Journal: IJMCMC

Volume 8, Issue 4

1 -- 19Sander Soo, Chii Chang, Seng W. Loke, Satish Narayana Srirama. Proactive Mobile Fog Computing using Work Stealing: Data Processing at the Edge
20 -- 48Ferdaous Hdioud, Bouchra Frikh, Brahim Ouhbi, Ismail Khalil. Multi-Criteria Recommender Systems: A Survey and a Method to Learn New User's Profile
49 -- 65Massimo Canonico, Stefania Montani, Diego Gazzolo, Mariachiara Strozzi, Manuel Striani. TEEM: Technology-Enhanced Emergency Management for Supporting Data Communication During Patient Transportation
66 -- 84Sanjit Kumar Dash, Sasmita Mishra, Jibitesh Mishra. Mobile Data Offloading Using Opportunistic Communication and AP Deployment: A Case Study

Volume 8, Issue 3

1 -- 20Xin Zhang, Xiaoming Liu, Zhenyu Na. A Method for Angular Super-Resolution via Big Data Radar System
21 -- 31Shao Heng. A New Intelligent Optimization Network Online Learning Behavior in Multimedia Big Data Environment
32 -- 43Xiaokan Wang. Research on Double Energy Fuzzy Controller of Electric Vehicle Based on Particle Swarm Optimization of Multimedia Big Data
44 -- 65Li Cheng, Gongping Wu. A Novel Fast Hierarchical Projection Algorithm for Skew Detection in Multimedia Big Data Environment
66 -- 78Yong Hu. A Comparative Study of Shape and Texture Features for Finger Spelling Recognition in Big Data Applications
79 -- 89Xiang Chen, Jun-rong Tang, Yong Zhang. Towards A Virtual Machine Migration Algorithm Based On Multi-Objective Optimization
90 -- 111Hui Wang, Lili Guo, Yun Lin. Modulation Recognition of Digital Multimedia Signal Based on Data Feature Selection

Volume 8, Issue 2

1 -- 13Nicolas Louveton, Korok Sengupta, Rod McCall, Raphaƫl Frank, Thomas Engel 0001. Testing a Commercial BCI Device for In-Vehicle Interfaces Evaluation: A Simulator and Real-World Driving Study
14 -- 26Durga Prasad, Niranjan N. Chiplunkar, K. Prabhakar Nayak. A Trusted Ubiquitous Healthcare Monitoring System for Hospital Environment
27 -- 43Soumaya Fellah, Mejdi Kaddour. Exact and Efficient Heuristic Deployment in WSN under Coverage, Connectivity, and Lifetime Constraints
44 -- 67Mario Tulenan Parinsi, Keith Francis Ratumbuisang. Indonesian Mobile Learning Information System Using Social Media Platforms

Volume 8, Issue 1

1 -- 18Geetanjali Rathee, Hemraj Saini. Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol
19 -- 33Ruchi Verma, Vivek Kumar Sehgal, Nitin 0001. Crisis Management Using Centrality Measurement in Social Networks
34 -- 47Pratiksha Gautam, Hemraj Saini. A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security
48 -- 61P. Padmaja, G. V. Marutheswar. Certain Investigation on Secured Data Transmission in Wireless Sensor Networks