


default search action
Journal of Database Management, Volume 34
Volume 34, Number 1, 2023
- Prajwal Eachempati, Praveen Ranjan Srivastava

:
Prediction of the Stock Market From Linguistic Phrases: A Deep Neural Network Approach. 1-22 - Haiyan Wang, Jun Hong, Kaixiang You, Jian Luo:

Multi-Feature Video Recommendation Based on Hypergraph Convolution for Mobile Edge Environment. 1-18 - Taiyu Ban

, Xiangyu Wang, Xin Wang, Jiarun Zhu
, Lvzhou Chen, Yizhan Fan:
Knowledge Extraction From National Standards for Natural Resources: A Method for Multi-Domain Texts. 1-23 - Yanwei Zheng, Zichun Zhang, Qi Luo, Zhenzhen Xie, Dongxiao Yu:

A Truss-Based Framework for Graph Similarity Computation. 1-18 - Jun Lu, Wenhe Xu, Kailong Zhou, Zhicong Guo:

Frequent Itemset Mining Algorithm Based on Linear Table. 1-21 - Nan Feng, Yuguang Wang, Zhiguo Chen, Tingting Song:

The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis. 1-23 - Gang Peng

, Rahul Bhaskar:
Artificial Intelligence and Machine Learning for Job Automation: A Review and Integration. 1-12 - Fangwan Huang, Shijie Zhuang, Zhiyong Yu, Yuzhong Chen, Kun Guo:

Adaptive Modularized Recurrent Neural Networks for Electric Load Forecasting. 1-18 - Jeng-Shyang Pan

, Pei Hu, Tien-Szu Pan, Shu-Chuan Chu
:
Improved Equilibrium Optimizer for Short-Term Traffic Flow Prediction. 1-20 - Yifei Xue, Jian Wang, Weipeng Jing:

An Enhanced Energy-Efficient Web Service Composition Algorithm Based on the Firefly Algorithm. 1-19 - Junhua Fang, Zonglei Zhang:

A Distributed Spatial Index With High Update Efficiency for Location-Based Real-Time Services. 1-28 - Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:

Selecting Rotation Constants on SIMON-Type Ciphers. 1-23 - Junfeng Man, Longqian Zhao, Bowen Xu, Cheng Peng, Junjie Jiang, Yi Liu:

Computation Offloading Method for Large-Scale Factory Access in Edge-Edge Collaboration Mode. 1-29 - Huosong Xia

, Wuyue An, Zuopeng Justin Zhang
:
Credit Risk Models for Financial Fraud Detection: A New Outlier Feature Analysis Method of XGBoost With SMOTE. 1-20 - Harish Kumar

, Rameshwar Shivadas Ture
, M. P. Gupta, R. S. Sharma:
Technological Solutions for Digital Identity: A Computer Vision-Based Approach to Mitigate Imaging Errors. 1-17 - Gongqing Wu, Zhuochun Miao, Shengjie Hu, Yinghuan Wang, Zan Zhang, Xianyu Bao:

Semi-Supervised Event Extraction Incorporated With Topic Event Frame. 1-26 - Rankang Li, Shanxiong Chen, Fujia Zhao, Xiaogang Qiu:

Text Detection Model for Historical Documents Using CNN and MSER. 1-23 - Pranay Sindhu

, Kumkum Bharti
:
The Effects of Atmospherics and Influencers on Purchase Intention in Social Commerce. 1-23 - Mehmet Demir, Ozgur Turetken

, Alexander Ferworn
, Mehdi Kargar:
A Blockchain-Based System for Aid Delivery: Concept Development, Data Modeling, and Validation. 1-35
Volume 34, Number 2, 2023
- Monu Singh, Amit Kumar Singh:

Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE. 1-20 - R. Gurunath

, Debabrata Samanta
:
A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography. 1-22 - Farhan Ullah

, Xiaochun Cheng
, Leonardo Mostarda
, Sohail Jabbar:
Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis. 1-26 - Maryam Bukhari, Sadaf Yasmin, Saira Andleeb Gillani, Muazzam Maqsood, Seungmin Rho, Sang Soo Yeo

:
Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks. 1-25 - Erukala Suresh Babu

, Bhukya Padma
, Soumya Ranjan Nayak
, Nazeeruddin Mohammad, Uttam Ghosh
:
Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything. 1-33 - Parul Lakhotia, Rinky Dwivedi, Deepak Kumar Sharma

, Nonita Sharma:
Intrusion Detection System for IoE-Based Medical Networks. 1-18
Volume 34, Number 3, 2023
- Yalan Feng, Huabin Wang, Dai-lei Zhang, Jiahao Li, Liang Tao:

One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding. 1-18 - Wenjie Liu, Sai Chen, Guoyao Huang, Lingfeng Lu, Huakang Li, Guozi Sun

:
Incorporating I Ching Knowledge Into Prediction Task via Data Mining. 1-16 - Peng Chen, Shuang Liu, Niko Lukac

:
CNN-Based Vessel Meeting Knowledge Discovery From AIS Vessel Trajectories. 1-38 - Yikai Liu, Fenglan Ju, Qunwei Zhang, Meng Zhang, Zezhong Ma

, Mingduo Li, Aimin Yang, Fengchun Liu:
Overview of Internet of Medical Things Security Based on Blockchain Access Control. 1-20 - Liqun Liu, Renyuan Gu, Jiuyuan Huo, Yubo Zhou:

Origin-Oriented Shuffled Frog Leaping Vehicle Routing Multiobjective Optimization Algorithm. 1-24 - Zhihua Zhong, Guanlin Chen, Rui Wang, Yuchi Huo:

Neural Super-Resolution in Real-Time Rendering Using Auxiliary Feature Enhancement. 1-13 - Yongdong Li, Liang Qu, Guiyan Cai, Guoan Cheng, Long Qian

, Yuling Dou, Fengqin Yao, Shengke Wang:
Video Object Counting With Scene-Aware Multi-Object Tracking. 1-13 - Tian Zhang:

Target Detection for Motion Images Using the Improved YOLO Algorithm. 1-17 - Min Li, Huabin Wang, Leqian Li, Dai-lei Zhang, Liang Tao:

Finger Vein Recognition Based on a Histogram of Competitive Gabor Directional Binary Statistics. 1-19 - Hongjie Wan, Junchen Ma, Qiumei Yu, Guozi Sun

, Hansen He, Huakang Li:
Modeling and Optimization of Multi-Model Waste Vehicle Routing Problem Based on the Time Window. 1-16 - Hui Li

, Yifei Zhu:
Privacy-Preserving Contact Tracing for Curbing the Spread of Infectious Disease. 1-17 - Xintong Song, Donghua Yang, Yutong Wang, Hongzhi Wang

, Jinbao Wang, Bo Zheng:
TransFusion Model Fusion Mechanism Based on Transformer for Traffic Flow Prediction. 1-14 - Haiyi Liu, Ying Jiang, Yongquan Chen:

Completion of Parallel app Software User Operation Sequences Based on Temporal Context. 1-17 - Feng Ye

, Xinjun Sheng, Nadia Nedjah, Jun Sun, Peng Zhang:
A Benchmark for Performance Evaluation of a Multi-Model Database vs. Polyglot Persistence. 1-20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














