- Correction to: Application of new multi-objective optimization algorithm for EV scheduling in smart grid through the uncertainties
- Correction to: E‑commerce payment model using blockchain
- Special issue on ubiquitous computing in the IoT revolution
- Ambient intelligence and ergonomics in Asia
- Correction to: A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm
- Special issue on “Wearable computing techniques for smart health”
- Retraction Note to: Customer behavior analysis using Naive Bayes with bagging homogeneous feature selection approach
- Correction to: HARE: A new Hash-based Authenticated Reliable and Efficient Modified Merkle Tree Data Structure to Ensure Integrity of Data in the Healthcare Systems
- Correction to: Total least squares estimation model based on uncertainty theory
- Correction to: Trip purpose inference for tourists by machine learning approaches based on mobile signaling data
- Retraction Note to: Smart city routing using GIS & VANET system
- Retraction Note to: Memristor based high speed and low power consumption memory design using deep search method
- Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients
- Innovations for future systems
- Retraction Note to: A study on Arabic sign language recognition for differently abled using advanced machine learning classifiers
- Preface for special issue on “Emotional intelligence and ambient intelligence”
- Editorial of cross-layer design issues, challenges and opportunities for future intelligent heterogeneous networks
- Intelligent transportation systems in big data
- Advanced ambient intelligence system informatics
- Interactive personalized recommendation systems for human health
- Towards enhancement of communication systems, networks and applications for smart environment
- Retraction Note to: A new whale optimizer for workflow scheduling in cloud computing environment
- Correction to: A novel multi‑level evaluation approach for human‑coupled IoT applications
- Correction to: A new approach to q-linear Diophantine fuzzy emergency decision support system for COVID19
- Retraction Note to: Analysis of security issues of cloud-based web applications
- Correction to: Dynamic modeling and control of five phase SVPWM inverter fed induction motor drive with intelligent speed controller
- Systematic survey of mobile payments, protocols, and security infrastructure
- Opportunities and challenges for applying process mining in healthcare: a systematic mapping study
- A comprehensive review of quadratic assignment problem: variants, hybrids and applications
- Machine learning based sign language recognition: a review and its research frontier
- Descriptive theory of awareness for groupware development
- Security and privacy issues in smart cities/industries: technologies, applications, and challenges
- A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
- Vision-based patient monitoring: a comprehensive review of algorithms and technologies
- Signature identification and verification techniques: state-of-the-art work
- A Survey of Machine Learning and Meta-heuristics Approaches for Sensor-based Human Activity Recognition Systems
- The emergence of social media data and sentiment analysis in election prediction
- A review on lightweight cryptography for Internet-of-Things based applications
- A survey on clustering protocols in wireless sensor network: taxonomy, comparison, and future scope
- A comprehensive survey on machine translation for English, Hindi and Sanskrit languages
- Optimization algorithms, an effective tool for the design of digital filters; a review
- Taxonomy of controller placement problem (CPP) optimization in Software Defined Network (SDN): a survey
- Enhancing sentiment analysis using Roulette wheel selection based cuckoo search clustering method
- Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks
- Remote patient monitoring: a comprehensive study
- A comprehensive survey on trajectory schemes for data collection using mobile elements in WSNs
- Cloud of Things: architecture, applications and challenges
- Industry 4.0 framework for management and operations: a review
- A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection
- Understanding the influence of impulse buying toward consumers’ post-purchase dissonance and return intention: an empirical investigation of apparel websites