


default search action
Intelligent Automation & Soft Computing, Volume 34
Volume 34, Number 1, 2022
- Hyun Yoo, Kyungyong Chung:

Classification of Multi-Frame Human Motion Using CNN-based Skeleton Extraction. 1-13 - S. Parvathi, S. Umamaheswari

:
Discrete Firefly Algorithm for Optimizing Topology Generation and Core Mapping of Network-on-Chip. 15-32 - S. K. Janarthanan, C. Kathirvel:

Optimized CUK Converter Based 1Φ Grid Tied Photovoltaic System. 33-50 - Debasis Mohapatra, Sourav Kumar Bhoi, Kalyan Kumar Jena, Chittaranjan Mallick, Kshira Sagar Sahoo, N. Z. Jhanjhi

, Mehedi Masud:
Core-based Approach to Measure Pairwise Layer Similarity in Multiplex Network. 51-64 - K. C. Rajeswari, R. S. Mohana, S. Manikandan, S. Beski Prabaharan

:
Speech Quality Enhancement Using Phoneme with Cepstrum Variation Features. 65-86 - Saydul Akbar Murad

, Apurba Adhikary
, Abu Jafar Md Muzahid
, Md. Murad Hossain Sarker, Md. Ashikur Rahman Khan, Md. Bipul Hossain, Anupam Kumar Bairagi, Mehedi Masud, Md. Kowsher:
AI Powered Asthma Prediction Towards Treatment Formulation: An Android App Approach. 87-103 - Valliappan Raman

, Khaled ELKarazle, Patrick H. H. Then:
Gender-specific Facial Age Group Classification Using Deep Learning. 105-118 - Sandeep Kumar, Arpit Jain

, Shilpa Rani, Hammam A. Alshazly, Sahar Ahmed Idris, Sami Bourouis
:
Deep Neural Network Based Vehicle Detection and Classification of Aerial Images. 119-131 - J. Arravinth, D. Manjula:

Multi-Agent with Multi Objective-Based Optimized Resource Allocation on Inter-Cloud. 133-147 - Rongrong Ni

, Xiaofeng Liu, Yizhou Chen, Xu Zhou, Huili Cai, Chu Kiong Loo:
Negative Emotions Sensitive Humanoid Robot with Attention-Enhanced Facial Expression Recognition Network. 149-164 - V. Ravindra Krishna Chandar, M. Thangamani:

False Alarm Reduction in ICU Using Ensemble Classifier Approach. 165-181 - S. Manikandan, P. Dhanalakshmi, K. C. Rajeswari, A. Delphin Carolina Rani:

Deep Sentiment Learning for Measuring Similarity Recommendations in Twitter Data. 183-192 - V. P. Ajay

, M. Nesasudha:
Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks. 193-204 - K. Aruna, G. Pradeep

:
Ant Colony Optimization-based Light Weight Container (ACO-LWC) Algorithm for Efficient Load Balancing. 205-219 - Ling Wang, Shan Ji, Zhaokang Wang, Xiaowan Wang, Ghulam Mohiuddin, Yongjun Ren:

Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data. 221-234 - Ali G. Alkhathami:

A Stacked Ensemble-Based Classifier for Breast Invasive Ductal Carcinoma Detection on Histopathology Images. 235-247 - G. R. Sreekanth, Adel Fahad Alrasheedi

, K. Venkatachalam, Mohamed Abouhawwash
, Sameh S. Askar:
Extreme Learning Bat Algorithm in Brain Tumor Classification. 249-265 - Mani Deepak Choudhry

, B. Aruna Devi, M. Sundarrajan:
Novel Optimized Framework for Video Processing in IoRT Driven Hospitals. 267-278 - Mahdi Souzanchi-K, Mohammad R. Akbarzadeh-Totonchi, Nadia Naghavi, Ali Sharifnezhad, Vahab Khoshdel:

Adaptive Fuzzy Robust Tracking Control Using Human Electromyogram Signals for Elastic Joint Robots. 279-294 - Xinyao Liu, Baojiang Cui, Lantao Xing:

Generating Synthetic Trajectory Data Using GRU. 295-305 - R. Anand Babu

, S. Kannan:
Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method. 307-323 - A. Backia Abinaya, G. Karthikeyan

:
Data Offloading in the Internet of Vehicles Using a Hybrid Optimization Technique. 325-338 - Jenson Jose, Therattil Jose P:

Novel L2CL-LCL Topology for Wireless Power Transmission PMSM Powered Electrical Vehicle. 339-355 - Divya Sharma

, Sanjay Jain, Vivek Maik:
Energy Efficient Clustering and Optimized LOADng Protocol for IoT. 357-370 - Yintong Wang

, Yingjie Yang, Haiyan Chen, Hao Zheng, Heyou Chang:
End-to-end Handwritten Chinese Paragraph Text Recognition Using Residual Attention Networks. 371-388 - M. Murugesan, S. Thilagamani:

Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos. 389-405 - S. Hariharan

, R. Venkatesan:
Background Subtraction in Surveillance Systems Using Local Spectral Histograms and Linear Regression. 407-422 - Gurram Sunitha, M. N. Pushpalatha, Anbusubramanian Parkavi, Prasanthi Boyapati

, Ranjan Walia
, Rachna Kohar, Kashif Qureshi:
Modeling of Chaotic Political Optimizer for Crop Yield Prediction. 423-437 - S. Karthic

, S. Manoj Kumar
:
Wireless Intrusion Detection Based on Optimized LSTM with Stacked Auto Encoder Network. 439-453 - Min Rao, Yufeng Li, Hongye Liu, Isabel Wang, Yongjun Ren:

Influencing Factors Analysis of Rehabilitation for Patients with Spinal Cord Injury. 455-466 - K. Naveen Durai, R. Subha, Anandakumar Haldorai

:
Hybrid Invasive Weed Improved Grasshopper Optimization Algorithm for Cloud Load Balancing. 467-483 - M. L. Ramamoorthy, S. Selvaperumal, G. Prabhakar:

Self-Balancing Vehicle Based on Adaptive Neuro-Fuzzy Inference System. 485-497 - Farah Tawfiq Abdul Hussien

, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab:
A Secure E-commerce Environment Using Multi-agent System. 499-514 - B. Chinthamani, N. S. Bhuvaneswari, R. Senthil Kumar, N. R. Shanker:

Motor Torque Measurement Using Dual-Function Radar Polarized Signals of Flux. 515-530 - Gang Xu, Fan Yun, Xiu-Bo Chen, Shiyuan Xu

, Jingzhong Wang, Tao Shang, Yan Chang, Mianxiong Dong:
Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption. 531-541 - Kanagaraj Prathibanandhi, R. Ramesh, C. Yaashuwanth:

Analysis of Brushless DC Motor Using Enhanced Fopid Controller with ALO Algorithm. 543-557 - R. Punithavathi

, K. Venkatachalam, Mehedi Masud, Mohammed A. Alzain, Mohamed Abouhawwash
:
Crypto Hash Based Malware Detection in IoMT Framework. 559-574 - Vishnu Kumar Kaliappan, Tuan Anh Nguyen

, Dugki Min, Jae-Woo Lee, U. Sakthi
:
Steering Behavior-based Multiple RUAV Obstacle Avoidance Control. 575-591 - Honggeun Ji, Jina Kim, Syjung Hwang, Eunil Park:

Automated Crack Detection via Semantic Segmentation Approaches Using Advanced U-Net Architecture. 593-607 - Wei Fang

, Yu Sha, Meihan Qi, Victor S. Sheng:
Movie Recommendation Algorithm Based on Ensemble Learning. 609-622 - Niraj Kumar

, Vishnu Mohan Mishra, Adesh Kumar:
Smart Grid Security by Embedding S-Box Advanced Encryption Standard. 623-638 - S. Deivanayagi

, P. S. Periasamy:
Computer Aided Coronary Atherosclerosis Plaque Detection and Classification. 639-653 - D. Kothandaraman

, M. Manickam, Ananthakrishnan Balasundaram
, D. Pradeep, A. Arulmurugan, Arun Kumar Sivaraman, Sita Rani
, Barnali Dey, R. Balakrishna:
Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things. 655-666 - D. Banumathy, Osamah Ibrahim Khalaf, Carlos Andrés Tavera Romero

, J. Indra, Dilip Kumar Sharma
:
CAD of BCD from Thermal Mammogram Images Using Machine Learning. 667-685 - Siti Nurul Aqmariah Mohd Kanafiah, Mohd. Yusoff Mashor, Zeehaida Mohamed, Yap Chun Way, Shazmin Aniza Abdul Shukor, Yessi Jusman:

An Intelligent Classification System for Trophozoite Stages in Malaria Species. 687-697
Volume 34, Number 2, 2022
- T. Manojpraphakar, A. Soundarrajan:

Deep Contextual Learning for Event-Based Potential User Recommendation in Online Social Networks. 699-713 - Tamara Al Shloul, Usman Azmat

, Suliman A. Alsuhibany, Yazeed Yasin Ghadi
, Ahmad Jalal, Jeongmin Park:
Smartphone Sensors Based Physical Life-Routine for Health Education. 715-732 - Yurananatul Mangalmurti, Naruemon Wattanapongsakorn:

Practical Machine Learning Techniques for COVID-19 Detection Using Chest X-Ray Images. 733-752 - A. Herald, C. Vennila

:
Errorless Underwater Channel Selection Scheme Using Forward Error Rectification and Modulation. 753-768 - Samirah Alzahrani, A. I. EL-Maghrabi, M. S. Badr:

Another View of Weakly Open Sets Via DNA Recombination. 769-783 - Pankaj Jood

, Sanjeev Kumar Aggarwal, Vikram Chopra:
Adaptive Neuro-Fuzzy Based Load Frequency Control in Presence of Energy Storage Devices. 785-804 - Sriramulu Bojjagani

, D. R. Denslin Brabin
, K. Saravanan:
Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment. 805-819 - P. Kavitha, P. Subha Karuvelam:

A Novel Controller for Microgrid Interactive Hybrid Renewable Power Sources. 821-836 - K. Lavanya

, K. Vimala Devi
, B. R. Tapas Bapu:
Deep Reinforcement Extreme Learning Machines for Secured Routing in Internet of Things (IoT) Applications. 837-848 - Vinay Gautam, Jyoti Rani:

Mango Leaf Stress Identification Using Deep Neural Network. 849-864 - R. S. Jothilakshmi, S. Chitra Selvi

:
Control and Automation of Hybrid Renewable Energy Harvesting System. 865-876 - P. Indra, G. Kavithaa:

Adaptive Resource Allocation Neural Network-Based Mammogram Image Segmentation and Classification. 877-893 - S. Kirubadevi

, S. Sutha:
PMSG Based Wind Energy Conversion System Using Intelligent MPPT with HGRSC Converter. 895-910 - R. Vidhya, T. T. Mirnalinee

:
Hybrid Optimized Learning for Lung Cancer Classification. 911-925 - Jun Wang, Tingjuan Zhang, Yong Cheng, Prof Mingshun Jiang:

Dynamic Selection of Optional Feature for Object Detection. 927-940 - Ahtsham Alam, Syed Ahmed Abdullah, Israr Akhter, Suliman A. Alsuhibany, Yazeed Yasin Ghadi

, Tamara Al Shloul, Ahmad Jalal:
Object Detection Learning for Intelligent Self Automated Vehicles. 941-955 - U. Hari, A. Ruhan Bevi

:
Dark and Bright Channel Priors for Haze Removal in Day and Night Images. 957-967 - S. Aiswarya, R. Gomathi

:
Secured Medical Data Transfer Using Reverse Data Hiding System Through Steganography. 969-982 - R. Saveeth, S. Uma Maheswari:

Crack Detection in Composite Materials Using McrowDNN. 983-1000 - Yingnan Zhao, Peiyuan Ji, Fei Chen, Guanlan Ji, Sunil Kumar Jha

:
Spatio-temporal Model Combining VMD and AM for Wind Speed Prediction. 1001-1016 - M. Manicka Raja

, S. Manoj Kumar
:
Aggregated PSO for Secure Data Transmission in WSN Using Fog Server. 1017-1032 - C. Ajitha, T. Jaya

:
Field Programmable Gate Arrays (FPGA) Based Computational Complexity Analysis of Multicarrier Waveforms. 1033-1048 - J. Rajalakshmi, S. Siva Ranjani

:
Optimal and Energy Effective Power Allocation Using Multi-Scale Resource GOA-DC-EM in DAS. 1049-1063 - Anjani Kumar Singh, Nitish Pathak, Neelam Sharma, Abhishek Gandhar, Shabana Urooj, Swaleha Zubair, Jabeen Sultana, Guthikonda Nagalaxmi:

An Experimental Approach to Diagnose Covid-19 Using Optimized CNN. 1065-1080 - Chunhua Pan, Yi Cao, Jinglong Ren:

Research on the Identification of Hand-Painted and Machine-Printed Thangka Using CBIR. 1081-1091 - S. Velmurugan

, P. Ezhumalai, E. A. Mary Anita:
A Neuro Fuzzy with Improved GA for Collaborative Spectrum Sensing in CRN. 1093-1108 - V. Manimaran

, K. G. Srinivasagan:
Person Re-Identification Using LBPH and K-Reciprocal Encoding. 1109-1121 - S. Jeevitha, K. Valarmathi

:
A Novel Deep Learning Framework for Pulmonary Embolism Detection for Covid-19 Management. 1123-1139 - M. E. Shajini Sheeba, P. Jagatheeswari:

Hybrid Renewable Energy System Using Cuckoo Firefly Optimization. 1141-1156 - Yuping Deng, Tao Wu, Xi Chen, Amir Homayoon Ashrafzadeh:

Multi-Classification and Distributed Reinforcement Learning-Based Inspection Swarm Offloading Strategy. 1157-1174 - Mukhsar

, Ansari Saleh Ahmar
, M. A. El Safty
, Hamed El-Khawaga, M. El Sayed:
Bayesian Convolution for Stochastic Epidemic Model. 1175-1186 - P. L. Joseph Raj, Krishnan Kalimuthu, Sabitha Gauni, C. T. Manimegalai:

Extended Speckle Reduction Anisotropic Diffusion Filter to Despeckle Ultrasound Images. 1187-1196 - Subaselvi Sundarraj

, Gunaseelan Konganathan:
Energy Efficient Mobile Harvesting Scheme for Clustered SDWSN with Beamforming Technique. 1197-1213 - R. Gopi, S. Veena, S. Balasubramanian, D. Ramya, P. Ilanchezhian, A. Harshavardhan, Zatin Gupta

:
IoT Based Disease Prediction Using Mapreduce and LSQN3 Techniques. 1215-1230 - E. Gothai, Surbhi Bhatia

, Aliaa M. Alabdali, Dilip Kumar Sharma
, Bhavana Raj Kondamudi, Pankaj Dadheech
:
Design Features of Grocery Product Recognition Using Deep Learning. 1231-1246 - Nabila Mansouri

, Khalid Sultan
, Aakash Ahmad
, Ibrahim Alseadoon, Adal Alkhalil:
A Deep Learning Framework for COVID-19 Diagnosis from Computed Tomography. 1247-1264 - T. Tamilvizhi, R. Surendran, Carlos Andrés Tavera Romero, Sadish Sendil Murugaraj

:
Privacy Preserving Reliable Data Transmission in Cluster Based Vehicular Adhoc Networks. 1265-1279 - J. Noorul Ameen

, S. Jabeen Begum:
Evolutionary Algorithm Based Adaptive Load Balancing (EA-ALB) in Cloud Computing Framework. 1281-1294 - Alaa Khalid Alduraibi:

A Hybrid Deep Features PSO-ReliefF Based Classification of Brain Tumor. 1295-1309 - Badriya Murdhi Alenzi, Muhammad Badruddin Khan, Mozaherul Hoque Abul Hasanat

, Abdul Khader Jilani Saudagar
, Mohammed Alkhathami, Abdullah AlTameem:
Automatic Annotation Performance of TextBlob and VADER on Covid Vaccination Dataset. 1311-1331 - Che-Chern Lin, Chien-Chun Pan:

Generating Intelligent Remedial Materials with Genetic Algorithms and Concept Maps. 1333-1349 - T. Ragupathi, M. Govindarajan, T. Priyaradhikadevi:

Class Imbalance Handling with Deep Learning Enabled IoT Healthcare Diagnosis Model. 1351-1366 - Himanshu Sharma, Nidhi Gour, Sumit Chakravarty, Fahad Alraddady, Mehedi Masud, Rajneesh Pareek, Arun Kumar

:
Performance Analysis of PTS PAPR Reduction Method for NOMA Waveform. 1367-1375 - P. Anitha

, K. Karthik Kumar, M. Ravindran, A. Saravanaselvan:
Evolutionary Algorithm Based Z-Source DC-DC Boost Converter for Charging EV Battery. 1377-1397 - M. Nisha, M. Germin Nisha:

Optimum Tuning of Photovoltaic System Via Hybrid Maximum Power Point Tracking Technique. 1399-1413
Volume 34, Number 3, 2022
- Huiyu Sun, Ralph Grishman:

Employing Lexicalized Dependency Paths for Active Learning of Relation Extraction. 1415-1423 - Hariprasad Siddharthan

, Thangavel Deepa, N. Bharathiraja:
Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM. 1425-1440 - D. Karthik Prabhu, R. V. Maheswari

, B. Vigneshwaran
:
Deep Learning Based Power Transformer Monitoring Using Partial Discharge Patterns. 1441-1454 - Yazeed Yasin Ghadi

, Israr Akhter, Suliman A. Alsuhibany, Tamara Al Shloul, Ahmad Jalal, Kibum Kim
:
Multiple Events Detection Using Context-Intelligence Features. 1455-1471 - Wei Zhou, Hao Wang, Ghulam Mohiuddin, Dan Chen, Yongjun Ren:

Consensus Mechanism of Blockchain Based on PoR with Data Deduplication. 1473-1488 - Joddat Fatima

, Amina Jameel, Muhammad Usman Akram, Adeel Muzaffar Syed, Malaika Mushtaq
:
Automatic Localization and Segmentation of Vertebrae for Cobb Estimation and Curvature Deformity. 1489-1504 - D. Yuvaraj, S. Shanmuga Priya, M. Braveen

, S. Navaneetha Krishnan, S. Nachiyappan, Abolfazl Mehbodniya, A. Mohamed Uvaze Ahamed, M. Sivaram:
Novel DoS Attack Detection Based on Trust Mode Authentication for IoT. 1505-1522 - May A. Al-Otaibi, Hesham Alhumyani, Saleh Ibrahim

, Alaa M. Abbas:
Efficient Medical Image Encryption Framework against Occlusion Attack. 1523-1536 - T. Vetriselvi, J. Albert Mayan

, K. V. Priyadharshini, K. Sathyamoorthy
, S. Venkata Lakshmi
, P. Vishnu Raja:
Latent Semantic Based Fuzzy Kernel Support Vector Machine for Automatic Content Summarization. 1537-1551 - Daqing Wu, Jiye Cui, Dan Li, Romany Fouad Mansour:

A New Route Optimization Approach of Fresh Agricultural Logistics Distribution. 1553-1569 - M. Kavitha, B. Sankara Babu, B. Sumathy, T. Jackulin, N. Ramkumar, A. Manimaran, Ranjan Walia, S. Neelakandan

:
Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins. 1571-1586 - M. Sangeetha, S. Malathi:

Modeling Metaheuristic Optimization with Deep Learning Software Bug Prediction Model. 1587-1601 - B. Venkatesan, S. Chitra:

Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage. 1603-1615 - M. Vanitha

, C. T. Kalaivani
, J. Kirubakaran, R. Praveena:
Effective Channel Allocation for Hybrid Network Usage Between Wi-Fi and Cellular Network. 1617-1627 - Jiaqi Wang, Jie Zhang, Genlin Ji, Bo Sheng

:
Criss-Cross Attention Based Auto Encoder for Video Anomaly Event Detection. 1629-1642 - R. Meena, V. Thulasi Bai:

Depression Detection on COVID 19 Tweets Using Chimp Optimization Algorithm. 1643-1658 - Ashit Kumar Dutta, Yasser Albagory

, Farhan M. Obesat, Anas Waleed Abulfaraj:
Chaotic Krill Herd with Fuzzy Based Routing Protocol for Wireless Networks. 1659-1674 - E. P. Kannan, S. S. Vinsley

, T. V. Chithra:
Medical Image Demosaicing Based Design of Newton Gregory Interpolation Algorithm. 1675-1691 - A. Jameer Basha

, N. Rajkumar, Mohammed A. Alzain, Mehedi Masud, Mohamed Abouhawwash
:
Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data. 1693-1706 - Jianquan Ouyang

, Jing Zhang, Tianming Liu:
Attention Weight is Indispensable in Joint Entity and Relation Extraction. 1707-1723 - Vijaya Krishna Sonthi

, Nagarajan S, N. Krishnaraj:
Deep Learning Based Residual Network Features for Telugu Printed Character Recognition. 1725-1736 - Wen-Tsai Sung

, Sung-Jung Hsiao:
Intelligent Measurement and Monitoring by Integrating Fieldbus and Robotic Arm. 1737-1753 - Maganti Srinivas

, M. Ramesh Patnaik:
Energy-Efficient Secure Adaptive Neuro Fuzzy Based Clustering Technique for Mobile Adhoc Networks. 1755-1767 - K. Sudharson

, S. Arun:
Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm. 1769-1784 - Liutao Zhao, Jiawan Zhang, Hairong Jing:

Blockchain-Enabled Digital Rights Management for Museum-Digital Property Rights. 1785-1801 - R. S. Latha, K. Venkatachalam, Jehad F. Al-Amri, Mohamed Abouhawwash

:
Shrinkage Linear with Quadratic Gaussian Discriminant Analysis for Big Data Classification. 1803-1818 - Henry Ugochukwu Ukwu

, Kamil Yurtkan:
4D Facial Expression Recognition Using Geometric Landmark-based Axes-angle Feature Extraction. 1819-1838 - J. Praveenchandar, A. Tamilarasi

:
Resource Allocation Using Phase Change Hyper Switching Algorithm in the Cloud Environment. 1839-1850 - B. Gomathi, S. T. Suganthi, T. N. Prabhu, Andriy Kovalenko

:
Multi-Objective Immune Algorithm for Internet of Vehicles for Data Offloading. 1851-1860 - Weijian Zhang, Hao Wang, Hao Hua, Qirun Wang:

Selfish Mining and Defending Strategies in the Bitcoin. 1861-1875 - Kavitha Chinniyan, Thamil Vani Samiyappan, Aishvarya Gopu, Narmatha Ramasamy:

Image Steganography Using Deep Neural Networks. 1877-1891 - N. Sureka

, K. Gunaseelan:
Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm. 1893-1906 - Sakorn Mekruksavanich

, Anuchit Jitpattanakul:
Sport-Related Activity Recognition from Wearable Sensors Using Bidirectional GRU Network. 1907-1925 - S. Rajagopal, T. Ramakrishnan, S. Vairaprakash:

Anatomical Region Detection Scheme Using Deep Learning Model in Video Capsule Endoscope. 1927-1941 - Wenwu Tan, Jianjun Zhang, Jiang Wu, Hao Lan, Xing Liu, Ke Xiao, Li Wang, Haijun Lin, Guang Sun, Peng Guo:

Application of CNN and Long Short-Term Memory Network in Water Quality Predicting. 1943-1958 - S. Rajeswari, S. A. Arunmozhi, Y. Venkataramani:

Optimized Reinforcement Learning Based Multipath Transfer Protocol in Wireless Mesh Network. 1959-1970 - Wen-Tsai Sung

, Ching-Hao Weng, Sung-Jung Hsiao:
Smart Greenhouse Control via NB-IoT. 1971-1988 - Anil Sharma

, Suresh Kumar
:
Shallow Neural Network and Ontology-Based Novel Semantic Document Indexing for Information Retrieval. 1989-2005 - Arpit Jain

, Adesh Kumar, Anand Prakash Shukla, Hammam A. Alshazly, Hela Elmannai, Abeer D. Algarni, Roushan Kumar, Jitendra Yadav
:
Smart Communication Using 2D and 3D Mesh Network-on-Chip. 2007-2021 - Chenxi Yu, Xin Li:

SSAG-Net: Syntactic and Semantic Attention-Guided Machine Reading Comprehension. 2023-2034 - P. Thilagavathi

, S. Karthikeyan:
Adaptive Multicale Transformation Run-Length Code-Based Test Data Compression in Benchmark Circuits. 2035-2050 - Hani A. Albalawi

, Ahmed M. Kassem, Sherif A. Zaid, Abderrahim Lakhouit, Muhammed A. Arshad:
Energy Management of an Isolated Wind/Photovoltaic Microgrid Using Cuckoo Search Algorithm. 2051-2066 - P. Ramadevi

, K. N. Baluprithviraj, V. Ayyem Pillai, Kamalraj Subramaniam:
Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems. 2067-2081 - K. Muthulakshmi

, N. Krishnaraj, R. S. Ravi Sankar, A. Balakumar, S. Kanimozhi, B. Kiruthika:
A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems. 2083-2096 - Ashit Kumar Dutta, Basit Qureshi

, Yasser Albagory
, Majed Alsanea
, Anas Waleed Abulfaraj, Abdul Rahaman Wahab Sait
:
Glowworm Optimization with Deep Learning Enabled Cybersecurity in Social Networks. 2097-2110

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














