Journal cover image

Browse issues


Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Autonomous and Adaptive Communications Systems

2015 Vol. 8 No. 2/3

Special Issue on Selected Topics in Computer Science and Technology

Guest Editors: Assistant Professor Fangfang Zhou and Professor Moon Ho Lee

 

Editorial
PagesTitle and authors
100-118Game-theoretic resource allocation and decoding order control in OFDMA based multihop networks
Wonjong Noh; Jihoon Lee; Sangkyung Kim
DOI: 10.1504/IJAACS.2015.069563

119-140A formal aspect-oriented method to model and analyse secure service composition
Guisheng Fan; Huiqun Yu; Liqiong Chen; Dongmei Liu
DOI: 10.1504/IJAACS.2015.069574

141-149A kind of slope stability evaluation model based on SVM-DS method
Feng Tian; Hengmao Pang; Xiaoping Sun; Chuanyun Wang
DOI: 10.1504/IJAACS.2015.069573

150-163Multi-source intrinsic colourisation
Hong Li; Xiling Sheng; Su Yang; Wei Zhang; Clement K. Kirui
DOI: 10.1504/IJAACS.2015.069562

164-179On distributed polarising relay transmission system with successive interference cancelation decoding in frequency selective fading channels
Jun Peng; Yun Mao; Dazu Huang
DOI: 10.1504/IJAACS.2015.069569

180-199An objective assessment method for image defogging effects
Fan Guo; Jin Tang; Zixing Cai
DOI: 10.1504/IJAACS.2015.069561

200-212An efficient clustering ensemble selection algorithm
Limin Liu; Zhifang Liao; Zhining Liao
DOI: 10.1504/IJAACS.2015.069570

213-227Selective partial recovery optimisation strategy for SSL connection migration
Fang Qi; Shaowei Wu; Zhe Tang; Guojun Wang
DOI: 10.1504/IJAACS.2015.069564

228-242An environment-aware routing protocol for underwater wireless sensor networks
Abdul Wahid; Sungwon Lee; Dongkyun Kim
DOI: 10.1504/IJAACS.2015.069565

243-256An outlier mining algorithm based on approximate outlier factor
Zhifang Liao; Limin Liu; Xiaoping Fan; Yueshan Xie; Zhining Liao; Yan Zhang
DOI: 10.1504/IJAACS.2015.069567

257-267Orthogonal matching pursuit-based incremental locally linear embedding algorithm
Yiqin Leng; Li Zhang; Jiwen Yang
DOI: 10.1504/IJAACS.2015.069572

268-287KFTrust: P2P trust model based on evaluation rank using Kalman filter
Zhigang Chen; Limiao Li; Jingsong Gui; Xiaoheng Deng; Lei Yuan
DOI: 10.1504/IJAACS.2015.069566

288-305FLIP: enforcing IP mobility to the cellular network edge
Yuhong Li; Jinna Lan; Baowen Liu; Jianan Bing; Zhen Cao; Hui Deng
DOI: 10.1504/IJAACS.2015.069571

306-319Medical image fusion using optimal feature selection methods based on second generation contourlet transform
Yujie Li; Huimin Lu; Ling Chen; Seiichi Serikawa
DOI: 10.1504/IJAACS.2015.069560

320-331A layer-based algorithm for the construction of connected dominating set in WSNs
Jun Zhang; Yong Tang; Zhang Jun; Wenyong Wang
DOI: 10.1504/IJAACS.2015.069568