default search action
23rd ICAC 2017: Huddersfield, United Kingdom
- 23rd International Conference on Automation and Computing, ICAC 2017, Huddersfield, United Kingdom, September 7-8, 2017. IEEE 2017, ISBN 978-0-7017-0260-1
- Hamza Aagela, Maha Al-Nesf, Violeta Holmes:
An Asus_xtion_probased indoor MAPPING using a Raspberry Pi with Turtlebot robot Turtlebot robot. 1-5 - S. Anitha Kumari, S. Srinivasan:
NARX models for prediction of reheater fouling. 1-4 - Anwar Ur Rehman, Muhammad Awais, Munam Ali Shah:
Authentication analysis using input gestures in touch-based mobile devices. 1-5 - Jianhong Zou, Qianchuan Zhao:
Video object segmentation using background model based on pixel time series clustering. 1-6 - Samira Chebli, Ahmed Elakkary, Nacer Sefiani:
PID controller tuning using multi-objective ant colony optimization applied to TCP/AQM networks. 1-6 - Alexander Hewitt, Chenguang Yang, Yong Li, Rongxin Cui:
DMP and GMR based teaching by demonstration for a KUKA LBR robot. 1-6 - Dharmendra Shadija, Mo Rezai, Richard Hill:
Towards an understanding of microservices. 1-6 - Chaolong Zhang, Yuanping Xu, Jiliu Zhou, Zhijie Xu, Li Lu, Jun Lu:
Dynamic load balancing on multi-GPUs system for big data processing. 1-6 - Fahad Mira, Wei Huang, Antony Brown:
Improving malware detection time by using RLE and N-gram. 1-5 - Yu Hao, Zhijie Xu, Jing Wang, Ying Liu, Jiulun Fan:
An effective video processing pipeline for crowd pattern analysis. 1-6 - Alaa Al-Ibadi, Samia Nefti-Meziani, Steve Davis:
Cooperative project by self-bending continuum arms. 1-6 - Jian-Bo Yang, Dong-Ling Xu:
Inferential modelling and decision making with data. 1-6 - Songshan Guo, Mark Dooner, Jihong Wang, Hongming Xu, Guoxiang Lu:
Adaptive engine optimisation using NSGA-II and MODA based on a sub-structured artificial neural network. 1-6 - Ahmed Mohammed, Misha Filip, Rossi Setchi, Xiaodong Li:
Drafting a fuzzy TOPSIS-multi-objective approach for a sustainable supplier selection. 1-6 - Ahmed Mohammed, Qian Wang, Misha Filip:
Towards a cost-effective design of a meat supply chain: A multi-criteria optimization model. 1-6 - Muhammad Junaid, Munam Ali Shah, Imran Abbas Satti:
A survey of internet of things, enabling technologies and protocols. 1-5 - Bushra Zaheer Abbasi, Munam Ali Shah:
Fog computing: Security issues, solutions and robust practices. 1-6 - Waqar Ali, Ghulam Dustgeer, Muhammad Awais, Munam Ali Shah:
IoT based smart home: Security challenges, security requirements and solutions. 1-6 - Qiang Zeng, Zainab Mones, Yimin Shao, Fengshou Gu, Andrew D. Ball:
Planetary gear fault diagnosis based on instantaneous angular speed analysis. 1-6 - Elvis Omar Jara Alegria, Celso Pascoli Bottura:
Real-time identification of ARX-SDP model using a rectangular moving window. 1-6 - Carlos Beltran Perez, Hua-Liang Wei:
Digital image classification and detection using a 2D-NARX model. 1-6 - A. Ahtaiba, A. Abdulhadi, H. Amreiz, O. Imrayed, M. Darwish:
Restoration of an AFM height image using a deflection image at different scanning speeds. 1-4 - Shu Zhang, Junyu Dong, Hui Yu:
Feature matching for underwater image via superpixel tracking. 1-5 - Jian Zhang, Mahjoub Dridi, Abdellah El Moudni:
A stochastic shortest-path MDP model with dead ends for operating rooms planning. 1-6 - Liang Tao, Jingwei Gao, Ruichen Wang, Jianguo Dong:
Review on wave energy technologies and power equipment for tropical reefs. 1-6 - Binxin Yin, Shihong Miao, Yaowang Li, Chang Ye, Xing Luo, Jihong Wang:
Energy distribution and security control of hierarchical structure energy storage system. 1-6 - H. Mohamed, Pavlos I. Lazaridis, David Upton, Umar F. Khan, Keyur K. Mistry, Bahghtar Saeed, Peter Mather, Maria F. Q. Vieira, K. W. Barlee, D. S. W. Atkinson, Ian A. Glover:
Partial discharge localization based on received signal strength. 1-4 - Fan Wang, Jinling Liang, Xiaohui Liu:
Recursive filtering for two-dimensional systems with missing measurements subject to uncertain probabilities. 1-6 - Maham Tariq, Munam Ali Shah:
Review of model-free gait recognition in biometrie systems. 1-7 - Jing Wang, Zhijie Xu, Yanlong Cao, Yuanping Xu:
Wavelet-based texture model for crowd dynamic analysis. 1-5 - Jack Bryan Hughes, Pavlos I. Lazaridis, Ian A. Glover, Andrew D. Ball:
Opportunities for transmission power control protocols in wireless sensor networks. 1-5 - Fehda Malik, Munam Ali Shah:
Smart city: A roadmap towards implementation. 1-6 - Mahdi Heidari, Hamed Khodadadi:
Climate control of an agricultural greenhouse by using fuzzy logic self-tuning PID approach. 1-6 - Jin Zhou, Hong Yue, Yonglin Zhang, Chongye Xiao:
Design of intelligent control system for rice whitening machine. 1-6 - Ying He, Chengzhi Shi, Jihong Liu, Dongze Shi:
A segmentation algorithm of the cortex bone and trabecular bone in Proximal humerus based on CT images. 1-4 - Abdulwanis Abdulhadi, Ahmed Ahtaiba:
Evaluation of the quality of a spot welding electrode using active illumination by image segmentation. 1-7 - Guangzhou Wang, Hechun Yu, Guoqing Zhang, Yanlong Cao, Zexiang Zhao:
Research on the design of the continuous slot-restriction aerostatic thrust bearing. 1-4 - Muhammad Waseem Akram, Muhammad Salman, Munam Ali Shah, Mian Muhammad Ahmed:
A review: Security challenges in cognitive radio networks. 1-6 - Chunxu Li, Chenguang Yang, Jian Wan, Andy S. K. Annamalai, Angelo Cangelosi:
Neural learning and Kalman filtering enhanced teaching by demonstration for a Baxter robot. 1-6 - G. Panice, Salvatore Luongo, Gabriella Gigante, Domenico Pascarella, Carlo Di Benedetto, Angela Vozella, Antonio Pescapè:
A SVM-based detection approach for GPS spoofing attacks to UAV. 1-11 - Rushan Arshad, Hongnian Yu, Simon McLaughlin:
Integrated systems for urine flow measurement: A critical review. 1-6 - Jianjie Chu, Wenhua Li, Haicheng Yang, Suihuai Yu:
An approach for prioritizing key factors affecting air travel experience based on grey theory and DEMATEL. 1-6 - N. Hassan, Senthan Mathavan, Khurram Kamal:
Road crack detection using the particle filter. 1-6 - Sajeeb Saha, Mohammad S. Hasan:
Effective task migration to reduce execution time in mobile cloud computing. 1-5 - Asma Zahra, Munam Ali Shah:
IoT based ransomware growth rate evaluation and detection using command and control blacklisting. 1-6 - Alaa Al-Ibadi, Samia Nefti-Meziani, Steve Davis:
Novel models for the extension pneumatic muscle actuator performances. 1-6 - Yuanlin Gu, Hua-Liang Wei, Michael A. Balikhin:
Nonlinear dynamic predictive model selection and interference using information criteria. 1-6 - Joy Eze, Sijing Zhang, Enjie Liu, Elias Chinedum Eze:
Cognitive radio technology assisted vehicular ad-hoc networks (VANETs): Current status, challenges, and research trends. 1-6 - Reda Nujoom, Qian Wang, Ahmed Mohammed:
Towards a sustainable manufacturing system design: A multi-objective optimization model. 1-8 - Abdelmenem Abobghala, Simon Iwnicki, Roger Goodall:
Evaluation of passive and active steering systems for railway vehicles using Matlab and Simulink simulation. 1-6 - Paridhi Gupta, Tanu Mehrotra, Ashita Bansal, Bhawna Kumari:
Multimodal sentiment analysis and context determination: Using perplexed Bayes classification. 1-6 - Rashed Md. Murad Hasan, Xichun Luo:
Nanolithography: Status and challenges. 1-6 - Rashid Kamal, Munam Ali Shah, Asad Hanif, Jamil Ahmad:
Real-time opinion mining of Twitter data using spring XD and Hadoop. 1-4 - Qing Tao, Jinsheng Kang, Wenlei Sun, Shoudong Wang, Zhao-bo Li:
Analysis of the sitting posture comfort based on motion capture system and JACK software. 1-7 - Yousef Alduraywish, Yuchun Xu, Konstantinos Salonitis:
Evaluating state of information systems failure in developing countries using ITPOSMO model. 1-5 - Badradin Elforjani, Yuandong Xu, Khaldoon F. Brethee, Zhifei Wu, Fengshou Gu, Andrew D. Ball:
Monitoring gearbox using a wireless temperature node powered by thermal energy harvesting module. 1-6 - Yuan Yuan, Zidong Wang, Peng Zhang:
Suboptimal control for time-varying systems with stochastic communication protocol: The finite-horizon case. 1-5 - Chengzhi Shi, Jihong Liu, Chenchen Miao:
Study on parking spaces analyzing and guiding system based on video. 1-5 - Yan Song, Zidong Wang, Guoliang Wei:
Model predictive control for unconstrained polytopic systems under try-once-discard protocol. 1-6 - Mohammed Sufian, Xun Chen, Dingli Yu:
Investigating the capability of precision in robotic grinding. 1-6 - Abubaker Abdulwahab, Rakesh Mishra:
Estimation of LTR rollover index for a high-sided tractor semitrailer vehicle under extreme crosswind conditions through dynamic simulation. 1-6 - Zain Ul Abideen, Munam Ali Shah:
An IoT based robust healthcare model for continuous health monitoring. 1-6 - Mitsuru Kanamori, Teruo Kurahashi, M. Noguchi:
Optimization of dynamic anti-windup for planner robot systems with actuator saturation. 1-6 - Ugonnaya E. Muo, Misan Madamedon, Andrew D. Ball, Fengshou Gu:
Wavelet packet analysis and empirical mode decomposition for the fault diagnosis of reciprocating compressors. 1-6 - Yan Zong, Xuewu Dai, Zhiwei Gao:
A software simulator of discrete pulse-coupled oscillators (PCO) time synchronization in wireless sensor networks. 1-7 - Thanmayee Karimireddy, Sijing Zhang, Manideep Reddy:
Token passing techniques to support real time communications on WTPN used for industrial control applications. 1-6 - Fulong Liu, Fengshou Gu, Andrew D. Ball, Yunshi Zhao, Bo Peng:
The validation of an ACS-SSI based online condition monitoring for railway vehicle suspension systems using a SIMPACK model. 1-6 - Xiongbo Wan, Zidong Wang, Chuanyu Ren:
H∞ state estimation for discrete time-delayed stochastic genetic regulatory networks with known sojourn probabilities. 1-6 - Noura Al-Hoqani, Shuang-Hua Yang, Daniel P. Fiadzeawu:
Probability model-based on-demand query processing for wireless sensor networks database. 1-6 - Khattab M. Ali Alheeti, Klaus D. McDonald-Maier:
An intelligent security system for autonomous cars based on infrared sensors. 1-5 - Tayyeba Javed, Khurram Kamal, Senthan Mathavan:
Identifying tree species from google earth imagery: Detection of Palmyra trees in northern Sri Lanka. 1-5 - Guoxing Li, Fengshou Gu, Tie Wang, Xingchen Lu, Ruiliang Zhang, Andrew D. Ball:
A dynamic deformation based lubrication model between the piston rings and cylinder liner. 1-6 - Zainab Mones, Qiang Zeng, L. Hu, Xiaoli Tang, Fengshou Gu, Andrew D. Ball:
Planetary gearbox fault diagnosis using an on-rotor MEMS accelerometer. 1-6 - M. Aabid, Ahmed Elakkary, Nacer Sefiani:
PID parameters optimization using ant-colony algorithm for human heart control. 1-6 - Muhammad Nafees:
RFID based prepaid energy meter and home automation with reporting. 1-5 - Yuandong Xu, Xiaoli Tang, Fengshou Gu, Andrew D. Ball, James Xi Gu:
Early detection of rolling bearing faults using an auto-correlated envelope ensemble average. 1-6 - Xinxin Yao, Hua-Liang Wei:
Short-term stock price forecasting based on similar historical patterns extraction. 1-6 - Long Li, Guangbin Wang, Wenhui Deng, Xiaoli Tang, Fengshou Gu, Andrew D. Ball:
The identification of shaft current induced defects on rolling bearings in wind turbine generators. 1-6 - Samir Alabied, Osama Hamomd, Alsadak Daraz, Fengshou Gu, Andrew D. Ball:
Fault diagnosis of centrifugal pumps based on the intrinsic time-scale decomposition of motor current signals. 1-6 - Weibo Liu, Zidong Wang, Xiaohui Liu, Wenbin Yue, David Bell:
A clustering approach to triage categorization in A&E departments. 1-6 - Karl Ezra Pilario, Yi Cao:
Process incipient fault detection using canonical variate analysis. 1-6 - Abdul Wahid, Ikram Ullah, Omair Ahmad Khan, Abdul Wahab Ahmed, Munam Ali Shah:
A new cross layer MAC protocol for data forwarding in underwater acoustic sensor networks. 1-5 - Shanglian Peng, Jia He, Hongnian Yu, Shuang Cang:
Complex event processing for RFID-enabled retail store. 1-5 - Decai Li, Yukun Hu, Wei He, Jihong Wang:
Dynamic modelling and simulation of a combined-cycle power plant integration with thermal energy storage. 1-6 - Ikram Asghar, Shuang Cang, Hongnian Yu:
Empirical analysis of assistive technology support to the people with dementia. 1-6 - Ashraf Hatwesh, Simon Fletcher, Andrew Longstaff, Wencheng Pan, Fengshou Gu:
Expedient identification of the dynamics of ball-screw drives using online-validation. 1-6 - Mohamed Ali, Said Fathalla, Mohamed Kholief, Yasser Fouad Hassan:
The problem learning Non-Taxonomic Relationships of Ontologies from unstructured data sources. 1-6 - Xintao Ding, Yonglong Luo, Qingying Yu, Qingde Li, Yongqiang Cheng, Robert Munnoch, Dongfei Xue, Guorong Cai:
Indoor object recognition using pre-trained convolutional neural network. 1-6 - Mujeeb ur Rehman, Munam Ali Shah:
A smart parking system to minimize searching time, fuel consumption and CO2 emission. 1-6 - Elias Chinedum Eze, Sijing Zhang, Enjie Liu, Shehu Jabaka Muhammad, Joy Eze:
Achieving reliable communication in vehicular ad-hoc networks (VANETs): A survey. 1-6 - Li Lu, Jia He, Zhijie Xu, Yuanping Xu, Chaolong Zhang, Jing Wang, Jianhua Adu:
Crowd behavior understanding through SIOF feature analysis. 1-6 - Daoyi Wu:
Research on the interaction design of intelligent microwave oven based on user demand. 1-6 - Qingming Fan, Kai Cheng, Yan Cao, Liang Huang:
Cathode design for precision electrochemical machining of straight teeth face gear. 1-5 - Hussain Ahmad Madni, Zahid Anwar, Munam Ali Shah:
Data mining techniques and applications - A decade review. 1-7 - Xiaojing Niu, Shengfeng Qin:
A review of crowdsourcing technology for product design and development. 1-6 - Xiaoli Tang, Yuandong Xu, Fengshou Gu, Andrew D. Ball, Guangbin Wang:
Fault detection of rolling element bearings using the frequency shift and envelope based compressive sensing. 1-6 - Syed Arslan Ali, Munam Ali Shah, Taimoor Ahmed Javed, Syed Muhammad Abdullah, Maham Zafar:
Iris recognition system in smartphones using light version (LV) recognition algorithm. 1-6 - Jie Ma, Xiandong Ma:
State-of-the-art forecasting algorithms for microgrids. 1-6 - Xiwu Zhang, Yan Su, Xin-hua Zhu:
Loop closure detection for visual SLAM systems using convolutional neural network. 1-6 - Jimeng Yang, Yi Chen, Weidong Huang, Yun Li:
Survey on artificial intelligence for additive manufacturing. 1-6 - Mahnoor Khan, Munam Ali Shah:
Inter-process communication, MPI and MPICH in microkernel environment: A comparative analysis. 1-7 - Yunzhi Jin, Hua Zhou, Hongji Yang, Yong Shen, Zhongwen Xie, Yong Yu, Feilu Hang:
An approach to measuring semantic similarity and relatedness between concepts in an ontology. 1-6 - Lu-jun Cui, Yan-long Cao, Hui-chao Shang, Hong-hong Guo, Cheng-yin Wang, Qiang Guo:
Artificial neural network compensation for an optical fiber temperature sensing system based on optical time offset. 1-4 - Rama Hasan, Hussein Hussein, Pavlos I. Lazaridis, Sinan A. Khwandah, Marc Ritter, Maximilian Eibl:
Improvement of speech recognition results by a combination of systems. 1-4 - Xun Chen, Lijun Li, Qiaoping Wu:
Effects of abrasive grit shape on grinding performance. 1-5 - Tamour Bilal, Zafar Faiz, Munam Ali Shah:
Software defined networks: An analysis on robust security practices. 1-5 - Ruomu Tan, Yi Cao:
Contribution plots based fault diagnosis of a multiphase flow facility with PCA-enhancec canonical variate analysis. 1-6 - Qibing Jin, Yunfei Xing, Beiyan Jiang, Xinghan Du:
A modified iteratively reweighted correlation analysis algorithm for robust parameter estimation of output error systems with colored heavy-tailed noises. 1-5 - Urooj Zehra, Munam Ali Shah:
A survey on resource allocation in software defined networks (SDN). 1-6 - Wenlei Sun, Li Cao, Qing Tao, Jianxing Zhou:
The distribution and development of wind resources in China. 1-7 - Na Yang, Qibing Jin:
A modified BBO algorithm and its application for identifying Hammerstein system under heavy-tailed noises. 1-5 - Yan Wang, Shuang Cang, Hongnian Yu:
A noncontact-sensor surveillance system towards assisting independent living for older people. 1-5 - Rashid Kamal, Munam Ali Shah, Nashmiya Hafeez, Asad Hanif:
Enhanced user preference based intelligent scheduling algorithm (E-UPISA). 1-6 - Visakan Kadirkamanathan:
Statistical estimation of spatio-temporal systems. 1 - Gang Zhao, Bingbing Di, Wenjuan Zhu, Yali Yu, Hui Zan:
Design and implementation of interactive system for Tujia brocade virtual weaving based on kinect. 1-5 - Cuebong Wong, Erfu Yang, Xiu-Tian Yan, Dongbing Gu:
An overview of robotics and autonomous systems for harsh environments. 1-6 - Muhammad Awais, Munam Ali Shah:
Information-centric networking: A review on futuristic networks. 1-5 - Jack Bryan Hughes, Pavlos I. Lazaridis, Ian A. Glover, Andrew D. Ball:
A survey of link quality properties related to transmission power control protocols in wireless sensor networks. 1-5 - Qi Li, Bo Shen, Zidong Wang:
Distributed sampled-data state estimation for sensor networks with nonuniform samplings. 1-6 - Zixiang Fei, Erfu Yang, Huosheng Hu, Huiyu Zhou:
Review of machine vision-based electronic travel aids. 1-7 - Licheng Wang, Zidong Wang, Guoliang Wei:
Event-triggered variance-constrained finite-horizon state estimation for discrete-time systems with redundant channels. 1-6 - Osama Hamomd, Samir Alabied, Yuandong Xu, Alsadak Daraz, Fengshou Gu, Andrew D. Ball:
Vibration based centrifugal pump fault diagnosis based on modulation signal bispectrum analysis. 1-5 - Muhammad Usman Atif, Munam Ali Shah:
OptiSEC: In search of an optimal sensor cloud architecture. 1-6 - Lan Cheng, Hong Yue, Gang Xie, Mifeng Ren:
Multipath estimation using an intelligent optimization algorithm with non-Gaussian noise. 1-6 - Yu Hao, Jing Wang, Ying Liu, Zhijie Xu, Jiulun Fan:
Extracting Spatio-Temporal Texture signatures for crowd abnormality detection. 1-5 - Qichun Zhang, Xin Yin:
Parametric decoupling control strategy for a class of nonlinear uncertain systems via observer-based output feedback. 1-6 - Qinyun Liu, Hongming Che, Lin Zou, Hongji Yang, Chi Zhang, Ligang Liu:
A study on creative elements detection in application domain workflow based on educational psychology theories. 1-6 - Xiao Zhang, Wei Zhang:
The enhanced model-free control of nano-positioning stage. 1-6 - Tianxiang Zhang, Jinya Su, Cunjia Liu, Wen-Hua Chen, Hui Liu, Guohai Liu:
Band selection in sentinel-2 satellite for agriculture applications. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.