


default search action
Computer Systems: Science & Engineering, Volume 45
Volume 45, Number 1, 2023
- Mariem Belhor

, Adnen El-Amraoui
, Abderrazak Jemai, François Delmotte
:
Learning-Based Metaheuristic Approach for Home Healthcare Optimization Problem. 1-19 - Shui-Hua Wang, Muhammad Attique Khan

, Ziquan Zhu, Yudong Zhang
:
WACPN: A Neural Network for Pneumonia Diagnosis. 21-34 - Zhengshu Zhou, Yutaka Matsubara

, Hiroaki Takada:
Developing Reliable Digital Healthcare Service Using Semi-Quantitative Functional Resonance Analysis. 35-50 - Jungsoo Shin, Jaehee Jung:

ASL Recognition by the Layered Learning Model Using Clustered Groups. 51-68 - Ceren Bastemur Kaya

, Ebubekir Kaya, Göksel Gökkus
:
Training Neuro-Fuzzy by Using Meta-Heuristic Algorithms for MPPT. 69-84 - Shaofan Su, Deyu Yuan, Yuanxin Wang, Meng Ding:

Fine Grained Feature Extraction Model of Riot-related Images Based on YOLOv5. 85-97 - Jae Yong Lee, Byung Chul Kim, Youngmi Kwon, Kimoon Han:

Coupled CUBIC Congestion Control for MPTCP in Broadband Networks. 99-115 - Hasan Alrajhi

:
An Adaptive Wireless Power Sharing Control for Multiterminal HVDC. 117-129 - Yi-Ting Mai, Chi-En Li:

Design of Semipersistent Resource Allocation in LTE-V Network. 131-147 - P. Sherubha, S. P. Sasirekha

, A. Dinesh Kumar Anguraj
, J. Vakula Rani
, Raju Anitha, Surapaneni Phani Praveen, R. Hariharan Krishnan:
An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud. 149-166 - Israa Ismail, Mohamed Meselhy Eltoukhy, Ghada Eltaweel:

Super-Resolution Based on Curvelet Transform and Sparse Representation. 167-181 - Yining Qi, Yubo Luo, Yongfeng Huang, Xing Li:

Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation. 183-199 - Keungyeup Ji, Youngmi Kwon:

New Spam Filtering Method with Hadoop Tuning-Based MapReduce Na飗e Bayes. 201-214 - Fatih Aydemir, Aydin Çetin:

Multi-Agent Dynamic Area Coverage Based on Reinforcement Learning with Connected Agents. 215-230 - M. Valavan, S. Rita:

Predictive-Analysis-based Machine Learning Model for Fraud Detection with Boosting Classifiers. 231-245 - R. Punithavathi

, S. Thenmozhi, R. Jothilakshmi, V. Ellappan, Islam Md Tahzib Ul:
Suicide Ideation Detection of Covid Patients Using Machine Learning Algorithm. 247-261 - K. Sudhakar

, S. Senthilkumar:
A Novel Approach for Network Vulnerability Analysis in IIoT. 263-277 - R. Nandakumar

, P. Saranya, Vijayakumar Ponnusamy
, Subhashree Hazra, Antara Gupta:
Detection of Diabetic Retinopathy from Retinal Images Using DenseNet Models. 279-292 - Ratnesh Kumar Shukla, Arvind Kumar Tiwari:

Masked Face Recognition Using MobileNet V2 with Transfer Learning. 293-309 - Bhagyalaxmi Behera, Gyana Ranjan Patra, Shailendra Kumar Varshney, Mihir Narayan Mohanty:

Machine Learning-based Inverse Model for Few-Mode Fiber Designs. 311-328 - Nada M. Elfatih, Elmustafa Sayed Ali, Maha S. Abdelhaq, Raed A. Alsaqour, Rashid A. Saeed

:
A Double Threshold Energy Detection-Based Neural Network for Cognitive Radio Networks. 329-342 - M. A. A. Younis, Anas Quteishat

:
Selection of Wind Turbine Systems for the Sultanate of Oman. 343-359 - Ghada Atteia

:
Latent Space Representational Learning of Deep Features for Acute Lymphoblastic Leukemia Diagnosis. 361-376 - P. Sharmila, C. Deisy, S. Parthasarathy:

Ext-ICAS: A Novel Self-Normalized Extractive Intra Cosine Attention Similarity Summarization. 377-393 - Mohamed Ali Rakrouki

, Nawaf Alharbe, Mashael Khayyat, Abeer Aljohani:
TG-SMR: A Text Summarization Algorithm Based on Topic and Graph Models. 395-408 - Usama Abdur Rahman

, C. Jayakumar, Deepak Dahiya, Chinnanadar Ramachandran Rene Robin:
Genetics Based Compact Fuzzy System for Visual Sensor Network. 409-426 - A. Gautami, J. Shanthini, S. Karthik:

A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network. 427-443 - G. Brindha, P. Ezhilarasi:

Topology Driven Cooperative Self Scheduling for Improved Lifetime Maximization in WSN. 445-458 - Khalid Alhusayni, Raniyah Wazirali

, Mousa Alakhras
, Marwah Almasri, Samah Alhazmi
:
A Multi-Stage Secure IoT Authentication Protocol. 459-481 - B. Chellapraba, D. Manohari, K. Periyakaruppan, M. S. Kavitha

:
Oppositional Red Fox Optimization Based Task Scheduling Scheme for Cloud Environment. 483-495 - S. Nithya Roopa, P. Anandababu, Sibi Amaran, Rajesh Verma:

Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks. 497-512 - Anuj Singh

, Raman Kumar, Arvind Kumar Tiwari:
Prediction of Alzheimer's Using Random Forest with Radiomic Features. 513-530 - Waleed Albattah, Saleh Albahli:

Big Data Analytics: Deep Content-Based Prediction with Sampling Perspective. 531-544 - A. K. S. Saranya, T. Jaya

:
Early Detection of Heartbeat from Multimodal Data Using RPA Learning with KDNN-SAE. 545-562 - Walid El Shafai, Marwa A. Elsayed, Mohsen A. Rashwan, Moawad I. Dessouky, Adel S. El-Fishawy, Naglaa F. Soliman

, Amel Ali Alhussan, Fathi E. Abd El-Samie:
Optical Ciphering Scheme for Cancellable Speaker Identification System. 563-578 - S. Prasanna Bharathi, S. Srinivasan, G. Chamundeeswari

, B. Ramesh:
Hybrid Deep Learning-Improved BAT Optimization Algorithm for Soil Classification Using Hyperspectral Features. 579-594 - Taweesak Thongsan, Theerayuth Chatchanayuenyong

:
Optimal Dynamic Voltage Restorer Using Water Cycle Optimization Algorithm. 595-623 - S. M. Udhaya Sankar

, S. Thanga Revathi, R. Thiagarajan:
Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes. 625-640 - G. Uganya

, Radhika Baskar:
Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency. 641-658 - V. A. Vijayakumar, J. Shanthini, S. Karthik, Kannan Srihari:

Route Planning for Autonomous Transmission of Large Sport Utility Vehicle. 659-669 - N. Karthikeyan

, P. Sivaprakash, S. Karthik:
Classification Model for IDS Using Auto Cryptographic Denoising Technique. 671-685 - Fadwa M. Alrowais, Sami Althahabi, Saud S. Alotaibi

, Abdullah Mohamed, Manar Ahmed Hamza, Radwa Marzouk:
Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment. 687-700 - Helen Josephine V. L, Ramchand Vedaiyan, V. M. Arul Xavier, Joy Winston J, A. Jegatheesan, D. Lakshmi

, Joshua Samuel Raj:
Hybrid Bacterial Foraging Optimization with Sparse Autoencoder for Energy Systems. 701-714 - Kandasamy Sellamuthu, Vishnu Kumar Kaliappan:

Q-Learning-Based Pesticide Contamination Prediction in Vegetables and Fruits. 715-736 - Saud S. Alotaibi

, Eatedal Alabdulkreem, Sami Althahabi, Manar Ahmed Hamza, Mohammed Rizwanullah, Abu Sarwar Zamani, Abdelwahed Motwakel, Radwa Marzouk:
Artificial Fish Swarm Optimization with Deep Learning Enabled Opinion Mining Approach. 737-751 - Mesfer Al Duhayyim, Areej Malibari, Sami Dhahbi

, Mohamed K. Nour, Isra Al-Turaiki, Marwa Ismael Obayya, Abdullah Mohamed:
Sailfish Optimization with Deep Learning Based Oral Cancer Classification Model. 753-767 - N. Kanagaraj, Mohammed Al-Ansi:

Maximum Power Extraction Control Algorithm for Hybrid Renewable Energy System. 769-784 - S. Jagir Hussain

, M. Roopa
:
BE-RPL: Balanced-load and Energy-efficient RPL. 785-801 - Chaithra, G. M. Lingaraju, S. Jagannatha:

Web Page Recommendation Using Distributional Recurrent Neural Network. 803-817 - M. Mythreyee

, A. Nalini
:
Genetic Algorithm Based Smart Grid System for Distributed Renewable Energy Sources. 819-837 - Wen-Tsai Sung

, Guan-Rong Chen, Sung-Jung Hsiao:
Voice Guidance System for Color Recognition Based on IoT. 839-855 - Mohemmed Sha

:
A Cloud Based Sentiment Analysis through Logistic Regression in AWS Platform. 857-868 - Sirisati Ranga Swamy, Surapaneni Phani Praveen, Shakeel Ahmed

, Parvathaneni Naga Srinivasu
, Abdulaziz Alhumam:
Multi-Features Disease Analysis Based Smart Diagnosis for COVID-19. 869-886 - Kavitha Muthukumaran, K. Hariharanath, Vani Haridasan:

Feature Selection with Optimal Variational Auto Encoder for Financial Crisis Prediction. 887-901 - R. Nithya, Roobaea Alroobaea

, Ahmed Binmahfoudh, Zairi Ismael Rizman:
Distributed Multi-hop Clustering Approach with Low Energy Consumption in WSN. 903-924 - M. Suresh Kumar, T. Purosothaman:

Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT. 925-938 - Sindhuja Manickavasagam

, Poonkuzhali Sugumaran
:
Optimal Deep Belief Network Based Lung Cancer Detection and Survival Rate Prediction. 939-953 - Anwer Mustafa Hilal, Jaber S. Alzahrani, Dalia H. Elkamchouchi

, Majdy M. Eltahir, Ahmed S. Almasoud, Abdelwahed Motwakel, Abu Sarwar Zamani, Ishfaq Yaseen:
Optimal Deep Learning Enabled Communication System for Unmanned Aerial Vehicles. 955-969 - Eatedal Alabdulkreem, Saud S. Alotaibi

, Mohammad Alamgeer, Radwa Marzouk, Anwer Mustafa Hilal, Abdelwahed Motwakel, Abu Sarwar Zamani, Mohammed Rizwanullah:
Intelligent Cybersecurity Classification Using Chaos Game Optimization with Deep Learning Model. 971-983 - V. Krishnakumar

, R. Asokan:
Geographic Drone-based Route Optimization Approach for Emergency Area Ad-Hoc Network. 985-1000
Volume 45, Number 2, 2023
- Muhammad Junaid Umer

, Muhammad Sharif
, Majed Alhaisoni, Usman Tariq, Ye Jin Kim, Byoungchol Chang:
A Framework of Deep Learning and Selection-Based Breast Cancer Detection from Histopathology Images. 1001-1016 - Erkan Akkur, Fuat Türk, Osman Erogul:

Breast Cancer Diagnosis Using Feature Selection Approaches and Bayesian Optimization. 1017-1031 - Tianyu Liu, Pengyu Liu, Xiaowei Jia, Shanji Chen, Ying Ma, Qian Gao:

Sea-Land Segmentation of Remote Sensing Images Based on SDW-UNet. 1033-1045 - Karthick Panneerselvam

, K. Mahesh, Helen Josephine V. L, A. Ranjith Kumar:
Effective and Efficient Video Compression by the Deep Learning Techniques. 1047-1061 - Sung-Jung Hsiao, Wen-Tsai Sung

:
Intelligent Home Using Fuzzy Control Based on AIoT. 1063-1081 - Chang Zhao, Wei Sun, Xiaorui Zhang, Xiaozheng He

, Jun Zuo, Wei Zhao:
Feature Matching Combining Variable Velocity Model with Reverse Optical Flow. 1083-1094 - Wafaa N. Al-Sharu, Majdi K. Qabalin

, Muawya Naser, Omar A. Saraerh:
A Secure Framework for Blockchain Transactions Protection. 1095-1111 - Kuldeep Chouhan, Mukesh Yadav, Ranjeet Kumar Rout, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud, Sultan Aljahdali:

Sentiment Analysis with Tweets Behaviour in Twitter Streaming API. 1113-1128 - Anwer Mustafa Hilal, Eatedal Alabdulkreem, Jaber S. Alzahrani, Majdy M. Eltahir, Mohamed I. Eldesouki, Ishfaq Yaseen, Abdelwahed Motwakel, Radwa Marzouk:

Political Optimizer with Deep Learning-Enabled Tongue Color Image Analysis Model. 1129-1143 - Hoonyong Park, TaeGuen Kim, Daniel Gerbi Duguma, Jiyoon Kim

, Ilsun You, Willy Susilo
:
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. 1145-1165 - Kazim Ali, Adnan N. Qureshi, Muhammad Shahid Bhatti, Abid Sohail, Muhammad Hijji, Atif Saeed:

De-Noising Brain MRI Images by Mixing Concatenation and Residual Learning (MCR). 1167-1186 - Mohammad Alkhawatrah

:
Cooperative NOMA Based on OAM Transmission for Beyond 5G Applications. 1187-1197 - Himanshu Sharma, Karthikeyan Rajagopal, G. Gugapriya, Rajneesh Pareek, Arun Kumar, Haya Mesfer Alshahrani, Mohamed K. Nour, Hany Mahgoub, Mohamed Mousa, Anwer Mustafa Hilal:

Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS. 1199-1210 - Vineet Sharma, Mohammad Zubair Khan

, Shivani Batra, Abdullah Alsaeedi, Prakash Srivastava:
Optimizing Storage for Energy Conservation in Tracking Wireless Sensor Network Objects. 1211-1231 - S. Sivapurnima, D. Manjula:

Adaptive Deep Learning Model for Software Bug Detection and Classification. 1233-1248 - Anwer Mustafa Hilal, Amal Al-Rasheed, Jaber S. Alzahrani, Majdy M. Eltahir, Mesfer Al Duhayyim, Nermin M. Salem, Ishfaq Yaseen, Abdelwahed Motwakel:

Competitive Multi-Verse Optimization with Deep Learning Based Sleep Stage Classification. 1249-1263 - M. Reji, Christeena Joseph

, K. Thaiyalnayaki, R. Lathamanju:
Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection. 1265-1278 - G. Arunachalam, P. Sureshkumar:

Optimized Deep Learning Model for Effective Spectrum Sensing in Dynamic SNR Scenario. 1279-1294 - R. S. Aashmi, T. Jaya

:
Intrusion Detection Using Federated Learning for Computing. 1295-1308 - Le Quang Thao

, Duong Duc Cuong
, Tran Thi Tuong Anh, Tran Duc Luong:
Profiling of Urban Noise Using Artificial Intelligence. 1309-1321 - I. Ambika, Surbhi Bhatia

, Shakila Basheer, Pankaj Dadheech:
Optimized Resource Allocation and Queue Management for Traffic Control in MANET. 1323-1342 - Fadl Dahan:

Neighborhood Search Based Improved Bat Algorithm for Web Service Composition. 1343-1356 - Fuat Türk

:
Covid-19 Diagnosis Using a Deep Learning Ensemble Model with Chest X-Ray Images. 1357-1373 - A. Venkatesh, S. Asha

:
DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN. 1375-1392 - Hanan Abdullah Mengash, Jaber S. Alzahrani, Majdy M. Eltahir, Fahd N. Al-Wesabi, Abdullah Mohamed, Manar Ahmed Hamza, Radwa Marzouk:

Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model. 1393-1407 - Ayesha Heena, Nagashettappa Biradar, Najmuddin M. Maroof, Surbhi Bhatia

, Arwa A. Mashat, Shakila Basheer:
Image Enhancement Using Adaptive Fractional Order Filter. 1409-1422 - Anchal Tyagi, Salem Alelyani, Sapna Katiyar, Mohammad Rashid Hussain, Rijwan Khan, Mohammed Saleh Alsaqer:

Radial Basis Approximations Based BEMD for Enhancement of Non-Uniform Illumination Images. 1423-1438 - Sujithra Kanmani, Surendiran Balasubramanian

:
Leveraging Readability and Sentiment in Spam Review Filtering Using Transformer Models. 1439-1454 - Sandhyalati Behera

, Mihir Narayan Mohanty:
A Machine Learning Approach for Artifact Removal from Brain Signal. 1455-1467 - Doaa Sami Khafaga

, Amel Ali Alhussan, Abdelaziz A. Abdelhamid
, Abdelhameed Ibrahim
, Mohamed Saber
, El-Sayed M. El-Kenawy:
Dipper Throated Algorithm for Feature Selection and Classification in Electrocardiogram. 1469-1482 - A. Jameer Basha

, M. Ramya Devi, S. Lokesh, P. Sivaranjani, D. Mansoor Hussain, Venkat Padhy:
PSO-DBNet for Peak-to-Average Power Ratio Reduction Using Deep Belief Network. 1483-1493 - Basant Tomar, Narendra Kumar, Mini Sreejeth

:
Real Time Automation and Ratio Control Using PLC & SCADA in Industry 4.0. 1495-1516 - Wisam Hayder Mahdi

, Necmi Taspinar:
Resource Allocation Based on SFLA Algorithm for D2D Multicast Communications. 1517-1530 - Mohsen Eid, Tamer Medhat, Manal E. Ali:

Attribute Reduction for Information Systems via Strength of Rules and Similarity Matrix. 1531-1544 - P. Sumathi, V. V. Karthikeyan, Muthu Subash Kavitha, S. Karthik:

Improved Soil Quality Prediction Model Using Deep Learning for Smart Agriculture Systems. 1545-1559 - Riya Kumarasamy Santhanaraj, Surendran Rajendran, Carlos Andrés Tavera Romero, Sadish Sendil Murugaraj

:
Internet of Things Enabled Energy Aware Metaheuristic Clustering for Real Time Disaster Management. 1561-1576 - R. Dhanya, R. Kalaiselvi:

Copy Move Forgery Detection Using Novel Quadsort Moth Flame Light Gradient Boosting Machine. 1577-1593 - Ahmad Mohammed Alamri

, Ahmad Ali AlZubi
:
An Optimized Method for Accounting Information in Logistic Systems. 1595-1609 - Thinakaran Vasantha Chithra, Arulappan Milton:

Energy Proficient Reduced Coverage Set with Particle Swarm Optimization for Distributed Sensor Network. 1611-1623 - B. Yasotha, T. Sasikala, M. Krishnamurthy:

Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT. 1625-1640 - K. Karthikeyan, Liyakathunisa, Eman Aljohani, Thavavel Vaiyapuri:

Improved Metaheuristic Based Failure Prediction with Migration Optimization in Cloud Environment. 1641-1654 - G. Nallasivan

, V. Ramachandran, Roobaea Alroobaea
, Jasem Almotiri:
Liver Tumors Segmentation Using 3D SegNet Deep Learning Approach. 1655-1677 - Mashael M. Asiri

, Heba G. Mohamed, Mohamed K. Nour, Mesfer Al Duhayyim, Amira Sayed A. Aziz, Abdelwahed Motwakel, Abu Sarwar Zamani, Mohamed I. Eldesouki:
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model. 1679-1694 - Xiaorui Zhang, Feng Xu, Wei Sun, Yan Jiang, Yi Cao:

Fast Mesh Reconstruction from Single View Based on GCN and Topology Modification. 1695-1709 - Manar Ahmed Hamza, Aisha Hassan Abdalla Hashim, Dalia H. Elkamchouchi, Nadhem Nemri

, Jaber S. Alzahrani, Amira Sayed A. Aziz, Mnahel Ahmed Ibrahim, Abdelwahed Motwakel:
Energy-Efficient Routing Using Novel Optimization with Tabu Techniques for Wireless Sensor Network. 1711-1726 - Jing Wang, Xiangyu Lei, Qisheng Jiang, Osama Alfarraj, Amr Tolba

, Gwang-Jun Kim:
DoS Attack Detection Based on Deep Factorization Machine in SDN. 1727-1742 - G. Sharmila

, M. K. Kavitha Devi
:
Blockchain Based Consensus Algorithm and Trustworthy Evaluation of Authenticated Subgraph Queries. 1743-1758 - Manar Ahmed Hamza, Haya Mesfer Alshahrani, Sami Dhahbi

, Mohamed K. Nour, Mesfer Al Duhayyim, Elsayed M. Tag El Din, Ishfaq Yaseen, Abdelwahed Motwakel:
Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol. 1759-1773 - Abdelhamied A. Ateya, Amel Ali Alhussan, Hanaa A. Abdallah

, Mona A. Alduailij, Abdukodir Khakimov, Ammar Muthanna:
Edge Computing Platform with Efficient Migration Scheme for 5G/6G Networks. 1775-1787 - S. Arun Mozhi Selvi, Roobaea Alroobaea

, Saeed Rubaiee, Abdulkader S. Hanbazazah:
Optimized Resource Allocation for IoT-D2D Communication Using WSN. 1789-1804 - Jin Wang, Wei Ou, Osama Alfarraj, Amr Tolba

, Gwang-Jun Kim, Yongjun Ren:
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain. 1805-1819 - K. Madumathi

, S. Chandrasekar:
Spotted Hyena-Bat Optimized Extreme Learning Machine for Solar Power Extraction. 1821-1836 - K. Kamaraj, B. Lanitha, S. Karthic, P. N. Senthil Prakash, R. Mahaveerakannan

:
A Hybridized Artificial Neural Network for Automated Software Test Oracle. 1837-1850 - V. Harshini, T. Dhanwin, A. Shahina

, N. Safiyyah
, A. Nayeemulla Khan:
Efficient Authentication System Using Wavelet Embeddings of Otoacoustic Emission Signals. 1851-1867 - V. Divya

, S. Sendil Kumar, V. Gokula Krishnan
, Manoj Kumar
:
Signal Conducting System with Effective Optimization Using Deep Learning for Schizophrenia Classification. 1869-1886 - P. Gomathi, C. Muniraj, P. S. Periasamy:

Micro Calcification Detection in Mammogram Images Using Contiguous Convolutional Neural Network Algorithm. 1887-1899 - Abdllkader Esaid, Mary Agoyi:

Avoid Suspicious Route of Blackhole Nodes in MANET's: Using A Cooperative Trapping. 1901-1915 - El-Sayed M. El-Kenawy, Abdelaziz A. Abdelhamid

, Abdelhameed Ibrahim
, Seyedali Mirjalili, Nima Khodadad, Mona A. Alduailij, Amel Ali Alhussan, Doaa Sami Khafaga
:
Al-Biruni Earth Radius (BER) Metaheuristic Search Optimization Algorithm. 1917-1934 - Pankaj Kumar Sharma, Uma Shankar Modani:

Trusted Cluster-Based Communication for Wireless Sensor Network Using Meta-Heuristic Algorithms. 1935-1951 - M. Jamunarani, C. Vasanthanayaki:

ELM-Based Shape Adaptive DCT Compression Technique for Underwater Image Compression. 1953-1970 - Sowjanya Ramisetty, Divya Anand

, Kavita, Sahil Verma
, N. Z. Jhanjhi, Mehedi Masud, Mohammed Baz:
Energy Efficient Unequal Fault Tolerance Clustering Approach. 1971-1983 - S. Sudha, A. Srinivasan

, T. Gayathri Devi:
Cross-Validation Convolution Neural Network-Based Algorithm for Automated Detection of Diabetic Retinopathy. 1985-2000 - Sharmilee Kannan, R. U. Anitha, M. Divayapushpalakshmi, K. S. Kalaivani:

IoT-Deep Learning Based Activity Recommendation System. 2001-2016 - K. Jagadeesh

, A. Rajendran:
Improved Model for Genetic Algorithm-Based Accurate Lung Cancer Segmentation and Classification. 2017-2032 - Anwer Mustafa Hilal, Aisha Hassan Abdalla Hashim, Heba G. Mohamed, Lubna Alharbi

, Mohamed K. Nour, Abdullah Mohamed, Ahmed S. Almasoud, Abdelwahed Motwakel:
Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks. 2033-2047 - Aravindan Madhavan, Govindarajan Yamuna, Neelakandan Rajamohan:

Coherence Based Sufficient Condition for Support Recovery Using Generalized Orthogonal Matching Pursuit. 2049-2058 - Raed Alhamad, Hatem Boujemaa:

NOMA with Adaptive Transmit Power Using Intelligent Reflecting Surfaces. 2059-2070 - Waleed Halboob, Jalal Al-Muhtadi

:
Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation. 2071-2092 - Sureshkumar Rajagopal, Tamilvizhi Thanarajan, Youseef Alotaibi, Saleh Alghamdi:

Brain Tumor: Hybrid Feature Extraction Based on UNet and 3DCNN. 2093-2109 - Chuqing Zhang, Jiangyuan Yao, Guangwu Hu, Xingcan Cao:

A Machine Learning Based Funding Project Evaluation Decision Prediction. 2111-2124 - Usman Ahmad

, Muhammad Junaid Ali, Faizan Ahmed Khan
, Arfat Ahmad Khan, Arif Ur Rehman, Malik Muhammad Ali Shahid, Mohd Anul Haq, Ilyas Khan, Zamil S. Alzamil, Ahmed Alhussen:
Large Scale Fish Images Classification and Localization using Transfer Learning and Localization Aware CNN Architecture. 2125-2140 - Prohim Tam

, Sa Math, Seokhoon Kim:
Adaptive Partial Task Offloading and Virtual Resource Placement in SDN/NFV-Based Network Softwarization. 2141-2154 - Liangjun Deng, Hang Lei, Zheng Yang, Weizhong Qian, Xiaoyu Li, Hao Wu, Sihao Deng

, Ruchao Sha, Weidong Deng:
Formal Verification Platform as a Service: WebAssembly Vulnerability Detection Application. 2155-2170 - Anis Ammous, Ammar Alsaedi, Ahmed N. M. Alahmadi, Fahad Alharbi

, Kair Ammous:
Efficiency Performances of LVDC Supplies for Residential Building. 2171-2186 - M. Priyadharsini

, K. Karuppasamy:
Heterogeneous Ensemble Feature Selection Model (HEFSM) for Big Data Analytics. 2187-2205 - Yonghui Duan, Keqing Zhao, Yibin Guo, Xiang Wang:

Early Warning of Commercial Housing Market Based on Bagging-GWO-SVM. 2207-2222 - Alla Abbas Khadir

, Seyed Amin Hosseini Seno, Baydaa Fadhil Dhahir, Rahmat Budiarto
:
Efficient-Cost Task Offloading Scheme in Fog-Internet of Vehicle Networks. 2223-2234 - Mostafa Nassar, Anas M. Ali, Walid El Shafai, Adel A. Saleeb, Fathi E. Abd El-Samie, Naglaa F. Soliman

, Hussah Nasser Aleisa, Hossam Eldin H. Ahmed:
Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection. 2235-2247 - R. S. Sandhya Devi

, V. R. Vijayakumar, P. Sivakumar:
EfficientNetV2 Model for Plant Disease Classification and Pest Recognition. 2249-2263 - P. M. Arunkumar, Mehedi Masud, Sultan Aljahdali, Mohamed Abouhawwash:

Healthcare Monitoring Using Ensemble Classifiers in Fog Computing Framework. 2265-2280
Volume 45, Number 3, 2023
- Neema George

, B. K. Anoop, Vinodh P. Vijayan:
Tricube Weighted Linear Regression and Interquartile for Cloud Infrastructural Resource Optimization. 2281-2297 - L. Amudha

, R. Pushpalakshmi:
Performance Analysis of Hybrid RR Algorithm for Anomaly Detection in Streaming Data. 2299-2312 - J. Harikiran, Bolem Sai Chandana, B. Srinivasarao, B. Raviteja, Tatireddy Subba Reddy:

Software Defect Prediction Based Ensemble Approach. 2313-2331 - Supriya Gupta

, Aakanksha Sharaff
, Naresh Kumar Nagwani:
Graph Ranked Clustering Based Biomedical Text Summarization Using Top k Similarity. 2333-2349 - S. Aanjanadevi, S. Aanjankumar

, K. R. Ramela, V. Palanisamy:
Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics. 2351-2362 - A. Jenice Prabhu, D. Hevin Rajesh:

Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm. 2363-2376 - Mohamed Esmail Karar

, Omar Reyad
, Hazem I. Shehata:
Deep Forest-Based Fall Detection in Internet of Medical Things Environment. 2377-2389 - Smarajit Ghosh:

Method for Fault Diagnosis and Speed Control of PMSM. 2391-2404 - J. Maria Regila Baby, K. Uma Samundesvari

:
Complete Cototal Roman Domination Number of a Graph for User Preference Identification in Social Media. 2405-2415 - S. Praveenkumar

, T. Karthick:
Human Stress Recognition by Correlating Vision and EEG Data. 2417-2433 - L. Maria Michael Visuwasam

, D. Paul Raj:
Spatio Temporal Tourism Tracking System Based on Adaptive Convolutional Neural Network. 2435-2446 - Ahmed Zohair Ibrahim, P. Prakash, V. Sakthivel, P. Prabu:

Integrated Approach of Brain Disorder Analysis by Using Deep Learning Based on DNA Sequence. 2447-2460 - Abdulaziz Alhubaishy, Abdulmajeed Aljuhani:

A Load-Fairness Prioritization-Based Matching Technique for Cloud Task Scheduling and Resource Allocation. 2461-2481 - K. Sreelakshmy, Himanshu Gupta

, Om Prakash Verma
, Kapil Kumar, Abdelhamied A. Ateya, Naglaa F. Soliman
:
3D Path Optimisation of Unmanned Aerial Vehicles Using Q Learning-Controlled GWO-AOA. 2483-2503 - Yizhi Liu, Rutian Qing, Yijiang Zhao, Xuesong Wang, Zhuhua Liao, Qinghua Li, Buqing Cao:

Fusing Spatio-Temporal Contexts into DeepFM for Taxi Pick-Up Area Recommendation. 2505-2519 - M. Vargheese, Surbhi Bhatia

, Shakila Basheer, Pankaj Dadheech:
Improved Multi-Path Routing for QoS on MANET. 2521-2536 - S. Jayaprakash

, B. Gopi, Murugananth Gopal Raj
, S. Sujith, S. Deepa, S. Swapna:
Development of Energy Management System for Micro Grid Operation. 2537-2551 - Anitha Thangasamy, Bose Sundan

, Logeswari Govindaraj:
A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques. 2553-2567 - Kittipol Wisaeng:

Automatic Optic Disc Detection in Retinal Images Using FKMT‒MOPDF. 2569-2586 - Sayyed Mudassar Shah, Tariq Hussain

, Babar Shah, Farman Ali
, Khalid Zaman, Kyung-Sup Kwak:
CEER: Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters. 2587-2602 - S. Priyadharshini

, Ansuman Mahapatra
:
A Personalized Video Synopsis Framework for Spherical Surveillance Video. 2603-2616 - Mudassir Shams

, Nasreen Kausar, Ebru Ozbilge, Alper Bulut:
Stable Computer Method for Solving Initial Value Problems with Engineering Applications. 2617-2633 - J. R. Arunkumar, S. Velmurugan

, Balarengadurai Chinnaiah, G. Charulatha
, M. Ramkumar Prabhu
, A. Prabhu Chakkaravarthy:
Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT. 2635-2645 - Geeta Arora, Pinkey Chauhan

, Muhammad Imran Asjad
, Varun Joshi, Homan Emadifar, Fahd Jarad:
Particle Swarm Optimization for Solving Sine-Gordan Equation. 2647-2658 - B. Annapoorani, P. Marikkannu:

Performance Measurement of Energy Efficient and Highly Scalable Hybrid Adder. 2659-2672 - S. Vidhya

, V. Kalaivani
:
Secured Health Data Transmission Using Lagrange Interpolation and Artificial Neural Network. 2673-2692 - Muhammad Irfan, Wasi Ur Rehman Khan, Sadiq Ullah

, Naveed Mufti, Muhammad Fawad Khan, Rizwan Ullah
, Usman Ali, Fazal Muhammad, Faisal AlThobiani, Mohammed Alshareef
, Shadi Alghaffari, Saifur Rehman
, V. R. Shamji:
Cactus-Shaped Frequency Reconfigurable Antenna for Sub 10 GHz Wireless Applications. 2693-2704 - N. Sathiabama, S. Anila:

A Universal BIST Approach for Virtex-Ultrascale Architecture. 2705-2720 - T. Deepikavinothini, R. Karthigaivel, J. Barsanabanu

:
Selective Harmonics Elimination Technique for Artificial Bee Colony Implementation. 2721-2740 - Le Duc Thuan, Pham Van Huong, Hoang Van Hiep, Nguyen Kim Khanh:

Applying Wide & Deep Learning Model for Android Malware Classification. 2741-2759 - A. Sriram, T. D. Sudhakar

:
Photovoltaic Cell Panels Soiling Inspection Using Principal Component Thermal Image Processing. 2761-2772 - C. Thilaga

, P. B. Sarasija:
Small-World Networks with Unitary Cayley Graphs for Various Energy Generation. 2773-2782 - Xi Huang

, Shibin Zhang, Chen Lin, Jinyue Xia:
Quantum Fuzzy Support Vector Machine for Binary Classification. 2783-2794 - R. Sabitha, C. Gokul Prasad, S. Karthik:

Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks. 2795-2810 - S. Pandeeswari, S. Jaganathan

:
DC-DC Converter with Pi Controller for BLDC Motor Fuzzy Drive System. 2811-2825 - Nidhi Gour, Rajneesh Pareek, Karthikeyan Rajagopal, Himanshu Sharma, Mrim M. Alnfiai

, Mohammed A. Alzain, Mehedi Masud, Arun Kumar:
A Novel Approximate Message Passing Detection for Massive MIMO 5G System. 2827-2835 - Amr A. Munshi

:
Evaluation of Grid-Connected Photovoltaic Plants Based on Clustering Methods. 2837-2852 - S. Periyanayagi, V. Nandini, K. Basarikodi

, V. Sumathy:
IOT Assisted Biomedical Monitoring Sensors for Healthcare in Human. 2853-2868 - S. Lavanya, N. M. Saravanakumar:

Graph-Based Replication and Two Factor Authentication in Cloud Computing. 2869-2883 - El-Sayed M. El-Kenawy, Abdelaziz A. Abdelhamid, Fadwa M. Alrowais, Mostafa Abotaleb

, Abdelhameed Ibrahim
, Doaa Sami Khafaga
:
Al-Biruni Based Optimization of Rainfall Forecasting in Ethiopia. 2885-2899 - Amita Asthana, Anil Kumar, Preeta Sharan:

N×N Clos Digital Cross-Connect Switch Using Quantum Dot Cellular Automata (QCA). 2901-2917 - J. Jaculin Femil, T. Jaya

:
An Efficient Hybrid Optimization for Skin Cancer Detection Using PNN Classifier. 2919-2934 - Nesreen Althobaiti, Ali Raza

, Arooj Nasir, Jan Awrejcewicz, Muhammad Rafiq, Nauman Ahmed, Witold Pawlowski, Muhammad Jawaz, Emad E. Mahmoud:
New Trends in the Modeling of Diseases Through Computational Techniques. 2935-2951 - Mohammad Al Mojamed

:
A Duty Cycle-Based Gateway Selection Algorithm for LoRaWAN Downlink Communication. 2953-2970 - C. Preethi, M. Mohamed Sathik, S. Shajun Nisha:

3D Echocardiogram Reconstruction Employing a Flip Directional Texture Pyramid. 2971-2988 - Munkhtsetseg, Jeongwook Seo:

Android IoT Lifelog System and Its Application to Motion Inference. 2989-3003 - K. Anuratha, M. Parvathy:

Multi-label Emotion Classification of COVID-19 Tweets with Deep Learning and Topic Modelling. 3005-3021 - M. Revathi, V. V. Ramalingam

, B. Amutha:
RMCARTAM For DDoS Attack Mitigation in SDN Using Machine Learning. 3023-3036 - Fatma S. Alrayes, Najm Alotaibi, Jaber S. Alzahrani, Sana Alazwari, Areej Alhogail, Ali M. Al-Sharafi, Mahmoud Othman, Manar Ahmed Hamza:

Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection. 3037-3052 - Ernesto Lee

, Furqan Rustam, Hina Fatima Shahzad
, Patrick Bernard Washington, Abid Ishaq
, Imran Ashraf:
Drug Usage Safety from Drug Reviews with Hybrid Machine Learning Approach. 3053-3077 - M. Amirthavalli, S. Chithra, R. Yugha:

An Improved Pairing-Free Ciphertext Policy Framework for IoT. 3079-3095 - Abdelwahed Motwakel, Badriyya Alonazi, Jaber S. Alzahrani, Radwa Marzouk, Amira Sayed A. Aziz, Abu Sarwar Zamani, Ishfaq Yaseen, Amgad Atta Abdelmageed:

Convolutional Deep Belief Network Based Short Text Classification on Arabic Corpus. 3097-3113 - Ramanjaneyulu Kolla

, Vinayagasundaram Ganesh, Rajendran Sakthivel, Arumugam Kumar Boobalasenthilraj:
Simulation and Experimental Design of Load Adaptive Braking System on Two Wheeler. 3115-3134 - Mohammed Alonazi

, Mrim M. Alnfiai
:
Fire Hawk Optimizer with Deep Learning Enabled Human Activity Recognition. 3135-3150 - H. L. Chandrakala, R. Loganathan

:
Efficient Heuristic Replication Techniques for High Data Availability in Cloud. 3151-3164 - Fadwa Yahya, Lassaad Ben Ammar, Karim Gasmi

:
Usability-Driven Mobile Application Development. 3165-3180 - Huangjing Yu, Jinming Qiu, Ning Cao, Russell Higgs

:
Intelligent Color Reasoning of IOT Based on P-laws. 3181-3193 - Zahraa Tarek

, Samaa M. Shohieb
, Abd Elghaffar M. Elhady
, El-Sayed M. El-Kenawy, Mahmoud Y. Shams
:
Eye Detection-Based Deep Belief Neural Networks and Speeded-Up Robust Feature Algorithm. 3195-3213 - Aghila Rajagopal, Sultan Ahmad

, Sudan Jha, Ramachandran Alagarsamy
, Abdullah Alharbi, Bader Alouffi:
A Robust Automated Framework for Classification of CT Covid-19 Images Using MSI-ResNet. 3215-3229 - E. Susi, A. P. Shanthi:

Sentiment Drift Detection and Analysis in Real Time Twitter Data Streams. 3231-3246

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














