


default search action
Concurrency and Computation: Practice and Experience, Volume 34
Volume 34, Number 1, January 2022
- Anaram Yaghoobi Notash
, Peyman Bayat
, Shahpar Haghighat
, Ali Yaghoobi Notash:
Evolutionary ensemble feature selection learning for image-based assessment of lymphedema arm volume. - Faiza Sami, Muhammad Amin
, Muhammad Moeen Butt:
On the ridge estimation of the Conway-Maxwell Poisson regression model with multicollinearity: Methods and applications. - Enes Eken
:
Using subspaces of weight matrix for evaluating generative adversarial networks with Fréchet distance. - Neetu Rani
, Prasenjit Das, Amit Kumar Bhardwaj
:
Rumor, misinformation among web: A contemporary review of rumor detection techniques during different web waves. - Abdallah Soualmi
, Adel Alti
, Lamri Laouamer:
A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence. - Bo Tao
, Yao Liu, Licheng Huang, Guanjun Chen, Baojia Chen:
3D reconstruction based on photoelastic fringes. - Babar Nazir, Zulfiqar Ahmad
:
Dynamic energy efficient load balancing strategy for computational grid. - Mehmet Akif Günen
, Pinar Çivicioglu Besdok, Erkan Besdok:
Keypose synthesis from 3D motion capture data by using evolutionary clustering. - Afsoon Abbasi, Behnaz Mohammadi
:
A clustering-based anonymization approach for privacy-preserving in the healthcare cloud. - Priyanka Nallusamy
, T. R. Reshmi, Krishnan Murugan
:
AGFT: Adaptive entries aggregation scheme to prevent overflow in multiple flow table environment. - Ali Kokangül
, Cansu Dagsuyu
:
Catheter planning with goal programming method in neonatal intensive care unit. - Bingxue Qiao
, Chubo Liu, Jing Liu, Yikun Hu, Kenli Li
, Keqin Li:
Task migration computation offloading with low delay for mobile edge computing in vehicular networks. - Rongzhi Wu, Binyuan Lv, Chaoming Dai, Weigang Wang
:
Bayesian stochastic configuration networks for robust data modeling. - Raza Abbas Haidri, Mahfooz Alam
, Mohammad Shahid, Shiv Prakash, Mohammad Sajid:
A deadline aware load balancing strategy for cloud computing. - Sheela Siddaramanna
, Sathyanarayana Sarapady Venkatramanayya
:
Generation of chaotic random binary sequences for cryptographic applications. - Sule Yücelbas
, Cüneyt Yücelbas
:
Autism spectrum disorder detection using sequential minimal optimization-support vector machine hybrid classifier according to history of jaundice and family autism in children. - Durkadevi Kannan
, Revathi Thiyagarajan
:
Entropy based TOPSIS method for controller selection in software defined networking. - Dipankar Mandal, Arpitam Chatterjee
, Bipan Tudu
:
A deep neural network and random forests driven computer vision framework for identification and prediction of metanil yellow adulteration in turmeric powder. - Han Zhong, Zhenhu Ning
, Guijun Li, Zheng Li:
A method of core concept extraction based on semantic-weight ranking. - Alok Kumar Shukla
:
Chaos teaching learning based algorithm for large-scale global optimization problem and its application. - Mariam L. Francies
, Mohamed Maher Ata
, Mohamed Azim Mohamed
:
A robust multiclass 3D object recognition based on modern YOLO deep learning algorithms. - Bo Hu, Hui Xiao, Nan Yang, Lei Wang
, Hao Jin:
Fast non-dominated sorting evolutionary algorithm II based on relative non-dominance matrix for portfolio optimization. - Yifan Liu
, Chenglie Du, Jinchao Chen, Xiaoyan Du:
Scheduling energy-conscious tasks in distributed heterogeneous computing systems. - Somya Jain
, Adwitiya Sinha
:
Discovering influential users in social network using weighted cumulative centrality. - Meysam Chahardoli, Nafiseh Osati Eraghi, Sara Nazari
:
Namib beetle optimization algorithm: A new meta-heuristic method for feature selection and dimension reduction. - Dennison Rajesh
, Thirasamma Jaya:
Energy competent cluster-based secured CH routing EC2SR protocol for mobile wireless sensor network. - M. Mücahit Enes Yurtsever, Muhammet Özcan, Zübeyir Taruz, Süleyman Eken
, Ahmet Sayar
:
Figure search by text in large scale digital document collections. - Badr Benmammar
:
Quality of service optimization in orthogonal frequency division multiplexing-based cognitive radio systems based on shuffled frog leaping algorithm. - Remaci Zeyneb Yasmina
, Hadjila Fethallah, Lahfa Fadoua:
Web service selection and composition based on uncertain quality of service. - Davar Giveki
, Ashkan Shakarami
, Hadis Tarrah, Mohammad Ali Soltanshahi:
A new method for image classification and image retrieval using convolutional neural networks. - Yanan Zhang, Juanjuan Zhao
, Yan Qiang, Xiaotang Yang, Wei Wu, Liye Jia:
Improved heterogeneous data fusion and multi-scale feature selection method for lung cancer subtype classification. - C. Muralidharan
, R. Anitha:
Trusted cloud broker for estimating the reputation of cloud providers in federated cloud environment. - Farimah Houshmand Nanehkaran
, Seyed Mohammadreza Lajevardi
, Mahmoud Mahlouji Bidgholi
:
Nearest neighbors algorithm and genetic-based collaborative filtering. - Minu Susan Jacob
, P. Selvi Rajendran:
Fuzzy artificial bee colony-based CNN-LSTM and semantic feature for fake product review classification. - Govindasamy Chinnaraj
, Arokiasamy Antonidoss:
A new methodology for secured inventory management by average fitness-based colliding bodies optimization integrated with block chain under cloud. - Bala Venkateswarlu Isunuri
, Jagadeesh Kakarla
:
Three-class brain tumor classification from magnetic resonance images using separable convolution based neural network. - Zahra Ahmadi
, Fereshteh-Azadi Parand, Farzam Matinfar:
A fuzzy logic-based approach for fuzzy queries over NoSQL graph database. - J. Britto Dennis
, M. Shanmuga Priya:
Deep belief network and support vector machine fusion for distributed denial of service and economical denial of service attack detection in cloud. - Rui Mu
, Bei Gong, Zhenhu Ning
, Jiangjiang Zhang
, Yang Cao
, Zheng Li
, Wei Wang, Xiaoping Wang:
An identity privacy scheme for blockchain-based on edge computing.
- Yuantao Chen, Jin Wang, Songjie Liu, Xi Chen, Jie Xiong, Jingbo Xie, Kai Yang:
Retracted: Multiscale fast correlation filtering tracking algorithm based on a feature fusion model.
Volume 34, Number 2, January 2022
Editorial
- Hui Tian, Alan Wee-Chung Liew
, Hong Shen:
Advances in parallel and distributed computing and its applications.
- Wenjie Zou, Longkun Guo
, Peihuang Huang, Geng Lin, Hengquan Mei
:
Linear time algorithm for computing min-max movement of sink-based mobile sensors for line barrier coverage. - Humayun Kayesh
, Md. Saiful Islam
, Junhu Wang
, A. S. M. Kayes
, Paul A. Watters
:
A deep learning model for mining and detecting causally related events in tweets. - Lu Cao
, Hong Shen:
CSS: Handling imbalanced data by improved clustering with stratified sampling. - Dongxiao Quan
, Li Niu, Lili Zhu, Changxing Pei:
Efficient fault-tolerant logical Hadamard gates implementation in Reed-Muller quantum codes. - Xin Zhou
, Yong Dou, Rongchun Li, Peng Zhang, Yuntao Liu:
A pipelining strategy for accelerating convolution neural networks on ARM CPUs. - Zhansheng Chen
, Hong Shen, Tingmei Wang, Xiaofan Zhao:
An adaptive on-demand charging scheme for rechargeable wireless sensor networks. - Chuyue Zhang, Manchun Cai, Xiaofan Zhao, Dawei Wang:
Research on case preprocessing based on deep learning. - MohammadReza HoseinyFarahabady
, Javid Taheri, Albert Y. Zomaya
, Zahir Tari, Wei Bao:
Enhancing disk input output performance in consolidated virtualized cloud platforms using a randomized approximation scheme. - Amina Guermouche
, Anne-Cécile Orgerie
:
Thermal design power and vectorized instructions behavior. - Dylan Matthew Janssen
, Wayne Pullan, Alan Wee-Chung Liew
:
Graphics processing unit acceleration of the island model genetic algorithm using the CUDA programming platform. - Haichang Yao
, Shuai Chen, Shangdong Liu, Kui Li
, Yimu Ji
, GuangYong Hu, Ruchuan Wang:
Parallel compression for large collections of genomes.
- Min Si, Quan Chen, Zhiyi Huang:
Special issue on programming models and applications for multicores and manycores 2019-2020. - Min Si
, Quan Chen, Zhiyi Huang:
Special Issue on Programming Models and Applications for Multicores and Manycores 2020.
- Jacob Nelson, dePaul Miller
, Roberto Palmieri
:
Don't forget about synchronization! Guidelines for using locks on graphics processing units. - Christina L. Peterson
, Damian Dechev
:
The CAS-extended model. - Patrick Finnerty
, Tomio Kamada
, Chikara Ohta:
A self-adjusting task granularity mechanism for the Java lifeline-based global load balancer library on many-core clusters. - Yuxin Ren
, Gabriel Parmer, Dejan S. Milojicic:
Sharing non-cache-coherent memory with bounded incoherence. - Sebastian Litzinger
, Jörg Keller
:
Code generation for energy-efficient execution of dynamic streaming task graphs on parallel and heterogeneous platforms. - Herbert Jordan
, Pavle Subotic, David Zhao
, Bernhard Scholz
:
Specializing parallel data structures for Datalog. - Biagio Peccerillo
, Sandro Bartolini:
Flexible task-DAG management in PHAST library: Data-parallel tasks and orchestration support for heterogeneous systems. - Akif Rehman
, Masab Ahmad, Omer Khan:
A performance predictor for implementation selection of parallelized static and temporal graph algorithms. - Pierre LaBorde
, Lance Lebanoff
, Christina L. Peterson
, Deli Zhang, Damian Dechev:
Dynamic Transactional Transformation.
Volume 34, Number 3, February 2022
- Diganta Kumar Pathak
, Sanjib Kumar Kalita, Dhruba Kumar Bhattacharya:
Spectral spatial joint feature based convolution neural network for hyperspectral image classification. - Yuan Zhao, Bo Liu
, Tianqing Zhu, Ming Ding, Wanlei Zhou
:
Private-encoder: Enforcing privacy in latent space for human face images. - Natalia Chaudhry
, Muhammad Murtaza Yousaf:
Concurrency control for real-time and mobile transactions: Historical view, challenges, and evolution of practices. - Pooja Verma
, Raghav Prasad Parouha
:
An advanced hybrid algorithm for nonlinear function optimization with real world applications. - Souvik Saha
, Rajeev Kr. Arya:
Adaptive virtual anchor node based underwater localization using improved shortest path algorithm and particle swarm optimization (PSO) technique. - Vankamamidi Srinivasa Naresh
, V. V. L. Divakar Allavarpu
, Sivaranjani Reddi, Pilla Sita Rama Murty
, N. V. S. Lakshmipathi Raju, R. N. V. Jagan Mohan:
A provably secure sharding based blockchain smart contract centric hierarchical group key agreement for large wireless ad-hoc networks. - Ashlesha Gupta
, Ashutosh Dixit
:
A novel user trend-based priority assigner and URL scheduler for dynamic incremental crawling. - Vikas Juneja
, Shail Kumar Dinkar, Dharam Vir Gupta:
An anomalous co-operative trust & PG-DRL based vampire attack detection & routing. - Chunzhi Wang, Yanlin Fu, Junyi Yan, Xinyun Wu
, Yucheng Zhang, Huiling Xia, Ye Yuan:
A cost-efficient resemblance detection scheme for post-deduplication delta compression in backup systems. - Bin Chen
, Jianping Wu:
A new approach for node centrality evaluation based on residual network performance measurement. - Antonio Gonzalez Pastana Lobato
, Martin Andreoni Lopez
, Alvaro A. Cárdenas
, Otto Carlos M. B. Duarte
, Guy Pujolle
:
A fast and accurate threat detection and prevention architecture using stream processing. - Qi Teng
, Jianjun Yi, Huazhong Li:
Research of 6-DOF pose estimation in stacked scenes. - Yi Zhang
, Mengdi Sun, Xin Qi:
Speedup of discrete Fourier transform by efficient modular arithmetic. - Wei Wang
, Han Zhang, Yang Li, Zhenyu Zhang
, Xiangfeng Luo
, Shaorong Xie:
USVs-Sim: A general simulation platform for unmanned surface vessels autonomous learning. - Aghaee-Meybodi Esmat, Nezarat Amin, Sima Emadi
, Ghaffari Mohammad Reza
:
A parallel hash-based method for local sequence alignment. - Mehdi Sliem
, Nabila Salmi, Malika Ioualalen:
Designing a methodological framework for modeling and performance forecasting of self-adaptive cloud systems. - Jianqi Gao, Xiangfeng Luo
, Hao Wang
:
Chinese causal event extraction using causality-associated graph neural network. - Yibo Liu
, Chengcheng Li, Du Jiang, Baojia Chen, Nannan Sun, Yongcheng Cao, Bo Tao
, Gongfa Li:
Wrist angle prediction under different loads based on GA-ELM neural network and surface electromyography. - Monika Kumari
, Gadadhar Sahoo, Kishore Kumar Senapati
, Gaurav Kumar:
Energy-aware autoscaling for scientific workflow in cloud environment. - Khushal Singh
, Nanhay Singh
:
Multilevel authentication protocol for enabling secure communication in Internet of Things. - Yanfei Xu, Karlo Abnoosian
:
A new metaheuristic-based method for solving the virtual machines migration problem in the green cloud computing. - Étienne André, Rémi Dulong, Amina Guermouche
, François Trahay:
duf: Dynamic uncore frequency scaling to reduce power consumption. - Dharmendra Dangi
, Amit Bhagat
, Dheeraj Kumar Dixit
:
Sentiment analysis of social media data based on chaotic coyote optimization algorithm based time weight-AdaBoost support vector machine approach. - Astha Singh
, Shiv Prakash
, Ankit Kumar
, Divya Kumar:
A proficient approach for face detection and recognition using machine learning and high-performance computing. - Pon. Partheeban
, V. Kavitha:
Blockchain based cloud service security architecture with distributed machine learning for smart device traffic record transaction. - Haifa Touati
, Ahmed Aboud
, Brahim Hnich
:
Named Data Networking-based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode. - Meesala Shobha Rani
, Sumathy Subramanian
:
Feature based opinion analysis on social media tweets with association rule mining and multi-objective evolutionary algorithms. - Pouya Khosravian
, Sima Emadi
, Ghasem Mirjalily, Behzad Zamani:
Service function chain composition and placement using grammar-based genetic algorithm. - Shanwen Yi, Xiaole Li
, Hua Wang, Yao Qin
, Jiaxin Yan:
Energy-aware disaster backup among cloud datacenters using multiobjective reinforcement learning in software defined network. - Youcef Belkhiri
, Nadjet Kamel, Habiba Drias:
An efficient multi-swarm elephant herding optimization for solving community detection problem in complex environment. - Mathiarasi Balakrishnan
, Geetha Thekkumpurath Varieth:
A learning to rank framework for future friendship ranking in streaming heterogeneous social networks. - Azra Nazir
, Roohie Naaz Mir, Shaima Qureshi:
Deflate-inflate: Exploiting hashing trick for bringing inference to the edge with scalable convolutional neural networks. - Razieh Asgarnezhad
, S. Amirhassan Monadjemi
, Mohammadreza Soltan Aghaei
:
A new hierarchy framework for feature engineering through multi-objective evolutionary algorithm in text classification. - Babak Shirazi
:
Super-process interoperability optimization architecture in healthcare ultra-large-scale systems: A graph-based multi-objective approach. - Kumaran P.
, S. Chitrakala:
A novel mathematical modeling in shift in emotion for gauging the social influential in big data streams with hybrid sarcasm detection. - Usama Ahmed
, Asma Al-Saidi
, Ioan Petri
, Omer F. Rana
:
QoS-aware trust establishment for cloud federation. - Mostafa E. A. Ibrahim
, Alaa E. S. Ahmed
:
Energy-aware intelligent hybrid routing protocol for wireless sensor networks. - Gargi Alavani, Santonu Sarkar
:
Performance modeling of graphics processing unit application using static and dynamic analysis.
- Jing He
, Guangyan Huang
, Jie Cao, Zhiwang Zhang
, Hui Zheng, Peng Zhang, Roozbeh Zarei, Ferry Susanto, Ruchuan Wang, Yimu Ji
, Weibei Fan
, Zhijun Xie, Xiancheng Wang, Mengjiao Guo
, Chi-Hung Chi, Jiekui Zhang, Youtao Li, Xiaojun Chen, Yong Shi, André Van Zundert
:
A polynomial-time algorithm for simple undirected graph isomorphism.
Volume 34, Number 4, February 2022
- Bhanu Dwivedi
, Bachu Dushmanta Kumar Patro, Vivek Srivastava
, Shimpi Singh Jadon
:
LBR-GWO: Layered based routing approach using grey wolf optimization algorithm in wireless sensor networks. - Nabil Zerrouki, Abdelkader Dairi
, Fouzi Harrou
, Yacine Zerrouki, Ying Sun
:
Efficient land desertification detection using a deep learning-driven generative adversarial network approach: A case study. - Daniel Langr
, Klára Schovánková:
CPP11sort: A parallel quicksort based on C++ threading. - Mohammad Alshayeji
, Bader BehBehani, Imtiaz Ahmad:
Spark-based parallel processing whale optimization algorithm. - Vijayanand Sellamuthu Palanisamy
, Rajiv Kannan Athiappan, Thirugnanasambandan Nagalingam:
Pap smear based cervical cancer detection using residual neural networks deep learning architecture. - Vijay Kumar Tripathi
, Mayank Singh:
An efficient metrics based self-adaptive design model by multiobjective gray wolf optimization with extreme learning machine for autonomic computing system application. - Cüneyt Yücelbas
:
Pre-determination of power density and application time in laser applications using PSONN hybrid algorithm. - Mohsen Sadeghi Yarandi
, Ehsan Rastegarzadeh, Ahmad Soltanzadeh, Mostafa Mohammad-Ghasemi, Shahram Arsang-Jang, Sevda Panahi, Ali Karimi
:
Modeling the occurrence of unsafe behaviors based on safety climate and organizational leadership style dimensions in oil platforms using the fuzzy logic approach. - Walid Cherif
, Abdellah Madani, Mohamed Kissi:
Supervised classification by thresholds: Application to automated text categorization and opinion mining. - Dongxu Bai
, Ying Sun, Bo Tao
, Xiliang Tong, Manman Xu, Guozhang Jiang, Baojia Chen, Yongcheng Cao, Nannan Sun, Zeshen Li:
Improved single shot multibox detector target detection method based on deep feature fusion. - Emine Cengil
, Ahmet Çinar
:
Hybrid convolutional neural network based classification of bacterial, viral, and fungal diseases on tomato leaf images. - Iqra Niaz, Aamir Sanaullah
, Iram Saleem, Javid Shabbir
:
An improved efficient class of estimators for the population variance. - Muthulakshmi Venkatesan
, Priya Lakshmipathy
, Vani Vijayan
, Ramesh Sundar
:
Cardiac disease diagnosis using feature extraction and machine learning based classification with Internet of Things(IoT). - Kanimozhi P
, T. Aruldoss Albert Victoire
:
Oppositional tunicate fuzzy C-means algorithm and logistic regression for intrusion detection on cloud. - Prasannavenkatesan Theerthagiri
, Menakadevi Thangavelu
:
Mobility speed prediction using ARIMA and RNN for random walk mobility model in mobile ad hoc networks. - Yogesh Beeharry
, Ristin Tsokizep Fokone:
Hybrid approach using machine learning algorithms for customers' churn prediction in the telecommunications industry. - Olaide Nathaniel Oyelade
, Absalom E. Ezugwu
:
Characterization of abnormalities in breast cancer images using nature-inspired metaheuristic optimized convolutional neural networks model. - Kulanthaivel Balakrishnan
, Ramasamy Dhanalakshmi, Utkarsh Mahadeo Khaire
:
Excogitating marine predators algorithm based on random opposition-based learning for feature selection. - Sushma Kumari
, Monika Choudhary, Richa Mishra, Swades Kumar Chaulya
, Girendra Mohan Prasad, Sujit Kumar Mandal, Gautam Banerjee:
Artificial intelligent based smart system for safe mining during foggy weather. - Ramesh Krishnamoorthy
, Kalimuthu Krishnan:
An optimum security enabled System-on-Chip selection for Internet of Things applications using genetic algorithm modeling. - Deepak Jaiswal
, Praveen Kumar:
A survey on parallel computing for traditional computer vision. - R. Renuga Devi
, T. Sethukarasi:
An energy-efficient routing based on a hybrid improved whale artificial ecosystem optimization algorithm in WSN. - Anes Abdennebi
, Anil Elakas, Fatih Tasyaran, Erdinç Öztürk, Kamer Kaya, Sinan Yildirim
:
Machine learning-based load distribution and balancing in heterogeneous database management systems. - Zhiqiang Liu, Bo Xu, Bo Cheng, Xiaomei Hu, Mehdi Darbandi
:
Intrusion detection systems in the cloud computing: A comprehensive and deep literature review. - J. Dhanalakshmi
, N. Ayyanathan:
A systematic review of big data in energy analytics using energy computing techniques. - Ahmad Abusukhon
, Zeyad Mohammad, Ali Al-Thaher:
An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text-to-image encryption algorithm. - Asad Arfeen
, Zunair Ahmed Khan, Riaz Uddin, Usama Ahsan
:
Toward accurate and intelligent detection of malware. - Saeid Seyedi
, Nima Jafari Navimipour
:
Designing a multi-layer full-adder using a new three-input majority gate based on quantum computing. - Yuting Liu, Manman Xu, Guozhang Jiang, Xiliang Tong, Juntong Yun, Ying Liu, Baojia Chen, Yongcheng Cao, Nannan Sun, Zeshen Li:
Target localization in local dense mapping using RGBD SLAM and object detection. - Chitharanjan Karat, Radha Senthilkumar
:
Optimal resource allocation with deep reinforcement learning and greedy adaptive firefly algorithm in cloud computing. - Xiaojun Long
, Jingtao Zhang, Xing Qi, Wenlong Xu, Tianguo Jin, Kai Zhou
:
A self-learning artificial bee colony algorithm based on reinforcement learning for a flexible job-shop scheduling problem. - Gökçehan Kara
, Can C. Özturan
:
Parallel network simplex algorithm for the minimum cost flow problem. - Muhammad Waqas, Kamlesh Kumar, Asif Ali Laghari
, Umair Saeed
, Muhammad Malook Rind, Aftab Ahmed Shaikh, Fahad Hussain, Athaul Rai, Abdul Qayoom Qazi:
Botnet attack detection in Internet of Things devices over cloud environment via machine learning. - Peter Thoman
, Markus Wippler, Robert Hranitzky, Philipp Gschwandtner
, Thomas Fahringer:
Multi-GPU room response simulation with hardware raytracing. - Rajesh A.
, Esther Rani P.:
Mitigation of stretch type vampire attack using probabilistic variable fuzzy rough set in wireless sensor networks. - Jianyong Zhu
, Chunming Hu, Tianyu Wo, Xiaoqiang Yu:
ScaleReactor: A graceful performance isolation agent with interference detection and investigation for container-based scale-out workloads. - Lei Guo
, Sheng Yang, Shaozi Li, Qingshou Wu
:
Hierarchical community-discovery algorithm combining core nodes and three-order structure model. - Asad Arfeen
, Muhammad Asim Khan
, Obad Zafar, Usama Ahsan
:
Process based volatile memory forensics for ransomware detection. - Khaled Mohamad Almustafa
:
Covid19-Mexican-Patients' Dataset (Covid19MPD) Classification and Prediction Using Feature Importance. - Muhammad Milhan Afzal Khan
, Hafiz Muhammad Azeem Sarwar
, Muhammad Awais
:
Gas consumption analysis of Ethereum blockchain transactions.
Volume 34, Number 5, February 2022
- Ping Xiong
, Lin Liang, Yunli Zhu, Tianqing Zhu
:
PriTxt: A privacy risk assessment method for text data based on semantic correlation learning. - Hani Al-Balasmeh
, Maninder Singh, Raman Singh
:
Framework of data privacy preservation and location obfuscation in vehicular cloud networks. - Zakariya Yahya Algamal
, Mohamed Reda Abonazel
:
Developing a Liu-type estimator in beta regression model. - Sumi Murugan Suganthi
, Ganesh Ramaswamy Shunmugavel:
Improved hard fusion methods for enhancing detection and energy efficiency in cognitive radio networks. - Roopali Punj
, Rakesh Kumar
:
Data dissemination approach using machine learning techniques for WBANs. - Melam Nagaraju
, B. Sobhan Babu, Meduri V. N. S. S. R. K. Sai Somayajulu, K. Subrahmanya Kousik Sarma, Advaitha Vetagiri
:
An accurate foreground moving object detection based on segmentation techniques and optimal classifier. - Sujit Kumar Das
, Pinki Roy, Arnab Kumar Mishra:
Fusion of handcrafted and deep convolutional neural network features for effective identification of diabetic foot ulcer. - Danxu Liu, Junjie Peng
, Xin Zhang, Yongkang You, Bo Ning:
Application features-based virtual machine deployment strategy in cloud environment. - Shubham Mahajan
, Anand Nayyar
, Akshay Raina
, Samreen J. Singh, Ashutosh Vashishtha, Amit Kant Pandit
:
A Gaussian process-based approach toward credit risk modeling using stationary activations. - Saurabh Jha
, Ashok Kumar Mehta
:
An evolutionary algorithm based feature selection and fuzzy rule reduction technique for the prediction of skin cancer. - Marathezhath Subramanian Suchithra
, Maya L. Pai:
Label ranking-based recommendation system to rank crops for agroecological units. - Timmidi Nagadurga, P. V. R. L. Narasimham, V. S. Vakula
, Ramesh Devarapalli
:
Gray wolf optimization-based optimal grid connected solar photovoltaic system with enhanced power quality features. - Adel Alti
, Abderrahim Lakehal, Philippe Roose:
A decentralized agent-based semantic service control and self-adaptation in smart health mobile applications. - Vahideh Hayyolalam, Behrouz Pourghebleh
, Mohammad Reza Chehrehzad, Ali Asghar Pourhaji Kazem
:
Single-objective service composition methods in cloud manufacturing systems: Recent techniques, classification, and future trends. - Wei Fu, Zhenjie Xie
, Jianqiao Xu:
Verifying multiple replica possession with public key segment under public cloud storage environment. - Jeen Retna Kumar Retnamony
, Sundaram Muniasamy, Berakhah Florence Stanley:
Enhanced global and local face feature extraction for effective recognition of facial emotions. - Aditya Dev Mishra
, Khurram Mustafa:
A review on security requirements specification by formal methods. - Asma Chikh
, Mohamed Lehsaini
:
Combination of greedy and compass approaches for efficient multipath geographic routing in wireless multimedia sensor networks. - Sekar Arunpandian
, Subbaiah S. Dhenakaran:
An effective image compression technique based on burrows wheeler transform with set partitioning in hierarchical trees. - Chunxue Zuo
, Fang Wang, Mai Zheng, Yuchong Hu, Dan Feng:
Ensuring high reliability and performance with low space overhead for deduplicated and delta-compressed storage systems. - Shruti Arora
, Rinkle Rani, Nitin Saxena:
An efficient approach for detecting anomalous events in real-time weather datasets. - S. Sasikala
, S. Ramesh
, S. Gomathi
, Balambigai Subramanian
, V. Anbumani
:
Transfer learning based recurrent neural network algorithm for linguistic analysis. - Amaresh M.
, Chitrakala S.:
Spatio-temporal feature fusion based correlative binary relevance for visual object detection. - Yibo Liu
, Fan Xiao, Xiliang Tong, Bo Tao
, Manman Xu, Guozhang Jiang, Baojia Chen, Yongcheng Cao, Nannan Sun:
Manipulator trajectory planning based on work subspace division. - Mohammed Ennahbaoui, Hind Idrissi
:
A new agent-based framework combining authentication, access control and user behavior analysis for secure and flexible cloud-based healthcare environment. - Rajchandar K
, Baskaran R
, Padmanabhan Panchu K
, Rajmohan M
:
A novel fuzzy and reverse auction-based algorithm for task allocation with optimal path cost in multi-robot systems. - Akila Seetharaman
, Allin Christe Sundersingh:
Gene selection and classification using correlation feature selection based binary bat algorithm with greedy crossover. - Ying Liang
, Tianxu Cui
, Yang Cao
, Hengliang Tang:
An effective resource scheduling model for edge cloud oriented AIoT. - Zeynep Garip
, Durmus Karayel, Murat Erhan Çimen
:
A study on path planning optimization of mobile robots based on hybrid algorithm. - Ferhat Bozkurt
:
A deep and handcrafted features-based framework for diagnosis of COVID-19 from chest x-ray images. - Zeinab Ghasemi Darehnaei, Mohammad Shokouhifar
, Hossein Yazdanjouei
, Seyed Mohammad Jalal Rastegar Fatemi
:
SI-EDTL: Swarm intelligence ensemble deep transfer learning for multiple vehicle detection in UAV images. - Ersin Korkmaz
, Ali Payidar Akgüngör:
Optimum cycle length models using atom search optimization and grasshopper optimization algorithms. - Selahattin Kaçiranlar
, Nimet Özbay
, Ecem Özkan, Hüseyin Güler
:
Comparison of Liu and two parameter principal component estimator to combat multicollinearity. - Zain Abubaker, Asad Ullah Khan
, Ahmad Almogren, Shahid Abbas, Atia Javaid, Ayman Radwan
, Nadeem Javaid
:
Trustful data trading through monetizing IoT data using BlockChain based review system. - Sujit Kumar Das
, Pinki Roy, Arnab Kumar Mishra:
Oversample-select-tune: A machine learning pipeline for improving diabetes identification. - K. Mohaideen Pitchai
:
Modeling and simulation of defense game model for jamming attack in wireless sensor networks using evolutionary game theory. - Can Kavaklioglu
, Mucahit Cevik
:
Scalable grid-based approximation algorithms for partially observable Markov decision processes. - Elif Varol Altay
, Bilal Alatas
:
Chaos numbers based a new representation scheme for evolutionary computation: Applications in evolutionary association rule mining. - Seda Arslan Tuncer
, Ahmet Alkan
:
Classification of EMG signals taken from arm with hybrid CNN-SVM architecture. - Shubham Mahajan
, Akshay Raina, Xiao Zhi Gao, Amit Kant Pandit:
COVID-19 detection using hybrid deep learning model in chest x-rays images.
Volume 34, Number 6, March 2022
- Ali Louati
, Rahma Lahyani
, Abdulaziz Aldaej
, Abdullah Aldumaykhi, Saad Otai:
Price forecasting for real estate using machine learning: A case study on Riyadh city. - Joshua Dennis Booth
, Phillip Allen Lane
:
An adaptive self-scheduling loop scheduler. - A. Sumathi
, S. Meganathan:
Machine learning based pattern detection technique for diabetes mellitus prediction. - Nesrine Keskes
, Sameh Fakhfakh, Olfa Kanoun, Nabil Derbel:
High performance oversampling technique considering intra-class and inter-class distances. - Emine Cengil
, Ahmet Çinar
, Muhammed Yildirim
:
A hybrid approach for efficient multi-classification of white blood cells based on transfer learning techniques and traditional machine learning methods. - Henrietta Ebele Oranye
, Fidelis Ifeanyi Ugwuowo
:
Modified jackknife Kibria-Lukman estimator for the Poisson regression model. - Adriano Vogel
, Dalvan Griebler
, Marco Danelutto
, Luiz Gustavo Fernandes
:
Self-adaptation on parallel stream processing: A systematic review. - Emmanuel Bugingo
, Wei Zheng
, Zhenfeng Lei, Defu Zhang, Sebakara Samuel Rene Adolphe, Dongzhan Zhang:
Deadline-constrained cost-energy aware workflow scheduling in cloud. - João Victor Daher Daibes
, Milton Brown Do Coutto Filho, Julio Cesar Stacchini de Souza, Esteban Walter Gonzalez Clua, Rainer Zanghi:
Experience of using graphical processing unit in power flow computation. - Muhammad Awais Gulzar, Waqas Latif, Muhammad Abid
, Hafiz Zafar Nazir, Muhammad Riaz:
On enhanced exponential-cum-ratio estimators using robust measures of location. - Osama Almurshed
, Omer F. Rana
, Kyle Chard:
Greedy Nominator Heuristic: Virtual function placement on fog resources. - Biswajit Jena
, Gopal Krishna Nayak, Sanjay Saxena
:
Convolutional neural network and its pretrained models for image classification and object detection: A survey. - Turab Selçuk
, Abdullah Beyoglu
, Ahmet Alkan
:
Automatic detection of exudates and hemorrhages in low-contrast color fundus images using multi semantic convolutional neural network. - Pouya Haghi
, Anqi Guo, Qingqing Xiong
, Chen Yang, Tong Geng
, Justin T. Broaddus, Ryan J. Marshall, Derek Schafer, Anthony Skjellum, Martin C. Herbordt:
Reconfigurable switches for high performance and flexible MPI collectives. - Jie Gao
, Zuping Zhang
, Ping Cao, Wei Huang
, Fangfang Li:
Citation entity recognition method using multi-feature semantic fusion based on deep learning. - Deepa Subramaniam Nachimuthu
, Abhik Banerjee
, Jayakumar Karuppaiah:
Multi-step wind speed and wind power forecasting using variational momentum factor and deep learning based intelligent neural network models. - Kangshun Li, Xiangzheng Fu
, Feng Wang, Hassan Jalil:
A dynamic population reduction differential evolution algorithm combining linear and nonlinear strategy piecewise functions. - Sezer Uguz
, Mete Yaganoglu
, Baris Özyer
, Gülsah Tümüklü Özyer
, Gül Tokdemir
:
The effect of population and tourism factors on Covid-19 cases in Italy: Visual data analysis and forecasting approach. - Seyyed Mohsen Hashemi
, Seyyed Hamid Ghafouri
, Patrick C. K. Hung, Chen Ding:
A new model for trustworthy web service QoS prediction. - Fuad A. Awwad, Issam Dawoud, Mohamed Reda Abonazel
:
Development of robust Özkale-Kaçiranlar and Yang-Chang estimators for regression models in the presence of multicollinearity and outliers. - Adewale F. Lukman
, Muhammad Amin
, B. M. Golam Kibria
:
K-L estimator for the linear mixed models: Computation and simulation. - Mohamed Saad
, Ali El-Moursy
, Oruba Alfawaz, Khawla Alnajjar
, Saeed Abdallah:
Wireless link scheduling via parallel genetic algorithm. - Reddipalayam Murugeshan Bhavadharini
, Subburathinam Karthik, Rajagopal Sabitha:
An energy-efficient priority-based packet scheduling mechanism for enhancing quality of service in mobile ad hoc network. - Noureldin Laban
, Bassam Abdellatif, Hala M. Ebeid, Howida A. Shedeed, Mohamed F. Tolba
:
Toward object alphabet augmentation for object detection in very high-resolution satellite images. - Alper Akar
:
Improving the accuracy of random forest-based land-use classification using fused images and digital surface models produced via different interpolation methods. - Roua Torjmen
, Kais Haddar:
Translation system from Tunisian Dialect to Modern Standard Arabic.
Volume 34, Number 7, March 2022
Special Issue Papers
- Omar Kermia
:
Strictly periodic first: An optimal variant of LLF for scheduling tasks in a time-critical cyber-physical system. - Dhouha Ghrab
, Imen Jemili, Abdelfettah Belghith
, Mohamed Mosbah
:
Context-aware routing framework for duty-cycled wireless sensor networks. - Maroua Abdelhafidh
, Mohamed Fourati, Lamia Chaari Fourati
:
A genetic algorithm-based intelligent solution for water pipeline monitoring system in a transient state. - Ramesh Upreti, Ashish Rauniyar
, Jeevan Kunwar, Hårek Haugerud, Paal Engelstad, Anis Yazidi
:
Adaptive pursuit learning for energy-efficient target coverage in wireless sensor networks. - Ameni Chetouane
, Sabra Mabrouk, Imen Jemili, Mohamed Mosbah
:
Vision-based vehicle detection for road traffic congestion classification. - Seifeddine Mechti, Moez Krichen
, Dhouha Ben Noureddine, Lamia Hadrich Belguith
:
A decision system for computational authors profiling: From machine learning to deep learning. - Chahrazed Ksouri
, Imen Jemili, Mohamed Mosbah
, Abdelfettah Belghith
:
Towards general Internet of Vehicles networking: Routing protocols survey. - Emna Taktak
, Mohamed Tounsi
, Mohamed Mosbah
, Abdessalem Mnif, Ahmed Hadj Kacem:
A handshake algorithm for scheduling communications in wireless sensor networks. - Nicolas Gastineau
, Wahabou Abdou, Nader Mbarek, Olivier Togni:
Leader election and local identifiers for three-dimensional programmable matter. - Mariem Allouch
, Sondes Kallel
, Ahmed Soua, Oyunchimeg Shagdar, Samir Tohmé:
Survey on radio resource allocation in long-term evolution-vehicle. - Ilhem Khlif
, Mohamed Hadj Kacem, Cédric Eichler, Khalil Drira
, Ahmed Hadj Kacem:
A model transformation approach for multiscale modeling of software architectures applied to smart cities. - Xiang Yibin
:
Research on the construction of quantum induction universe network. - M. Santhalakshmi
, P. Kavitha:
Sensitive medical data transmission and maintaining data quality using bacterial bee swarm-based hybrid lifetime maximization large-scale ad hoc routing protocol. - Manikandan Nanjappan
, Pravin Albert
:
Hybrid-based novel approach for resource scheduling using MCFCM and PSO in cloud computing environment. - Gang Xu, Qianqian Dong, Min Li
:
A simulated parameter optimization method-based manifold learning for a production process. - Yingying Su
, Lianjuan Han, Jianan Wang, Huimin Wang:
Quantum-behaved RS-PSO-LSSVM method for quality prediction in parts production processes. - Fang Xu, Nan Xiao, Min Deng
, Yong Xie, Zenggang Xiong, Qiong Xu:
Efficient opportunistic routing with social context awareness for distributed mobile social networks. - K. Nirmal
, B. Janet
, Rajagopal Kumar
:
Enhancing online security using selective DOM approach to counter phishing attacks. - R. Mahaveerakannan
, C. Suresh Gnana Dhas:
Big data analytics for large-scale UAV-MBN in quantum networks using efficient hybrid GKM. - Ying Zhao, Junjun Chen
, Jiale Zhang
, Di Wu
, Michael Blumenstein, Shui Yu
:
Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks. - Chen Liang
, Meixia Miao, Jianfeng Ma, Hongyang Yan, Qun Zhang, Xinghua Li:
Detection of global positioning system spoofing attack on unmanned aerial vehicle system. - Sheng Shen
, Tianqing Zhu, Dayong Ye, Minghao Wang, Xuhan Zuo
, Andi Zhou:
A novel differentially private advising framework in cloud server environment. - Nam Nhat Tran, Hemanshu Roy Pota
, Quang Nhat Tran, Xuefei Yin
, Jiankun Hu
:
Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation. - Xuejun Li, Lina Gong, Xiao Liu
, Frank Jiang
, Wenyu Shi, Lingmin Fan, Han Gao, Rui Li
, Jia Xu
:
Solving the last mile problem in logistics: A mobile edge computing and blockchain-based unmanned aerial vehicle delivery system. - Song Wang, Haroon Elahi
, Yanzhu Hu, Yixin Zhang, Jiao Wang:
A botnets control strategy based on variable forgetting rate of control commands. - Jingqiang Chen
, Hai Zhuge
:
A news image captioning approach based on multimodal pointer-generator network. - Bei Xu, Ziyuan Zhuang
:
Survey on psychotherapy chatbots. - Diyawu Mumin
, Lei-Lei Shi
, Lu Liu
:
An efficient algorithm for link prediction based on local information: Considering the effect of node degree. - Yuan Gao
, Muhammad Adnan Rafi:
Combination of graphics, uncertainty, and semantics: A survey.
Volume 34, Number 8, April 2022
- Yong Liu
, Pavel A. Dmitriev, Yifei Huang, Andrew Brooks, Li Dong, Mengyue Liang, Zvi Boshernitzan, Jiwei Cao, Bobby Nguy:
Transfer learning meets sales engagement email classification: Evaluation, analysis, and strategies. - Vibhatha Abeykoon
, Geoffrey C. Fox
, Minje Kim, Saliya Ekanayake, Supun Kamburugamuve
, Kannan Govindarajan, Pulasthi Wickramasinghe, Niranda Perera, Chathura Widanage, Ahmet Uyar, Gurhan Gunduz
, Selahatin Akkas:
Stochastic gradient descent-based support vector machines training optimization on Big Data and HPC frameworks. - Najmeh Samadiani, Guangyan Huang
, Wei Luo
, Chi-Hung Chi, Yanfeng Shu, Rui Wang
, Tuba Kocaturk:
A multiple feature fusion framework for video emotion recognition in the wild. - Shuiqiao Yang
, Guangyan Huang
, Bahadorreza Ofoghi, John Yearwood:
Short text similarity measurement using context-aware weighted biterms. - Zhijie Han
, Qingfang Zhang, Xiaoyu Du
, Kun Guo
, Mingshu He:
Topology analysis and routing algorithms design for PTNet network. - Jiagang Wang, Tu Qian
, Anbang Yang
, Hui Wang
, Jiangbo Qian
:
LSR-forest: An locality sensitive hashing-based approximate k-nearest neighbor query algorithm on high-dimensional uncertain data. - Haichang Yao
, Chen Chen, Shangdong Liu, Kui Li, Yimu Ji
, Guangyan Huang
, Ruchuan Wang:
Lane marking detection algorithm based on high-precision map and multisensor fusion. - Hao Lan Zhang
, Jiming Liu, Margaret Gillon-Dowens
:
Complex brain activity analysis and recognition based on multiagent methods. - Aihua Li
, Diwen Wang
, Meihong Zhu:
Service evaluation through FH-entropy method: A framework for the elderly care station. - Genlang Chen
, Jiajian Zhang
, Zufang Zhu, Hao Wang, Hai Jiang, Chaoyi Pang:
CRAC: An automatic assistant compiler of checkpoint/restart for OpenCL program. - Bingchan Li, Bo Mao
:
A grain loss prediction method based on integration of multiple classification models. - Feng Wang
, Lingling Zhang, Xingchen Chen, Ziming Wang, Xin Xu:
A personalized self-learning system based on knowledge graph and differential evolution algorithm. - Shi-wei Gao
, Ran Tian, Peng Chen:
Principal component analysis for process monitoring in distributed system environment. - Wenru Wang, Xiaojie Xu, Jian Hu, Xinghai Lu, Xiaohua Shi
:
Optimizing an AltaRica simulator. - A Jegatheesan
, N. Sathish Kumar, C. Anna Palagan:
Adaptive neuro-fuzzy inference system-based energy conservation system for performance enhancement of MANET. - P. Hemavathy
, M. Chinnadurai:
Performance validation of clustering algorithms using selection of attributes and application of filters in terms of data reduction. - Tamilselvi Palanisamy, Geetha Sadayan
, Nagasankar Pathinetampadiyan:
Neural network-based leaf classification using machine learning. - K. Sankar
, P. Uma Maheswari
:
A dynamic wrapper-based feature selection for improved precision in content-based image retrieval. - Geetha Sadayan
, Karthiyayini Ramaiah:
Enhanced data security in MANET using trust-based Bayesian statistical model with RSSI by AOMDV. - Subburaj Thangavel
, Suthendran Kannan
:
Detection and trace back of low and high volume of distributed denial-of-service attack based on statistical measures. - K. R. Sarath Chandran
, Premanand Venkatesh Chandramani:
Energy-efficient system-on-chip reconfigurable architecture design for sum of absolute difference computation in motion estimation process of H.265/HEVC video encoding. - Sujaudeen Nannai John, T. T. Mirnalinee
:
TARNN: Task-aware autonomic resource management using neural networks in cloud environment. - V. Arulkumar
, N. Bhalaji:
Load balancing in cloud computing using water wave algorithm. - Mohan Saravanan, Rajakani Kalidoss
, Bactavatchalame Partibane, Kuttathati Srinivasan Vishvaksenan:
Reservation based resource allocation in 5G new radio standard. - M. J. Abinash
, V. Vasudevan:
Gene data classification using Map Reduce based linear SVM. - T. E. Aravindan
, R. Seshasayanan:
Medical image DENOISING scheme using discrete wavelet transform and optimization with different noises. - D. Ramkumar
, Chinnamuthu Annadurai
, I. Nelson:
Iris-based continuous authentication in mobile ad hoc network.
Volume 34, Number 9, April 2022
Editorial
- Ahmet E. Topcu, Ali Osman Çibikdiken:
Special issue on High Performance Computing Conference (BASARIM-2020).
- Atakan Dogan
, Kemal Ebcioglu
:
A parallel hardware hypervisor for hardware-accelerated cloud computing. - Hasan Berk Sonmezer, Nitel Muhtaroglu, Ismail Ari
, Deniz Gokcin:
MaLeFICE: Machine learning support for continuous performance improvement in computational engineering. - Ege Uçak
, Elif Karagümüs
, Cevat Sener
:
A scalable platform for big data analysis in public transport. - Alican Özeloglu
, Ismihan Gül Gürbüz
, Ismail San
:
Deep reinforcement learning-based autonomous parking design with neural network compute accelerators. - Merve Nur Aktan
, Hasan Bulut
:
Metaheuristic task scheduling algorithms for cloud computing environments. - Ahmet Uyar
, Gurhan Gunduz
, Supun Kamburugamuve, Pulasthi Wickramasinghe
, Chathura Widanage, Kannan Govindarajan, Niranda Perera, Vibhatha Abeykoon, Selahattin Akkas, Geoffrey C. Fox:
Twister2 Cross-platform resource scheduler for big data. - Erdi Olmezogullari
, Mehmet S. Aktas
:
Pattern2Vec: Representation of clickstream data sequences for learning user navigational behavior. - Fadi Saar
, Ahmet E. Topcu
:
Minimum spanning tree-based cluster analysis: A new algorithm for determining inconsistent edges. - Beytullah Yildiz
:
Reinforcement learning using fully connected, attention, and transformer models in knapsack problem solving. - Alparslan Fisne
, Berkan Kiliç, Alper Güngör
, Adnan Ozsoy
:
Efficient heterogeneous parallel programming for compressed sensing based direction of arrival estimation. - Ayse Yilmazer-Metin
:
sRSP: An efficient and scalable implementation of remote scope promotion. - Fatih Ertam
, Galip Aydin:
Abstractive text summarization using deep learning with a new Turkish summarization benchmark dataset. - Murat Tezgider
, Beytullah Yildiz
, Galip Aydin:
Text classification using improved bidirectional transformer. - Vahide Bulut
:
SP-search-based path planning algorithm for mobile robots using quintic trigonometric Bézier curves. - Abdullah Ammar Karcioglu
, Hasan Bulut
:
q-frame hash comparison based exact string matching algorithms for DNA sequences. - Kaan Furkan Altinok, Afsin Peker, Cihangir Tezcan
, Alptekin Temizel
:
GPU accelerated 3DES encryption. - Nail Tasgetiren
, Umit Tigrak, Erdal Bozan, Guven Gul, Emir Demirci, Hakan Saribiyik, Mehmet S. Aktas
:
On the distributed software architecture of a data analysis workflow: A case study. - Ilkay Melek Yazici
, Mehmet S. Aktas
:
A novel visualization approach for data provenance. - Fatmana Sentürk
, Gurhan Gunduz
:
A framework for investigating search engines' stemming mechanisms: A case study on Bing. - Mustafa Utku Kalay
:
Novel approaches on bulk-loading of large scale spatial datasets. - Ahmet E. Topcu
, Isameddin Omak
:
Parallelization of a meteorological model using message passing interface and CUDA: A case study with the inversion estimation algorithm. - Elif Çalik
, Hilal Kaya
, Fatih Vehbi Çelebi
:
A novel method to ensure the security of the shared medical data using smart contracts: Organ transplantation sample. - Burak Bal, Tugba Erdem, Seda Kul
, Ahmet Sayar
:
Image-based locating and guiding for unmanned aerial vehicles using scale invariant feature transform, speeded-up robust features, and oriented fast and rotated brief algorithms. - Zhihui Wang
, Liheng Gong, Jingjing Yang
, Xiao Zhang:
Cloud-assisted elliptic curve password authenticated key exchange protocol for wearable healthcare monitoring system. - Yi Yin
, Lin Ouyang, Zhixiang Wu, Shuifang Yin:
A classification method based on encoder-decoder structure with paper content. - Zhiguo Peng, Meifa Huang
, Yanru Zhong, Leilei Chen, Guanghao Liu:
Explicitly semantic representation of pattern and combined geometrical specification. - Zhiguo Peng, Meifa Huang
, Yanru Zhong, Leilei Chen, Guanghao Liu:
Enhanced semantic representation of coaxiality with double material requirements. - Zhichao Jian
, Lichun Qin:
The application of big data network crawler technology for architectural culture and environment protection. - Lijuan Zheng, Zihan Wang, Senping Tian
:
Comparative study on electrocardiogram encryption using elliptic curves cryptography and data encryption standard for applications in Internet of medical things. - Bing Xu
, Darong Huang
, Bo Mi:
Research on the application of mobile payment security system based on the Internet of Things. - Guo Zhou, Ruxin Zhao, Qifang Luo, Yongquan Zhou
:
Optimal hydropower station dispatch using quantum social spider optimization algorithm. - Hengchang Jing
, Jian Wang:
DDoS detection based on graph structure features and non-negative matrix factorization. - Chunxia Yin
, Jian Liu, Shunfu Jin
:
A virtualized data center energy-saving mechanism based on switching operating mode of physical servers and reserving virtual machines. - Jianpei Zhang, Xiaoxian Zhang
, Jing Yang:
Multiobjective particle swarm community discovery arithmetic based on representation learning. - Qingyu Ci
, Hourong Li, Shuwei Yang, Jin Gao:
Adaptive and transparent task scheduling of GPU-powered clusters. - Hui Li, Qingqing Liang, Mei Chen
, Zhenyu Dai, Huanjun Li, Ming Zhu:
Pruning SMAC search space based on key hyperparameters. - Xuefeng Dai
, Jiazhi Wang, Jianqi Zhao, Dahui Li, Zhifeng Yao:
Predicate logic reasoning for exploration coordination of multi-robot systems in structured environments. - Wan Wei, Lian Zhanghua, Peng Xingyu
, Yao Dongchi, Liu Chang:
Qualitative analysis of NET-BOWTIE risk model of dehydration and dehydrocarbon station based on improved compression algorithm.
Volume 34, Number 10, May 2022
- Eht E. Sham
, Deo Prakash Vidyarthi
:
Intelligent admission control manager for fog-integrated cloud: A hybrid machine learning approach. - Shameem Saifuddin
, Arunagiri Sivasubramanian:
Investigations on the performance of distributed Raman amplifier in dense wavelength division multiplexed communication system using different modulation formats. - Srikanth. K
, S. Zahoor Ul Huq, A. P. Siva Kumar:
Big data based analytic model to predict and classify breast cancer using improved fractional rough fuzzy K-means clustering and labeled ensemble classifier algorithm. - J. Aswini
, B. Yamini
, Rajaram Jatothu
, K. Sankara Nayaki
, M. Nalini
:
An efficient cloud-based healthcare services paradigm for chronic kidney disease prediction application using boosted support vector machine. - Han Zhong, Zheng Li
, Peng Chen, Hao Lu, Yijia Xu:
The selection of burglary cases based on multidimensional features and PageRank. - Abdelkader Ouared
, Abdelhafid Chadli
, Mohamed Amine Daoud
:
DeepCM: Deep neural networks to improve accuracy prediction of database cost models. - Tuan Anh Vu
, Cuong Pham-Quoc
:
Building a smart traffic light system based on Internet of Things using -calculus. - G. Srinitya
, D. Sharmila
, S. Logeswari, S. Daniel Madan Raja
:
Certain investigations on image segmentation algorithms on synthetic aperture radar images and classification using convolution neural network. - Annis Fathima Aklak
, Murugesh Yadhav Pugazhenthi, John Sahaya Rani Alex
:
A study on VLSI implementation of image enhancement techniques. - Yilin Yuan
, Jianbiao Zhang
, Wanshan Xu
, Zheng Li
:
Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system. - Deepak Jaiswal
, Praveen Kumar:
A comparative study on SoC embedded low power GPUs for real-time edge-based automated traffic surveillance. - Dhiah Al-Shammary
, Adil L. Albukhnefis
, Ali Hakem Alsaeedi
, Muntasir Al-Asfoor
:
Extended particle swarm optimization for feature selection of high-dimensional biomedical data. - Chenyang Wu
, Xiaopeng Ji, Yuewei Dai:
Dynamic channel allocation strategy for quality of service enhancement in wireless ad hoc networks. - Xing Xu, Chengxing Liu
, Yun Zhao, Xiaoshu Lv
:
Short-term traffic flow prediction based on whale optimization algorithm optimized BiLSTM_Attention. - Hawraa Al Qaraghuli, Reza Sheibani
, Hamid Tabatabaee
:
Detection of atrial fibrillation using variable length genetic algorithm and convolutional neural network. - N. Lakshmi
, M. Krishnamurthy
:
Association rule mining based fuzzy manta ray foraging optimization algorithm for frequent itemset generation from social media. - Mohammad Shokouhifar
, Nazanin Pilevari
:
Combined adaptive neuro-fuzzy inference system and genetic algorithm for e-learning resilience assessment during COVID-19 pandemic. - Fan Yang
, Chaoqun Zhu, Heng Xu, Yongfeng Qian, Jun Song
:
An efficient malicious webpage static detection framework based on optimized Bayesian and hybrid machine learning. - Lin Liu, Jiantao Zhou, Hai-Feng Xing, Xiao-Yong Guo:
Flow splitting scheme over link-disjoint multiple paths in software-defined networking. - Wassim Jerbi
, Omar Cheikhrouhou, Abderrahmen Guermazi, Mohamed Baz, Hafedh Trabelsi
:
BSI: Blockchain to secure routing protocol in Internet of Things. - Satish Kumar Satti
, K. SuganyaDevi
, Srinivasan P:
R-ICTS: Recognize the Indian cautionary traffic signs in real-time using an optimized adaptive boosting cascade classifier and a convolutional neural network. - Jing An
, Kefan Wang, Hui Sun, Can Cui, Wei Li, Chao Ma:
Attention virtual adversarial based semi-supervised question generation. - Zaman Amirzadeh, Mohammad Gholami
:
Selective counter design in quantum-dot cellular automata nanotechnology. - Sakshi Ranjan
, Subhankar Mishra
:
Perceiving university students' opinions from Google app reviews. - Sanat K. Pattnaik
, Sumanta Panda
, Debadutta Mishra:
A multi-objective approach for local path planning of autonomous mobile robot based on metaheuristics. - Kingsley Chinedu Arum
, Fidelis Ifeanyi Ugwuowo
:
Combining principal component and robust ridge estimators in linear regression model with multicollinearity and outlier. - Shrey Baheti, Parwat Singh Anjana
, Sathya Peri, Yogesh Simmhan:
DiPETrans: A framework for distributed parallel execution of transactions of blocks in blockchains. - Nariman Najeeb Hadaya, Salah Abdulghani Alabady
:
Proposed RPL routing protocol in the IoT applications. - Tolga Zaman
, Murat Sagir
, Mehmet Sahin
:
A new exponential estimators for analysis of COVID-19 risk. - Honghao Wang, Majid Khayatnezhad
, Naser Youssefi
:
Using an optimized soil and water assessment tool by deep belief networks to evaluate the impact of land use and climate change on water resources. - Yavuz Canbay
, Seref Sagiroglu, Yilmaz Vural:
A new utility-aware anonymization model for privacy preserving data publishing. - Yongli Yang
, Yu-Guang Yang
, Yi-Hua Zhou, Wei-Min Shi:
Discrimination of two nonorthogonal states against amplitude-damping noise via feed-forward control. - Zhongyun Tang, Haiyang Hu, Chonghuan Xu
:
A federated learning method for network intrusion detection. - Jaya Singh
, Aditya Kumawat, Subramanian Venkatesan:
Improved Byzantine fault tolerance with fast consensus. - Jai Ganesh Sekar
, Periyathambi Ezhumalai
, Arun Chokkalingam
:
An efficient chaotic system based hybrid radiation heat transfer sunflower optimization algorithm for securing digital image transmission. - Ayesha Afzal
, Georg Hager
, Gerhard Wellein
:
Analytic performance model for parallel overlapping memory-bound kernels. - Mohamed Maher Ata
, Khaled Mohammed Elgamily, Mohamed Azim Mohamed
:
Robust features fusion utilization for supervised palmprint recognition. - Bo Hu, Hui Xiao, Nan Yang, Hao Jin, Lei Wang
:
A hybrid approach based on double roulette wheel selection and quadratic programming for cardinality constrained portfolio optimization. - Fang (Cherry) Liu
, Mehmet Belgin, Nuyun Zhang, Kevin Manalo, Rubén Lara, Christopher P. Stone, Paul Manno:
ProvBench: A performance provenance capturing framework for heterogeneous research computing environments. - Gang Luo, Zhiyuan Chen, Bayan Omar Mohammed
:
A systematic literature review of intrusion detection systems in the cloud-based IoT environments. - Tathagata Bhattacharya
, Xiaopu Peng
, Jianzhou Mao, Chaowei Zhang, Taha Takreeti, Ye Wang, Ting Cao, Xiao Qin:
Performance modeling for I/O-intensive applications on virtual machines. - Harri Renney
, Benedict R. Gaster, Thomas J. Mitchell:
Survival of the synthesis - GPU accelerating evolutionary sound matching. - Amjad Rehman Khan
, Tanzila Saba
, Muhammad Zeeshan Khan, Suliman Mohamed Fati, Muhammad Usman Ghani Khan:
Classification of human's activities from gesture recognition in live videos using deep learning. - Yubiao Wang
, Junhao Wen
, Wei Zhou, Xibin Wang, Quanwang Wu, Bamei Tao:
A cloud service recommendation method based on extended multi-source information fusion. - Banhi Sanyal
, Ramesh Kumar Mohapatra, Ratnakar Dash:
Traffic sign recognition on Indian database using wavelet descriptors and convolutional neural network ensemble. - Hariharan Bhagavathi
, Siva Rathinavelayatham
, Kaliraj Shanmugaiah, Kamaraj Kanagaraj
, Dinesh Elangovan:
Improved beetle swarm optimization algorithm for energy efficient virtual machine consolidation on cloud environment. - Ruoqian Yang, Chao Yang, Xingfang Peng, Amin Rezaeipanah
:
A novel similarity measure of link prediction in multi-layer social networks based on reliable paths. - Xialin Liu
, Junsheng Wu, Lijun Chen, Lili Zhang:
Energy-aware virtual machine consolidation based on evolutionary game theory. - Murtaza Cicioglu
, Ali Çalhan
:
Handover management in software-defined 5G small cell networks via long short-term memory. - Prasannavenkatesan Theerthagiri
, Chandrasekaran Gopala Krishnan:
Vehicular multihop intelligent transportation framework for effective communication in vehicular ad-hoc networks. - Roopak Surendran
, Tony Thomas
:
Detection of malware applications from centrality measures of syscall graph.
Volume 34, Number 11, May 2022
- Zijie Liu
, Can Chen, Junjiang Li, Yi Cheng, Yingjie Kou, Dengyin Zhang:
KubFBS: A fine-grained and balance-aware scheduling system for deep learning tasks based on kubernetes. - Shini Renjith
, A. Sreekumar, M. Jathavedan:
Taxonomy grooming algorithm - An autodidactic domain specific dimensionality reduction approach for fast clustering of social media text data. - Vasyl Skorych
, Maksym Dosta:
Parallel CPU-GPU computing technique for discrete element method. - B. Janardhana Rao
, Y. Chakrapani, S. Srinivas Kumar:
MABC-EPF: Video in-painting technique with enhanced priority function and optimal patch search algorithm. - Gajendra K. Vishwakarma
, Neha Singh, Neelesh Kumar:
A computational framework for estimation of mean in presence of observational error. - Kingsleen Solomon Doss
, Somasundaram Kamalakkannan:
Hybrid optimization-based privacy preservation of database publishing in cloud environment. - Wenbin Yang
, Suqin Sheng, Xiangfeng Luo, Shaorong Xie:
Geometric relation based point clouds classification and segmentation. - Shunli Zhang
, Shang Zhang, Yuanzhen Liu, Yuhe Zhang, Haibo Zhang
:
Multi-core accelerated simulation of x-ray projection based on Unigraphics NX model. - Tarek M. Bittibssi
, Abdelhalim Zekry, Mohamed A. Genedy, Shady A. Maged:
Implementation of surface electromyography controlled prosthetics limb based on recurrent neural network. - Sheela Siddaramanna
, Sathyanarayana Sarapady Venkatramanayya
:
Key Sequences based on Cyclic Elliptic Curves over GF(28) with Logistic Map for Cryptographic Applications. - Kadari Kishore Kumar
, Husnabad Venkateswara Reddy
:
Crime activities prediction system in video surveillance by an optimized deep learning framework. - Dharmalingam Adhimuga Sivasakthi
, Gunasekaran Raja
:
QoE-aware mobile computation offloading in mobile edge computing. - Rajadurai Malavika
, Muniappan Lakshapalam Valarmathi:
Load Balancing Based on Closed Loop Control Theory (LBBCLCT): A Software Defined Networking (SDN) powered server load balancing system based on closed loop control theory. - Mohammed Asim Iqbal
, Krishnamoorthy Devarajan, Syed Musthak Ahmed:
An optimal asthma disease detection technique for voice signal using hybrid machine learning technique. - Karthikeyan Lakshmanan, Samydurai Arumugam
:
An efficient data science technique for IoT assisted healthcare monitoring system using cloud computing. - Wiselin Jiji Ganasigamony
, P. Johnson DuraiRaj, Rajesh Athiswamy:
An empirical model based environmental pollution level analysis in coastal area of Gulf of Mannar using remote sensing data. - Behzad Aghaei Fishani, Ali Mahmoodirad
, Sadegh Niroomand, Mohammad Fallah:
Multi-objective location-allocation-routing problem of perishable multi-product supply chain with direct shipment and open routing possibilities under sustainability. - Prabhjot Singh Manocha
, Rajiv Kumar
:
Improved spider monkey optimization-based multi-objective software-defined networking routing with block chain technology for Internet of Things security. - Manoj Kumar
, Sukhwinder Singh Sran, Lakhwinder Kaur, Jagpreet Singh
:
Thermal aware learning based CPU governor. - Saminathan Karunakaran
, Thangavel Renukadevi:
Energy efficient and delay aware clustering in mobile adhoc network: A hybrid fruit fly optimization algorithm and whale optimization algorithm approach. - Ananthajothi K
, Karthick T, Amanullah M
:
Automated rain fall prediction enabled by optimized convolutional neural network-based feature formation with adaptive long short-term memory framework. - Ömer Köksal
, Eyup Halit Yilmaz
:
Improving automated Turkish text classification with learning-based algorithms. - Samriddhi Sarkar
, Mariana Curado Malta
, Animesh Dutta
:
A survey on applications of coalition formation in multi-agent systems. - C. R. Dhivyaa
, Nithya Kandasamy
, Sudhakar Rajendran:
Integration of dilated convolution with residual dense block network and multi-level feature detection network for cassava plant leaf disease identification. - Sravankumar Bethi
, Nageswara Rao Moparthi
:
Effective neighbor node discovery using improved Bayesian clock synchronization-gossip routing protocol in mobile low duty cycle wireless sensor network. - Sabaresan Venugopal
, Ramesh Rengaswamy
, Godfrey Winster Sathianesan
:
IoT based cyber forensics in big data optimization and privacy using deep neural anomaly detection with Hadoop clustering and convolution based Adam optimizer. - B. Aarthi
, Balika J. Chelliah
:
Deep recurrent neural network-based Aquila optimization-based online shaming emotion analysis. - Gayathri A.
, Prabu A. V., Rajasoundaran Soundararajan
, Sidheswar Routray
, P. Narayanasamy, Naween Kumar
, Yinan Qi:
Cooperative and feedback based authentic routing protocol for energy efficient IoT systems. - Bhavesh N. Gohil
, Dhiren R. Patel:
Load balancing in cloud using improved gray wolf optimizer. - Anam Iqbal
, Tahir Mahmood
, Hafiz Zafar Nazir, Niladri Chakraborty
:
On the improved generalized linear model-based monitoring methods for Poisson distributed processes. - N. Saravanan, Umamakeswari Arumugam:
Enhanced attribute based encryption technique for secured access in cloud storage for personal health records. - Hammouda Elbez
, Mohammed Kamel Benhaoua
, Philippe Devienne, Pierre Boulet
:
Progressive compression and weight reinforcement for spiking neural networks. - Volkan Yilmaz
:
The role of image interpolation in pansharpening. - Khushboo Jain
, Akansha Singh:
A two-vector data-prediction model for energy-efficient data-aggregation in wireless sensor network. - Shweta Gupta
, Vibhor Kant:
A model-based approach to user preference discovery in multi-criteria recommender system using genetic programming. - Yuqiang Kong, Yaoping He, Karlo Abnoosian
:
Nature-inspired virtual machine placement mechanisms: A systematic review. - Ankita Singh
, Nanhay Singh:
Gravitational search algorithm-driven missing links prediction in social networks. - Ziyu Shen
, Qing Zhou, Xusheng Zhang, Bin Xia
, Zheng Liu, Yun Li:
Data characteristics aware prediction model for power consumption of data center servers. - Rajagopalan Srinath
, Gayathri Rajagopal
:
Epilepsy disorder detection and diagnosis using empirical mode decomposition and deep learning architecture.
Volume 34, Number 12, May 2022
Special Issue Papers
- Yakun Zhang
, Weijun Li, Liping Zhang, Xin Ning
, Linjun Sun, Yaxuan Lu:
AGCNN: Adaptive Gabor Convolutional Neural Networks with Receptive Fields for Vein Biometric Recognition. - Yu Huang
, Yufei Tang
, James H. VanZwieten, Jianxun Liu:
Reliable machine prognostic health management in the presence of missing data. - Zhaolin Lai
, Xiaochun Hu, Caoqing Jiang:
An intelligent algorithm with interactive learning mechanism for high-dimensional optimization problem based on improved animal migration optimization. - Xin Ning
, Duoduo Gou, Xiaoli Dong, Weijuan Tian, Lina Yu, Chuansheng Wang:
Conditional generative adversarial networks based on the principle of homologycontinuity for face aging. - Peng Chen
, Qi Xiao, Jian Xu, Xiaoli Dong, Linjun Sun, Weijun Li, Xin Ning
, Guojun Wang, Ziheng Chen
:
Harnessing semantic segmentation masks for accurate facial attribute editing. - Yuhang Zhang
, Hongshuai Ren, Wensi Yang, Yang Wang, Kejiang Ye, Cheng-Zhong Xu
:
The strong substructure and feature attention mechanism for image semantic segmentation. - Shuo Ji
, Yinliang Zhao, Yuxiang Li:
Performance prediction for distributed graph computing. - Pulasthi Wickramasinghe
, Niranda Perera, Supun Kamburugamuve
, Kannan Govindarajan, Vibhatha Abeykoon
, Chathura Widanage, Ahmet Uyar, Gurhan Gunduz, Selahattin Akkas, Geoffrey C. Fox:
High-performance iterative dataflow abstractions in Twister2: TSet. - Wei Wang, Guangsong Li, Keke Gai
, Yazhe Tang, Benchao Yang
, Xueming Si:
Modelization and analysis of dynamic heterogeneous redundant system. - Qi Deng, Shanshan Zhang, Gang Chen, Huaxiang Lu:
Blind separation of noncooperative paired carrier multiple access signals based on improved quantum-inspired evolutionary algorithm and receding horizon optimization. - Ziming Yang
, Yuxia Sun
, Qingxuan Kuang:
Question answering model based on machine reading comprehension with knowledge enhancement and answer verification. - Baohua Huang
, Pirong Huang, Hong Yuan, Sheng Liang:
A verifiable ranked ciphertext retrieval scheme based on bilinear mapping. - Yan Wang, Bingqing Yang, Jingxin Liu
, Hui Zeng, Changqing Xia:
Virtual chain: A storage model supporting cross-blockchain transaction. - Changzheng Liu, Fengling Huang, Ruixuan Li, Qi Yang
, Yuhua Li, Shui Yu
:
Community detection using multitopology and attributes in social networks. - Bin Zhou
, Shishi Tan, Ruirong Yu, Shenggang Wan, Qiang Cao:
Cost-effectively improving solid state drive lifetime by hierarchical redundancy and heterogeneous memories. - Hui Song
, Wenli Zhang, Ke Liu, Yifan Shen, Mingyu Chen:
HCMonitor: An accurate measurement system for high concurrent network services. - Wenlong Tian
, Ruixuan Li, Zhiyong Xu:
TSS: A two-party secure server-aid chunking algorithm.
Volume 34, Number 13, June 2022
- Umar Albalawi
, S. Manimurugan, R. Varatharajan:
Classification of breast cancer mammogram images using convolution neural network. - Anisha Kumari, Ranjan Kumar Behera
, Kshira Sagar Sahoo
, Anand Nayyar
, Ashish Kumar Luhach
, Satya Prakash Sahoo
:
Supervised link prediction using structured-based feature extraction in social network. - R. SenthamilSelvan, R. S. D. Wahidabanu, B. Karthik
:
Intersection collision avoidance in dedicated short-range communication using vehicle ad hoc network. - Wenqiang Zhu
:
Research on multi-source mobile commerce service recommendation model of data fusion based on tree network. - Jinfang Zhao
:
Study on the cost allocation method to maximize the benefit of e-commerce enterprises in the cloud computing environment. - Dawei Gui
:
The computer desktop image compression based on clustering algorithm. - Dongmei Li, Feng Xiao, Yanjun Zheng
:
Research on the inheritance and protection of data mining technology in national sports. - Lu Huang, Jeho Song
, Xuejiao Lin, Yachao Du, Sidi Yang:
Research on kick motion before Sanda based on 3D wireless sensor network image. - Liqiang Guo
:
Research on single chip microcomputer teaching platform based on wireless communication. - Bowen Li, Hua Li
, Qiubai Sun, Xuebo Chen
:
Evolutionary game analysis between businesses and consumers under the background of Internet rumors. - Tu Li, Wang Yan
, Zhang Chi:
A new image encryption algorithm based on optimized Lorenz chaotic system. - Simar Preet Singh
, Rajesh Kumar
, Anju Sharma
, Anand Nayyar
:
Leveraging energy-efficient load balancing algorithms in fog computing. - Muhammad Saidu Aliero, Kashif Naseer Qureshi
, Muhammad Fermi Pasha
, Awais Ahmad, Gwanggil Jeon
:
Detection of structure query language injection vulnerability in web driven database application. - Saleem Iqbal, Kashif Naseer Qureshi
, Faisal Shoaib, Awais Ahmad
, Gwanggil Jeon
:
Minimize the delays in software defined network switch controller communication. - Xiangli Xia, Wei Cheng
, Liu Yang:
Urban spatial location service prediction algorithm based on fast adaptive genetic algorithm-least squares support vector machine under the background of Internet of Things. - Vandana Reddy
, P. Gayathri
:
Revised beaconing glowworm swarm optimization ant colony optimization algorithm to localize nodes and optimize the energy consumed by nodes in wireless sensor networks. - Tingting Dong
, Lei Chen, Li Zhou, Fei Xue, Huilin Qin:
A multi-agent based mechanism for collaboratively detecting distributed denial of service attacks in internet of vehicles. - Yanliang Zou
, Chen Chen, Tongliang Deng, Jian Zhang, Xiaomin Zhu
, Si Chen, Shu Yin:
User-level parallel file system: Case studies and performance optimizations. - Kunal Abhishek
, E. George Dharma Prakash Raj:
Computational investment in generation of elliptic curves randomly over large prime fields. - Adil H. Khan
, Dayang Nurfatimah Awang Iskandar
, Jawad F. Al-Asad, Hiren K. Mewada
, Muhammad Abid Sherazi:
Ensemble learning of deep learning and traditional machine learning approaches for skin lesion segmentation and classification. - Sinan Altun
, Ahmet Alkan
, Hatice Altun
:
Application of deep learning and classical machine learning methods in the diagnosis of attention deficit hyperactivity disorder according to temperament features. - Rasim Çekik
, Alper Kursat Uysal
:
A new metric for feature selection on short text datasets. - Angshuman Khan
, Rajeev Arya
:
Efficient design of dual-mode nano counter: An approach using quantum dot cellular automata. - Swaminathan Anitha
, Muthuraman Vanitha:
A novel feature selection with stochastic gradient descent logistic regression for multilabeled stress prediction in working employees. - Ashima Khosla
, Padmavati Khandnor, Trilok Chand:
A novel method for EEG based automated eyes state classification using recurrence plots and machine learning approach. - Kishore Balasubramanian
, Ramya Kishore, Gayathri Devi Krishnamoorthy:
Optimal knee osteoarthritis diagnosis using hybrid deep belief network based on Salp swarm optimization method. - Olaide Nathaniel Oyelade
, Absalom E. Ezugwu
:
A comparative performance study of random-grid model for hyperparameters selection in detection of abnormalities in digital breast images. - Emre Yildirim
, Ali Çalhan
, Murtaza Cicioglu
:
Performance analysis of disease diagnostic system using IoMT and real-time data analytics. - Pablo Antonio Martínez
, Biagio Peccerillo
, Sandro Bartolini
, José M. García
, Gregorio Bernabé
:
Applying Intel's oneAPI to a machine learning case study. - Chandra Umakantham Om Kumar
, Jeyakumar Durairaj
, Samsu Aliar Ahamed Ali
, Y. Justindhas
, Suguna Marappan:
Effective intrusion detection system for IoT using optimized capsule auto encoder model. - Usham Sanjota Chanu
, Khundrakpam Johnson Singh
, Yambem Jina Chanu:
An ensemble method for feature selection and an integrated approach for mitigation of distributed denial of service attacks. - Mingcheng Xu
, Gaojian Xu, Haoyu Xu, Jiadong Zhou, Shaowen Li:
A decentralized lightweight authentication protocol under blockchain. - Vankamamidi Srinivasa Naresh
, Sivaranjani Reddi
:
Secure lightweight multi-party key agreement based on hyperelliptic curve Diffie-Hellman for constraint networks. - Rambabu Medara
, Ravi Shankar Singh, Mahesh Sompalli:
Energy and cost aware workflow scheduling in clouds with deadline constraint. - Ahmad Heydari, Sadegh Niroomand
, Harish Garg:
An improved weighted principal component analysis integrated with TOPSIS approach for global financial development ranking problem of Middle East countries. - Enver Akbacak
:
A novel multilabel video retrieval method using multiple video queries and deep hash codes. - Kavitha Devaraj
, Balasubramanain Thangavel
:
Pregnancy delivery mode prediction using dichotomous radial basis Tanimoto network. - Aakansha Gupta
, Rahul Katarya
:
Deep embedding for mental health content on social media using vector space model with feature clusters. - Ali Payidar Akgüngör, Ersin Korkmaz
:
Bezier Search Differential Evolution algorithm based estimation models of delay parameter k for signalized intersections. - B. A. Mohammed Hashim
, R. Amutha:
Elderly Hajj pilgrims activity recognition based on candidate classification technique.
Volume 34, Number 14, June 2022
Special Issue Papers
- Xinhui Zhao, Zehui Wu, Xiaobin Song, Qingxian Wang:
Secure analysis on entire software-defined network using coloring distribution model. - Xin Niu, Xiaomo Yu
:
Mobile device security defense method and system based on address jump using sliding window technology. - Xiaolong Xu
, Hao Cao, Qingfan Geng, Xihua Liu, Fei Dai, Chuanjian Wang:
Dynamic resource provisioning for workflow scheduling under uncertainty in edge computing environment. - Xiaoxiao Chi
, Chao Yan, Hao Wang
, Wajid Rafique
, Lianyong Qi:
Amplified locality-sensitive hashing-based recommender systems with privacy protection. - Liangfu Lu
, Xiaohan Ren, Chenming Cui, Yun Luo, Mao Lin Huang
:
Tensor mutual information and its applications. - Di Fan, Yongyi Li, Shang Gao, Wanda Chi, Changzhi Lv
:
A novel zero watermark optimization algorithm based on Gabor transform and discrete cosine transform. - Peng Li, Kang Li, Yilei Wang
, Ying Zheng, Dongfeng Wang, Guoyu Yang
, Xiaomei Yu:
A systematic mapping study for blockchain based on complex network. - Shaohua Wan
:
Topology hiding routing based on learning with errors. - Xiaoyu Zhu
, Jie Wu, Wei Chang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo
, Fang Qi, Qin Liu, Guojun Wang
:
On authenticated skyline query processing over road networks. - Jiwei Zhang
, Xiaodan Yan
, Zelei Cheng
, Xueqi Shen:
A face recognition algorithm based on feature fusion. - Rathin Chandra Shit
, Suraj Sharma
, Paul A. Watters
, Kumar Yelamarthi
, Biswajeet Pradhan
, Richard Davison, Graham Morgan, Deepak Puthal
:
Privacy-preserving cooperative localization in vehicular edge computing infrastructure. - Fadi Mohsen
, Hamed Abdelhaq
, Halil Bisgin:
Security-centric ranking algorithm and two privacy scores to mitigate intrusive apps.
- Chase Qishi Wu
:
Editorial for special issue on "Workflows in support of large-scale science".
- Tchimou N'Takpé
, Jean Edgard Gnimassoun, Souleymane Oumtanaga, Frédéric Suter
:
Data-aware and simulation-driven planning of scientific workflows on IaaS clouds. - Renan Souza
, Leonardo Guerreiro Azevedo, Vítor Lourenço, Elton F. S. Soares, Raphael Thiago, Rafael Brandão, Daniel Civitarese, Emilio Vital Brazil, Márcio Ferreira Moreno, Patrick Valduriez, Marta Mattoso
, Renato Cerqueira, Marco A. S. Netto:
Workflow provenance in the lifecycle of scientific machine learning. - Kshitij Mehta
, Bryce Allen, Matthew Wolf, Jeremy Logan
, Eric Suchyta
, Swati Singhal, Jong Youl Choi, Keichi Takahashi, Kevin A. Huck
, Igor Yakushin, Alan Sussman
, Todd S. Munson, Ian T. Foster, Scott Klasky:
A codesign framework for online data analysis and reduction. - Xinzheng Niu, Peng Wu
, Chase Q. Wu, Aiqin Hou, Mideng Qian:
On a parallel spark workflow for frequent itemset mining based on array prefix-tree.
- Tulay Yildirim
, Mirjana Ivanovic, Ladjel Bellatreche
:
Advances on innovative issues in intelligent systems and applications.
- Hanife Güney
, Melek Aydin
, Murat Taskiran
, Nihan Kahraman
:
A deep neural network based toddler tracking system. - Veljko B. Petrovic, Gorana Gojic
, Dinu Dragan
, Dusan B. Gajic
, Nebojsa Horvat, Radovan Lj. Turovic
, Ana Oros:
Robustness of deep learning methods for ocular fundus segmentation: Evaluation of blur sensitivity. - Amelia Badica, Costin Badica
, Ion Buligiu, Liviu Ion Ciora:
Exploring the Blocks World state space.
- Roman Wyrzykowski
, Florina M. Ciorba
:
Algorithmic and software development advances for next-generation heterogeneous platforms.
- José Ignacio Aliaga
, Hartwig Anzt
, Thomas Grützmacher
, Enrique S. Quintana-Ortí
, Andrés E. Tomás
:
Compression and load balancing for efficient sparse matrix-vector product on multicore processors and graphics processing units. - Guanlin He
, Stéphane Vialle, Marc Baboulin:
Parallel and accurate k-means algorithm on CPU-GPU architectures for spectral clustering. - Beata Dmitruk
, Przemyslaw Stpiczynski
:
Solving tridiagonal Toeplitz systems of linear equations on GPU-accelerated computers. - Yaniv Rubinpur, Sivan Toledo
:
Signal processing for a reverse-GPS wildlife tracking system: CPU and GPU implementation experiences. - Niklas Eiling
, Jonas Baude, Stefan Lankes
, Antonello Monti
:
Cricket: A virtualization layer for distributed execution of CUDA applications with checkpoint/restart support. - Samer Alhaddad, Jens Förstner, Stefan Groth
, Daniel Grünewald, Yevgen Grynko, Frank Hannig
, Tobias Kenter, Franz-Josef Pfreundt, Christian Plessl
, Merlind Schotte, Thomas Steinke, Jürgen Teich, Martin Weiser, Florian Wende:
The HighPerMeshes framework for numerical algorithms on unstructured grids.
Volume 34, Number 15, July 2022
- Atif Mahmood
, Amod Kumar Tiwari, Sanjay Kumar Singh, Sandeep S. Udmale
:
Contemporary machine learning applications in agriculture: Quo Vadis? - Ajay Kaul, Sneha Raina
:
Support vector machine versus convolutional neural network for hyperspectral image classification: A systematic review. - Thota Ramathulasi
, M. Rajasekharababu:
Augmented latent Dirichlet allocation model via word embedded clusters for mashup service clustering. - Abiola T. Owolabi
, Kayode Ayinde, Olusegun O. Alabi:
A new ridge-type estimator for the linear regression model with correlated regressors. - Alessandra Rizzardi, Sabrina Sicari
, Daniele Miorandi, Alberto Coen-Porisini:
Securing the access control policies to the Internet of Things resources through permissioned blockchain. - Arpita Nath Boruah
, Saroj K. Biswas, Sivaji Bandyopadhyay:
Rule extraction from decision tree: Transparent expert system of rules. - Piotr Sowa
, Jacek Izydorczyk
:
Darknet on OpenCL: A multiplatform tool for object detection and classification. - Abdullah Ajmal, Sundas Ibrar, Rashid Amin
:
Cloud computing platform: Performance analysis of prominent cryptographic algorithms. - Monika Choudhary, Nitin Goyal
:
Dynamic topology control algorithm for node deployment in mobile underwater wireless sensor networks. - Oumayma Ouedrhiri
, Oumayma Banouar, Salah el Hadaj, Said Raghay:
Intelligent recommender system based on quantum clustering and matrix completion. - S. Pradeep, B. R. Tapas Bapu
:
An efficient energy consumption and delay aware autonomous data gathering routing protocol scheme using a deep learning mobile edge model and beetle antennae search algorithm for underwater wireless sensor network. - Adem Dalcali, Harun Özbay, Serhat Duman
:
Prediction of electricity energy consumption including COVID-19 precautions using the hybrid MLR-FFANN optimized with the stochastic fractal search with fitness distance balance algorithm. - Shilpa Vijayrao Shankhpal
, Brahmananda Savadatti Hanumantha:
KMFA2 based QoS improvement for multi-channel IoT networks. - Padma Lalitha Mareddy
, Sivarami Reddy Narapureddy
, Venkata Ramamurthy Dwivedula, Prahlada Rao Karanam:
Optimum scheduling of machines, automated guided vehicles and tools without tool delay in a multi-machine flexible manufacturing system using symbiotic organisms search algorithm. - Nagaraja Rao Pamula Pullaiah
, Dorai Venkatasekhar, Padarthi Venkatramana, Balaraj Sudhakar:
Binary differential evolution with self learning and deep neural network for breast cancer classification. - Suvitha D
, Vijayalakshmi M:
Traffic prediction using MSSBiLS with self-attention model. - Priya Raghavan Nair Lalitha
, S. Vinila Jinny
:
Internet of medical things-based multitiered and hybrid architectural framework for effective heart disease prediction model. - C. Sailaja
, Suman Maloji, Kasiprasad Mannepalli:
A hybrid HXPLS-TMFCC parameterization and DCNN-SFO clustering based speaker diarization system. - S. S. Arumugam
:
Development of argument based opinion mining model with sentimental data analysis from twitter content. - Rahul Kumar Singh
, Manoj Kumar Sachan, Ram Bahadur Patel:
Cross-domain opinion classification via aspect analysis and attention sharing mechanism. - Sumaiya Begum Akbar
, Kalaiselvi Thanupillai
, Sundararaj Suganthi:
Combining the advantages of AlexNet convolutional deep neural network optimized with anopheles search algorithm based feature extraction and random forest classifier for COVID-19 classification. - Behrouz Pourghebleh
, Negin Hekmati, Zahra Davoudnia, Mehrdad Sadeghi:
A roadmap towards energy-efficient data fusion methods in the Internet of Things. - Ankita Singh, Shiv Prakash, Sudhakar Singh
:
Optimization of reinforcement routing for wireless mesh network using machine learning and high-performance computing. - Keshi Ge
, Zhejiang Ran, Zhiquan Lai, Lizhi Zhang, Dongsheng Li:
BRGraph: An efficient graph neural network training system by reusing batch data on GPU. - Shivendra Shivani
:
An efficient front-to-back depth-buffer algorithm for real-time rendering of partially occluded game objects in absence of GPU. - Karthiyayini Shanmugam
, Karthikeyan Nagarajan:
Security-based teleradiology in DICOM used two-level DWT based optimization watermarking. - Pratik Agarwal, Bam Bahadur Sinha
:
Scalable resource description framework clustering: A distributed approach for analyzing knowledge graphs using minHash locality sensitive hashing. - Önder Polat
, Sema Koç Kayhan:
GPU-accelerated and mixed norm regularized online extreme learning machine. - Musa Milli
, Hasan Bulut
:
SubtStream: Online subtractive stream clustering algorithm. - Zhanzhong Wang, Xuchao Bai
, Jiajun Li:
Modified generalized confidence interval for the stress-strength reliability from exponentiated Weibull distribution. - Zhiqiang Liu, Bo Xu, Bo Cheng, Xiaomei Hu, Karlo Abnoosian
:
A fuzzy-based method for cloud service migration using a shark smell optimization algorithm. - Sawcen Bacha, Khawla Ben Abdellafou, Ahamed Aljuhani, Okba Taouali
, Noureddine Liouane:
Early detection of digital mammogram using kernel extreme learning machine. - Remani Naga Venkata Jagan Mohan
, Vankamamidi Srinivasa Naresh
, Sivaranjani Reddi, Kadali Dileep Kumar
:
Crime data optimization using neutrosophic logic based game theory. - Mohammad Khajehzadeh
:
Compressive strength prediction of structural lightweight concrete by applying the recurrent neural network-fractional order bat optimization algorithm. - Xiaoyan Li, Saleh Mobayen
:
Optimal design of a PEMFC-based combined cooling, heating and power system based on an improved version of Aquila optimizer. - Avtar Singh
, Navjot Kaur, Harpreet Kaur:
An extensive vulnerability assessment and countermeasures in open network operating system software defined networking controller. - Mohamed Reda Abonazel
, Issam Dawoud:
Developing robust ridge estimators for Poisson regression model. - Matin Katebi, Afshin Rezakhani, Saba Joudaki
, Mohammad Ebrahim Shiri:
RAPSAMS: Robust affinity propagation clustering on static android malware stream. - Sadaf Safavi
, Mehrdad Jalali
:
DeePOF: A hybrid approach of deep convolutional neural network and friendship to Point-of-Interest (POI) recommendation system in location-based social networks. - Kalyanee Devi
, Rohit Tripathi
:
Optimal seed node selection method for LTIS model. - Abhishek Jain
, Amit Kumar Bhardwaj
:
Power-efficient optimized clustering method with intelligent fog computing for wireless sensor networks.
Volume 34, Number 16, July 2022
- Lefeng Zhang
, Guanghua Song, Danyang Zhu, Wei Ren
, Ping Xiong
:
Location privacy preservation through kernel transformation. - Tao Zhang
, Tianqing Zhu, Renping Liu, Wanlei Zhou
:
Correlated data in differential privacy: Definition and analysis. - Xiangyu Hu
, Zhiping Jin
, Lefeng Zhang
, Andi Zhou, Dayong Ye:
Privacy preservation auction in a dynamic social network. - Fangyuan Lei
, Xun Liu
, Jianjian Jiang, Liping Liao, Jun Cai, Huimin Zhao:
Graph convolutional networks with higher-order pooling for semisupervised node classification. - Yaobin Xie, Rui Chang
, Liehui Jiang:
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system. - Jinjiang Li, Zhihua Zheng, Zhi Li, Ziyu Niu, Hong Qin
, Hao Wang
:
A blockchain-based traceable group loan system. - Zhanwen Chen
, Jiageng Chen
, Weizhi Meng
:
Threshold identity authentication signature: Impersonation prevention in social network services. - Jun Zhang
, Houda Labiod
, Weizhi Meng
:
For a few diversities more: A voting-attack-immune voting scheme for social question and answer websites. - Weiping Deng
, Yan Peng, Fan Yang, Jun Song:
Feature optimization and hybrid classification for malicious web page detection. - Sheng Shen
, Tianqing Zhu, Di Wu
, Wei Wang, Wanlei Zhou
:
From distributed machine learning to federated learning: In the view of data privacy and security. - Jiadong Lu
, Fangming Gu
, Yiqi Wang, Jiahui Chen
, Zhiniang Peng, Sheng Wen:
Static Detection of File Access Control Vulnerabilities on Windows System. - Jiashuo Lin
, Liping Liao, Tao Wang, Jun Zhang, Lianglun Cheng:
SDCCP: Control the network using software-defined networking and end-to-end congestion control. - Fengyin Li, Rui Ge, Huiyu Zhou, Yilei Wang
, Zhongxing Liu, Xiaomei Yu:
Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature. - Zicong Gao
, Weiyu Dong, Rui Chang, Yisen Wang:
Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware. - Liangmin Guo
, Ying Zhu, Hao Yang, Yonglong Luo, Liping Sun
, Xiaoyao Zheng:
A k-nearest neighbor query method based on trust and location privacy protection. - Qikun Zhang
, Kunyuan Zhao
, Xiaohui Kuang, Yongjiao Li, Yuanpan Zheng, Junling Yuan, Ruifang Wang:
Multidomain security authentication for the Internet of things. - Xin Xie, Xunyi Jiang
, Weiru Wang
, Bin Wang
, Tiancheng Wan, Wenliang Tang, Xianmin Wang:
Research and application of intrusion detection method based on hierarchical features. - Yonghang Tai, Yinjia Wang, Zhifeng Wang, Feiyan Li, Lei Wei
, Lei Pan
, Jun Zhang, Junsheng Shi:
Trustworthy blockchain-based medical Internet of thing for minimal invasive surgery training simulator. - Wenlei Qu, Lei Wu
, Wei Wang, Zhaoman Liu, Hao Wang:
A electronic voting protocol based on blockchain and homomorphic signcryption. - Shaojing Fu
, Chao Zhang, Weijun Ao:
Searchable encryption scheme for multiple cloud storage using double-layer blockchain. - Wenjuan Li
, Fei Tian, Jin Li, Yang Xiang
:
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection. - Lina Zhang
, Xiangqin Zheng
, Keping Yu
, Wenjuan Li
, Tao Wang, Xuan Dang, Bo Yang:
Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach. - Xiang Cheng
, Jiale Zhang
, Yaofeng Tu, Bing Chen:
Cyber situation perception for Internet of Things systems based on zero-day attack activities recognition within advanced persistent threat. - Qing Fan
, Jianhua Chen, Feng Xu, Li Li, Min Luo
:
A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks. - Giacomo Giorgi
, Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
:
Exploiting If This Then That and Usage Control obligations for Smart Home security and management.
Volume 34, Number 17, August 2022
- Ahmadreza Hassannezhad Najjari, Ali Asghar Pourhaji Kazem
:
A systematic overview of live virtual machine migration methods. - C. Jenifa Latha
, Kalaiselvi Kaliannan
, Ramanarayan Sankriti
, R. Srivel
, S. Vani
, T. V. M. Sairam
:
Dynamic convolutional neural network based e-waste management and optimized collection planning. - Mohamed Maher Ata
, Mariam L. Francies
, Mohamed Abd Elazim
:
A robust optimized convolutional neural network model for human activity recognition using sensing devices. - Raphaël Beamonte
, Naser Ezzati-Jivan
, Michel R. Dagenais:
Execution trace-based model verification to analyze multicore and real-time systems. - Wiselin Jiji Ganasigamony
, Muthuraj Antony Arul Selvaraj
:
Computer assisted diagnosis of bipolar disorder using invariant features. - Murtadha Jaber, Reza Sheibani
, Hassan Shakeri:
A model for predicting crimes using big data and neural-fuzzy networks. - Kavitha Parimanam
, Latha Lakshmanan, Thangam Palaniswamy
:
Hybrid optimization based learning technique for multi-disease analytics from healthcare big data using optimal pre-processing, clustering and classifier. - Anwesha Bhowmick, Sathish Vadhiyar
, Varun PV:
Scalable multi-node multi-GPU Louvain community detection algorithm for heterogeneous architectures. - Ahmet Kara
:
A deep learning framework with convolutional long short-term memory for influenza-like illness trend estimation. - Olusola Abayomi-Alli
, Sanjay Misra
, Adebayo Abayomi-Alli
:
A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous dataset. - Rohan Tuli
, Hitesh Soneji
, Sahil Vahora, Prathamesh P. Churi
, Nagachetan M. Bangalore:
PixJS: A novel chaos-based approach for image encryption. - Sachin Dattatraya Shingade
, Rohini P. Mudhalwadkar:
Hybrid deep-Q Elman neural network for crop prediction and recommendation based on environmental changes. - Priyanka Singh
, Samir Kumar Borgohain, Lakhan Dev Sharma
, Jayendra Kumar
:
Minimized feature overhead malware detection machine learning model employing MRMR-based ranking. - Swapna Choudhary
, Sanjay Dorle:
A quality of service-aware high-security architecture design for software-defined network powered vehicular ad-hoc networks using machine learning-based blockchain routing. - Chenxi Wang, Xiaoqing Zhang
, Liqin Ye, Yu Mao, Shaozi Li, Yaojin Lin:
Online streaming feature selection for multigranularity hierarchical classification learning. - Jinlin Chen
, Jiannong Cao, Zhixuan Liang, Zhiqin Cheng, Jia Wang
:
GraphWare: A graph-based middleware enabling multi-robot cooperation. - Jiashu Wu
, Yang Wang
, Xiaopeng Fan, Kejiang Ye, Cheng-Zhong Xu
:
Toward fast theta-join: A prefiltering and amalgamated partitioning approach. - Yanan Zhang, Juanjuan Zhao
, Wei Wu, Yan Qiang, Liye Jia:
Multi-level learning based on 3D CT image integrated medical clinic information for accurate diagnosis of pulmonary nodules. - Ramar Senthamil Selvi
, Muniyappan Lakshapalam Valarmathi, Prathima Devadas:
Improved meta-heuristic algorithm for selecting optimal features: A big data classification model. - Vandana Shah
, Meet Mehta:
Emotional state recognition from text data using machine learning and deep learning algorithm.
Volume 34, Number 18, August 2022
- Jin Wang
:
Workflow offloading with privacy preservation in a cloud-edge environment. - Kui Li
, Yi-mu Ji
, Shangdong Liu, Fei Wu, Haichang Yao
, Jing He
, Qiang Liu, Yanlan Liu, Si-si Shao, Shuai You:
DVO + LCLMF: A web service recommendation mechanism with QoS privacy preservation. - Alper Akar
, Berkant Konakoglu
, Özlem Akar
:
Prediction of geoid undulations: Random forest versus classic interpolation techniques. - Sidra Mustafa, Muhammad Amin
, Muhammad Nauman Akram
, Nimra Afzal
:
On the performance of link functions in the beta ridge regression model: Simulation and application. - Usman Shahzad
, Ishfaq Ahmad, Muhammad Hanif, Nadia H. Al-Noor
:
Estimation of coefficient of variation using linear moments and calibration approach for nonsensitive and sensitive variables. - Sridharan Kannan
:
An automated clinical decision support system for predicting cardiovascular disease using ensemble learning approach. - N. K. Sakthivel
, S. Subasree, Shaveta Malik
, Amit Kumar Tyagi:
A Wrapper based feature extraction framework based on AlexNet deep convolutional neural network parameters optimized using gradient-based optimizer for mammogram images. - Ponna Mahesh Kumar
, P. Srinivasa Rao
:
High Median Utility Itemset Mining for recovering streaming window transaction using novel Modified Heap-based Optimization. - Maganti Venkatesh
, S. Sathyalaksmi:
Memetic swarm clustering with deep belief network model for e-learning recommendation system to improve learning performance. - Gayatri Umakant Bokade
, Rajendra D. Kanphade:
An ArmurMimus multimodal biometric system for Khosher authentication. - Nithya Priya Sivalingam
, Sundar Chinnasamy, Muniyandi Suruli Thanabal:
An effective chronic lymphocytic leukemia detection method using hybrid optimization aware random multimodal deep learning. - Nimet Özbay
, Gülesen Üstündag Siray
, Selma Toker
, Ismail Yenilmez
:
Two-parameter estimation for Tobit model: An application to national health and nutrition examination survey dataset. - Hirad Daneshvar
, Reza Ravanmehr
:
A social hybrid recommendation system using LSTM and CNN. - Aarthi Ramesh Kumar
, Helenprabha Kuttiappan
:
Detection of brain tumor size using modified deep learning and multilevel thresholding utilizing modified dragonfly optimization algorithm. - Berkant Konakoglu
, Salih Berkan Aydemir
, Funda Kutlu Onay
:
Application of a metaheuristic gradient-based optimizer algorithm integrated into artificial neural network model in a local geoid modeling with global navigation satellite systems/leveling measurements. - Mohsin Fayyaz
, Yasir Ali Shah
, Fayyaz Ahmed, Ghulam Mujtaba:
VLCC-Q: Very low computational complexity optical interconnect architecture with queueing for reducing delay and back pressure probability in data center networks. - Alparslan Serhat Demir
, Ebru Mumcu
:
Analysis of automated guided vehicle use in health care by simulation: A case study in a university hospital. - Vartika Puri
, Parmeet Kaur, Shelly Sachdeva
:
(k, m, t)-anonymity: Enhanced privacy for transactional data. - Rajagopal Chinnasamy
, Balasubramanian Thangavel:
Tucker's congruence regressive feature projected Tversky discriminant multiple instance learning boost data classification for school student dropout prediction. - Raghaw Raman Sinha
, Bharti Khanna:
Estimation of population mean under probability proportional to size sampling with and without measurement errors.
Volume 34, Number 19, August 2022
- Mohammad Hossein Ghasemian Koochaksaraei, Abolfazl Toroghi Haghighat, Mohammad Hossein Rezvani
:
A bartering double auction resource allocation model in cloud environments. - Manoj D. Shelar
, S. Srinivasa Rao:
Deep malware hunter based unrivaled malware detection schema thru cache retrospective empiricism. - Ratnakar Das
, Jibitesh Mishra
:
Rider exploitation based whale optimization algorithm for rainfall prediction from meteorological data. - Saran Kumar Arunachalam
, Rekha Rajagopal:
A novel approach for cardiovascular disease prediction using machine learning algorithms. - Farzaneh Rahmani
, Changiz Valmohammadi
, Kiamars Fathi:
Detecting fraudulent transactions in banking cards using scale-free graphs. - Shubhangi Rathi, Jai Prakash Verma
, Rachna Jain
, Anand Nayyar
, Narina Thakur
:
Psychometric profiling of individuals using Twitter profiles: A psychological Natural Language Processing based approach. - Zhihua Cui
, Yaru Zhao, Hao Liu, Ling Wang, Wenhui Fan:
Malware detection based on multi-objective convolution restricted Boltzmann machine model and constraint-dividing crossover strategy algorithm. - Balakrishnan Lalithadevi
, Sivamohan Krishnaveni
:
Detection of diabetic retinopathy and related retinal disorders using fundus images based on deep learning and image processing techniques: A comprehensive review. - Saravanapriya Manoharan
, Radha Senthilkumar
, Saktheeswaran Jayakumar
:
Optimized multi-label convolutional neural network using modified genetic algorithm for popularity based personalized news recommendation system. - Amin Wu, Fouzi Harrou
, Abdelkader Dairi
, Ying Sun:
Machine learning and deep learning-driven methods for predicting ambient particulate matters levels: A case study. - Anis Tissaoui
, Salma Sassi
, Richard Chbeir, Ameni Mechergui:
A top-down enriching approach for ontology learning from text. - Yu Hong
, Zhenhu Ning
, Yu Sun, Changxiang Shen:
A dual-system trusted computing node construction method based on ARM multi-core CPU architecture. - A. Ponmalar
, V. Dhanakoti
:
Hybrid Whale Tabu algorithm optimized convolutional neural network architecture for intrusion detection in big data. - R. S. Mohana
, Krishnamoorthi Rajathi, K. Kousalya, T. Yuvaraja
:
Text sentiment analysis on E-shopping product reviews using chaotic coyote optimized deep belief network approach. - Vikas Khullar
, Harjit Pal Singh
:
Privacy protected internet of unmanned aerial vehicles for disastrous site identification. - Sankari Subbiah
, Subramaniam Sankaran Varshini, Savvas Mohamed Aafia Shifana:
COVID-19: Machine learning for safe transportation. - Padmapriya Shanmugam
, BalajiVijayan Venkateswarulu
, Rajalakshmi Dharmadurai
, Thiagarajan Ranganathan
, Mohan Indiran
, Manikandan Nanjappan
:
Electro search optimization based long short-term memory network for mobile malware detection. - Muhammad Nauman Akram
, Mohamed Reda Abonazel
, Muhammad Amin
, B. M. Golam Kibria
, Nimra Afzal
:
A new Stein estimator for the zero-inflated negative binomial regression model. - Ganapathi Nalinipriya
, Balajee Maram
, Chittibabu Priya, Rajan Cristin:
Ransomware recognition in blockchain network using water moth flame optimization-aware DRNN. - Hanumantha Rao Nadendla
, Atluri Srikrishna, Gangadhara Rao Kancherla:
FSOA-DNFNet: Incremental indexing and image classification using hybrid optimization-based deep neuro Fuzzy network.
Volume 34, Number 20, September 2022
Editorial
- Steven A. Wright
:
Special issue on Performance modeling, benchmarking, and simulation of high performance computing systems.
- Christie L. Alappat
, Nils Meyer, Jan Laukemann, Thomas Gruber, Georg Hager
, Gerhard Wellein
, Tilo Wettig:
Execution-Cache-Memory modeling and performance tuning of sparse matrix-vector multiplication and Lattice quantum chromodynamics on A64FX. - Michael Burger
, Giang Nam Nguyen, Christian H. Bischof
:
SimAnMo - A parallelized runtime model generator. - Nan Ding
, Muaaz G. Awan, Samuel Williams
:
Instruction Roofline: An insightful visual performance model for GPUs. - Xingfu Wu
, Michael Kruse, Prasanna Balaprakash, Hal Finkel, Paul D. Hovland, Valerie Taylor, Mary W. Hall
:
Autotuning PolyBench benchmarks with LLVM Clang/Polly loop optimization pragmas using Bayesian optimization. - Tan Nguyen
, Colin MacLean
, Marco Siracusa
, Douglas Doerfler
, Nicholas J. Wright, Samuel Williams
:
FPGA-based HPC accelerators: An evaluation on performance and energy efficiency. - Ryuichi Sai
, John M. Mellor-Crummey
, Xiaozhu Meng
, Keren Zhou
, Mauricio Araya-Polo, Jie Meng:
Accelerating high-order stencils on GPUs.
- Serdar Burak Solak
, Zeynep Hilal Kilimci
, Süleyman Eken
:
Special Issue on International Conference on Innovations in Intelligent Systems and Applications (INISTA 2021).
- Meryem Uzun-Per
, Ahmet Volkan Gürel
, Ali Burak Can, Mehmet S. Aktas
:
Scalable recommendation systems based on finding similar items and sequences. - Alexandra Vultureanu-Albisi
, Costin Badica
:
A survey on effects of adding explanations to recommender systems. - Gülsüm Yigit
, Mehmet Fatih Amasyali
:
Assessing the impact of minor modifications on the interior structure of GRU: GRU1 and GRU2. - Nevena Rankovic
, Dragica Rankovic, Mirjana Ivanovic, Ljubomir Lazic:
Influence of input values on the prediction model error using artificial neural network based on Taguchi's orthogonal array. - Sanghyun Lee
, Bonghee Hong
, Woochan Kim:
A generation of synthesized trajectories of free moving objects for testing a set of continuous spatio-temporal queries. - Ishak Dolek
, Atakan Kurt
:
A deep learning model for Ottoman OCR. - Cosku Öksüz
, Oguzhan Urhan
, Mehmet Kemal Güllü
:
COVID-19 detection with severity level analysis using the deep features, and wrapper-based selection of ranked features. - Ramazan Terzi
, Nuh Azginoglu
, Duygu Sinanc Terzi
:
False positive repression: Data centric pipeline for object detection in brain MRI.
- Steven Lawrence Fernandes
, Yu-Dong Zhang
, João Manuel R. S. Tavares:
Special Issue: Recent advances in quantum computing and quantum neural networks.
- Yuhan Jiao
:
Analysis and design of a new fault-tolerant digital comparator based on nano-scale quantum technology. - Ayush Dogra
, Chirag Kamal Ahuja, Sanjeev Kumar:
A multi-modality paradigm for CT and MRI fusion with applications of quantum image processing. - Muhammad Junaid Umer
, Javeria Amin
, Muhammad Sharif
, Muhammad Almas Anjum
, Faisal Azam, Jamal Hussain Shah:
An integrated framework for COVID-19 classification based on classical and quantum transfer learning from a chest radiograph. - Suchismita Das, Srijib Bose, Gopal Krishna Nayak, Suresh Chandra Satapathy
, Sanjay Saxena
:
Brain tumor segmentation and overall survival period prediction in glioblastoma multiforme using radiomic features. - Dawa Chyophel Lepcha
, Bhawna Goyal
, Ayush Dogra, Shui-Hua Wang
:
An efficient medical image super resolution based on piecewise linear regression strategy using domain transform filtering.
Volume 34, Number 21, September 2022
- Zhaohong Huang
, Xiangchen Zhang, Guowei Zhang, Guorong Cai
:
MSSA-Net: A novel multi-scale feature fusion and global self-attention network for lesion segmentation.
- Mohamed R. Shoaib
, Mohamed R. Elshamy
, Taha E. Taha, Adel S. El-Fishawy
, Fathi E. Abd El-Samie:
Efficient deep learning models for brain tumor detection with segmentation and data augmentation techniques. - Yuan Gao, Bayan Omar Mohammed
:
A new applicable and multilayer design of nanoscale adder-subtractor using quantum-dots. - Haoyi Zhao
, Bo Tao
, Ruyi Ma, Baojia Chen:
Manipulator trajectory tracking based on adaptive sliding mode control. - Joginder Singh
, Naresh Kumar Yadav
, Saral Kumar Gupta:
Enhancement of available transfer capability using TCSC with hybridized model: Combining lion and moth flame algorithms. - S. Periasamy Manikandan, S. Milton Ganesh
:
SPPGKM: A secure polynomial function powered group key management scheme for dynamic user environments in cloud. - Héla Fehri, Sondes Dardour
, Kais Haddar:
ARmed question answering system. - Jie Yang
, Hong Wang
:
Medical concept integrated residual short-long temporal convolutional networks for predicting clinical events. - Preeti Sharma
, Mandlem Gangadharappa:
Abnormal behavior detection of stationary objects in surveillance videos with visualization and classification. - Rupali Sachin Vairagade
, Brahmananda Savadatti Hanumantha:
Secure Internet of Things network using light-weighted trust and blockchain-powered PoW framework. - Surbhi Chhabra
, Kusum Lata:
Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications. - Xingyu Tian, Shengnan Tang, Huihui Zhu, Daoxun Xia:
Real-time sentiment analysis of students based on mini-Xception architecture for wisdom classroom. - Kallol Roy, Kamal Krishna Mandal, Atis Chandra Mandal:
Adaptive neuro fuzzy inference system with elephant herding optimization based energy management scheme. - Randa Kamal
, Ezz El-Din Hemdan
, Nawal A. El-Fishawy:
Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things-based smart city security using blockchain. - Selahattin Kosunalp
, Yunus Kaya:
IoT-TDMA: A performance evaluation of TDMA scheme for wireless sensor networks with Internet of Things. - N. V. S. Lakshmipathi Raju
, Vankamamidi Srinivasa Naresh
:
Dynamic distributed KCi-slice data publishing model with multiple sensitive attributes. - Muhammad Riaz
, Rashid Mehmood, Masooda Rehman, Iftikhar Ali, Babar Zaman
:
Mean control chart based on ranked set schemes for unknown skewed probability distribution and parameters. - Rui-dong Qi
, Jiantao Zhou, Zhuowei Wang
, Xiaoyu Song:
An elastic recommender process for cloud service recommendation scalability. - Yun-an Wang
, Yaojin Lin, Xiehua Yu, Jie Wang, Zhisen Wei, Jianfeng Wu, Shaozi Li:
Multilabel causal variable discovery in multisource. - Abbas Mirzaei:
A novel approach to QoS-aware resource allocation in NOMA cellular HetNets using multi-layer optimization. - Buqing Cao
, Mi Peng, Yueying Qing, Jianxun Liu
, Guosheng Kang
, Bing Li, Kenneth K. Fletcher:
Web API recommendation via combining graph attention representation and deep factorization machines quality prediction. - Perumalla Suman Prakash
, Dwaram Kavitha, Pakanati Chenna Reddy
:
Safe and secured routing using multi-objective fractional artificial lion algorithm in WSN. - S. Velliangiri
, Shanthini Pandiaraj, S. Iwin Thanakumar Joseph, Sankaramoorthy Muthubalaji
:
Multiclass recognition of AD neurological diseases using a bag of deep reduced features coupled with gradient descent optimized twin support vector machine classifier for early diagnosis. - Sunil Babu Melingi
, Ramesh Kumar Mojjada, Vanga Karunakar Reddy, Ch. V. M. S. N. Pavan Kumar
, K. Ashok Kumar:
A bio-inspired AlexNet-DrpXLm architype for an effective brain stroke lesion detection and classification. - Weimin Li
, Zhibin Deng, Xiaokang Zhou, Qun Jin, Bin Sheng:
Modeling social network behavior spread based on group cohesion under uncertain environment. - Kaviyarasi Ramanathan
, Balasubramanian Thangavel:
Targeted projection pursuit similarity based attribute selection for academic performance prediction. - Rekha Gangula
, Murali Mohan V.
, Ranjeeth Kumar M
:
Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier. - Lakshmi Anusha Kothamasu
, E. Kannan:
Sentiment analysis on twitter data based on spider monkey optimization and deep learning for future prediction of the brands. - R. Hemalatha
, R. Umamaheswari, S. Jothi
:
An efficient stable node selection based on Garson's pruned recurrent neural network and MSO model for multipath routing in MANET. - Neelakandan Subramani
, Santhosh Kumar Perumal, Jagadish Shivappa Kallimani, Sakthi Ulaganathan
, Sanjay Bhargava, Sangeetha Meckanizi:
Controlling energy aware clustering and multihop routing protocol for IoT assisted wireless sensor networks. - Nancy Kumari
, Debi Prasanna Acharjya
:
A decision support system for diagnosis of hepatitis disease using an integrated rough set and fish swarm algorithm. - Ishak Harichane
, Sid Ahmed Makhlouf
, Ghalem Belalem
:
KubeSC-RTP: Smart scheduler for Kubernetes platform on CPU-GPU heterogeneous systems. - Gajalakshmi Palanisamy
, Sree Sharmila Thangaswamy:
An efficient hand gesture recognition based on optimal deep embedded hybrid convolutional neural network-long short term memory network model. - Kayathri Devi Devprasad
, Sukumar Ramanujam, Suresh Babu Rajendran:
Context adaptive ensemble classification mechanism with multi-criteria decision making for network intrusion detection. - Satya Deo Kumar Ram
, Shashank Srivastava, Krishn Kumar Mishra:
A new meta-heuristic approach for load aware-cost effective workflow scheduling. - Birhan Tastan
, Hatice Imamoglu
:
The analysis of cross-correlation between Istanbul Stock Exchange and major stock markets and indices: An empirical analysis using Random Matrix Theory. - Aarthi Sundaram
, Chitrakala Sakthivel:
Object detection and estimation: A hybrid image segmentation technique using convolutional neural network model. - Naga Priyadarsini R
, Ponsy R. K. Sathia Bhama
:
B-SCORE - A blockchain based hybrid chaotic signatures for medical image encryption in an IoT environment. - Oladayo Olufemi Olakanmi
, Kehinde Oluwasesan Odeyemi:
Secure reputation and morphism-based offloading scheme: A veritable tool for multi-party computation in Industrial Internet of Things. - S. Uma
, Eswari Rajagopal:
A multimodel fire detection and alarm system for automobiles using internet of things and machine learning. - Poleboina Venkata Naga Rajeswari
, Mogalla Shashi, Tiyyabindi Kameswara Rao, Matta Rajya Lakshmi, Lanka Venkateswara Kiran:
Effective intrusion detection system using concept drifting data stream and support vector machine. - Zhongzhe Hu
, Junmin Xiao, Ninghui Sun, Guangming Tan:
Fast and accurate variable batch size convolution neural network training on large scale distributed systems. - Bo Li, Hongbin Sun, Milad Teimourian
:
Optimal electric load forecasting for systems by an adaptive Crow Search Algorithm: A case study. - Lei Wang
, Yunqiu Zhang, Xubin Zheng, Qi Yu
, Shuhan Chen, Junyao Ding:
Singular value decomposition-based behavior-aware cloud service application programming interfaces recommendation for large-scale software cloud directory platforms. - Rathish Babu Thirukonda Krishnamoorthy Sivakumar Babu
, Suresh Sivasubramanian
, Sankarram Natarajan:
MLPNN-RF: Software fault prediction based on robust weight based optimization and Jacobian adaptive neural network. - Aditya Gupta
, Ishwari Singh Rajput
, Gunjan
, Vibha Jain
, Soni Chaurasia:
NSGA-II-XGB: Meta-heuristic feature selection with XGBoost framework for diabetes prediction. - Shruti Arora
, Rinkle Rani, Nitin Saxena:
Modified valence aware dictionary for sentiment reasoning classifier for detection and classification of Covid-19 related rumors from social media data streams. - Manikandan Gunasekar
, Gobalakrishnan Natesan
, Duraimurugan Samiayya
:
Multi-objective moth swarm based sailfish model for optimal routing in wireless sensor network. - Qin Yang, Shihao Yin
, Qingpeng Li, Yongping Li:
Analysis of electricity consumption behaviors based on principal component analysis and density peak clustering. - Lingpeng Meng
, Xiaobo Yao
, Qian Chen
, Chuanfeng Han
:
Vulnerability cloud: A novel approach to assess the vulnerability of critical infrastructure systems. - Ayse Divit Kadi
, Ertan Gokalp
, Fatih Kadi
:
Creating orthophotos with unmanned aerial vehicles and examining its accuracy and usability in geodetic applications. - Rajagopal Chinnasamy
, Balasubramanian Thangavel
:
Rank biserial stochastic feature embed bivariate kernelized regressive bootstrap aggregative classifier for school student dropout prediction. - Durgesh M. Sharma
, Shishir Kumar Shandilya:
An efficient cyber-physical system using hybridized enhanced support-vector machine with Ada-Boost classification algorithm. - Marko Misic
, Milo Tomasevic:
Comparison of parallel central processing unit- and graphics processing unit-based implementations of greedy string tiling algorithm for source code plagiarism detection. - Raghavender Reddy Kothi Laxman, Amit Lathigara, Rajanikanth Aluvalu
, Uma Maheswari Viswanadhula
:
PGWO-AVS-RDA: An intelligent optimization and clustering based load balancing model in cloud. - Chundakath House Sumalakshmi
, Perumal Vasuki:
Fused deep learning based Facial Expression Recognition of students in online learning mode. - Jaspreet Kaur
, Prabhpreet Kaur:
UNIConv: An enhanced U-Net based InceptionV3 convolutional model for DR semantic segmentation in retinal fundus images. - Najlaa Nsrulaah Faris
, Firsas Saber Miften:
An intelligence model for detection of PCOS based on k-means coupled with LS-SVM. - Bekir Parlak
:
Class-index corpus-index measure: A novel feature selection method for imbalanced text data. - Sercan Yalçin
:
Weather parameters forecasting with time series using deep hybrid neural networks.
Volume 34, Number 22, October 2022
- Debanjan Pathak, Surya Narayana Raju Undi
:
Content-based image retrieval for super-resolutioned images using feature fusion: Deep learning and hand crafted. - Kirti Bala
, Pankaj Deep Kaur:
Transparent subsidized agri-product distribution during pandemics with reputation based PoA blockchain. - Marzi Heidari, Mehdi Ghatee
, Ahmad Nickabadi, Arash Pourhasan Nezhad:
Diverse and styled image captioning using singular value decomposition-based mixture of recurrent experts. - Masoumeh Bourjandi, Meisam Yadollahzadeh Tabari
, Mehdi Golsorkhtabaramiri:
Combined deep centralized coordinate learning and hybrid loss for human activity recognition. - Jeffrey O. Agushaka, Absalom E. Ezugwu
:
Influence of probability distribution initialization methods on the performance of advanced arithmetic optimization algorithm with application to unrelated parallel machine scheduling problem. - Zhixiang Liu
, Yu Li
, Wei Song
:
Regularized lattice Boltzmann method parallel model on heterogeneous platforms. - Abdullah Talha Kabakus
:
A novel COVID-19 sentiment analysis in Turkish based on the combination of convolutional neural network and bidirectional long-short term memory on Twitter. - Ertugrul Gul
:
A blind robust color image watermarking method based on discrete wavelet transform and discrete cosine transform using grayscale watermark image. - Nasim Soltani
, Amir Masoud Rahmani
, Mahdi Bohlouli, Mehdi Hosseinzadeh
:
Artificial intelligence empowered threat detection in the Internet of Things: A systematic review. - Ayhan Renklier
, Serkan Öztürk:
A novel Frei-Chen based fragile watermarking method for authentication of an image. - K. G. Maheswari
, C. Siva, G. NaliniPriya:
A hybrid soft computing technique for intrusion detection in web and cloud environment. - Venkata Naga Rani Bandaru
, P. Visalakshi:
Block chain enabled auditing with optimal multi-key homomorphic encryption technique for public cloud computing environment. - Mamta Ghalan
, Rajesh Kumar Aggarwal:
Daily life human activities recognition using a novel AR-DenseNet. - Tausifa Jan Saleem
, Mohammad Ahsan Chishti:
LPLB: An approach for the design of a lightweight convolutional neural network. - Vedavathi Nagendra Prasad
, Anil Kumar Kureekatil Muthappa:
An efficient framework for the similarity prediction with query recommendation in E-learning system. - Pankaj Dadure
, Partha Pakray
, Sivaji Bandyopadhyay:
A formula embedding approach for semantic similarity and relatedness between formulas. - Hadi Gholami
, Mohammad Taghi Rezvan
:
A cooperative multi-agent offline learning algorithm to scheduling IoT workflows in the cloud computing environment. - Hela Malouche
, Youssef Ben Halima, Henda Ben Ghézala
:
A negotiation framework for the cloud using rough set theory-based preference prediction. - Neha Miglani
, Gaurav Sharma
, Savita Khurana
:
Multi-objective reliability-based workflow scheduler: An elastic and persuasive task scheduler based upon modified-flower pollination algorithm in cloud environment. - Leyan Shi, Somayeh Pouramini
:
Adaptive façade for building energy efficiency improvement by arithmetical optimization algorithm. - Nageswararao Sirisala
, Anitha Yarava, Y. C. A. Padmanabha Reddy, Veeresh Poola
:
A novel trust recommendation model in online social networks using soft computing methods. - Bingxian Wang, Peng Wu, Maryam Arefzaeh
:
A new method for task scheduling in fog-based medical healthcare systems using a hybrid nature-inspired algorithm. - Anandbabu Gopatoti
, P. Vijayalakshmi
:
Multi-texture features and optimized DeepNet for COVID-19 detection using chest x-ray images. - Rahul Jain
, Ram Kumar Karsh, Abul Abbas Barbhuiya
:
Literature review of vision-based dynamic gesture recognition using deep learning techniques. - S. M. Zobaed
, Mohsen Amini Salehi:
Privacy-preserving clustering of unstructured big data for cloud-based enterprise search solutions. - Gunjan Mukherjee
, Arpitam Chatterjee
, Bipan Tudu
:
Identification of the types of disease for tomato plants using a modified gray wolf optimization optimized MobileNetV2 convolutional neural network architecture driven computer vision framework. - Yilin Wu, Jinghua Liu
, Xiehua Yu, Yaojin Lin, Shaozi Li:
Neighborhood rough set based multi-label feature selection with label correlation. - Jiashu Wu
, Hao Dai, Yang Wang
, Shigen Shen
, Cheng-Zhong Xu
:
PECCO: A profit and cost-oriented computation offloading scheme in edge-cloud environment with improved Moth-flame optimization. - Junfeng Tian, Qian Yang
:
An arbitrable multi-replica data auditing scheme based on smart contracts. - Weimin Li, Dingmei Wei
, Xiaokang Zhou, Shaohua Li, Qun Jin:
F-SWIR: Rumor Fick-spreading model considering fusion information decay in social networks. - Balraj M. Monica Jenefer
, K. Senathipathi, Aarthi, Annapandi:
Detection and categorization of acute intracranial hemorrhage subtypes using a multilayer DenseNet-ResNet architecture with improved random forest classifier. - Alexandre Denis
, Julien Jaeger
, Emmanuel Jeannot
, Florian Reynier:
A methodology for assessing computation/communication overlap of MPI nonblocking collectives. - Hatice Oncel Cekim
:
Modified unbiased estimators for population variance: An application for COVID-19 deaths in Russia. - Yanhua Liu
, Jiaqi Li
, Baoxu Liu, Xiaoling Gao, Ximeng Liu:
Malware detection method based on image analysis and generative adversarial networks. - Ravi Boda
, Reni K. Cherian, Vinit Kumar
:
An automated brain tumor segmentation framework using a novel fruit fly UNet.
Volume 34, Number 23, October 2022
- Upendra Verma
, Diwakar Bhardwaj:
A secure lightweight anonymous elliptic curve cryptography-based authentication and key agreement scheme for fog assisted-Internet of Things enabled networks. - Xin Ye
, Jianqi Shi, Yanhong Huang, Qin Li, Hansheng Wei, Xinyu Chen:
Parallel computational tree logic model-checking on pushdown systems. - Balachandra Kumaraswamy
:
Optimal classification of music genres based on acoustic and visual features. - Farithkhan Abbas Ali
, Kanmani Ruby Erode Dhanapal
:
Topology based energy efficient routing using integration of fuzzy based markov chain cluster-optimized novel ant bee colony approach in FANET. - Gaurav Sharma
, Savita Khurana
, Shilpi Harnal
, Showkat Ahmad Lone
:
CSFPA: An intelligent hybrid workflow scheduling algorithm based upon global and local optimization approach in cloud. - Qiaosheng Feng, Li Huang, Ying Sun, Xiliang Tong, Xin Liu
, Yuanmin Xie, Jun Li, Hanwen Fan, Baojia Chen:
Substation instrumentation target detection based on multi-scale feature fusion. - Muhammad Faraz Hyder
, Saadia Arshad
, Asad Arfeen
, Tasbiha Fatima:
Privacy preserving mobile forensic framework using role-based access control and cryptography. - Abdullah Elen
:
Covid-19 detection from radiographs by feature-reinforced ensemble learning. - Recep Sinan Arslan, Murat Tasyurek
:
AMD-CNN: Android malware detection via feature graph and convolutional neural networks. - T. Suresh
, Z. Brijet, T. D. Subha:
Modified local binary patterns based feature extraction and hyper parameters tuned attention segmental recurrent neural network classifier using flamingo search optimization algorithm for disease diagnosis model. - Vijaita Kashyap
, Ashok Kumar
:
Load balancing techniques for fog computing environment: Comparison, taxonomy, open issues, and challenges. - Jagadeesh Thati
, Samit Ari:
GLeSI: A system for extraction of glacial lakes using satellite imagery. - Kamlesh Kumar Pandey
, Diwakar Shukla
:
Min-max kurtosis stratum mean: An improved K-means cluster initialization approach for microarray gene clustering on multidimensional big data. - Longyue Xing
, Zhaoshun Wang, Zhezhao Ding, Genshen Chu, Lingyu Dong
, Nan Xiao:
An efficient sparse stiffness matrix vector multiplication using compressed sparse row storage format on AMD GPU. - Mohamed Gafsi
, Rim Amdouni, Mohamed Ali Hajjaji, Jihene Malek, Abdellatif Mtibaa:
Improved chaos-RSA-based hybrid cryptosystem for image encryption and authentication. - Arnaud Fiorini
, Michel R. Dagenais:
Visualization of profiling and tracing in CPU-GPU programs. - Ankur Sharma
, Veni Thangaraj:
DMAP: A decentralized matching game theory based optimized Internet of Things application placement in fog computing environment. - Mantosh Kumar, Kumari Namrata
, Neha Kumari:
Hyper-parametric improved machine learning models for solar radiation forecasting. - Mohassin Ahmad
, Farida Khursheed:
Detection and localization of image tampering in digital images with fused features. - Anup Bhat Brahmavar
, Harish Venkatarama
, Geetha Maiya:
Mining high utility itemsets with time-aware scheduling using Apache Spark. - Soura Boulaares
, Salma Sassi
, Djamal Benslimane
, Sami Faïz:
A probabilistic approach: Uncertain navigation of the uncertain web. - Meghana Thiyyakat
, Subramaniam Kalambur, Dinkar Sitaram:
Niyama: Node scheduling for cloud workloads with resource isolation. - Haiqing Liu, Ming Ai, Rong Huang, Rixuan Qiu, Yuancheng Li
:
Identity authentication for edge devices based on zero-trust architecture. - G. Sujatha
, R. Jeberson Retna Raj
:
An efficient enhanced prefix hash tree model for optimizing the storage and image deduplication in cloud. - Kapil Netaji Vhatkar
, Girish P. Bhole:
Self-improved moth flame for optimal container resource allocation in cloud. - Jiawei Su
, Zhiming Luo, Shaozi Li:
Consistent response for automated multilabel thoracic disease classification. - Gang Xian
, Xiaorong Zhang, Jie Yu
, Guijuan Wang, Wenxiang Yang
, Longfang Zhou, Yadong Wu, Xuejun Li, Xin He:
PreF: Predicting job failure on supercomputers with job path and user behavior. - Priya Arundhati, Sisir Kumar Jena
, Santosh Kumar Pani:
Approximate function memoization. - Sankara Nayaki Kannan
, Sudheep Elayidom Mannathazhathu
, Rajesh Raghavan
:
A novel compression based community detection approach using hybrid honey badger African vulture optimization for online social networks. - Telagarapu Prabhakar
, Subbiah Vairamuthu, Balasubramaniam Selva Rani, Balajee Maram
:
Gray wolf-student psychology optimization-based deep long short term memory for survival prediction using cancer gene-expression data. - Riya Samanta
, Soumya K. Ghosh:
FogiRecruiter: A fog-enabled selection mechanism of crowdsourcing for disaster management. - Ramana Reddy B
, Indiramma M
:
Efficient Throttled load balancing algorithm to improve the response time and processing time in data center. - Behbod Kheradmand
, Ali Ghaffari
, Farhad Soleimanian Gharehchopogh, Mohammad Masdari:
Clustering-based routing protocol using gray wolf optimization and technique for order of preference by similarity to ideal solution algorithms in the vehicular ad hoc networks. - Varun Deshmukh, Sunil Pathak
, Santosh Bothe:
MobEdge: Mobile blockchain-based privacy-edge scheme for healthcare Internet of Things-based ecosystems. - Palanivel Rajan Doraiswami
, Velliangiri Sarveshwaran
, Iwin Thanakumar Joseph Swamidason
, Sona Chandra Devadass Sorna:
Jaya-tunicate swarm algorithm based generative adversarial network for COVID-19 prediction with chest computed tomography images.
Volume 34, Number 24, November 2022
- Shanthi Govindaraju
, Wilson Vimala Rani Vinisha, Francis H. Shajin, D. Adhimuga Sivasakthi:
Intrusion detection framework using auto-metric graph neural network optimized with hybrid woodpecker mating and capuchin search optimization algorithm in IoT network. - Sree Harsha Vadlamudi, Yerrabapu Sai Souhith Reddy, Polu Ajith Sai Kumar Reddy, Prakasam Periasamy
, Noor Mohammed Vali Mohamad:
Automatic liver tumor segmentation and identification using fully connected convolutional neural network from CT images. - Seyed Mahdi Jameii
, Romina Sadat Zamirnaddafi, Reza Rezabakhsh:
Internet of Flying Things security: A systematic review. - Omar Abdullah Murshed Farhan Alnaggar
, Basavaraj N. Jagadale, Swaroopa H. Narayan, Mufeed Ahmed Naji Saif
:
Brain tumor detection from 3D MRI using Hyper-Layer Convolutional Neural Networks and Hyper-Heuristic Extreme Learning Machine. - Abdullah Talha Kabakus
, Pakize Erdogmus:
An experimental comparison of the widely used pre-trained deep neural networks for image classification tasks towards revealing the promise of transfer-learning. - Kirtan Delwadia, Dhruvil Bhatt, Shishir Purohit, Bhaskar Chaudhury
:
Parallel algorithm for synthetic image generation with application to tokamak plasma diagnostics. - Sampath Korra
, Ravikanth Mamidi, Narasimha Reddy Soora
, Kotte Vinay Kumar
, Naliganti Cornel Santosh Kumar:
Intracranial hemorrhage subtype classification using learned fully connected separable convolutional network. - Navneet Verma
, Sukhdip Singh, Devendra Prasad:
Machine learning and IoT-based model for patient monitoring and early prediction of diabetes. - Elaheh Moharamkhani
, Mohammad Yahyaei Feriz Hendi
, Eisa Bandar, Amir Izadkhasti, Rzgar Sirwan Raza:
Intrusion detection system based firefly algorithm-random forest for cloud computing. - Subhash Kumar Yadav, Shabbir Ahmad
, Muhammad Riaz
:
On enhanced estimation and monitoring of population variance using robust auxiliary parameters based estimators. - Prema T. Akkasaligar, Sumangala Biradar
, Sunanda Biradar:
Multilevel security for medical image using heterogeneous chaotic map and deoxyribonucleic acid sequence operations. - Harnain Kour
, Manoj Kumar Gupta:
Predicting the language of depression from multivariate twitter data using a feature-rich hybrid deep learning model. - Mengpan Chen, Shunfu Jin
, Li Chen:
Allocation strategy for time-sensitive tasks in mobile edge computing: An observable perspective. - Sin Hong Lin
, Ruliang Xiao
:
Towards publishing directed social network data with k-degree anonymization. - Malathy Navaneetha Krishnan
, Revathi Thiyagarajan:
Multi-objective task scheduling in fog computing using improved gaining sharing knowledge based algorithm. - Gobalakrishnan Natesan
, L. Javid Ali, Pradeep Krishnadoss
, Raman Chidambaram, Manikandan Nanjappan
:
Optimization techniques for task scheduling criteria in IaaS cloud computing atmosphere using nature inspired hybrid spotted hyena optimization algorithm. - Ahmad Fadaei Tehrani, Mahdi Sharifi
, Amir Masoud Rahmani
:
Frequent pattern mining algorithms in fog computing environments: A systematic review. - Abul Abbas Barbhuiya
, Ram Kumar Karsh, Rahul Jain
:
Gesture recognition from RGB images using convolutional neural network-attention based system. - S. R. Sannasi Chakravarthy
, N. Bharanidharan
, Harikumar Rajaguru
:
A systematic review on machine learning algorithms used for forecasting lake-water level fluctuations. - Muhammed Yildirim
:
Automatic classification and diagnosis of heart valve diseases using heart sounds with MFCC and proposed deep model. - Khaoula Belhaj Soulami
, Naima Kaabouch, Mohamed Nabil Saidi:
Breast cancer: Three-class masses classification in mammograms using Apriori dynamic selection. - Abitha Kumari Duraisamy
, Raja Guru Ramaraj
, Mathankumar Manoharan
, Manjunathan Alagarsamy
:
Certificateless linkable ring signature-based blockchains for securing cognitive radio networks. - Selvam Durairaj
, Rajeswari Sridhar
:
Task scheduling to a virtual machine using a multi-objective mayfly approach for a cloud environment. - Jayaraman Seetha
, Maruthu Ayyadurai:
Performance evaluation of accessibility checker tool for educational websites. - Shiqiang Zhang
, Dongzhi Cao, Zhenhu Ning
:
A decentralized and reliable trust measurement for edge computing enabled Internet of Things.
Volume 34, Number 25, November 2022
- Jeremiah Isuwa
, Mohammed Abdullahi
, Yusuf Sahabi Ali
, Abdulrazaq Abdulrahim
:
Hybrid particle swarm optimization with sequential one point flipping algorithm for feature selection. - M. Anbu
:
Improved mayfly optimization deep stacked sparse auto encoder feature selection scorched gradient descent driven dropout XLM learning framework for software defect prediction. - B. Jaishankar
, J. Naveen, Balamurugan Marimuthu, Bhuvana Jayabalan, M. Mathivanan:
A multi-preference integrated algorithm for deep learning based recommender framework. - Sathiyamoorthi Velayutham
, Pon Harshavardhanan, Hussain Azath, Marimuthu Senbagavalli, Ayyappillai Mallika Viswa Bharathy, Bala Subramanian Chokkalingam
:
An effective model for predicting agricultural crop yield on remote sensing hyper-spectral images using adaptive logistic regression classifier. - B. Shaji
, R. Lal Raja Singh
, K. L. Nisha
:
A novel deep neural network based marine predator model for effective classification of big data from social Internet of Things. - Thirumalai Jaganathan
, Anandan Panneerselvam
, Senthil Kumar Kumaraswamy:
Object detection and multi-object tracking based on optimized deep convolutional neural network and unscented Kalman filtering. - Daniel Jesline
, Anita Rose J. T
, F. Sangeetha Francelin Vinnarasi
:
Fuzzy optimization based detection of attacker nodes in wireless networks using deep neural network. - Paramita Sarkar
, Ayush Aryan, Rituparna Chaki:
Sea lion attacking-based deer hunting optimization algorithm for dynamic nurse scheduling in health care sector contribution of hybrid algorithm in cloud. - Kiruba Karuppannan
, Shiloah Elizabeth Darmanayagam
, Cyril Sunil Retmin Raj:
Human action recognition using fusion-based discriminative features and long short term memory classification. - Arslan Nedhir Malti
, Mourad Hakem, Badr Benmammar
:
Multi-objective task scheduling in cloud computing. - Chengpeng Xia
, Yalan Wu, Long Chen, Yawen Chen
, Jigang Wu:
Three-stage auction scheme for computation offloading on mobile blockchain with edge computing. - Omer Faruk Saritas
, Serkan Ozturk:
A color channel multiplexing approach for robust discrete wavelet transform based image watermarking. - Ravi Mishra
:
Hybrid feature extraction and optimized deep convolutional neural network based video shot boundary detection. - Yingying Wen
, Yiming Zhang
, Guanjie Cheng, Shuiguang Deng, Jianwei Yin:
A holistic evaluation methodology for configuring production data centers. - Heba Mamdouh Farghaly, Tarek Abd El-Hafeez
:
A new feature selection method based on frequent and associated itemsets for text classification. - K. Venkateswara Rao
, L. Mary Gladence:
Support vector machine based disease classification model employing hasten eagle Cuculidae search optimization. - Neetu Rani
, Amit Kumar Bhardwaj, Prasenjit Das, Anju Sharma:
Bibliometric analysis of rumor detection via web of science from 1989 to 2021. - Muthuperumal Periyaperumal Ramkumar
, Pauliah David Mano Paul
, Balajee Maram
, John Patrick Ananth:
Deep maxout network for lung cancer detection using optimization algorithm in smart Internet of Things. - Juan Li
, Xianwen Fang
, Xin Guo, Yuzhou Liu, George Kofi Agordzo
:
Data attribute oriented business process effective infrequency behavior mining method. - Bharathi Govindaswamy
, Malleswaran Mallappa
:
Detection and segmentation of melanoma skin cancer in dermoscopy images using modified Alexnet convolutional neural network-morphological methodology. - Neha Gupta
, Rajendra Prasad Mahapatra:
Automated software effort estimation for agile development system by heuristically improved hybrid learning. - T. Suresh
, Z. Brijet:
Optimization assisted convolutional neural network for detection of thyroid. - Paruthi Ilam Vazhuthi Padmanaban
, Manikandan Shanmugaperumal Periasamy
, Aruchamy Prasanth
:
An energy-efficient auto clustering framework for enlarging quality of service in Internet of Things-enabled wireless sensor networks using fuzzy logic system. - Uttam Singh Bist
, Nanhay Singh:
Analysis of recent advancements in support vector machine. - Tolga Zaman
, Hasan Bulut
, Subhash Kumar Yadav
:
Robust ratio-type estimators for finite population mean in simple random sampling: A simulation study.
Volume 34, Number 26, November 2022
- V. Sri Vigna Hema
, Ramesh Kesavan:
Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment. - Ravichandran Kavitha
, AngaThevar Valarmathi:
A security hybrid mechanism using fuzzy with adaptive ElGamal approach in cloud. - Rajan Kumar Gangadhari
, Vivek Khanzode, Shankar Murthy:
Application of rough set theory and machine learning algorithms in predicting accident outcomes in the Indian petroleum industry. - Mohammad Rahmati
, Farbod Razzazi
, Alireza Behrad:
Adaptive content suppression based on shared-hidden-layer convolutional autoencoder for blind image forensics. - S. Daphin Lilda
, R. Jayaparvathy
, Akshaya Balaji:
An efficient machine learning based ventricular late potential detection and classification technique for cardiac healthcare. - Rathinam Shanmugapriya
, Sripathi Venkata Naga Santhosh Kumar
:
Comprehensive survey on data dissemination protocols for efficient reprogramming in Internet of Things. - Jebakumar Immanuel D
, R. Dhanapal
:
A secure finger vein verification and authentication scheme for banking network. - Onder Coban
:
A new modification and application of item response theory-based feature selection for different machine learning tasks. - Parveen Kumar
, Pawan Kumar Dahiya, Bijay Kumar Singh:
Modularized hypergraph clustering scheme model for stable VANET. - Narra Malathi
, Molugaram Kumar:
A novel optimized intelligent green signal timing system for urban corridor. - Priyank Jain
, Shriya Sahu:
Prediction and forecasting of worldwide corona virus (COVID-19) outbreak using time series and machine learning. - Bhawna Sharma
, Parvinder Singh:
An improved anti-phishing model utilizing TF-IDF and AdaBoost. - Duygu Kaya
:
Automated gender-Parkinson's disease detection at the same time via a hybrid deep model using human voice. - Belal A. Hamed, Osman Ali Sadek Ibrahim
, Tarek Abd El-Hafeez
:
A survey on improving pattern matching algorithms for biological sequences. - Rajan Cristin
, Sasi Padma Premnath, John Patrick Ananth:
Image tampering detection in image forensics using earthworm-rider optimization. - Gökhan Kayhan
:
Comparison of the performance of different learning algorithms in leaf feature extraction and recognition using convolution neural network. - S. Anitha
, S. Saravanan, A. Chandrasekar:
A modified gray wolf-based chameleon swarm algorithm for minimizing energy consumption and enabling secure communication in wireless sensor network. - Beenish Habib
, Farida Khursheed:
Performance evaluation of machine learning models for distributed denial of service attack detection using improved feature selection and hyper-parameter optimization techniques. - Naziha Ali Saoucha
:
Binary Jaya-based channel allocation in cognitive radio networks. - Joddat Fatima
, Mashood Mohammad Mohsan
, Amina Jameel, Muhammad Usman Akram, Adeel Muzaffar Syed:
Vertebrae localization and spine segmentation on radiographic images for feature-based curvature classification for scoliosis. - Zhuanghua Zhu
:
Many-objective evolutionary algorithm assisted by a novel angle-based fitness strategy. - Nissrine Baarab
, Brahim E. L. Khalil Chaouki, Lhoussaine Masmoudi:
Content-based image retrieval using color and a novel texture descriptor: orientational-based local binary pattern. - Mansoureh Yari Eili
, Jalal Rezaeenour
:
A survey on recommendation in process mining. - Dhanalaxmi Badvath
, Aruna safali Miriyala, Sai chaitanya Kumar Gunupudi, Parish venkata Kumar Kuricheti:
Prediction of software defects using deep learning with improved cuckoo search algorithm. - Zhaorui Wang
, Guisheng Fan
, Huiqun Yu:
Time-constrained and reliability aware energy minimization scheduling algorithm for heterogeneous multiprocessor environments. - L. Sathish Kumar, Prabu A. V., V. Pandimurugan
, Rajasoundaran Soundararajan, Prince Priya Malla, Sidheswar Routray
:
A comparative experimental analysis and deep evaluation practices on human bone fracture detection using x-ray images.
Volume 34, Number 27, December 2022
- Xiaowei Zhang
, Luming Li, Hong Liu
, Peng Yang, Yuanyuan Gao:
Disentangling classification and regression in Siamese-based network for visual tracking. - P. Sinthia
, M. Malathi
, Anitha K.
, M. Suresh Anand
:
Improving lung cancer detection using faster region-based convolutional neural network aided with fuzzy butterfly optimization algorithm. - Alexandru Iulian Orhean
, Anna Giannakou, Katie Antypas, Ioan Raicu, Lavanya Ramakrishnan:
Evaluation of a scientific data search infrastructure. - Aparna Sivaraj
, Valarmathie Palanisamy
:
Deep neural network based interactive fuzzy Bayesian search algorithm for low-cost smart farming automation model. - S. Senthil Pandi
, A. Senthilselvi
, M. Maragatharajan
, I. Manju
:
An optimal self adaptive deep neural network and spine-kernelled chirplet transform for image registration. - M. Hemalatha
:
Optimal AdaBoost kernel support vector machine for monitoring arrhythmia patients utilizing Internet of Things-cloud environment. - Zengpeng Li
, Huiqun Yu, Guisheng Fan
:
Time-cost efficient memory configuration for serverless workflow applications. - George Sugitha
, Thimmakkondu Babuji Sivakumar
, Shahul Hameed Hasan Hussain:
QoS aware routing protocol using robust spatial gabriel graph based clustering scheme for ad hoc network. - Jayanarayana Reddy Dwaram
, Rudra Kumar Madapuri:
Crop yield forecasting by long short-term memory network with Adam optimizer and Huber loss function in Andhra Pradesh, India. - Sadiq H. Abdulhussain
, Basheera M. Mahmmod
, Thar Baker
, Dhiya Al-Jumeily
:
Fast and accurate computation of high-order Tchebichef polynomials. - Hamid Gavari Bami, Elaheh Moharamkhani
, Behrouz Zadmehr, Vahid Najafpoor, Mohammad Shokouhifar
:
Detection of zero-day attacks in computer networks using combined classification. - Saeed Saeedvand, Masoumeh Jafari
, Hadi S. Aghdasi, Jacky Baltes, Amir Masoud Rahmani
:
Deep learning: A taxonomy of modern weapons to combat Covid-19 similar pandemics in smart cities. - Wende Ke
, Yuhan Chen, Yijie Pang, Qingfeng Li, Dongxin Lu:
An activate appearance model-based algorithm for ear characteristic points positioning. - Varalakshmi Perumal, Sankari Subbiah
:
Optimized scheduling of multi-user Map-Reduce jobs in heterogeneous environment. - Mohamed R. Elshamy
, Belal Abozalam, Amged Sayed, Essam Nabil
:
Real-time control design and implementation of ball balancer system based on machine learning and machine vision. - Ramamoorthi Vignesh
, Kulasekaran Mohana Prasad:
Blockchain-based security enhancement mechanism for employee performance assessment system. - Rajasekhar Butta
, Kamaraju Maddu
, Sumalatha Vangala:
Cat swarm optimized ensemble technique for emotion recognition in speech signals. - Ram Kumar
, S. C. Sharma
:
Hybrid optimized query expansion strategy for semantic information retrieval using spatial bound whale and binary moth flame optimization algorithm. - Meble Varghese
, M. Victor Jose
:
An optimized radial bias function neural network for intrusion detection of distributed denial of service attack in the cloud. - Wenhao Li
, Niranjan Bidargaddi, John Fouyaxis
, Dan Thorpe
:
A framework for developing digital health applications with efficiency and reuse principles: DHLink case study. - Ashutosh Ashutosh
, Usman Shahzad
, Nadia H. Al-Noor
, Piyush Kant Rai:
Simulation study of small domain with calibration approach. - Selvam Lakshmanan
, Braveen Manimozhi
, Venkatesan Ramachandran
:
An efficient and secure data sharing scheme for cloud data using hash based quadraplet wavelet permuted cryptography approach. - Pejman Gholami-Dastgerdi
, Mohammad-Reza Feizi-Derakhshi
, Aynaz Forouzandeh
:
Named entities detection by beam search algorithm. - Zhenpeng Liu
, Qiannan Liu, Dewei Miao, Lele Ren, Yonggang Zhao:
A blockchain anonymity solution to prevent location homogeneity attacks. - Vijayan Sharmila Bhargavi
, Soundararajan Pavai Madheswari:
IoT enabled healthcare system for predicting the diseases using feature optimization, decision tree, neural network, and fuzzy temporal rules. - Dongsheng Liu, Yuting Wu
, Deyan Hong, Siting Wang:
Time series data augmentation method of small sample based on optimized generative adversarial network. - Seruvan Tamil Selvi
, Pandikkannu Visalakshi:
Detection of unique delete attack in wireless sensor network using gradient thresholding-long short-term memory algorithm. - Gajendra K. Vishwakarma
, Abhishek Singh
:
Computing the effect of measurement errors on ranked set sampling estimators of the population mean. - Sumathi Sokkalingam
, Rajesh Ramakrishnan
:
An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach. - Haci Mustafa Palancioglu
:
Histogram modification based pansharpening by using differential evolution algorithm. - Logeshwari Dhavamani
, P. Prem Priya
:
Energy-efficient and privacy-preserving approach for Internet of Things nodes using a novel hybrid fuzzy water cycle and evaporation strategy and matrix-based Rivest-Shamir-Adleman encryption algorithm. - Shashi Bhushan
, Anoop Kumar
:
New efficient logarithmic estimators using multi-auxiliary information under ranked set sampling. - Mir Shahnawaz Ahmad
, Shahid Mehraj Shah:
Unsupervised ensemble based deep learning approach for attack detection in IoT network. - Chetan Vikram Andhare
, Dayanand Ingle:
Adaptive local binary descriptor statistics: A novel feature set for heart disease diagnosis. - Ajit Kumar Singh Yadav
, Marpe Sora:
Unsupervised learning for financial statement fraud detection using manta ray foraging based convolutional neural network. - Prasad Adaguru Yogegowda
, Jyoti Metan
, Kurilinga Sannalingappa Ananda Kumar, Shiva Prasad Kumbenahalli Hanumanthegowda:
Early detection and classification of liver diseases in ultrasound images using hybrid machine learning techniques. - John Zaki
, Anand Nayyar
, Surjeet Dalal
, Zainab Hassan Ali
:
House price prediction using hedonic pricing model and machine learning techniques. - Iqra Babar
, Sohail Chand
:
Weighted ridge and Liu estimators for linear regression model. - Yingsen Wang, Yulan Ma, Yan Qiang
, Juanjuan Zhao
, Yi Li
, Keqin Li:
BAC: A block alliance consensus mechanism for the mine consortium blockchain. - Abid Hussain
, Kalim Ullah, Salman Arif Cheema, Akbar Ali Khan, Zawar Hussain:
Empirical distribution function based dual use of auxiliary information for the improved estimation of finite population mean.
Volume 34, Number 28, null
RESEARCH ARTICLES
- Murapaka Dhanalakshmi Bhavani, R. Murugan
, Tripti Goel:
Robust U-Net: Development of robust image enhancement model using modified U-Net architecture. - N. K. Sakthivel
, S. Subasree, Pachhaiammal Alias Priya M
, Amit Kumar Tyagi:
Breast lesion identification and categorization using mammography screening based on combined convolutional recursive neural network framework with parameters optimized using multi-objective seagull optimization algorithm. - Keshav Kaushik
, Akashdeep Bhardwaj
, Manoj Kumar
, Sachin Kumar Gupta
, Abhishek Gupta
:
A novel machine learning-based framework for detecting fake Instagram profiles. - Sudershan Kumar, Prabuddha Sinha, Shirshendu Das
:
WinDRAM: Weak rows as in-DRAM cache. - Hideyat Zerga
, Asma Amraoui
, Badr Benmammar
:
Distributed, dynamic and trustworthy access control for telehealth systems. - Niroshini Infantia Henry
, C. Anbuananth, S. Kalarani:
Hybrid meta-heuristic algorithm for optimal virtual machine placement and migration in cloud computing. - J. Vijayalakshmi
, E. Ramaraj:
A Hadoop-big data analytic model to predict and classify chronic kidney diseases using improved fractional rough fuzzy K-means clustering and extreme gradient boost rat swarm optimizer. - Suneetha Merugula
, Buddi Padmaja, Ragavi Veerubommu:
RideNN-OptDRN: Heart disease detection using RideNN based feature fusion and optimized deep residual network. - Amirthayogam Gnanasekaran
, Anbu Ananth Chinnasamy, Elango Parasuraman:
Analyzing the QoS prediction for web service recommendation using time series forecasting with deep learning techniques. - Arun Pandian J.
, K. Kanchanadevi
:
An improved deep convolutional neural network for detecting plant leaf diseases. - Pankhuri Goyal
, Nupur Goyal, Pavneet Singh, Nischay Mittal, Neeru Jindal, Kanwarpreet Kaur
:
Pharmaceutical drugs expiry date tracking: A visionary approach. - Khadidja Belkadi, Mohamed Lehsaini
, Mohammed Amin Tahraoui:
Fault-tolerance based on augmenting approach in wireless sensor networks. - Yousheng Zhou
, Kexin Liu, Pandi Vijayakumar:
FTPS: Efficient fault-tolerant dynamic phrase search over outsourced encrypted data with forward and backward privacy. - Rishi Sinhal, Irshad Ahmad Ansari
:
A multiple transform based approach for robust and blind image copyright protection. - Ansar Sonya
, Ganesh Kavitha:
An effective blockchain-based smart contract system for securing electronic medical data in smart healthcare application. - A. Abirami
, R. Kavitha
:
An efficient early detection of diabetic retinopathy using dwarf mongoose optimization based deep belief network. - M. Revan Özkale
, Özge Kuran
:
Model selection via conditional conceptual predictive statistic for mixed and stochastic restricted ridge estimators in linear mixed models. - Murtaza Cicioglu
, Ali Çalhan
, Md. Sipon Miah:
An effective routing algorithm for spectrum allocations in cognitive radio based internet of things. - Akashdeep Kaur
, Rajesh Kumar
, Sharad Saxena
:
OCTRA-5G: Osmotic computing based task scheduling and resource allocation framework for 5G. - Zichen Zhao
, Xiliang Tong, Ying Sun, Dongxu Bai, Xin Liu
, Guojun Zhao, Hanwen Fan, Jun Li, Cejing Zou, Baojia Chen:
Large scale instance segmentation of outdoor environment based on improved YOLACT. - V. Antony Asir Daniel
, Ravi Ramaraj:
A novel modified long short term memory architecture for automatic liver disease prediction from patient records. - M. Jagadeesh
, B. Baranidharan:
Dynamic FERNet: Deep learning with optimal feature selection for face expression recognition in video. - K. Suresh Kumar
, C. Helen Sulochana
:
Local search five-element cycle optimized reLU-BiLSTM for multilingual aspect-based text classification. - Erkam Murat Bozkurt
:
The usage of cybernetic in complex software systems and its application to the deterministic multithreading. - Muhammad Fahad, Mohammad Shojafar
, Mubashir Abbas, Israr Ahmed, Humaira Ijaz
:
A multi-queue priority-based task scheduling algorithm in fog computing environment. - Diksha Hooda
, Rinkle Rani:
An interval type-2 fuzzy ontological model: Predicting water quality from sensory data. - Kilvisharam Oziuddeen Mohammed Aarif
, Caffiyar Mohamed Yousuff
, B. A. Mohammed Hashim
, C. Mohamed Hashim
, Poruran Sivakumar
:
Smart bin: Waste segregation system using deep learning-Internet of Things for sustainable smart cities. - Kranti Kumar Dewangan
, Satya Prakash Sahu, Rekh Ram Janghel:
Enhanced deep learning frame model for an accurate segmentation of cancer affected part in breast. - Geetha K
, Brahmananda S. H:
Effective Internet of Things botnet classification by data upsampling using generative adversarial network and scale fused bidirectional long short term memory attention model. - Kulanthaivel Balakrishnan
, Ramasamy Dhanalakshmi
:
Feature selection in high-dimensional microarray cancer datasets using an improved equilibrium optimization approach. - S. Suresh Kumar
, R. Sarankumar, O. Vignesh, A. Prakash:
Bilateral anisotropic Gabor wavelet transformation based deep stacked auto encoding for lossesless image compression. - Aarif Ahamed Shahul Hameed
, Chandrasekar Ravi
:
Bitcoin price prediction using optimized multiplicative long short term memory with attention mechanism using modified cuckoo search optimization. - Songshou Dong
, Yihua Zhou, Yu-Guang Yang
, Yanqing Yao:
A certificateless ring signature scheme based on lattice. - Nadia Mushtaq, Iram Saleem
, Mustansar Aatizaz Amjad:
Evaluating COVID-19 risk under the estimation of population mean using two attributes. - Serpil Aslan
:
A novel TCNN-Bi-LSTM deep learning model for predicting sentiments of tweets about COVID-19 vaccines. - Bankapalli Jyothi
, Sumalatha Lingamgunta, Suneetha Eluri:
Intelligent deep learning-based hierarchical clustering for unstructured text data. - Sonam Sharma, Izzat Alsmadi, Rami S. Alkhawaldeh
, Bilal Al-Ahmad
:
Data-driven analysis and predictive modeling on COVID-19. - Gizemnur Erol
, Betül Uzbas
, Cüneyt Yücelbas
, Sule Yücelbas
:
Analyzing the effect of data preprocessing techniques using machine learning algorithms on the diagnosis of COVID-19. - Ruchi Jayaswal
, Manish Dixit:
A face mask detection system: An approach to fight with COVID-19 scenario. - Jinjiao Lin, Tianqi Gao
, Yuhua Wen, Xianmiao Yu, Bi-Zhen You, Yanfang Yin, Yanze Zhao, Haitao Pu:
Graph convolutional neural networks-based assessment of students' collaboration ability. - Vijayant Pawar, Shelly Sachdeva
:
CovidBChain: Framework for access-control, authentication, and integrity of Covid-19 data. - Michaelraj Kingston Roberts
, Jayapratha Thangavel:
An optimized ticket manager based energy-aware multipath routing protocol design for IoT based wireless sensor networks. - Salma Sassi
, Richard Chbeir:
SIMCard: Toward better connected electronic health record visualization. - George Sugitha
, B. C. Preethi, G. Kavitha:
Intrusion detection framework using stacked auto encoder based deep neural network in IOT network. - D. J. Jagannath
, D. Raveena Judie Dolly, Gunamony Shine Let
, James Dinesh Peter:
An IoT enabled smart healthcare system using deep reinforcement learning.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.