default search action
The Computer Journal, Volume 64
Volume 64, Number 1, January 2021
- Shu-Li Zhao, Rong-Xia Hao, Sheng-Lung Peng:
Reliability Assessment of Some Regular Networks. 1-6 - Michael A. Bekos, Henry Förster, Christian Geckeler, Lukas Holländer, Michael Kaufmann, Amadäus M. Spallek, Jan Splett:
A Heuristic Approach Towards Drawings of Graphs With High Crossing Resolution. 7-26 - Tzu-Liang Kung, Hon-Chan Chen, Chia-Hui Lin, Lih-Hsing Hsu:
Three Types of Two-Disjoint-Cycle-Cover Pancyclicity and Their Applications to Cycle Embedding in Locally Twisted Cubes. 27-37 - Xiaoyan Li, Cheng-Kuan Lin, Jianxi Fan, Xiaohua Jia, Baolei Cheng, Jingya Zhou:
Relationship Between Extra Connectivity And Component Connectivity In Networks. 38-53 - Samer Nofal, Katie Atkinson, Paul E. Dunne:
Computing Grounded Extensions Of Abstract Argumentation Frameworks. 54-63 - Eminjan Sabir, Jixiang Meng:
Structure Fault Tolerance of Recursive Interconnection Networks. 64-75 - Yibo Zeng, Zhongzhi Zhang:
Spectra, Hitting Times and Resistance Distances of q- Subdivision Graphs. 76-92 - Jun Liu, Yicheng Pan, Qifu Hu:
Exact Distance Query in Large Graphs through Fast Graph Simplification. 93-107 - Juan Li, Dandan Xiao, Ting Zhang, Chun Liu, Yuan-Xiang Li, Gai-Ge Wang:
Multi-Swarm Cuckoo Search Algorithm with Q-Learning Model. 108-131 - Stéphane Devismes, Anissa Lamani, Franck Petit, Pascal Raymond, Sébastien Tixeuil:
Terminating Exploration Of A Grid By An Optimal Number Of Asynchronous Oblivious Robots. 132-154
Volume 64, Number 2, February 2021
- Yuhong Dong, Zetian Fu, Stevan Stankovski, Yaoqi Peng, Xinxing Li:
A Cotton Disease Diagnosis Method Using a Combined Algorithm of Case-Based Reasoning and Fuzzy Logic. 155-168 - Dattatray P. Gandhmal, Kumar Kannan:
Wrapper-Enabled Feature Selection and CPLM-Based NARX Model for Stock Market Prediction. 169-184 - Alak Roy, Nityananda Sarma:
Multichannel Ordered Contention MAC Protocol For Underwater Wireless Sensor Networks. 185-194 - Muhammad Salek Ali, Massimo Vecchio, Fabio Antonelli:
A Blockchain-Based Framework for IoT Data Monetization Services. 195-210 - Nithya Balasubramanian, Naveen Ranjan, A. Justin Gopinath:
Performance Analysis of Prioritization and Contention Control Algorithm in Wireless Body Area Networks. 211-223 - Wen Cheng, Yuqi Zou, Lingfang Zeng, Yang Wang:
Hercules: Intelligent Coupling of Dual-Mode Flash Memory and Hard Disk Drive. 224-235 - Yi Qi, Wanyue Xu, Liwang Zhu, Zhongzhi Zhang:
Real-World Networks Are Not Always Fast Mixing. 236-244 - A. K. Tripathy, S. K. Tripathy, S. R. Pattanaik, S. K. Das:
A New Algorithm For Reconstruction Of A Computer-Generated Hologram (CGH). 245-253 - Rahil Gandotra, Levi Perigo:
SDVoIP - A Software-Defined VoIP Framework For SIP And Dynamic QoS. 254-263 - Hui Cai, Yanmin Zhu, Jie Li, Jiadi Yu:
A Profit-maximizing Mechanism for Query-based Data Trading with Personalized Differential Privacy. 264-280
Volume 64, Number 3, March 2021
- Sabah Mohammed, Wai-Chi Fang, Aboul Ella Hassanien, Tai-Hoon Kim:
Advanced Data Mining Tools and Methods for Social Computing. 281-285 - Rui Gao, Yuanyuan Zhu, Mingye Li, Shoufeng Li, Xiaohu Shi:
Encoder-Decoder Couplet Generation Model Based on 'Trapezoidal Context' Character Vector. 286-295 - Weidong Huang, Shuting Zhu, Xinkai Yao:
Destination Image Recognition And Emotion Analysis: Evidence From User-Generated Content Of Online Travel Communities. 296-304 - Esra Sarac Essiz, Murat Oturakci:
Artificial Bee Colony-Based Feature Selection Algorithm for Cyberbullying. 305-313 - Ai Wang, Xuedong Gao:
Intelligent Computing: Knowledge Acquisition Method Based on the Management Scale Transformation. 314-324 - Xian Mo, Jun Pang, Zhiming Liu:
Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding. 325-336 - Gang Han, Menggang Li, Yiduo Mei, Deming Li:
Transportation Index Computation: A Development Theme Mining-Based Approach. 337-346 - Niyati Baliyan, Aarti Sharma:
Related Blogs' Summarization With Natural Language Processing. 347-357 - Ahlem Drif, Khalil Hadjoudj:
An Opinion Spread Prediction Model With Twitter Emotion Analysis During Algeria's Hirak. 358-368 - Abir Troudi, Leila Ghorbel, Corinne Amel Zayani, Salma Jamoussi, Ikram Amous:
MDER: Multi-Dimensional Event Recommendation in Social Media Context. 369-382 - Ghazi Abdalla, Fatih Özyurt:
Sentiment Analysis of Fast Food Companies With Deep Learning Models. 383-390 - Mumine Kaya Keles, Umit Kilic, Abdullah Emre Keles:
Proposed Artificial Bee Colony Algorithm as Feature Selector to Predict the Leadership Perception of Site Managers. 408-417 - Ming-Hung Wang:
Positioning and Categorizing Mass Media Using Reaction Emojis on Facebook. 451-461 - Zahid Hussain Wani, Javaid Iqbal Bhat, Kaisar Javeed Giri:
A Generic Analogy-Centered Software Cost Estimation Based on Differential Evolution Exploration Process. 462-472 - Önder Çoban, Selma Ayse Özel, Ali Inan:
Deep Learning-based Sentiment Analysis of Facebook Data: The Case of Turkish Users. 473-499 - Qingyun Li, Jie Han, Lin Lu:
A Random Forest Classification Algorithm Based Personal Thermal Sensation Model for Personalized Conditioning System in Office Buildings. 500-508
Volume 64, Number 4, April 2021
- Cong Li, Qingni Shen, Zhikang Xie, Xinyu Feng, Yuejian Fang, Zhonghai Wu:
Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model. 509-533 - Zhenbin Yan, Yi Deng:
Non-Malleable Zero-Knowledge Arguments with Lower Round Complexity. 534-549 - Hui Cui, Russell Paulet, Surya Nepal, Xun Yi, Butrus Mbimbi:
Two-Factor Decryption: A Better Way to Protect Data Security and Privacy. 550-563 - Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar:
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures. 564-574 - Zhen Liu, Qiong Huang, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors. 575-598 - Tran Nghi Phu, Nguyen Dai Tho, Le Huy Hoang, Nguyen Ngoc Toan, Nguyen Ngoc Binh:
An Efficient Algorithm to Extract Control Flow-Based Features for IoT Malware Detection. 599-609 - Fulei Ji, Wentao Zhang, Tianyou Ding:
Improving Matsui's Search Algorithm For The Best Differential/Linear Trails And Its Applications For DES, DESL And GIFT. 610-627 - Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. 628-638 - Colin Boyd, Kai Gellert:
A Modern View on Forward Security. 639-652 - Xi Jun Lin, Qihui Wang, Lin Sun, Zhen Yan, Peishun Liu:
Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. 653-660 - Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li, Yijian Zhong, Yunzhi Ling:
Efficient Group ID-Based Encryption With Equality Test Against Insider Attack. 661-674
Volume 64, Number 5, May 2021
- Khavee Agustus Botangen, Jian Yu, Wai Kiang Yeap, Quan Z. Sheng:
Integrating Context to Preferences and Goals for Goal-oriented Adaptability of Software Systems. 675-706 - Alejandro Estrada-Moreno, Ismael G. Yero, Juan Alberto Rodríguez-Velázquez:
On The (k, t)-Metric Dimension Of Graphs. 707-720 - Ekaterina Benza, Shmuel T. Klein, Dana Shapira:
Smaller Compressed Suffix Arrays†. 721-730 - Reshma V. K, Vinod Kumar R. S:
Pixel Prediction-Based Image Steganography by Support Vector Neural Network. 731-748 - Yufeng Liu, Xiaoqin Zeng, Kang Zhang, Yang Zou:
Coordinate Graph Grammar for the Specification of Spatial Graphs. 749-761 - Rubing Huang, Haibo Chen, Yunan Zhou, Tsong Yueh Chen, Dave Towey, Man Fai Lau, Sebastian Ng, Robert G. Merkel, Jinfu Chen:
Covering Array Constructors: An Experimental Analysis of Their Interaction Coverage and Fault Detection. 762-788 - Jelle Hellings, Catherine L. Pilachowski, Dirk Van Gucht, Marc Gyssens, Yuqing Wu:
From Relation Algebra to Semi-join Algebra: An Approach to Graph Query Optimization. 789-811 - Mei-Mei Gu, Jou-Ming Chang, Rong-Xia Hao:
Strong Menger Connectedness of Augmented k-ary n-cubes. 812-825 - Cléber Gimenez Corrêa, Márcio E. Delamaro, Marcos Lordello Chaim, Fátima L. S. Nunes:
Software Testing Automation of VR-Based Systems With Haptic Interfaces. 826-841
Volume 64, Number 6, June 2021
- Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D, Gopinath Palaniappan:
Revisiting the Performance of DNS Queries on a DNS Hierarchy Testbed over Dual-Stack. 843-859 - Manel Takrouni, Rim Bouhouch, Salem Hasnaoui:
Simulink Implementation of the Data Distribution Service for Vehicular Controllers on Top of GBE and AFDX. 860-879 - S. Sasikala, S. Gomathi, V. Geetha, L. Murali:
A proposed framework for cloud-aware multimodal multimedia big data analysis toward optimal resource allocation. 880-894 - Yuhong Dong, Zetian Fu, Stevan Stankovski, Yaoqi Peng, Xinxing Li:
A Call Center System based on Expert Systems for the Acquisition of Agricultural Knowledge Transferred from Text-to-Speech in China. 895-908 - Kumar Shaswat:
Hybrid-based Deep Belief Network Model for Cement Compressive Strength Prediction. 909-920 - Jun Yuan, Aixia Liu, Xi Wang:
The Relationship Between the g-Extra Connectivity and the g-Extra Diagnosability of Networks Under the MM* Model. 921-928 - Fu Donglai, Liu Yanhua:
Trust-aware Task Allocation in Collaborative Crowdsourcing Model. 929-940 - Shuhui Chen, Jincheng Zhong, Teng Huang, Ziling Wei, Shuang Zhao:
CMT: An Efficient Algorithm for Scalable Packet Classification. 941-959 - Gugulothu Venkanna, K. F. Bharati:
Optimal Text Document Clustering Enabled by Weighed Similarity Oriented Jaya With Grey Wolf Optimization Algorithm. 960-972 - Meng Li, Meilian Lu:
A Virtual Network Embedding Algorithm Based On Double-Layer Reinforcement Learning. 973-989
Volume 64, Number 7, August 2021
- Xiaofeng Zhu, Kim-Han Thung, Minjeong Kim:
Privacy-preserving Multimedia Data Analysis. 991-992 - Guoqiu Wen, Yonghua Zhu, Linjun Chen, Mengmeng Zhan, Yangcai Xie:
Global and Local Structure Preservation for Nonlinear High-dimensional Spectral Clustering. 993-1004 - Rongyao Hu, Leyuan Zhang, Jian Wei:
Adaptive Laplacian Support Vector Machine for Semi-supervised Learning. 1005-1015 - Waqar Ali, Rajesh Kumar, Zhiyi Deng, Yansong Wang, Jie Shao:
A Federated Learning Approach for Privacy Protection in Context-Aware Recommender Systems. 1016-1027 - Shijie Hao, Zhonghao Wang, Fuming Sun:
LEDet: A Single-Shot Real-Time Object Detector Based on Low-Light Image Enhancement. 1028-1038 - Yuying Liu, Shaoyi Du, Wenting Cui, Xijing Wang, Qingnan Mou, Jiamin Zhao, Yucheng Guo, Yong Zhang:
Precise Point Set Registration Based on Feature Fusion. 1039-1055 - Jianxing Yu, Shiqi Wang, Jian Yin:
Adaptive Cross-Lingual Question Generation with Minimal Resources. 1056-1068 - Guangquan Lu, Jihong Huang:
Learning Representation From Concurrence-Words Graph For Aspect Sentiment Classification. 1069-1079 - Jiangzhang Gan, Tong Liu, Li Li, Jilian Zhang:
Non-negative Matrix Factorization: A Survey. 1080-1092 - Liang Peng, Fei Kong, Chongzhi Liu, Ping Kuang:
Robust and Dynamic Graph Convolutional Network For Multi-view Data Classification. 1093-1103 - Meiling Liu, Beixian Zhang, Xi Li, Weidong Tang, Gangqiang Zhang:
An Optimized k-means Algorithm Based on Information Entropy. 1130-1143
Volume 64, Number 8, August 2021
- Mojtaba Rafiee, Shahram Khazaei:
Private Set Operations Over Encrypted Cloud Dataset and Applications. 1145-1162 - Zirui Qiao, Qiliang Yang, Yanwei Zhou, Zhe Xia, Mingwu Zhang:
Novel Public-Key Encryption with Continuous Leakage Amplification. 1163-1177 - Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Privacy-Aware Image Authentication from Cryptographic Primitives. 1178-1192 - Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi:
A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm. 1193-1214 - Yong Fang, Yuchi Zhang, Cheng Huang:
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network. 1215-1225 - Hao Lin, Zhen Zhao, Fei Gao, Willy Susilo, Qiaoyan Wen, Fuchun Guo, Yijie Shi:
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage. 1226-1238 - Sha Ma, Qiong Huang:
CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model. 1239-1252 - Sudong Ma, Jie Guan:
Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher. 1253-1263 - Gaoli Wang, Zhenfu Cao, Xiaolei Dong:
Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. 1264-1276 - Hailong Zhang, Wei Yang:
Theoretical Estimation on the Success Rate of the Asymptotic Higher Order Optimal Distinguisher. 1277-1292 - Ji Sun Shin, Minjae Jo, Jung Yeon Hwang, Jaehwan Lee:
A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware. 1293-1302 - Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang:
Unlinkable and Revocable Secret Handshake. 1303-1314
Volume 64, Number 9, September 2021
- Xiaoyang Liu, Ting Tang, Daobing He:
Double-Layer Network Negative Public Opinion Information Propagation Modeling Based on Continuous-Time Markov Chain. 1315-1325 - Falak Nawaz, Naeem Khalid Janjua:
Dynamic QoS-Aware Cloud Service Selection Using Best-Worst Method and Timeslot Weighted Satisfaction Scores. 1326-1342 - Diana Popova, Ken-ichi Kawarabayashi, Alex Thomo:
CutTheTail: An Accurate and Space-Efficient Heuristic Algorithm for Influence Maximization. 1343-1357 - Zahra Abdi Reyhan, Shahriar Lotfi, Ayaz Isazadeh, Jaber Karimpour:
Intra-Tile Parallelization for Two-Level Perfectly Nested Loops With Non-Uniform Dependences. 1358-1383 - Caixia Liang, Bo Zhou, Haiyan Guo:
Minimum Status, Matching and Domination of Graphs. 1384-1392 - Hong Zhang, Jixiang Meng:
Reliability of DQcube Based on g-Extra Conditional Fault. 1393-1400 - Guanqin Lian, Shuming Zhou, Eddie Cheng, Jiafei Liu, Gaolin Chen:
Persistence of Hybrid Diagnosability of Regular Networks Under Testing Diagnostic Model. 1401-1411 - Fei Ma, Ping Wang:
Determining Exact Solutions for Structural Parameters on Hierarchical Networks With Density Feature. 1412-1424 - Mei-Mei Gu, Rong-Xia Hao, Jou-Ming Chang:
Reliability Analysis of Alternating Group Graphs and Split-Stars. 1425-1436 - Vinicius Fulber-Garcia, Sérgio Luis Sardi Mergen:
LUISA: Decoupling the Frequency Model From the Context Model in Prediction-Based Compression. 1437-1450 - Mengjie Lv, Baolei Cheng, Jianxi Fan, Xi Wang, Jingya Zhou, Jia Yu:
The Conditional Reliability Evaluation of Data Center Network BCDC. 1451-1464
Volume 64, Number 10, October 2021
- Liqing Qiu, Jianyi Zhang, Xiangbo Tian, Shuang Zhang:
Identifying Influential Nodes in Complex Networks Based on Neighborhood Entropy Centrality. 1465-1476 - Kannan Krishnan, B. Yamini, Wael Mohammad Alenazy, M. Nalini:
Energy-Efficient Cluster-Based Routing Protocol for WSN Based on Hybrid BSO-TLBO Optimization Model. 1477-1493 - R. Prasath, T. Kumanan:
Underwater Image Enhancement With Optimal Histogram Using Hybridized Particle Swarm and Dragonfly. 1494-1513 - Rajan Cristin, K. Suresh Kumar, P. Anbhazhagan:
Severity Level Classification of Brain Tumor based on MRI Images using Fractional-Chicken Swarm Optimization Algorithm. 1514-1530 - A. Francis Alexander Raghu, John Patrick Ananth:
Robust Object Detection and Localization Using Semantic Segmentation Network. 1531-1548 - Safikureshi Mondal, Nandini Mukherjee:
Pruning of Health Data in Mobile-Assisted Remote Healthcare Service Delivery. 1549-1564 - Hari T. S. Narayanan:
Contact Tracing Solution for Global Community. 1565-1574 - Adrien Gausseran, Frédéric Giroire, Brigitte Jaumard, Joanna Moulierac:
Be Scalable and Rescue My Slices During Reconfiguration. 1584-1599 - Zhu Yuan, Xindong You, Xueqiang Lv, Ping Xie:
SS6: Online Short-Code RAID-6 Scaling by Optimizing New Disk Location and Data Migration. 1600-1616
Volume 64, Number 11, November 2021
- Akshma Chadha, Baijnath Kaushik:
A Survey on Prediction of Suicidal Ideation Using Machine and Ensemble Learning. 1617-1632 - Mohammad Farhad Bulbul, Saiful Islam, Yatong Zhou, Hazrat Ali:
Improving Human Action Recognition Using Hierarchical Features And Multiple Classifier Ensembles. 1633-1655 - Zhenjun Tang, Mengzhu Yu, Heng Yao, Hanyun Zhang, Chunqiang Yu, Xianquan Zhang:
Robust Image Hashing With Singular Values Of Quaternion SVD. 1656-1671 - Ayesha Ata, Muhammad Adnan Khan, Sagheer Abbas, Muhammad Saleem Khan, Gulzar Ahmad:
Adaptive IoT Empowered Smart Road Traffic Congestion Control System Using Supervised Machine Learning Algorithm. 1672-1679 - Reza Gharibi, Atefeh Safdel, Seyed Mostafa Fakhrahmad, Mohammad Hadi Sadreddini:
A Content-Based Model for Tag Recommendation in Software Information Sites. 1680-1691 - V. Vinolin, M. Sucharitha:
Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection. 1692-1704 - Zhijun Liu, Xuefeng Pan, Yuan Peng:
Character Recognition Algorithm Based on Fusion Probability Model and Deep Learning. 1705-1714 - Tayyip Özcan, Alper Bastürk:
Performance Improvement Of Pre-trained Convolutional Neural Networks For Action Recognition. 1715-1730 - Talha Mahboob Alam, Kamran Shaukat, Mubbashar Mushtaq, Yasir Ali, Matloob Khushi, Suhuai Luo, Abdul Wahab:
Corporate Bankruptcy Prediction: An Approach Towards Better Corporate World. 1731-1746 - V. Nancy, G. Balakrishnan:
Thermal Image-Based Object Classification for Guiding the Visually Impaired. 1747-1759 - S. Guruvammal, T. Chellatamilan, L. Jegatha Deborah:
Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children. 1760-1774 - Ahmet Gökçen:
Computer-Aided Diagnosis System for Chronic Obstructive Pulmonary Disease Using Empirical Wavelet Transform on Auscultation Sounds. 1775-1783
Volume 64, Number 12, December 2021
- Anterpreet Kaur Bedi, Ramesh Kumar Sunkaria, Deepti Mittal:
Ultrasound Image Despeckling and Enhancement using Modified Multiscale Anisotropic Diffusion Model in Non-Subsampled Shearlet Domain. 1785-1800 - Anup Aprem, Stephen Roberts:
A Bayesian Optimization Approach to Compute Nash Equilibrium of Potential Games Using Bandit Feedback. 1801-1813 - Li Lu, Jian Liu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Linghe Kong, Minglu Li:
Enable Traditional Laptops with Virtual Writing Capability Leveraging Acoustic Signals. 1814-1831 - Sana Khanam, Safdar Tanweer, Syed Sibtain Khalid:
Artificial Intelligence Surpassing Human Intelligence: Factual or Hoax. 1832-1839 - Utkarsh Mahadeo Khaire, R. Dhanalakshmi:
Effects of Random Forest Parameters in the Selection of Biomarkers. 1840-1847 - Rim Afdhal, Ridha Ejbali, Mourad Zaied:
Primary Emotions and Recognition of Their Intensities. 1848-1860 - Vishan Kumar Gupta, Prashant Singh Rana:
Ensemble Technique for Toxicity Prediction of Small Drug Molecules of the Antioxidant Response Element Signalling Pathway. 1861-1875 - Mahmoud Elmezain, Hani M. Ibrahem:
Retrieving Semantic Image Using Shape Descriptors and Latent-Dynamic Conditional Random Fields. 1876-1885 - S. Veluchamy, L. R. Karlmarx, K. Michael Mahesh:
Detection and Localization of Abnormalities in Surveillance Video Using Timerider-Based Neural Network. 1886-1906
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.