:
Improving the Accuracy of M-distance Based Nearest Neighbor Recommendation System by Using Ratings Variance. 131-137 - Komanduri Venkata Sesha Sai Rama Krishna, Bhanu Prakash Battula:
Intrusion Detection System Employing Multi-level Feed Forward Neural Network along with Firefly Optimization (FMLF2N2). 139-145 - Yuhe Wang, Peili Qiao, Haibin Chen, Zhiyong Luo, Guanglu Sun:
The Reliability Assessment of ICS Based on Evidential Reasoning and Semi-quantitative Information. 147-154 - Hongyan Chu, Liting Xu, Yuexin Liu:
An Optimal Power Allocation Algorithm for Cognitive Radio Networks Based on Maximum Rate and Interference Constraint. 155-159 - Rupa Chiramdasu:
Extended Statistical Analysis on Multimedia Concealed Data Detections. 161-165 - Tingting Shi:
Spatial Data Mining and Big Data Analysis of Tourist Travel Behavior. 167-172 - Ummadi Reddy, Pandluri Dhanalakshmi, Pallela Reddy:
Image Segmentation Technique Using SVM Classifier for Detection of Medical Disorders. 173-176 - (Withdrawn) Secured Data Representation in Images Using Graph Wavelet Transformation Technique. 177-181
- Biyao Zhang, Kaisong Zhang, Luo Zhong, Xuan Ya Zhang:
Research on Dirichlet Process Mixture Model for Clustering. 183-189 - Bo Guan, Minghui Liu:
A Novel Video Compression Algorithm Based on Wireless Sensor Network. 191-196 - Bulla Premamayudu, Leela Inturu, Gajula Ramesh:
New Reliability Routing Path for Detects Malicious Link. 197-200 - Bendaoud Mebarek, Mourad Keddam:
Prediction Model for Studying the Growth Kinetics of Fe2B Boride Layers during Boronizing. 201-205 - Xu Qiao, Feng Yang, Jing Zheng:
Ground Penetrating Radar Weak Signals Denoising via Semi-soft Threshold Empirical Wavelet Transform. 207-213 - Aljia Bouzidi, Nahla Haddar, Kais Haddar:
Traceability and Synchronization Between BPMN and UML Use Case Models. 215-228
Volume 24, Number 3, June 2019
- Shaimaa M. Elembaby, Vidan F. Ghoneim, Manal Abdel Wahed:
ANOVAG3: A Hybrid Algorithm for Inferring Gene Regulatory Network Using Time Series Gene Expression Data. 229-232 - Hanumantha Rao Sama, Vasanta Kumar. Vemuri, Srinivasa Rao Talagadadeevi, Srinivasa Kumar Bhavirisetti:
Analysis of an N-policy MX/M/1 Two-phase Queueing System with State-dependent Arrival Rates and Unreliable Server. 233-240 - Hongsong Wang, Jiangyan Zhu:
A Quadtree Spatial Index Method with Inclusion Relations and Its Application in Landcover Database Update. 241-247 - Qingju Jiao, Yuanyuan Jin:
Multi-scale View Reveals Easily Detectable Community in Complex Networks. 249-253 - Jyostna Devi Bodapati, Venkata Rama Krishna Sajja, Nirupama Bhat Mundukur, Naralasetti Veeranjaneyulu:
Robust Cluster-then-label (RCTL) Approach for Heart Disease Prediction. 255-260 - Sankaranarayanan Murugan, Govindarajan Kulanthaivel, Venugopal Ulagamuthalvi:
Selection of Test Case Features Using Fuzzy Entropy Measure and Random Forest. 261-268 - Yanhong Guo, Shuai Jiang, Feiting Chen, Yaocong Li, Chunyu Luo:
Borrower-lender Information Fusion for P2P Lending: A Nonparametric Approach. 269-279 - Ghada M. A. Soliman, Tarek H. M. Abou-El-Enien, Eid Emary, Motaz M. H. Khorshid:
A Hybrid Modified Whale Optimization Algorithm with Simulated Annealing for Terrorism Prediction. 281-287 - Soumen Kanrar, Soamdeep Singha:
Content Delivery Through Hybrid Architecture in Video on Demand System. 289-301 - Tingting Lei, Guangtian Zou:
Interactive Design of Commercial Space Signage System Based on Object Detection. 303-311 - Yongli Liu, Ling Pang, Xiuli Lu:
Click-through Rate Prediction Based on Mobile Computing and Big Data Analysis. 313-319 - Saeid Masoumi, Ali Mahjur:
Collaborative Component Interaction. 321-329 - Lu Bai, Chenglie Du:
Design and Simulation of a Collision-free Path Planning Algorithm for Mobile Robots Based on Improved Ant Colony Optimization. 331-336 - Leixiao Li, Jing Gao, Hui Wang, Dan Deng, Hao Lin:
Construction and Optimization of a File Distribution Model for All-to-All Comparison of Big Dataset. 337-342 - Garima Verma, Rupak Chakraborty:
A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment. 343-351 - Anup Gade, Nirupama Bhat Mundukur, Nita Thakare:
Adaptive League Championship Algorithm (ALCA) for Independent Task Scheduling in Cloud Computing. 353-359
Volume 24, Number 4, August 2019
- Lelai Shi, Suhui Liu, Slobodan Petrovic:
Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce. 361-365 - Kundharu Saddhono, Cahyo Hasanudin, Ayu Fitrianingsih:
The Ability to Think Creatively on SSCS Using Schoology Apps, How is the Student's Language Metacognitive Awareness? 367-375 - Junzhen Meng, Junran Zhang:
A Fast Algorithm for Particle Stacking. 377-384 - Suneetha Bulla, Bobba Rao:
Performance and Cost Analysis of Web Application in Elastic Cloud Environment. 385-389 - Kalpana Polisetty, Kiran Kumar Paidipati, Jyostna Devi Bodapati:
Modelling of Monthly Rainfall Patterns in the North-West India Using SVM. 391-395 - Hai-juan Zang, Yan Huang, Hongbo Cao, Chenchen Li:
A Novel Privacy Protection Protocol for Vehicular Ad Hoc Networks Based on Elliptic Curve Bilinear Mapping. 397-402 - Gottumukkala Himabindu, Chinta Anuradha, Patnala Murty:
Feature Extraction Techniques in Associate with Opposition Based Whale Optimization Algorithm. 403-410 - Santhosh Kumar Veeramalla, Venkata Talari:
Estimation of Neural Sources from EEG Measurements Using Sequential Monte Carlo Method. 411-417 - Feifei Wang, Haifeng Hu:
An Improved Energy-Efficient Cluster Routing Protocol for Wireless Sensor Network. 419-424 - Neha Bansal, Arun Sharma, R. K. Singh:
An Evolving Hybrid Deep Learning Framework for Legal Document Classification. 425-431 - Jian Yu:
Design of a Privacy-Preserving Algorithm for Peer-to-Peer Network Based on Differential Privacy. 433-437 - Tahtah Hocine, Arif Salem:
Modified Flower Pollination Algorithm Constrained Optimal Power Flow. 439-444 - Anil Kurra, Usha Rani Nelakuditi:
Design of a Reliable Current Starved Inverter Based Arbiter Physical Unclonable Functions (PUFs) for Hardware Cryptography. 445-454
Volume 24, Number 5, October 2019
- Taner Tuncer, Okan Yar:
Fuzzy Logic-Based Smart Parking System. 455-461 - Sanaz Moezzi, Mehrdad Jalali, Yahya Forghani:
TWSVC+: Improved Twin Support Vector Machine-Based Clustering. 463-471 - Jiali Liu, Kai Li:
An Information System of Clinical Pathway Management Based on the Integration Between Knowledge Management and Learning Organization. 473-480 - Subramanian Balaji, Yesudhas Harold Robinson, Eanoch Golden Julie:
GBMS: A New Centralized Graph Based Mirror System Approach to Prevent Evaders for Data Handling with Arithmetic Coding in Wireless Sensor Networks. 481-490 - Xu Cheng, Chenyuan Zhao:
Prediction of Tourist Consumption Based on Bayesian Network and Big Data. 491-496 - Kaustuv Deb, Sonali Banerjee, Rudra Chatterjee, Atanu Das, Rajib Bag:
Educational Website Ranking Using Fuzzy Logic and K-Means Clustering Based Hybrid Method. 497-506 - Theyyagura Reddy, Bulla Premamayudu:
Vehicle Insurance Model Using Telematics System with Improved Machine Learning Techniques: A Survey. 507-512 - Alem Abdelkader, Youcef Dahmani, Bendaoud Bendaoud:
Skyline Computation for Improving Naïve Bayesian Classifier in Intrusion Detection System. 513-518 - Mengxia Li, Ruiquan Liao, Yong Dong:
Adaptive Determination of Time Delay in Grey Prediction Model with Time Delay. 519-524 - Xueling Li, Zhen Li:
A Hybrid Prediction Model for E-Commerce Customer Churn Based on Logistic Regression and Extreme Gradient Boosting Algorithm. 525-530 - Sake Madhu, Ranjit Midde, Gandikota Ramu, Appawala Jayanthi, Jalari Somasekar, Gajula Ramesh, Pallela Reddy:
A Secured Framework to Protect Association Rules in the Big Data Environment Using Fuzzy Logic. 531-537 - Dasari Yakobu, Venkata Rami Reddy Chirra, Venkatrama Phani Kumar Sistla:
A Novel Energy Efficient Scheduling for VM Consolidation and Migration in Cloud Data Centers. 539-546 - Wei Liu:
Traffic Flow Prediction Based on Local Mean Decomposition and Big Data Analysis. 547-552 - Sayan Sikder, Sanjeev Kumar Metya, Rajat Subhra Goswami:
Exception-Tolerant Decision Tree / Rule Based Classifiers. 553-558
Volume 24, Number 6, December 2019
- Cahyo Hasanudin, Ayu Fitrianingsih, Kundharu Saddhono:
How is the Student's Negotiation Text in Collaborative Learning of Flipped Classroom and a CyberLink Power Director Media Apps. 559-567 - Md. Milon Islam, Nieb Neom, Md. Samir Imtiaz, Sheikh Nooruddin, Md. Repon Islam, Md. Rabiul Islam:
A Review on Fall Detection Systems Using Data from Smartphone Sensors. 569-576 - Ruifang Xing, Yayun Fan, Wei Liu:
A Markov Chain-Based Overlapping Community Detection Algorithm for Complex Networks. 577-582 - Pradeep Venuthurumilli, Sridhar Mandapati:
An Energy and Deadline Aware Scheduling Using Greedy Algorithm for Cloud Computing. 583-590 - Mohamed Djerioui, Youcef Brik, Mohamed Ladjal, Bilal Attallah:
Neighborhood Component Analysis and Support Vector Machines for Heart Disease Prediction. 591-595 - Caihong Zhang, Wei Xue, Ying Xin:
Design and Application of an Intelligent Patrol Algorithm for Forest Management and Protection Based on Global Positioning System. 597-602 - Dasari Yakobu, Hemantha Kumar Kalluri, Venkatesulu Dondeti:
An Enhanced Secure, Robust and Efficient Crypto Scheme for Ensuring Data Privacy in Public Cloud Using Obfuscation & Encryption. 603-609 - Anuj Kumar Yadav, Ritika, Madan Lal Garg:
Monitoring Based Security Approach for Cloud Computing. 611-617 - Wenxuan Wang:
Site Selection of Fire Stations in Cities Based on Geographic Information System (GIS) and Fuzzy Analytic Hierarchy Process (FAHP). 619-626 - Nirupama Bhat Mundukur, Suvarna Buradagunta, Kuruba Usha Rani:
A Novel Approach to Key Management Using Visual Cryptography. 627-632 - Sufen Zhang:
Classification of Urban Land Use Based on Graph Theory and Geographic Information System. 633-639
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.