Advances in Modelling (Series B) publishes original research papers on all aspects of Signal Processing and Pattern Recognition. We do not publish papers concerned solely with XXXXXXXXXXXXXXX, although manuscripts using such XXXXXXXXXX to address important XXXXXXXXXXXXXXXX questions may be considered. Studies of XXXXXXXXXXXXXXX are accepted, as well as studies of XXXXXXXXXX, providing they focus on the XXXXXXXXXXXXXXXXX.
We aim to bring important work using any modelling approach (including XXXXXXXXXXXX) to a wide international audience and therefore only publish papers with strong and ecological messages that advance our understanding of XXXXXXXXXXXXXXX principles. The research presented must transcend the limits of case studies. Both experimental and theoretical studies are accepted, as are descriptive or historical accounts, although these must offer insights into issues of general interest to business.
Topics in this journal are: General Mathematics, Signal Processing and Pattern Recognition, Automatic Control (theory and applications), Computer Science and Statistics, General Physics and Electrical Applications, Mechanics and Thermics, Chemistry, Geology, Environment and Bioengineering, Production Engineering and Management, Organization, Human and Social Problems.
Instructions for Authors (AMSE periodicals)
Except for some survey papers, the papers must be original (research, development, results). Papers should be related to Modelling and/or Simulation. Then, authors are requested to indicate (if possible) to which AMSE series their paper is intended, although Referees may suggest another choice. Submissions are in English. All contributions are assessed by Referees. Also, don’t forget to quote MS (manuscript) number in all mails (number is given at the first submission). In order to allow a correct reproduction of the paper, submissions must comply with the following requirements:
*Titles (character size being 16), and numbered section headings, should be meaningful and concise, typed in bold characters and not in capital letters; (the rest is in Times 12, or equivalent). Skip a line between title and authors and between authors and affiliation addresses.
*Authors’ names and institution full addresses must be clearly indicated. Institution addresses should be complete; they are placed below the authors’ names and before the abstract. Do not give telephone numbers. E-mail addresses are compulsory, following the institution addresses. Give the initial letter (only and always) of given names.
*An Abstract (in English) of less than 150 words must precede the text; it follows immediately (on the first page) the institution addresses. Then Key Words should be indicated [between abstracts and text].
*Text follows immediately (on the first page) key words. Recommended full size for the text is 10 to 20 pages. Papers should be justified and organised in one column. The text must be typed (“Camera Ready”), on standard A4 size (21x29.7 cm). Finally, papers will be reduced, by the Editor (for the printed journals), to A5 format (beware of small characters). Font must be Times 12 (or equivalent size for the characters). Don’t use colours; papers are printed in black and white only. Use 1.5 spacing between the lines. The text must be about 17 cm width and 25 cm high with almost equal margins (margin will be slightly increased at the top of the first page: 4 cm); thus, margins should be set as indicated: right = 2 cm, left = 2 cm, top = 2.7 cm, bottom = 2 cm. Also, a (good) discussion and a conclusion are expected. Conclusion and discussion should not be in the same section. Please, number the pages (bottom of page).
*Tables and figures, with their captions (in normal font), are included in the text at the correct place and receive numbers, which appear in the text. Photographs (and colours) should be avoided. Don’t make too small figures with too small indications (the publisher reduces the format from A4 to A5 before printing).
*All Footnotes should be placed at the end of the paper, sorted by their reference number.
*A good care in the References must be introduced. Each citation must begin on a new line using the following format: Authors’ family names (preceded by the initial letter of the given name); Title, Year; THEN: Publisher, City, Country (for book) OR journal name, volume, pages, (for journals). Also, for conference proceedings indicate the place (town, country), the date (month, year), the meaning of acronyms (if any) and the pages of the paper in the proceedings (the reader should have access to the information if needed). References must be up to date and a minimum of 10 references is expected. Bibliography follows immediately the conclusion (or possible acknowledgements). Also, don’t forget to cite AMSE papers in the references; this is necessary for our recognition.
*Postal address: (if needed): AMSE Secretary/ 14 Avenue Berthelot/ 69 007 LYON (FRANCE)
Do not send special delivery mail, such as registered mail, to this address.
*Copyrights: In case of acceptance, copyrights are transferred to AMSE (see website).
*Submission: Papers can be submitted for regular processing or for electronic processing (indicate your choice).
Papers should be sent (electronic paper: Word 2003 recommended) to the General Secretary’s e-mail address:
Dr C. Berger-Vachon: email@example.com
-Regular processing: papers will be printed and posted to Referees (the Editorial Committee will find the referees).
-Electronic processing (accelerated reviewing): please suggest 4 RELIABLE referees and indicate their electronic and postal addresses, not from your university, and one at least should not be from the main author’s country; please make sure the Referees will accept the reviewing if requested. Finally, two referees will be selected among them.
*AMSE website: www.amsemodelling.com
Important information from AMSE Board about periodical publication:
Many letters to AMSE deals with the following topic. So, let us make a statement about it.
Publications in AMSE journals are free of charge. Consequently, people working for AMSE are volunteers and they must do , first, their compulsory duties in their institutions.
This may lead to some delay in handling AMSE mail and submissions. The following delays should be regarded as normal:
*Acknowledgement letter (after a submission) : 1½ to 2 month,
*Reply from the Referee: another 4 months.
Unfortunately, sometimes, Referees forget to answer and added recalls have to be done lengthening the procedure and making AMSE work much heavier and the delay longer. And, finally, in the worst case, no reply come after the recall and the paper is taken by the AMSE Board; this is exceptional and really unfair and unpleasant.
After acceptance, papers are forwarded to Spain for printing. Contents of edited journals are indicated on our website.
So please, don't send information requests within these periods (mostly with repeated e-mail messages) as it may even more lengthen the delays.
Thank you for your collaboration and for accepting these rules which help our community to publish at a low cost
The General Secretary
We strongly suggest you regularly check your spam folder for AMSE notifications. Update your 'Safe Senders' list to ensure that emails from AMSE are not filtered into your spam folder.
Are you a new AMSE user? Please select register from the section USERS at the top and enter the requested information.
Are you an existing AMSE user? If you are already registered as an author or a reviewer, please do not register again. Enter at the top your username and password and then click the appropriate log in button. If your email or other address details change, you can update your AMSE account by selecting "Modify my User's Data" after you log in, from the section USERS.
Are you an author and reviewer for our journal? You will be able to perform both these activities with your AMSE account. Select log in from the menu at the top and enter your username and password, and select "My Articles in process" or "Articles for review" from the section PUBLICATIONS at the top and access the requested information.
Have you previously registered on this site but now forgotten your password? Simply click "I forgot my password" at the top. Enter your email address in the popup window that appears and click "Remember Password". AMSE will then email you your username and password.
Do you wish to change your username or password? Simply log in to AMSE and select "Modify my User's Data", from the section USERS.
Browse in this journal:
|Elevator Traffic Pattern Recognition Based on Fuzzy BP Neural Network with SOM Algorithm||Pag. 630|
|Zhenshan Yang, Wenjiao Yue (China)|
|Registration of the Roads with the Use of a Satellite Image and a Road Map: Application to Road Map Update||Pag. 646|
|Z. Nougrara (Algeria)|
|Agent Simulation Model Based on Similarity Measure||Pag. 657|
|Hongchen Wei, Xiaobin Li (China)|
|A Novel Algorithm for Clustering and Feature Selection of High Dimensional Datasets||Pag. 525|
|Thulasi Bikku, Alapati Padma Priya (India)|
|A Fuzzy Neural Network Approach for Assessment and Enhancing Software Reliability||Pag. 539|
|Theyyagura M.K. Reddy, Madhwaraj Kango Gopal (India)|
|A Fuzzy-Neural-Genetic Algorithm Approach for Gene Expression and Micro Array Analysis for||Pag. 551|
|Velpula Nagi Reddy, A. Rama Swamy Reddy (India)|
|An Authoritative Method Using Fuzzy Logic to Evaluate Maintainability Index and Utilizabil||Pag. 566|
|Yenduri Gokul, Madhwaraj Kango Gopal (India)|
|MFCC for Voiced Part Using VAD and GMM Based Gender Recognition||Pag. 581|
|Hema Kumar Pentapati, Srinivas Vasamsetti, Madhu Tenneti (India)|
|Review of Preprocessing Techniques for Fundus Image Analysis||Pag. 593|
|Shilpa Joshi, P. T. Karule (India)|
|A Comparative Study of Technologies Developed in Perspective of Distributed Operating Syst||Pag. 613|
|Ahmed Bin Shafaat, Shuxiang Xu (Pakistan, Australia)|
|Speaker Identification Using Auditory Modelling and Vector Quantization||Pag. 283|
|Konstantina Iliadi, Stefan Bleeck (UK)|
|The Identification of Critical Nodes in Ad Hoc Network Based on Node Degree and Clustering Coefficient||Pag. 304|
|Mian Tan, Yue Wu, Bo Song (China)|
|DNA Sequence Detector Using Finite State Machine Methodology||Pag. 313|
|Jishan Mehedi, Nilkantha Rooj, Snehanjali Majumder, Anirban Mukherjee, Niladri Hore (India)|
|A IDS Model Based on HGA and Data Mining||Pag. 319|
|Lina Lin, Dezhi Wei, Fuji Chen (China)|
|FPGA Implementation of Discrete Fourier Transform Using CORDIC Algorithm||Pag. 332|
|Debaprasad De, K. Gaurav Kumar, Archisman Ghosh, Anurup Saha (India)|
|Local Capability Analysis and Comparative Study of Kernel Functions in Support Vector Machine||Pag. 338|
|Hailun Wang, Daxing Xu (China)|
|Adaptive Wavelet Transform Based Rake Receiver for Ultra-Wideband Systems||Pag. 357|
|Ch. Navitha, K. Sivani K., Ashoka Reddy (India)|
|Prediction Method of Network Security Situation Based on GA-LSSVM Time Series Analysis||Pag. 372|
|Huan Wang, Jian Gu, Jianping Zhao, Dan Liu, Xin Sui, Xiaoqiang Di, Bo Li (China)|
|Analysis of Signal Transmission Performance of Radio Frequency Cable under Multiple Factors||Pag. 391|
|Wenjing Xuan (China)|
|Research on Algorithm for Partial Discharge of High Voltage Switchgear Based on Speech Spectrum Features||Pag. 403|
|Yueqin Feng, Quan Chen, Chunguang Li, Wenchao Hao (China)|
|Labview-based Study on the Modeling Method of Chlorophyll Content Prediction in Tomato Leaves||Pag. 416|
|Ji Qian, Juan Zhou, Yang Liu (China)|
|Design of FPGA-based Handwriting Image Recognition System||Pag. 429|
|Lei Wang, Ziheng Yang, Guangqiang Xu, Meili Fu, Yu Wang (China)|
|Virtual Machine Scheduling Model Based on Energy and Interference Awareness in Cloud Environment||Pag. 442|
|Xin Sui, Li Li, Dan Liu, Huan Wang, Jilong Gong, Zetian Zhang (China)|
|Virtual Machine Scheduling Strategy for Reliable Service Resource Supply in Cloud Environment||Pag. 455|
|Dan Liu, Xin Sui, Yan Zeng, Guangcai Cui, Xu Di, Li Li (China)|
|Adaptive Multi-copy Layout Algorithm Based on Mass Storage System||Pag. 469|
|Guosong Jiang, Qing Zhang (China)|
|Image Simulation for 3-FOV Daytime Star Sensor Based on Ray Tracing||Pag. 493|
|Feng Wu, Xifang Zhu, Ruxi Xiang, Xiaoyan Jiang, Qingquan Xu, Gong Chen, Tao Wu (China)|
|Study on Damage Identification of Beam Bridge Based on Characteristic Curvature and Improved Wavelet Threshold De-Noising Algorithm||Pag. 505|
|Xi Chu, Zhixiang Zhou, Guojun Deng, Tengjiao Jiang, Yangkun Lei (China)|
|An improved rotation forest algorithm based on heterogeneous classifiers ensemble for classifying gene expression profile||Pag. 1|
|Tao Chen (China)|
|Human action recognition based on multiple feature fusion||Pag. 25|
|R.J. Ma, H.S. Zhang (China)|
|Fault detection and improvement design of temperature sensor in wood carbonization furnace||Pag. 43|
|Ming Yu, Jian Wang, Meng Zhu, JiaShun Luo (China)|
|An effective recommendation model using user access sequence and context entropy||Pag. 57|
|Xiaoyi Deng, Feifei Huangfu (China)|
|A folk evaluation approach for part standardization||Pag. 74|
|D. Liu, M. K. He, J. D. Chen (China)|
|A probability distribution kernel based on whitening transformation||Pag. 93|
|Jiangsheng Gui, Yuanfeng Chi, Qing Zhang, Xiaoan Bao (China)|
|The evolution of artificial ecosystem based on the ecological chain algorithm||Pag. 110|
|Kang Feng, Lei Chen (China)|
|MHI-CNN model for fine-grained classification of product image||Pag. 123|
|Mingxia Lin, Cuihua Li (China)|
|An automated schematic method based on dynamic grid for Service Area Map||Pag. 140|
|Tan Zuofei, Li Shenglin, Wang Zhaoxia, Guo Yudong, Wei Xiaofu (China)|
|Web optimization of QUIC under wireless network||Pag. 161|
|Huang Cheng, Lv Yongbo (China)|
|Security analysis and improvement of the certificateless aggregate signature schemes||Pag. 174|
|Aiwan Fan, Qiming Wang (China)|
|An incremental updating method for the K-anonymous dataset using a similar-B-tree||Pag. 189|
|Jinling Song, Liming Huang, Yan Gao, Haibin Liu (China)|
|Classification method for uncertain data based on sparse de-noising auto-encoder neural network||Pag. 210|
|Jijiang Yu, Yuwen Huang, Chunying Liu (China)|
|Understanding core districts of city using human activity data||Pag. 224|
|Duan Hu, Jie Yang, Benxiong Huang (China)|
|DBIECM-an evolving clustering method for streaming data clustering||Pag. 239|
|Kai-song Zhang, Luo Zhong, Lan Tian, Xuan-ya Zhang, Lin Li (China)|
|Research on prediction model for icing thickness of transmission lines based on BP neural network optimized with improved fruit fly algorithm||Pag. 255|
|J. Zhou, B.G. Tang, X.W. Ren (China)|
|Using customized active resource routing and tenable association using licentious method algorithm for secured mobile ad-hoc network management||Pag. 270|
|V. Lakshman Narayana, C.R.Bharathi (India)|
|Wavelet decomposition based skewness and kurtosis analysis for assessment of stator current harmonics in a PWM – Fed induction motor drive during single phasing condition||Pag. 1|
|A. Chattopadhyaya, S. Chattopadhyay, J. N. Bera, S. Sengupta (India)|
|Coding strategy behavior related to microphone integrity in cochlear implants using the recognition of syllables in a noisy environment||Pag. 15|
|P.A. Cucis, E. Veuillet, E. Truy, H. Thai Van, F. Millioz, S. Gallego (France)|
|Effect of microphone cleaning on syllable recognition performed by cochlear implant users using the CIS and NofM coding strategies||Pag. 31|
|P.A. Cucis, E. Veuillet, E. Truy, H. Thai Van, F. Seldran, S. Gallego (France)|
|Multiple kernel sphere with large margin for novelty detection||Pag. 46|
|X. M. Cheng, B. Zheng, W. J. Hu (China)|
|Research on personalized tourism attractions recommendation model based on user social influence||Pag. 62|
|Zhijun Zhang, Huali Pan, Gongwen Xu (China)|
|Compressive sensing radar based on random chaos||Pag. 76|
|Jun Tang, Lin Zhang, Jiangnan Yuan (China)|
|Tensorial biometric signal recognition based on multilinear PCA plus GTDA||Pag. 91|
|Fan Zhang, Ke Sun (China)|
|Scale invariant constrained deep network for head pose estimation||Pag. 113|
|Jiao Bao, Mao Ye (China)|
|Modal parameter identification for transmission tower based on point spectrum correlation function of time-frequency distribution||Pag. 131|
|Zhou Ling, Li Ying-tao, Chen Jin, Yang Chao-shan, Deng Zhi-ping (China)|
|Partner selection mechanism of cooperative innovation in project-based supply chain based on the effect of knowledge level||Pag. 146|
|Chen Wei, Yang Bai, Lin Chuan (China)|
|A new subspace based speech enhancement algorithm with low complexity||Pag. 164|
|Qi Sun, Xiaohui Zhao (China)|
|An improved randomized algorithm for detecting circles||Pag. 177|
|Lianyuan Jiang, Zhiwen Wang, Yiyi Xu, Meizhen Liu, Jian He (China)|
|Multi-objective particle swarm optimization algorithm for recommender system||Pag. 189|
|Zhaoxing Li, Chen Li, Zhang Jue (China)|
|Extraction of English alphabets from words and sentences using slider drifting method (Sdm)||Pag. 1|
|R. K. Mandal, N. R. Manna (India)|
|Recognition of human-face from side-view using progressive switching pattern and soft-computing technique||Pag. 14|
|R. Raja, T. S. Sinha, R. P. Dubey (India)|
|Application of genetic algorithm for reduction of sidelobes from thinned arrays||Pag. 35|
|G. S. K. Gayatri Devi, G.S.N.Raju, P.V.Sridevi India)|
|Towards robust analysis of satellite images of Algeria; application to road network and its nodes extraction||Pag. 53|
|Z. Nougrara (Algeria)|
|2D Gabor filter for surface defect detection using GA and PSO optimization techniques||Pag. 67|
|Khwaja Muinuddin Chisti Mohammed, Srinivas Kumar S., Prasad Gandikota (India)|
|Automatic obstacle detection for a star algorithm using digital image processing||Pag. 84|
|M. Awasthy (India)|
|Development of soft decision tree classifier using interval type-2 fuzzy logic rule based data mining for steam turbine fault analysis of a power system rotatory machine component.||Pag. 1-21|
|Neelam, S.; Jha, M.; Dewangan, D.N.; Qureshi, M.F.|
|Technical directives for building and operating MSG3 and NOAA19 satellites receiving station.||Pag. 22-42|
|Hassini, A.; Belbachir, A.H.|
|Pattern generation for geometrical objects using morphological transformations.||Pag. 43-54|
|Radhakrishnan, P.; Clementking, A.; Murugesh, V.|
|Pattern synthesis using real coded genetic algorithm.||Pag. 55-68|
|Krishna, S.; Raju, G.S.N.|
|Array design with accelerated particle swarm optimization.||Pag. 69-81|
|Victoria, P.; Raju G.S.N.|
|An integrated and efficient approach to measure semantic similarity between short sentences and paragraphs.||Pag. 82-93|
|Kavitha, A.; Rajkumar, N.; Victor, S.P.|
|Fuzzy logic based analysis of steady state stability of a CSI fed synchronous motor drive system with damper windings included.||Pag. 1-19|
|Srikant, P.; Jha, M.; Qureshi, M.F.|
|A genetic algorithm based approach in image authentication using Z transform (GAIAZT).||Pag. 20-30|
|Khamrui, A.; Mandal, J.K.|
|Handwritten English character segmentation by baseline pixel burst method (BPBM).||Pag. 31-46|
|Mandal R.K.; Manna N.R.|
|Diagnostics of induction motor based on spectral analysis of stator current signal using fast fourier transform and genetically tuned interval type-2 fuzzy classifier methods.||Pag. 47-67|
|Jha, M.; Kulkarni, A.G.; Qureshi, M.F.|
|Color image authentication based on two-dimensional separable discrete hartley transform (CIA2D-SDHT).||Pag. 68-87|
|Ghosal,S.K.; Mandal, J.K.|
|Handwritten English character recognition using hoof segmentation of image matrix (HSIM).||Pag. 88-108|
|Mandal R.K.; Manna N.R.|