Stop the war!
Остановите войну!
for scientists:
default search action
The Journal of Supercomputing, Volume 80
Volume 80, Number 1, January 2024
- Zhiyong Zhou, Yuanning Liu, Xiaodong Zhu, Shuai Liu, Shaoqiang Zhang, Yuanfeng Li, Zhen Liu:
Lifelong iris presentation attack detection without forgetting. 1-19 - Dahai Xia, Xinyun Wu, Meng Yan, Caiquan Xiong:
An adaptive stochastic ranking-based tournament selection method for differential evolution. 20-49 - Khalid Javeed, Ali El-Moursy, David Gregg:
E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p). 50-74 - Chandan Kumar, Sudhanshu Kumar Jha, Dilip Kumar Yadav, Shiv Prakash, Mukesh Prasad:
A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic. 75-97 - Avita Katal, Tanupriya Choudhury, Susheela Dahiya:
Energy optimized container placement for cloud data centers: a meta-heuristic approach. 98-140 - Sally Mohamed Sameh, Hossam El-Din Moustafa, Ehab H. Abdelhay, Mohamed Maher Ata:
An effective chaotic maps image encryption based on metaheuristic optimizers. 141-201 - Huafeng Wu, Feng Wang, Xiaojun Mei, Linian Liang, Bing Han, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li:
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors. 202-225 - Omar Younis Abdulhammed:
A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. 226-248 - Na Dong, Qingyue Feng, Jianfang Chang, Xiaoming Mai:
White blood cell classification based on a novel ensemble convolutional neural network framework. 249-270 - R. Rajalakshmi, P. Sivakumar, L. Krishna Kumari, M. Chengathir Selvi:
A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism. 271-291 - Rebecca H. K. Emanuel, Paul David Docherty, Helen Lunt, Knut Möller:
The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration. 292-312 - Yonghao Lai, Xiaohui Hua:
Component edge connectivity and extra edge connectivity of alternating group networks. 313-330 - Jin Yang, Wangdong Yang, Ruixuan Qi, Qinyun Tsai, Shengle Lin, Fengkun Dong, Kenli Li, Keqin Li:
Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer. 331-362 - Chih-Yung Chang, Syu-Jhih Jhang, Shih-Jung Wu, Diptendu Sinha Roy:
JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP. 363-394 - Ruisheng Ran, Ting Wang, Zheng Li, Bin Fang:
Polynomial linear discriminant analysis. 413-434 - Ju-Won Park, Xin Huang, Chul-Ho Lee:
Analyzing and predicting job failures from HPC system log. 435-462 - Emmanuel Ahishakiye, Waweru Mwangi, Petronilla Muriithi, Fredrick Kanobe, Godliver Owomugisha, Danison Taremwa, Lenard Nkalubo:
Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data. 463-485 - Beste Ustubioglu, Gul Tahaoglu, Güzin Ulutas, Arda Ustubioglu, Muhammed Kilic:
Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach. 486-518 - Tian Tian, Anshi Wang, Xiuting Yang, Dunwei Gong, Tie Hou, Xiangjuan Yao:
Parallel program testing based on critical communication and branch transformation. 519-548 - Tobias Piontek, Kawsar Haghshenas, Marco Aiello:
Carbon emission-aware job scheduling for Kubernetes deployments. 549-569 - Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali:
SOS-FCI: a secure offloading scheme in fog-cloud-based IoT. 570-600 - Hamed Jalilian:
Total variation method based on modified Barzilai-Borwein algorithm to noise reduction in MRI images. 601-619 - Qun Li, Bei Tang, Jianxin Li, Siguang Chen:
User satisfaction-based energy-saving computation offloading in fog computing networks. 620-641 - Rong Gao, Wei He, Lingyu Yan, Donghua Liu, Yonghong Yu, Zhiwei Ye:
Hybrid graph transformer networks for multivariate time series anomaly detection. 642-669 - Fatemeh Vardi, Alireza Mahjoub:
A hot-module-aware mapping approach in network-on-chip. 670-702 - Sujit Sangram Sahoo, Vijay Kumar Chaurasiya:
Proof of location based delivery system using multi-party virtual state channel: a blockchain model. 703-733 - Mao-Lun Chiang, Hui-Ching Hsieh, Tzu-Ling Lin, Tsui-Ping Chang, Hong-Wei Chen:
Dynamic weight-based connectivity recovery in wireless sensor and actor networks. 734-760 - Elham Dalirinia, Mehrdad Jalali, Mahdi Yaghoobi, Hamid Tabatabaee:
Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization. 761-799 - Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee, Ahmad Keshavarz:
A new improved KNN-based recommender system. 800-834 - Dikshit Chauhan, Anupam Yadav:
Stability and agent dynamics of artificial electric field algorithm. 835-864 - Namrata Singh, Ayan Kumar Das:
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor. 865-914 - Zahra Mahmoodabadi, Mostafa Nouri-Baygi:
An approximation algorithm for virtual machine placement in cloud data centers. 915-941 - Rakesh Kumar, Sunil K. Singh, D. K. Lobiyal:
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks. 942-969 - Sheng-Tzong Cheng, Gwo-Jiun Horng, Chih-Wei Hsu, Z.-Yu Su:
Per-user network access control kernel module with secure multifactor authentication. 970-1008 - Maedeh Khalifavi, Zahra Shirmohammadi, Sahar Kianian:
FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method. 1009-1036 - Tariq Shah, Tanveer ul Haq:
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. 1037-1058 - Mehmet Bozdal, Kadir Ileri, Ali Ozkahraman:
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset. 1059-1079 - Indushree M, Manish Raj:
A novel Blockchain-based authentication scheme for telecare medical information system. 1080-1108 - Sadoon Azizi, Pedram Farzin, Mohammad Shojafar, Omer F. Rana:
A scalable and flexible platform for service placement in multi-fog and multi-cloud environments. 1109-1136 - Tundong Liu, Fengqiang Gao, Xin Chen, Guifang Shao, Chenhan Wang:
Research on load-balancing scheduling optimization for wafer surface defect detection. 1137-1159 - Jihene Latrech, Zahra Kodia, Nadia Ben Azzouna:
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning. 1160-1182 - Zuoyan Zhang, Jinchen Xu, Jiangwei Hao, Yang Qu, Haotian He, Bei Zhou:
Hierarchical search algorithm for error detection in floating-point arithmetic expressions. 1183-1205 - Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaz-Nava, Enrico Ferrera:
Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance. 1206-1237 - Sumit Sharma, Sarika Jain:
CovidO: an ontology for COVID-19 metadata. 1238-1267 - Sibo Qi, Juan Chen, Peng Chen, Peian Wen, Xianhua Niu, Lei Xu:
An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers. 1268-1293 - Xiaomei Li, Ye Lu, Xiaoyu Zhao, Xiong Deng, Zhijiang Xie:
Path planning for intelligent vehicles based on improved D* Lite. 1294-1330 - C. Pabitha, B. Vanathi:
Dense Mesh RCNN: assessment of human skin burn and burn depth severity. 1331-1362 - Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien-Hsiung Weng, Kuan-Ching Li:
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data. 1363-1364 - Minghua Tang, Enrico Russo, Maurizio Palesi:
Correction to: The position-based compression techniques for DNN model. 1365 - Yifei Wang, Mert Pilanci:
Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path. 1366
Volume 80, Number 2, January 2024
- Preetpal Kaur Buttar, Manoj Kumar Sachan:
Semantic segmentation of satellite images for crop type identification in smallholder farms. 1367-1395 - Zhonghua Chen, S. B. Goyal, Anand Singh Rajawat:
Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. 1396-1425 - Xiaoxin Gao, Fazhi He, Songwei Zhang, Jinkun Luo, Bo Fan:
A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively. 1426-1463 - Bahram Rashidi:
Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection. 1464-1490 - Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:
An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing. 1491-1521 - Santosh Kumar Uppada, B. S. Ashwin, B. Sivaselvan:
A novel evolutionary approach-based multimodal model to detect fake news in OSNs using text and metadata. 1522-1553 - Melika Amiri, Massoud Dousti, Majid Mohammadi:
Design and implementation of carry-save adder using quantum-dot cellular automata. 1554-1567 - Md Yeasin, Ranjit Kumar Paul:
OptiSembleForecasting: optimization-based ensemble forecasting using MCS algorithm and PCA-based error index. 1568-1597 - Carmen Carrión:
Research streams and open challenges in the metaverse. 1598-1639 - Zhaoxia Tian, Mingzu Zhang, Xing Feng:
Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links. 1640-1667 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures. 1668-1693 - Yi Yang, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 1694-1727 - Amjad Qtaish, Malik Braik, Dheeb Albashish, Mohammad T. Alshammari, Abdulrahman Alreshidi, Eissa Jaber Alreshidi:
Optimization of K-means clustering method using hybrid capuchin search algorithm. 1728-1787 - Shaurya Sood, Neminath Hubballi:
SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters. 1788-1817 - Arvind Mewada, Rupesh Kumar Dewang:
NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media. 1818-1851 - Mirna Magdy, Mohamed O. Grida, Gawaher S. Hussein:
Disruption mitigation in the semiconductors supply chain by using public blockchains. 1852-1906 - Huanwen Zhang, Yan Wang, Jianxi Fan, Yuejuan Han, Baolei Cheng:
Constructing edge-disjoint spanning trees in several cube-based networks with applications to edge fault-tolerant communication. 1907-1934 - Nartay Aikyn, Ardan Zhanegizov, Temirlan Aidarov, Dinh-Mao Bui, Nguyen Anh Tu:
Efficient facial expression recognition framework based on edge computing. 1935-1972 - Divya Paikaray, Ashok Kumar Mehta, Danish Ali Khan:
Optimized convolutional neural network for the classification of lung cancer. 1973-1989 - Ramzi A. Haraty, Ali Assaf:
DG-means: a superior greedy algorithm for clustering distributed data. 1990-2024 - Yanjiang Han, Fengping Wang, Wei Wang, Xiangyu Li, Jianyang Zhang:
YOLO-SG: Small traffic signs detection method in complex scene. 2025-2046 - Yuju Wang, Liang-Hong Wu, Liang-Chuan Wu:
An integrative extraction approach for index-tracking portfolio construction and forecasting under a deep learning framework. 2047-2066 - Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi, Shahram Etemadi Borujeni:
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems. 2067-2127 - Massoud Seifpour, Seyyed Amir Asghari, Mostafa Ghobaei-Arani:
A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach. 2128-2163 - P. Mathivanan, Maran Ponnambalam:
Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 2164-2195 - Xiaohong Li, Qixuan Peng, Ruihong Li, Huifang Ma:
Dual graph neural network for overlapping community detection. 2196-2222 - Pijush Kanti Dutta Pramanik, Saurabh Pal, Prasenjit Choudhury:
Mobile crowd computing: potential, architecture, requirements, challenges, and applications. 2223-2318 - Haiying Liu, ZhiHao Li, Kuihua Huang, Rui Wang, Guangquan Cheng, Tiexiang Li:
Evolutionary reinforcement learning algorithm for large-scale multi-agent cooperation and confrontation applications. 2319-2346 - S. Saumiya, S. Wilfred Franklin:
Unified automated deep learning framework for segmentation and classification of liver tumors. 2347-2380 - Hengliang Guo, Long Zhang, Yi Zhang, Jianan Li, Xiaoyue Xu, Lu Liu, Kuangsheng Cai, Dan Wu, Shuxin Yang, Lingbo Kong, Xu Gao:
OpenMP offloading data transfer optimization for DCUs. 2381-2402 - Shaimaa E. Nassar, Ibrahim Yasser, Hanan M. Amer, Mohamed A. Mohamed:
A robust MRI-based brain tumor classification via a hybrid deep learning technique. 2403-2427 - Chakaravarthi Sivanandam, Vaishnnave Mala Perumal, Jagadeesh Mohan:
A novel light GBM-optimized long short-term memory for enhancing quality and security in web service recommendation system. 2428-2460 - Usha Patel, Vibha Patel:
Active learning-based hyperspectral image classification: a reinforcement learning approach. 2461-2486 - Chenxing Xia, Difeng Chen, Xiuju Gao, Bin Ge, Kuan-Ching Li, Xianjin Fang, Yan Zhang, Ke Yang:
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection. 2487-2513 - Chandrashekhar Meshram, Mohammad S. Obaidat, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Arpit Vijay Raikwar:
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments. 2514-2537 - Tinka Singh, Ramagopal V. S. Uppaluri:
Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters. 2538-2571 - Khalid A. Darabkh, Thara A. Alzboun, Marwa H. Al-Tahaineh:
A novel routing protocol for stable route selection in IoT networks. 2572-2600 - Bahar Ghasemi, Mahmood Ahmadi, Hamed Alimohammadi:
A neural gas network-based scheme for SDN many-field packet classification. 2601-2632 - Oussama Azzouzi, Mohamed Anane, Mouloud Koudil, Mohamed Issad, Yassine Himeur:
Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA. 2633-2659 - Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma:
Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks. 2660-2680 - Divya Rani, Sachin Tripathi:
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. 2681-2717 - Peda Gopi Arepalli, K. Jairam Naik:
A deep learning-enabled IoT framework for early hypoxia detection in aqua water using light weight spatially shared attention-LSTM network. 2718-2747 - Bo Zhou, Hai Huang, Jun Xia, Donghai Tian:
A novel malware detection method based on API embedding and API parameters. 2748-2766 - Lijun Qi, Jincheng Zhuang:
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing. 2767-2798 - Youwei Wang, Lizhou Feng, Ao Liu, Weiqi Wang, Yudong Hou:
Dual BiGRU-CNN-based sentiment classification method combining global and local attention. 2799-2837 - Tengteng Cheng, Guosun Zeng, Zhipeng Sun:
A big graph clustering method to support parallel processing by perceiving graph's application algorithm semantics. 2838-2861 - G. Sivapriya, R. Manjula Devi, Keerthika Periasamy:
Computer-aided diagnostic model for retinal vascular diseases using graph-based attention mechanism. 2862-2888 - Yuxin Tang, Yudi Qiu, Yanwei Liu, Jie Jiao, Peng Zhang, Yibo Fan:
Scalable short-entry dual-grain coherence directories with flexible region granularity. 2889-2911 - Raushan Kumar Singh, Mukesh Kumar:
Correction to: Future trends of path planning framework considering accident attributes for smart cities. 2912 - Parisa Kavianpour, Mohammadreza Kavianpour, Ehsan Jahani, Amin Ramezani:
Correction to: A CNN-BiLSTM model with attention mechanism for earthquake prediction. 2913 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures. 2914-2915
Volume 80, Number 3, February 2024
- Ismail Biri, Ülkü Tuncer Küçüktas, Fatih Uysal, Firat Hardalaç:
Forecasting the future popularity of the anti-vax narrative on Twitter with machine learning. 2917-2947 - Jiaxin Chen, Xuguang Zhang, Yinggan Tang, Hui Yu:
ICE-YoloX: research on face mask detection algorithm based on improved YoloX network. 2948-2969 - Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava:
Internet of medical things-based authentication for an optimized watermarking of encrypted EEG. 2970-3004 - Luttfi A. Al-Haddad, Alaa Abdulhady Jaber, Sinan A. Al-Haddad, Yousif M. Al-Muslim:
Fault diagnosis of actuator damage in UAVs using embedded recorded data and stacked machine learning models. 3005-3024 - Guangjin Wang, Yuanying Wang, Fuyong Xu, Yongsheng Zhang, Peiyu Liu:
Syntactic and semantic dual-enhanced bidirectional network for aspect sentiment triplet extraction. 3025-3041 - Hongxia Zhang, Mengde Wu, Qiqi Feng, Hao Li:
AERQP: adaptive embedding representation-based QoS prediction for web service recommendation. 3042-3065 - Arash Ahmadi, Amanj Khorramian:
Efficient Brute-force state space search for Yin-Yang puzzle. 3066-3088 - K. Uma Maheswari, S. Mary Saira Bhanu, Nickolas Savarimuthu:
Clustering-based data integrity verification approach for multi-replica in a fog environment. 3089-3113 - Yilu Chen, Miaodi Su, Hongzhi Ding, Shaohong Weng, Zhifeng Lin, Xiqiong Bai:
High-correlation 3D routability estimation for congestion-guided global routing. 3114-3141 - Xuesong Wang, Zheng Zhang, Dongsheng Zhang, Limin Ding:
Pose visual detection method for cellphone dropping process incorporating prior information. 3142-3161 - Ruihang Xu, Peisen Wang, Xuanjing Li, Ruifeng Nie:
YOLO-ARGhost: a lightweight face mask detection model. 3162-3182 - Mei Bai, Qibo Wang, Shihan Chang, Xite Wang, Guanyu Li:
Location-based skyline query processing technology in road networks. 3183-3211 - Yanni Yang, Yiting Tan, Jintao Min, Zhengwei Huang:
Automatic text summarization for government news reports based on multiple features. 3212-3228 - Saif Eddine Khouni, Tidjani Menacer:
Nizar optimization algorithm: a novel metaheuristic algorithm for global optimization and engineering applications. 3229-3281 - Lin Zhang, Fang'ai Liu, Hongchen Wu, Xuqiang Zhuang, Yaoyao Yan:
CFF: combining interactive features and user interest features for click-through rate prediction. 3282-3309 - Xiao Liu, Junlong Chen, Deyu Qi, Tong Zhang:
Exploration of low-resource language-oriented machine translation system of genetic algorithm-optimized hyper-task network under cloud platform technology. 3310-3333 - Jianxin Tang, Shihui Song, Hongyu Zhu, Qian Du, Jitao Qu:
Sequential seeding policy on social influence maximization: a Q-learning-driven discrete differential evolution optimization. 3334-3359 - Junfan Wang, Yi Chen, Yeting Gu, Yunfeng Yan, Qi Li, Mingyu Gao, Zhekang Dong:
A lightweight vehicle mounted multi-scale traffic sign detector using attention fusion pyramid. 3360-3381 - Xu Gu, Xiaoliang Chen, Peng Lu, Xiang Lan, Xianyong Li, Yajun Du:
SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing. 3382-3411 - Xinnan Ding, Shan Du, Yu Zhang, Kejun Wang:
Spatiotemporal multi-scale bilateral motion network for gait recognition. 3412-3440 - Louiza Belkhiri-Brahmi, Samira Yessad, Fouzi Semchedine:
Congestion control-based sink MOBility pattern for data gathering optimization in WSN. 3441-3479 - Wei Li, Yetong Gao, Lei Wang:
A multipopulation particle swarm optimization based on divergent guidance and knowledge transfer for multimodal multiobjective problems. 3480-3527 - Soroush Babaee Khobdeh, Mohammad Reza Yamaghani, Siavash Khodaparast Sareshkeh:
Basketball action recognition based on the combination of YOLO and a deep fuzzy LSTM network. 3528-3553 - Rajesh Dwivedi, Aruna Tiwari, Neha Bharill, Milind B. Ratnaparkhe, Parul Mogre, Pranjal Gadge, Kethavath Jagadeesh:
A novel apache spark-based 14-dimensional scalable feature extraction approach for the clustering of genomics data. 3554-3588 - Quan Yuan, Shanshan Wang, Mai Hu, Liang Zeng:
SLDChOA: a comprehensive and competitive multi-strategy-enhanced chimp algorithm for global optimization and engineering design. 3589-3643 - Runsheng Liu, Wencong Cai, Junyang Zhang, Xiaoling Wu, Lilin Yang, Kaiqing Luo:
CF-lines: a fusing contour features optimization method for line segment detector. 3644-3662 - Nan Gao, Bowei Yang, Peng Chen, Li Ping Qian:
A multi-stage recognizer for nested named entity with weakly labeled data. 3663-3693 - Samira Shirinabadi Farahani, Mohammad Reza Reshadinezhad, Seyed Erfan Fatemieh:
New design for error-resilient approximate multipliers used in image processing in CNTFET technology. 3694-3712 - A. Ahila, V. Prema, S. Ayyasamy, M. Sivasubramanian:
An enhanced deep learning model for high-speed classification of plant diseases with bioinspired algorithm. 3713-3737 - Sarra Cherbal, Abdelhak Zier, Sara Hebal, Lemia Louail, Boubakeur Annane:
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. 3738-3816 - Yaqian Tang, Baolei Cheng, Yan Wang, Yuejuan Han, Jia Yu, Jianxi Fan:
Connectivity and diagnosability of a class of recursive networks. 3817-3848 - Zhenghong Wang, Fanhua Yu, Dan Wang, Taihui Liu, Rongjun Hu:
Multi-threshold segmentation of breast cancer images based on improved dandelion optimization algorithm. 3849-3874 - Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai:
STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things. 3875-3901 - Djihad Arrar, Nadjet Kamel, Abdelaziz Lakhfif:
A comprehensive survey of link prediction methods. 3902-3942 - Sultan Noman Qasem:
A novel honey badger algorithm with multilayer perceptron for predicting COVID-19 time series data. 3943-3969 - Ismael Boureima, Manish Bhattarai, Maksim Ekin Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov:
Distributed out-of-memory NMF on CPU/GPU architectures. 3970-3999 - Neha Bansal, Shelly Sachdeva, Lalit Kumar Awasthi:
Schema generation for document stores using workload-driven approach. 4000-4048 - Subeen Leem, Jisong Oh, Jihoon Moon, Mucheol Kim, Seungmin Rho:
Enhancing multistep-ahead bike-sharing demand prediction with a two-stage online learning-based time-series model: insight from Seoul. 4049-4082 - Salih Berkan Aydemir:
Ideal solution candidate search for starling murmuration optimizer and its applications on global optimization and engineering problems. 4083-4156 - Rihab Abidi, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos, Nabil Sahli:
A study of mechanisms and approaches for IoV trust models requirements achievement. 4157-4201 - Xiaoyu Zheng, Dewang Chen, Zhiming Lin, Liping Zhuang, Wendi Zhao:
Method on generating massive virtual driving curves for high-speed trains of the Cross-Taiwan Strait Railway and its statistical analysis. 4202-4225 - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:
Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services. 4226-4247 - Chao Yin, Qin Fang, Hongyi Li, Yingjian Peng, Xiaogang Xu, Dan Tang:
An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing. 4248-4285 - Shwet Ketu, Pramod Kumar Mishra:
An intelligent hybrid classification model for heart disease detection using imbalanced electrocardiogram signals. 4286-4308 - Junjun Jiao, Zhisheng Chen, Tao Zhou:
Minimal Kapur cross-entropy-based image segmentation for distribution grid inspection using improved INFO optimization algorithm. 4309-4352 - Shengbin Liang, Fuqi Sun, Haoran Sun, Tingting Chen, Wencai Du:
A medical text classification approach with ZEN and capsule network. 4353-4377 - Ashok Kumar Yadav, Karan Singh, Pramod Kumar Srivastava:
Probabilistic estimation of comprehensive utility based on user preference and network condition for network selection in future in HetNet. 4378-4400 - Yuan Zhou, Lei Xiang, Fan Liu, Haoran Duan, Yang Long:
Dynamic visual-guided selection for zero-shot learning. 4401-4419 - P. Mathivanan, Maran Ponnambalam:
Correction to: Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 4420-4422
Volume 80, Number 4, March 2024
- Di Li, Lang Li, Yu Ou:
Side-channel analysis based on Siamese neural network. 4423-4450 - Hongwei Zhang, Shuaibo Liu, Chi Wang, Shuai Lu, Wenbo Xiong:
Color-patterned fabric defect detection algorithm based on triplet attention multi-scale U-shape denoising convolutional auto-encoder. 4451-4476 - K. Hemant Kumar Reddy, Rajat Shubhra Goswami, Diptendu Sinha Roy:
A deep learning-based smart service model for context-aware intelligent transportation system. 4477-4499 - Yanru Liu, Jiali Xu, Austin Lin Yee:
The analysis of Iris image acquisition and real-time detection system using convolutional neural network. 4500-4532 - Mehmet Akif Bülbül:
Optimization of artificial neural network structure and hyperparameters in hybrid model by genetic algorithm: iOS-android application for breast cancer diagnosis/prediction. 4533-4553 - Masashi Kuwano, Mio Hosoe, Taku Moriyama:
Prediction of railroad user count using number of route searches via bivariate state-space modeling. 4554-4576 - Yuqin Song, Jitao Zhao, Chunliang Shang:
A multi-stage feature fusion defogging network based on the attention mechanism. 4577-4599 - Mahboubeh Afzali, Amin Mohammad Vali Samani, Hamid Reza Naji:
An efficient resource allocation of IoT requests in hybrid fog-cloud environment. 4600-4624 - Shao Deng, Shanzhu Xiao, Qiuqun Deng, Huanzhang Lu:
A hovering swarm particle swarm optimization algorithm based on node resource attributes for hardware/software partitioning. 4625-4647 - Anit Kumar Ghosal, Amit Sardar, Dipanwita Roychowdhury:
Differential fault analysis attack-tolerant hardware implementation of AES. 4648-4681 - Min Tian, Qi Liu, Jingshan Pan, Ying Gou, Zanjun Zhang:
swPTS: an efficient parallel Thomas split algorithm for tridiagonal systems on Sunway manycore processors. 4682-4706 - Sadiqa Jafari, Yung Cheol Byun:
Accurate remaining useful life estimation of lithium-ion batteries in electric vehicles based on a measurable feature-based approach with explainable AI. 4707-4732 - Eht E. Sham, Deo Prakash Vidyarthi:
A modified fuzzy similarity measure for trapezoidal fuzzy number with their applications. 4733-4759 - Rawaa Alatrash, Rojalina Priyadarshini, Hadi Ezaldeen:
Collaborative filtering integrated fine-grained sentiment for hybrid recommender system. 4760-4807 - Ali Dabba, Abdelkamel Tari, Samy Meftali:
A novel grey wolf optimization algorithm based on geometric transformations for gene selection and cancer classification. 4808-4840 - Adeola Borode, Peter A. Olubambi:
Optimisation of artificial intelligence models and response surface methodology for predicting viscosity and relative viscosity of GNP-alumina hybrid nanofluid: incorporating the effects of mixing ratio and temperature. 4841-4869 - Neetu Sharma, Rajesh Rohilla:
A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management. 4870-4913 - Ruyi Cao, Wanghao Mo, Wendong Zhang:
MFMDet: multi-scale face mask detection using improved Cascade rcnn. 4914-4942 - Xiaoxiao Sun, Siqing Yang, Chenying Zhao, Dongjin Yu:
Design-time business process compliance assessment based on multi-granularity semantic information. 4943-4971 - Jingan Lu, Zhenfang Zhu, Kefeng Li, Shuai Gong, Hongli Pei, Wenling Wang:
Gtpsum: guided tensor product framework for abstractive summarization. 4972-4995 - Guifang Zhang, Hon-Cheng Wong:
Saliency-based dual-attention network for unsupervised video object segmentation. 4996-5010 - Mohamed Yassine Landolsi, Lotfi Ben Romdhane, Lobna Hlaoua:
Hybrid medical named entity recognition using document structure and surrounding context. 5011-5041 - Yan Kang, Xiaoshe Dong, Ziheng Wang, Heng Chen, Qiang Wang:
Parallel implementations of post-quantum leighton-Micali signature on multiple nodes. 5042-5072 - Siti Nuraishah Agos Jawaddi, Azlan Ismail, Muhammad Nur Haziq Mohammad Hatta, Anis Faqihah Kamarulzaman:
Insights into cloud autoscaling: a unique perspective through MDP and DTMC formal models. 5073-5107 - Shreyshi Shree, Chen Zhou, Masoud Barati:
Data protection in internet of medical things using blockchain and secret sharing method. 5108-5135 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang, Peiying Zhang, Laith Abualigah:
Load balancing strategy for SDN multi-controller clusters based on load prediction. 5136-5162 - Swati Gupta, Niraj Pratap Singh:
Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directions. 5163-5196 - Chunjing Xiao, Shenkai Lv, Wei Fan, W. H. Ip:
Temporal-order association-based dynamic graph evolution for recommendation. 5197-5223 - N. Sheena, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
EMCP: evolutionary multi-objective clustering protocol for prolonged lifetime of heterogeneous IoT networks. 5224-5254 - Ehsan Jafari, Ardeshir Dolati, Kamran Layeghi:
Object tracking using local structural information and energy minimization. 5255-5278 - Yinsheng Tong, Zuoyong Li, Hui Huang, Libin Gao, Minghai Xu, Zhongyi Hu:
Research of spatial context convolutional neural networks for early diagnosis of Alzheimer's disease. 5279-5297 - Taymaz Akan, Diego Oliva, Ali-Reza Feizi-Derakhshi, Amir-Reza Feizi-Derakhshi, Marco Pérez-Cisneros, Mohammad Alfrad Nobel Bhuiyan:
Battle royale optimizer for multilevel image thresholding. 5298-5340 - Liqiang Song, Huaiguang Wang, Baojian Yang:
Hybrid compression scheme based on VMD optimization algorithm application to mechanical equipment monitoring. 5341-5362 - Yue Zhao, Yuan Yao, Tong He, Xingshe Zhou, Bo Shen:
Sl4u: a scenario description language for unmanned swarm. 5363-5389 - Jingbo Sun, Weiming Peng, Tianbao Song, Haitao Liu, Shuqin Zhu, Jihua Song:
Enhanced cross-prompt trait scoring via syntactic feature fusion and contrastive learning. 5390-5407 - Ru Sun, Ting Yang:
Hybrid parameter-based PSO flexible needle percutaneous puncture path planning. 5408-5427 - Zhiyi Yu, Hong Li, Jialin Feng:
Contrastive learning for unsupervised sentence embeddings using negative samples with diminished semantics. 5428-5445 - Jin Xu, Huiqun Yu, Guisheng Fan, Jiayin Zhang, Zengpeng Li, Qifeng Tang:
Adaptive edge service deployment in burst load scenarios using deep reinforcement learning. 5446-5471 - Jing-Wei Liu, Ming-Hua Hsu, Chun-Liang Lai, Sheng-K. Wu:
Using video analysis and artificial neural network to explore association rules and influence scenarios in elite table tennis matches. 5472-5489 - Chang Jie, Chen Jiming, Shao Ying, Yanchun Tong, Haodong Ren:
A pyramid GNN model for CXR-based COVID-19 classification. 5490-5508 - Fei Yang, Huyin Zhang, Shiming Tao, Xiying Fan:
Simple hierarchical PageRank graph neural networks. 5509-5539 - Prashant Vaish, Niharika Anand, Vishal Krishna Singh, Gaurav Sharma:
Applications hosting over cloud-assisted IOT: a productivity model and method defining accessibility of data security. 5540-5564 - Raghuraj Singh, Kuldeep Kumar:
Hybrid optimization-enabled deep Q network for fault prediction in service-oriented architecture. 5565-5592 - Zixiang Nie, Jin Li, Fenghui Duan, Yueming Lu:
A collaborative ledger storing model for lightweight blockchains based on Chord Ring. 5593-5615 - Zhen Li, Zining Cao, Chao Xing:
Performance modeling and quantitative evaluation for cyber-physical systems based on LTS. 5616-5653 - Weibei Fan, Xuanli Liu, Mengjie Lv:
Hamiltonian cycle embedding with fault-tolerant edges and adaptive diagnosis in half hypercube. 5654-5674 - Azad Johari, Azlan Ismail:
PMLAP: a methodology for annotating SSML elements into HTML5. 5675-5707 - Viswanatha Reddy G, B. S. N. V. Chaitanya, Prathyush P, Sumanth M, Mrinalini C, Dileep Kumar P, Snehasis Mukherjee:
DFW-PP: dynamic feature weighting-based popularity prediction for social media content. 5708-5730 - Ismael Boureima, Manish Bhattarai, Maksim Eken Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov:
Correction to: Distributed out-of-memory NMF on CPU/GPU architectures. 5731-5732
Volume 80, Number 5, March 2024
- Zhaojun Wang, Xindong You, Xueqiang Lv:
A relation enhanced model for temporal knowledge graph alignment. 5733-5755 - Samaher Al-Janabi, Ghada Mohammed:
An intelligent returned energy model of cell and grid using a gain sharing knowledge enhanced long short-term memory neural network. 5756-5814 - Peng Li, Cheng Che, Rui Hou:
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning. 5815-5831 - Kangjin Huang, Yonggang Che, Chuanfu Xu, Zhe Dai, Jian Zhang:
Improving CUDA performance of an unstructured high-order CFD application under OP2 framework. 5832-5846 - Yueting Xiang, Yangfen Chen, Wenjuan Fan, Hui Ye:
Enhancing computer-aided translation system with BiLSTM and convolutional neural network using a knowledge graph approach. 5847-5869 - Inam Ullah, Asra Noor, Shah Nazir, Farhad Ali, Yazeed Yasin Ghadi, Nida Aslam:
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. 5870-5899 - S. Muthulakshmi, R. Chitra:
Interplanetary file system and blockchain for secured smart grid networks. 5900-5922 - Abbas Rammal, Kenneth Ezukwoke, Anis Hoayek, Mireille Batton-Hubert:
Unsupervised approach for an optimal representation of the latent space of a failure analysis dataset. 5923-5949 - S. Nikkath Bushra, Nalini Subramanian, G. Shobana, S. Radhika:
A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment. 5950-5978 - Sait Alp, Rahim Dehkharghani, Taymaz Akan, Mohammad A. N. Bhuiyan:
MOBRO: multi-objective battle royale optimizer. 5979-6016 - Shilpi, Arvind Kumar:
Application of Jaya algorithm for solving localization problem in a distributed Wireless Sensor Network. 6017-6041 - Rui-Yun Chang, Xiufang Feng, Chengye Zou, Hao Zhang:
Multimodal medical image protection algorithm based on 3D-CICCM and Fresnel transform. 6042-6067 - Fanfan Li:
Chord-based music generation using long short-term memory neural networks in the context of artificial intelligence. 6068-6092 - Xiaoxuan Ma, Boyang Sun, Weifeng Liu, Dong Sui, Sihan Shan, Jing Chen, Zhaofeng Tian:
Tnseg: adversarial networks with multi-scale joint loss for thyroid nodule segmentation. 6093-6118 - Hongjie Geng, Mingming Zhou:
Novel post-photographic technique based on deep convolutional neural network and blockchain technology. 6119-6139 - Jingwen Xiong, Wenke Zang, Yuzhen Zhao, Xiyu Liu:
Density peaks clustering algorithm with connected local density and punished relative distance. 6140-6168 - Huan Liu, Jian Wu, Rui He:
IDPNet: a light-weight network and its variants for human pose estimation. 6169-6191 - Qianqiu Wang, Ge Nong, Wenbo Wu:
Linear structure index for network-constrained moving objects. 6192-6220 - Tianhua Chen, Yanyue Li, Qinghua Qiao:
Fine-grained bird image classification based on counterfactual method of vision transformer model. 6221-6239 - Jubin Wang, Yuan Zhuang, Yunhui Zeng:
A transmission optimization method for MPI communications. 6240-6263 - Ahmed N. Bakry, Almohammady S. Alsharkawy, Mohamed S. Farag, Kamal R. Raslan:
Automatic suppression of false positive alerts in anti-money laundering systems using machine learning. 6264-6284 - Yifei Sun, Jigang Wu, Yalan Wu, Long Chen, Weijun Sun:
Efficient approaches for task offloading in point-of-interest based vehicular fog computing. 6285-6310 - Juan Fang, Zhichao Wei, Yaqi Liu, Yumin Hou:
TB-TBP: a task-based adaptive routing algorithm for network-on-chip in heterogenous CPU-GPU architectures. 6311-6335 - Huarui Wu, Chang Liu, Chunjiang Zhao:
Personalized agricultural knowledge services: a framework for privacy-protected user portraits and efficient recommendation. 6336-6355 - Ali Abbas, Raza Hasan:
A multi-attribute-based data forwarding scheme for delay tolerant networks. 6356-6381 - Ali Asghari, Hossein Azgomi, Ali Abbas Zoraghchian, Abbas Barzegarinezhad:
Energy-aware server placement in mobile edge computing using trees social relations optimization algorithm. 6382-6410 - Neeraj Kumar Shukla, Abdulilah M. Mayet, M. Ram Kumar Raja, Muneer Parayangat, Mohammed Usman, Rajesh Verma, Javed Khan Bhutto:
A unified test data volume compression scheme for circular scan architecture using hosted cuckoo optimization. 6411-6434 - Sumera Naz, Aqsa Shafiq, Maheen Abbas:
An approach for 2-tuple linguistic q-rung orthopair fuzzy MAGDM for the evaluation of historical sites with power Heronian mean. 6435-6485 - Muhanad Mohammed Kadum, Xiaoheng Deng:
Allocating energy-objective aware workflow in distributed edge micro data centres. 6486-6521 - Haiyan Li, Shaolin Peng, Xun Lang, Shuhua Ye, Hongsong Li:
Spatial-guided informative semantic joint transformer for single-image deraining. 6522-6551 - Mahnaz Khojand, Kambiz Majidzadeh, Mohammad Masdari, Yousef Farhang:
Controller placement in SDN using game theory and a discrete hybrid metaheuristic algorithm. 6552-6600 - Marzieh Varposhti:
Distributed homology-based sensor selection and scheduling in wireless sensor networks. 6601-6621 - Hind Idrissi, Paolo Palmieri:
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems. 6622-6660 - Yibo Huang, Bo Wang, Xiang-rong Pu, Yian Li, Qiuyu Zhang:
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. 6661-6698 - Zahra Valadanzoj, Hassan Daryanavard, Abbas Harifi:
High-speed YOLOv4-tiny hardware accelerator for self-driving automotive. 6699-6724 - Hui Ma:
Development of a smart tourism service system based on the Internet of Things and machine learning. 6725-6745 - Ali Jameel Hashim, M. A. Balafar, Jafar Tanha:
NEAE: NeuroEvolution AutoEncoder for anomaly detection in internet traffic data. 6746-6777 - Shiqiang Zhang, Dongzhi Cao:
A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT. 6778-6808 - Saeid Ghafouri, Seyed Hossein Khasteh, Seyed Omid Azarkasb:
Influence maximization (IM) in complex networks with limited visibility using statistical methods. 6809-6854 - Naveen Chandra Gowda, Sunilkumar S. Manvi, A. Bharathi Malakreddy, Rajkumar Buyya:
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments. 6855-6890 - Redouane Benabdallah Benarmas, Kadda Beghdad Bey:
A deep learning-based framework for road traffic prediction. 6891-6916 - Yuqing Cheng, Zhiying Cao, Xiuguo Zhang, Qilei Cao, Dezhen Zhang:
Multi objective dynamic task scheduling optimization algorithm based on deep reinforcement learning. 6917-6945 - Marzieh Varposhti:
Distributed homology-based algorithm for solving Set k-Cover problem in heterogeneous directional sensor networks. 6946-6964 - Yong Niu, Xing Xing, Zhichun Jia, Mindong Xin, Junye Xing:
SMIGNN: social recommendation with multi-intention knowledge distillation based on graph neural network. 6965-6988 - Mukesh Patidar, Ankit Jain, Keshav Patidar, Surendra Kumar Shukla, Ali H. Majeed, Namit Gupta, Nilesh Patidar:
An ultra-dense and cost-efficient coplanar RAM cell design in quantum-dot cellular automata technology. 6989-7027 - Nadia Nedjah, Sérgio de Souza Raposo, Luiza de Macedo Mourelle:
Dedicated hardware design for efficient quantum computations using classical logic gates. 7028-7070 - Kun Yang, Lin Jiang, Rui Shan, Kangle Li, Xinyue Cui:
RMSRM: real-time monitoring-based self-reconfiguration mechanism in reconfigurable PE array. 7071-7101 - Donaldo Garcia, José de Jesús Rubio, Humberto Sossa, Jaime Pacheco, Guadalupe Juliana Gutierrez, Carlos Aguilar Ibáñez:
Electricity consumption modeling by a chaotic convolutional radial basis function network. 7102-7119 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang, Peiying Zhang, Laith Abualigah:
Correction to: Load balancing strategy for SDN multi-controller clusters based on load prediction. 7120-7121
Volume 80, Number 6, April 2024
- Junfeng Wang:
The use of fuzzy authentication integrated with convolutional neural networks in digital content protection. 7123-7146 - Xiaohong Wang, Xu Zhao, Kun Xu, Shihao Xu:
Multi-scale adaptive atrous graph convolution for point cloud analysis. 7147-7170 - Lisheng Wu, Xiaoming You, Sheng Liu:
Heterogeneous ant colony algorithm based on selective evolution mechanism and game strategy. 7171-7206 - Mohammad Hassan Almaspoor, Ali A. Safaei, Afshin Salajegheh, Behrouz Minaei-Bidgoli:
Distributed independent vector machine for big data classification problems. 7207-7244 - Xinfeng He, Riyang Li:
Malware detection for container runtime based on virtual machine introspection. 7245-7268 - Kai Song, Huaqiong Ma, Haiming Zhang, Liping Yan:
Research of ReLU output device in ternary optical computer based on parallel fully connected layer. 7269-7292 - Yuqin Song, Chunliang Shang, Jitao Zhao:
LBCNet: A lightweight bilateral cascaded feature fusion network for real-time semantic segmentation. 7293-7315 - Saif Ur Rehman Khan, Ming Zhao, Sohaib Asif, Xuehan Chen, Yusen Zhu:
GLNET: global-local CNN's-based informed model for detection of breast cancer categories from histopathological slides. 7316-7348 - Chenghao Wang, Zhongqiang Luo, Ziyuan Qi:
Transformer oil leakage detection with sampling-WIoU module. 7349-7368 - Yen-Liang Chen, Chia-Chi Wu, Po-Cheng Shih:
Using personalized next session to improve session-based recommender systems. 7369-7398 - Jing Zhang, Zuanyang Zeng, Kunliang Si, Xiucai Ye:
Entropy-driven differential privacy protection scheme based on social graphlet attributes. 7399-7432 - Blessy Antony, S. Revathy:
A novel model for Sybil attack detection in online social network using optimal three-stream double attention network. 7433-7482 - Jun Shi, Peiyi Zhang, Sihan Du, Wanyong Liang, Weifeng Cao, Qingbo Li, Hechao Hou:
Chipping value prediction for dicing saw based on sparrow search algorithm and neural networks. 7483-7506 - Ashkan Emami, Ghazaleh Keshavarz Kalhori, Sheyda Mirzakhani, Mohammad Ali Akhaee:
A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach. 7507-7556 - Dan Li, Wenbo Shi, Ning Lu, Sang-Su Lee, Sokjoon Lee:
ARdetector: android ransomware detection framework. 7557-7584 - Yuanxiang Wang, Zhen Xu, Lei Yang:
Plus-profile energy harvested prediction and adaptive energy management for solar-powered wireless sensor networks. 7585-7603 - Chao Zhu, Benshun Yi, Laigan Luo:
Triple-channel graph attention network for improving aspect-level sentiment analysis. 7604-7623 - You-Shyang Chen, Jieh-Ren Chang, Yaswanth P. K. Thotakura, Ashraf Mohammad:
A hybrid four-stage detection model to pre-identify the sustainable manufacturing process of Li-ion battery pack. 7624-7661 - Yaonan Guan, Yunwen Xu, Yugeng Xi, Dewei Li:
Variational auto encoder fused with Gaussian process for unsupervised anomaly detection. 7662-7690 - Niloofar Zahedy, Behrang Barekatain, Alfonso Ariza-Quintana:
RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm. 7691-7749 - Peyman Shobeiri, Mehdi Akbarian Rastaghi, Saeid Abrishami, Behnam Shobiri:
PCP-ACO: a hybrid deadline-constrained workflow scheduling algorithm for cloud environment. 7750-7780 - Ature Angbera, Huah Yong Chan:
An adaptive XGBoost-based optimized sliding window for concept drift handling in non-stationary spatiotemporal data streams classifications. 7781-7811 - Safdar Rostami, Ali Broumandnia, Ahmad Khademzadeh:
An energy-efficient task scheduling method for heterogeneous cloud computing systems using capuchin search and inverted ant colony optimization algorithm. 7812-7848 - Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz:
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model. 7849-7875 - Bakht Sher Ali, Inam Ullah, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam:
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. 7876-7905 - A. Moradikashkooli, H. Haj Seyyed Javadi, Sam Jabbehdari:
An efficient optimization algorithm for nonlinear 2D fractional optimal control problems. 7906-7930 - Yang Liu:
Depression clinical detection model based on social media: a federated deep learning approach. 7931-7954 - Shweta Mittal, Mohona Ghosh:
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication. 7955-7992 - Tajinder Singh, Madhu Kumari, Daya Sagar Gupta:
Rumor identification and diffusion impact analysis in real-time text stream using deep learning. 7993-8037 - Jingjing Han, Guangqi Yang, Hongyang Wei, Weijun Gong, Yurong Qian:
ST-YOLOX: a lightweight and accurate object detection network based on Swin Transformer. 8038-8059 - Xiangyu Deng, Xikai Huang, Haiyue Yu:
Frequency-domain characteristic analysis of PCNN. 8060-8093 - Ones Sidhom, Haythem Ghazouani, Walid Barhoumi:
Three-phases hybrid feature selection for facial expression recognition. 8094-8128 - Khadijeh Moeini Roodbali, Ebrahim Abiri, Kourosh Hassanli:
Highly efficient low-area gate-diffusion-input-based approximate full adders for image processing computing. 8129-8155 - Ayesha Kanwal, Kashif Javed, Sara Ali, Saddaf Rubab, Muhammad Attique Khan, Areej Alasiry, Mehrez Marzougui, Mohammad Shabaz:
A hybrid framework for detection of autism using ConvNeXt-T and embedding clusters. 8156-8178 - Ali Khalouta:
A new decomposition transform method for solving nonlinear fractional logistic differential equation. 8179-8201 - Nilesh Kumar Verma, K. Jairam Naik:
Optimized fog community framework with advanced genetic algorithm for enhanced performance dynamics. 8202-8235 - Reza Feizabadi, Mehri Bagherian, Hamidreza Vaziri, Maziar Salahi:
PLEACH: a new heuristic algorithm for pure parsimony haplotyping problem. 8236-8258 - Davide Ferraris, M. Carmen Fernández Gago, Rodrigo Roman, Javier López:
A survey on IoT trust model frameworks. 8259-8296 - Yiming Shu, Yiru Dai:
An effective link prediction method for industrial knowledge graphs by incorporating entity description and neighborhood structure information. 8297-8329 - Faezeh Rohani, Kamrad Khoshhal Roudposhti, Hamidreza Taheri, Ali Mashhadi, Andreas Mueller:
Extracting gait and balance pattern features from skeleton data to diagnose attention deficit/hyperactivity disorder in children. 8330-8356 - J. Jayachitra, K. Suganya Devi, S. V. Manisekaran, Satish Kumar Satti:
Terahertz video-based hidden object detection using YOLOv5m and mutation-enabled salp swarm algorithm for enhanced accuracy and faster recognition. 8357-8382 - Minhaz Mahmud, Md. Soharab Hossain Sohan, Saha Reno, M. A. Baten Sikder, Fakir Sharif Hossain:
Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology. 8383-8405 - Arti Gupta, Vijay Kumar Chaurasiya:
Integrating Healthcare 4.0 and WBAN: efficient redundancy reduction and adaptive packet scheduling using AR-DRL. 8406-8433 - Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari:
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare. 8434-8468 - Shibao Li, Chenxu Ma, Yunwu Zhang, Longfei Li, Chengzhi Wang, Xuerong Cui, Jianhang Liu:
Attention-based variable-size feature compression module for edge inference. 8469-8484 - Joonhyouk Jang, Minho Park, Jiman Hong:
Hybrid booting with incremental hibernation for the baseboard management controllers. 8485-8504 - Kaiyi Deng, Guanen Wang:
Online mode development of Korean art learning in the post-epidemic era based on artificial intelligence and deep learning. 8505-8528 - Wei Zhang, Ping He, Chuntian Qin, Fan Yang, Ying Liu:
A graph attention network-based model for anomaly detection in multivariate time series. 8529-8549 - Yi Yang, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
Correction to: A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 8550 - Pooya Tavallali, Peyman Tavallali, Mukesh Singhal:
Correction: K-means tree: an optimal clustering tree for unsupervised learning. 8551
Volume 80, Number 7, May 2024
- Bowen Guan, Chencheng Zhao, Xianghui Yuan, Jun Long, Xiang Li:
Price prediction in China stock market: an integrated method based on time series clustering and image feature extraction. 8553-8591 - Hathem Khelil, Mahmoud Brahimi:
Toward an efficient web service composition based on an improved BTLBO algorithm. 8592-8613 - Xiaowen Sun, Zhenfang Zhu, Jiangtao Qi, Zhen Zhao, Hongli Pei:
Affective Commonsense Knowledge Enhanced Dependency Graph for aspect sentiment triplet extraction. 8614-8636 - Chao Shao, Hairui Zhang:
Climate change characteristics and population health impact factors using deep neural network and hyperautomation mechanism. 8637-8667 - Khushboo Gupta, Vinod Kumar:
KMS-AMI: an efficient and scalable key management scheme for secure two-way communications in advanced metering infrastructure of smart grid. 8668-8701 - Xin-Duo Liu, Weijia He, Ming-Lin Yang, Xin-Qing Sheng:
Massive parallelization of multilevel fast multipole algorithm for 3-D electromagnetic scattering problems on SW26010 many-core cluster. 8702-8718 - José de Jesús Rubio, Marco Antonio Islas, Donaldo Garcia, Jaime Pacheco, Alejandro Zacarias, Carlos Aguilar Ibáñez:
Optimized radial basis function network for the fatigue driving modeling. 8719-8741 - Youlin Li:
Constructing the intelligent expressway traffic monitoring system using the internet of things and inspection robot. 8742-8766 - Jie Zhang, Jingshun Bi, Jinyou Hou, Qinggang Xie:
Dynamical analysis, circuit realization, and applications of 4D hyperchaotic systems with bursty oscillations and infinite attractor coexistence. 8767-8800 - Yumeng Yang, Li Wang, Zizhen Cheng:
Density peaks algorithm based on information entropy and merging strategy for power load curve clustering. 8801-8832 - Liwei Yang, Boyu Jia, Xue Liang, Fang Wang, Xiangyuan Peng:
Visible light communication and WiFi hybrid networks based on dynamic resource allocation algorithm. 8833-8856 - Xuzhen Deng, Dengxu He, Liangdong Qu:
A novel hybrid algorithm based on arithmetic optimization algorithm and particle swarm optimization for global optimization problems. 8857-8897 - Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan:
Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker. 8898-8932 - Yue Miao, Siyuan Tang, Zhuqiang Zhang, Jukun Song, Zhi Liu, Qiang Chen, Miao Zhang:
Application of deep learning and XGBoost in predicting pathological staging of breast cancer MR images. 8933-8953 - Mersedeh Sadeghi, Alessio Carenini, Óscar Corcho, Matteo Rossi, Riccardo Santoro, Andreas Vogelsang:
Interoperability of heterogeneous Systems of Systems: from requirements to a reference architecture. 8954-8987 - Negar Abbasi, Mohammadreza Soltanaghaei, Farsad Zamani Boroujeni:
Anomaly detection in IOT edge computing using deep learning and instance-level horizontal reduction. 8988-9018 - Manzoor Ansari, Mansaf Alam:
A novel hybrid time-series approach for IoT-cloud-enabled environment monitoring. 9019-9053 - Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Simulation-based uprighting of a capsized ship in wave-induced environments. 9054-9072 - Fan Ouyang, Bo Shen:
A mutual mean teacher framework for cross-domain aspect-based sentiment analysis. 9073-9095 - Yu'e Lin, Houguo Li, Xingzhu Liang, Mengfan Li, Huilin Liu:
AAR:Attention Remodulation for Weakly Supervised Semantic Segmentation. 9096-9114 - Junhao Wang, Jiarong Liang, Qingnian Li:
On the construction of quality extended virtual backbones in wireless sensor networks using cooperative communication. 9115-9139 - Juanjuan Ren, Siti Salwa Salleh:
Green urban logistics path planning design based on physical network system in the context of artificial intelligence. 9140-9161 - Ke Hou, Jianping Sun, Mingcheng Guo, Ming Pang, Na Wang:
TentISSA-BPNN: a novel evaluation model for cloud service providers for petroleum enterprises. 9162-9193 - Fangyin Zhu, Wei Xu, Duanyang Liu, Haiyan Shi:
TSANET: transportation mode recognition model with global and local spatiotemporal features. 9194-9219 - Archana Bomnale, Avinash More:
Node utilization index-based data routing and aggregation protocol for energy-efficient wireless sensor networks. 9220-9252 - Apurva Kumari, Subhendu Kumar Sahoo:
An effective and robust single-image dehazing method based on gamma correction and adaptive Gaussian notch filtering. 9253-9276 - Xiaolong Wang, Ling Cai, Yunhao Xu:
Creation mechanism of new media art combining artificial intelligence and internet of things technology in a metaverse environment. 9277-9297 - Marcelo Tosini, Martín Vázquez, Lucas Leiva:
Analysis and efficient implementation of IEEE-754 decimal floating point adders/subtractors in FPGAs for DPD and BID encoding. 9298-9326 - Lina She, Hongfang Gong, Siyu Zhang:
An interactive multi-head self-attention capsule network model for aspect sentiment classification. 9327-9352 - Yi'an Zhu, Jie Chen, Lian Li:
A critical path task scheduling algorithm based on sequential failure factor. 9353-9383 - Mirsaeid Hosseini Shirvani:
A survey study on task scheduling schemes for workflow executions in cloud computing environment: classification and challenges. 9384-9437 - S. Deepanjali, S. K. Noor Mahammad:
A twofold bio-inspired system for mitigating SEUs in the controllers of digital system deployed on FPGA. 9438-9470 - Tao Tang, Kai Lu, Lin Peng, Yingbo Cui, Jianbin Fang, Chun Huang, Ruibo Wang, Canqun Yang, Yifei Guo:
SNCL: a supernode OpenCL implementation for hybrid computing arrays. 9471-9493 - Nadim Elsakaan, Kamal Amroun:
A novel privacy-aware global infrastructure for ecological footprint calculator based on the Internet of things and blockchain. 9494-9531 - Martha Dais Ferreira, Zahra Sadeghi, Stan Matwin:
Exploring autoregression patterns for automatic vessel type classification. 9532-9553 - Sheng Wang, Shiping Chen, Yumei Shi:
Utilization-prediction-aware energy optimization approach for heterogeneous GPU clusters. 9554-9578 - Habib Ullah Khan, Waseem Afsar, Shah Nazir, Asra Noor, Mahwish Kundi, Mashael S. Maashi, Haya Mesfer Alshahrani:
Revolutionizing software developmental processes by utilizing continuous software approaches. 9579-9608 - Noshin A. Sabuwala, Rohin D. Daruwala:
An approach to enhance the security of unmanned aerial vehicles (UAVs). 9609-9639 - Chenguang Fan, Muyao Li, Wenzhong Liu, Jingjing Cheng:
FPGA-based downhole real-time inversion of petrophysical information for NMR-LWD tools with periodic thermal management. 9640-9662 - Dayasagar Chowdary S, M. S. Sudhakar:
Linear programming-based multi-objective floorplanning optimization for system-on-chip. 9663-9686 - Mohammadreza Sheikhattar, Alireza Mansouri:
A Topic Mapping-based framework to analyze textual risk reports from social media big data contents. 9687-9712 - Zhiheng Zhou, Xiaomei Huang, Naixue Xiong, Guoqiong Liao, Xiaobin Deng:
A self-attention model with contrastive learning for online group recommendation in event-based social networks. 9713-9741 - Higinio Mora, María Teresa Signes Pont, Francisco Antonio Pujol López, Jerónimo Mora Pascual, Juan Manuel García Chamizo:
Advancements in number representation for high-precision computing. 9742-9761 - Sanjib Roy, Ayan Kumar Das:
Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication. 9762-9811 - JongHyuk Kim, Yong Moon, Hoon Ko:
Correlation-based advanced feature analysis for wireless sensor networks. 9812-9828 - Hyunjun Kim, Hwansoo Han:
GPU thread throttling for page-level thrashing reduction via static analysis. 9829-9847 - Shahzadi Bano, Weimei Zhi, Baozhi Qiu, Muhammad Raza, Nabila Sehito, Mian Muhammad Kamal, Ghadah Aldehim, Nuha Alruwais:
Self-paced ensemble and big data identification: a classification of substantial imbalance computational analysis. 9848-9869 - Yinsheng Chen, Jiahao Li, Kun Sun, Ying Zhang:
A lightweight early forest fire and smoke detection method. 9870-9893 - Qingchun Bai, Mengmeng Tang, Yang Song, Jun Xiao:
Extracting entity and relationship interactions from danmaku-video comments using a neural bootstrapping framework. 9894-9916 - Weihong Fu, Haoyi Li:
An improved phase gradient autofocus algorithm for ISAR phase autofocus problem. 9917-9934 - Yi Qing, Xiangyu Liu, Yanhui Du:
Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks. 9935-9960 - Yu-Wei Chan, Endah Kristiani, Halim Fathoni, Chien-Yi Chen, Chao-Tung Yang:
A smart edge computing infrastructure for air quality monitoring using LPWAN and MQTT technologies. 9961-9985 - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review. 9986-10043 - Iman Kadhum Abbood, Ali Kadhum Idrees:
Data reduction techniques for wireless multimedia sensor networks: a systematic literature review. 10044-10089 - Xin Zhong, Nan Wang:
Ensemble learning method based on CNN for class imbalanced data. 10090-10121 - Sapna Juneja, Ali Nauman, Mudita Uppal, Deepali Gupta, Roobaea Alroobaea, Bahodir Muminov, Yuning Tao:
Machine learning-based defect prediction model using multilayer perceptron algorithm for escalating the reliability of the software. 10122-10147 - ZhongGui Pei:
Framework design based on data-driven for evaluating the efficiency of group collaboration in scientific research teams. 10148-10171 - Xin-miao Chen, Shi Wang, Yong-jin Ye, Yong-zheng Wu, Bo Jiang:
BQA: a high-performance quantum circuits scheduling strategy based on heuristic search. 10172-10189 - Umair Khan, Muazzam Maqsood, Saira Andleeb Gillani, Mehr Yahya Durrani, Irfan Mehmood, Sanghyun Seo:
Correction to: A deep learning-based framework for accurate identification and crop estimation of olive trees. 10190 - Bowen Guan, Chencheng Zhao, Xianghui Yuan, Jun Long, Xiang Li:
Correction to: Price prediction in China stock market: an integrated method based on time series clustering and image feature extraction. 10191 - Retraction Note: Encryption scheme with mixed homomorphic signature based on message authentication for digital image. 10192
- Retraction Note: Fuzzy clustering-based skyline query preprocessing algorithm for large-scale flow data analysis. 10193
- Retraction Note: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. 10194-10195
Volume 80, Number 8, May 2024
- Chaozhi Cai, Xiaoyu Guo, Yingfang Xue, Jianhua Ren:
Structure damage diagnosis of bleacher based on DSKNet model. 10197-10222 - G. Jagadeesh, J. Gitanjali, J. Vellingiri, M. Pounambal, E. Sathiyamoorthy, Celestine Iwendi:
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment. 10223-10254 - Abdulrahman Alahmadi, Haroon Ahmed Khan, Ghufran Shafiq, Junaid Ahmed, Bakhtiar Ali, Muhammad Awais Javed, Mohammad Zubair Khan, Rayan Hamza Alsisi, Ahmed H. Alahmadi:
A privacy-preserved IoMT-based mental stress detection framework with federated learning. 10255-10274 - Ruizhong Du, Jingya Wang, Yan Gao:
Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks. 10275-10300 - Ramesh Chandra Sahoo, Tapas Kumar, Poonam Tanwar, Jyoti Pruthi, Sanjay Singh:
An efficient meta-heuristic algorithm based on water flow optimizer for data clustering. 10301-10326 - Yang Liu:
Depression detection via a Chinese social media platform: a novel causal relation-aware deep learning approach. 10327-10356 - Hongxi Liu, Mingzu Zhang, Weihua Yang:
On modified l-embedded edge-connectivity of enhanced hypercubes. 10357-10369 - Jianxing Zheng, Sen Chen, Feng Cao, Furong Peng, Mingqing Huang:
Explainable recommendation based on fusion representation of multi-type feature embedding. 10370-10393 - Rounak Saha, Anurag Satpathy, Sourav Kanti Addya:
FASE: fast deployment for dependent applications in serverless environments. 10394-10417 - Yuting Tan, Junfeng Zhou, Xinqi Rong, Ming Du, Caiyun Qi:
Efficient computation of maximum weighted independent sets on weighted dynamic graph. 10418-10443 - Jing Long, Cuiting Luo, Ruxin Chen, Jianping Yu, Kuan-Ching Li:
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection. 10444-10468 - Haifeng Yu, Lei Cai, Hong Min, Xin Su:
Advancing medical data classification through federated learning and blockchain incentive mechanism: implications for modern software systems and applications. 10469-10484 - Ruizhong Du, Bowen Cao, Yan Gao:
Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach. 10485-10510 - Gopi Krishna Jagarlamudi, Abbas Yazdinejad, Reza M. Parizi, Seyedamin Pouriyeh:
Exploring privacy measurement in federated learning. 10511-10551 - Lucia Pons, Salvador Petit, Julio Pons, María Engracia Gómez, Julio Sahuquillo:
A modular approach to build a hardware testbed for cloud resource management research. 10552-10583 - Mingyang Song, Chunlin Li, Youlong Luo:
A pricing strategy for federated learning in UAV-enabled MEC. 10584-10609 - Jianjiang Li, Jiabi Liang, Wei Xue, Zhengding Hu, Lin Li, Jinliang Shi:
Toward efficient structured-grid triangular solver on sunway many-core processors. 10610-10636 - Jixian Zhang, Hao Sun, Weidong Li:
Lowest revenue limit-based truthful auction mechanism for cloud resource allocation. 10637-10666 - Yun Fen Yong, Chee Keong Tan, Ian K. T. Tan, Su Wei Tan:
C-VoNNI: a precise fingerprint construction for indoor positioning systems using natural neighbor methods with clustering-based Voronoi diagrams. 10667-10694 - Wangxing Chen, Haifeng Sang, Jinyu Wang, Zishan Zhao:
STIGCN: spatial-temporal interaction-aware graph convolution network for pedestrian trajectory prediction. 10695-10719 - Fatemeh Fathinezhad, Peyman Adibi, Bijan Shoushtarian, Jocelyn Chanussot:
Local and soft feature selection for value function approximation in batch reinforcement learning for robot navigation. 10720-10745 - Rohit Kundu, Soumitri Chattopadhyay, Sayan Nag, Mario A. Navarro, Diego Oliva:
Prism refraction search: a novel physics-based metaheuristic algorithm. 10746-10795 - Hamid Reza Naji, Soodeh Shadravan, Hossien Mousa Jafarabadi, Hossien Momeni:
Parallel design of SFO optimization algorithm based on FPGA. 10796-10817 - Bita Jafari, Peyman Bayat:
Performance improvement of distributed cache using middleware session. 10818-10862 - Mahjoubeh Tajgardan, Habib Izadkhah, Shahriar Lotfi:
IAFCO: an intelligent agent-based framework for combinatorial optimization. 10863-10930 - Hanyu Wang, Ying Li:
Limited environmental information path planning based on 3D point cloud reconstruction. 10931-10958 - Xiang Chen, Yingjie Yang, Jie Sun, Yelin Deng, Yinnan Yuan:
A novel time series forecasting model for capacity degradation path prediction of lithium-ion battery pack. 10959-10984 - Saeed Sharifian Moghimi Moghaddam, Vahid Rashtchi, Ali Azarpeyvand:
Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation. 10985-11013 - Chanchal Ahlawat, Rajalakshmi Krishnamurthi:
HCDQN-ORA: a novel hybrid clustering and deep Q-network technique for dynamic user location-based optimal resource allocation in a fog environment. 11014-11065 - Mojtaba Maleknejad, Fazel Sharifi, Hojjat Sharifi:
A fast and energy-efficient hybrid 4-2 compressor for multiplication in nanotechnology. 11066-11088 - Ziwei Wang, Bin Li, Liang Deng, Jie Cao, Jiantao Wang, Fengshun Lu, Zhaolin Fan, Xiong Jiang:
Massively parallel simulations of multi-stage compressors on Sunway TaihuLight. 11089-11128 - Chuanjun Zhao, Xuzhuang Sun, Rong Feng:
Multi-strategy text data augmentation for enhanced aspect-based sentiment analysis in resource-limited scenarios. 11129-11148 - Senthil Kumar Chandrasekaran, Vijay Anand Rajasekaran:
Energy-efficient cluster head using modified fuzzy logic with WOA and path selection using enhanced CSO in IoT-enabled smart agriculture systems. 11149-11190 - Mohammad Sadeghzadeh, Reza Mohammadi, Mohammad Nassiri:
An intelligent real-time workloads allocation in IoT-fog networks. 11191-11213 - Farzaneh Asadzadeh, Akram Reza, Midia Reshadi, Ahmad Khademzadeh:
Thermal-aware application mapping using genetic and fuzzy logic techniques for minimizing temperature in three-dimensional network-on-chip. 11214-11240 - Shou-Bin Wang, Zi-Meng Gao, Deng-Hui Jin, Shu-Ming Gong, Gui-Li Peng, Zi-Jian Yang:
AMEA-YOLO: a lightweight remote sensing vehicle detection algorithm based on attention mechanism and efficient architecture. 11241-11260 - Aokang Pang, Huijun Liang, Chenhao Lin, Lei Yao:
A binary bat algorithm with improved crossover operators and Cauchy mutation for unit commitment problem. 11261-11292 - Baiyou Qiao, Jiaqi Wu, Rui Wang, Yuanqing Hao, Peirui Wang, Donghong Han, Gang Wu:
A parallel feature selection method based on NMI-XGBoost and distance correlation for typhoon trajectory prediction. 11293-11321 - Yuanmeng Zheng, Qingbin Luo, Qiang Li, Yi Lv:
Quantum circuit implementations of lightweight authenticated encryption ASCON. 11322-11337 - Vishal Sharma, Rohit Beniwal, Vinod Kumar:
Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications. 11338-11381 - Dan Zhang, Hui Wang, Shuang Li, Baonan Wang:
Progress in the prime factorization of large numbers. 11382-11400 - Wanling Lin, Hongbin Zhuang, Xiao-Yan Li, Yufang Zhang:
Reliability evaluation of generalized exchanged X-cubes under the Rg-conditional restriction. 11401-11430 - Rania Mzid:
Real-time design patterns for the verification of safety-critical embedded systems in model-based approach. 11431-11473 - Tianlei Zhu, Xin Yang, Hongwei Wang, Jianjun Wu:
A performance assessment method for urban rail transit last train network based on percolation theory. 11474-11490 - Mahfooz Alam, Mohammad Shahid, Suhel Mustajab:
Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions. 11491-11555 - Njoud O. Almaaitah, David E. Singh, Taylan Özden, Jesús Carretero:
Performance-driven scheduling for malleable workloads. 11556-11584 - Shiwei Gao, Jingyu Wang, Yufeng Zeng, Xiaohui Dong:
TGIE4REC: enhancing session-based recommendation with transition and global information. 11585-11613 - Minglong Chen, Jiuzhen Liang, Hao Liu:
Multi-stream P&U adaptive graph convolutional networks for skeleton-based action recognition. 11614-11639 - Bagyammal Thirumurthy, Latha Parameswaran, Karthikeyan Vaiapury:
A deep learning and transfer learning model for intra-change detection in images. 11640-11660 - Conghui Wang, Shiwu Yang, Chang Liu:
A novel health state prediction approach based on artificial intelligence combination strategy for compensation capacitors in track circuit. 11661-11681 - Jorge Vázquez-Pérez, César Piñeiro, Juan Carlos Pichel, Tomás F. Pena, Andrés Gómez:
QPU integration in OpenCL for heterogeneous programming. 11682-11703 - Yushen Zhang, Mingzu Zhang, Weihua Yang:
Reliability analysis of the augmented cubes in terms of the h-extra r-component edge-connectivity. 11704-11718 - Miho Chiyonobu, Takahiro Miyamae, Masami Takata, Jun Harayama, Kinji Kimura, Yoshimasa Nakamura:
Singular value decomposition for complex matrices using two-sided Jacobi method. 11719-11740 - Loris Belcastro, Salvatore Giampà, Fabrizio Marozzo, Domenico Talia, Paolo Trunfio, Rosa M. Badia, Jorge Ejarque, Nihad Mammadli:
Boosting HPC data analysis performance with the ParSoDA-Py library. 11741-11761 - Chao Ma, Haiying Gao, Bin Hu:
A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme. 11762-11797 - Gianmarco Accordi, Davide Gadioli, Emanuele Vitali, Luigi Crisci, Biagio Cosenza, Andrea Beccari, Gianluca Palermo:
Out of kernel tuning and optimizations for portable large-scale docking experiments on GPUs. 11798-11815 - Asma Douadi, Nadjet Kamel, Lakhdar Sais:
Label propagation algorithm for community discovery based on centrality and common neighbours. 11816-11842 - Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Correction to: Simulation-based uprighting of a capsized ship in wave-induced environments. 11843 - Retraction Note: An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation. 11844
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.