Journal: Int. J. Comput. Commun. Control

Volume 14, Issue 6

615 -- 632Jianwu Jiang, Zhi Chen, Yihuai Wang, Tao Peng, Shilang Zhu, Lianmin Shi. Parameter Estimation for PMSM based on a Back Propagation Neural Network Optimized by Chaotic Artificial Fish Swarm Algorithm
633 -- 652Yang Li, Zeshui Xu, Xinxin Wang, Florin Gheorghe Filip. Studies in Informatics and Control: A Bibliometric Analysis from 2008 to 2019
653 -- 669Fangyao Liu, Yayu Peng, Zhengxin Chen, Yong Shi. Modeling of Characteristics on Artificial Intelligence IQ Test: a Fuzzy Cognitive Map-Based Dynamic Scenario Analysis
670 -- 690Ajeet Singh, Anurag Jain. An Empirical Study of AML Approach for Credit Card Fraud Detection-Financial Transactions
691 -- 709Jangiti Siva Prashanth, Satyanarayana V. Nandury. A Cluster-based Approach for Minimizing Energy Consumption by Reducing Travel Time of Mobile Element in WSN
710 -- 725Mohammad Hashemi Tabatabaei, Maghsoud Amiri, Mohammad Ghahremanloo, Mehdi Keshavarz Ghorabaee, Edmundas Kazimieras Zavadskas, Jurgita Antucheviciene. Hierarchical Decision-making using a New Mathematical Model based on the Best-worst Method
726 -- 742Phuc Huu Truong, Sujeong You, Sang-Hoon Ji, Gu-Min Jeong. Wearable System for Daily Activity Recognition Using Inertial and Pressure Sensors of a Smart Band and Smart Shoes
743 -- 758Donatas Vitkus, Zilvinas Steckevicius, Nikolaj Goranin, Diana Kalibatiene, Antanas Cenys. Automated Expert System Knowledge Base Development Method for Information Security Risk Analysis
759 -- 772Minjuan Zhong, Liang Tan, Xilong Qu. Identification of Opinion Spammers using Reviewer Reputation and Clustering Analysis

Volume 14, Issue 5

615 -- 628Jin Hua, Lile He, Zhiqiang Kang, Keding Yan. A Force/Position Hybrid Controller for Rehabilitation Robot
629 -- 646Arturas Kaklauskas, Domnica Dzitac, Jurate Sliogeriene, Natalija Lepkova, Ingrida Vetloviene. VINERS Method for the Multiple Criteria Analysis and Neuromarketing of Best Places to Live
647 -- 659Yonal Kirsal. Exploring Analytical Models for Performability Evaluation of Virtualized Servers using Dynamic Resource
660 -- 671Tao Lin, Peng Wu, Fengmei Gao, Tianshu Wu. Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation
672 -- 691Baoyu Liu, Yong Deng. Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory
692 -- 710D. Ha Vu, Shoudao Huang, T. Diep Tran, Vu Thi Yen, Cuong Van Pham. A Robust Adaptive Control using Fuzzy Neural Network for Robot Manipulators with Dead-Zone
711 -- 732Xinxin Wang, Zeshui Xu, Ioan Dzitac. Bibliometric Analysis on Research Trends of International Journal of Computers Communications & Control
733 -- 752Hualong Xie, Yao Xie, Fei Li. Design, Modeling and Control of Bionic Knee in Artificial Leg
753 -- 771Lian Zhou, Fuyuan Xiao. DCM: D Number Extended Cognitive Map. Application on Location Selection in SCM

Volume 14, Issue 4

459 -- 474Gubba Balakrishna, Nageswara Rao Moparthi. ESBL: Design and Implement A Cloud Integrated Framework for IoT Load Balancing
475 -- 488Benchun Cao, Yanchun Liang 0001, Shinichi Yoshida, Renchu Guan. Facial Expression Decoding based on fMRI Brain Signal
489 -- 502Dan Chang, Hao Yu Gui, Rui Fan, Ze Zhou Fan, Ji Tian. Application of Improved Collaborative Filtering in the Recommendation of E-commerce Commodities
503 -- 517Wei Hu, Huanhao Li, Wenhui Yao, Yawei Hu. Energy Optimization for WSN in Ubiquitous Power Internet of Things
518 -- 529Waleed Nazih, Yasser Hifny, Wail Elkilani, Tamer Abdelkader, Hossam Faheem. Efficient Detection of Attacks in SIP Based VoIP Networks Using Linear l1-SVM Classifier
530 -- 539Doan Perdana, Aji Nur Sanyoto, Gustommy Bisono. Performance Evaluation and Comparison of Scheduling Algorithms on 5G Networks using Network Simulator
540 -- 556Dewen Seng, Jiaxin Liu, Xuefeng Zhang, Jing Chen 0010, Xujian Fang. Top-N Recommendation Based on Mutual Trust and Influence
557 -- 573Yunlei Sun, Huiquan Gong, Yucong Li, Dalin Zhang. Hyperparameter Importance Analysis based on N-RReliefF Algorithm
574 -- 589Linyan Xue, Xiaoke Zhang, Fei Xie, Shuang Liu, Peng Lin. Frequent Patterns Algorithm of Biological Sequences based on Pattern Prefix-tree
590 -- 607Xuefeng Zhang, Xiuli Chen, Dewen Seng, Xujian Fang. A Factored Similarity Model with Trust and Social Influence for Top-N Recommendation

Volume 14, Issue 3

293 -- 310Kemal Alic, Mihael Mohorcic, Ales Svigelj. Network and Traffic Design Aspects in Network-Coding-Enabled Wireless Networks
311 -- 328Mo Chen. Research on Key Technology of Web Hierarchical Topic Detection and Evolution Based on Behaviour Tracking Analysis
329 -- 343Yukun Dong, Jiantao Zhang, Zhen Li, Yong Hu, Yong Deng 0001. Combination of Evidential Sensor Reports with Distance Function and Belief Entropy in Fault Diagnosis
344 -- 358Wei Hu, Wenhui Yao, Yawei Hu, Huanhao Li. Selection of Cluster Heads for Wireless Sensor Network in Ubiquitous Power Internet of Things
359 -- 374Gu-Min Jeong, Kyoungwoo Lee, Sang-Il Choi, Sang-Hoon Ji, Nikil D. Dutt. Effect of Soft Errors in Iterative Learning Control and Compensation using Cross-layer Approach
375 -- 387Michael Miranda, Renato Salinas, Ulrich Raff, Oscar Magna. Wavelet Design for Automatic Real-Time Eye Blink Detection and Recognition in EEG Signals
388 -- 400Attila Simo, Constantin Barbulescu, Stefan Kilyeni, Claudia Dragos. Manufacturing Process Monitoring in Terms of Energy Management Improving
401 -- 418Xiaoru Song, Song Gao, Chaobo Chen, Zepeng Gao. Enhanced Fireworks Algorithm-Auto Disturbance Rejection Control Algorithm for Robot Fish Path Tracking
419 -- 436Yuhe Wang, Peili Qiao, Zhiyong Luo, Guanglu Sun, Guangze Wang. Reliability Assessment Model for Industrial Control System Based on Belief Rule Base
437 -- 452Jie Zhao, Yong Deng 0001. Performer selection in Human Reliability analysis: D numbers approach

Volume 14, Issue 2

141 -- 153Xiaolong Feng, Jing Gao. Gene Sequences Parallel Alignment Model Based on Multiple Inputs and Outputs
154 -- 169Adrian-Catalin Florea, Razvan Andonie. Weighted Random Search for Hyperparameter Optimization
170 -- 182Yue Huang. Heterogeneous Data Clustering Considering Multiple User-provided Constraints
183 -- 198C. Jothikumar, Revathi Venkataraman. EODC: An Energy Optimized Dynamic Clustering Protocol for Wireless Sensor Network using PSO approach
199 -- 211Leixiao Li, Jing Gao, Ren Mu. Optimal Data File Allocation for All-to-All Comparison in Distributed System: A Case Study on Genetic Sequence Comparison
212 -- 219Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo. Performance Analysis of RAW Impact on IEEE 802.11ah Standard affected by Doppler Effect
220 -- 232Haiping Ren, Manfeng Liu, Hui Zhou. Extended TODIM Method for MADM Problem under Trapezoidal Intuitionistic Fuzzy Environment
233 -- 252R. Senthilkumar, G. M. Tamilselvan, S. Kanithan, N. Arun Vignesh. Routing in WSNs Powered by a Hybrid Energy Storage System through a CEAR Protocol Based on Cost Welfare and Route Score Metric
253 -- 271Alexandru Tugui, Daniela Danciulescu, Mihaela-Simona Subtirelu. The Biological as a Double Limit for Artificial Intelligence: Review and Futuristic Debate
272 -- 285Fushen Yang, Changshun Du, Lei Huang. Ensemble Sentiment Analysis Method based on R-CNN and C-RNN with Fusion Gate

Volume 14, Issue 1

7 -- 20Changshun Du, Lei Huang. Sentiment Analysis Method based on Piecewise Convolutional Neural Network and Generative Adversarial Network
21 -- 38Omar A. Hammood, Mohd Nizam, Muamer Nafaa, Waleed A. Hammood. RESP: Relay Suitability-based Routing Protocol for Video Streaming in Vehicular Ad Hoc Networks
39 -- 55Germán A. Montoya, Yezid Donoso. A Prediction Algorithm based on Markov Chains for finding the Minimum Cost Path in a Mobile WSNs
56 -- 62Dan Noje, Radu Catalin Tarca, Ioan Dzitac, Nicolae Pop. IoT Devices Signals Processing based on Multi-dimensional Shepard Local Approximation Operators in Riesz MV-algebras
63 -- 77Sever Gabriel Racz, Radu-Eugen Breaz, Octavian Bologa, Melania Tera, Valentin Stefan Oleksik. Using an Adaptive Network-based Fuzzy Inference System to Estimate the Vertical Force in Single Point Incremental Forming
78 -- 89Haiping Ren, Shixiao Xiao, Hui Zhou. A Chi-square Distance-based Similarity Measure of Single-valued Neutrosophic Set and Applications
90 -- 106Zenonas Turskis, Simona Dzitac, Ausra Stankiuviene, Ritoldas Sukys. A Fuzzy Group Decision-making Model for Determining the Most Influential Persons in the Sustainable Prevention of Accidents in the Construction SMEs
107 -- 123Qianqian Zhang, Shifeng Liu, Daqing Gong, Qun Tu. A Latent-Dirichlet-Allocation Based Extension for Domain Ontology of Enterprise's Technological Innovation
124 -- 134Shuai Zhang 0002, Yong Chen, Xiaoling Huang, Yishuai Cai. Text Classification of Public Feedbacks using Convolutional Neural Network Based on Differential Evolution Algorithm