Journal: IJICT

Volume 18, Issue 4

351 -- 370Fengtian Xu. Digital English teaching resource sharing system based on logical database
371 -- 385Xiaohong He. Intrusion detection of hierarchical distribution network system based on machine computation
386 -- 403Jianxin Qiu. Research on dynamic performance regulation method of bidirectional relay network based on SDN architecture
404 -- 415Yunxing Wang, Liyan Li, Zhicheng Wen. A sample de-noising method for FCM clustering induced by Gauss kernel
416 -- 433Jie Yu. Construction of load balancing scheduling model for cloud computing task based on chaotic ant colony algorithm
434 -- 448Caihua Chen. Research on high accuracy mandarin emotion recognition method based on local optimal algorithms
449 -- 463Hui Wang. Research on personalised recommendation method of popular tourist attractions routes based on machine learning

Volume 18, Issue 3

243 -- 260Xiaoliang Yang, Yi Dai, Alun. Automatic repair of pollution attacks in SDN topology network based on SOM algorithm
261 -- 274Feng Gao. Unlabeled facial expression capture method in virtual reality system based on big data
275 -- 287Mustapha Dehmani, El Mehdi Salmani, Hamid Ez-Zahraouy, Abdelilah Benyoussef. BB84 with several intercepts and resend attacks using partially non-orthogonal basis states through a depolarising channel
288 -- 303ZhongQi Zhao, Yanjie Tan. Research on global tourism information query method based on association mining
304 -- 316Hui Zhang, Xiaoling Jiang, Fa Zhang. Research on web user's behaviour data mining based on feature orientation
317 -- 333Bo Yang, Huan Xie, Kuan Ye, Huan Qin, Rong Zhu, Anchang Liu. Analysis of intelligent test paper generation method for online examination based on UML and particle swarm optimisation
334 -- 350Bo Yang, Hongbin Li, Huan Xie, Jianyong Zhao, Rong Zhu, Lei Zhao. Abnormal state recognition method for online intelligent examination based on improved genetic algorithm

Volume 18, Issue 2

125 -- 141Ying Li. Security protocol of internet of things based on NTRU encryption model
142 -- 159Haiying Wang. Machine learning method based on improved drosophila optimisation algorithm
160 -- 174Zhang Xu. Research on blurred edge information segmentation of image based on computer vision
175 -- 188Yujiang Fei. Multi-tag cleaning software for cyclic redundant data stream based on RFID in cloud computing
189 -- 206Junjie Niu. Intelligent evaluation model of e-commerce transaction volume based on the combination of k-means and SOM algorithms
207 -- 223Lijun Zhao, Bin Liu, Jinling Ma. Virtual machine allocation method for cloud computing based on multi-objective evolutionary algorithm
224 -- 241Santar Pal Singh, S. C. Sharma. A PSO-based improved clustering algorithm for lifetime maximisation in wireless sensor networks

Volume 18, Issue 1

1 -- 15Huawei Wu, Yicheng Li, Jie Zhang, Yong Kuang. Fast road scenarios recognition of intelligent vehicles by image processing
16 -- 40Sarra Naoui, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane. LoRaWAN possible attacks, proposed countermeasures and enhanced solution
41 -- 56Ying Li. Lightweight information integration model of IOT based on VMware cluster technology
57 -- 69Haiyan Zhang, Shangbing Gao. The research of human interaction recognition based on fusion features of key frame feature library
70 -- 88Lin Tang. Research on stability modelling of high speed electronic communication based on hierarchical optimal mining algorithms
89 -- 104Ajun Cui, Wei Wang, Hua-Feng Zhang, Yan-hong Ma, Chen Li, Xiao-Ming Wang. Cross-domain single sign-on authentication of information security in network environment
105 -- 124Haiyan Hu, Chang Su. Self-adaptive process optimisation method for SBS cloud application based on reinforcement learning