Stop the war!
Остановите войну!
for scientists:
default search action
The Journal of Supercomputing, Volume 80
Volume 80, Number 1, January 2024
- Zhiyong Zhou, Yuanning Liu, Xiaodong Zhu, Shuai Liu, Shaoqiang Zhang, Yuanfeng Li, Zhen Liu:
Lifelong iris presentation attack detection without forgetting. 1-19 - Dahai Xia, Xinyun Wu, Meng Yan, Caiquan Xiong:
An adaptive stochastic ranking-based tournament selection method for differential evolution. 20-49 - Khalid Javeed, Ali El-Moursy, David Gregg:
E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p). 50-74 - Chandan Kumar, Sudhanshu Kumar Jha, Dilip Kumar Yadav, Shiv Prakash, Mukesh Prasad:
A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic. 75-97 - Avita Katal, Tanupriya Choudhury, Susheela Dahiya:
Energy optimized container placement for cloud data centers: a meta-heuristic approach. 98-140 - Sally Mohamed Sameh, Hossam El-Din Moustafa, Ehab H. Abdelhay, Mohamed Maher Ata:
An effective chaotic maps image encryption based on metaheuristic optimizers. 141-201 - Huafeng Wu, Feng Wang, Xiaojun Mei, Linian Liang, Bing Han, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li:
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors. 202-225 - Omar Younis Abdulhammed:
A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. 226-248 - Na Dong, Qingyue Feng, Jianfang Chang, Xiaoming Mai:
White blood cell classification based on a novel ensemble convolutional neural network framework. 249-270 - R. Rajalakshmi, P. Sivakumar, L. Krishna Kumari, M. Chengathir Selvi:
A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism. 271-291 - Rebecca H. K. Emanuel, Paul David Docherty, Helen Lunt, Knut Möller:
The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration. 292-312 - Yonghao Lai, Xiaohui Hua:
Component edge connectivity and extra edge connectivity of alternating group networks. 313-330 - Jin Yang, Wangdong Yang, Ruixuan Qi, Qinyun Tsai, Shengle Lin, Fengkun Dong, Kenli Li, Keqin Li:
Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer. 331-362 - Chih-Yung Chang, Syu-Jhih Jhang, Shih-Jung Wu, Diptendu Sinha Roy:
JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP. 363-394 - Ruisheng Ran, Ting Wang, Zheng Li, Bin Fang:
Polynomial linear discriminant analysis. 413-434 - Ju-Won Park, Xin Huang, Chul-Ho Lee:
Analyzing and predicting job failures from HPC system log. 435-462 - Emmanuel Ahishakiye, Waweru Mwangi, Petronilla Muriithi, Fredrick Kanobe, Godliver Owomugisha, Danison Taremwa, Lenard Nkalubo:
Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data. 463-485 - Beste Ustubioglu, Gul Tahaoglu, Güzin Ulutas, Arda Ustubioglu, Muhammed Kilic:
Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach. 486-518 - Tian Tian, Anshi Wang, Xiuting Yang, Dunwei Gong, Tie Hou, Xiangjuan Yao:
Parallel program testing based on critical communication and branch transformation. 519-548 - Tobias Piontek, Kawsar Haghshenas, Marco Aiello:
Carbon emission-aware job scheduling for Kubernetes deployments. 549-569 - Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali:
SOS-FCI: a secure offloading scheme in fog-cloud-based IoT. 570-600 - Hamed Jalilian:
Total variation method based on modified Barzilai-Borwein algorithm to noise reduction in MRI images. 601-619 - Qun Li, Bei Tang, Jianxin Li, Siguang Chen:
User satisfaction-based energy-saving computation offloading in fog computing networks. 620-641 - Rong Gao, Wei He, Lingyu Yan, Donghua Liu, Yonghong Yu, Zhiwei Ye:
Hybrid graph transformer networks for multivariate time series anomaly detection. 642-669 - Fatemeh Vardi, Alireza Mahjoub:
A hot-module-aware mapping approach in network-on-chip. 670-702 - Sujit Sangram Sahoo, Vijay Kumar Chaurasiya:
Proof of location based delivery system using multi-party virtual state channel: a blockchain model. 703-733 - Mao-Lun Chiang, Hui-Ching Hsieh, Tzu-Ling Lin, Tsui-Ping Chang, Hong-Wei Chen:
Dynamic weight-based connectivity recovery in wireless sensor and actor networks. 734-760 - Elham Dalirinia, Mehrdad Jalali, Mahdi Yaghoobi, Hamid Tabatabaee:
Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization. 761-799 - Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee, Ahmad Keshavarz:
A new improved KNN-based recommender system. 800-834 - Dikshit Chauhan, Anupam Yadav:
Stability and agent dynamics of artificial electric field algorithm. 835-864 - Namrata Singh, Ayan Kumar Das:
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor. 865-914 - Zahra Mahmoodabadi, Mostafa Nouri-Baygi:
An approximation algorithm for virtual machine placement in cloud data centers. 915-941 - Rakesh Kumar, Sunil K. Singh, D. K. Lobiyal:
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks. 942-969 - Sheng-Tzong Cheng, Gwo-Jiun Horng, Chih-Wei Hsu, Z.-Yu Su:
Per-user network access control kernel module with secure multifactor authentication. 970-1008 - Maedeh Khalifavi, Zahra Shirmohammadi, Sahar Kianian:
FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method. 1009-1036 - Tariq Shah, Tanveer ul Haq:
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. 1037-1058 - Mehmet Bozdal, Kadir Ileri, Ali Ozkahraman:
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset. 1059-1079 - Indushree M, Manish Raj:
A novel Blockchain-based authentication scheme for telecare medical information system. 1080-1108 - Sadoon Azizi, Pedram Farzin, Mohammad Shojafar, Omer F. Rana:
A scalable and flexible platform for service placement in multi-fog and multi-cloud environments. 1109-1136 - Tundong Liu, Fengqiang Gao, Xin Chen, Guifang Shao, Chenhan Wang:
Research on load-balancing scheduling optimization for wafer surface defect detection. 1137-1159 - Jihene Latrech, Zahra Kodia, Nadia Ben Azzouna:
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning. 1160-1182 - Zuoyan Zhang, Jinchen Xu, Jiangwei Hao, Yang Qu, Haotian He, Bei Zhou:
Hierarchical search algorithm for error detection in floating-point arithmetic expressions. 1183-1205 - Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaz-Nava, Enrico Ferrera:
Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance. 1206-1237 - Sumit Sharma, Sarika Jain:
CovidO: an ontology for COVID-19 metadata. 1238-1267 - Sibo Qi, Juan Chen, Peng Chen, Peian Wen, Xianhua Niu, Lei Xu:
An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers. 1268-1293 - Xiaomei Li, Ye Lu, Xiaoyu Zhao, Xiong Deng, Zhijiang Xie:
Path planning for intelligent vehicles based on improved D* Lite. 1294-1330 - C. Pabitha, B. Vanathi:
Dense Mesh RCNN: assessment of human skin burn and burn depth severity. 1331-1362 - Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien-Hsiung Weng, Kuan-Ching Li:
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data. 1363-1364 - Minghua Tang, Enrico Russo, Maurizio Palesi:
Correction to: The position-based compression techniques for DNN model. 1365 - Yifei Wang, Mert Pilanci:
Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path. 1366
Volume 80, Number 2, January 2024
- Preetpal Kaur Buttar, Manoj Kumar Sachan:
Semantic segmentation of satellite images for crop type identification in smallholder farms. 1367-1395 - Zhonghua Chen, S. B. Goyal, Anand Singh Rajawat:
Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. 1396-1425 - Xiaoxin Gao, Fazhi He, Songwei Zhang, Jinkun Luo, Bo Fan:
A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively. 1426-1463 - Bahram Rashidi:
Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection. 1464-1490 - Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:
An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing. 1491-1521 - Santosh Kumar Uppada, B. S. Ashwin, B. Sivaselvan:
A novel evolutionary approach-based multimodal model to detect fake news in OSNs using text and metadata. 1522-1553 - Melika Amiri, Massoud Dousti, Majid Mohammadi:
Design and implementation of carry-save adder using quantum-dot cellular automata. 1554-1567 - Md Yeasin, Ranjit Kumar Paul:
OptiSembleForecasting: optimization-based ensemble forecasting using MCS algorithm and PCA-based error index. 1568-1597 - Carmen Carrión:
Research streams and open challenges in the metaverse. 1598-1639 - Zhaoxia Tian, Mingzu Zhang, Xing Feng:
Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links. 1640-1667 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures. 1668-1693 - Yi Yang, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 1694-1727 - Amjad Qtaish, Malik Braik, Dheeb Albashish, Mohammad T. Alshammari, Abdulrahman Alreshidi, Eissa Jaber Alreshidi:
Optimization of K-means clustering method using hybrid capuchin search algorithm. 1728-1787 - Shaurya Sood, Neminath Hubballi:
SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters. 1788-1817 - Arvind Mewada, Rupesh Kumar Dewang:
NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media. 1818-1851 - Mirna Magdy, Mohamed O. Grida, Gawaher S. Hussein:
Disruption mitigation in the semiconductors supply chain by using public blockchains. 1852-1906 - Huanwen Zhang, Yan Wang, Jianxi Fan, Yuejuan Han, Baolei Cheng:
Constructing edge-disjoint spanning trees in several cube-based networks with applications to edge fault-tolerant communication. 1907-1934 - Nartay Aikyn, Ardan Zhanegizov, Temirlan Aidarov, Dinh-Mao Bui, Nguyen Anh Tu:
Efficient facial expression recognition framework based on edge computing. 1935-1972 - Divya Paikaray, Ashok Kumar Mehta, Danish Ali Khan:
Optimized convolutional neural network for the classification of lung cancer. 1973-1989 - Ramzi A. Haraty, Ali Assaf:
DG-means: a superior greedy algorithm for clustering distributed data. 1990-2024 - Yanjiang Han, Fengping Wang, Wei Wang, Xiangyu Li, Jianyang Zhang:
YOLO-SG: Small traffic signs detection method in complex scene. 2025-2046 - Yuju Wang, Liang-Hong Wu, Liang-Chuan Wu:
An integrative extraction approach for index-tracking portfolio construction and forecasting under a deep learning framework. 2047-2066 - Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi, Shahram Etemadi Borujeni:
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems. 2067-2127 - Massoud Seifpour, Seyyed Amir Asghari, Mostafa Ghobaei-Arani:
A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach. 2128-2163 - P. Mathivanan, Maran Ponnambalam:
Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 2164-2195 - Xiaohong Li, Qixuan Peng, Ruihong Li, Huifang Ma:
Dual graph neural network for overlapping community detection. 2196-2222 - Pijush Kanti Dutta Pramanik, Saurabh Pal, Prasenjit Choudhury:
Mobile crowd computing: potential, architecture, requirements, challenges, and applications. 2223-2318 - Haiying Liu, ZhiHao Li, Kuihua Huang, Rui Wang, Guangquan Cheng, Tiexiang Li:
Evolutionary reinforcement learning algorithm for large-scale multi-agent cooperation and confrontation applications. 2319-2346 - S. Saumiya, S. Wilfred Franklin:
Unified automated deep learning framework for segmentation and classification of liver tumors. 2347-2380 - Hengliang Guo, Long Zhang, Yi Zhang, Jianan Li, Xiaoyue Xu, Lu Liu, Kuangsheng Cai, Dan Wu, Shuxin Yang, Lingbo Kong, Xu Gao:
OpenMP offloading data transfer optimization for DCUs. 2381-2402 - Shaimaa E. Nassar, Ibrahim Yasser, Hanan M. Amer, Mohamed A. Mohamed:
A robust MRI-based brain tumor classification via a hybrid deep learning technique. 2403-2427 - Chakaravarthi Sivanandam, Vaishnnave Mala Perumal, Jagadeesh Mohan:
A novel light GBM-optimized long short-term memory for enhancing quality and security in web service recommendation system. 2428-2460 - Usha Patel, Vibha Patel:
Active learning-based hyperspectral image classification: a reinforcement learning approach. 2461-2486 - Chenxing Xia, Difeng Chen, Xiuju Gao, Bin Ge, Kuan-Ching Li, Xianjin Fang, Yan Zhang, Ke Yang:
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection. 2487-2513 - Chandrashekhar Meshram, Mohammad S. Obaidat, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Arpit Vijay Raikwar:
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments. 2514-2537 - Tinka Singh, Ramagopal V. S. Uppaluri:
Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters. 2538-2571 - Khalid A. Darabkh, Thara A. Alzboun, Marwa H. Al-Tahaineh:
A novel routing protocol for stable route selection in IoT networks. 2572-2600 - Bahar Ghasemi, Mahmood Ahmadi, Hamed Alimohammadi:
A neural gas network-based scheme for SDN many-field packet classification. 2601-2632 - Oussama Azzouzi, Mohamed Anane, Mouloud Koudil, Mohamed Issad, Yassine Himeur:
Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA. 2633-2659 - Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma:
Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks. 2660-2680 - Divya Rani, Sachin Tripathi:
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. 2681-2717 - Peda Gopi Arepalli, K. Jairam Naik:
A deep learning-enabled IoT framework for early hypoxia detection in aqua water using light weight spatially shared attention-LSTM network. 2718-2747 - Bo Zhou, Hai Huang, Jun Xia, Donghai Tian:
A novel malware detection method based on API embedding and API parameters. 2748-2766 - Lijun Qi, Jincheng Zhuang:
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing. 2767-2798 - Youwei Wang, Lizhou Feng, Ao Liu, Weiqi Wang, Yudong Hou:
Dual BiGRU-CNN-based sentiment classification method combining global and local attention. 2799-2837 - Tengteng Cheng, Guosun Zeng, Zhipeng Sun:
A big graph clustering method to support parallel processing by perceiving graph's application algorithm semantics. 2838-2861 - G. Sivapriya, R. Manjula Devi, Keerthika Periasamy:
Computer-aided diagnostic model for retinal vascular diseases using graph-based attention mechanism. 2862-2888 - Yuxin Tang, Yudi Qiu, Yanwei Liu, Jie Jiao, Peng Zhang, Yibo Fan:
Scalable short-entry dual-grain coherence directories with flexible region granularity. 2889-2911 - Raushan Kumar Singh, Mukesh Kumar:
Correction to: Future trends of path planning framework considering accident attributes for smart cities. 2912 - Parisa Kavianpour, Mohammadreza Kavianpour, Ehsan Jahani, Amin Ramezani:
Correction to: A CNN-BiLSTM model with attention mechanism for earthquake prediction. 2913 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures. 2914-2915
Volume 80, Number 3, February 2024
- Ismail Biri, Ülkü Tuncer Küçüktas, Fatih Uysal, Firat Hardalaç:
Forecasting the future popularity of the anti-vax narrative on Twitter with machine learning. 2917-2947 - Jiaxin Chen, Xuguang Zhang, Yinggan Tang, Hui Yu:
ICE-YoloX: research on face mask detection algorithm based on improved YoloX network. 2948-2969 - Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava:
Internet of medical things-based authentication for an optimized watermarking of encrypted EEG. 2970-3004 - Luttfi A. Al-Haddad, Alaa Abdulhady Jaber, Sinan A. Al-Haddad, Yousif M. Al-Muslim:
Fault diagnosis of actuator damage in UAVs using embedded recorded data and stacked machine learning models. 3005-3024 - Guangjin Wang, Yuanying Wang, Fuyong Xu, Yongsheng Zhang, Peiyu Liu:
Syntactic and semantic dual-enhanced bidirectional network for aspect sentiment triplet extraction. 3025-3041 - Hongxia Zhang, Mengde Wu, Qiqi Feng, Hao Li:
AERQP: adaptive embedding representation-based QoS prediction for web service recommendation. 3042-3065 - Arash Ahmadi, Amanj Khorramian:
Efficient Brute-force state space search for Yin-Yang puzzle. 3066-3088 - K. Uma Maheswari, S. Mary Saira Bhanu, Nickolas Savarimuthu:
Clustering-based data integrity verification approach for multi-replica in a fog environment. 3089-3113 - Yilu Chen, Miaodi Su, Hongzhi Ding, Shaohong Weng, Zhifeng Lin, Xiqiong Bai:
High-correlation 3D routability estimation for congestion-guided global routing. 3114-3141 - Xuesong Wang, Zheng Zhang, Dongsheng Zhang, Limin Ding:
Pose visual detection method for cellphone dropping process incorporating prior information. 3142-3161 - Ruihang Xu, Peisen Wang, Xuanjing Li, Ruifeng Nie:
YOLO-ARGhost: a lightweight face mask detection model. 3162-3182 - Mei Bai, Qibo Wang, Shihan Chang, Xite Wang, Guanyu Li:
Location-based skyline query processing technology in road networks. 3183-3211 - Yanni Yang, Yiting Tan, Jintao Min, Zhengwei Huang:
Automatic text summarization for government news reports based on multiple features. 3212-3228 - Saif Eddine Khouni, Tidjani Menacer:
Nizar optimization algorithm: a novel metaheuristic algorithm for global optimization and engineering applications. 3229-3281 - Lin Zhang, Fang'ai Liu, Hongchen Wu, Xuqiang Zhuang, Yaoyao Yan:
CFF: combining interactive features and user interest features for click-through rate prediction. 3282-3309 - Xiao Liu, Junlong Chen, Deyu Qi, Tong Zhang:
Exploration of low-resource language-oriented machine translation system of genetic algorithm-optimized hyper-task network under cloud platform technology. 3310-3333 - Jianxin Tang, Shihui Song, Hongyu Zhu, Qian Du, Jitao Qu:
Sequential seeding policy on social influence maximization: a Q-learning-driven discrete differential evolution optimization. 3334-3359 - Junfan Wang, Yi Chen, Yeting Gu, Yunfeng Yan, Qi Li, Mingyu Gao, Zhekang Dong:
A lightweight vehicle mounted multi-scale traffic sign detector using attention fusion pyramid. 3360-3381 - Xu Gu, Xiaoliang Chen, Peng Lu, Xiang Lan, Xianyong Li, Yajun Du:
SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing. 3382-3411 - Xinnan Ding, Shan Du, Yu Zhang, Kejun Wang:
Spatiotemporal multi-scale bilateral motion network for gait recognition. 3412-3440 - Louiza Belkhiri-Brahmi, Samira Yessad, Fouzi Semchedine:
Congestion control-based sink MOBility pattern for data gathering optimization in WSN. 3441-3479 - Wei Li, Yetong Gao, Lei Wang:
A multipopulation particle swarm optimization based on divergent guidance and knowledge transfer for multimodal multiobjective problems. 3480-3527 - Soroush Babaee Khobdeh, Mohammad Reza Yamaghani, Siavash Khodaparast Sareshkeh:
Basketball action recognition based on the combination of YOLO and a deep fuzzy LSTM network. 3528-3553 - Rajesh Dwivedi, Aruna Tiwari, Neha Bharill, Milind B. Ratnaparkhe, Parul Mogre, Pranjal Gadge, Kethavath Jagadeesh:
A novel apache spark-based 14-dimensional scalable feature extraction approach for the clustering of genomics data. 3554-3588 - Quan Yuan, Shanshan Wang, Mai Hu, Liang Zeng:
SLDChOA: a comprehensive and competitive multi-strategy-enhanced chimp algorithm for global optimization and engineering design. 3589-3643 - Runsheng Liu, Wencong Cai, Junyang Zhang, Xiaoling Wu, Lilin Yang, Kaiqing Luo:
CF-lines: a fusing contour features optimization method for line segment detector. 3644-3662 - Nan Gao, Bowei Yang, Peng Chen, Li Ping Qian:
A multi-stage recognizer for nested named entity with weakly labeled data. 3663-3693 - Samira Shirinabadi Farahani, Mohammad Reza Reshadinezhad, Seyed Erfan Fatemieh:
New design for error-resilient approximate multipliers used in image processing in CNTFET technology. 3694-3712 - A. Ahila, V. Prema, S. Ayyasamy, M. Sivasubramanian:
An enhanced deep learning model for high-speed classification of plant diseases with bioinspired algorithm. 3713-3737 - Sarra Cherbal, Abdelhak Zier, Sara Hebal, Lemia Louail, Boubakeur Annane:
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. 3738-3816 - Yaqian Tang, Baolei Cheng, Yan Wang, Yuejuan Han, Jia Yu, Jianxi Fan:
Connectivity and diagnosability of a class of recursive networks. 3817-3848 - Zhenghong Wang, Fanhua Yu, Dan Wang, Taihui Liu, Rongjun Hu:
Multi-threshold segmentation of breast cancer images based on improved dandelion optimization algorithm. 3849-3874 - Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai:
STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things. 3875-3901 - Djihad Arrar, Nadjet Kamel, Abdelaziz Lakhfif:
A comprehensive survey of link prediction methods. 3902-3942 - Sultan Noman Qasem:
A novel honey badger algorithm with multilayer perceptron for predicting COVID-19 time series data. 3943-3969 - Ismael Boureima, Manish Bhattarai, Maksim Ekin Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov:
Distributed out-of-memory NMF on CPU/GPU architectures. 3970-3999 - Neha Bansal, Shelly Sachdeva, Lalit Kumar Awasthi:
Schema generation for document stores using workload-driven approach. 4000-4048 - Subeen Leem, Jisong Oh, Jihoon Moon, Mucheol Kim, Seungmin Rho:
Enhancing multistep-ahead bike-sharing demand prediction with a two-stage online learning-based time-series model: insight from Seoul. 4049-4082 - Salih Berkan Aydemir:
Ideal solution candidate search for starling murmuration optimizer and its applications on global optimization and engineering problems. 4083-4156 - Rihab Abidi, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos, Nabil Sahli:
A study of mechanisms and approaches for IoV trust models requirements achievement. 4157-4201 - Xiaoyu Zheng, Dewang Chen, Zhiming Lin, Liping Zhuang, Wendi Zhao:
Method on generating massive virtual driving curves for high-speed trains of the Cross-Taiwan Strait Railway and its statistical analysis. 4202-4225 - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:
Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services. 4226-4247 - Chao Yin, Qin Fang, Hongyi Li, Yingjian Peng, Xiaogang Xu, Dan Tang:
An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing. 4248-4285 - Shwet Ketu, Pramod Kumar Mishra:
An intelligent hybrid classification model for heart disease detection using imbalanced electrocardiogram signals. 4286-4308 - Junjun Jiao, Zhisheng Chen, Tao Zhou:
Minimal Kapur cross-entropy-based image segmentation for distribution grid inspection using improved INFO optimization algorithm. 4309-4352 - Shengbin Liang, Fuqi Sun, Haoran Sun, Tingting Chen, Wencai Du:
A medical text classification approach with ZEN and capsule network. 4353-4377 - Ashok Kumar Yadav, Karan Singh, Pramod Kumar Srivastava:
Probabilistic estimation of comprehensive utility based on user preference and network condition for network selection in future in HetNet. 4378-4400 - Yuan Zhou, Lei Xiang, Fan Liu, Haoran Duan, Yang Long:
Dynamic visual-guided selection for zero-shot learning. 4401-4419 - P. Mathivanan, Maran Ponnambalam:
Correction to: Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 4420-4422
Volume 80, Number 4, March 2024
- Di Li, Lang Li, Yu Ou:
Side-channel analysis based on Siamese neural network. 4423-4450 - Hongwei Zhang, Shuaibo Liu, Chi Wang, Shuai Lu, Wenbo Xiong:
Color-patterned fabric defect detection algorithm based on triplet attention multi-scale U-shape denoising convolutional auto-encoder. 4451-4476 - K. Hemant Kumar Reddy, Rajat Shubhra Goswami, Diptendu Sinha Roy:
A deep learning-based smart service model for context-aware intelligent transportation system. 4477-4499 - Yanru Liu, Jiali Xu, Austin Lin Yee:
The analysis of Iris image acquisition and real-time detection system using convolutional neural network. 4500-4532 - Mehmet Akif Bülbül:
Optimization of artificial neural network structure and hyperparameters in hybrid model by genetic algorithm: iOS-android application for breast cancer diagnosis/prediction. 4533-4553 - Masashi Kuwano, Mio Hosoe, Taku Moriyama:
Prediction of railroad user count using number of route searches via bivariate state-space modeling. 4554-4576 - Yuqin Song, Jitao Zhao, Chunliang Shang:
A multi-stage feature fusion defogging network based on the attention mechanism. 4577-4599 - Mahboubeh Afzali, Amin Mohammad Vali Samani, Hamid Reza Naji:
An efficient resource allocation of IoT requests in hybrid fog-cloud environment. 4600-4624 - Shao Deng, Shanzhu Xiao, Qiuqun Deng, Huanzhang Lu:
A hovering swarm particle swarm optimization algorithm based on node resource attributes for hardware/software partitioning. 4625-4647 - Anit Kumar Ghosal, Amit Sardar, Dipanwita Roychowdhury:
Differential fault analysis attack-tolerant hardware implementation of AES. 4648-4681 - Min Tian, Qi Liu, Jingshan Pan, Ying Gou, Zanjun Zhang:
swPTS: an efficient parallel Thomas split algorithm for tridiagonal systems on Sunway manycore processors. 4682-4706 - Sadiqa Jafari, Yung Cheol Byun:
Accurate remaining useful life estimation of lithium-ion batteries in electric vehicles based on a measurable feature-based approach with explainable AI. 4707-4732 - Eht E. Sham, Deo Prakash Vidyarthi:
A modified fuzzy similarity measure for trapezoidal fuzzy number with their applications. 4733-4759 - Rawaa Alatrash, Rojalina Priyadarshini, Hadi Ezaldeen:
Collaborative filtering integrated fine-grained sentiment for hybrid recommender system. 4760-4807 - Ali Dabba, Abdelkamel Tari, Samy Meftali:
A novel grey wolf optimization algorithm based on geometric transformations for gene selection and cancer classification. 4808-4840 - Adeola Borode, Peter A. Olubambi:
Optimisation of artificial intelligence models and response surface methodology for predicting viscosity and relative viscosity of GNP-alumina hybrid nanofluid: incorporating the effects of mixing ratio and temperature. 4841-4869 - Neetu Sharma, Rajesh Rohilla:
A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management. 4870-4913 - Ruyi Cao, Wanghao Mo, Wendong Zhang:
MFMDet: multi-scale face mask detection using improved Cascade rcnn. 4914-4942 - Xiaoxiao Sun, Siqing Yang, Chenying Zhao, Dongjin Yu:
Design-time business process compliance assessment based on multi-granularity semantic information. 4943-4971 - Jingan Lu, Zhenfang Zhu, Kefeng Li, Shuai Gong, Hongli Pei, Wenling Wang:
Gtpsum: guided tensor product framework for abstractive summarization. 4972-4995 - Guifang Zhang, Hon-Cheng Wong:
Saliency-based dual-attention network for unsupervised video object segmentation. 4996-5010 - Mohamed Yassine Landolsi, Lotfi Ben Romdhane, Lobna Hlaoua:
Hybrid medical named entity recognition using document structure and surrounding context. 5011-5041 - Yan Kang, Xiaoshe Dong, Ziheng Wang, Heng Chen, Qiang Wang:
Parallel implementations of post-quantum leighton-Micali signature on multiple nodes. 5042-5072 - Siti Nuraishah Agos Jawaddi, Azlan Ismail, Muhammad Nur Haziq Mohammad Hatta, Anis Faqihah Kamarulzaman:
Insights into cloud autoscaling: a unique perspective through MDP and DTMC formal models. 5073-5107 - Shreyshi Shree, Chen Zhou, Masoud Barati:
Data protection in internet of medical things using blockchain and secret sharing method. 5108-5135 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang, Peiying Zhang, Laith Abualigah:
Load balancing strategy for SDN multi-controller clusters based on load prediction. 5136-5162 - Swati Gupta, Niraj Pratap Singh:
Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directions. 5163-5196 - Chunjing Xiao, Shenkai Lv, Wei Fan, W. H. Ip:
Temporal-order association-based dynamic graph evolution for recommendation. 5197-5223 - N. Sheena, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
EMCP: evolutionary multi-objective clustering protocol for prolonged lifetime of heterogeneous IoT networks. 5224-5254 - Ehsan Jafari, Ardeshir Dolati, Kamran Layeghi:
Object tracking using local structural information and energy minimization. 5255-5278 - Yinsheng Tong, Zuoyong Li, Hui Huang, Libin Gao, Minghai Xu, Zhongyi Hu:
Research of spatial context convolutional neural networks for early diagnosis of Alzheimer's disease. 5279-5297 - Taymaz Akan, Diego Oliva, Ali-Reza Feizi-Derakhshi, Amir-Reza Feizi-Derakhshi, Marco Pérez-Cisneros, Mohammad Alfrad Nobel Bhuiyan:
Battle royale optimizer for multilevel image thresholding. 5298-5340 - Liqiang Song, Huaiguang Wang, Baojian Yang:
Hybrid compression scheme based on VMD optimization algorithm application to mechanical equipment monitoring. 5341-5362 - Yue Zhao, Yuan Yao, Tong He, Xingshe Zhou, Bo Shen:
Sl4u: a scenario description language for unmanned swarm. 5363-5389 - Jingbo Sun, Weiming Peng, Tianbao Song, Haitao Liu, Shuqin Zhu, Jihua Song:
Enhanced cross-prompt trait scoring via syntactic feature fusion and contrastive learning. 5390-5407 - Ru Sun, Ting Yang:
Hybrid parameter-based PSO flexible needle percutaneous puncture path planning. 5408-5427 - Zhiyi Yu, Hong Li, Jialin Feng:
Contrastive learning for unsupervised sentence embeddings using negative samples with diminished semantics. 5428-5445 - Jin Xu, Huiqun Yu, Guisheng Fan, Jiayin Zhang, Zengpeng Li, Qifeng Tang:
Adaptive edge service deployment in burst load scenarios using deep reinforcement learning. 5446-5471 - Jing-Wei Liu, Ming-Hua Hsu, Chun-Liang Lai, Sheng-K. Wu:
Using video analysis and artificial neural network to explore association rules and influence scenarios in elite table tennis matches. 5472-5489 - Chang Jie, Chen Jiming, Shao Ying, Yanchun Tong, Haodong Ren:
A pyramid GNN model for CXR-based COVID-19 classification. 5490-5508 - Fei Yang, Huyin Zhang, Shiming Tao, Xiying Fan:
Simple hierarchical PageRank graph neural networks. 5509-5539 - Prashant Vaish, Niharika Anand, Vishal Krishna Singh, Gaurav Sharma:
Applications hosting over cloud-assisted IOT: a productivity model and method defining accessibility of data security. 5540-5564 - Raghuraj Singh, Kuldeep Kumar:
Hybrid optimization-enabled deep Q network for fault prediction in service-oriented architecture. 5565-5592 - Zixiang Nie, Jin Li, Fenghui Duan, Yueming Lu:
A collaborative ledger storing model for lightweight blockchains based on Chord Ring. 5593-5615 - Zhen Li, Zining Cao, Chao Xing:
Performance modeling and quantitative evaluation for cyber-physical systems based on LTS. 5616-5653 - Weibei Fan, Xuanli Liu, Mengjie Lv:
Hamiltonian cycle embedding with fault-tolerant edges and adaptive diagnosis in half hypercube. 5654-5674 - Azad Johari, Azlan Ismail:
PMLAP: a methodology for annotating SSML elements into HTML5. 5675-5707 - Viswanatha Reddy G, B. S. N. V. Chaitanya, Prathyush P, Sumanth M, Mrinalini C, Dileep Kumar P, Snehasis Mukherjee:
DFW-PP: dynamic feature weighting-based popularity prediction for social media content. 5708-5730 - Ismael Boureima, Manish Bhattarai, Maksim Eken Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov:
Correction to: Distributed out-of-memory NMF on CPU/GPU architectures. 5731-5732
Volume 80, Number 5, March 2024
- Zhaojun Wang, Xindong You, Xueqiang Lv:
A relation enhanced model for temporal knowledge graph alignment. 5733-5755 - Samaher Al-Janabi, Ghada Mohammed:
An intelligent returned energy model of cell and grid using a gain sharing knowledge enhanced long short-term memory neural network. 5756-5814 - Peng Li, Cheng Che, Rui Hou:
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning. 5815-5831 - Kangjin Huang, Yonggang Che, Chuanfu Xu, Zhe Dai, Jian Zhang:
Improving CUDA performance of an unstructured high-order CFD application under OP2 framework. 5832-5846 - Yueting Xiang, Yangfen Chen, Wenjuan Fan, Hui Ye:
Enhancing computer-aided translation system with BiLSTM and convolutional neural network using a knowledge graph approach. 5847-5869 - Inam Ullah, Asra Noor, Shah Nazir, Farhad Ali, Yazeed Yasin Ghadi, Nida Aslam:
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. 5870-5899 - S. Muthulakshmi, R. Chitra:
Interplanetary file system and blockchain for secured smart grid networks. 5900-5922 - Abbas Rammal, Kenneth Ezukwoke, Anis Hoayek, Mireille Batton-Hubert:
Unsupervised approach for an optimal representation of the latent space of a failure analysis dataset. 5923-5949 - S. Nikkath Bushra, Nalini Subramanian, G. Shobana, S. Radhika:
A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment. 5950-5978 - Sait Alp, Rahim Dehkharghani, Taymaz Akan, Mohammad A. N. Bhuiyan:
MOBRO: multi-objective battle royale optimizer. 5979-6016 - Shilpi, Arvind Kumar:
Application of Jaya algorithm for solving localization problem in a distributed Wireless Sensor Network. 6017-6041 - Rui-Yun Chang, Xiufang Feng, Chengye Zou, Hao Zhang:
Multimodal medical image protection algorithm based on 3D-CICCM and Fresnel transform. 6042-6067 - Fanfan Li:
Chord-based music generation using long short-term memory neural networks in the context of artificial intelligence. 6068-6092 - Xiaoxuan Ma, Boyang Sun, Weifeng Liu, Dong Sui, Sihan Shan, Jing Chen, Zhaofeng Tian:
Tnseg: adversarial networks with multi-scale joint loss for thyroid nodule segmentation. 6093-6118 - Hongjie Geng, Mingming Zhou:
Novel post-photographic technique based on deep convolutional neural network and blockchain technology. 6119-6139 - Jingwen Xiong, Wenke Zang, Yuzhen Zhao, Xiyu Liu:
Density peaks clustering algorithm with connected local density and punished relative distance. 6140-6168 - Huan Liu, Jian Wu, Rui He:
IDPNet: a light-weight network and its variants for human pose estimation. 6169-6191 - Qianqiu Wang, Ge Nong, Wenbo Wu:
Linear structure index for network-constrained moving objects. 6192-6220 - Tianhua Chen, Yanyue Li, Qinghua Qiao:
Fine-grained bird image classification based on counterfactual method of vision transformer model. 6221-6239 - Jubin Wang, Yuan Zhuang, Yunhui Zeng:
A transmission optimization method for MPI communications. 6240-6263 - Ahmed N. Bakry, Almohammady S. Alsharkawy, Mohamed S. Farag, Kamal R. Raslan:
Automatic suppression of false positive alerts in anti-money laundering systems using machine learning. 6264-6284 - Yifei Sun, Jigang Wu, Yalan Wu, Long Chen, Weijun Sun:
Efficient approaches for task offloading in point-of-interest based vehicular fog computing. 6285-6310 - Juan Fang, Zhichao Wei, Yaqi Liu, Yumin Hou:
TB-TBP: a task-based adaptive routing algorithm for network-on-chip in heterogenous CPU-GPU architectures. 6311-6335 - Huarui Wu, Chang Liu, Chunjiang Zhao:
Personalized agricultural knowledge services: a framework for privacy-protected user portraits and efficient recommendation. 6336-6355 - Ali Abbas, Raza Hasan:
A multi-attribute-based data forwarding scheme for delay tolerant networks. 6356-6381 - Ali Asghari, Hossein Azgomi, Ali Abbas Zoraghchian, Abbas Barzegarinezhad:
Energy-aware server placement in mobile edge computing using trees social relations optimization algorithm. 6382-6410 - Neeraj Kumar Shukla, Abdulilah M. Mayet, M. Ram Kumar Raja, Muneer Parayangat, Mohammed Usman, Rajesh Verma, Javed Khan Bhutto:
A unified test data volume compression scheme for circular scan architecture using hosted cuckoo optimization. 6411-6434 - Sumera Naz, Aqsa Shafiq, Maheen Abbas:
An approach for 2-tuple linguistic q-rung orthopair fuzzy MAGDM for the evaluation of historical sites with power Heronian mean. 6435-6485 - Muhanad Mohammed Kadum, Xiaoheng Deng:
Allocating energy-objective aware workflow in distributed edge micro data centres. 6486-6521 - Haiyan Li, Shaolin Peng, Xun Lang, Shuhua Ye, Hongsong Li:
Spatial-guided informative semantic joint transformer for single-image deraining. 6522-6551 - Mahnaz Khojand, Kambiz Majidzadeh, Mohammad Masdari, Yousef Farhang:
Controller placement in SDN using game theory and a discrete hybrid metaheuristic algorithm. 6552-6600 - Marzieh Varposhti:
Distributed homology-based sensor selection and scheduling in wireless sensor networks. 6601-6621 - Hind Idrissi, Paolo Palmieri:
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems. 6622-6660 - Yibo Huang, Bo Wang, Xiang-rong Pu, Yian Li, Qiuyu Zhang:
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. 6661-6698 - Zahra Valadanzoj, Hassan Daryanavard, Abbas Harifi:
High-speed YOLOv4-tiny hardware accelerator for self-driving automotive. 6699-6724 - Hui Ma:
Development of a smart tourism service system based on the Internet of Things and machine learning. 6725-6745 - Ali Jameel Hashim, M. A. Balafar, Jafar Tanha:
NEAE: NeuroEvolution AutoEncoder for anomaly detection in internet traffic data. 6746-6777 - Shiqiang Zhang, Dongzhi Cao:
A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT. 6778-6808 - Saeid Ghafouri, Seyed Hossein Khasteh, Seyed Omid Azarkasb:
Influence maximization (IM) in complex networks with limited visibility using statistical methods. 6809-6854 - Naveen Chandra Gowda, Sunilkumar S. Manvi, A. Bharathi Malakreddy, Rajkumar Buyya:
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments. 6855-6890 - Redouane Benabdallah Benarmas, Kadda Beghdad Bey:
A deep learning-based framework for road traffic prediction. 6891-6916 - Yuqing Cheng, Zhiying Cao, Xiuguo Zhang, Qilei Cao, Dezhen Zhang:
Multi objective dynamic task scheduling optimization algorithm based on deep reinforcement learning. 6917-6945 - Marzieh Varposhti:
Distributed homology-based algorithm for solving Set k-Cover problem in heterogeneous directional sensor networks. 6946-6964 - Yong Niu, Xing Xing, Zhichun Jia, Mindong Xin, Junye Xing:
SMIGNN: social recommendation with multi-intention knowledge distillation based on graph neural network. 6965-6988 - Mukesh Patidar, Ankit Jain, Keshav Patidar, Surendra Kumar Shukla, Ali H. Majeed, Namit Gupta, Nilesh Patidar:
An ultra-dense and cost-efficient coplanar RAM cell design in quantum-dot cellular automata technology. 6989-7027 - Nadia Nedjah, Sérgio de Souza Raposo, Luiza de Macedo Mourelle:
Dedicated hardware design for efficient quantum computations using classical logic gates. 7028-7070 - Kun Yang, Lin Jiang, Rui Shan, Kangle Li, Xinyue Cui:
RMSRM: real-time monitoring-based self-reconfiguration mechanism in reconfigurable PE array. 7071-7101 - Donaldo Garcia, José de Jesús Rubio, Humberto Sossa, Jaime Pacheco, Guadalupe Juliana Gutierrez, Carlos Aguilar Ibáñez:
Electricity consumption modeling by a chaotic convolutional radial basis function network. 7102-7119 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang, Peiying Zhang, Laith Abualigah:
Correction to: Load balancing strategy for SDN multi-controller clusters based on load prediction. 7120-7121
Volume 80, Number 6, April 2024
- Junfeng Wang:
The use of fuzzy authentication integrated with convolutional neural networks in digital content protection. 7123-7146 - Xiaohong Wang, Xu Zhao, Kun Xu, Shihao Xu:
Multi-scale adaptive atrous graph convolution for point cloud analysis. 7147-7170 - Lisheng Wu, Xiaoming You, Sheng Liu:
Heterogeneous ant colony algorithm based on selective evolution mechanism and game strategy. 7171-7206 - Mohammad Hassan Almaspoor, Ali A. Safaei, Afshin Salajegheh, Behrouz Minaei-Bidgoli:
Distributed independent vector machine for big data classification problems. 7207-7244 - Xinfeng He, Riyang Li:
Malware detection for container runtime based on virtual machine introspection. 7245-7268 - Kai Song, Huaqiong Ma, Haiming Zhang, Liping Yan:
Research of ReLU output device in ternary optical computer based on parallel fully connected layer. 7269-7292 - Yuqin Song, Chunliang Shang, Jitao Zhao:
LBCNet: A lightweight bilateral cascaded feature fusion network for real-time semantic segmentation. 7293-7315 - Saif Ur Rehman Khan, Ming Zhao, Sohaib Asif, Xuehan Chen, Yusen Zhu:
GLNET: global-local CNN's-based informed model for detection of breast cancer categories from histopathological slides. 7316-7348 - Chenghao Wang, Zhongqiang Luo, Ziyuan Qi:
Transformer oil leakage detection with sampling-WIoU module. 7349-7368 - Yen-Liang Chen, Chia-Chi Wu, Po-Cheng Shih:
Using personalized next session to improve session-based recommender systems. 7369-7398 - Jing Zhang, Zuanyang Zeng, Kunliang Si, Xiucai Ye:
Entropy-driven differential privacy protection scheme based on social graphlet attributes. 7399-7432 - Blessy Antony, S. Revathy:
A novel model for Sybil attack detection in online social network using optimal three-stream double attention network. 7433-7482 - Jun Shi, Peiyi Zhang, Sihan Du, Wanyong Liang, Weifeng Cao, Qingbo Li, Hechao Hou:
Chipping value prediction for dicing saw based on sparrow search algorithm and neural networks. 7483-7506 - Ashkan Emami, Ghazaleh Keshavarz Kalhori, Sheyda Mirzakhani, Mohammad Ali Akhaee:
A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach. 7507-7556 - Dan Li, Wenbo Shi, Ning Lu, Sang-Su Lee, Sokjoon Lee:
ARdetector: android ransomware detection framework. 7557-7584 - Yuanxiang Wang, Zhen Xu, Lei Yang:
Plus-profile energy harvested prediction and adaptive energy management for solar-powered wireless sensor networks. 7585-7603 - Chao Zhu, Benshun Yi, Laigan Luo:
Triple-channel graph attention network for improving aspect-level sentiment analysis. 7604-7623 - You-Shyang Chen, Jieh-Ren Chang, Yaswanth P. K. Thotakura, Ashraf Mohammad:
A hybrid four-stage detection model to pre-identify the sustainable manufacturing process of Li-ion battery pack. 7624-7661 - Yaonan Guan, Yunwen Xu, Yugeng Xi, Dewei Li:
Variational auto encoder fused with Gaussian process for unsupervised anomaly detection. 7662-7690 - Niloofar Zahedy, Behrang Barekatain, Alfonso Ariza-Quintana:
RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm. 7691-7749 - Peyman Shobeiri, Mehdi Akbarian Rastaghi, Saeid Abrishami, Behnam Shobiri:
PCP-ACO: a hybrid deadline-constrained workflow scheduling algorithm for cloud environment. 7750-7780 - Ature Angbera, Huah Yong Chan:
An adaptive XGBoost-based optimized sliding window for concept drift handling in non-stationary spatiotemporal data streams classifications. 7781-7811 - Safdar Rostami, Ali Broumandnia, Ahmad Khademzadeh:
An energy-efficient task scheduling method for heterogeneous cloud computing systems using capuchin search and inverted ant colony optimization algorithm. 7812-7848 - Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz:
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model. 7849-7875 - Bakht Sher Ali, Inam Ullah, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam:
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. 7876-7905 - A. Moradikashkooli, H. Haj Seyyed Javadi, Sam Jabbehdari:
An efficient optimization algorithm for nonlinear 2D fractional optimal control problems. 7906-7930 - Yang Liu:
Depression clinical detection model based on social media: a federated deep learning approach. 7931-7954 - Shweta Mittal, Mohona Ghosh:
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication. 7955-7992 - Tajinder Singh, Madhu Kumari, Daya Sagar Gupta:
Rumor identification and diffusion impact analysis in real-time text stream using deep learning. 7993-8037 - Jingjing Han, Guangqi Yang, Hongyang Wei, Weijun Gong, Yurong Qian:
ST-YOLOX: a lightweight and accurate object detection network based on Swin Transformer. 8038-8059 - Xiangyu Deng, Xikai Huang, Haiyue Yu:
Frequency-domain characteristic analysis of PCNN. 8060-8093 - Ones Sidhom, Haythem Ghazouani, Walid Barhoumi:
Three-phases hybrid feature selection for facial expression recognition. 8094-8128 - Khadijeh Moeini Roodbali, Ebrahim Abiri, Kourosh Hassanli:
Highly efficient low-area gate-diffusion-input-based approximate full adders for image processing computing. 8129-8155 - Ayesha Kanwal, Kashif Javed, Sara Ali, Saddaf Rubab, Muhammad Attique Khan, Areej Alasiry, Mehrez Marzougui, Mohammad Shabaz:
A hybrid framework for detection of autism using ConvNeXt-T and embedding clusters. 8156-8178 - Ali Khalouta:
A new decomposition transform method for solving nonlinear fractional logistic differential equation. 8179-8201 - Nilesh Kumar Verma, K. Jairam Naik:
Optimized fog community framework with advanced genetic algorithm for enhanced performance dynamics. 8202-8235 - Reza Feizabadi, Mehri Bagherian, Hamidreza Vaziri, Maziar Salahi:
PLEACH: a new heuristic algorithm for pure parsimony haplotyping problem. 8236-8258 - Davide Ferraris, M. Carmen Fernández Gago, Rodrigo Roman, Javier López:
A survey on IoT trust model frameworks. 8259-8296 - Yiming Shu, Yiru Dai:
An effective link prediction method for industrial knowledge graphs by incorporating entity description and neighborhood structure information. 8297-8329 - Faezeh Rohani, Kamrad Khoshhal Roudposhti, Hamidreza Taheri, Ali Mashhadi, Andreas Mueller:
Extracting gait and balance pattern features from skeleton data to diagnose attention deficit/hyperactivity disorder in children. 8330-8356 - J. Jayachitra, K. Suganya Devi, S. V. Manisekaran, Satish Kumar Satti:
Terahertz video-based hidden object detection using YOLOv5m and mutation-enabled salp swarm algorithm for enhanced accuracy and faster recognition. 8357-8382 - Minhaz Mahmud, Md. Soharab Hossain Sohan, Saha Reno, M. A. Baten Sikder, Fakir Sharif Hossain:
Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology. 8383-8405 - Arti Gupta, Vijay Kumar Chaurasiya:
Integrating Healthcare 4.0 and WBAN: efficient redundancy reduction and adaptive packet scheduling using AR-DRL. 8406-8433 - Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari:
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare. 8434-8468 - Shibao Li, Chenxu Ma, Yunwu Zhang, Longfei Li, Chengzhi Wang, Xuerong Cui, Jianhang Liu:
Attention-based variable-size feature compression module for edge inference. 8469-8484 - Joonhyouk Jang, Minho Park, Jiman Hong:
Hybrid booting with incremental hibernation for the baseboard management controllers. 8485-8504 - Kaiyi Deng, Guanen Wang:
Online mode development of Korean art learning in the post-epidemic era based on artificial intelligence and deep learning. 8505-8528 - Wei Zhang, Ping He, Chuntian Qin, Fan Yang, Ying Liu:
A graph attention network-based model for anomaly detection in multivariate time series. 8529-8549 - Yi Yang, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
Correction to: A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 8550 - Pooya Tavallali, Peyman Tavallali, Mukesh Singhal:
Correction: K-means tree: an optimal clustering tree for unsupervised learning. 8551
Volume 80, Number 7, May 2024
- Bowen Guan, Chencheng Zhao, Xianghui Yuan, Jun Long, Xiang Li:
Price prediction in China stock market: an integrated method based on time series clustering and image feature extraction. 8553-8591 - Hathem Khelil, Mahmoud Brahimi:
Toward an efficient web service composition based on an improved BTLBO algorithm. 8592-8613 - Xiaowen Sun, Zhenfang Zhu, Jiangtao Qi, Zhen Zhao, Hongli Pei:
Affective Commonsense Knowledge Enhanced Dependency Graph for aspect sentiment triplet extraction. 8614-8636 - Chao Shao, Hairui Zhang:
Climate change characteristics and population health impact factors using deep neural network and hyperautomation mechanism. 8637-8667 - Khushboo Gupta, Vinod Kumar:
KMS-AMI: an efficient and scalable key management scheme for secure two-way communications in advanced metering infrastructure of smart grid. 8668-8701 - Xin-Duo Liu, Weijia He, Ming-Lin Yang, Xin-Qing Sheng:
Massive parallelization of multilevel fast multipole algorithm for 3-D electromagnetic scattering problems on SW26010 many-core cluster. 8702-8718 - José de Jesús Rubio, Marco Antonio Islas, Donaldo Garcia, Jaime Pacheco, Alejandro Zacarias, Carlos Aguilar Ibáñez:
Optimized radial basis function network for the fatigue driving modeling. 8719-8741 - Youlin Li:
Constructing the intelligent expressway traffic monitoring system using the internet of things and inspection robot. 8742-8766 - Jie Zhang, Jingshun Bi, Jinyou Hou, Qinggang Xie:
Dynamical analysis, circuit realization, and applications of 4D hyperchaotic systems with bursty oscillations and infinite attractor coexistence. 8767-8800 - Yumeng Yang, Li Wang, Zizhen Cheng:
Density peaks algorithm based on information entropy and merging strategy for power load curve clustering. 8801-8832 - Liwei Yang, Boyu Jia, Xue Liang, Fang Wang, Xiangyuan Peng:
Visible light communication and WiFi hybrid networks based on dynamic resource allocation algorithm. 8833-8856 - Xuzhen Deng, Dengxu He, Liangdong Qu:
A novel hybrid algorithm based on arithmetic optimization algorithm and particle swarm optimization for global optimization problems. 8857-8897 - Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan:
Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker. 8898-8932 - Yue Miao, Siyuan Tang, Zhuqiang Zhang, Jukun Song, Zhi Liu, Qiang Chen, Miao Zhang:
Application of deep learning and XGBoost in predicting pathological staging of breast cancer MR images. 8933-8953 - Mersedeh Sadeghi, Alessio Carenini, Óscar Corcho, Matteo Rossi, Riccardo Santoro, Andreas Vogelsang:
Interoperability of heterogeneous Systems of Systems: from requirements to a reference architecture. 8954-8987 - Negar Abbasi, Mohammadreza Soltanaghaei, Farsad Zamani Boroujeni:
Anomaly detection in IOT edge computing using deep learning and instance-level horizontal reduction. 8988-9018 - Manzoor Ansari, Mansaf Alam:
A novel hybrid time-series approach for IoT-cloud-enabled environment monitoring. 9019-9053 - Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Simulation-based uprighting of a capsized ship in wave-induced environments. 9054-9072 - Fan Ouyang, Bo Shen:
A mutual mean teacher framework for cross-domain aspect-based sentiment analysis. 9073-9095 - Yu'e Lin, Houguo Li, Xingzhu Liang, Mengfan Li, Huilin Liu:
AAR:Attention Remodulation for Weakly Supervised Semantic Segmentation. 9096-9114 - Junhao Wang, Jiarong Liang, Qingnian Li:
On the construction of quality extended virtual backbones in wireless sensor networks using cooperative communication. 9115-9139 - Juanjuan Ren, Siti Salwa Salleh:
Green urban logistics path planning design based on physical network system in the context of artificial intelligence. 9140-9161 - Ke Hou, Jianping Sun, Mingcheng Guo, Ming Pang, Na Wang:
TentISSA-BPNN: a novel evaluation model for cloud service providers for petroleum enterprises. 9162-9193 - Fangyin Zhu, Wei Xu, Duanyang Liu, Haiyan Shi:
TSANET: transportation mode recognition model with global and local spatiotemporal features. 9194-9219 - Archana Bomnale, Avinash More:
Node utilization index-based data routing and aggregation protocol for energy-efficient wireless sensor networks. 9220-9252 - Apurva Kumari, Subhendu Kumar Sahoo:
An effective and robust single-image dehazing method based on gamma correction and adaptive Gaussian notch filtering. 9253-9276 - Xiaolong Wang, Ling Cai, Yunhao Xu:
Creation mechanism of new media art combining artificial intelligence and internet of things technology in a metaverse environment. 9277-9297 - Marcelo Tosini, Martín Vázquez, Lucas Leiva:
Analysis and efficient implementation of IEEE-754 decimal floating point adders/subtractors in FPGAs for DPD and BID encoding. 9298-9326 - Lina She, Hongfang Gong, Siyu Zhang:
An interactive multi-head self-attention capsule network model for aspect sentiment classification. 9327-9352 - Yi'an Zhu, Jie Chen, Lian Li:
A critical path task scheduling algorithm based on sequential failure factor. 9353-9383 - Mirsaeid Hosseini Shirvani:
A survey study on task scheduling schemes for workflow executions in cloud computing environment: classification and challenges. 9384-9437 - S. Deepanjali, S. K. Noor Mahammad:
A twofold bio-inspired system for mitigating SEUs in the controllers of digital system deployed on FPGA. 9438-9470 - Tao Tang, Kai Lu, Lin Peng, Yingbo Cui, Jianbin Fang, Chun Huang, Ruibo Wang, Canqun Yang, Yifei Guo:
SNCL: a supernode OpenCL implementation for hybrid computing arrays. 9471-9493 - Nadim Elsakaan, Kamal Amroun:
A novel privacy-aware global infrastructure for ecological footprint calculator based on the Internet of things and blockchain. 9494-9531 - Martha Dais Ferreira, Zahra Sadeghi, Stan Matwin:
Exploring autoregression patterns for automatic vessel type classification. 9532-9553 - Sheng Wang, Shiping Chen, Yumei Shi:
Utilization-prediction-aware energy optimization approach for heterogeneous GPU clusters. 9554-9578 - Habib Ullah Khan, Waseem Afsar, Shah Nazir, Asra Noor, Mahwish Kundi, Mashael S. Maashi, Haya Mesfer Alshahrani:
Revolutionizing software developmental processes by utilizing continuous software approaches. 9579-9608 - Noshin A. Sabuwala, Rohin D. Daruwala:
An approach to enhance the security of unmanned aerial vehicles (UAVs). 9609-9639 - Chenguang Fan, Muyao Li, Wenzhong Liu, Jingjing Cheng:
FPGA-based downhole real-time inversion of petrophysical information for NMR-LWD tools with periodic thermal management. 9640-9662 - Dayasagar Chowdary S, M. S. Sudhakar:
Linear programming-based multi-objective floorplanning optimization for system-on-chip. 9663-9686 - Mohammadreza Sheikhattar, Alireza Mansouri:
A Topic Mapping-based framework to analyze textual risk reports from social media big data contents. 9687-9712 - Zhiheng Zhou, Xiaomei Huang, Naixue Xiong, Guoqiong Liao, Xiaobin Deng:
A self-attention model with contrastive learning for online group recommendation in event-based social networks. 9713-9741 - Higinio Mora, María Teresa Signes Pont, Francisco Antonio Pujol López, Jerónimo Mora Pascual, Juan Manuel García Chamizo:
Advancements in number representation for high-precision computing. 9742-9761 - Sanjib Roy, Ayan Kumar Das:
Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication. 9762-9811 - JongHyuk Kim, Yong Moon, Hoon Ko:
Correlation-based advanced feature analysis for wireless sensor networks. 9812-9828 - Hyunjun Kim, Hwansoo Han:
GPU thread throttling for page-level thrashing reduction via static analysis. 9829-9847 - Shahzadi Bano, Weimei Zhi, Baozhi Qiu, Muhammad Raza, Nabila Sehito, Mian Muhammad Kamal, Ghadah Aldehim, Nuha Alruwais:
Self-paced ensemble and big data identification: a classification of substantial imbalance computational analysis. 9848-9869 - Yinsheng Chen, Jiahao Li, Kun Sun, Ying Zhang:
A lightweight early forest fire and smoke detection method. 9870-9893 - Qingchun Bai, Mengmeng Tang, Yang Song, Jun Xiao:
Extracting entity and relationship interactions from danmaku-video comments using a neural bootstrapping framework. 9894-9916 - Weihong Fu, Haoyi Li:
An improved phase gradient autofocus algorithm for ISAR phase autofocus problem. 9917-9934 - Yi Qing, Xiangyu Liu, Yanhui Du:
Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks. 9935-9960 - Yu-Wei Chan, Endah Kristiani, Halim Fathoni, Chien-Yi Chen, Chao-Tung Yang:
A smart edge computing infrastructure for air quality monitoring using LPWAN and MQTT technologies. 9961-9985 - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review. 9986-10043 - Iman Kadhum Abbood, Ali Kadhum Idrees:
Data reduction techniques for wireless multimedia sensor networks: a systematic literature review. 10044-10089 - Xin Zhong, Nan Wang:
Ensemble learning method based on CNN for class imbalanced data. 10090-10121 - Sapna Juneja, Ali Nauman, Mudita Uppal, Deepali Gupta, Roobaea Alroobaea, Bahodir Muminov, Yuning Tao:
Machine learning-based defect prediction model using multilayer perceptron algorithm for escalating the reliability of the software. 10122-10147 - ZhongGui Pei:
Framework design based on data-driven for evaluating the efficiency of group collaboration in scientific research teams. 10148-10171 - Xin-miao Chen, Shi Wang, Yong-jin Ye, Yong-zheng Wu, Bo Jiang:
BQA: a high-performance quantum circuits scheduling strategy based on heuristic search. 10172-10189 - Umair Khan, Muazzam Maqsood, Saira Andleeb Gillani, Mehr Yahya Durrani, Irfan Mehmood, Sanghyun Seo:
Correction to: A deep learning-based framework for accurate identification and crop estimation of olive trees. 10190 - Bowen Guan, Chencheng Zhao, Xianghui Yuan, Jun Long, Xiang Li:
Correction to: Price prediction in China stock market: an integrated method based on time series clustering and image feature extraction. 10191 - Jing Yang, Mingyu Fan, Guangwei Wang:
Retraction Note: Encryption scheme with mixed homomorphic signature based on message authentication for digital image. 10192 - Yifu Zeng, Yantao Zhou, Xu Zhou, Fei Zheng:
Retraction Note: Fuzzy clustering-based skyline query preprocessing algorithm for large-scale flow data analysis. 10193 - Eid Rehman, Muhammad Haseeb-ud-Din, Arif Jamal Malik, Tehmina Karmat Khan, Aaqif Afzaal Abbasi, Seifedine Kadry, Muhammad Attique Khan, Seungmin Rho:
Retraction Note: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. 10194-10195
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.