Journal: IJAACS

Volume 15, Issue 4

279 -- 294Yun Zhang. An evaluation model of e-commerce credit information based on social big data
295 -- 311Rongtao Liao, Zhihua Xiao, Yixi Wang, Dangdang Dai. Security state monitoring method for perception node in the power internet of things based on a low rank model
312 -- 330Dongliang Li. Research on coverage holes repair in wireless sensor networks based on an improved artificial fish swarm algorithm
331 -- 344Xuan Yao. An adaptive prediction model for sparse data forecasting
345 -- 360Enwei Cao. A personalised recommendation algorithm for e-commerce network information based on two-dimensional correlation
361 -- 378Xiang Li. Dynamic acquisition method of a user's implicit information demand based on association rule mining

Volume 15, Issue 3

185 -- 201Liang Ma, Jie Zhou 0016, Bintai Xu, Youxiang Zhu, Yingjie Jiang. State scheduling method of redundant nodes in power communication network based on least square method
202 -- 219Gang Qiao. Hotspot prediction of e-commerce network users based on improved K-nearest neighbour algorithm
220 -- 234Dacong Jiang. Research on remote monitoring method of smart classroom based on internet of things
235 -- 248Degang Lai, Ke Wang. A new digital material sharing method of multimedia network teaching based on 5G communication technology
249 -- 265Dongmei Xia, Wei Chen, Yingji Li, Xuan Fu. Research on the detection of privacy information sharing behaviour of e-commerce users based on big data
266 -- 278Jianguo Huang, Sihan Fu. Low beacon node localisation algorithm in sensor networks based on multi-space key distribution algorithm

Volume 15, Issue 2

93 -- 105Xinjian Dai, Zhichao Zeng. Research on spectral clustering algorithm for network communication big data based on wavelet analysis
106 -- 125Shanshan Guo, Zhanyou Ma, Xiangran Yu, Li Chen. c queueing model with preemptive priority and asynchronous working vacation
126 -- 139Rajendra Kumar Dwivedi, Rakesh Kumar, Rajkumar Buyya. A multi agent based energy and fault aware scheme for WSN of hard-to-reach territories
140 -- 153Yong Li. Optimisation method of hierarchical heterogeneous clustering topology based on energy iteration
154 -- 165Xuehong Liu, Xuefeng Ding. Integration method of wireless sensor network ciphertext database based on internet of things
166 -- 183Meini Wang, Wei Zhao, Ying Li. Encryption of ciphertext data in Internet of Things based on HECRT key management

Volume 15, Issue 1

1 -- 17Chao Zhang, Qingyan Zhao. Research on the wake-up method for active sleeping node in wireless sensor networks
18 -- 31Dong He, Hongbing Huang, Yiyang Yao, Weiqiang Qi, Hong Li, Dong Mao. Resource monitoring method of the expandable cloud platform based on micro-service architecture
32 -- 45Linlin Li. The intrusion data mining method for distributed network based on fuzzy kernel clustering algorithm
46 -- 62Xian Luo, Rongtao Liao, Huanjun Hu, Yuxuan Ye. Research on digital forensics method of 5G communication system in the future based on direct intermediate frequency sampling
63 -- 77Chen Fang. The automatic positioning method for defect data of 5G mobile communication based on cloud computing
78 -- 92Bolu Lei, Liya Li. Capacity detection of massive MIMO channel in 5G environment based on symmetric correlation matrix