![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
The Journal of Supercomputing, Volume 80
Volume 80, Number 1, January 2024
- Zhiyong Zhou, Yuanning Liu, Xiaodong Zhu, Shuai Liu, Shaoqiang Zhang, Yuanfeng Li, Zhen Liu:
Lifelong iris presentation attack detection without forgetting. 1-19 - Dahai Xia, Xinyun Wu, Meng Yan, Caiquan Xiong:
An adaptive stochastic ranking-based tournament selection method for differential evolution. 20-49 - Khalid Javeed, Ali El-Moursy, David Gregg:
E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p). 50-74 - Chandan Kumar
, Sudhanshu Kumar Jha, Dilip Kumar Yadav, Shiv Prakash, Mukesh Prasad:
A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic. 75-97 - Avita Katal, Tanupriya Choudhury
, Susheela Dahiya:
Energy optimized container placement for cloud data centers: a meta-heuristic approach. 98-140 - Sally Mohamed Sameh, Hossam El-Din Moustafa
, Ehab H. Abdelhay
, Mohamed Maher Ata:
An effective chaotic maps image encryption based on metaheuristic optimizers. 141-201 - Huafeng Wu, Feng Wang, Xiaojun Mei
, Linian Liang, Bing Han, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li
:
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors. 202-225 - Omar Younis Abdulhammed:
A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. 226-248 - Na Dong, Qingyue Feng, Jianfang Chang, Xiaoming Mai:
White blood cell classification based on a novel ensemble convolutional neural network framework. 249-270 - R. Rajalakshmi, P. Sivakumar, L. Krishna Kumari, M. Chengathir Selvi:
A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism. 271-291 - Rebecca H. K. Emanuel, Paul David Docherty, Helen Lunt, Knut Möller:
The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration. 292-312 - Yonghao Lai, Xiaohui Hua:
Component edge connectivity and extra edge connectivity of alternating group networks. 313-330 - Jin Yang, Wangdong Yang, Ruixuan Qi, Qinyun Tsai
, Shengle Lin
, Fengkun Dong, Kenli Li, Keqin Li:
Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer. 331-362 - Chih-Yung Chang, Syu-Jhih Jhang
, Shih-Jung Wu, Diptendu Sinha Roy:
JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP. 363-394 - Ruisheng Ran, Ting Wang, Zheng Li, Bin Fang:
Polynomial linear discriminant analysis. 413-434 - Ju-Won Park
, Xin Huang, Chul-Ho Lee:
Analyzing and predicting job failures from HPC system log. 435-462 - Emmanuel Ahishakiye, Waweru Mwangi, Petronilla Muriithi, Fredrick Kanobe, Godliver Owomugisha, Danison Taremwa, Lenard Nkalubo:
Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data. 463-485 - Beste Ustubioglu
, Gul Tahaoglu, Güzin Ulutas, Arda Ustubioglu, Muhammed Kiliç
:
Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach. 486-518 - Tian Tian, Anshi Wang, Xiuting Yang, Dunwei Gong, Tie Hou, Xiangjuan Yao:
Parallel program testing based on critical communication and branch transformation. 519-548 - Tobias Piontek, Kawsar Haghshenas
, Marco Aiello:
Carbon emission-aware job scheduling for Kubernetes deployments. 549-569 - Yashar Salami
, Vahid Khajehvand, Esmaeil Zeinali:
SOS-FCI: a secure offloading scheme in fog-cloud-based IoT. 570-600 - Hamed Jalilian:
Total variation method based on modified Barzilai-Borwein algorithm to noise reduction in MRI images. 601-619 - Qun Li, Bei Tang, Jianxin Li, Siguang Chen:
User satisfaction-based energy-saving computation offloading in fog computing networks. 620-641 - Rong Gao, Wei He, Lingyu Yan, Donghua Liu, Yonghong Yu, Zhiwei Ye:
Hybrid graph transformer networks for multivariate time series anomaly detection. 642-669 - Fatemeh Vardi, Alireza Mahjoub
:
A hot-module-aware mapping approach in network-on-chip. 670-702 - Sujit Sangram Sahoo
, Vijay Kumar Chaurasiya:
Proof of location based delivery system using multi-party virtual state channel: a blockchain model. 703-733 - Mao-Lun Chiang, Hui-Ching Hsieh, Tzu-Ling Lin, Tsui-Ping Chang, Hong-Wei Chen:
Dynamic weight-based connectivity recovery in wireless sensor and actor networks. 734-760 - Elham Dalirinia, Mehrdad Jalali
, Mahdi Yaghoobi, Hamid Tabatabaee:
Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization. 761-799 - Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee
, Ahmad Keshavarz:
A new improved KNN-based recommender system. 800-834 - Dikshit Chauhan
, Anupam Yadav:
Stability and agent dynamics of artificial electric field algorithm. 835-864 - Namrata Singh
, Ayan Kumar Das:
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor. 865-914 - Zahra Mahmoodabadi, Mostafa Nouri Baygi:
An approximation algorithm for virtual machine placement in cloud data centers. 915-941 - Rakesh Kumar
, Sunil K. Singh
, D. K. Lobiyal:
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks. 942-969 - Sheng-Tzong Cheng, Gwo-Jiun Horng, Chih-Wei Hsu, Z.-Yu Su:
Per-user network access control kernel module with secure multifactor authentication. 970-1008 - Maedeh Khalifavi, Zahra Shirmohammadi, Sahar Kianian:
FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method. 1009-1036 - Tariq Shah, Tanveer ul Haq:
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. 1037-1058 - Mehmet Bozdal
, Kadir Ileri
, Ali Ozkahraman:
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset. 1059-1079 - Indushree M, Manish Raj
:
A novel Blockchain-based authentication scheme for telecare medical information system. 1080-1108 - Sadoon Azizi, Pedram Farzin, Mohammad Shojafar, Omer F. Rana
:
A scalable and flexible platform for service placement in multi-fog and multi-cloud environments. 1109-1136 - Tundong Liu, Fengqiang Gao, Xin Chen, Guifang Shao, Chenhan Wang:
Research on load-balancing scheduling optimization for wafer surface defect detection. 1137-1159 - Jihene Latrech
, Zahra Kodia
, Nadia Ben Azzouna:
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning. 1160-1182 - Zuoyan Zhang, Jinchen Xu, Jiangwei Hao, Yang Qu, Haotian He, Bei Zhou:
Hierarchical search algorithm for error detection in floating-point arithmetic expressions. 1183-1205 - Abdelhakim Baouya
, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaz-Nava, Enrico Ferrera:
Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance. 1206-1237 - Sumit Sharma
, Sarika Jain:
CovidO: an ontology for COVID-19 metadata. 1238-1267 - Sibo Qi, Juan Chen, Peng Chen
, Peian Wen, Xianhua Niu, Lei Xu:
An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers. 1268-1293 - Xiaomei Li
, Ye Lu, Xiaoyu Zhao, Xiong Deng, Zhijiang Xie:
Path planning for intelligent vehicles based on improved D* Lite. 1294-1330 - C. Pabitha, B. Vanathi:
Dense Mesh RCNN: assessment of human skin burn and burn depth severity. 1331-1362 - Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien-Hsiung Weng, Kuan-Ching Li
:
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data. 1363-1364 - Minghua Tang, Enrico Russo, Maurizio Palesi:
Correction to: The position-based compression techniques for DNN model. 1365 - Yifei Wang, Mert Pilanci:
Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path. 1366
Volume 80, Number 2, January 2024
- Preetpal Kaur Buttar
, Manoj Kumar Sachan:
Semantic segmentation of satellite images for crop type identification in smallholder farms. 1367-1395 - Zhonghua Chen, S. B. Goyal, Anand Singh Rajawat
:
Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. 1396-1425 - Xiaoxin Gao
, Fazhi He, Songwei Zhang, Jinkun Luo, Bo Fan:
A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively. 1426-1463 - Bahram Rashidi:
Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection. 1464-1490 - Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:
An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing. 1491-1521 - Santosh Kumar Uppada, B. S. Ashwin, B. Sivaselvan:
A novel evolutionary approach-based multimodal model to detect fake news in OSNs using text and metadata. 1522-1553 - Melika Amiri, Massoud Dousti, Majid Mohammadi:
Design and implementation of carry-save adder using quantum-dot cellular automata. 1554-1567 - Md Yeasin, Ranjit Kumar Paul:
OptiSembleForecasting: optimization-based ensemble forecasting using MCS algorithm and PCA-based error index. 1568-1597 - Carmen Carrión
:
Research streams and open challenges in the metaverse. 1598-1639 - Zhaoxia Tian, Mingzu Zhang, Xing Feng:
Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links. 1640-1667 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures. 1668-1693 - Yi Yang
, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 1694-1727 - Amjad Qtaish, Malik Braik
, Dheeb Albashish, Mohammad T. Alshammari, Abdulrahman Alreshidi, Eissa Jaber Alreshidi:
Optimization of K-means clustering method using hybrid capuchin search algorithm. 1728-1787 - Shaurya Sood, Neminath Hubballi:
SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters. 1788-1817 - Arvind Mewada
, Rupesh Kumar Dewang:
NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media. 1818-1851 - Mirna Magdy, Mohamed O. Grida, Gawaher S. Hussein:
Disruption mitigation in the semiconductors supply chain by using public blockchains. 1852-1906 - Huanwen Zhang, Yan Wang, Jianxi Fan, Yuejuan Han, Baolei Cheng:
Constructing edge-disjoint spanning trees in several cube-based networks with applications to edge fault-tolerant communication. 1907-1934 - Nartay Aikyn, Ardan Zhanegizov, Temirlan Aidarov, Dinh-Mao Bui, Nguyen Anh Tu:
Efficient facial expression recognition framework based on edge computing. 1935-1972 - Divya Paikaray, Ashok Kumar Mehta, Danish Ali Khan:
Optimized convolutional neural network for the classification of lung cancer. 1973-1989 - Ramzi A. Haraty, Ali Assaf:
DG-means: a superior greedy algorithm for clustering distributed data. 1990-2024 - Yanjiang Han, Fengping Wang, Wei Wang, Xiangyu Li, Jianyang Zhang
:
YOLO-SG: Small traffic signs detection method in complex scene. 2025-2046 - Yuju Wang
, Liang-Hong Wu
, Liang-Chuan Wu
:
An integrative extraction approach for index-tracking portfolio construction and forecasting under a deep learning framework. 2047-2066 - Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi
, Shahram Etemadi Borujeni:
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems. 2067-2127 - Massoud Seifpour, Seyyed Amir Asghari, Mostafa Ghobaei-Arani
:
A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach. 2128-2163 - P. Mathivanan
, Maran Ponnambalam:
Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 2164-2195 - Xiaohong Li, Qixuan Peng, Ruihong Li, Huifang Ma:
Dual graph neural network for overlapping community detection. 2196-2222 - Pijush Kanti Dutta Pramanik
, Saurabh Pal
, Prasenjit Choudhury
:
Mobile crowd computing: potential, architecture, requirements, challenges, and applications. 2223-2318 - Haiying Liu, Zhihao Li, Kuihua Huang, Rui Wang, Guangquan Cheng, Tiexiang Li:
Evolutionary reinforcement learning algorithm for large-scale multi-agent cooperation and confrontation applications. 2319-2346 - S. Saumiya, S. Wilfred Franklin
:
Unified automated deep learning framework for segmentation and classification of liver tumors. 2347-2380 - Hengliang Guo, Long Zhang, Yi Zhang, Jianan Li, Xiaoyue Xu, Lu Liu, Kuangsheng Cai, Dan Wu, Shuxin Yang, Lingbo Kong, Xu Gao
:
OpenMP offloading data transfer optimization for DCUs. 2381-2402 - Shaimaa E. Nassar, Ibrahim Yasser, Hanan M. Amer, Mohamed A. Mohamed:
A robust MRI-based brain tumor classification via a hybrid deep learning technique. 2403-2427 - Chakaravarthi Sivanandam, Vaishnnave Mala Perumal, Jagadeesh Mohan
:
A novel light GBM-optimized long short-term memory for enhancing quality and security in web service recommendation system. 2428-2460 - Usha Patel, Vibha Patel:
Active learning-based hyperspectral image classification: a reinforcement learning approach. 2461-2486 - Chenxing Xia, Difeng Chen, Xiuju Gao, Bin Ge, Kuan-Ching Li
, Xianjin Fang, Yan Zhang, Ke Yang:
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection. 2487-2513 - Chandrashekhar Meshram, Mohammad S. Obaidat, Rabha W. Ibrahim, Sarita Gajbhiye Meshram
, Arpit Vijay Raikwar:
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments. 2514-2537 - Tinka Singh, Ramagopal V. S. Uppaluri:
Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters. 2538-2571 - Khalid A. Darabkh, Thara A. Alzboun, Marwa H. Al-Tahaineh:
A novel routing protocol for stable route selection in IoT networks. 2572-2600 - Bahar Ghasemi, Mahmood Ahmadi
, Hamed Alimohammadi
:
A neural gas network-based scheme for SDN many-field packet classification. 2601-2632 - Oussama Azzouzi, Mohamed Anane, Mouloud Koudil, Mohamed Issad, Yassine Himeur:
Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA. 2633-2659 - Anil Kumar Kamboj
, Poonam Jindal, Pankaj Verma:
Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks. 2660-2680 - Divya Rani, Sachin Tripathi:
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. 2681-2717 - Peda Gopi Arepalli
, K. Jairam Naik:
A deep learning-enabled IoT framework for early hypoxia detection in aqua water using light weight spatially shared attention-LSTM network. 2718-2747 - Bo Zhou, Hai Huang, Jun Xia, Donghai Tian:
A novel malware detection method based on API embedding and API parameters. 2748-2766 - Lijun Qi, Jincheng Zhuang:
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing. 2767-2798 - Youwei Wang, Lizhou Feng, Ao Liu, Weiqi Wang, Yudong Hou:
Dual BiGRU-CNN-based sentiment classification method combining global and local attention. 2799-2837 - Tengteng Cheng, Guosun Zeng, Zhipeng Sun:
A big graph clustering method to support parallel processing by perceiving graph's application algorithm semantics. 2838-2861 - G. Sivapriya, R. Manjula Devi, Keerthika Periasamy
:
Computer-aided diagnostic model for retinal vascular diseases using graph-based attention mechanism. 2862-2888 - Yuxin Tang
, Yudi Qiu
, Yanwei Liu, Jie Jiao, Peng Zhang, Yibo Fan:
Scalable short-entry dual-grain coherence directories with flexible region granularity. 2889-2911 - Raushan Kumar Singh
, Mukesh Kumar:
Correction to: Future trends of path planning framework considering accident attributes for smart cities. 2912 - Parisa Kavianpour, Mohammadreza Kavianpour, Ehsan Jahani, Amin Ramezani:
Correction to: A CNN-BiLSTM model with attention mechanism for earthquake prediction. 2913 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures. 2914-2915
Volume 80, Number 3, February 2024
- Ismail Biri, Ülkü Tuncer Küçüktas, Fatih Uysal, Firat Hardalaç:
Forecasting the future popularity of the anti-vax narrative on Twitter with machine learning. 2917-2947 - Jiaxin Chen, Xuguang Zhang, Yinggan Tang, Hui Yu
:
ICE-YoloX: research on face mask detection algorithm based on improved YoloX network. 2948-2969 - Divyanshu Awasthi
, Priyank Khare, Vinay Kumar Srivastava
:
Internet of medical things-based authentication for an optimized watermarking of encrypted EEG. 2970-3004 - Luttfi A. Al-Haddad
, Alaa Abdulhady Jaber
, Sinan A. Al-Haddad
, Yousif M. Al-Muslim:
Fault diagnosis of actuator damage in UAVs using embedded recorded data and stacked machine learning models. 3005-3024 - Guangjin Wang
, Yuanying Wang, Fuyong Xu, Yongsheng Zhang, Peiyu Liu:
Syntactic and semantic dual-enhanced bidirectional network for aspect sentiment triplet extraction. 3025-3041 - Hongxia Zhang, Mengde Wu, Qiqi Feng, Hao Li:
AERQP: adaptive embedding representation-based QoS prediction for web service recommendation. 3042-3065 - Arash Ahmadi, Amanj Khorramian:
Efficient Brute-force state space search for Yin-Yang puzzle. 3066-3088 - K. Uma Maheswari
, S. Mary Saira Bhanu, Nickolas Savarimuthu:
Clustering-based data integrity verification approach for multi-replica in a fog environment. 3089-3113 - Yilu Chen, Miaodi Su, Hongzhi Ding, Shaohong Weng, Zhifeng Lin, Xiqiong Bai:
High-correlation 3D routability estimation for congestion-guided global routing. 3114-3141 - Xuesong Wang, Zheng Zhang, Dongsheng Zhang, Limin Ding:
Pose visual detection method for cellphone dropping process incorporating prior information. 3142-3161 - Ruihang Xu, Peisen Wang, Xuanjing Li, Ruifeng Nie:
YOLO-ARGhost: a lightweight face mask detection model. 3162-3182 - Mei Bai, Qibo Wang, Shihan Chang, Xite Wang, Guanyu Li:
Location-based skyline query processing technology in road networks. 3183-3211 - Yanni Yang, Yiting Tan, Jintao Min, Zhengwei Huang:
Automatic text summarization for government news reports based on multiple features. 3212-3228 - Saif Eddine Khouni, Tidjani Menacer:
Nizar optimization algorithm: a novel metaheuristic algorithm for global optimization and engineering applications. 3229-3281 - Lin Zhang, Fang'ai Liu, Hongchen Wu, Xuqiang Zhuang, Yaoyao Yan:
CFF: combining interactive features and user interest features for click-through rate prediction. 3282-3309 - Xiao Liu, Junlong Chen, Deyu Qi, Tong Zhang:
Exploration of low-resource language-oriented machine translation system of genetic algorithm-optimized hyper-task network under cloud platform technology. 3310-3333 - Jianxin Tang, Shihui Song, Hongyu Zhu, Qian Du, Jitao Qu:
Sequential seeding policy on social influence maximization: a Q-learning-driven discrete differential evolution optimization. 3334-3359 - Junfan Wang, Yi Chen, Yeting Gu, Yunfeng Yan, Qi Li, Mingyu Gao, Zhekang Dong
:
A lightweight vehicle mounted multi-scale traffic sign detector using attention fusion pyramid. 3360-3381 - Xu Gu, Xiaoliang Chen, Peng Lu, Xiang Lan, Xianyong Li, Yajun Du:
SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing. 3382-3411 - Xinnan Ding, Shan Du, Yu Zhang
, Kejun Wang:
Spatiotemporal multi-scale bilateral motion network for gait recognition. 3412-3440 - Louiza Belkhiri-Brahmi, Samira Yessad, Fouzi Semchedine
:
Congestion control-based sink MOBility pattern for data gathering optimization in WSN. 3441-3479 - Wei Li, Yetong Gao, Lei Wang:
A multipopulation particle swarm optimization based on divergent guidance and knowledge transfer for multimodal multiobjective problems. 3480-3527 - Soroush Babaee Khobdeh, Mohammad Reza Yamaghani, Siavash Khodaparast Sareshkeh:
Basketball action recognition based on the combination of YOLO and a deep fuzzy LSTM network. 3528-3553 - Rajesh Dwivedi
, Aruna Tiwari
, Neha Bharill, Milind B. Ratnaparkhe, Parul Mogre, Pranjal Gadge, Kethavath Jagadeesh:
A novel apache spark-based 14-dimensional scalable feature extraction approach for the clustering of genomics data. 3554-3588 - Quan Yuan, Shanshan Wang, Mai Hu, Liang Zeng
:
SLDChOA: a comprehensive and competitive multi-strategy-enhanced chimp algorithm for global optimization and engineering design. 3589-3643 - Runsheng Liu, Wencong Cai, Junyang Zhang, Xiaoling Wu, Lilin Yang, Kaiqing Luo:
CF-lines: a fusing contour features optimization method for line segment detector. 3644-3662 - Nan Gao, Bowei Yang, Peng Chen, Li Ping Qian:
A multi-stage recognizer for nested named entity with weakly labeled data. 3663-3693 - Samira Shirinabadi Farahani, Mohammad Reza Reshadinezhad, Seyed Erfan Fatemieh:
New design for error-resilient approximate multipliers used in image processing in CNTFET technology. 3694-3712 - A. Ahila, V. Prema, S. Ayyasamy, M. Sivasubramanian:
An enhanced deep learning model for high-speed classification of plant diseases with bioinspired algorithm. 3713-3737 - Sarra Cherbal, Abdelhak Zier, Sara Hebal, Lemia Louail, Boubakeur Annane:
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. 3738-3816 - Yaqian Tang, Baolei Cheng, Yan Wang, Yuejuan Han, Jia Yu, Jianxi Fan:
Connectivity and diagnosability of a class of recursive networks. 3817-3848 - Zhenghong Wang, Fanhua Yu, Dan Wang, Taihui Liu, Rongjun Hu:
Multi-threshold segmentation of breast cancer images based on improved dandelion optimization algorithm. 3849-3874 - Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai:
STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things. 3875-3901 - Djihad Arrar, Nadjet Kamel, Abdelaziz Lakhfif:
A comprehensive survey of link prediction methods. 3902-3942 - Sultan Noman Qasem
:
A novel honey badger algorithm with multilayer perceptron for predicting COVID-19 time series data. 3943-3969 - Ismael Boureima, Manish Bhattarai, Maksim Ekin Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov:
Distributed out-of-memory NMF on CPU/GPU architectures. 3970-3999 - Neha Bansal, Shelly Sachdeva, Lalit Kumar Awasthi
:
Schema generation for document stores using workload-driven approach. 4000-4048 - Subeen Leem, Jisong Oh, Jihoon Moon, Mucheol Kim, Seungmin Rho:
Enhancing multistep-ahead bike-sharing demand prediction with a two-stage online learning-based time-series model: insight from Seoul. 4049-4082 - Salih Berkan Aydemir:
Ideal solution candidate search for starling murmuration optimizer and its applications on global optimization and engineering problems. 4083-4156 - Rihab Abidi, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos, Nabil Sahli:
A study of mechanisms and approaches for IoV trust models requirements achievement. 4157-4201 - Xiaoyu Zheng, Dewang Chen, Zhiming Lin, Liping Zhuang, Wendi Zhao:
Method on generating massive virtual driving curves for high-speed trains of the Cross-Taiwan Strait Railway and its statistical analysis. 4202-4225 - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:
Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services. 4226-4247 - Chao Yin, Qin Fang, Hongyi Li, Yingjian Peng, Xiaogang Xu, Dan Tang:
An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing. 4248-4285 - Shwet Ketu, Pramod Kumar Mishra:
An intelligent hybrid classification model for heart disease detection using imbalanced electrocardiogram signals. 4286-4308 - Junjun Jiao, Zhisheng Chen, Tao Zhou:
Minimal Kapur cross-entropy-based image segmentation for distribution grid inspection using improved INFO optimization algorithm. 4309-4352 - Shengbin Liang, Fuqi Sun
, Haoran Sun, Tingting Chen, Wencai Du:
A medical text classification approach with ZEN and capsule network. 4353-4377 - Ashok Kumar Yadav, Karan Singh, Pramod Kumar Srivastava:
Probabilistic estimation of comprehensive utility based on user preference and network condition for network selection in future in HetNet. 4378-4400 - Yuan Zhou, Lei Xiang, Fan Liu, Haoran Duan
, Yang Long:
Dynamic visual-guided selection for zero-shot learning. 4401-4419 - P. Mathivanan
, Maran Ponnambalam
:
Correction to: Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 4420-4422
Volume 80, Number 4, March 2024
- Di Li, Lang Li, Yu Ou:
Side-channel analysis based on Siamese neural network. 4423-4450 - Hongwei Zhang, Shuaibo Liu, Chi Wang, Shuai Lu, Wenbo Xiong:
Color-patterned fabric defect detection algorithm based on triplet attention multi-scale U-shape denoising convolutional auto-encoder. 4451-4476 - K. Hemant Kumar Reddy, Rajat Shubhra Goswami, Diptendu Sinha Roy:
A deep learning-based smart service model for context-aware intelligent transportation system. 4477-4499 - Yanru Liu, Jiali Xu, Austin Lin Yee:
The analysis of Iris image acquisition and real-time detection system using convolutional neural network. 4500-4532 - Mehmet Akif Bülbül
:
Optimization of artificial neural network structure and hyperparameters in hybrid model by genetic algorithm: iOS-android application for breast cancer diagnosis/prediction. 4533-4553 - Masashi Kuwano, Mio Hosoe, Taku Moriyama:
Prediction of railroad user count using number of route searches via bivariate state-space modeling. 4554-4576 - Yuqin Song, Jitao Zhao, Chunliang Shang:
A multi-stage feature fusion defogging network based on the attention mechanism. 4577-4599 - Mahboubeh Afzali, Amin Mohammad Vali Samani, Hamid Reza Naji
:
An efficient resource allocation of IoT requests in hybrid fog-cloud environment. 4600-4624 - Shao Deng, Shanzhu Xiao, Qiuqun Deng, Huanzhang Lu:
A hovering swarm particle swarm optimization algorithm based on node resource attributes for hardware/software partitioning. 4625-4647 - Anit Kumar Ghosal
, Amit Sardar, Dipanwita Roychowdhury:
Differential fault analysis attack-tolerant hardware implementation of AES. 4648-4681 - Min Tian, Qi Liu, Jingshan Pan, Ying Gou, Zanjun Zhang:
swPTS: an efficient parallel Thomas split algorithm for tridiagonal systems on Sunway manycore processors. 4682-4706 - Sadiqa Jafari, Yung Cheol Byun:
Accurate remaining useful life estimation of lithium-ion batteries in electric vehicles based on a measurable feature-based approach with explainable AI. 4707-4732 - Eht E. Sham
, Deo Prakash Vidyarthi:
A modified fuzzy similarity measure for trapezoidal fuzzy number with their applications. 4733-4759 - Rawaa Alatrash, Rojalina Priyadarshini
, Hadi Ezaldeen:
Collaborative filtering integrated fine-grained sentiment for hybrid recommender system. 4760-4807 - Ali Dabba, Abdelkamel Tari, Samy Meftali:
A novel grey wolf optimization algorithm based on geometric transformations for gene selection and cancer classification. 4808-4840 - Adeola Borode
, Peter A. Olubambi:
Optimisation of artificial intelligence models and response surface methodology for predicting viscosity and relative viscosity of GNP-alumina hybrid nanofluid: incorporating the effects of mixing ratio and temperature. 4841-4869 - Neetu Sharma
, Rajesh Rohilla:
A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management. 4870-4913 - Ruyi Cao, Wanghao Mo, Wendong Zhang:
MFMDet: multi-scale face mask detection using improved Cascade rcnn. 4914-4942 - Xiaoxiao Sun, Siqing Yang, Chenying Zhao, Dongjin Yu:
Design-time business process compliance assessment based on multi-granularity semantic information. 4943-4971 - Jingan Lu, Zhenfang Zhu, Kefeng Li, Shuai Gong, Hongli Pei, Wenling Wang:
Gtpsum: guided tensor product framework for abstractive summarization. 4972-4995 - Guifang Zhang, Hon-Cheng Wong:
Saliency-based dual-attention network for unsupervised video object segmentation. 4996-5010 - Mohamed Yassine Landolsi
, Lotfi Ben Romdhane, Lobna Hlaoua:
Hybrid medical named entity recognition using document structure and surrounding context. 5011-5041 - Yan Kang
, Xiaoshe Dong, Ziheng Wang, Heng Chen, Qiang Wang:
Parallel implementations of post-quantum leighton-Micali signature on multiple nodes. 5042-5072 - Siti Nuraishah Agos Jawaddi, Azlan Ismail, Muhammad Nur Haziq Mohammad Hatta, Anis Faqihah Kamarulzaman:
Insights into cloud autoscaling: a unique perspective through MDP and DTMC formal models. 5073-5107 - Shreyshi Shree, Chen Zhou, Masoud Barati:
Data protection in internet of medical things using blockchain and secret sharing method. 5108-5135 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang
, Peiying Zhang, Laith Abualigah
:
Load balancing strategy for SDN multi-controller clusters based on load prediction. 5136-5162 - Swati Gupta, Niraj Pratap Singh:
Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directions. 5163-5196 - Chunjing Xiao, Shenkai Lv, Wei Fan, W. H. Ip:
Temporal-order association-based dynamic graph evolution for recommendation. 5197-5223 - N. Sheena
, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
EMCP: evolutionary multi-objective clustering protocol for prolonged lifetime of heterogeneous IoT networks. 5224-5254 - Ehsan Jafari, Ardeshir Dolati, Kamran Layeghi:
Object tracking using local structural information and energy minimization. 5255-5278 - Yinsheng Tong, Zuoyong Li, Hui Huang, Libin Gao
, Minghai Xu, Zhongyi Hu:
Research of spatial context convolutional neural networks for early diagnosis of Alzheimer's disease. 5279-5297 - Taymaz Akan
, Diego Oliva
, Ali-Reza Feizi-Derakhshi
, Amir-Reza Feizi-Derakhshi
, Marco Pérez-Cisneros
, Mohammad Alfrad Nobel Bhuiyan
:
Battle royale optimizer for multilevel image thresholding. 5298-5340 - Liqiang Song, Huaiguang Wang, Baojian Yang:
Hybrid compression scheme based on VMD optimization algorithm application to mechanical equipment monitoring. 5341-5362 - Yue Zhao, Yuan Yao, Tong He, Xingshe Zhou, Bo Shen:
Sl4u: a scenario description language for unmanned swarm. 5363-5389 - Jingbo Sun, Weiming Peng, Tianbao Song, Haitao Liu, Shuqin Zhu, Jihua Song:
Enhanced cross-prompt trait scoring via syntactic feature fusion and contrastive learning. 5390-5407 - Ru Sun, Ting Yang:
Hybrid parameter-based PSO flexible needle percutaneous puncture path planning. 5408-5427 - Zhiyi Yu
, Hong Li, Jialin Feng:
Contrastive learning for unsupervised sentence embeddings using negative samples with diminished semantics. 5428-5445 - Jin Xu, Huiqun Yu, Guisheng Fan, Jiayin Zhang
, Zengpeng Li
, Qifeng Tang:
Adaptive edge service deployment in burst load scenarios using deep reinforcement learning. 5446-5471 - Jing-Wei Liu, Ming-Hua Hsu, Chun-Liang Lai, Sheng-K. Wu:
Using video analysis and artificial neural network to explore association rules and influence scenarios in elite table tennis matches. 5472-5489 - Chang Jie, Chen Jiming, Shao Ying, Yanchun Tong, Haodong Ren:
A pyramid GNN model for CXR-based COVID-19 classification. 5490-5508 - Fei Yang, Huyin Zhang, Shiming Tao, Xiying Fan:
Simple hierarchical PageRank graph neural networks. 5509-5539 - Prashant Vaish, Niharika Anand, Vishal Krishna Singh
, Gaurav Sharma:
Applications hosting over cloud-assisted IOT: a productivity model and method defining accessibility of data security. 5540-5564 - Raghuraj Singh, Kuldeep Kumar
:
Hybrid optimization-enabled deep Q network for fault prediction in service-oriented architecture. 5565-5592 - Zixiang Nie, Jin Li, Fenghui Duan, Yueming Lu:
A collaborative ledger storing model for lightweight blockchains based on Chord Ring. 5593-5615 - Zhen Li, Zining Cao, Chao Xing:
Performance modeling and quantitative evaluation for cyber-physical systems based on LTS. 5616-5653 - Weibei Fan, Xuanli Liu, Mengjie Lv:
Hamiltonian cycle embedding with fault-tolerant edges and adaptive diagnosis in half hypercube. 5654-5674 - Azad Johari, Azlan Ismail:
PMLAP: a methodology for annotating SSML elements into HTML5. 5675-5707 - Viswanatha Reddy G, B. S. N. V. Chaitanya, Prathyush P, Sumanth M, Mrinalini C, Dileep Kumar P, Snehasis Mukherjee:
DFW-PP: dynamic feature weighting-based popularity prediction for social media content. 5708-5730 - Ismael Boureima, Manish Bhattarai, Maksim Ekin Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov:
Correction to: Distributed out-of-memory NMF on CPU/GPU architectures. 5731-5732
Volume 80, Number 5, March 2024
- Zhaojun Wang
, Xindong You, Xueqiang Lv:
A relation enhanced model for temporal knowledge graph alignment. 5733-5755 - Samaher Al-Janabi
, Ghada Mohammed
:
An intelligent returned energy model of cell and grid using a gain sharing knowledge enhanced long short-term memory neural network. 5756-5814 - Peng Li, Cheng Che, Rui Hou:
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning. 5815-5831 - Kangjin Huang, Yonggang Che, Chuanfu Xu, Zhe Dai, Jian Zhang:
Improving CUDA performance of an unstructured high-order CFD application under OP2 framework. 5832-5846 - Yueting Xiang, Yangfen Chen, Wenjuan Fan, Hui Ye:
Enhancing computer-aided translation system with BiLSTM and convolutional neural network using a knowledge graph approach. 5847-5869 - Inam Ullah, Asra Noor, Shah Nazir, Farhad Ali, Yazeed Yasin Ghadi
, Nida Aslam:
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. 5870-5899 - S. Muthulakshmi, R. Chitra:
Interplanetary file system and blockchain for secured smart grid networks. 5900-5922 - Abbas Rammal, Kenneth Ezukwoke, Anis Hoayek, Mireille Batton-Hubert:
Unsupervised approach for an optimal representation of the latent space of a failure analysis dataset. 5923-5949 - S. Nikkath Bushra
, Nalini Subramanian, G. Shobana
, S. Radhika:
A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment. 5950-5978 - Sait Alp, Rahim Dehkharghani, Taymaz Akan, Mohammad A. N. Bhuiyan:
MOBRO: multi-objective battle royale optimizer. 5979-6016 - Shilpi
, Arvind Kumar:
Application of Jaya algorithm for solving localization problem in a distributed Wireless Sensor Network. 6017-6041 - Rui-Yun Chang, Xiufang Feng, Chengye Zou, Hao Zhang:
Multimodal medical image protection algorithm based on 3D-CICCM and Fresnel transform. 6042-6067 - Fanfan Li:
Chord-based music generation using long short-term memory neural networks in the context of artificial intelligence. 6068-6092 - Xiaoxuan Ma, Boyang Sun, Weifeng Liu
, Dong Sui, Sihan Shan, Jing Chen, Zhaofeng Tian:
Tnseg: adversarial networks with multi-scale joint loss for thyroid nodule segmentation. 6093-6118 - Hongjie Geng, Mingming Zhou:
Novel post-photographic technique based on deep convolutional neural network and blockchain technology. 6119-6139 - Jingwen Xiong, Wenke Zang, Yuzhen Zhao, Xiyu Liu:
Density peaks clustering algorithm with connected local density and punished relative distance. 6140-6168 - Huan Liu, Jian Wu, Rui He:
IDPNet: a light-weight network and its variants for human pose estimation. 6169-6191 - Qianqiu Wang, Ge Nong, Wenbo Wu:
Linear structure index for network-constrained moving objects. 6192-6220 - Tianhua Chen, Yanyue Li, Qinghua Qiao:
Fine-grained bird image classification based on counterfactual method of vision transformer model. 6221-6239 - Jubin Wang, Yuan Zhuang, Yunhui Zeng
:
A transmission optimization method for MPI communications. 6240-6263 - Ahmed N. Bakry, Almohammady S. Alsharkawy
, Mohamed S. Farag
, Kamal R. Raslan:
Automatic suppression of false positive alerts in anti-money laundering systems using machine learning. 6264-6284 - Yifei Sun, Jigang Wu, Yalan Wu, Long Chen, Weijun Sun:
Efficient approaches for task offloading in point-of-interest based vehicular fog computing. 6285-6310 - Juan Fang, Zhichao Wei, Yaqi Liu, Yumin Hou:
TB-TBP: a task-based adaptive routing algorithm for network-on-chip in heterogenous CPU-GPU architectures. 6311-6335 - Huarui Wu, Chang Liu, Chunjiang Zhao:
Personalized agricultural knowledge services: a framework for privacy-protected user portraits and efficient recommendation. 6336-6355 - Ali Abbas, Raza Hasan
:
A multi-attribute-based data forwarding scheme for delay tolerant networks. 6356-6381 - Ali Asghari
, Hossein Azgomi, Ali Abbas Zoraghchian, Abbas Barzegarinezhad
:
Energy-aware server placement in mobile edge computing using trees social relations optimization algorithm. 6382-6410 - Neeraj Kumar Shukla
, Abdulilah M. Mayet, M. Ram Kumar Raja
, Muneer Parayangat, Mohammed Usman, Rajesh Verma, Javed Khan Bhutto:
A unified test data volume compression scheme for circular scan architecture using hosted cuckoo optimization. 6411-6434 - Sumera Naz, Aqsa Shafiq, Maheen Abbas:
An approach for 2-tuple linguistic q-rung orthopair fuzzy MAGDM for the evaluation of historical sites with power Heronian mean. 6435-6485 - Muhanad Mohammed Kadum, Xiaoheng Deng:
Allocating energy-objective aware workflow in distributed edge micro data centres. 6486-6521 - Haiyan Li, Shaolin Peng, Xun Lang, Shuhua Ye, Hongsong Li:
Spatial-guided informative semantic joint transformer for single-image deraining. 6522-6551 - Mahnaz Khojand, Kambiz Majidzadeh, Mohammad Masdari, Yousef Farhang:
Controller placement in SDN using game theory and a discrete hybrid metaheuristic algorithm. 6552-6600 - Marzieh Varposhti:
Distributed homology-based sensor selection and scheduling in wireless sensor networks. 6601-6621 - Hind Idrissi, Paolo Palmieri:
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems. 6622-6660 - Yibo Huang, Bo Wang, Xiang-rong Pu, Yian Li, Qiuyu Zhang:
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. 6661-6698 - Zahra Valadanzoj
, Hassan Daryanavard
, Abbas Harifi
:
High-speed YOLOv4-tiny hardware accelerator for self-driving automotive. 6699-6724 - Hui Ma:
Development of a smart tourism service system based on the Internet of Things and machine learning. 6725-6745 - Ali Jameel Hashim
, M. A. Balafar, Jafar Tanha:
NEAE: NeuroEvolution AutoEncoder for anomaly detection in internet traffic data. 6746-6777 - Shiqiang Zhang, Dongzhi Cao:
A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT. 6778-6808 - Saeid Ghafouri, Seyed Hossein Khasteh, Seyed Omid Azarkasb:
Influence maximization (IM) in complex networks with limited visibility using statistical methods. 6809-6854 - Naveen Chandra Gowda, Sunilkumar S. Manvi, A. Bharathi Malakreddy, Rajkumar Buyya:
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments. 6855-6890 - Redouane Benabdallah Benarmas, Kadda Beghdad Bey:
A deep learning-based framework for road traffic prediction. 6891-6916 - Yuqing Cheng, Zhiying Cao, Xiuguo Zhang, Qilei Cao, Dezhen Zhang:
Multi objective dynamic task scheduling optimization algorithm based on deep reinforcement learning. 6917-6945 - Marzieh Varposhti:
Distributed homology-based algorithm for solving Set k-Cover problem in heterogeneous directional sensor networks. 6946-6964 - Yong Niu, Xing Xing, Zhichun Jia, Mindong Xin, Junye Xing:
SMIGNN: social recommendation with multi-intention knowledge distillation based on graph neural network. 6965-6988 - Mukesh Patidar, Ankit Jain, Keshav Patidar, Surendra Kumar Shukla
, Ali H. Majeed, Namit Gupta, Nilesh Patidar:
An ultra-dense and cost-efficient coplanar RAM cell design in quantum-dot cellular automata technology. 6989-7027 - Nadia Nedjah, Sérgio de Souza Raposo, Luiza de Macedo Mourelle:
Dedicated hardware design for efficient quantum computations using classical logic gates. 7028-7070 - Kun Yang, Lin Jiang, Rui Shan, Kangle Li, Xinyue Cui:
RMSRM: real-time monitoring-based self-reconfiguration mechanism in reconfigurable PE array. 7071-7101 - Donaldo Garcia
, José de Jesús Rubio, Humberto Sossa, Jaime Pacheco, Guadalupe Juliana Gutierrez, Carlos Aguilar Ibáñez:
Electricity consumption modeling by a chaotic convolutional radial basis function network. 7102-7119 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang
, Peiying Zhang, Laith Abualigah
:
Correction to: Load balancing strategy for SDN multi-controller clusters based on load prediction. 7120-7121
Volume 80, Number 6, April 2024
- Junfeng Wang:
The use of fuzzy authentication integrated with convolutional neural networks in digital content protection. 7123-7146 - Xiaohong Wang, Xu Zhao, Kun Xu, Shihao Xu:
Multi-scale adaptive atrous graph convolution for point cloud analysis. 7147-7170 - Lisheng Wu, Xiaoming You, Sheng Liu:
Heterogeneous ant colony algorithm based on selective evolution mechanism and game strategy. 7171-7206 - Mohammad Hassan Almaspoor
, Ali A. Safaei, Afshin Salajegheh, Behrouz Minaei-Bidgoli:
Distributed independent vector machine for big data classification problems. 7207-7244 - Xinfeng He, Riyang Li:
Malware detection for container runtime based on virtual machine introspection. 7245-7268 - Kai Song, Huaqiong Ma, Haiming Zhang, Liping Yan:
Research of ReLU output device in ternary optical computer based on parallel fully connected layer. 7269-7292 - Yuqin Song, Chunliang Shang, Jitao Zhao:
LBCNet: A lightweight bilateral cascaded feature fusion network for real-time semantic segmentation. 7293-7315 - Saif Ur Rehman Khan, Ming Zhao, Sohaib Asif
, Xuehan Chen, Yusen Zhu:
GLNET: global-local CNN's-based informed model for detection of breast cancer categories from histopathological slides. 7316-7348 - Chenghao Wang
, Zhongqiang Luo, Ziyuan Qi:
Transformer oil leakage detection with sampling-WIoU module. 7349-7368 - Yen-Liang Chen, Chia-Chi Wu, Po-Cheng Shih:
Using personalized next session to improve session-based recommender systems. 7369-7398 - Jing Zhang, Zuanyang Zeng, Kunliang Si, Xiucai Ye:
Entropy-driven differential privacy protection scheme based on social graphlet attributes. 7399-7432 - Blessy Antony, S. Revathy:
A novel model for Sybil attack detection in online social network using optimal three-stream double attention network. 7433-7482 - Jun Shi, Peiyi Zhang, Sihan Du, Wanyong Liang, Weifeng Cao, Qingbo Li, Hechao Hou:
Chipping value prediction for dicing saw based on sparrow search algorithm and neural networks. 7483-7506 - Ashkan Emami
, Ghazaleh Keshavarz Kalhori, Sheyda Mirzakhani, Mohammad Ali Akhaee:
A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach. 7507-7556 - Dan Li, Wenbo Shi, Ning Lu, Sang-Su Lee, Sokjoon Lee:
ARdetector: android ransomware detection framework. 7557-7584 - Yuanxiang Wang, Zhen Xu, Lei Yang:
Plus-profile energy harvested prediction and adaptive energy management for solar-powered wireless sensor networks. 7585-7603 - Chao Zhu, Benshun Yi, Laigan Luo:
Triple-channel graph attention network for improving aspect-level sentiment analysis. 7604-7623 - You-Shyang Chen, Jieh-Ren Chang, Yaswanth P. K. Thotakura, Ashraf Mohammad:
A hybrid four-stage detection model to pre-identify the sustainable manufacturing process of Li-ion battery pack. 7624-7661 - Yaonan Guan, Yunwen Xu, Yugeng Xi, Dewei Li:
Variational auto encoder fused with Gaussian process for unsupervised anomaly detection. 7662-7690 - Niloofar Zahedy, Behrang Barekatain
, Alfonso Ariza-Quintana:
RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm. 7691-7749 - Peyman Shobeiri, Mehdi Akbarian Rastaghi, Saeid Abrishami, Behnam Shobiri:
PCP-ACO: a hybrid deadline-constrained workflow scheduling algorithm for cloud environment. 7750-7780 - Ature Angbera
, Huah Yong Chan:
An adaptive XGBoost-based optimized sliding window for concept drift handling in non-stationary spatiotemporal data streams classifications. 7781-7811 - Safdar Rostami, Ali Broumandnia, Ahmad Khademzadeh:
An energy-efficient task scheduling method for heterogeneous cloud computing systems using capuchin search and inverted ant colony optimization algorithm. 7812-7848 - Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz
:
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model. 7849-7875 - Bakht Sher Ali, Inam Ullah, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi
, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam:
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. 7876-7905 - A. Moradikashkooli, H. Haj Seyyed Javadi, Sam Jabbehdari:
An efficient optimization algorithm for nonlinear 2D fractional optimal control problems. 7906-7930 - Yang Liu:
Depression clinical detection model based on social media: a federated deep learning approach. 7931-7954 - Shweta Mittal, Mohona Ghosh:
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication. 7955-7992 - Tajinder Singh
, Madhu Kumari, Daya Sagar Gupta:
Rumor identification and diffusion impact analysis in real-time text stream using deep learning. 7993-8037 - Jingjing Han, Guangqi Yang, Hongyang Wei, Weijun Gong, Yurong Qian:
ST-YOLOX: a lightweight and accurate object detection network based on Swin Transformer. 8038-8059 - Xiangyu Deng
, Xikai Huang, Haiyue Yu:
Frequency-domain characteristic analysis of PCNN. 8060-8093 - Ones Sidhom, Haythem Ghazouani
, Walid Barhoumi
:
Three-phases hybrid feature selection for facial expression recognition. 8094-8128 - Khadijeh Moeini Roodbali, Ebrahim Abiri, Kourosh Hassanli:
Highly efficient low-area gate-diffusion-input-based approximate full adders for image processing computing. 8129-8155 - Ayesha Kanwal, Kashif Javed, Sara Ali, Saddaf Rubab
, Muhammad Attique Khan, Areej Alasiry, Mehrez Marzougui
, Mohammad Shabaz
:
A hybrid framework for detection of autism using ConvNeXt-T and embedding clusters. 8156-8178 - Ali Khalouta:
A new decomposition transform method for solving nonlinear fractional logistic differential equation. 8179-8201 - Nilesh Kumar Verma, K. Jairam Naik:
Optimized fog community framework with advanced genetic algorithm for enhanced performance dynamics. 8202-8235 - Reza Feizabadi, Mehri Bagherian, Hamidreza Vaziri, Maziar Salahi
:
PLEACH: a new heuristic algorithm for pure parsimony haplotyping problem. 8236-8258 - Davide Ferraris, M. Carmen Fernández Gago, Rodrigo Roman, Javier López:
A survey on IoT trust model frameworks. 8259-8296 - Yiming Shu, Yiru Dai:
An effective link prediction method for industrial knowledge graphs by incorporating entity description and neighborhood structure information. 8297-8329 - Faezeh Rohani
, Kamrad Khoshhal Roudposhti
, Hamidreza Taheri, Ali Mashhadi, Andreas Mueller:
Extracting gait and balance pattern features from skeleton data to diagnose attention deficit/hyperactivity disorder in children. 8330-8356 - J. Jayachitra, K. Suganya Devi, S. V. Manisekaran, Satish Kumar Satti
:
Terahertz video-based hidden object detection using YOLOv5m and mutation-enabled salp swarm algorithm for enhanced accuracy and faster recognition. 8357-8382 - Minhaz Mahmud, Md. Soharab Hossain Sohan, Saha Reno
, M. A. Baten Sikder, Fakir Sharif Hossain:
Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology. 8383-8405 - Arti Gupta
, Vijay Kumar Chaurasiya:
Integrating Healthcare 4.0 and WBAN: efficient redundancy reduction and adaptive packet scheduling using AR-DRL. 8406-8433 - Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari:
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare. 8434-8468 - Shibao Li, Chenxu Ma, Yunwu Zhang
, Longfei Li, Chengzhi Wang, Xuerong Cui, Jianhang Liu:
Attention-based variable-size feature compression module for edge inference. 8469-8484 - Joonhyouk Jang, Minho Park, Jiman Hong:
Hybrid booting with incremental hibernation for the baseboard management controllers. 8485-8504 - Kaiyi Deng, Guanen Wang:
Online mode development of Korean art learning in the post-epidemic era based on artificial intelligence and deep learning. 8505-8528 - Wei Zhang, Ping He, Chuntian Qin, Fan Yang, Ying Liu:
A graph attention network-based model for anomaly detection in multivariate time series. 8529-8549 - Yi Yang, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
Correction to: A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 8550 - Pooya Tavallali, Peyman Tavallali, Mukesh Singhal:
Correction: K-means tree: an optimal clustering tree for unsupervised learning. 8551
Volume 80, Number 7, May 2024
- Bowen Guan, Chencheng Zhao, Xianghui Yuan, Jun Long
, Xiang Li:
Price prediction in China stock market: an integrated method based on time series clustering and image feature extraction. 8553-8591 - Hathem Khelil, Mahmoud Brahimi:
Toward an efficient web service composition based on an improved BTLBO algorithm. 8592-8613 - Xiaowen Sun, Zhenfang Zhu, Jiangtao Qi, Zhen Zhao, Hongli Pei:
Affective Commonsense Knowledge Enhanced Dependency Graph for aspect sentiment triplet extraction. 8614-8636 - Chao Shao, Hairui Zhang:
Climate change characteristics and population health impact factors using deep neural network and hyperautomation mechanism. 8637-8667 - Khushboo Gupta, Vinod Kumar:
KMS-AMI: an efficient and scalable key management scheme for secure two-way communications in advanced metering infrastructure of smart grid. 8668-8701 - Xin-Duo Liu, Weijia He, Ming-Lin Yang, Xin-Qing Sheng:
Massive parallelization of multilevel fast multipole algorithm for 3-D electromagnetic scattering problems on SW26010 many-core cluster. 8702-8718 - José de Jesús Rubio, Marco Antonio Islas
, Donaldo Garcia
, Jaime Pacheco, Alejandro Zacarias, Carlos Aguilar Ibáñez:
Optimized radial basis function network for the fatigue driving modeling. 8719-8741 - Youlin Li:
Constructing the intelligent expressway traffic monitoring system using the internet of things and inspection robot. 8742-8766 - Jie Zhang, Jingshun Bi, Jinyou Hou, Qinggang Xie:
Dynamical analysis, circuit realization, and applications of 4D hyperchaotic systems with bursty oscillations and infinite attractor coexistence. 8767-8800 - Yumeng Yang, Li Wang, Zizhen Cheng:
Density peaks algorithm based on information entropy and merging strategy for power load curve clustering. 8801-8832 - Liwei Yang, Boyu Jia, Xue Liang, Fang Wang, Xiangyuan Peng:
Visible light communication and WiFi hybrid networks based on dynamic resource allocation algorithm. 8833-8856 - Xuzhen Deng, Dengxu He, Liangdong Qu:
A novel hybrid algorithm based on arithmetic optimization algorithm and particle swarm optimization for global optimization problems. 8857-8897 - Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan:
Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker. 8898-8932 - Yue Miao, Siyuan Tang, Zhuqiang Zhang, Jukun Song, Zhi Liu, Qiang Chen, Miao Zhang:
Application of deep learning and XGBoost in predicting pathological staging of breast cancer MR images. 8933-8953 - Mersedeh Sadeghi, Alessio Carenini, Óscar Corcho, Matteo Rossi, Riccardo Santoro, Andreas Vogelsang:
Interoperability of heterogeneous Systems of Systems: from requirements to a reference architecture. 8954-8987 - Negar Abbasi, Mohammadreza Soltanaghaei, Farsad Zamani Boroujeni:
Anomaly detection in IOT edge computing using deep learning and instance-level horizontal reduction. 8988-9018 - Manzoor Ansari
, Mansaf Alam:
A novel hybrid time-series approach for IoT-cloud-enabled environment monitoring. 9019-9053 - Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Simulation-based uprighting of a capsized ship in wave-induced environments. 9054-9072 - Fan Ouyang
, Bo Shen:
A mutual mean teacher framework for cross-domain aspect-based sentiment analysis. 9073-9095 - Yu'e Lin, Houguo Li, Xingzhu Liang
, Mengfan Li, Huilin Liu:
AAR:Attention Remodulation for Weakly Supervised Semantic Segmentation. 9096-9114 - Junhao Wang, Jiarong Liang, Qingnian Li:
On the construction of quality extended virtual backbones in wireless sensor networks using cooperative communication. 9115-9139 - Juanjuan Ren, Siti Salwa Salleh:
Green urban logistics path planning design based on physical network system in the context of artificial intelligence. 9140-9161 - Ke Hou, Jianping Sun
, Mingcheng Guo, Ming Pang
, Na Wang:
TentISSA-BPNN: a novel evaluation model for cloud service providers for petroleum enterprises. 9162-9193 - Fangyin Zhu, Wei Xu, Duanyang Liu, Haiyan Shi:
TSANET: transportation mode recognition model with global and local spatiotemporal features. 9194-9219 - Archana Bomnale, Avinash More:
Node utilization index-based data routing and aggregation protocol for energy-efficient wireless sensor networks. 9220-9252 - Apurva Kumari
, Subhendu Kumar Sahoo:
An effective and robust single-image dehazing method based on gamma correction and adaptive Gaussian notch filtering. 9253-9276 - Xiaolong Wang, Ling Cai, Yunhao Xu:
Creation mechanism of new media art combining artificial intelligence and internet of things technology in a metaverse environment. 9277-9297 - Marcelo Tosini, Martín Vázquez, Lucas Leiva
:
Analysis and efficient implementation of IEEE-754 decimal floating point adders/subtractors in FPGAs for DPD and BID encoding. 9298-9326 - Lina She, Hongfang Gong, Siyu Zhang:
An interactive multi-head self-attention capsule network model for aspect sentiment classification. 9327-9352 - Yi'an Zhu
, Jie Chen, Lian Li:
A critical path task scheduling algorithm based on sequential failure factor. 9353-9383 - Mirsaeid Hosseini Shirvani:
A survey study on task scheduling schemes for workflow executions in cloud computing environment: classification and challenges. 9384-9437 - S. Deepanjali, S. K. Noor Mahammad:
A twofold bio-inspired system for mitigating SEUs in the controllers of digital system deployed on FPGA. 9438-9470 - Tao Tang, Kai Lu, Lin Peng, Yingbo Cui, Jianbin Fang, Chun Huang, Ruibo Wang, Canqun Yang, Yifei Guo:
SNCL: a supernode OpenCL implementation for hybrid computing arrays. 9471-9493 - Nadim Elsakaan
, Kamal Amroun
:
A novel privacy-aware global infrastructure for ecological footprint calculator based on the Internet of things and blockchain. 9494-9531 - Martha Dais Ferreira, Zahra Sadeghi, Stan Matwin:
Exploring autoregression patterns for automatic vessel type classification. 9532-9553 - Sheng Wang, Shiping Chen, Yumei Shi:
Utilization-prediction-aware energy optimization approach for heterogeneous GPU clusters. 9554-9578 - Habib Ullah Khan
, Waseem Afsar, Shah Nazir, Asra Noor, Mahwish Kundi, Mashael S. Maashi
, Haya Mesfer Alshahrani:
Revolutionizing software developmental processes by utilizing continuous software approaches. 9579-9608 - Noshin A. Sabuwala, Rohin D. Daruwala:
An approach to enhance the security of unmanned aerial vehicles (UAVs). 9609-9639 - Chenguang Fan, Muyao Li, Wenzhong Liu, Jingjing Cheng:
FPGA-based downhole real-time inversion of petrophysical information for NMR-LWD tools with periodic thermal management. 9640-9662 - Dayasagar Chowdary S, M. S. Sudhakar:
Linear programming-based multi-objective floorplanning optimization for system-on-chip. 9663-9686 - Mohammadreza Sheikhattar
, Alireza Mansouri
:
A Topic Mapping-based framework to analyze textual risk reports from social media big data contents. 9687-9712 - Zhiheng Zhou, Xiaomei Huang, Naixue Xiong, Guoqiong Liao, Xiaobin Deng:
A self-attention model with contrastive learning for online group recommendation in event-based social networks. 9713-9741 - Higinio Mora, María Teresa Signes Pont, Francisco Antonio Pujol López, Jerónimo Mora Pascual, Juan Manuel García Chamizo:
Advancements in number representation for high-precision computing. 9742-9761 - Sanjib Roy, Ayan Kumar Das:
Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication. 9762-9811 - JongHyuk Kim, Yong Moon, Hoon Ko:
Correlation-based advanced feature analysis for wireless sensor networks. 9812-9828 - Hyunjun Kim, Hwansoo Han:
GPU thread throttling for page-level thrashing reduction via static analysis. 9829-9847 - Shahzadi Bano, Weimei Zhi, Baozhi Qiu, Muhammad Raza, Nabila Sehito, Mian Muhammad Kamal, Ghadah Aldehim, Nuha Alruwais:
Self-paced ensemble and big data identification: a classification of substantial imbalance computational analysis. 9848-9869 - Yinsheng Chen
, Jiahao Li, Kun Sun, Ying Zhang:
A lightweight early forest fire and smoke detection method. 9870-9893 - Qingchun Bai, Mengmeng Tang, Yang Song, Jun Xiao:
Extracting entity and relationship interactions from danmaku-video comments using a neural bootstrapping framework. 9894-9916 - Weihong Fu, Haoyi Li:
An improved phase gradient autofocus algorithm for ISAR phase autofocus problem. 9917-9934 - Yi Qing, Xiangyu Liu
, Yanhui Du:
Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks. 9935-9960 - Yu-Wei Chan, Endah Kristiani, Halim Fathoni, Chien-Yi Chen, Chao-Tung Yang:
A smart edge computing infrastructure for air quality monitoring using LPWAN and MQTT technologies. 9961-9985 - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review. 9986-10043 - Iman Kadhum Abbood, Ali Kadhum Idrees:
Data reduction techniques for wireless multimedia sensor networks: a systematic literature review. 10044-10089 - Xin Zhong, Nan Wang:
Ensemble learning method based on CNN for class imbalanced data. 10090-10121 - Sapna Juneja, Ali Nauman
, Mudita Uppal, Deepali Gupta, Roobaea Alroobaea
, Bahodir Muminov
, Yuning Tao
:
Machine learning-based defect prediction model using multilayer perceptron algorithm for escalating the reliability of the software. 10122-10147 - ZhongGui Pei:
Framework design based on data-driven for evaluating the efficiency of group collaboration in scientific research teams. 10148-10171 - Xin-miao Chen, Shi Wang, Yong-jin Ye, Yong-zheng Wu, Bo Jiang:
BQA: a high-performance quantum circuits scheduling strategy based on heuristic search. 10172-10189 - Umair Khan
, Muazzam Maqsood, Saira Andleeb Gillani, Mehr Yahya Durrani, Irfan Mehmood, Sanghyun Seo
:
Correction to: A deep learning-based framework for accurate identification and crop estimation of olive trees. 10190 - Bowen Guan, Chencheng Zhao, Xianghui Yuan, Jun Long, Xiang Li:
Correction to: Price prediction in China stock market: an integrated method based on time series clustering and image feature extraction. 10191 - Retraction Note: Encryption scheme with mixed homomorphic signature based on message authentication for digital image. 10192
- Retraction Note: Fuzzy clustering-based skyline query preprocessing algorithm for large-scale flow data analysis. 10193
- Retraction Note: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. 10194-10195
Volume 80, Number 8, May 2024
- Chaozhi Cai, Xiaoyu Guo, Yingfang Xue, Jianhua Ren:
Structure damage diagnosis of bleacher based on DSKNet model. 10197-10222 - G. Jagadeesh, J. Gitanjali, J. Vellingiri, M. Pounambal, E. Sathiyamoorthy, Celestine Iwendi
:
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment. 10223-10254 - Abdulrahman Alahmadi, Haroon Ahmed Khan
, Ghufran Shafiq, Junaid Ahmed, Bakhtiar Ali, Muhammad Awais Javed, Mohammad Zubair Khan, Rayan Hamza Alsisi, Ahmed H. Alahmadi:
A privacy-preserved IoMT-based mental stress detection framework with federated learning. 10255-10274 - Ruizhong Du, Jingya Wang, Yan Gao:
Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks. 10275-10300 - Ramesh Chandra Sahoo, Tapas Kumar, Poonam Tanwar, Jyoti Pruthi, Sanjay Singh:
An efficient meta-heuristic algorithm based on water flow optimizer for data clustering. 10301-10326 - Yang Liu:
Depression detection via a Chinese social media platform: a novel causal relation-aware deep learning approach. 10327-10356 - Hongxi Liu, Mingzu Zhang, Weihua Yang:
On modified l-embedded edge-connectivity of enhanced hypercubes. 10357-10369 - Jianxing Zheng, Sen Chen, Feng Cao, Furong Peng, Mingqing Huang:
Explainable recommendation based on fusion representation of multi-type feature embedding. 10370-10393 - Rounak Saha, Anurag Satpathy, Sourav Kanti Addya:
FASE: fast deployment for dependent applications in serverless environments. 10394-10417 - Yuting Tan, Junfeng Zhou, Xinqi Rong, Ming Du, Caiyun Qi:
Efficient computation of maximum weighted independent sets on weighted dynamic graph. 10418-10443 - Jing Long, Cuiting Luo, Ruxin Chen, Jianping Yu, Kuan-Ching Li:
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection. 10444-10468 - Haifeng Yu, Lei Cai, Hong Min
, Xin Su:
Advancing medical data classification through federated learning and blockchain incentive mechanism: implications for modern software systems and applications. 10469-10484 - Ruizhong Du, Bowen Cao, Yan Gao:
Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach. 10485-10510 - Gopi Krishna Jagarlamudi
, Abbas Yazdinejad, Reza M. Parizi, Seyedamin Pouriyeh:
Exploring privacy measurement in federated learning. 10511-10551 - Lucia Pons, Salvador Petit, Julio Pons
, María Engracia Gómez, Julio Sahuquillo:
A modular approach to build a hardware testbed for cloud resource management research. 10552-10583 - Mingyang Song, Chunlin Li, Youlong Luo:
A pricing strategy for federated learning in UAV-enabled MEC. 10584-10609 - Jianjiang Li, Jiabi Liang, Wei Xue, Zhengding Hu, Lin Li, Jinliang Shi:
Toward efficient structured-grid triangular solver on sunway many-core processors. 10610-10636 - Jixian Zhang
, Hao Sun, Weidong Li
:
Lowest revenue limit-based truthful auction mechanism for cloud resource allocation. 10637-10666 - Yun Fen Yong, Chee Keong Tan, Ian K. T. Tan
, Su Wei Tan:
C-VoNNI: a precise fingerprint construction for indoor positioning systems using natural neighbor methods with clustering-based Voronoi diagrams. 10667-10694 - Wangxing Chen, Haifeng Sang
, Jinyu Wang, Zishan Zhao:
STIGCN: spatial-temporal interaction-aware graph convolution network for pedestrian trajectory prediction. 10695-10719 - Fatemeh Fathinezhad, Peyman Adibi, Bijan Shoushtarian, Jocelyn Chanussot:
Local and soft feature selection for value function approximation in batch reinforcement learning for robot navigation. 10720-10745 - Rohit Kundu, Soumitri Chattopadhyay, Sayan Nag, Mario A. Navarro
, Diego Oliva
:
Prism refraction search: a novel physics-based metaheuristic algorithm. 10746-10795 - Hamid Reza Naji, Soodeh Shadravan, Hossien Mousa Jafarabadi, Hossien Momeni:
Parallel design of SFO optimization algorithm based on FPGA. 10796-10817 - Bita Jafari, Peyman Bayat:
Performance improvement of distributed cache using middleware session. 10818-10862 - Mahjoubeh Tajgardan, Habib Izadkhah, Shahriar Lotfi:
IAFCO: an intelligent agent-based framework for combinatorial optimization. 10863-10930 - Hanyu Wang, Ying Li:
Limited environmental information path planning based on 3D point cloud reconstruction. 10931-10958 - Xiang Chen
, Yingjie Yang, Jie Sun
, Yelin Deng, Yinnan Yuan:
A novel time series forecasting model for capacity degradation path prediction of lithium-ion battery pack. 10959-10984 - Saeed Sharifian Moghimi Moghaddam
, Vahid Rashtchi, Ali Azarpeyvand:
Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation. 10985-11013 - Chanchal Ahlawat
, Rajalakshmi Krishnamurthi
:
HCDQN-ORA: a novel hybrid clustering and deep Q-network technique for dynamic user location-based optimal resource allocation in a fog environment. 11014-11065 - Mojtaba Maleknejad, Fazel Sharifi, Hojjat Sharifi:
A fast and energy-efficient hybrid 4-2 compressor for multiplication in nanotechnology. 11066-11088 - Ziwei Wang, Bin Li, Liang Deng, Jie Cao, Jiantao Wang, Fengshun Lu, Zhaolin Fan, Xiong Jiang:
Massively parallel simulations of multi-stage compressors on Sunway TaihuLight. 11089-11128 - Chuanjun Zhao, Xuzhuang Sun, Rong Feng:
Multi-strategy text data augmentation for enhanced aspect-based sentiment analysis in resource-limited scenarios. 11129-11148 - Senthil Kumar Chandrasekaran
, Vijay Anand Rajasekaran
:
Energy-efficient cluster head using modified fuzzy logic with WOA and path selection using enhanced CSO in IoT-enabled smart agriculture systems. 11149-11190 - Mohammad Sadeghzadeh, Reza Mohammadi, Mohammad Nassiri:
An intelligent real-time workloads allocation in IoT-fog networks. 11191-11213 - Farzaneh Asadzadeh, Akram Reza, Midia Reshadi, Ahmad Khademzadeh:
Thermal-aware application mapping using genetic and fuzzy logic techniques for minimizing temperature in three-dimensional network-on-chip. 11214-11240 - Shoubin Wang, Zimeng Gao, Denghui Jin, Shuming Gong, Guili Peng, Zijian Yang:
AMEA-YOLO: a lightweight remote sensing vehicle detection algorithm based on attention mechanism and efficient architecture. 11241-11260 - Aokang Pang, Huijun Liang, Chenhao Lin, Lei Yao:
A binary bat algorithm with improved crossover operators and Cauchy mutation for unit commitment problem. 11261-11292 - Baiyou Qiao, Jiaqi Wu, Rui Wang, Yuanqing Hao, Peirui Wang, Donghong Han, Gang Wu:
A parallel feature selection method based on NMI-XGBoost and distance correlation for typhoon trajectory prediction. 11293-11321 - Yuanmeng Zheng, Qingbin Luo, Qiang Li, Yi Lv:
Quantum circuit implementations of lightweight authenticated encryption ASCON. 11322-11337 - Vishal Sharma
, Rohit Beniwal
, Vinod Kumar
:
Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications. 11338-11381 - Dan Zhang, Hui Wang, Shuang Li, Baonan Wang:
Progress in the prime factorization of large numbers. 11382-11400 - Wanling Lin
, Hongbin Zhuang
, Xiao-Yan Li, Yufang Zhang:
Reliability evaluation of generalized exchanged X-cubes under the Rg-conditional restriction. 11401-11430 - Rania Mzid:
Real-time design patterns for the verification of safety-critical embedded systems in model-based approach. 11431-11473 - Tianlei Zhu
, Xin Yang, Hongwei Wang, Jianjun Wu:
A performance assessment method for urban rail transit last train network based on percolation theory. 11474-11490 - Mahfooz Alam
, Mohammad Shahid
, Suhel Mustajab
:
Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions. 11491-11555 - Njoud O. Almaaitah
, David E. Singh, Taylan Özden, Jesús Carretero:
Performance-driven scheduling for malleable workloads. 11556-11584 - Shiwei Gao, Jingyu Wang
, Yufeng Zeng, Xiaohui Dong:
TGIE4REC: enhancing session-based recommendation with transition and global information. 11585-11613 - Minglong Chen, Jiuzhen Liang, Hao Liu:
Multi-stream P&U adaptive graph convolutional networks for skeleton-based action recognition. 11614-11639 - Bagyammal Thirumurthy
, Latha Parameswaran, Karthikeyan Vaiapury:
A deep learning and transfer learning model for intra-change detection in images. 11640-11660 - Conghui Wang, Shiwu Yang, Chang Liu:
A novel health state prediction approach based on artificial intelligence combination strategy for compensation capacitors in track circuit. 11661-11681 - Jorge Vázquez-Pérez, César Piñeiro, Juan Carlos Pichel, Tomás F. Pena, Andrés Gómez:
QPU integration in OpenCL for heterogeneous programming. 11682-11703 - Yushen Zhang, Mingzu Zhang, Weihua Yang:
Reliability analysis of the augmented cubes in terms of the h-extra r-component edge-connectivity. 11704-11718 - Miho Chiyonobu
, Takahiro Miyamae, Masami Takata, Jun Harayama, Kinji Kimura, Yoshimasa Nakamura:
Singular value decomposition for complex matrices using two-sided Jacobi method. 11719-11740 - Loris Belcastro, Salvatore Giampà, Fabrizio Marozzo, Domenico Talia, Paolo Trunfio, Rosa M. Badia, Jorge Ejarque, Nihad Mammadli:
Boosting HPC data analysis performance with the ParSoDA-Py library. 11741-11761 - Chao Ma, Haiying Gao, Bin Hu:
A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme. 11762-11797 - Gianmarco Accordi
, Davide Gadioli, Emanuele Vitali, Luigi Crisci
, Biagio Cosenza
, Andrea Beccari, Gianluca Palermo:
Out of kernel tuning and optimizations for portable large-scale docking experiments on GPUs. 11798-11815 - Asma Douadi, Nadjet Kamel, Lakhdar Sais:
Label propagation algorithm for community discovery based on centrality and common neighbours. 11816-11842 - Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Correction to: Simulation-based uprighting of a capsized ship in wave-induced environments. 11843 - Retraction Note: An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation. 11844
Volume 80, Number 9, June 2024
- Yi Wan, Lingjie Yi, Bo Jiang, Junfan Chen, Yi Jiang, Xianzhong Xie:
AENet: attention enhancement network for industrial defect detection in complex and sensitive scenarios. 11845-11868 - Chao-Hsien Hsieh, Xinyu Yao, Zhen Wang, Hongmei Wang:
KMSSA optimization algorithm for bandwidth allocation in internet of vehicles based on edge computing. 11869-11892 - Qianwei Lv, He Luo, Guoqiang Wang, Jianwei Tai, Shengzhi Zhang:
PEDI-GAN: power equipment data imputation based on generative adversarial networks with auxiliary encoder. 11893-11922 - Shiladitya Bhattacharjee, Himanshi Sharma, Tanupriya Choudhury
, Ahmed M. Abdelmoniem:
Leveraging chaos for enhancing encryption and compression in large cloud data transfers. 11923-11957 - Limin Xia, Xin Wen:
Multi-stream network with key frame sampling for human action recognition. 11958-11988 - Takafumi Ueki, Masahito Ohue:
Antibody complementarity-determining region design using AlphaFold2 and DDG predictor. 11989-12002 - Jianchang Zheng, Hongjuan Wang:
FSBPR: a novel approach to improving BPR for recommendation with the fusion of similarity. 12003-12020 - Reza Sajedi
, Mohammadreza Razzazi
:
Data stream classification in dynamic feature space using feature mapping. 12043-12061 - Abhishek Narwaria
, Keshav Soni, Arka Prokash Mazumdar:
A position and energy aware multi-objective controller placement and re-placement scheme in distributed SDWSN. 12062-12090 - Masami Takata, Natsu Kidoguchi, Miho Chiyonobu
:
Stock recommendation methods for stability. 12091-12101 - Seyed Jalalaldin Gharibi, Karamollah Bagherifard, Hamid Parvin, Samad Nejatian, S. Hadi Yaghoubyan:
Ontology-based recommender system: a deep learning approach. 12102-12122 - Kai Zhou, Chuanhe Tan, Yanqiang Wu, Bo Yang, Xiaojun Long:
Research on low-carbon flexible job shop scheduling problem based on improved Grey Wolf Algorithm. 12123-12153 - Shiori Ishikawa, Miho Chiyonobu
, Sayaka Iida, Masami Takata:
Improvement of recognition rate using data augmentation with blurred images. 12154-12165 - Fang Liang, Jingde Zhang:
Neural network-based cross-channel chroma prediction for versatile video coding. 12166-12185 - Rui Zhong
, Enzhi Zhang, Masaharu Munetomo:
Evolutionary multi-mode slime mold optimization: a hyper-heuristic algorithm inspired by slime mold foraging behaviors. 12186-12217 - Nidhi Joraviya
, Bhavesh N. Gohil, Udai Pratap Rao:
DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment. 12218-12246 - Feixiang Yao, Zhonghao Zhang, Zeyu Ji
, Bin Liu, Haoyuan Gao:
LBB: load-balanced batching for efficient distributed learning on heterogeneous GPU cluster. 12247-12272 - Mostafa Taghizade Firouzjaee, Kamal Jamshidi, Neda Moghim
:
A novel user preference-aware content caching algorithm in mobile edge networks. 12273-12296 - Jin Matsuzaki, Kazutoshi Sakakibara, Masaki Nakamura, Shinya Watanabe:
Large neighborhood local search method with MIP techniques for large-scale machining scheduling with many constraints. 12297-12312 - Jiazhen Huo, Zhikai Hong, Mingzhou Chen, Yongrui Duan:
MIFNet: multimodal interactive fusion network for medication recommendation. 12313-12345 - Yuansheng Gao
, Jiahui Zhang, Yulin Wang, Jinpeng Wang, Lang Qin:
Love Evolution Algorithm: a stimulus-value-role theory-inspired evolutionary algorithm for global optimization. 12346-12407 - Aymar Cublier Martínez, Jesús Carretero, David E. Singh:
Detailed parallel social modeling for the analysis of COVID-19 spread. 12408-12429 - Anwar Mira
, Olaf Hellwich:
Deep learning models beyond temporal frame-wise features for hand gesture video recognition. 12430-12462 - Carlos Juiz, Belén Bermejo:
On the scalability of the speedup considering the overhead of consolidating virtual machines in servers for data centers. 12463-12511 - Bo Zhu, Shumin Zhang, Jinyu Zou, Chengfu Ye:
The g-faulty-block connectivity of folded hypercubes. 12512-12526 - Francisco Orts
, Gloria Ortega, Elías F. Combarro, Ignacio F. Rúa, Ester M. Garzón:
Quantum circuits for computing Hamming distance requiring fewer T gates. 12527-12542 - Javier Lopez-Fandino
, Dora B. Heras, Francisco Argüello:
Using heterogeneous computing and edge computing to accelerate anomaly detection in remotely sensed multispectral images. 12543-12563 - Blas Gómez
, Estefanía Coronado, José Villalón, Antonio Garrido:
Energy-focused simulation of edge computing architectures in 5G networks. 12564-12584 - Mohamad Abdallah:
Generalized 4-connectivity of alternating group networks. 12585-12598 - Manuel Costanzo, Enzo Rucci, Carlos García Sánchez, Marcelo R. Naiouf, Manuel Prieto-Matías:
Assessing opportunities of SYCL for biological sequence alignment on GPU-based systems. 12599-12622 - Cristián Ramírez, Adrián Castelló, Héctor Martínez, Enrique S. Quintana-Ortí:
Parallel GEMM-based convolution for deep learning on multicore RISC-V processors. 12623-12643 - Enzhi Zhang, Bochen Dong, Mohamed Wahib, Rui Zhong
, Masaharu Munetomo:
Meta generative image and text data augmentation optimization. 12644-12662 - Fazel Sharifi, Hossein Momeni, Amirhossein Hosseini:
Ternary bistable ring PUF for high-secure applications. 12663-12685 - Nicolás Hernández
, Francisco Almeida, Vicente Blanco Pérez
:
Optimizing convolutional neural networks for IoT devices: performance and energy efficiency of quantization techniques. 12686-12705 - Mazin Kadhum Hameed, Ali Kadhum Idrees
:
Energy-aware scheduling protocol-based hybrid metaheuristic technique to optimize the lifespan in WSNs. 12706-12726 - Vicente González Ruiz, Juan José Moreno, José-Jesús Fernández:
Acceleration of 3D feature-enhancing noise filtering in hybrid CPU/GPU systems. 12727-12742 - Changqing Gong, Weiqi Guan, Hongsheng Zhu, Abdullah Gani, Han Qi:
Network intrusion detection based on variational quantum convolution neural network. 12743-12770 - Daniel Suárez, Francisco Almeida, Vicente Blanco
:
Comprehensive analysis of energy efficiency and performance of ARM and RISC-V SoCs. 12771-12789 - Xiangyu Li, Fengping Wang, Wei Wang, Yanjiang Han, Jianyang Zhang
:
DM-YOLOX aerial object detection method with intensive attention mechanism. 12790-12812 - Atiyeh Abdollahpour, Alireza Rouhi
, Einollah Pira:
An improved gazelle optimization algorithm using dynamic opposition-based learning and chaotic mapping combination for solving optimization problems. 12813-12843 - German Leon
, José M. Badía, Jose A. Belloch
, Almudena Lindoso, Luis Entrena:
Comparative analysis of soft-error sensitivity in LU decomposition algorithms on diverse GPUs. 12844-12862 - Xingye Li
, Jin Liu
, Zhengyu Tang, Bing Han, Zhongdai Wu:
MEDMCN: a novel multi-modal EfficientDet with multi-scale CapsNet for object detection. 12863-12890 - Sergio Afonso, Óscar Gómez-Cárdenes, Paula Expósito, Vicente Blanco
, Francisco Almeida:
Parallel programming in mobile devices with FancyJCL. 12891-12909 - Felipe Romero, Pilar M. Ortigosa, Gerardo Bandera, Luis F. Romero:
SkewEngine: enhancing performance of intensive calculations on regular meshes. 12910-12928 - Suvita Rani Sharma
, Birmohan Singh, Manpreet Kaur:
Improvement of medical data security using SABES optimization algorithm. 12929-12965 - Adriano Marques Garcia
, Dalvan Griebler
, Claudio Schepke, José Daniel García, Javier Fernández Muñoz, Luiz Gustavo Fernandes:
Performance and programmability of GrPPI for parallel stream processing on multi-cores. 12966-13000 - Huijing Yang, Juan Fang, Xing Su, Zhi Cai, Yuening Wang:
RL-CoPref: a reinforcement learning-based coordinated prefetching controller for multiple prefetchers. 13001-13026 - Yu Morikawa, Kilho Shin, Masataka Kubouchi, Hiroaki Ohshima:
Prediction of specific surface area of metal-organic frameworks by graph kernels. 13027-13047 - Alberto Ottimo, Gabriele Mencagli, Marco Danelutto:
Boosting general-purpose stream processing with reconfigurable hardware. 13048-13078 - Fang Liu, Kejie Hu, Jing He, Wei Hu, Heyuan Li, Min Peng, Yanxiang He:
A fault-tolerant scheduling algorithm that minimizes the number of replicas in heterogeneous service-oriented cloud computing systems. 13079-13095 - Junnan Li, Qing Zhao, Shuang Liu:
A heuristic hybrid instance reduction approach based on adaptive relative distance and k-means clustering. 13096-13123 - Tongdian Wang, Qingyang Xu:
Research on safety verification methods of static data of train control systems based on deep association rules. 13124-13140 - Sanjeev Kumar
, Manjeet Singh:
Auto-localization algorithm for mobile sensor nodes in wireless sensor networks. 13141-13175 - Jose A. Belloch
, Raul Coronado, Óscar Valls, Rocío del Amor, German Leon
, Valery Naranjo, Manuel F. Dolz, Adrian Amor-Martin, Gema Piñero
:
Urban sound classification using neural networks on embedded FPGAs. 13176-13186 - Sensen Wang, Wenjun Liu, Shuaibin Yang, Hui Huang:
An optimized AdaBoost algorithm with atherosclerosis diagnostic applications: adaptive weight-adjustable boosting. 13187-13216 - Ruo-Wei Hung, Ling-Ju Hung:
Paired restraint domination in extended supergrid graphs. 13217-13249 - Mengfan Zhao, Yutao Zhang, Guozheng Rao:
Fake news detection based on dual-channel graph convolutional attention network. 13250-13271 - Zouhair Mbarki, Amine Ben Slama, Yessine Amri
, Hedi Trabelsi, Hassene Seddik:
BTS-ADCNN: brain tumor segmentation based on rapid anisotropic diffusion function combined with convolutional neural network using MR images. 13272-13294 - Silvia R. Alcaraz
, Ruben Laso
, Oscar G. Lorenzo, David López Vilariño, Tomás F. Pena, Francisco F. Rivera:
Assessing Intel OneAPI capabilities and cloud-performance for heterogeneous computing. 13295-13316 - A Anilet Bala, P. Aruna Priya
, Vivek Maik:
Hybrid technique for fundus image enhancement using modified morphological filter and denoising net. 13317-13340 - Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee, Ahmad Keshavarz:
A hybrid semantic recommender system based on an improved clustering. 13341-13385 - Carlos Reaño
, Ricardo Olanda, Elvira Baydal, Mariano Pérez, Juan M. Orduña:
Accelerating the detection of DNA differentially methylated regions using multiple GPUs. 13386-13410 - Philipp Diel, Antonio Jesús Muñoz-Montoro, Julio J. Carabias-Orti, José Ranilla:
Efficient FPGA implementation for sound source separation using direction-informed multichannel non-negative matrix factorization. 13411-13433 - Nadim Elsakaan, Kamal Amroun
:
A novel multi-level hybrid load balancing and tasks scheduling algorithm for cloud computing environment. 13434-13474 - Syeda Afiya, M. Rajesh:
Embedding (K9-C9)n into interconnection networks. 13475-13491 - Saeed Sharifian Moghimi Moghaddam, Vahid Rashtchi, Ali Azarpeyvand:
Publisher Correction: Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation. 13492 - Shiladitya Bhattacharjee, Himanshi Sharma, Tanupriya Choudhury
, Ahmed M. Abdelmoniem:
Publisher Correction to: Leveraging chaos for enhancing encryption and compression in large cloud data transfers. 13493-13494 - Retraction Note: Gauss interference ant colony algorithm-based optimization of UAV mission planning. 13495
- Retraction Note: Unsupervised video multi-target tracking based on fast resampling particle filter. 13496
- Retraction Note: Simulation of cross-modal image-text retrieval algorithm under convolutional neural network structure and hash method. 13497
Volume 80, Number 10, July 2024
- Yang Song, Haiying Gao, Shiyu Wang, Chao Ma, Keshuo Sun:
Token open secure and practical NTRU-based updatable encryption. 13499-13532 - Herbert Owen, Oriol Lehmkuhl
, Pasqua D'Ambra
, Fabio Durastante
, Salvatore Filippone:
Alya toward exascale: algorithmic scalability using PSCToolkit. 13533-13556 - Sidra Abbas, Shtwai Alsubai, Stephen Ojo, Gabriel Avelino R. Sampedro
, Ahmad S. Almadhor, Abdullah Al Hejaili, Imen Bouazzi:
An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment. 13557-13575 - Nafe Muhtasim Hye
, Umma Hany, Tahmina Islam, Nusrat Nawreen, Abdullah Al Mamun:
Artificial intelligence for detection of lung cancer using transfer learning and morphological features. 13576-13606 - Junfeng Li, Jianyu Wang:
An improved resampling particle filter algorithm based on digital twin. 13607-13631 - Yiming Ouyang, Cheng Cao, Dongyu Xu, Wu Zhou, Zhengfeng Huang, Huaguo Liang:
DBU-PG: energy-efficient noc design using dual-buffering power gating. 13632-13656 - Ruohan Wu, Xianyu Zhu, Junshi Chen, Sha Liu, Tianyu Zheng, Xin Liu, Hong An:
SWattention: designing fast and memory-efficient attention for a new Sunway Supercomputer. 13657-13680 - Zhixiang Zhao, Guoyin Zhang, Yanxia Wu, Ruize Hong
, Yiqing Yang, Yan Fu:
Block-wise dynamic mixed-precision for sparse matrix-vector multiplication on GPUs. 13681-13713 - Millán Álvarez Martínez
, Basilio B. Fraguela
, José Carlos Cabaleiro
, Francisco F. Rivera
:
A new thread-level speculative automatic parallelization model and library based on duplicate code execution. 13714-13737 - Esteban Stafford, José Luis Bosque:
Enhancing heterogeneous cluster efficiency through node-centric scheduling. 13738-13753 - Kaizhong Zuo, Xixi Chu, Peng Hu, Tianjiao Ni, Tingting Jin, Fulong Chen, Zhangyi Shen:
Security enhanced privacy-preserving data aggregation scheme for intelligent transportation system. 13754-13781 - Kimia Shirini, Hadi S. Aghdasi, Saeed Saeedvand:
Modified imperialist competitive algorithm for aircraft landing scheduling problem. 13782-13812 - Muhammad Rizwan, Enoch Jung, Jongsun Choi, Jaeyoung Choi:
Revisiting the performance optimization of QR factorization on Intel KNL and SKL multiprocessors. 13813-13836 - Ehsan Goudarzi, Hamid Esmaeeli, Kia Parsa, Shervin Asadzadeh:
Energy-efficient resource-constrained multi-project scheduling problem with generalized precedence relations and multi-skilled resources. 13837-13872 - Guillermo Alaejos, Héctor Martínez, Adrián Castelló, Manuel F. Dolz, Francisco D. Igual, Pedro Alonso-Jordá, Enrique S. Quintana-Ortí:
Automatic generation of ARM NEON micro-kernels for matrix multiplication. 13873-13899 - Laura M. Donaire
, Gloria Ortega, Ester M. Garzón, Francisco Orts
:
Lowering the cost of quantum comparator circuits. 13900-13917 - Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh
:
Intrusion detection system: a deep neural network-based concatenated approach. 13918-13948 - Qiang Han, Lu Wang, Haoyu Zhang, Leyi Shi, Danxin Wang:
Ethchecker: a context-guided fuzzing for smart contracts. 13949-13975 - Manish Kumar Maurya, Vivek Kumar Singh
, Sandeep Kumar Shaw, Manish Kumar:
Fft-asvr: an adaptive approach for accurate prediction of IoT data streams. 13976-13999 - Yumiao Zhao, Huanle Rao, Kelei Le, Wei Wang, Youqing Xu, Gangyong Jia:
RCFS: rate and cost fair CPU scheduling strategy in edge nodes. 14000-14028 - Federico Galetto
, Hiram H. López, Mehdi Rahmati, Janche Sang, Chansu Yu:
Experience in teaching quantum computing with hands-on programming labs. 14029-14056 - Xiao Chen, Chenye Fan, Jingjing Shi, Haiyan Wang, Haiyang Yao:
Underwater target detection and embedded deployment based on lightweight YOLO_GN. 14057-14084 - Pu Han
, Haobo Hua, Hai Wang, Fei Xue, Changmao Wu, Jiandong Shang:
A universal parallel simulation framework for energy pipeline networks on high-performance computers. 14085-14115 - Masahito Ohue, Kotoyu Sasayama, Masami Takata:
Mathematical modeling and problem solving: from fundamentals to applications. 14116-14119 - Jiangsheng Wu, Xiaoming Lai, Xingliang Chai, Kai Yang, Tianming Wang, Haibo Liu, Yongqing Wang:
Feature-based point cloud simplification method: an effective solution for balancing accuracy and efficiency. 14120-14142 - Dinh-Dong Dau
, Soojin Lee
, Hanseok Kim
:
A comprehensive comparison study of ML models for multistage APT detection: focus on data preprocessing and resampling. 14143-14179 - Nan Xiang, Mingwei You, Qilin Wang, Bingdi Tian:
Hypergraph network embedding for community detection. 14180-14202 - Youssef Faqir-Rhazoui
, Carlos García:
SYCL in the edge: performance and energy evaluation for heterogeneous acceleration. 14203-14223 - Huimei Guo
, Rong-Xia Hao, Jou-Ming Chang, Young Soo Kwon:
Hyper star structure connectivity of hierarchical folded cubic networks. 14224-14241 - José Irineu Ferreira Júnior, Alvaro Sobrinho, Leandro Dias da Silva, Paulo Cunha, Thiago D. Cordeiro, Angelo Perkusich, Antonio Marcus Nogueira de Lima:
A coloured Petri nets-based system for validation of biomedical signal acquisition devices. 14242-14271 - Maryam Imani, Amin Zehtabian:
Attention based morphological guided deep learning network for neuron segmentation in electron microscopy. 14272-14294 - Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy:
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection. 14295-14329 - Alberto González-Ruiz, Antonio Jesús Díaz-Honrubia
, Santiago Tapia-Fernández
, David García-Lucas
, Gabriel Cebrián-Márquez
, Luis Mengual Galan
:
Adaptive quadtree splitting parallelization (AQSP) algorithm for the VVC standard. 14330-14345 - Md Asif Thanedar
, Sanjaya Kumar Panda:
Energy and priority-aware scheduling algorithm for handling delay-sensitive tasks in fog-enabled vehicular networks. 14346-14368 - Giulio Malenza
, Valentina Cesare, Marco Aldinucci, Ugo Becciani, Alberto Vecchiato:
Toward HPC application portability via C++ PSTL: the Gaia AVU-GSR code assessment. 14369-14390 - Soukaina Hamou
, Mustapha Moufassih, Ousama Tarahi, Said Agounad, Hafida Idrissi Azami:
Hybrid approach: combining eCCA and SSCOR for enhancing SSVEP decoding. 14391-14416 - Kairi Furui
, Masahito Ohue:
Fastlomap: faster lead optimization mapper algorithm for large-scale relative free energy perturbation. 14417-14432 - Tongfeng Li, Ruisheng Zhang, Yabing Yao, Yunwu Liu, Jun Ma, Jianxin Tang:
Graph regularized autoencoding-inspired non-negative matrix factorization for link prediction in complex networks using clustering information and biased random walk. 14433-14469 - Xiaohong Li, Ruihong Li, Qixuan Peng, Jin Yao:
Graph neural news recommendation based on multi-view representation learning. 14470-14488 - Soham Biswas, Md. Sarfaraj Alam Ansari:
Securing IoT networks in cloud computing environments: a real-time IDS. 14489-14519 - Sunakshi Mehra
, Virender Ranga
, Ritu Agarwal
:
A deep learning approach to dysarthric utterance classification with BiLSTM-GRU, speech cue filtering, and log mel spectrograms. 14520-14547 - Ning Kang
, Zhan Wang, Fan Yang, Xiaoxiao Ma, Zhenlong Ma, Guojun Yuan, Guangming Tan:
Towards connection-scalable RNIC architecture. 14548-14572 - Alejandro Fernández-Fraga
, Jorge González-Domínguez, María J. Martín
:
PARamrfinder: detecting allele-specific DNA methylation on multicore clusters. 14573-14599 - Yanhua Liu, Wentao Deng, Zhihuang Liu, Fanhao Zeng:
Semi-supervised attack detection in industrial control systems with deviation networks and feature selection. 14600-14621 - Han Qi, Xinyu Liu, Abdullah Gani, Changqing Gong:
Quantum particle Swarm optimized extreme learning machine for intrusion detection. 14622-14644 - Thomas Jakobs, Oliver Klöckner, Gudula Rünger:
Parallelization with load balancing of the weather scheme WSM7 for heterogeneous CPU-GPU platforms. 14645-14665 - Pablo Antonio Martínez
, Gregorio Bernabé
, José Manuel García
:
POAS: a framework for exploiting accelerator level parallelism in heterogeneous environments. 14666-14693 - Jie Zhang, Enze Liu, Yan Guo:
A new three-dimensional memristor chaotic circuit design and its application in image encryption. 14694-14724 - Qi-An Huang, Yain-Whar Si:
Blockchain-based autonomous decentralized trust management for social network. 14725-14751 - Ying Duan, Chunmao Jiang:
Binary task offloading strategy for cloud robots using improved game theory in cloud-edge collaboration. 14752-14772 - Ako Muhammad Abdullah:
An efficient energy-aware and reliable routing protocol to enhance the performance of wireless body area networks. 14773-14798 - Wenbing Yang, Mingqiang Zhao, Jingbo Li, Xingjun Zhang:
Energy-efficient DAG scheduling with DVFS for cloud data centers. 14799-14823 - Georgios Zioviris, Kostas Kolomvatsos, Georgios I. Stamoulis:
An intelligent sequential fraud detection model based on deep learning. 14824-14847 - Gowri Shankar Manivannan
, C. Ganesh Babu
, Harikumar Rajaguru:
Amelioration of multitudinous classifiers performance with hyper-parameters tuning in elephant search optimization for cardiac arrhythmias detection. 14848-14924 - Yue Lin, Erhu Liu, Xingzhu Liang
, Miaomiao Chen, Xinyun Yan:
Global-local Bi-alignment for purer unsupervised domain adaptation. 14925-14952 - Zhiyuan Shen, Qinshuai Zhao, Yiyang Liu:
MAML-SGD: a reliable airline rescheduling algorithm for small-sample learning based on MAML and SGD. 14953-14977 - Majid Salimi Beni
, Sascha Hunold, Biagio Cosenza
:
Analysis and prediction of performance variability in large-scale computing systems. 14978-15005 - Md Arshad Jamal, Sriram Kailasam, Bhumanyu Goyal, Varun Singh:
DiGTreeS: a distributed resilient framework for generalized tree search. 15006-15037 - Jianguo Yu, Lin Ge, Minghui Wu:
Proposal Distribution optimization for Endorsement Strategy in Hyperledger Fabric. 15038-15065 - Alemeh Matani
, Amir Sahafi, Ali Broumandnia:
Improving query processing in blockchain systems by using a multi-level sharding mechanism. 15066-15096 - Yuansheng Gao, Jiahui Zhang, Yulin Wang, Jinpeng Wang, Lang Qin:
Correction to: Love evolution algorithm: a stimulus-value-role theory-inspired evolutionary algorithm for global optimization. 15097-15099 - Retraction Note: FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. 15100
- Retraction Note: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction. 15101
- Retraction Note: Design and implementation of CfoTS networks for industrial fault detection and correction mechanism. 15102
- Retraction Note: Multilingual hate speech detection sentimental analysis on social media platforms using optimal feature extraction and hybrid diagonal gated recurrent neural network. 15103
Volume 80, Number 11, July 2024
- Zaid A. Hussain, Fawaz Alazemi, Bader F. AlBdaiwi:
Completely independent spanning trees in Eisenstein-Jacobi networks. 15105-15121 - Yiqing Yang, Guoyin Zhang, Yanxia Wu, Zhixiang Zhao, Yan Fu:
Split-bucket partition (SBP): a novel execution model for top-K and selection algorithms on GPUs. 15122-15160 - Yichao Gao, Dake Zhou, Yaqi Shen, Xin Yang:
Dual experience replay-based TD3 for single intersection signal control. 15161-15182 - Xiao-dan Sun, Xiao-Fang Sun:
An edge detection algorithm based upon the adaptive multi-directional anisotropic gaussian filter and its applications. 15183-15214 - Bing Leng, Hao Jiang, Bidou Wang, Jinxian Wang
, Gangyin Luo:
A lightweight deep learning model for acute myeloid leukemia-related blast cell identification. 15215-15244 - Keyu Zhong, Fen Xiao, Xieping Gao:
Wind farm layout optimization using adaptive equilibrium optimizer. 15245-15291 - Saurabh Chandra, Rajeev Arya, Maheshwari Prasad Singh:
Mellin transform-based D2D power optimization in 5G-enabled social IoT network. 15292-15329 - Junjie Cao
, Zhiyong Yu, Jian Yang:
A migration strategy based on cluster collaboration predictions for mobile edge computing-enabled smart rail system. 15330-15361 - Hongtai Yao, Zewen Li, Yong Jin, Zhentao Hu, Qinglan Peng:
Secure symbol-level precoding for reconfigurable intelligent surface-aided cell-free networks. 15362-15385 - Kamal Singh, Nitin Singha:
Credit-based energy trading system using blockchain and machine learning. 15386-15407 - Shangdong Liu, Longfei Zhou, Sisi Shao, Jun Zuo, Yimu Ji:
CBGA: A deep learning method for power grid communication networks service activity prediction. 15408-15428 - Sibasish Dhibar, Madhu Jain:
Particle swarm optimization and FM/FM/1/WV retrial queues with catastrophes: application to cloud storage. 15429-15463 - Xiaojun Zhu, Xiaowei Zhao, Chao Dong:
Optimal UAV deployment with star topology in area coverage problems. 15464-15484 - Cemil Közkurt, Aykut Diker, Abdullah Elen, Serhat Kiliçarslan
, Emrah Dönmez, Fahrettin Burak Demir:
Trish: an efficient activation function for CNN models and analysis of its effectiveness with optimizers in diagnosing glaucoma. 15485-15516 - Bengong Yu, Chunyang Gao, Shuwen Zhang:
Training with One2MultiSeq: CopyBART for social media keyphrase generation. 15517-15544 - Puranam Revanth Kumar, Rajesh Kumar Jha, P. Akhendra Kumar:
Brain hyperintensities: automatic segmentation of white matter hyperintensities in clinical brain MRI images using improved deep neural network. 15545-15581 - Alperen Cakin, Selma Dilek, Suleyman Tosun:
Energy-aware application mapping methods for mesh-based hybrid wireless network-on-chips. 15582-15612 - Shiyu Liu, Qicheng Liu:
A sentiment analysis model based on dynamic pre-training and stacked involutions. 15613-15635 - Gautam Amiya, Pallikonda Rajasekaran Murugan, Kottaimalai Ramaraj, Vishnuvarthanan Govindaraj, Muneeswaran Vasudevan, M. Thirumurugan, S. Sheik Abdullah, Arunprasath Thiyagarajan:
LMGU-NET: methodological intervention for prediction of bone health for clinical recommendations. 15636-15663 - Abdulrahman Ahmed Jasim, Layth Rafea Hazim, Hayder Mohammedqasim
, Roa'a Mohammedqasem
, Oguz Ata, Omar Hussein Salman:
e-Diagnostic system for diabetes disease prediction on an IoMT environment-based hyper AdaBoost machine learning model. 15664-15689 - Amira Jouirou, Ines Souissi, Walid Barhoumi
:
Two-level content-based mammogram retrieval using the ACR BI-RADS assessment code and learning-driven distance selection. 15690-15724 - Apurba Debnath, Anirban Tarafdar
, A. Poojitha Reddy, Paritosh Bhattacharya:
ROVM integrated advanced machine learning-based malaria prediction strategy in Tripura. 15725-15762 - Rong Fan, Zhenhai Wang, Yunlong Guo, Yuhao Xu, Zhiru Wang, Weimin Li:
Robust enhanced collaborative filtering without explicit noise filtering. 15763-15782 - Savari Prabhu
, V. Manimozhi, Akbar Davoodi, Juan Luis García Guirao:
Fault-tolerant basis of generalized fat trees and perfect binary tree derived architectures. 15783-15798 - Alessia Antelmi
, Massimo Torquati, Giacomo Corridori, Daniele Gregori, Francesco Polzella, Gianmarco Spinatelli, Marco Aldinucci:
Analyzing FOSS license usage in publicly available software at scale via the SWH-analytics framework. 15799-15833 - Md Saquib Jawed
, Mohammad Sajid:
CryptoHHO: a bio-inspired cryptosystem for data security in Fog-Cloud architecture. 15834-15867 - Jing Zhang, Zhanwei Han:
Optimization of uncertain dependent task mapping on heterogeneous computing platforms. 15868-15893 - Fanny Spagnolo, Pasquale Corsonello, Fabio Frustaci, Stefania Perri:
Approximate bilateral filters for real-time and low-energy imaging applications on FPGAs. 15894-15916 - Samira Shahinifar, Mohammad Taghi Kheirabadi, Ali Broumandnia, Kambiz Rahbar:
Fog-Marketing: auction-based multi-tier decentralized markets for fog resource provisioning. 15917-15939 - Rongbiao Ji, Jianke Yang, Yehui Wu, Yadong Li, Rujia Li, Jiaojiao Chen, Jianping Yang:
Construction and analysis of students' physical health portrait based on principal component analysis improved Canopy-K-means algorithm. 15940-15973 - Udit Mittal
, Uma Nangia, Narender Kumar Jain, Saket Gupta:
Optimal power flow solution using a learning-based sine-cosine algorithm. 15974-16012 - JiaCheng Lin, Huanle Rao, SongSong Liang, Yumiao Zhao, Qing Ren, Gangyong Jia:
Aphto: a task offloading strategy for autonomous driving under mobile edge. 16013-16045 - Zhaoqi Wang, Lei Wang, Qiaoyong Jiang, Xinhui Duan, Zhennan Wang, Liangliang Wang:
Multiple search operators selection by adaptive probability allocation for fast convergent multitask optimization. 16046-16092 - Zhouhao Zhang, Hailin Jiang, Hongli Zhao, Yang Li:
Federated learning-based edge computing for automatic train operation in communication-based train control systems. 16093-16111 - R. Gregor Weiß
, Sergey Lesnik
, Flavio Cesar Cunha Galeazzo
, Andreas Ruopp
, Henrik Rusche:
Coherent mesh representation for parallel I/O of unstructured polyhedral meshes. 16112-16132 - Ashish Kumari, Shailender Kumar, Ram Shringar Raw:
Advancing VANET stability: enhanced cluster head selection with iTTM and weighted CRITIC. 16133-16172 - Baydaa Sulaiman Bahnam
, Suhair Abd Dawwod, Mohammed Chachan Younis
:
Optimizing software reliability growth models through simulated annealing algorithm: parameters estimation and performance analysis. 16173-16201 - Abubakr S. Issa, Yossra H. Ali, Tarik A. Rashid
:
BCDDO: Binary Child Drawing Development Optimization. 16202-16221 - Ayushi Jain, Mehak Garg, Anvita Gupta, Shivangi Batra, Bhawna Narwal:
IoMT-BADT: A blockchain-envisioned secure architecture with a lightweight authentication scheme for the Digital Twin environment in the Internet of Medical Things. 16222-16253 - Jiankai Xue, Bo Shen, Anqi Pan:
A multi-strategy-guided sparrow search algorithm to solve numerical optimization and predict the remaining useful life of li-ion batteries. 16254-16300 - Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini:
Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers. 16301-16333 - Umer Farooq, Shahid Naseem, Tariq Mahmood, Jianqiang Li, Amjad Rehman, Tanzila Saba, Luqman Mustafa
:
Transforming educational insights: strategic integration of federated learning for enhanced prediction of student learning outcomes. 16334-16367 - Marco La Salvia, Emanuele Torti, Elisa Marenzi
, Giovanni Danese, Francesco Leporati:
Edge and cloud computing approaches in the early diagnosis of skin cancer with attention-based vision transformer through hyperspectral imaging. 16368-16392 - Raneem Qaddoura, Hossam Faris:
Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection. 16393-16427 - Po-Jen Chuang, Pang-Yu Huang:
Enhancing network intrusion detection by lifelong active online learning. 16428-16451 - Ni An, Mengjie Lv, Weibei Fan, Lei Han, Fu Xiao:
Extra connectivity of the data center network - RRect. 16452-16473 - Hongye Li, Fuyong Xu, Zhiyu Zhang, Peiyu Liu, Wenyin Zhang:
Aspect-level sentiment classification with aspect-opinion sentence pattern connection graph convolutional networks. 16474-16496 - Beiping Zhou, Keqi Zhao, Yongfeng Zhao, Yierfan Abulihaiti, Chen Yang, Linghan Fu:
Study on spatial and temporal correlation characteristics for RIS-aided macrocell high-speed railway propagation systems. 16497-16518 - Jing Shang, Yifei Zhang, Jibin Wang, Zhihui Wu, Zhiwen Xiao:
Distributed cache strategy based on LT codes under spark platform. 16519-16545 - Xiaofei Yue
, Qingyang Ding, Jianming Zhu, Yanbing Ding:
TimeLink: enabling dynamic runtime prediction for Flink iterative jobs. 16546-16573 - Mohammed Lataifeh
, Xavier A. Carrasco
, Ashraf Elnagar
, Naveed Ahmed
, Imran N. Junejo:
Human-machine co-creation: a complementary cognitive approach to creative character design process using GANs. 16574-16610 - Fang-Fang Li, Hui-Min Zuo, Yinghui Jia, Jun Qiu:
A developed Criminisi algorithm based on particle swarm optimization (PSO-CA) for image inpainting. 16611-16629 - Inmaculada Santamaria-Valenzuela, Rocío Carratalá-Sáez, Yuri Torres, Diego R. Llanos
, Arturo González-Escribano:
Performance improvement of the triangular matrix product in commodity clusters. 16630-16653 - Bianca Valéria L. Pereira, Mateus B. F. Carvalho, Pedro Augusto A. da S. de A. Nava Alves, Paulo Rogério de Almeida Ribeiro, Alexandre César Muniz de Oliveira
, Areolino de Almeida Neto:
Automatic phoneme recognition by deep neural networks. 16654-16678 - Isidoro Nieves-Pírez, Alfonso Muñoz, Francisco Almeida, Vicente Blanco:
Energy efficiency and performance analysis of a legacy atomic scale materials modeling simulator (VASP). 16679-16702 - Mahjoubeh Tajgardan, Habib Izadkhah, Shahriar Lotfi:
Correction to: IAFCO: an intelligent agent‑based framework for combinatorial optimization. 16703-16707 - Retraction Note: Detecting straggler MapReduce tasks in big data processing infrastructure by neural network. 16708
- Retraction Note: Quality analysis of multi-sensor intrusion detection node deployment in homogeneous wireless sensor networks. 16709
- Retraction Note: Multi-label algorithm based on rough set of fractal dimension attribute. 16710
Volume 80, Number 12, August 2024
- Bahman Arasteh
, Ali Ghaffari:
A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing. 16711-16743 - Xiaoxi Hu
, Lei Tan, Tao Tang:
M2BIST-SPNet: RUL prediction for railway signaling electromechanical devices. 16744-16774 - Behnam Ojaghi, Mohammad Mahdi Dehshibi, Angelos Antonopoulos:
A supervised active learning method for identifying critical nodes in IoT networks. 16775-16794 - Mohammed Elshambakey, Aya I. Maiyza
, Mona S. Kashkoush, Ghada M. Fathy, Hanan A. Hassan:
The Egyptian national HPC grid (EN-HPCG): open-source Slurm implementation from cluster to grid approach. 16795-16823 - Haobin Zhang, Hongjun San, Haijie Sun, Lin Ding, Xingmei Wu:
A novel optimization method: wave search algorithm. 16824-16859 - Vijay Anand Rajasekaran
, Alagiri Indirajithu, P. Jayalakshmi, Anand Nayyar, Balamurugan Balusamy:
Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks. 16860-16886 - Mahdi Saedshoar Heris
, Mohammad Javidi:
Finite difference method for the Riesz space distributed-order advection-diffusion equation with delay in 2D: convergence and stability. 16887-16917 - Fernando Fernandes dos Santos, Paolo Rech:
Can GPU performance increase faster than the code error rate? 16918-16946 - Patrick Diehl, Gregor Daiß, Kevin A. Huck, Dominic Marcello, Sagiv Shiber, Hartmut Kaiser, Dirk Pflüger:
Simulating stellar merger using HPX/Kokkos on A64FX on Supercomputer Fugaku. 16947-16978 - Khatereh Ahmadi, Reza Javidan:
A novel RPL defense mechanism based on trust and deep learning for internet of things. 16979-17003 - Sajede Harraz, Yuyan Wang, Shuang Cong:
Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach. 17004-17020 - Rui Zhong, Ende Peng, Ziqiang Li, Qing Ai, Tao Han, Yong Tang:
SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene. 17021-17041 - Siling Feng, Zhisheng Qi, Guirong Zhang, Cong Lin, Mengxing Huang:
FCNet: a deep neural network based on multi-channel feature cascading for image denoising. 17042-17067 - Siyao Ling, Lunfeng Chen, Yujie Wu, Yuanmin Zhang, Zhisheng Gao:
ACANet: attention-based context-aware network for infrared small target detection. 17068-17096 - Huifang Li, Boyuan Chen, Jingwei Huang, Zhuoyue Song, Yuanqing Xia:
Clustering-assisted gradient-based optimizer for scheduling parallel cloud workflows with budget constraints. 17097-17134 - Reza Faraji, Abdalhossein Rezai:
Design of a multilayer reversible ALU in QCA technology. 17135-17158 - Rania Zaimi, Mohamed Hafidi, Mahnane Lamia:
A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link. 17159-17191 - Hasitha Muthumala Waidyasooriya, Masanori Hariyama:
Performance evaluation of Word2vec accelerators exploiting spatial and temporal parallelism on DDR/HBM-based FPGAs. 17192-17211 - Jorge Silvestre
, Miguel A. Martínez-Prieto
, Aníbal Bregón
, Pedro C. Álvarez-Esteban:
A deep learning-based approach for predicting in-flight estimated time of arrival. 17212-17246 - Béla J. Szekeres, Ferenc Izsák:
On the computation of the gradient in implicit neural networks. 17247-17268 - Yanxia Wang, Renjie Wang, Hu Shi, Dan Liu:
MS-HRNet: multi-scale high-resolution network for human pose estimation. 17269-17291 - Manel Boujelben, Mohamed Abid:
Post-quantum security design for hierarchical healthcare systems based on lattices. 17292-17313 - Zhiyu Lu, Gang Hu, Lemeng Wang:
Order structure analysis of node importance based on the temporal inter-layer neighborhood homogeneity rate of the dynamic network. 17314-17337 - Wenya Zhang, Jian Zhao, Hao Liu, Liangping Tu:
Cleaner fish optimization algorithm: a new bio-inspired meta-heuristic optimization algorithm. 17338-17376 - Haochen Zou, Zitao Wang:
An enhanced object detection network for ship target detection in SAR images. 17377-17399 - Jing Zhao, Rui Chen
, Pengcheng Fan:
TS-Finder: privacy enhanced web crawler detection model using temporal-spatial access behaviors. 17400-17422 - Pooja Mishra
, W. Wilfred Godfrey, Neetesh Kumar:
FGCF: fault-aware green computing framework in software-defined social internet of vehicle. 17423-17459 - Hui Dou, Shanshan Zhu, Yiwen Zhang, Pengfei Chen, Zibin Zheng:
HyperTuner: a cross-layer multi-objective hyperparameter auto-tuning framework for data analytic services. 17460-17491 - Junghyun Lee, Taehyeon Kwon, Sungwon Jung:
An effective spatial join method for blockchain-based geospatial data using hierarchical quadrant spatial LSM+ tree. 17492-17523 - Aqsa Shafiq, Sumera Naz, Shariq Aziz Butt, Gabriel Piñeres-Espitia
:
Enhancing learning environments with IoT: a novel decision-making approach using probabilistic linguistic T-spherical fuzzy set. 17524-17574 - Fulya Akdeniz, Yasar Becerikli
:
Recurrent neural network and long short-term memory models for audio copy-move forgery detection: a comprehensive study. 17575-17605 - Siwei Wei, Weijie Liu, Feifei Wei, Chunzhi Wang, Neal N. Xiong:
Gaitdlf: global and local fusion for skeleton-based gait recognition in the wild. 17606-17632 - Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh:
A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions. 17633-17687 - Ruizhi Wu, Bo Li, Peng Hou, Fen Hou:
Perception data fusion-based computation offloading in cooperative vehicle infrastructure systems. 17688-17710 - Ya Guo, Fan Yang, Yazhong Si, Yipu Yang, Wei Zhang, Xiaolong Zhang, Yatong Zhou:
PnP-UGCSuperGlue: deep learning drone image matching algorithm for visual localization. 17711-17740 - Robert Susik
, Robert Nowotniak:
Pattern matching algorithms in blockchain for network fees reduction. 17741-17759 - Xinqi Li, Qicheng Liu:
DDSC-SMOTE: an imbalanced data oversampling algorithm based on data distribution and spectral clustering. 17760-17789 - Fatemeh Sarkohaki, Mohsen Sharifi:
Service placement in fog-cloud computing environments: a comprehensive literature review. 17790-17822 - Lipsa Das, Laxmi Ahuja, Adesh Pandey:
A novel deep learning model-based optimization algorithm for text message spam detection. 17823-17848 - Jinhui Li, Lifeng Cao, Shoucai Zhao, Jiling Wan, Jinlong Bai:
LC-PBFT: Layered cross-chain consensus algorithm based on forest topology. 17849-17873 - Chao Zhu, Benshun Yi, Laigan Luo:
Filter channel network based on contextual position weight for aspect-based sentiment classification. 17874-17894 - Fatemeh Afshari, Athena Abdi:
Qsmix: Q-learning-based task scheduling approach for mixed-critical applications on heterogeneous multi-cores. 17895-17922 - Shalini Priya, Vaishali Joshi, Joydeep Chandra:
Let's explain crisis: deep multi-scale hierarchical attention framework for crisis-task identification. 17923-17951 - Haiping Zhang, Fuxing Zhou, Dongjing Wang, Xinhao Zhang, Dongjin Yu, Liming Guan:
LGAFormer: transformer with local and global attention for action detection. 17952-17979 - Ahmed A. Ewees
:
Harmony-driven technique for solving optimization and engineering problems. 17980-18008 - Lin Zhang, Ning An, Zongfang Ma:
Research of hybrid path planning with improved A* and TEB in static and dynamic environments. 18009-18047 - Ismael Abdulrahman
:
Enhancing Grover's search algorithm: a modified approach to increase the probability of good states. 18048-18061 - Cristóbal Camarero, Carmen Martínez, Ramón Beivide:
Ant Mill: an adversarial traffic pattern for low-diameter direct networks. 18062-18080 - Sumit Sharma, Sarika Jain:
Anomalies resolution and semantification of tabular data. 18081-18117 - Yinguang Zhang, Jianhuan Su, Teng Wang, Chuan Xu, Ao Yu:
Intelligent detection method of microparticle virus in silkworm based on YOLOv8 improved algorithm. 18118-18141 - Aurelio López-Fernández
, Francisco Antonio Gómez Vela, María del Saz-Navarro, Fernando M. Delgado-Chaves, Domingo S. Rodríguez-Baena:
Optimized Python library for reconstruction of ensemble-based gene co-expression networks using multi-GPU. 18142-18176 - Zhihao Guo, Xiaoming Hu:
Calculation and selection scheme of node reputation values for notary mechanism in cross-chain. 18177-18198 - Qian Geng, Ziang Chuai, Jian Jin:
Cross-organizational data exchange based on consortium blockchain with consistency guarantee. 18199-18236 - Rabiaa Ouahabi, Chaima Boulezaz:
A novel approach to synchronizing a biological snap oscillator within a fixed time and expanding the method to various chaotic systems. 18237-18259 - Dayu Jia, Guanghong Yang, Min Huang, Junchang Xin, Guoren Wang:
A learning-based efficient query model for blockchain in internet of medical things. 18260-18284 - Peng Yang, Ruochen Ma, Meng Yi, Yifan Zhang, Bing Li, Zijian Bai:
A computation offloading strategy for multi-access edge computing based on DQUIC protocol. 18285-18318 - Alemeh Matani, Amir Sahafi, Ali Broumandnia:
Publisher Correction: Improving query processing in blockchain systems by using a multi-level sharding mechanism. 18319 - Junnan Li, Qing Zhao, Shuang Liu:
Correction to: A heuristic hybrid instance reduction approach based on adaptive relative distance and k-means clustering. 18320 - Retraction Note: Robust adversarial uncertainty quantification for deep learning fine-tuning. 18321
- Retraction Note: Efficient hybrid algorithm based on genetic with weighted fuzzy rule for developing a decision support system in prediction of heart diseases. 18322
- Retraction Note: Mobile client data security storage protocol based on multifactor node evaluation. 18323
Volume 80, Number 13, September 2024
- Nisha Chaurasia, Munna Ram, Priyanka Verma, Nakul Mehta, Nitesh Bharot:
A federated learning approach to network intrusion detection using residual networks in industrial IoT networks. 18325-18346 - Hadi Rasmi
, Mohammad Mosleh, Nima Jafari Navimipour, Mohammad Kheyrandish:
An ultra efficient 2:1 multiplexer using bar-shaped pattern in atomic silicon dangling bond technology. 18347-18364 - Yinbang Sun, Jing Sun, Fuming Sun
, Fasheng Wang, Haojie Li:
Low-light image enhancement using transformer with color fusion and channel attention. 18365-18391 - Pinar Güner, Suhap Sahin, Fidan Kaya Gülagiz:
A survey of appearance-based approaches for human gait recognition: techniques, challenges, and future directions. 18392-18429 - Filipe Coelho de Lima Duarte
, Paulo S. G. de Mattos Neto
, Paulo Renato A. Firmino
:
A hybrid recursive direct system for multi-step mortality rate forecasting. 18430-18463 - Bin Qin, Qinyang Lei, Xin Wang:
DGCQN: a RL and GCN combined method for DAG scheduling in edge computing. 18464-18491 - Mohammadreza Zamani, Saeed Sharifian:
Distributed edge to cloud ensemble deep learning architecture to diagnose Covid-19 from lung image in IoT based e-Health system. 18492-18520 - Nirnai Rai, Jyoti Grover:
Analysis of crypto module in RIOT OS using Frama-C. 18521-18543 - Somaye Sayari, Ali Harounabadi, Touraj Banirostam:
Community detection based on improved user interaction degree, weighted quasi-local path-based similarity and frequent pattern mining. 18544-18572 - Md Farhadur Reza:
High-performance application mapping in network-on-chip-based multicore systems. 18573-18599 - Wei Fan, Keke Yang, Yifan Wang, Cong Chen, Jing Li:
Data-free adaptive structured pruning for federated learning. 18600-18626 - Yu Ji, Wen Wu, Yi Hu, Xi Chen, Wenxin Hu, Liang He:
Personality-driven experience storage and retrieval for sentiment classification. 18627-18651 - Farnaz Sheikhi, Behnam Zeraatkar, Fatemeh Amereh, Seyedeh Sarah Firouzabadi, Elahe Rasooli Ghalehjoughi:
Prudent carving: a progressively refining algorithm for shape reconstruction from dot patterns. 18652-18678 - Yi Wang, Xiaoying Lyu, Shujia Yang:
Ocean observing time-series anomaly detection based on DTW-TRSAX method. 18679-18704 - Shun Luo, Juan Yu, Yunjiang Xi:
Incorporating multivariate semantic association graphs into multimodal networks for information extraction from documents. 18705-18727 - Isabel Muñoz Fernández, Sergio Arévalo-Viñuales, Pedro de las Heras Quirós:
Timestamp system for causal broadcast communication. 18728-18760 - Bei Tian, Gang Xiao, Yu Shen:
A deep reinforcement learning approach for dynamic task scheduling of flight tests. 18761-18796 - Boutheina Jlifi
, Mahdi Medini, Claude Duvallet:
A guided genetic algorithm-based ensemble voting of polynomial regression and LSTM (GGA-PolReg-LSTM) for congestion prediction using IoT and air quality data in sustainable cities. 18797-18837 - Marcelo K. Moori, Hiago Mayk G. de A. Rocha, Arthur Francisco Lorenzon, Antonio C. S. Beck:
Allok: a machine learning approach for efficient graph execution on CPU-GPU clusters. 18838-18865 - K. Yesodha
, M. Krishnamurthy, K. Thangaramya, Arputharaj Kannan:
Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks. 18866-18899 - Amir Hossein Mofid, Negin Daneshpour
, Zeinab Torabi
:
MMC: efficient and effective closed high-utility itemset mining. 18900-18918 - Zhongliang Lv, Zhiqiang Zhao
, Kewen Xia
, Guojun Gu, Kang Liu, Xuanlin Chen:
Steel surface defect detection based on MobileViTv2 and YOLOv8. 18919-18941 - Xiaxia Guan, Tianlong Ma:
Fractional matchings on regular graphs. 18942-18953 - Nan Li, Ying Wang, Tianxu Liu:
Dependency-position relation graph convolutional network with hierarchical attention mechanism for relation extraction. 18954-18976 - Xue Mei, Yachuan Wei, Haoyang Chen:
Graph-based domain adversarial learning framework for video anomaly detection domain generalization. 18977-19002 - Özcan Özyurt, Hakan Özköse, Ahmet Ayaz:
Evaluating the latest trends of Industry 4.0 based on LDA topic model. 19003-19030 - Kassahun Geresu, Huaxi Gu, Meaad Fadhel, Wenting Wei, Xiaoshan Yu:
ICLB: intelligent controllers load balancing for software-defined based optical data center networks. 19031-19061 - Yongfa Zhang, Ming Xu
, Qing Zhu, Shuo Liu, Guojin Chen:
Improved YOLOv5s combining enhanced backbone network and optimized self-attention for PCB defect detection. 19062-19090 - Zohreh Sadat Akhavan-Hejazi, Mahdi Esmaeili, Mostafa Ghobaei-Arani
, Behrouz Minaei-Bidgoli:
Identifying influential users using homophily-based approach in location-based social networks. 19091-19126 - Hadi Mojez, Hamed Kamel, Roshanak Zanjani, Amir Massoud Bidgoli:
Controller placement issue in software-defined networks with different goals: a comprehensive survey. 19127-19209 - Samaneh Khosravi, Arezoo Kamran
:
Iterative construction of energy and quality-efficient approximate multipliers utilizing lower bit-length counterparts. 19210-19247 - Patigül Abliz:
A controlling estimation bias method: Max_Mix_Min estimator for Q-learning. 19248-19273 - Noor Aldeen Alawad, Bilal H. Abed-alguni
, Misaa El-ibini:
Hybrid Snake Optimizer Algorithm for Solving Economic Load Dispatch Problem with Valve Point Effect. 19274-19323 - Aman Mehta, Rahul Kumar Verma:
QoS-aware edge server placement for collaborative predictive maintenance in industrial internet of things. 19324-19350 - Xiaoying Pan, Shoukun Li, Hao Wang, Beibei Wang, Haoyi Wang:
LGCANet: lightweight hand pose estimation network based on HRNet. 19351-19373 - Jia Miao, Li Zhu, Hongli Zhao, Sen Lin, Xinjun Gao:
Quantifying response latency in video surveillance systems using object detection techniques. 19374-19394 - S. A. Mane, S. A. Kandekar:
Pendant 3-tree-connectivity of augmented cubes. 19395-19413 - Ji-Teng Jia, Rong Xie, Fatih Yilmaz:
Fast tridiagonalization of (p, q)-pentadiagonal matrices and its applications. 19414-19432 - Emre Yalcin
, Alper Bilge
:
A novel target item-based similarity function in privacy-preserving collaborative filtering. 19433-19461 - Mehmet Akif Bülbül
:
A novel hybrid deep learning model for early stage diabetes risk prediction. 19462-19484 - Siqi Lin, Dongqin Cheng:
Three kinds of connectivity of folded spined cubes. 19485-19506 - Waqar Farooq
, Saif ul Islam
, Usman Ali Gulzari, Abdullah Gani:
MDVR: a novel multicast routing protocol for unmanned mine detection vehicle (UMDV) communication in VANET. 19507-19535 - Daozheng Chen, Jun Gao, Maoting Gao, Hongchen Guo:
An integrated AGV control system using preemptive and non-preemptive mixed RTOS. 19536-19561 - Zahra Sadat Sajjadi
, Mahdi Esmaeili, Mostafa Ghobaei-Arani
, Behrouz Minaei-Bidgoli:
An efficient graph embedding clustering approach for heterogeneous network. 19562-19591 - Bin Guo, Emil Sekerinski:
Simplified algorithms for order-based core maintenance. 19592-19623 - Jianxin Tang, Hongyu Zhu, Lihong Han, Shihui Song:
Identifying top-k influential nodes in social networks: a discrete hybrid optimizer by integrating butterfly optimization algorithm with differential evolution. 19624-19668 - Mohamed Sahraoui, Saad Harous:
Double firefly based efficient clustering for large-scale wireless sensor networks. 19669-19695 - Yu Cheng, Jinzhao Liu, Xinliang Jiang, Xinyu Du, Ruijun Cheng:
Intelligent quantitative safety monitoring approach for ATP system by neural computing and probabilistic model checking. 19696-19718 - Xavier Palomo, Carlos Molina:
ITER: an ITERative approach for inter-core timing analysis in statically scheduled cyclic executive systems on COTS multicore platforms for CRTES. 19719-19770 - Jing Chen, Xinyu Yang, Mingxin Liu, Miaomiao Liu:
SDEGNN: Signed graph neural network for link sign prediction enhanced by signed distance encoding. 19771-19795 - Mengyao Zhao, Yanhui Zhai, Deyu Li:
Assessing edge importance in social networks: an importance indicator based on the k-sup structure. 19796-19823 - Yusuf Yamak, Suleyman Tosun, Murat Aydos:
DICEguard: enhancing DICE security for IoT devices with periodic memory forensics. 19824-19844 - Suha Abdulhussein Abdulzahra
, Ali Kadhum M. Al-Qurabat
:
FONIC: an energy-conscious fuzzy-based optimized nature-inspired clustering technique for IoT networks. 19845-19897 - Maitreyee Ganguly, Paramita Dey, Sarbani Roy:
Influence maximization in community-structured social networks: a centrality-based approach. 19898-19941 - Sajede Harraz, Yuyan Wang, Shuang Cong:
Correction to: Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach. 19942 - Bahman Arasteh
, Ali Ghaffari:
Correction: A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing. 19943 - Ahmed A. Bakhsh:
Retraction Note: High-performance in classification of heart disease using advanced supercomputing technique with cluster-based enhanced deep genetic algorithm. 19944 - Retraction Note: DAVmS: Distance Aware Virtual Machine Scheduling approach for reducing the response time in cloud computing. 19945
- Retraction Note: Sparse low-rank correction scalable video coding based on interactive region of interest viewpoint. 19946
Volume 80, Number 14, September 2024
- Qiang Ge, Huaizhou Liu, Yuxiang Ma, Daojun Han, Xianyu Zuo, Lanyue Dang:
Shuffle-RDSNet: a method for side-scan sonar image classification with residual dual-path shrinkage network. 19947-19975 - Shabana Anwar, Muhammad Azeem, Muhammad Kamran Jamil, Bandar Almohsen, Yilun Shang:
Single-valued neutrosophic fuzzy Sombor numbers and their applications in trade flows between different countries via sea route. 19976-20019 - Zhao-Yang Li, Xin-Hui Shao:
Future locations prediction with multi-graph attention networks based on spatial-temporal LSTM framework. 20020-20041 - Poonam Rani, Jyoti Shokeen:
FNNet: a secure ensemble-based approach for fake news detection using blockchain. 20042-20079 - Sergio Ruiz-Villafranca
, José Roldán Gómez, Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Luis Martínez:
A TabPFN-based intrusion detection system for the industrial internet of things. 20080-20117 - Mohammed Mehdi Bouchene
:
Bayesian optimization of histogram of oriented gradients (HOG) parameters for facial recognition. 20118-20149 - Yuanyuan Zhang
, Huafeng Wu, T. Aaron Gulliver, Xiaofang Li, Jiping Li, Jiangfeng Xian, Weijun Wang:
Real-time RSS-based target localization for UWSNs using an IDE-BP neural network. 20150-20175 - Hengliang Guo, Haolei Wang, Wanting Chen, Congxiang Zhang, Yubo Han, Shengguang Zhu, Dujuan Zhang, Yang Guo, Jiandong Shang, Tao Wan, Qingyang Li, Gang Wu
:
Optimizing sparse general matrix-matrix multiplication for DCUs. 20176-20200 - Leila Gholamhosseini, Farahnaz Sadoughi, Sorayya Rezayi, Somayeh Nasiri:
Identifying cloud internet of things requirements in healthcare: a Delphi-based study. 20201-20228 - Zilong Yin
, Xiaoli Zhao, Haoyu Wang
, Xin Zhang, Xin Guo, Zhijun Fang:
Cluster knowledge-driven vertical federated learning. 20229-20252 - Xin Yang, Lingxiao Wu, Xiangchen Wang:
ULSR-UV: an ultra-lightweight super-resolution networks for UAV video. 20253-20269 - Yilin Li, Hui Huang, Amei Lan, Zhenjie Huang:
A practical byzantine fault tolerance improvement algorithm based on credit grouping-classification. 20270-20301 - Mehdi Babaei:
An efficient ODE-solving method based on heuristic and statistical computations: αII-(2 + 3)P method. 20302-20345 - Parul Chauhan, Anjana Gupta:
Probabilistic multiplicative unbalanced linguistic game using linguistic cloud model. 20346-20377 - Wenya Wu, Guangjin Wang, Xiufang Liang, Yingzheng Zhu, Huajuan Duan, Peiyu Liu, Ran Lu:
A sequence recommendation method based on external reinforcement and position separation. 20378-20399 - Ramraj Dangi, Praveen Lalwani:
Optimizing network slicing in 6G networks through a hybrid deep learning strategy. 20400-20420 - Marjan Mahmoudi, Behrang Barekatain, Zahra Beheshti, Alfonso Ariza-Quintana:
MBL-DSDN: a novel load balancing algorithm in distributed software-defined networks based on micro-clustering and B-LSTM methods. 20421-20487 - Zhipeng Cao, Wei Guo, Zhiquan Wan, Peijie Li, Qinrang Liu, Caining Wang, Yangxue Shao:
ETRS: efficient turn restrictions setting method for boundary routers in chiplet-based systems. 20488-20517 - Kaiming Yang, Jian Cao:
Performance analysis of mining pool with power-saving, fault and mining competition. 20518-20545 - Jing Zhang, Kunliang Si, Zuanyang Zeng, Tongxin Li, Xiucai Ye:
IEA-DP: Information Entropy-driven Adaptive Differential Privacy Protection Scheme for social networks. 20546-20582 - Sara Hebal, Djamila Mechta, Saad Harous, Lemia Louail:
A comparative study of energy routing algorithms to optimize energy transmission in energy internet. 20583-20639 - Deepa Kumari
, S. K. Vyshnavi, Rupsa Dhar, B. S. A. S. Rajita, Subhrakanta Panda, Jabez Christopher:
Smart GAN: a smart generative adversarial network for limited imbalanced dataset. 20640-20681 - Siwei Li, Hui Zhang, Hui Shi, Maode Ma, Cong Wang:
A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments. 20682-20714 - Yutaka Watanabe, Miwako Tsuji, Hitoshi Murai, Taisuke Boku, Mitsuhisa Sato:
Design and performance evaluation of UCX for the Tofu Interconnect D on Fugaku towards efficient multithreaded communication. 20715-20742 - Amir Hossein Hosseinian, Hamid Esmaeeli:
A sustainable decision-making framework and a mixed-integer formulation for the project portfolio selection problem. 20743-20792 - Ji Tang, Yonghao Han, Yunting Xian:
SAR-ShipSwin: enhancing SAR ship detection with robustness in complex environment. 20793-20812 - Shivendu Mishra, Anurag Choubey, Bollampalli Areen Reddy, Rajiv Misra:
Enhancing EV lithium-ion battery management: automated machine learning for early remaining useful life prediction with innovative multi-health indicators. 20813-20860 - Sule Saglam, Kadir Karakaya:
An alternative bounded distribution: regression model and applications. 20861-20890 - Bailin Zhu, Hongliang Wang, Mi Fan:
Constructing small sample datasets with game mixed sampling and improved genetic algorithm. 20891-20922 - Niloofar Barati Bakhtiari, Masood Rafighi, Reza Ahsan:
A trust management system for fog computing using improved genetic algorithm. 20923-20955 - Flávio Neves, Rafael Roque de Souza, Wesley Lima, Wellison Raul, Michel S. Bonfim, Vinicius Cardoso Garcia:
Smart Anonymity: a mechanism for recommending data anonymization algorithms based on data profiles for IoT environments. 20956-21000 - Shiju Li, Xiaoqian Zhang, Chao Luo, Yufeng Chen, Shuai Zhao:
Global and local structure projection learning for image feature extraction. 21001-21022 - Chenxing Xia, Mengge Zhang, Xiuju Gao, Bin Ge, Kuan-Ching Li, Xianjin Fang, Yan Zhang, Xingzhu Liang:
EDFIDepth: enriched multi-path vision transformer feature interaction networks for monocular depth estimation. 21023-21047 - Nasraldeen Alnor Adam Khleel, Károly Nehéz:
Improving accuracy of code smells detection using machine learning with data balancing techniques. 21048-21093 - Francesco Salvadore, Giacomo Rossi, Srikanth Sathyanarayana, Matteo Bernardini:
OpenMP offload toward the exascale using Intel® GPU Max 1550: evaluation of STREAmS compressible solver. 21094-21127 - Danyang Cao, Shuai Zhang:
AD-autoformer: decomposition transformers with attention distilling for long sequence time-series forecasting. 21128-21148 - Wenlong Zhu
, Chongyuan Peng, Yu Miao, Yufan Bai, Yingchun Diao, Shuangshuang Yang:
Time and value aware influence blocking maximization in geo-social networks. 21149-21178 - Xiaole Li, Haitao Liu, Haifeng Wang:
Data transmission optimization in edge computing using multi-objective reinforcement learning. 21179-21206 - Arun Singh Bhadwal
, Kamal Kumar:
Nc-vae: normalised conditional diverse variational autoencoder guided de novo molecule generation. 21207-21228 - Fei Xue, Yuezheng Chen, Peiwen Wang, Yunsen Ye, Jinda Dong, Tingting Dong:
A decomposition-based multi-objective evolutionary algorithm with Q-learning for adaptive operator selection. 21229-21283 - Amir Hossein Mofid, Negin Daneshpour, Zeinab Torabi, Parvin Taghavi:
TKU-BChOA: an accurate meta-heuristic method to mine Top-k high utility itemsets. 21284-21305 - Gabriel Gomez-Lopez, Jesús Escudero-Sahuquillo, Pedro Javier García, Francisco J. Quiles:
Implementation and testing of a KNS topology in an InfiniBand cluster. 21306-21338 - Zhiwei Ye, Wuyang Lan, Wen Zhou, Qiyi He, Liang Hong, Xinguo Yu, Yunxuan Gao:
Elite GA-based feature selection of LSTM for earthquake prediction. 21339-21364 - Ying Li, HaoYu Guo, Huankun Sheng:
Self-supervised single-view 3D point cloud reconstruction through GAN inversion. 21365-21393 - Hailong Luo, Mayire Ibrayim, Askar Hamdulla, Qilin Deng:
Visual and semantic guided scene text retrieval. 21394-21411 - Animesh Tripathi, Shiv Prakash, Pradeep Kumar Tiwari, Jaime Lloret, Narendra Kumar Shukla:
An efficient model for vehicular ad hoc networks using machine learning and high-performance computing. 21412-21430 - Jichang Han, Tao Peng, Xuesong Zhang:
A CUDA-based parallel optimization method for SM3 hash algorithm. 21431-21446 - Meng Wang, Qiong-Yun Wang, Ya-Hao Zhang, Zi-Xuan Zhang, Ya-Ning Feng, Yu-Feng Cao:
Preserving differential privacy in neural networks for foreign object detection with heterogeneity-based noising among distributed devices. 21447-21474 - Jinglong Wang, Gui Chen, Kai Xin, Zhengshun Fei:
Metric learning with adversarial hard negative samples for tag recommendation. 21475-21507 - Jing Liao, Cheng Peng, Lei Jiang, Yihua Ma, Wei Liang, Kuan-Ching Li, Aneta Poniszewska-Maranda:
MWformer: a novel low computational cost image restoration algorithm. 21508-21532 - Fenhua Bai, Fushuang Li, Tao Shen, Kai Zeng, Xiaohui Zhang, Chi Zhang:
RaBFT: an improved Byzantine fault tolerance consensus algorithm based on raft. 21533-21560 - Rongbiao Ji, Jianke Yang, Yehui Wu, Yadong Li, Rujia Li, Jiaojiao Chen, Jianping Yang:
Correction to: Construction and analysis of students' physical health portrait based on principal component analysis improved Canopy-K-means algorithm. 21561-21562 - Retraction Note: Dominator tree data flow cognitive analysis for green public building design. 21563
- Retraction Note: Applying deep learning in football ankle injury for value of high-power magnetic resonance bioimaging evaluation. 21564-21565
- Retraction Note: The health of things for classification of protein structure using improved grey wolf optimization. 21566-21567
Volume 80, Number 15, October 2024
- Shashi Shekhar Kumar
, Ritesh Chandra, Sonali Agarwal:
A real-time approach for smart building operations prediction using rule-based complex event processing and SPARQL query. 21569-21591 - T. M. Okediran
, Olufunke R. Vincent, Adebayo Abayomi-Alli, Olusola John Adeniran:
Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field. 21592-21614 - Fei Wang, Yi Liu, Yudong Zhou, Dianle Zhou, Dan Yan:
An unmanned tank combat game driven by FPSO-MADDPG algorithm. 21615-21641 - Donghyun Kim, Seungho Jeon, Kwangsoo Kim, Jaesik Kang, Seungwoon Lee, Jung Taek Seo:
Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment. 21642-21675 - Ying Yang, Xinyu Qian, Lingfeng Zhang, Si Tang, Qinna Zhao:
A conditioned joint-modality attention fusion approach for multimodal aspect-level sentiment analysis. 21676-21698 - Jingwen Zhao, Yanxia Wu, Jibin Dong:
Efficient data race detection for interrupt-driven programs via path feasibility analysis. 21699-21725 - Esmaeil Torabi, Mostafa Ghobaei-Arani
, Ali Shahidinejad:
A learning-based data and task placement mechanism for IoT applications in fog computing: a context-aware approach. 21726-21763 - Wentao Zhou, Chengtao Cai, Kejun Wu, Chenming Li, Biqin Gao:
Las-yolo: a lightweight detection method based on YOLOv7 for small objects in airport surveillance. 21764-21789 - Haigang Deng, Zhe Zhang, Chengwei Li, Wenting Xu, Chenyang Wang, Chuanxu Wang:
Spatiotemporal information complementary modeling and group relationship reasoning for group activity recognition. 21790-21810 - Amira Benachour, Saïd Yahiaoui, Sarra Bouhenni, Hamamache Kheddouci, Nadia Nouali-Taboudjemat:
GPU-accelerated relaxed graph pattern matching algorithms. 21811-21836 - Theodora Sanida, Minas Dasygenis:
MiniTomatoNet: a lightweight CNN for tomato leaf disease recognition on heterogeneous FPGA-SoC. 21837-21866 - Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
Blockchain based distributed trust management in IoT and IIoT: a survey. 21867-21919 - Dionatra F. Kirchoff, Vinícius Meyer, Rodrigo N. Calheiros, César A. F. De Rose:
Evaluating machine learning prediction techniques and their impact on proactive resource provisioning for cloud environments. 21920-21951 - Mengjie Lv, Xuanli Liu, Hui Dong, Weibei Fan:
Reliability analysis of complete cubic networks based on extra conditional fault. 21952-21974 - Xiao Zhao, Feng Tian, Ziling Shao:
Positioning and tracking with ODE-LSTM algorithm for emerging smart rail systems. 21975-21995 - Xiaohui Hua, Qin Zhao:
The h-faulty-block connectivity of alternating group graphs and split-star networks. 21996-22019 - Shuo Wang
, Jing Yang, Fanshu Shang:
A personalized recommendation model with multimodal preference-based graph attention network. 22020-22048 - Zahra Gachkooban, Rahim Alizadeh, Fatemeh Shakeri:
Enhancing multidimensional scaling through a distributed algorithm. 22049-22068 - Haitao Liu, Weiming Peng, Jihua Song:
RepEKShot: an evidential k-nearest neighbor classifier with repulsion loss for few-shot named entity recognition. 22069-22098 - Metin Ifraz
, Süleyman Ersöz, Adnan Aktepe, Tahsin Çetinyokus:
Sequential predictive maintenance and spare parts management with data mining methods: a case study in bus fleet. 22099-22123 - Yunyi Zhang, Jina E., You Cao, Wei Zhang, Wei He:
Performance evaluation of complex systems based on hierarchical evidential reasoning rule considering disturbances. 22124-22154 - Elie Nicolas, Rafic Ayoubi, Samir Berjaoui:
Chebyshev approximation technique: analysis and applications. 22155-22189 - Runzhi Li, Jianming Zhu, Guoqing Wang:
Influence maximization under equilibrious groups in social networks. 22190-22212 - Adriano Vogel
, Marco Danelutto
, Massimo Torquati
, Dalvan Griebler
, Luiz Gustavo Fernandes
:
Enhancing self-adaptation for efficient decision-making at run-time in streaming applications on multicores. 22213-22244 - Yawei Huang, Xuezhong Qian, Wei Song:
Enhancing differential evolution algorithm with a fitness-distance-based selection strategy. 22245-22286 - Lifan Sun, Bingyu Li, Dan Gao, Bo Fan:
Adaptive multi-object tracking algorithm based on split trajectory. 22287-22314 - Prashant Shukla, Sudhakar Pandey:
MOTORS: multi-objective task offloading and resource scheduling algorithm for heterogeneous fog-cloud computing scenario. 22315-22361 - Habib Ullah Khan, Nasir Ali, Farhad Ali, Shah Nazir:
Transforming future technology with quantum-based IoT. 22362-22396 - Deepavathi Paganraj, Mala Chelliah:
DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol. 22397-22427 - Sunandita Patra, Mehtab Pathan, Mahmoud Mahfouz, Parisa Zehtabi, Wided Ouaja, Daniele Magazzeni, Manuela Veloso:
Capacity planning and scheduling for jobs with uncertainty in resource usage and duration. 22428-22461 - Aleksandr Yu. Romanov, Anatoly Lerner, Aleksandr A. Amerikanov:
Cycle-accurate multi-FPGA platform for accelerated emulation of large on-chip networks. 22462-22478 - Ying Zhang, Li Deng, Hefeng Huang, Bo Wei:
An improved SMOTE based on center offset factor and synthesis strategy for imbalanced data classification. 22479-22519 - Hannah Blasiyus
, D. K. Sheena Christy:
Palindromes in involutive Fibonacci arrays. 22520-22547 - Wei Xia, Deming He:
On a model-free meta-heuristic approach for unconstrained optimization. 22548-22562 - Sapna Kumari, Harpreet Kaur, Prabal Gupta:
A cognitive effective framework for analysis, monitoring and identifying variant of coronavirus disease. 22563-22597 - Reza Rabieyan, Ramin Yahyapour, Patrick Jahnke:
Optimization of containerized application deployment in virtualized environments: a novel mathematical framework for resource-efficient and energy-aware server infrastructure. 22598-22630 - Joy Gorai
, Dilip Kumar Shaw:
Semantic difference-based feature extraction technique for fake news detection. 22631-22653 - Jiawei Shen, Junfeng Tian, Ziyuan Wang:
Privacy-preserving algorithm based on vulnerable nodes for social relationships. 22654-22681 - Kirti Bhandari, Kuldeep Kumar, Amrit Lal Sangal:
DBOS_US: a density-based graph under-sampling method to handle class imbalance and class overlap issues in software fault prediction. 22682-22725 - Maoyuan Zhang, Fei Wu, WeiLiang Chen, Xiang Li:
Aspect-level implicit sentiment analysis model based on semantic wave and knowledge enhancement. 22726-22747 - Diana Di Luccio, Ciro Giuseppe De Vita, Aniello Florio, Gennaro Mellone, Catherine Alessandra Torres Charles, Guido Benassai, Raffaele Montella:
A high-performance, parallel, and hierarchically distributed model for coastal run-up events simulation and forecasting. 22748-22769 - Marcos Falcão, Caio Souza, Andson M. Balieiro, Kelvin Lopes Dias:
Resource allocation for UAV-enabled multi-access edge computing. 22770-22802 - Zhongmin Wang, Kang Xi, Cong Gao, Xiaomin Jin, Yanping Chen, Chen Lu:
A real-time object detection method for electronic screen GUI test systems. 22803-22835 - Qian-Ying Hu, Xian-Ming Gu, Chun Wen:
Application of an extrapolation method in the Hessenberg algorithm for computing PageRank. 22836-22859 - Xinfeng He, Yifan Zhu:
An encrypted deduplication scheme based on files diversity. 22860-22884 - Hui Xiao, Xinyu Zhang, Zhigang Hu, Meiguang Zheng, Yang Liang:
A collaborative cache allocation strategy for performance and link cost in mobile edge computing. 22885-22912 - Mojtaba Ghasemi, Keyvan Golalipour, Mohsen Zare, Seyedali Mirjalili, Pavel Trojovský, Laith Abualigah, Rasul Hemmati:
Flood algorithm (FLA): an efficient inspired meta-heuristic for engineering optimization. 22913-23017 - Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati:
IoV security and privacy survey: issues, countermeasures, and challenges. 23018-23082 - Iker Martín-Álvarez, José Ignacio Aliaga, Maribel Castillo, Sergio Iserte:
Proteo: a framework for the generation and evaluation of malleable MPI applications. 23083-23119 - Zhihua Liu, Ran Zhang, Yuanyuan Yang, Zhaoye Chen, Mengnan Hao, Jiaxing Chen:
Enhancing 3D localization in wireless sensor network: a differential evolution method for the DV-Hop algorithm. 23120-23146 - S. Sheeja Rani, P. V. Pravija Raj, Ahmed M. Khedr:
SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption. 23147-23176
Volume 80, Number 16, November 2024
- Zhichao Hu, Sheng Chen, Huanle Rao, Chenjie Hong, Ouhan Huang, Xiaobin Xu, Gangyong Jia:
An adaptive service deployment algorithm for cloud-edge collaborative system based on speedup weights. 23177-23204 - Neetha Francis, A. Lisha, Thomas Monoth:
Exploring recent advances in random grid visual cryptography algorithms. 23205-23224 - Yunyi Zhang, Hongbin Huang, Ye Du, Wei He:
On the continuous probability distribution attribute weight of belief rule base model. 23225-23270 - Melika Mosayebi, Reza Azmi:
Cost-effective clonal selection and AIS-based load balancing in cloud computing environment. 23271-23310 - Furkh Zeshan
, Zaineb Dar, Adnan Ahmad, Tariq Malik:
A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification. 23311-23356 - Sizhong Zhou, Jiancheng Wu:
Spanning k-trees and distance spectral radius in graphs. 23357-23366 - Sijia Guo, Xiaomin Hu, Weihua Yang, Shuang Zhao:
The super edge-connectivity of direct product of a graph and a cycle. 23367-23383 - Hamid Hoorfar, Istvan Merchenthaler, Adam C. Puche:
Optimizing U-Net CNN performance: a comparative study of noise filtering techniques for enhanced thermal image analysis. 23384-23406 - Jianxin Liu, Tinghuai Ma, Yuming Su
, Huan Rong, Alaa Abd El-Raouf Mohamed Khalil, Mohamed Magdy Abdel Wahab, Benjamin Kwapong Osibo:
Temporal patterns decomposition and Legendre projection for long-term time series forecasting. 23407-23441 - Siwei Wei, Dingbo Hu, Feifei Wei, Donghua Liu, Chunzhi Wang:
Traffic flow prediction with multi-feature spatio-temporal coupling based on peak time embedding. 23442-23470 - Yuefei Wang, Yuquan Xu, Xi Yu, Ronghui Feng:
Flattened and simplified SSCU-Net: exploring the convolution potential for medical image segmentation. 23471-23518 - Jianhang Liu, Qingao Gao, Xuerong Cui, Tingpei Huang, Danxin Wang:
Fountain code-based multipath reliable transmission scheme with RNN-assisted predictive feedback. 23519-23543 - Huilin Wang, Huaming Qian, Shuai Feng:
Ssd-kdgan: a lightweight SSD target detection method based on knowledge distillation and generative adversarial networks. 23544-23564 - Raed Shatnawi:
Deriving change-prone thresholds from software evolution using ROC curves. 23565-23591 - Bilal Lounnas, Makhlouf Benazi, Mohamed Kamel:
A robust two-step algorithm for community detection based on node similarity. 23592-23608 - Lulu Yang, Shuming Zhou:
Hyper star structure fault tolerance of half hypercube. 23609-23627 - Francisco J. Baldán, Raciel Yera, Luis Martínez:
Natural noise management in collaborative recommender systems over time-related information. 23628-23666 - Babak Nasersharif, Mohammad Namvarpour:
Exploring the potential of Wav2vec 2.0 for speech emotion recognition using classifier combination and attention-based feature fusion. 23667-23688 - Weiwu Ren, Yuan Gao, Xiao Chen, Hongbing Chen:
Research on satellite link allocation algorithm for Earth-Moon space information network. 23689-23711 - Debasish Mukherjee:
Parallel implementation of discrete cosine transform and its inverse for image compression applications. 23712-23735 - Elahe Kholdi, Seyed Morteza Babamir:
Reserve policy-aware VM positioning based on prediction in multi-cloud environment. 23736-23766 - Yunchao Gong, Xueqiang Lv, Zhu Yuan, Zhaojun Wang, Feng Hu, Xindong You:
Multimodal heterogeneous graph entity-level fusion for named entity recognition with multi-granularity visual guidance. 23767-23793 - Caixia Huang, Sen Yang:
A mini I2C bus interface circuit design and its VLSI implementation. 23794-23814 - Srinivas R. Chakravarthy, Serife Ozkar, Shruti Goel:
Analysis of blockchain system based on BMAP/PH[b]/1 queueing model. 23815-23847 - Zaki Mrzog Alaofi, Kamal R. Raslan, Amira Abd-Elall Ibrahim, Khalid K. Ali:
Comprehensive analysis on the existence and uniqueness of solutions for fractional q-integro-differential equations. 23848-23866 - Yaghoub Alizadeh Govarchinghaleh
, Masoud Sabaei
:
Dynamic service provisioning in heterogeneous fog computing architecture using deep reinforcement learning. 23867-23910 - Pijush Kanti Dutta Pramanik
, Saurabh Pal
, Moutan Mukhopadhyay
, Prasenjit Choudhury
:
Sustainable edge computing with mobile crowd computing: a proof-of-concept with a smart HVAC use case. 23911-23994 - Xinwei Lin, Yubiao Pan, Wenjuan Feng, Huizhen Zhang, Mingwei Lin:
MTDB: an LSM-tree-based key-value store using a multi-tree structure to improve read performance. 23995-24025 - Mojtaba Ahmadian Mahmoudabadi, Mehdi Jafari Shahbazzadeh, Malihe Hashemipour:
ERR-UWSN: energy-efficient and reliable routing for void hole mitigation in underwater wireless sensor networks. 24026-24050 - Dhanya K. Sudhish, Latha R. Nair, Shailesh Sivan:
Hybrid similarity measure-based image indexing and Gradient Ladybug Beetle optimization for retrieval of brain tumor using MRI. 24051-24078 - Sajad Haghzad Klidbary, Mohammad Javadian:
Hardware architecture and memristor-crossbar implementation of type-2 fuzzy system with type reduction and in-situ training. 24079-24105 - Soulmaz Gheisari
, Hamid Shokrzadeh:
LATA: learning automata-based task assignment on heterogeneous cloud computing platform. 24106-24137 - Zhen Zhang, Chen Xu, Kun Liu, Shaohua Xu, Long Huang:
A resource optimization scheduling model and algorithm for heterogeneous computing clusters based on GNN and RL. 24138-24172 - Samia Souror, Mohammed Badawy, Nawal A. El-Fishawy:
Secure query processing for smart grid data using searchable symmetric encryption. 24173-24211 - Rajesh Dwivedi
, Aruna Tiwari, Neha Bharill, Milind B. Ratnaparkhe, Alok Kumar Tiwari:
A taxonomy of unsupervised feature selection methods including their pros, cons, and challenges. 24212-24240 - Siron Anita Susan T., B. Nithya:
Performance evaluation of Cuttlefish optimization-based contention control in Wireless Rechargeable Sensor Network. 24241-24268 - Bahram Rashidi:
APPAs: fast and efficient approximate parallel prefix adders and multipliers. 24269-24296 - Caihua Zhu, Xiaoli Sun, Yuran Li, Zhenfeng Wang, Yan Li:
A hybrid neural network for urban rail transit short-term flow prediction. 24297-24323 - Ziran Zhu, Yilin Li, Miaodi Su, Shu Zhang, Haiyuan Su, Yifeng Xiao, Huan He, Jianli Chen, Yao-Wen Chang:
Subgraph matching-based reference placement for printed circuit board designs. 24324-24357 - Yuzhuo Yao, Yong Zheng, Wei Li:
Efficient MST-based clustering with leader node selection and outlier edge cutting. 24358-24378 - Jie Zhang
, Pengyuan Wang, Nana Cheng, Jingshun Bi:
The dynamic analysis, FPGA implementation, and adaptive synchronization control application of a multi-vortex chaotic system based on nonlinear functions. 24379-24412 - Jichi Liu, Wei Li, Houkun Lyu, Feng Qi:
YOLO-based microglia activation state detection. 24413-24434 - Wei Li, Jingqi Tang, Lei Wang:
Many-objective evolutionary algorithm with multi-strategy selection mechanism and adaptive reproduction operation. 24435-24482 - Ramapati Patra
, Prasenjit Maji
, Dipti Sakshi Srivastava
, Hemanta Kumar Mondal
:
Machine learning-driven performance assessment of network-on-chip architectures. 24483-24519 - Xiao Wang, Lie Dai, Guang Yang:
A network intrusion detection system based on deep learning in the IoT. 24520-24558 - Divya, Niharika Anand, Gaurav Sharma:
Convolutional neural network (CNN) and federated learning-based privacy preserving approach for skin disease classification. 24559-24577 - Bader A. Ali, Hanady M. Abdulsalam, Asil Almonaies, Eman S. AlRoumi:
A cloud-fog distributed trust service for wireless sensor networks. 24578-24604 - Lu Peng, Yiwen Liang, He Yang:
Improved V-detector algorithm based on bagging for earthquake prediction with faults. 24605-24637 - Mohammadjavad Zohrabi, Saeed Saravani, Mostafa Haghir Chehreghani:
Centrality-based and similarity-based neighborhood extension in graph neural networks. 24638-24663 - Mahdi Kherad, Meimanat Dadras, Marjan Mokhtari:
Community detection based on influential nodes in dynamic networks. 24664-24688 - Hemavathy Sriramulu
, J. Kokila, V. S. Kanchana Bhaaskaran:
Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing. 24689-24717 - Haishun Du, Minghao Zhang, Wenzhe Zhang, Kangyi Qiao:
Mscnet: Mask stepwise calibration network for camouflaged object detection. 24718-24737 - Qifan Zhang, Shuming Zhou, Lulu Yang:
Link fault tolerability of 3-ary n-cube based on g-good-neighbor r-component edge-connectivity. 24738-24757 - Yumin Dong, Rui Yan:
A new integrated steganography scheme for quantum color images. 24758-24780 - Yajing Yang, Zeyu Zeng, Shiyun Jiang, Mao Chen, Ruirui Shang:
DEKGCI: A double-ended recommendation model for integrating knowledge graph and user-item interaction graph. 24781-24800 - N. Veni, J. Manjula:
Correction: High-performance visual geometric group deep learning architectures for MRI brain tumor classification. 24801 - Retraction Note: A novel IoT-fog-cloud-based healthcare system for monitoring and predicting COVID-19 outspread. 24802
- Retraction Note: FRHO: Fuzzy rule-based hybrid optimization for optimal cluster head selection and enhancing quality of service in wireless sensor network. 24803
- Retraction Note: An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment. 24804
- Retraction Note: Construction of feature analysis model for demeanor evidence investigation based on data mining algorithm. 24805
Volume 80, Number 17, November 2024
- R. Nirmala, S. Ariffa Begum, A. Selvanayagi, P. Ramya:
VLSI implementation of an energy-efficient color image compressor using improved block truncation coding and enhanced Golomb-rice coding for wireless sensor networks. 24807-24834 - Somayeh Abdi, Mohammad Ashjaei, Saad Mubeen:
Cost-aware workflow offloading in edge-cloud computing using a genetic algorithm. 24835-24870 - Vidyapati Jha
, Priyanka Tripathi:
Conscious points and patterns extraction: a high-performance computing model for knowledge discovery in cognitive IoT. 24871-24907 - Dennis Pinto, José-María Arnau, Marc Riera, José-Lorenzo Cruz, Antonio González:
Exploiting beam search confidence for energy-efficient speech recognition. 24908-24937 - Liangdong Qu, Yingjuan Jia, Xiaoqin Li, Jingkun Fan:
Two-stage control model based on enhanced elephant clan optimization for path planning of unmanned combat aerial vehicle. 24938-24974 - Behnam Rezaei Bezanjani, Seyyed Hamid Ghafouri
, Reza Gholamrezaei:
Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things. 24975-25003 - Arezoo Ghasemi:
MOHHO: multi-objective Harris hawks optimization algorithm for service placement in fog computing. 25004-25028 - (Withdrawn) On connection number-based topological indices and entropy measures for triangular γ-graphyne network. 25029-25048
- Chuanjun Zhao, Xinyi Yang, Xuzhuang Sun, Lihua Shen, Jing Gao, Yanjie Wang:
Enhancing cross-domain sentiment classification through multi-source collaborative training and selective ensemble methods. 25049-25070 - Ahmad Shokrani Baigi, Abdorreza Savadi, Mahmoud Naghibzadeh:
A high-performance dynamic scheduling for sparse matrix-based applications on heterogeneous CPU-GPU environment. 25071-25098 - Qi Zhang, Yuqin Song, Hui Lou:
Tl-depth: monocular depth estimation based on tower connections and Laplacian-filtering residual completion. 25099-25117 - Ramesh Kumar Sahoo, Sateesh Kumar Pradhan, Srinivas Sethi, Siba K. Udgata:
Multiple heterogeneous cluster-head-based secure data collection in mobile crowdsensing environment. 25118-25154 - Radhwan A. A. Saleh, Mustafa Ghaleb, Wasswa Shafik, H. Metin Ertunç:
Efficient white blood cell identification with hybrid inception-xception network. 25155-25187 - Erfan Saberi, Jamshid Pirgazi, Ali Ghanbari Sorkhi
:
A machine learning approach for trading in financial markets using dynamic threshold breakout labeling. 25188-25221 - K. Sundari, A. Senthil Thilak:
A unified vehicle trajectory prediction model using multi-level context-aware graph attention mechanism. 25222-25255 - Xing Zhang, Chenyang Shao, Tianning Li, Ye Yuan, Changda Wang:
GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes. 25256-25282 - Kimia Shirini, Hadi S. Aghdasi, Saeed Saeedvand:
Multi-objective aircraft landing problem: a multi-population solution based on non-dominated sorting genetic algorithm-II. 25283-25314 - Saja Kareem Abed Alzabali, Mostafa Bastam, Ehsan Ataie:
A novel IoT-integrated ensemble learning approach for indoor air quality enhancement. 25315-25344 - Sadegh Fadaei
, Abbas Dehghani, Keyvan RahimiZadeh, Amin Beheshti:
An efficient texture descriptor based on local patterns and particle swarm optimization algorithm for face recognition. 25345-25376 - Bin Zhao, Li Cao, Yilong Gao:
The data transaction reputation evaluation model based on evaluation entity. 25377-25402 - Guangfeng Shen, Weiming Zeng, Jiajun Yang:
Research on migraine classification model based on hypergraph neural network. 25403-25423 - Ching-Sheng Lin:
Dual Siamese transformer-encoder-based network for remaining useful life prediction. 25424-25449 - Yu Liu, Yongcai Ao:
Deformable attention mechanism-based YOLOv7 structure for lung nodule detection. 25450-25469 - Xiao Zhao, Haojie Zheng, Hengzhe Li:
The K1,2-structure-connectivity of graphs. 25470-25483 - Xianguo Li, Yu Zhang, Yi Liu, Xingchen Yao, Xinyi Zhou:
Arbitrary shape text detection fusing InceptionNeXt and multi-scale attention mechanism. 25484-25509 - Riccardo Ceccaroni
, Lorenzo Di Rocco, Umberto Ferraro Petrillo, Pierpaolo Brutti:
A distributed approach for persistent homology computation on a large scale. 25510-25532 - Yuanfa Lu, Ziqiong Lin, Wenjie Zhang, Yifeng Zheng, Jingmin Yang:
Matching with contract-based resource trading in UAV-assisted MEC system. 25533-25562 - Bengong Yu, Zhongyu Shi:
TEMM: text-enhanced multi-interactive attention and multitask learning network for multimodal sentiment analysis. 25563-25589 - Ruizhong Du, Jinru Wu, Yan Gao:
Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things. 25590-25615 - Ömer Atilim Koca, Halime Özge Kabak, Volkan Kiliç:
Attention-based multilayer GRU decoder for on-site glucose prediction on smartphone. 25616-25639 - M. Prakash, K. Ramesh:
ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof. 25640-25667 - Meiting Liu, Wenxin Yu, Zuanbo Zhou:
An accelerated chaotic image secure communication system based on Zynq-7000 platform. 25668-25684 - Alireza Soleimani, Yousef Farhang, Amin Babazadeh Sangar
:
Fusion of deep belief network and SVM regression for intelligence of urban traffic control system. 25685-25709 - Yutaka Watanabe, Miwako Tsuji, Hitoshi Murai, Taisuke Boku, Mitsuhisa Sato:
Correction: Design and performance evaluation of UCX for the Tofu Interconnect D on Fugaku towards efficient multithreaded communication. 25710 - Retraction Note: Adoption of human metabolic processes as Data Quality Based Models. 25711
Volume 80, Number 18, December 2024
- Honghua Jin, Haiyan Wang, Jian Luo:
MS-GD-P: priority-based service deployment for cloud-edge-end scenarios. 25713-25735 - Xiao Wu, Shaobo Li, Xinghe Jiang, Yanqiu Zhou:
Information acquisition optimizer: a new efficient algorithm for solving numerical and constrained engineering optimization problems. 25736-25791 - Yueyue Yang, Qun Fang, Yajing Tang, Yuchen Feng, Yihui Yan, Yong Xu:
A dual boundary robust verification method for neural networks. 25792-25817 - Siwei Wang, Donglin Zhu, Changjun Zhou, Gaoji Sun:
Improved grey wolf algorithm based on dynamic weight and logistic mapping for safe path planning of UAV low-altitude penetration. 25818-25852 - Shengtao Geng, Heng Zhang, Xuncai Zhang:
A hexadecimal scrambling image encryption scheme based on improved four-dimensional chaotic system. 25853-25887 - Lizhi Geng, Dongming Zhou, Kerui Wang, Yisong Liu, Kaixiang Yan:
SiamMGT: robust RGBT tracking via graph attention and reliable modality weight learning. 25888-25910 - Chao Ma, Jiwei Qin, Tao Wang, Aohua Gao:
Degree-aware embedding-based multi-correlated graph convolutional collaborative filtering. 25911-25932 - Omid Rashnodi, Maryam Rastegarpour, Parham Moradi, Azadeh Zamanifar
:
Community detection in attributed social networks using deep learning. 25933-25973 - Diego Teijeiro Paredes, Margarita Amor López, Sandra Buján, Rico Richter, Jürgen Döllner:
Multistage strategy for ground point filtering on large-scale datasets. 25974-26001 - Sina Samadi Gharehveran
, Kimia Shirini, Selma Cheshmeh Khavar, Seyyed Hadi Mousavi, Arya Abdolahi:
Deep learning-based demand response for short-term operation of renewable-based microgrids. 26002-26035 - Khanh Nguyen Quoc, Van Tong, Cuong Dao, Tuyen Ngoc Le, Duc Tran:
Boosted regression for predicting CPU utilization in the cloud with periodicity. 26036-26060 - Wen Wen, Lu Lu, Renchao Xie, Qinqin Tang, Yuexia Fu, Tao Huang:
Secure incentive mechanism for energy trading in computing force networks enabled internet of vehicles: a contract theory approach. 26061-26087 - Sepide Najafli, Abolfazl Toroghi Haghighat, Babak Karasfi:
A novel reinforcement learning-based hybrid intrusion detection system on fog-to-cloud computing. 26088-26110 - Zhen Chen, Wenhui Chen, Xiaowei Liu, Jing Zhao:
CCeACF: content and complementarity enhanced attentional collaborative filtering for cloud API recommendation. 26111-26139 - MohammadSadegh Mohagheghi:
State ordering and classification for analyzing non-sparse large Markov models. 26140-26170 - Vikas Mani, Abhinesh Kaushik:
Three-dimensional DV-Hop based on improved adaptive differential evolution algorithm. 26171-26196 - Hongzhi Li, Peng Zhu, Jiacun Wang, Giancarlo Fortino:
BAPS: a blockchain-assisted privacy-preserving and secure sharing scheme for PHRs in IoMT. 26197-26225 - Yachuang Chai, Jianwu Fang, Haoquan Liang, Wushouer Silamu:
TADS: a novel dataset for road traffic accident detection from a surveillance perspective. 26226-26249 - Yanli Liu, Xun PengFei, Heng Zhang, Naixue Xiong:
HFS: an intelligent heuristic feature selection scheme to correct uncertainty. 26250-26279 - Mahdi Ahmadinia, Mokhtar Abbasi, Parisa Hadi:
An intelligent non-uniform mesh to improve errors of a stable numerical method for time-tempered fractional advection-diffusion equation with weakly singular solution. 26280-26307 - Imane Khalil, Mohammed Alae Chanoui
, Zine El Abidine Alaoui Ismaili, Zouhair Guennoun, Adnane Addaim, Mohammed Sbihi:
Lightweight U-Net based on depthwise separable convolution for cloud detection onboard nanosatellite. 26308-26332 - Musa Osman
, Jingsha He, Nafei Zhu, Fawaz Mahiuob Mohammed Mokbal, Asaad Ahmed:
HADTF: a hybrid autoencoder-decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach. 26333-26362 - Xiaohong Deng, Zhiwei Yu, Weizhi Xiong, Kangting Li, Huiwen Liu:
A novel Raft consensus algorithm combining comprehensive evaluation partitioning and Byzantine fault tolerance. 26363-26393 - Yang Gao, Gang Quan
, Soamar Homsi, Wujie Wen, Liqiang Wang:
Secure and efficient general matrix multiplication on cloud using homomorphic encryption. 26394-26434 - Jianxin Gao, Ying Gao:
GMS: an efficient fully homomorphic encryption scheme for secure outsourced matrix multiplication. 26435-26461 - Tiandi Peng, Yanmin Luo, Zhilong Ou, Jixiang Du, Gonggeng Lin:
Ultra-FastNet: an end-to-end learnable network for multi-person posture prediction. 26462-26482 - Bowen Ling, Xiaoheng Deng, Yuning Huang, Jingjing Zhang, Jinsong Gui, Yurong Qian:
Multi-layer collaborative task offloading optimization: balancing competition and cooperation across local edge and cloud resources. 26483-26511 - Qifan Xue, Feng Yang, Shengyi Li, Xuanpeng Li, Guangyu Li, Weigong Zhang:
CiPN-TP: a channel-independent pretrained network via tokenized patching for trajectory prediction. 26512-26536 - Qi Chen, Yajie Wang, Yunfei Sun:
An improved dung beetle optimizer for UAV 3D path planning. 26537-26567 - Mehaboob Mujawar, S. Manikandan
, Monica Kalbande, Puneet Kumar Aggarwal, Nallam Krishnaiah, Yasin Genc:
Optimizing connectivity: a novel AI approach to assess transmission levels in optical networks. 26568-26588 - Seokjin Lee, Seongryong Kim, Jungeun Kim:
Robustness Analysis of Public Transportation Systems in Seoul Using General Multilayer Network Models. 26589-26613 - Ronita Rezapour, Parvaneh Asghari, Hamid Haj Seyyed Javadi, Shamsollah Ghanbari
:
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing. 26614-26657 - Kamal A. ElDahshan, Gaber E. Abutaleb, Berihan R. Elemary, Ebeid Ali Ebeid, AbdAllah A. AlHabshy
:
An optimized intelligent open-source MLaaS framework for user-friendly clustering and anomaly detection. 26658-26684 - Pijush Kanti Dutta Pramanik
, Saurabh Pal
, Moutan Mukhopadhyay
, Prasenjit Choudhury
:
Correction to: Sustainable edge computing with mobile crowd computing: a proof-of-concept with a smart HVAC use case. 26685-26686
Volume 80, Number 19, December 2024
- Afef Walha, Faiza Ghozzi, Faïez Gargouri:
Data integration from traditional to big data: main features and comparisons of ETL approaches. 26687-26725 - Chenghao Li, Huyin Zhang, Fei Yang, Sheng Hao:
Fast and isolation guaranteed coflow scheduling via traffic forecasting in multi-tenant environment. 26726-26750 - Xianchen Shi, Yian Zhu
, Lian Li:
End-to-end probability analysis method for multi-core distributed systems. 26751-26775 - Shilpi, Arvind Kumar:
Sensor node localization using nature-inspired algorithms with fuzzy logic in WSNs. 26776-26804 - Shahid Zaman, Sadaf Rasheed, Ahmed Alamer:
A quadratic regression model to quantify certain latest corona treatment drug molecules based on coindices of M-polynomial. 26805-26830 - Samira Taheri, Neda Moghim, Naser Movahhedinia, Sachin Shetty:
A centralized delay-sensitive hierarchical computation offloading in fog radio access networks. 26831-26864 - Guangqiu Lv, Chenhui Jin, Zhen Shi, Ting Cui:
Approximating neural distinguishers using differential-linear imbalance. 26865-26889 - Foudil Mir, Farid Meziane
:
Unequal-radius clustering in WSN-based IoT networks: energy optimization and load balancing in UDCOPA protocol. 26890-26921 - Pablo Revuelta Sanz, Antonio Jesús Muñoz-Montoro, Juan De La Torre Cruz, Francisco J. Cañadas-Quesada, José Ranilla:
Noise-tolerant NMF-based parallel algorithm for respiratory rate estimation. 26922-26941 - Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal:
A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks. 26942-26984 - Vivek Tomar
, Nitin Kumar:
Single-sample face and ear recognition using virtual sample generation with 2D local patches. 26985-27010 - Asma Khalid, Shoaib Iqbal, Muhammad Kamran Siddiqui:
NM-polynomial-based topological indices and graph entropies of porphyrazine. 27011-27033 - Ibtissem Mokni, Sonia Yassa:
A multi-objective approach for optimizing IoT applications offloading in fog-cloud environments with NSGA-II. 27034-27072 - Isaac Lera, Carlos Guerrero:
Multi-objective application placement in fog computing using graph neural network-based reinforcement learning. 27073-27094 - Arivarasan Karmegam, Ashish Tomar, Sachin Tripathi:
Blockchain-based cross-domain authentication in a multi-domain Internet of drones environment. 27095-27122 - Yan Lv, Meng Ning, Fan Zhou, Pengfei Lv, Peiying Zhang, Jian Wang:
Real-time microexpression recognition in educational scenarios using a dual-branch continuous attention network. 27123-27146 - Huanle Rao, Sheng Chen, Yuxuan Du, Xiaobin Xu, Haodong Chen, Gangyong Jia:
A container optimal matching deployment algorithm based on CN-Graph for mobile edge computing. 27147-27175 - Monti Babulal Pal, Sanjay Agrawal:
Graph neural network-based attention mechanism to classify spam review over heterogeneous social networks. 27176-27203 - Purnima Khurana, Bhavna Gupta, Ravish Sharma, Punam Bedi:
A sentiment-guided session-aware recommender system. 27204-27243 - Sumera Naz, Aqsa Tasawar, Shariq Aziz Butt, Jorge Díaz-Martínez, Emiro de la Hoz Franco:
An integrated CRITIC-MABAC model under 2-tuple linguistic cubic q-rung orthopair fuzzy information with advanced aggregation operators, designed for multiple attribute group decision-making. 27244-27302 - Sedighe Hedayati, Payam Mahmoudi-Nasr, Sekine Asadi Amiri:
An energy-temperature aware routing protocol in wireless body area network: a fuzzy-based approach. 27303-27339 - Zhicheng Lin, Jun Li, Yongcui Li:
A cloud computing approach to superscale colored traveling salesman problems. 27340-27369 - Ambika Gupta, Suyel Namasudra, Prabhat Kumar:
A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology. 27370-27393
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.