Journal: ITC

Volume 50, Issue 4

607 -- 626Egidijus R. Vaidogas. Bayesian Processing of Data on Bursts of Pressure Vessels
627 -- 644Shariq Bashir, Daphne Teck Ching Lai. Mining Approximate Frequent Itemsets Using Pattern Growth Approach
645 -- 655George Klington, K. Ramesh, Seifedine Nimer Kadry. Cost-Effective Watermarking Scheme for Authentication of Digital Fundus Images in Healthcare Data Management
656 -- 673Chhayarani Ram Kinkar, Yogendra Kumar Jain. Low Latency Based Convolutional Recurrent Neural Network Model for Speech Command Recognition
674 -- 685Bora Aslan, Kerem Atasen. COVID-19 Information Sharing with Blockchain
686 -- 705B. Uma Maheswari, R. Sonia, M. P. Rajakumar, J. Ramya. Novel Machine Learning for Human Actions Classification Using Histogram of Oriented Gradients and Sparse Representation
706 -- 721Shaofeng Lin, Zengguo Sun, Xuejun Peng, Lin Ni, Genfeng Wen, Weirong Chen, Zheng Lu, Qianfu Chen. Brightness Compensation for GF-3 SAR Images Based on Cycle-Consistent Adversarial Networks
722 -- 735W. Wang, F. Berholm, K. Hu, L. Zhao, S. Feng, A. Tu, E. Fan. Lane Line Extraction in Raining Weather Images by Ridge Edge Detection with Improved MSR and Hessian Matrix
736 -- 751Ludmila Vesjolaja, Bjørn Glemmestad, Bernt Lie. Comparison of Feedback Control Strategies for Operation of Granulation Loops
752 -- 768Muchao Chen, Yanxiang He. Wire Rope Weak Defect Signal Processing Methods Based on Improved SVD and Phase Space Reconstruction
769 -- 785Zhong Hong, Jianmin Jiang, Hongping Shu. Analyzing Isolation in Mobile Systems
786 -- 807Alen Salkanovic, Sandi Ljubic, LJubisa Stankovic, Jonatan Lerga. Analysis of Cryptography Algorithms Implemented in Android Mobile Application
808 -- 826Dorde Stakic, Miodrag Zivkovic, Ana Anokic. A Reduced Variable Neighborhood Search Approach to the Heterogeneous Vector Bin Packing Problem

Volume 50, Issue 3

0 -- 0Akhilesh Kumar Shrivas, Amit Kumar Dewangan, S. M. Ghosh, Devendra Singh. Development of Proposed Ensemble Model for Spam e-mail Classification
424 -- 442Atif Ali, Yaser Hafeez, Sadia Ali, Shariq Hussain, Shunkun Yang, Arif Jamal Malik, Aaqif Afzaal Abbasi. A Data Mining Technique to Improve Configuration Prioritization Framework for Component-Based Systems: An Empirical Study
443 -- 457Thamer A. Alrawashdeh, Fuad Ali El-Qirem, Ahmad Althunibat, Roba Alsoub. A Prioritization Approach for Regression Test Cases Based on a Revised Genetic Algorithm
458 -- 469Gang Sun, Zhongxin Wang, Jia Zhao. Automatic Text Summarization Using Deep Reinforcement Learning and Beyond
470 -- 484Raed T. Al-Zubi, Mohammad Q. Alawad, Abdulraheem A. Kreishan, Khalid A. Darabkh. ERP-DDA: Event Reporting Protocol Based on Distributed Data Aggregation for Wireless Sensor Networks
485 -- 494Oscar Loyola, John Kern, Claudio Urrea. Novel Algorithm for Agent Navigation Based on Intrinsic Motivation Due to Boredom
495 -- 506Deris Stiawan, Somame Morianus Daely, Ahmad Heryanto, Nurul Afifah, Mohd Yazid Idris, Rahmat Budiarto. Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm
507 -- 521Atif Mehmood, Inam Ul Hasan Shaikh, Ahsan Ali. Application of Deep Reinforcement Learning for Tracking Control of 3WD Omnidirectional Mobile Robot
522 -- 545Huiyu Mu, Ruizhi Sun, Gang Yuan, Yun Wang. Abnormal Human Behavior Detection in Videos: A Review
546 -- 557J. Kumarnath, K. Batri. Optimized Traffic Grooming through modified PSO based Iterative Hungarian algorithm in Optical Networks
558 -- 569Zoran Peric, Bojan Denic, Milan S. Savic, Milan R. Dincic, Darko Mihajlov. Quantization of Weights of Neural Networks with Negligible Decreasing of Prediction Accuracy
570 -- 587Jiaxing Guo, Chunxiang Gu, Xi Chen 0045, Siqi Lu, Fushan Wei. Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations
588 -- 600Xuhui Bu, Rui Hou, Yanling Yin, Wei Yu, Jiahao Geng. Distributed Iterative Learning Formation control for Nonholonomic Multiple Wheeled Mobile Robots with Channel Noise

Volume 50, Issue 2

213 -- 223Taweechai Nuntawisuttiwong, Natasha Dejdumrong. An Approximation of Bézier Curves by a Sequence of Circular Arcs
224 -- 235Te-Yuan Lin, Chiou-Shann Fuh. Quantum-Resistant Network for Classical Client Compatibility
236 -- 246Guoai Xu, Jiangtao Yuan, Guosheng Xu, Xingxing Jia. A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier
247 -- 263Xuliang Duan, Bing Guo, Yan Shen, Yuncheng Shen, Xiangqian Dong, Hong Zhang. Research on Data Currency Rule and Quality Evaluation
264 -- 283Ali Durdu. Nested Two-Layer RGB Based Reversible Image Steganography Method
284 -- 307Chenn-Jung Huang, Kai-Wen Hu, Hsing Yi Ho, Hung-Wen Chuang. Congestion-Preventing Routing and Charging Scheduling Mechanism for Electric Vehicles in Dense Urban Areas
308 -- 318Tb. Ai Munandar, Sumiati, Vidila Rosalina. Predictive Model for Heart Disease Diagnosis Based on Multinomial Logistic Regression
319 -- 331Wenlu Ma, Han Liu. Least Squares Support Vector Machine Regression Based on Sparse Samples and Mixture Kernel Learning
332 -- 341Seyed Yahya Zahedi Fard, Mohammad Karim Sohrabi, Vahid Ghods. Energy-Aware and Proactive Host Load Detection in Virtual Machine Consolidation
342 -- 356Venkatesan Rajinikanth, Seifedine Nimer Kadry, Yunyoung Nam. Convolutional-Neural-Network Assisted Segmentation and SVM Classification of Brain Tumor in Clinical MRI Slices
357 -- 374Novak Zagradjanin, Aleksandar Rodic 0001, Dragan Pamucar, Bojan Pavkovic. Cloud-Based Multi-Robot Path Planning in Complex and Crowded Environment Using Fuzzy Logic and Online Learning
375 -- 389Waheed Iqbal, Waqas Ilyas Malik, Faisal Bukhari, Khaled Mohamad Almustafa, Zubiar Nawaz. Big Data Full-Text Search Index Minimization Using Text Summarization
390 -- 405Yongwen Du, Xiquan Zhang, Wenxian Zhang, Zhangmin Wang. Whale Optimization Algorithm with Applications to Power Allocation in Interference Networks

Volume 50, Issue 1

5 -- 12Hani Alquhayz, Mahdi Jemmali. Max-Min Processors Scheduling
13 -- 27Binbin Shi, Xun Li, Tingting Nie, Kaibin Zhang, Wenjie Wang. Multi-object Recognition Method Based on Improved YOLOv2 Model
28 -- 44Yaser Chaaban. Packet Analysis: a Model Implementation of a Special Communication Protocol Using Micro Programming
45 -- 54Cr Rathish, K. Karpagavadivu, P. Sindhuja, A. Kousalya. A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET
55 -- 75K. Sundara Krishnan, S. P. Raja, B. Jaison. A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing
76 -- 88QingE Wu 0001, Xing Wang, Zhiwu Chen, Hu Chen, Dong Sun, ZhenYu Han. Application of Fuzzy Pushdown Automaton on Prediction of Quality Control for Spinning Yarn
89 -- 101Zengguo Sun, Mingmin Zhao, Bai Jia. A GF-3 SAR Image Dataset of Road Segmentation
102 -- 122Veera Anusuya, V. Gomathi. An Efficient Technique for Disease Prediction by Using Enhanced Machine Learning Algorithms for Categorical Medical Dataset
123 -- 137Muhammad Tayyib Awan, Muhammad Amir, Sarmad Maqsood, Musyyab Yousufi, Suheel Abdullah, Muhammad Irfan. Modified Block Compressed Sensing for Extraction of Fetal Electrocardiogram from Mother Electrocardiogram Using Block Compressed Sensing Based Guided FOCUSS and FAST-Independent Component
138 -- 152Mujeeb ur Rehman, Dost Muhammad Khan. A Novel Density-based Technique for Outlier Detection of High Dimensional Data Utilizing Full Feature Space
153 -- 170Lizhi Cui, Peichao Zhao, Bingfeng Li, Xinwei Li, Keping Wang, Yi Yang, Xuhui Bu, Shumin Fei. A Stopping Criterion for the Training Process of the Specific Signal Generator
171 -- 187Shanmuganathan Vimal, L. Kalaivani, Seifedine Nimer Kadry, Annamalai Suresh, Yesudhas Harold Robinson, SangSoon Lim. EECCRN: Energy Enhancement with CSS Approach Using Q-Learning and Coalition Game Modelling in CRN
188 -- 207Samia Riaz, Muhammad Waqas Anwar, Irfan Riaz, Yunyoung Nam, Muhammad Attique Khan. Visibility Restoration Using Generalized Haze-Lines