Journal: IJAACS

Volume 16, Issue 6

513 -- 535Yanguang Cai, Gewen Huang, Yuanhang Qi, Helie Huang, Yunjian Xu. Memetic grey wolf optimiser algorithm for solving the cumulative CVRP
536 -- 551Lunzheng Tan, Guoluan Chen, Rui Ding, Limin Xia. Unsupervised learning of local features for person re-identification with loss function
552 -- 563Huajun Chen, Yanguang Cai. A discrete salp swarm algorithm for the vehicle routing problem with time windows
564 -- 583Mingyu Chen 0007, Chengsheng Yuan, Ying Lv. Fingerprint liveness detection approaches: a survey
584 -- 596Yuguang Ye. Detection of false data attacks in sensor networks based on the APIT location algorithm
597 -- 610Liming Wang, Wenxue Liu, Huichuan Liu. An optimal matching algorithm for e-commerce recommendation information based on matrix decomposition
611 -- 631Mingfang Jiang. Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift

Volume 16, Issue 5

419 -- 435Jiancheng Zou, Peizhou Yan, Zhengzheng Li. Depth information acquisition and image measurement algorithm using microarray camera
436 -- 450Yun Zhao, Ziwen Cai, Tao Huang, Bin Qian 0003, Mi Zhou. Heuristic positioning method for intrusion nodes in sensor networks based on quantum annealing algorithm
451 -- 460Chengsheng Yuan, Mingyu Chen 0007, Yue Wu. A low-rank LBP with local differential polarisation for fingerprint liveness detection
461 -- 475Ting Hu, Shaohui Zhong. Research on a new multipath transmission optimisation algorithm for multichannel wireless sensors based on optimised clustering and multi-hop
476 -- 493Yue Wu, Peipeng Yu, Chengsheng Yuan. A survey on neural network-based image data hiding for secure communication
494 -- 512Ridhima Mehta. Performance modelling of Aloha wireless networks under the influence of varying traffic load characteristics

Volume 16, Issue 4

327 -- 341Li Sun. The security storage method of dynamic data in internet of things based on blockchain
342 -- 356Chunzi Zhang. Design of online monitoring method for English education resource allocation in the internet of things learning environment
357 -- 375Bingchen Lin. Research on abnormal data recognition method of optical network based on WiFi triangular location
376 -- 390Hongli Deng, Tao Yang. A new encryption and decryption algorithm for privacy data in wireless sensor network based on dynamic key
391 -- 403Mithun Chakraborty, Debdatta Kandar, Bansibadan Maji. Integrated radar radio: enabling technology for smart vehicle of smart cities
404 -- 418Abderrahim El-Amrani 0001, Bensalem Boukili, Ahmed El Hajjaji, Ismail Boumhidi. ∞ model reduction of 2D discrete-time T-S fuzzy systems

Volume 16, Issue 3

233 -- 247Li Hao, Tuanbu Wang, Chaoping Guo. Research on parallel association rule mining of big data based on an improved K-means clustering algorithm
248 -- 269Spoorthi P. Shetty, Udaya Kumar K. Shenoy. Performance of RPL under various mobility models in IoT
270 -- 283Hui Zhang, Su Zhang, Xiaoling Jiang. Response efficiency optimisation of data cube online analysis for network user's behaviour
284 -- 295Jianli Guo. Industrial internet of things for smart factory: current state and problems
296 -- 312Jing Liu, Di Zhao. Nonintrusive power load feature recognition based on internet of things technology
313 -- 326Xiaochuan Pu, Wonchul Seo, Qingqiang Ruan. Unsupervised clustering algorithm for databases based on density peak optimisation

Volume 16, Issue 2

141 -- 158Danxia Luo, Chang-an Ren. Layered routing algorithm for wireless sensor networks based on energy balance
159 -- 174Xiaofei Liu, Shaohui Zhong. Personalised recommendation algorithm of network resources based on collaborative knowledge map
175 -- 187Jiwei Qin, Honglin Dai. Collaborative variational factorisation machine for recommender system
188 -- 202Yawen Li. Research on e-business requirement information resource extraction method in network big data
203 -- 219Hao Yang 0013, Yibo Xia, Wen Cai, Xin Xie 0002. Detection of malicious rank attack nodes in communication network based on windowed frequency shift algorithm
220 -- 231Ming Wu. The cleaning method of duplicate big data based on association rule mining algorithm

Volume 16, Issue 1

1 -- 16Shihong Chen. Vulnerability detection of the authentication protocol in the IOT based on improved wavelet packet
17 -- 30Jue Ma. Network dynamic routing and spectrum allocation algorithm based on blockchain technology
31 -- 47Liuyang Wang, Yangxin Yu. Access control method of laboratory cloud data based on internet of things technology
48 -- 65Hongli Deng, Tao Yang. Real time detection of intrusion trace information in sensor network based on Bayesian belief network
66 -- 83Gao Fei. Security key distribution method of wireless sensor network based on DV-hop algorithm
84 -- 96Zixiang Yan. Optimum design of distance education assistant system based on wireless network
97 -- 111Yun Zhao, Yong Xiao, Weibin Lin, Chao Cui, Di Xu. Dynamic key distribution method for wireless sensor networks based on exponential algorithm
112 -- 125Liang Jin, Wei Li, Qinghui Meng. A new IoT resource addressing method based on rough set neural network
126 -- 140Di Zhao, Jing Liu. Design of DC measurement traceability system of charging pile by considering internet of things and fuzzy clustering