


default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 14
Volume 14, Number 1, January 2023
- Ramón Hervás, Oresti Baños, Claudia Villalonga:
Ambient intelligence for self-care and self-management. 1-3 - Jesús Fontecha
, Iván González
, José Bravo:
A usability study of a mHealth system for diabetes self-management based on framework analysis and usability problem taxonomy methods. 5-15 - Wendy Sánchez
, Alicia Martínez
, Yasmín Hernández
, Hugo Estrada
, Miguel González-Mendoza
:
A predictive model for stress recognition in desk jobs. 17-29 - Sergio Salomón
, Cristina Tîrnauca
, Rafael Duque
, José Luis Montaña
:
User identification from mobility traces. 31-40 - Adrián Macías
, Jesus Ramos, Concepción Valdez
, Ignacio Garcia, Gabael Paez, Karina Caro
, Luís A. Castro
:
Mobile monitoring parents' behaviors for supporting self-management in children with disabilities. 41-52 - Shuai Zhang
, Wing W. Y. Ng
, Jianjun Zhang, Chris D. Nugent
, Naomi Irvine, Ting Wang:
Evaluation of radial basis function neural network minimizing L-GEM for sensor-based activity recognition. 53-63 - Iyubanit Rodriguez
, Pedro O. Rossel
, Marcelo Fernández
, Carolina Fuentes
, Alberto León
, Valeria Herskovic
:
InMyDay: a study on input styles for a digital diary for older users. 65-74 - Álvaro Sánchez-Picot
, Diego Martín, Borja Bordel, Ramón Alcarria:
Processing semantic IoT data using a prosumer approach for simulating scenarios on ambient intelligence environments. 75-86 - Serhat Kiliçarslan
:
PSO + GWO: a hybrid particle swarm optimization and Grey Wolf optimization based Algorithm for fine-tuning hyper-parameters of convolutional neural networks for Cardiovascular Disease Detection. 87-97 - Mehdi Hosseinzadeh, Elham Azhir, Omed Hassan Ahmed, Marwan Yassin Ghafour, Sarkar Hasan Ahmed, Amir Masoud Rahmani, Bay Vo:
Data cleansing mechanisms and approaches for big data analytics: a systematic study. 99-111 - Mahmoud Khaled Abd-Ellah
, Ashraf A. M. Khalaf
, Reda R. Gharieb, Dina A. Hassanin:
Automatic diagnosis of common carotid artery disease using different machine learning techniques. 113-129 - Orieb AbuAlghanam, Hadeel Alazzam
, Esraa Alhenawi
, Mohammad Qatawneh, Omar Adwan:
Fusion-based anomaly detection system using modified isolation forest for internet of things. 131-145 - Sofia Yousuf Sheikh
, Muhammad Taha Jilani
:
A ubiquitous wheelchair fall detection system using low-cost embedded inertial sensors and unsupervised one-class SVM. 147-162 - Li Xu
, Xin Yan, Weiyue Ding, Zechao Liu:
Attribution rollout: a new way to interpret visual transformer. 163-173 - Mahima Thakur, Samiappan Dhanalakshmi
, Harisudha Kuresan
, Ramalingam Senthil, R. Narayanamoorthi
, Khin Wee Lai:
Automated restricted Boltzmann machine classifier for early diagnosis of Parkinson's disease using digitized spiral drawings. 175-189 - Dehu Xiao, Yong Wang, Zhuo Cheng, Tianye Huang
, Jun Yan:
Optimized neural network based path planning for searching indoor pollution source. 191-205 - Nabil Abdelkader Nouri
, Zibouda Aliouat
, Abdenacer Naouri, Soufiene Ali Hassak:
Accelerated PSO algorithm applied to clients coverage and routers connectivity in wireless mesh networks. 207-221 - Francesco Ferracuti
, Alessandro Freddi
, Sabrina Iarlori
, Sauro Longhi
, Andrea Monteriù, Camillo Porcaro
:
Augmenting robot intelligence via EEG signals to avoid trajectory planning mistakes of a smart wheelchair. 223-235 - Gulshan Soni
, Kandasamy Selvaradjou:
A dynamic allocation scheme of scheduled slots for real-time heterogenous traffic in IEEE 802.15.6 standard for scheduled access mechanism. 237-256 - Zehuan Qiu, Yifan Zhu:
Traceability anti-counterfeiting system based on the ownership of edge computing on the blockchain. 257-270 - Maryam Taghizadeh, Abdolah Chalechale
, Ali Jannesari
:
A region proposal algorithm using texture similarity and perceptual grouping. 271-288 - Raffaele Guarasci
, Stefano Silvestri
, Giuseppe De Pietro, Hamido Fujita
, Massimo Esposito:
Assessing BERT's ability to learn Italian syntax: a study on null-subject and agreement phenomena. 289-303 - Ramesh Vatambeti
, Shridhar Sanshi, D. Pramodh Krishna
:
An efficient clustering approach for optimized path selection and route maintenance in mobile ad hoc networks. 305-319 - Rupali Bhardwaj
:
Hiding patient information in medical images: an enhanced dual image separable reversible data hiding algorithm for E-healthcare. 321-337 - Princy Ann Thomas
, K. Preetha Mathew:
A broad review on non-intrusive active user authentication in biometrics. 339-360 - Sreelakshmi Koolikkara Madom Krishnamoorthy, Amit Dua, Shashank Gupta
:
Role of emerging technologies in future IoT-driven Healthcare 4.0 technologies: a survey, current challenges and future directions. 361-407 - Somia Sahraoui
, Nabil Henni:
SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks. 409-429 - Sanjoy Chakraborty
, Apu Kumar Saha
, Sushmita Sharma, Ratul Chakraborty, Sudhan Debnath:
A hybrid whale optimization algorithm for global optimization. 431-467 - N. Kumar, M. Gupta, Deepali Gupta
, S. Tiwari:
Novel deep transfer learning model for COVID-19 patient detection using X-ray chest images. 469-478 - Santanu Roy
, Devikalyan Das, Shyam Lal, Jyoti R. Kini:
Novel edge detection method for nuclei segmentation of liver cancer histopathology images. 479-496 - Yanni Yang, Huansheng Song
, ShiJie Sun, Yan Chen, Xinyao Tang, Qin Shi:
A feature temporal attention based interleaved network for fast video object detection. 497-509 - Tariq Ahamed Ahanger
, Munish Bhatia, Abdulaziz Aldaej
:
Game theory-based performance assessment of police personnel. 511-526 - Belhassen Akrout
, Walid Mahdi
:
A novel approach for driver fatigue detection based on visual characteristics analysis. 527-552 - Amine Boulemtafes
, Abdelouahid Derhab, Nassim Ait Ali Braham, Yacine Challal
:
Privacy-preserving remote deep-learning-based inference under constrained client-side environment. 553-566 - Nuno Ferrete Ribeiro
, Pedro Mouta, Cristina P. Santos:
Two kinematic data-based approaches for cane event detection. 567-579 - Minjie Li
, Jian Wang:
The productivity effects of two-way FDI in China's logistics industry based on system GMM and GWR model. 581-595 - Anat Ratnovsky
, Sarit Malayev, Shahar Ratnovsky, Sara Naftali
, Neta Rabin
:
EMG-based speech recognition using dimensionality reduction methods. 597-607 - Sriramulu Bojjagani
, V. N. Sastry, Chien-Ming Chen
, Saru Kumari, Muhammad Khurram Khan
:
Systematic survey of mobile payments, protocols, and security infrastructure. 609-654 - Golbarg Hajian, Behrouz Shahgholi Ghahfarokhi
, Mehri Asadi Vasfi, Behrouz Tork Ladani
:
Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring. 655-675 - Daniel Cabrera-Paniagua
, Rolando Rubilar-Torrealba
:
Affective autonomous agents for supporting investment decision processes using artificial somatic reactions. 677-696
Volume 14, Number 2, February 2023
- Saumya Bansal
, Niyati Baliyan
:
ShillDetector: a binary grey wolf optimization technique for detection of shilling profiles. 697-710 - Abdulhamit Subasi
, Sengul Dogan
, Turker Tuncer:
A novel automated tower graph based ECG signal classification method with hexadecimal local adaptive binary pattern and deep learning. 711-725 - Fariba Salehi, Mohammad Reza Keyvanpour, Arash Sharifi
:
$\hbox {S}^{2}$CFC: semi-supervised collaborative fuzzy clustering method. 727-753 - Lingqiu Zeng, Hongtao Zhang, Qingwen Han
, Yunyang Tang, Lei Ye, Yuping Wu, Hui Zu:
An LSTM-based driving operation suggestion method for riding comfort-oriented critical zone. 755-771 - Yavuz Özgüven, Süleyman Eken
:
Distributed messaging and light streaming system for combating pandemics. 773-787 - Tao Ning
, Yiming Huang:
Low carbon emission management for flexible job shop scheduling: a study case in China. 789-805 - Le Zhang, Jinsong Wang, Zhiyong An:
Vehicle recognition algorithm based on Haar-like features and improved Adaboost classifier. 807-815 - Gholamreza Hesamian, Mohammad Ghasem Akbari
:
Support vector logistic regression model with exact predictors and fuzzy responses. 817-828 - Wenkui Jin
, Renke He:
An exploratory study of fit assessment of the virtual reality glasses. 829-838 - Kangshun Li, Ziming Wang
, Xin Yao, Jiahao Liu, Hongming Fang, Yishu Lei:
Recidivism early warning model based on rough sets and the improved K-prototype clustering algorithm and a back propagation neural network. 839-851 - Saraju Prasad Padhy, Madhusmita Panda
, Srinivas Sethi
, Aruna Tripathy:
Design of hybrid topologies using higher order sectorisation for performance enhancement of 5G radio access network. 853-862 - Lin Shaodan
, Kexin Zhu
, Chen Feng, Zhide Chen:
Align-Yolact: a one-stage semantic segmentation network for real-time object detection. 863-870 - Pandillapalli Amaranatha Reddy, Munaga Hazarath Murali Krishna Prasad:
High Utility Item-set Mining from retail market data stream with various discount strategies using EGUI-tree. 871-882 - S. M. Bhagya P. Samarakoon
, M. A. Viraj J. Muthugala
, Mohan Rajesh Elara
:
Toward obstacle-specific morphology for a reconfigurable tiling robot. 883-895 - Zhongda Tian
:
Analysis and research on chaotic dynamics behaviour of wind power time series at different time scales. 897-921 - Haodong Sun, Yanyan Chen, Yang Wang, Xiaoming Liu:
Trip purpose inference for tourists by machine learning approaches based on mobile signaling data. 923-937 - Preksha Pareek
, Ankit Thakkar
:
RGB-D based human action recognition using evolutionary self-adaptive extreme learning machine with knowledge-based control parameters. 939-957 - V. Noel Jeygar Robert
, K. Vidya
:
Genetic algorithm optimized fuzzy decision system for efficient data transmission with deafness avoidance in multihop cognitive radio networks. 959-972 - Ao Ding
, Yuan Zhang, Lei Zhu, Hongfeng Li, Lei Huang:
Intelligent recognition of rough handling of express parcels based on CNN-GRU with the channel attention mechanism. 973-990 - Heba Aly
, Sherin M. Youssef
:
Bio-signal based motion control system using deep learning models: a deep learning approach for motion classification using EEG and EMG signal fusion. 991-1002 - Saroja Subbaraj
, Revathi Thiyagarajan
, Madavan Rengaraj:
A smart fog computing based real-time secure resource allocation and scheduling strategy using multi-objective crow search algorithm. 1003-1015 - Xun Liu
, Fangyuan Lei, Guoqing Xia:
MulStepNET: stronger multi-step graph convolutional networks via multi-power adjacency matrix combination. 1017-1026 - Harmandeep Kaur
, Munish Kumar
:
Signature identification and verification techniques: state-of-the-art work. 1027-1045 - Shiv Prakash Bihari, Pradip Kumar Sadhu:
SLDB controller based 31 level MLI for grid-connected hybrid renewable energy sources. 1047-1059 - Yanan Liu, Jingyu Li, Dongbin Xu, Hongyan Meng, Jing Dong, Tianyu Zhao, Li Tang, He Zou:
Auxiliary diagnosis of small tumor in mammography based on deep learning. 1061-1069 - Yongbin Shi, Zhenlong Hu:
Recognizing the take-off action pattern of basketball players based on fuzzy neural network system. 1071-1081 - Yanjun Zhu, Zhisheng Wu
, Cuirong Liu:
Six-degree-of-freedom manipulator wireless control system based on Internet of Things. 1083-1092 - Anjali Atul Bhandakkar, Lini Mathew:
A novel MDA2LO technique for load flow analysis with hybrid power flow controller. 1093-1107 - Mohsen Askarzadeh, Majid Haghparast
, Sam Jabbehdari
:
Power consumption reduction in built-in self-test circuits. 1109-1122 - Dogun Kim
, Jaeho Choi, Sangyoon Ahn, Eunil Park:
A smart home dental care system: integration of deep learning, image sensors, and mobile controller. 1123-1131 - Omar AlZoubi
, Buthina AlMakhadmeh, Muneer O. Bani Yassein, Wail Mardini:
Detecting naturalistic expression of emotions using physiological signals while playing video games. 1133-1146 - Naeem Jan
, Tahir Mahmood
, Lemnaouar Zedam, Lazim Abdullah, Kifayat Ullah:
Analysis of double domination by using the concept of spherical fuzzy information with application. 1147-1162 - Laith Abualigah
, Ali Diabat, Mohamed Abd Elaziz:
Improved slime mould algorithm by opposition-based learning and Levy flight distribution for global optimization and advances in real-world engineering problems. 1163-1202 - Rajiv Senapati
:
LTE-advanced cell capacity estimation model and algorithm for voice service. 1203-1216 - Majid Arasteh
, Somayeh Alizadeh
, Chi-Guhn Lee
:
Gravity algorithm for the community detection of large-scale network. 1217-1228 - Sha Fu
, Hangjun Zhou, Ye-Zhi Xiao:
Research on information system assets risk assessment and defense decision-making. 1229-1241 - Durmus Özkan Sahin
, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç
:
A novel Android malware detection system: adaption of filter-based feature selection methods. 1243-1257 - Ersin Kiliç
, Serkan Ozturk:
An accurate car counting in aerial images based on convolutional neural networks. 1259-1268 - Jialan Liu
, Hongquan Gui, Chi Ma
:
Digital twin system of thermal error control for a large-size gear profile grinder enabled by gated recurrent unit. 1269-1295 - Nitha C. Velayudhan, A. Anitha, Mukesh Madanan:
Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC. 1297-1309
Volume 14, Number 3, March 2023
- Fengyi Ai, Lihong Zhang:
Incentive mechanism system of the management of IC design enterprises. 1311-1322 - Anurag Barthwal
, Debopam Acharya
, Divya Lohani
:
Prediction and analysis of particulate matter (PM2.5 and PM10) concentrations using machine learning techniques. 1323-1338 - Jorge Juan-González
, Arturo S. García
, José Pascual Molina
, Víctor López-Jaquero
, Elena Navarro
, Dulce Romero-Ayuso
, Pascual González
:
UrbanRehab: a virtual urban scenario design tool for rehabilitating instrumental activities of daily living. 1339-1358 - Thirumoorthy Karpagalingam
, K. Muneeswaran:
An application of text mining techniques and outcome based education: student recruitment system. 1359-1371 - Harish Garg
, Dimple Rani:
New prioritized aggregation operators with priority degrees among priority orders for complex intuitionistic fuzzy information. 1373-1399 - Salima Lamsiyah
, Abdelkader El Mahdaouy
, Said Ouatik El Alaoui
, Bernard Espinasse:
Unsupervised query-focused multi-document summarization based on transfer learning from sentence embedding models, BM25 model, and maximal marginal relevance criterion. 1401-1418 - Sulin Pang
, Min Wei, Jinmeng Yuan, Bangzhu Zhu, Zhiming Wen:
WT combined early warning model and applications for loaning platform customers default prediction in smart city. 1419-1430 - R. Vinoth
, Lazarus Jegatha Deborah
:
An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. 1431-1443 - S. Dilipkumar
, M. Durairaj:
Epilson Swarm Optimized Cluster Gradient and deep belief classifier for multi-attack intrusion detection in MANET. 1445-1460 - Dongliang Zhang:
Storage optimization algorithm design of cloud computing edge node based on artificial intelligence technology. 1461-1471 - Saeed Mian Qaisar
, Syed Fawad Hussain
:
An effective arrhythmia classification via ECG signal subsampling and mutual information based subbands statistical features selection. 1473-1487 - Nesrine Mezhoudi
, Rawan Alghamdi, Rim Aljunaid, Gomathi Krichna
, Dilek Düstegör
:
Employability prediction: a survey of current approaches, research challenges and applications. 1489-1505 - Palash Dutta
, Gourangajit Borah:
Multicriteria decision making approach using an efficient novel similarity measure for generalized trapezoidal fuzzy numbers. 1507-1529 - Sneha Sharma
, Rinki Gupta
, A. Kumar:
Continuous sign language recognition using isolated signs data and deep transfer learning. 1531-1542 - Piyush Rawat
, Siddhartha Chauhan
:
A survey on clustering protocols in wireless sensor network: taxonomy, comparison, and future scope. 1543-1589 - Osama S. Faragallah, Hala S. El-sayed
, Walid El Shafai:
Efficient opto MVC/HEVC cybersecurity framework based on arnold map and discrete cosine transform. 1591-1606 - Taimur Hassan
, Samet Akçay, Mohammed Bennamoun
, Salman Khan, Naoufel Werghi:
Unsupervised anomaly instance segmentation for baggage threat recognition. 1607-1618 - Mukku Nisanth Kartheek
, Munaga V. N. K. Prasad, Raju Bhukya:
Radial mesh pattern: a handcrafted feature descriptor for facial expression recognition. 1619-1631 - Poria Pirozmand, Mehdi Sadeghilalimi
, Ali Asghar Rahmani Hosseinabadi, Fatemeh Sadeghilalimi, Seyedsaeid Mirkamali, Adam Slowik
:
A feature selection approach for spam detection in social networks using gravitational force-based heuristic algorithm. 1633-1646 - Jun-Liu Zhong, Yan-Fen Gan, Ji-Xiang Yang:
A fast forgery frame detection method for video copy-move inter/intra-frame identification. 1647-1658 - Lei Zhang
, Meina Chen, De-sheng Liu, Jing Li:
Moving without association: an association shifting scheme for protecting destination. 1659-1674 - Vahid Jafari, Mohammad Hossein Rezvani
:
Joint optimization of energy consumption and time delay in IoT-fog-cloud computing environments using NSGA-II metaheuristic algorithm. 1675-1698 - L. S. Suma, Hareendran S. Anand, S. S. Vinod Chandra
:
Nature inspired optimization model for classification and severity prediction in COVID-19 clinical dataset. 1699-1711 - Pratap Kumar Behera
, Sugata Gangopadhyay:
Evolving bijective S-Boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties. 1713-1730 - Pooja Mishra
, Chiranjeev Bhaya
, Arup Kumar Pal, Abhay Kumar Singh:
A medical image cryptosystem using bit-level diffusion with DNA coding. 1731-1752 - Wei Li, Gai-Ge Wang
:
Improved elephant herding optimization using opposition-based learning and K-means clustering to solve numerical optimization problems. 1753-1784 - Yee Siang Gan, Sze-Teng Liong
, Danna Zheng, Yiyang Xia, Shuli Wu, Mengchen Lin, Yen-Chang Huang:
Detection and localization of defects on natural leather surfaces. 1785-1799 - Abdullah Sevin
, Abdu Ahmed Osman Mohammed:
A survey on software implementation of lightweight block ciphers for IoT devices. 1801-1815 - Sonal Jain, Ramesh Dharavath
:
Memetic salp swarm optimization algorithm based feature selection approach for crop disease detection system. 1817-1835 - Osama S. Faragallah, Ensherah A. Naeem, Walid El Shafai, Noha Ramadan, Hossam Eldin H. Ahmed, Mustafa M. Abd El-nabi, Ibrahim F. Elashry, Said E. El-Khamy, Fathi E. Abd El-Samie:
Efficient chaotic-Baker-map-based cancelable face recognition. 1837-1875 - Aolei Yang
, Wei Lu, Wasif Naeem, Ling Chen, Minrui Fei:
A sequence models-based real-time multi-person action recognition method with monocular vision. 1877-1887 - Fei Gao
, Mingming Zhou, Libo Weng, Shufang Lu:
An automatic verification method for vehicle line-pressing violation based on CNN and geometric projection. 1889-1901 - Bei Pan, Kaoru Hirota, Zhiyang Jia
, Linhui Zhao, Xiaoming Jin, Yaping Dai:
Multimodal emotion recognition based on feature selection and extreme learning machine in video clips. 1903-1917 - Yogendra Arya
:
ICA assisted FTIλDN controller for AGC performance enrichment of interconnected reheat thermal power systems. 1919-1935 - (Withdrawn) Improving the reconstruction of dental occlusion using a reconstructed-based identical matrix point technique. 1937-1950
- S. Priya
, S. Selvakumar
, R. Leela Velusamy:
Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks. 1951-1975 - Sagar Pande
, Aditya Khamparia, Deepak Gupta
:
Feature selection and comparison of classification algorithms for wireless sensor networks. 1977-1989 - Pankaj Kumar Mishra, Shashi Kant Verma:
EEFMCP: energy efficient fuzzy logic-based multi-clustering protocol. 1991-2005 - Bharathi Garimella
, G. V. S. N. R. V. Prasad, M. H. M. Krishna Prasad:
Churn prediction using optimized deep learning classifier on huge telecom data. 2007-2028 - Sridevi Hosmani
, Basavaraj Mathapati:
R2SCDT: robust and reliable secure clustering and data transmission in vehicular ad hoc network using weight evaluation. 2029-2046 - Vinay Kehar
, Vinay Chopra:
Visibility restoration of remote sensing images using dynamic multi-objective differential evolution. 2047-2059 - Simi Venuji Renuka, Damodar Reddy Edla
, Justin Joseph
:
An inverse mathematical technique for improving the sharpness of magnetic resonance images. 2061-2075 - Xinyu Qian, Xinning Li, Zhiping Zhou:
An efficient privacy-preserving approach for data publishing. 2077-2093 - Susanna Spinsante
, Angelica Poli, Jordi Mongay Batalla, Piotr Krawiec, Ciprian Dobre, Lidia Bajenaru, Constandinos X. Mavromoustakis, Costas S. Costantinou, Gregor Molan, Anna Marie Herghelegiu, Gabriel Ioan Prada
, Rozeta Draghici
, Horacio González-Vélez
:
Clinically-validated technologies for assisted living. 2095-2116 - Anzhong Huang, Ya Bu, Ai-Jun Li:
The market efficiency and the sustainable development of Chinese microcredit: analyses based on DEA. 2117-2124 - Dongyun Lin
, Yiqun Li, Shudong Xie, Tin Lay Nwe, Sheng Dong:
DDR-ID: dual deep reconstruction networks based image decomposition for anomaly detection. 2125-2139 - K. Harish Kumar, K. Srinivas
:
Preliminary performance study of a brief review on machine learning techniques for analogy based software effort estimation. 2141-2165 - Indu Bala
, Kiran Ahuja:
Energy-efficient framework for throughput enhancement of cognitive radio network by exploiting transmission mode diversity. 2167-2184 - Hariharan Bhagavathi, Siva Rathinavelayatham
, Kaliraj Shanmugaiah, P. N. Senthil Prakash
:
ABSO: an energy-efficient multi-objective VM consolidation using adaptive beetle swarm optimization on cloud environment. 2185-2197 - Juan Uribe-Toril
, José Luis Ruiz-Real
, Alejandro Galindo Durán
, Jaime De Pablo Valenciano
:
How to use Google street view for a time-lapse data collection methodology: potential uses for retailing. 2199-2209 - Yu-Shan Li, Ping-Feng Pai
, Ying-Lei Lin:
Forecasting inflation rates be extreme gradient boosting with the genetic algorithm. 2211-2220 - Asli Emine Ertugrul, Ramazan Sahin
:
EMSRtrc: relaxation of booking limits by total revenue control for expected marginal seat revenue. 2221-2231 - Shuyuan Qiu, Dechang Pi, Yanxue Wang, Tongtong Xu:
SGTP: A Spatiotemporal Generalized Trajectory Publishing Method With Differential Privacy. 2233-2247 - Nashat Alrefai
, Othman Ibrahim, Hafiz Muhammad Faisal Shehzad
, Abdelrahman Altigani, Waheeb Abu-ulbeh, Malek Alzaqebah
, Mutasem K. Alsmadi:
An integrated framework based deep learning for cancer classification using microarray datasets. 2249-2260 - Qifa Xu, Dongdong Wu, Cuixia Jiang
, Xiangxiang Wang:
A composite quantile regression long short-term memory network with group lasso for wind turbine anomaly detection. 2261-2274 - Kai Zhou, Zhiyong Ni, Yongcheng Yin, Bo Yang, Tianhua Li, Jialin Hou
:
Study of the strategy for agricultural machinery maintenance in China based on the improved genetic-bee colony algorithm. 2275-2289 - Wiktoria Wilkowska
, Julia Offermann
, Liane Colonna, Francisco Flórez Revuelta
, Pau Climent-Pérez
, Alex Mihailidis
, Angelica Poli
, Susanna Spinsante
, Martina Ziefle
:
Interdisciplinary perspectives on privacy awareness in lifelogging technology development. 2291-2312 - Elangovan Ramanujam, Thinagaran Perumal
:
MLMO-HSM: Multi-label Multi-output Hybrid Sequential Model for multi-resident smart home activity recognition. 2313-2325 - N. Pazhaniraja, S. Sountharrajan
, E. Suganya, M. Karthiga
:
Optimizing high-utility item mining using hybrid dolphin echolocation and Boolean grey wolf optimization. 2327-2339 - Rodrigo Simon Bavaresco
, Jorge Luis Victória Barbosa
:
Ubiquitous computing in light of human phenotypes: foundations, challenges, and opportunities. 2341-2349 - Miguel Ángel Sánchez-Cifo
, Francisco Montero
, María T. López
:
A methodology for emotional intelligence testing in elderly people with low-cost EEG and PPG devices. 2351-2367 - Souvik Bera
, Gauri Shanker Gupta
, Deepak Kumar, S. Shiva Kumar
, Karunesh Kumar Gupta:
LSTM-UKF framework for an effective global land-ocean index temperature prediction. 2369-2384 - Shihui Wang
, Min Zhao, Dihua Sun, Zhongcheng Liu:
A cooperative on-ramp merging strategy based on the hybrid of centralized and distributed interaction for heterogeneous vehicles. 2385-2397 - Chang Guo, Dechang Pi, Jianjun Cao, Xixuan Wang, Hao Liu:
Early warning model for industrial internet platform based on graph neural network and time convolution network. 2399-2412 - Saikat Basu
, Sudipta Saha, Sourav Das, Rajlaksmi Guha, Jayanta Mukherjee, Manjunatha Mahadevappa:
Assessment of attention and working memory among young adults using computer games. 2413-2428 - Khushboo Singh
, Mitul Kumar Ahirwal, Manish Pandey
:
Quaternary classification of emotions based on electroencephalogram signals using hybrid deep learning model. 2429-2441 - Tam V. Nguyen
, Shreyas Raghunath, Kim Anh Phung
, Tom Ongwere, Minh-Triet Tran:
Revisiting natural user interaction in virtual world. 2443-2453 - Mehdi Khashei, Negar Bakhtiarvand:
A discrete intelligent classification methodology. 2455-2465 - Nehru Kandasamy
, Nagarjuna Telagam, K. Chitra
:
Design of novel low power architectures of 4:2, 5:2 compressors and 2-bit counter using 7 nm FinFET technology. 2467-2479 - Nishtha Ahuja, Shailender Kumar
:
Mul-FaD: attention based detection of multiLingual fake news. 2481-2491 - Chin-Ling Chen
, Zi-Yi Lim, Hsien-Chou Liao:
Blockchain-based alcoholic beverages supply chain management system. 2493-2523 - Afshin Heshmati, Majid Bayat
, Mohammad-Ali Doostari, Seyed Morteza Pournaghi:
Blockchain based authentication and access verfication scheme in smart home. 2525-2547 - Yukun Shao, Jia Zhou
, Weibin Wang:
Smartphone touch gesture for right-handed older adults: touch performance and offset models. 2549-2566 - Vijayakumar Kondepogu
, Budhaditya Bhattacharyya
:
A novel sparse multipath channel estimation model in OFDM system using improved Krill Herd-deep neural network. 2567-2583 - GuoLiang Zhong, WenXin Yu
, JunNian Wang, Yanming Zhao:
Event-triggered sliding mode observer based on particle swarm optimization for fault detection of the doubly fed induction generator for wind power systems. 2585-2599 - Khushi Gupta, Arshdeep Singh, Sreenivasa Reddy Yeduri, M. B. Srinivas, Linga Reddy Cenkeramaddi
:
Hand gestures recognition using edge computing system based on vision transformer and lightweight CNN. 2601-2615 - Xiaoguang Zhou, Yanan Chen
:
Multi-attribute decision-making method based on bipolar N-soft expert set. 2617-2630 - Nasir N. Hurrah
, Ekram Khan, Uzma Khan:
CADEN: cellular automata and DNA based secure framework for privacy preserving in IoT based healthcare. 2631-2643 - Abhinav Narula, Naveen Kumar Vaegae
:
Development of CNN-LSTM combinational architecture for COVID-19 detection. 2645-2656 - N. Bagheri Rad, Javad Behnamian
:
Multi-objective collaborative job shop scheduling in a dynamic environment: Non-dominated sorting memetic algorithm. 2657-2671 - Fengzhen Jiang, Xiaoni Shi
:
Research on the emotional contagions by residents and the role of government intervention in the renovation of Chinese community-built environment. 2673-2690 - Deepshikha Lodhi
, Sudhir Bhaskar, Sarthak Singhal:
Quad port wheel shaped superwideband MIMO antenna. 2691-2707 - Akshat Chaturvedi, Sanjeev Sharma
, Rekh Ram Janghel:
Detection of external defects in tomatoes using deep learning. 2709-2721 - Amparo S. Betancourt Tarifa, Claudio Marrocco, Mario Molinara
, Francesco Tortorella, Alessandro Bria
:
Transformer-based mass detection in digital mammograms. 2723-2737 - Soudamini Behera
, Sasmita Behera
, Ajit Kumar Barisal:
Dynamic economic emission dispatch including electric vehicles' demand management and vehicle to grid support considering physical constraints. 2739-2757 - Soon-Hong Hwang
, Sungha Woo
, Jong-Min Lim
, Byung-Kwon Min
:
Real-time hand ownership decision in egocentric view using kinematic approach. 2759-2769 - Tamal Biswas
, Diptendu Bhattacharya, Gouranga Mandal:
Dynamic strategy to use optimum memory space in real-time video surveillance. 2771-2784 - Jiaqi Jiang, Yunchun Zhang
:
A pyramid stripe pooling-based convolutional neural network for malware detection and classification. 2785-2796 - Kai Yang, Ni An, Xiaoting Shang, Weiqiao Wang, Haifeng Zhang:
Uncertain retailer-led supply chain contract design under asymmetric delivery reliability information: sequential ordering and pricing decisions. 2797-2809 - Babul P. Tewari
:
Frame aggregation aware cluster based association management for heterogeneous users. 2811-2826 - Kaja Fjørtoft Ystgaard
, Luigi Atzori, David Palma
, Poul Einar Heegaard, Lene Elisabeth Bertheussen, Magnus Rom Jensen, Katrien De Moor
:
Review of the theory, principles, and design requirements of human-centric Internet of Things (IoT). 2827-2859 - Yuhua Qin, Haoran Liu
, Yanhong Sun, Mingru Dong, Rongrong Yin:
Asymmetric ranging algorithm based on signal emergence angle for underwater wireless sensor network. 2861-2871 - Mohammad Jabari, Khosro Rezaee
, Manizhe Zakeri
:
Fusing handcrafted and deep features for multi-class cardiac diagnostic decision support model based on heart sound signals. 2873-2885 - Karabo Jenga, Cagatay Catal
, Gorkem Kar
:
Machine learning in crime prediction. 2887-2913 - Rohit Kumar Tiwari
, Rakesh Kumar, Gaurav Baranwal, Rajkumar Buyya:
Decision making framework for heterogeneous QoS information: an application to cloud service selection. 2915-2934 - Titus Issac
, Salaja Silas, Elijah Blessing Rajsingh:
Modelling a P-System inspired multi-objective centralized heterogeneous wireless outdoor illumination. 2935-2950 - Praveen Kumar Donta
, Satish Narayana Srirama
, Tarachand Amgoth, Chandra Sekhara Rao Annavarapu:
iCoCoA: intelligent congestion control algorithm for CoAP using deep reinforcement learning. 2951-2966 - Shan Zhao, Lefeng Zhang
, Ping Xiong
:
PriFace: a privacy-preserving face recognition framework under untrusted server. 2967-2979 - Ismail Zahraddeen Yakubu
, M. Murali:
An efficient meta-heuristic resource allocation with load balancing in IoT-Fog-cloud computing environment. 2981-2992 - Bassant Tolba
, Ahmed H. Abd El-Malek, Mohammed Abo-Zahhad, Maha Elsabrouty:
Meta-transfer learning for super-resolution channel estimation. 2993-3001
Volume 14, Number 4, April 2023
- Mohammad Ayoub Khan, Norah Saleh Alghamdi
:
A neutrosophic WPM-based machine learning model for device trust in industrial internet of things. 3003-3017 - Lihua Cai
, Laura E. Barnes, Mehdi Boukhechba:
Designing adaptive passive personal mobile sensing methods using reinforcement learning framework. 3019-3040 - Charles Cousyn
, Kévin Bouchard, Sébastien Gaboury:
Web-based objects detection to discover key objects in human activities. 3041-3056 - Harry Wechsler
:
Immunity and security using holism, ambient intelligence, triangulation, and stigmergy. 3057-3074 - Michal Pawlowski, Piotr Nowak
:
Stochastic approach to model spot price and value forward contracts on energy markets under uncertainty. 3075-3089 - Praphula Kumar Jain
, Waris Quamer
, Rajendra Pamula
, Vijayalakshmi Saravanan:
SpSAN: Sparse self-attentive network-based aspect-aware model for sentiment analysis. 3091-3108 - Mario Casillo
, Francesco Colace, Dajana Conte, Marco Lombardi
, Domenico Santaniello, Carmine Valentino
:
Context-aware recommender systems and cultural heritage: a survey. 3109-3127 - Jordan J. Bird
, Anikó Ekárt
, Diego R. Faria
:
Chatbot Interaction with Artificial Intelligence: human data augmentation with T5 and language transformer ensemble for text classification. 3129-3144 - R. Kavitha Lakshmi
, Nickolas Savarimuthu:
DPD-DS for plant disease detection based on instance segmentation. 3145-3155 - Ali Dabba
, Abdelkamel Tari, Samy Meftali:
A new multi-objective binary Harris Hawks optimization for gene selection in microarray data. 3157-3176 - Xuemei Zhao
:
Implementation of English ICAI MOOC system based on BP neural network. 3177-3186 - Xin Zhu, Chunchun Chen, Yunyao Hu:
Smart city community governance system based on online and offline aggregation services. 3187-3197 - Kyle Ross
, Paul Hungler, Ali Etemad:
Unsupervised multi-modal representation learning for affective computing with multi-corpus wearable data. 3199-3224 - Amin Einipour, Mohammad Mosleh
, Karim Ansari-Asl
:
EinImpute: a local and gene-based approach to imputation of dropout events in ScRNA-seq data. 3225-3237 - Shimpy Goyal, Rajiv Singh
:
Detection and classification of lung diseases for pneumonia and Covid-19 using machine and deep learning techniques. 3239-3259 - Ali Olow Jimale
, Mohd Halim Mohd Noor
:
Subject variability in sensor-based activity recognition. 3261-3274 - Serdar Koçak, Yusuf Tansel Iç
, Kumru Didem Atalay, Mustafa Sert, Berna Dengiz:
The development of a reviewer selection method: a multi-level hesitant fuzzy VIKOR and TOPSIS approaches. 3275-3302 - D. Stalin David
:
Enhanced glaucoma detection using ensemble based CNN and spatially based ellipse fitting curve model. 3303-3314 - Xuedong He
, Lu Zhao, Calvin Yu-Chian Chen
:
Variable scale learning for visual object tracking. 3315-3330 - Julio Torres-Tello
, Seok-Bum Ko
:
Interpretability of artificial intelligence models that use data fusion to predict yield in aeroponics. 3331-3342 - Jingfeng Zhao, Yan Li
:
Influence of emotional expression in online comments on consumers' perception. 3343-3352 - Zhiyong Huang, Wen-cheng Qin, Fen Luo, Tianhui Guan, Fang Xie, Shu Han, Daming Sun:
Combination of validity aggregation and multi-scale feature for person re-identification. 3353-3368 - Amineh Naseri
, Ali Rezaei Nasab
:
Automatic identification of minerals in thin sections using image processing. 3369-3381 - Ali Köseoglu
, Ridvan Sahin
:
Correlation coefficients of simplified neutrosophic multiplicative sets and their applications in clustering analysis. 3383-3404 - Yi Liu
, Ya Qin, Fang Liu
, Yuan Rong
:
GIBWM-MABAC approach for MAGDM under multi-granularity intuitionistic 2-tuple linguistic information model. 3405-3421 - Kanchan Sharma
, Surender K. Grewal
:
Optimization of throughput for free space optical communication system in presence of atmospheric turbulence and pointing error. 3423-3439 - Sitender
, Seema Bawa, Munish Kumar
, Sangeeta
:
A comprehensive survey on machine translation for English, Hindi and Sanskrit languages. 3441-3474 - C. T. Poomagal
, G. A. Sathish Kumar, Deval Mehta:
Revisiting the ECM-KEEM protocol with Vedic multiplier for enhanced speed on FPGA platforms. 3475-3485 - Lavanya Settipalli
, G. R. Gangadharan
:
Provider profiling and labeling of fraudulent health insurance claims using Weighted MultiTree. 3487-3508 - Ali Mohammadzadeh
, Mohammad Masdari:
Scientific workflow scheduling in multi-cloud computing using a hybrid multi-objective optimization algorithm. 3509-3529 - Angelo Gaeta
, Francesco Orciuoli, Mimmo Parente:
An emotion-driven virtual counselling system in computer-mediated communication. 3531-3549 - Ahmad Hameed, Muhammad Umer
, Umair Hafeez, Hassan Mustafa, Sohaib Ahmed, Muhammad Abubakar Siddique, Hamza Ahmad Madni
:
Skin lesion classification in dermoscopic images using stacked Convolutional Neural Network. 3551-3565 - Bhushan Yelure
, Shefali Sonavane
:
SARP: secure routing protocol using anonymous authentication in vehicular Ad-hoc networks. 3567-3581 - Chang-Shing Lee
, Mei-Hui Wang, Wen-Kai Kuan, Sheng-Hui Huang, Yi-Lin Tsai, Zong-Han Ciou, Chen-Kang Yang, Naoyuki Kubota:
BCI-based hit-loop agent for human and AI robot co-learning with AIoT application. 3583-3607 - Monika Bansal, Munish Kumar
, Monika Sachdeva, Ajay Mittal:
Transfer learning for image classification using VGG19: Caltech-101 image data set. 3609-3620 - Adam Bignold, Francisco Cruz
, Matthew E. Taylor, Tim Brys, Richard Dazeley, Peter Vamplew, Cameron Foale
:
A conceptual framework for externally-influenced agents: an assisted reinforcement learning review. 3621-3644 - Beniamino Di Martino
, Antonio Esposito, Luigi Colucci Cante
:
Multi agents simulation of justice trials to support control management and reduction of civil trials duration. 3645-3657 - Pratik Bhowal
, Subhankar Sen, Ram Sarkar
:
A two-tier feature selection method using Coalition game and Nystrom sampling for screening COVID-19 from chest X-Ray images. 3659-3674 - Walid El Shafai, Ezz El-Din Hemdan:
Robust and efficient multi-level security framework for color medical images in telehealthcare services. 3675-3690 - Jaber Taghizadeh
, Mostafa Ghobaei-Arani
, Ali Shahidinejad
:
An efficient data replica placement mechanism using biogeography-based optimization technique in the fog computing environment. 3691-3711 - Arif Ullah
, Nazri Mohd Nawi:
An improved in tasks allocation system for virtual machines in cloud computing using HBAC algorithm. 3713-3726 - (Withdrawn) Energy harvesting IoT devices for sports person health monitoring. 3727-3738
- Kamlesh Kumar Rana, Sachin Tripathi, Ram Shringar Raw
:
Directional antenna-enabled multi-hop directional location routing in vehicular ad-hoc networks. 3739-3753 - Mahsa Zahiri, Javad Mohammadzadeh
, Sasan Harifi
:
An improved Girvan-Newman community detection algorithm using trust-based centrality. 3755-3766 - Isaac Lozano-Osorio
, Jesús Sánchez-Oro, Abraham Duarte, Oscar Cordón
:
A quick GRASP-based method for influence maximization in social networks. 3767-3779 - Jamimamul Bakas
, Ruchira Naskar
, Michele Nappi, Sambit Bakshi
:
Object-based forgery detection in surveillance video using capsule network. 3781-3791 - Sonika Dahiya, Anjana Gosain:
A novel type-II intuitionistic fuzzy clustering algorithm for mammograms segmentation. 3793-3808 - Mona Chalaki, Hesam Omranpour
:
Epileptic seizure classification using ConvLSTM deep classifier and rotation short-time Fourier Transform. 3809-3825 - Syahril Ramadhan Saufi
, Muhammad Firdaus Isham, Zair Asrar Bin Ahmad
, Muhammad Danial Bin Abu Hasan:
Machinery fault diagnosis based on a modified hybrid deep sparse autoencoder using a raw vibration time-series signal. 3827-3838 - Alberto Giaretta
, Amy Loutfi:
On the people counting problem in smart homes: undirected graphs and theoretical lower-bounds. 3839-3851 - Qasim Majeed
, Abdolhossein Fathi
:
A novel method to enhance color spatial feature extraction using evolutionary time-frequency decomposition for presentation-attack detection. 3853-3865 - Han Tang:
Uncertain chemical reaction equation with delay. 3867-3874 - Musavarah Sarwar
:
Decision making model for design concept evaluation based on interval rough integrated cloud VIKOR. 3875-3897 - B. Palani Rajan, A. Jana Shree, K. Rathnakannan
:
Binarized neural network with depth imaging techniques for stock return direction prediction. 3899-3912 - Devansh Srivastav
, Prakash Srivastava:
A two-tier hybrid ensemble learning pipeline for intrusion detection systems in IoT networks. 3913-3927 - Chetan Nimba Aher
, Ajay Kumar Jena:
Improved invasive weed bird swarm optimization algorithm (IWBSOA) enabled hybrid deep learning classifier for diabetic prediction. 3929-3945 - B. Vijay Kumar:
Application of internet of things (IOT) for optimal energy management in distribution system using hybrid strategy: a SPOA-RBFNN strategy. 3947-3961 - Amir Javadpour, AmirHossein Nafei, Forough Ja'fari, Pedro Pinto
, Weizhe Zhang, Arun Kumar Sangaiah
:
An intelligent energy-efficient approach for managing IoE tasks in cloud platforms. 3963-3979 - Fatemeh Zahedi, Mohammad Reza Mollahoseini Ardakani
, Ahmad Heidary-Sharifabad:
DSPVR: dynamic SFC placement with VNF reuse in Fog-Cloud Computing using Deep Reinforcement Learning. 3981-3994 - Wei Wang, Cihan Asci, Wenxin Zeng
, Sameer Sonkusale
:
Zero-power screen printed flexible RFID sensors for Smart Home. 3995-4004 - Adnan Fayyaz Ud Din, Imran Mir, Faiza Gul, Suhail Akhtar:
Development of reinforced learning based non-linear controller for unmanned aerial vehicle. 4005-4022 - Minoru Dhananjaya Jayakody Arachchige, Marwan Nafea
, Hermawan Nugroho:
A hybrid EEG and head motion system for smart home control for disabled people. 4023-4038 - Wahyu Pamungkas
, Titiek Suryani, Wirawan, Achmad Affandi, Ridho Ananda, Jans Hendry:
An improved method to detect coherence time in wireless communications channel based on auto correlation functions. 4039-4055 - Debapratim Das Dawn
, Abhinandan Khan
, Soharab Hossain Shaikh
, Rajat Kumar Pal
:
A dataset for evaluating Bengali word sense disambiguation techniques. 4057-4086 - Lucia Cascone
, Michele Nappi, Fabio Narducci
, Sara Linda Russo:
Classification of fragments: recognition of artistic style. 4087-4097 - Matta Mani Sankar
, Kalyan Chatterjee:
A posteriori multiobjective techno-economic accommodation of DGs in distribution network using Pareto optimality and TOPSIS approach. 4099-4114 - Sherief Hashima
, Mostafa M. Fouda, Kohei Hatano, Hany Kasban, Ehab Mahmoud Mohamed:
Dual objective bandit for best channel selection in hybrid band wireless systems. 4115-4125 - Noor Rehman, Abbas Ali, Kostaq Hila:
Generalized fuzzy rough sets based on (β, δ)-fuzzy similarity relation and their application to emergency management. 4127-4155 - Debadatta Naik
, Dharavath Ramesh
, Naveen Babu Gorojanam:
Enhanced link prediction using sentiment attribute and community detection. 4157-4174 - Faiza Gul, Imran Mir, Suleman Mir:
Aquila Optimizer with parallel computing strategy for efficient environment exploration. 4175-4190 - Shuanglong Yao
, Dechang Pi:
A new relational reflection graph convolutional network for the knowledge representation. 4191-4200 - Mali Shrikant Deelip, Govinda Kannayaram:
Exponential-sunflower optimization and deep convolution neural network for secure routing and prediction in internet of things. 4201-4220 - Chandini Avula Gopalakrishna, Prabhugoud I. Basarkod:
Patient centric pre-transaction signature verification assisted smart contract based blockchain for electronic healthcare records. 4221-4235 - Mohammad Faraji Mehmandar
, Sam Jabbehdari
, Hamid Haj Seyyed Javadi:
Fuzzy Q-learning approach for autonomic resource provisioning of IoT applications in fog computing environments. 4237-4255 - Naila Aslam, Ohoud Alzamzami, Kewen Xia, Saima Sadiq, Muhammad Umer
, Carmen Bisogni
, Imran Ashraf:
Improving the review classification of Google apps using combined feature embedding and deep convolutional neural network model. 4257-4272 - Fei Gao, Hanlin Zhang
, Jie Lin, Hansong Xu, Fanyu Kong, Guoqiang Yang:
A verifiable and privacy-preserving framework for federated recommendation system. 4273-4287 - Shathanaa Rajmohan
, N. Ramasubramanian:
Improved Symbiotic organisms search for path planning of unmanned combat aerial vehicles. 4289-4311 - Poria Pirozmand, Hoda Jalalinejad, Ali Asghar Rahmani Hosseinabadi
, Seyedsaeid Mirkamali, Yingqiu Li:
An improved particle swarm optimization algorithm for task scheduling in cloud computing. 4313-4327 - A. Baskar
, T. Gireesh Kumar, Sathishkumar Samiappan:
A vision system to assist visually challenged people for face recognition using multi-task cascaded convolutional neural network (MTCNN) and local binary pattern (LBP). 4329-4341 - Peichun Weng, Shuai Dong, Li Ren, Kun Zou
:
Local feature graph neural network for few-shot learning. 4343-4354 - Ahmad Ghiasi
, Abdulhamid Zahedi
, Saeed Haghiri:
Linear fragmentation Morris-Lecar realization using new exponential module instead of hyperbolic function in FPGA implementation. 4355-4370 - Priyanka Ganesan
, J. Senthil Kumar
, S. T. Veena
:
Deep learning based video surveillance for predicting vehicle density in real time scenario. 4371-4383 - Zefeng Jiang, Runyu Cao, Shanxin Zhang
:
Joint optimization strategy of offloading in multi-UAVs-assisted edge computing networks. 4385-4399 - A. Monika, Eswari Rajagopal:
An ensemble-based stegware detection system for information hiding malware attacks. 4401-4417 - Giuseppe D'Aniello
:
Fuzzy logic for situation awareness: a systematic review. 4419-4438 - Said Karam
, Shanq-Jang Ruan, Qazi Mazhar ul Haq, Lieber Po-Hung Li
:
Episodic memory based continual learning without catastrophic forgetting for environmental sound classification. 4439-4449 - Chandrakant Mallick
, Sarojananda Mishra, Manas Ranjan Senapati:
A cooperative deep learning model for fake news detection in online social networks. 4451-4460 - Sami Ullah
, Ghulam Abbas, Muhammad Waqas
, Ziaul Haq Abbas, Zahid Halim:
Multi-hop emergency message dissemination through optimal cooperative forwarder in grid-based 5G-VANETs. 4461-4476 - Mengchao Zhang, Ningxia Sun, Yuan Zhang, Manshan Zhou, Yang Shen, Hao Shi
:
A centernet-based direct detection method for mining conveyer belt damage. 4477-4487 - Anay Ghosh, Bibhas Chandra Dhara, Chiara Pero
, Saiyed Umer
:
A multimodal sentiment analysis system for recognizing person aggressiveness in pain based on textual and visual information. 4489-4501 - Sahar Khalafi, Nasser Ghadiri
, Milad Moradi
:
A hybrid deep learning approach for phenotype prediction from clinical notes. 4503-4513 - Linfei Yin
, Lichun Chen, Zhipeng Su, Yu Li:
Sine cosine-K-means hybrid algorithm for dynamic traction load classification of high-speed rail. 4515-4527 - Saeid Pourroostaei Ardakani
, Nanjiang Du
, Chenhong Lin, Jiun-Chi Yang, Zhuoran Bi, Lejun Chen:
A federated learning-enabled predictive analysis to forecast stock market trends. 4529-4535 - Banafsj Khalifa, Zaher Al Aghbari, Ahmed M. Khedr
:
CAPP: coverage aware topology adaptive path planning algorithm for data collection in wireless sensor networks. 4537-4549 - Romany Fouad Mansour
:
Multimodal biomedical image retrieval and indexing system using handcrafted with deep convolution neural network features. 4551-4560 - Masood Ibni Nazir
, Yawar Irshad, Ikhlaq Hussain, Aijaz Ahmad:
Experimental implementation of optimally tuned multifunctional RLMLS driven VSC tied to single phase voltage weak distribution grid. 4561-4572 - Malvika Singh
, Babu M. Mehtre, S. Sangeetha, Venu Govindaraju
:
User Behaviour based Insider Threat Detection using a Hybrid Learning Approach. 4573-4593 - Varun Gupta
:
Wavelet transform and vector machines as emerging tools for computational medicine. 4595-4605 - Hebatullah Sakr, Maha Elsabrouty
:
Meta-reinforcement learning for edge caching in vehicular networks. 4607-4619 - Ardashir Mohammadzadeh
, Behnam Firouzi:
A new path following scheme: safe distance from obstacles, smooth path, multi-robots. 4621-4633
Volume 14, Number 5, May 2023
Special Issue on Advanced information hiding techniques for industrial applications
- Amit Kumar Singh, Stefano Berretti, Huimin Lu:
Guest Editorial: Advanced information hiding techniques for industrial applications. 4635-4638 - Mohamed Abdel Hameed
, Omar A. Abdel-Aleem
, M. Hassaballah
:
A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. 4639-4657 - Rishabh Gupta, Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh:
A differential approach and deep neural network based data privacy-preserving model in cloud environment. 4659-4674 - Sakshiwala, Maheshwari Prasad Singh:
A new framework for multi-scale CNN-based malignancy classification of pulmonary lung nodules. 4675-4683 - Katarzyna Prokop
, Dawid Polap
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
Blockchain-based federated learning with checksums to increase security in Internet of Things solutions. 4685-4694 - Amin Ul Haq
, Jian Ping Li, Rajesh Kumar, Zafar Ali, Inayat Khan, Muhammad Irfan Uddin
, Bless Lord Y. Agbley
:
MCNN: a multi-level CNN model for the classification of brain tumors in IoT-healthcare system. 4695-4706 - Swati Nigam, Rajiv Singh
, Manoj Kumar Singh
, Vivek Kumar Singh:
Multiview human activity recognition using uniform rotation invariant local binary patterns. 4707-4725 - Yasar Majib, Mahmoud Barhamgi, Behzad Momahed Heravi, Sharadha Kariyawasam, Charith Perera
:
Detecting anomalies within smart buildings using do-it-yourself internet of things. 4727-4743 - Deepraj Chowdhury, Ajoy Dey, Ritam Garai, Subhrangshu Adhikary
, Ashutosh Dhar Dwivedi
, Uttam Ghosh, Waleed S. Alnumay:
DeCrypt: a 3DES inspired optimised cryptographic algorithm. 4745-4755 - Satendra Pal Singh, Gaurav Bhatnagar
:
Robust and efficient hashing framework for industrial surveillance. 4757-4769 - Giancarlo Fortino, Claudia Greco
, Antonella Guzzo, Michele Ianni
:
Identification and prediction of attacks to industrial control systems using temporal point processes. 4771-4783 - Muhammad Zia
, M. Faisal Amjad, Zafar Iqbal, Abdul Rehman Javed, Thippa Reddy Gadekallu
:
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy. 4785-4794 - Shradha Verma, Tripti Goel
, Muhammad Tanveer, Weiping Ding, Rahul Sharma
, R. Murugan:
Machine learning techniques for the Schizophrenia diagnosis: a comprehensive review and future research directions. 4795-4807 - Vandana Bharti
, Bhaskar Biswas, Kaushal Kumar Shukla:
MDO: a novel murmuration-flight based dispersive optimization algorithm and its application to image security. 4809-4826 - Huiqi Zhao, Gao-Yuan Liu
, Huayi Sun, Guangyuan Zhong, Shanchen Pang, Sibo Qiao, Zhihan Lv:
An enhanced intrusion detection method for AIM of smart grid. 4827-4839 - Durgesh Singh
, Sandeep Sambhaji Udmale
, Sanjay Kumar Singh
:
Integer wavelet transform based an effective fragile watermarking scheme for exact authentication and restoration. 4841-4852 - Daya Sagar Gupta
, Nabajyoti Mazumdar, Amitava Nag, Jyoti Prakash Singh:
Secure data authentication and access control protocol for industrial healthcare system. 4853-4864
Special Issue on Internet of things for everyday living: ubiquitous intelligence at Scale
- George Okeyo, Liming Chen, Chengsheng Pan, Lingmei Wang:
Cover feature: guest editors' introduction title: internet of things for everyday living: ubiquitous intelligence at Scale. 4865-4868 - Abdul Rehman Javed
, Mirza Omer Beg, Muhammad Asim
, Thar Baker
, Ali Hilal Al-Bayatti:
AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes. 4869-4882 - Rita Zgheib
, Stein Kristiansen, Emmanuel Conchon
, Thomas Plagemann, Vera Goebel, Rémi Bastide
:
A scalable semantic framework for IoT healthcare applications. 4883-4901 - Shiyang Wu, Andrew Charles Mallory Austin
, Ameer Ivoghlian, Akshat Bisht, Kevin I-Kai Wang
:
Long range wide area network for agricultural wireless underground sensor networks. 4903-4919 - Edison Pignaton de Freitas
, Joanna Isabelle Olszewska, Joel Luís Carbonera, Sandro Rama Fiorini, Alaa M. Khamis
, S. Veera Ragavan, Marcos E. Barreto
, Edson Prestes, Maki K. Habib
, Signe A. Redfield, Abdelghani Chibani, Paulo J. S. Gonçalves
, Julita Bermejo-Alonso
, Ricardo Sanz
, Elisa Tosello, Alberto Olivares Alarcos
, Andréa Aparecida Konzen, João Quintas, Howard Li:
Ontological concepts for information sharing in cloud robotics. 4921-4932 - Claudio Tomazzoli
, Simone Scannapieco
, Matteo Cristani
:
Internet of Things and artificial intelligence enable energy efficiency. 4933-4954 - Melchizedek I. Alipio
, Kathlyn Mae T. Peñalosa, Julioh Roscoe C. Unida:
In-store customer traffic and path monitoring in small-scale supermarket using UWB-based localization and SSD-based detection. 4955-4969 - Essa Q. Shahra
, Wenyan Wu
:
Water contaminants detection using sensor placement approach in smart water networks. 4971-4986 - Ching-Hu Lu
, Chi-Hsien Liu, Zhi-Hong Chen:
Secure and efficient firmware update for increasing IoT-enabled smart devices. 4987-5000 - Munish Bhatia, Sandeep K. Sood
, Vaishali Sood:
A novel quantum-inspired solution for high-performance energy-efficient data acquisition from IoT networks. 5001-5020 - Maria Saleemi
, Maria Anjum, Mariam Rehman:
Ubiquitous healthcare: a systematic mapping study. 5021-5046 - Ibrahim Ahmed Al-Baltah
, Abdul Azim Abdul Ghani, Ghilan Mohammed Al-Gomaei, Fua'ad Hassan Abdulrazzak, Abdulmonem Ali Al Kharusi:
A scalable semantic data fusion framework for heterogeneous sensors data. 5047-5066 - Devender Kumar
, Siddharth Jain, Aasif Khan, Pranav Sarv Pathak
:
An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things. 5067-5083 - Mehdi Hosseinzadeh, Jalil Koohpayehzadeh, Marwan Yassin Ghafour, Aram Mahmood Ahmed, Parvaneh Asghari
, Alireza Souri
, Hamid Pourasghari, Aziz Rezapour:
An elderly health monitoring system based on biological and behavioral indicators in internet of things. 5085-5095 - R. H. Aswathy, N. Malarvizhi:
A design of lightweight ECC based cryptographic algorithm coupled with linear congruential method for resource constraint area in IoT. 5097-5106 - Giridhar Urkude
, Manju Pandey:
Contextual triple inference using a semantic reasoner rule to reduce the weight of semantically annotated data on fail-safe gateway for WSN. 5107-5121 - Fariba Farahbakhsh, Ali Shahidinejad
, Mostafa Ghobaei-Arani
:
Context-aware computation offloading for mobile edge computing. 5123-5135 - Igor Duric
, Dusan Barac
, Zorica Bogdanovic
, Aleksandra Labus
, Bozidar Radenkovic
:
Model of an intelligent smart home system based on ambient intelligence and user profiling. 5137-5149 - Avneet Kaur
, Munish Bhatia:
Stochastic game network based model for disaster management in smart industry. 5151-5169 - Ramesh Chandra Poonia, Vaibhav Bhatnagar:
Design of decision support system to identify crop water need. 5171-5178 - Ankush Manocha, Gulshan Kumar, Munish Bhatia
, Amit Sharma
:
IoT-inspired machine learning-assisted sedentary behavior analysis in smart healthcare industry. 5179-5192 - Elham Fazel
, Ali Shayan, Mohammad Mahmoudi Maymand:
Designing a model for the usability of fog computing on the internet of things. 5193-5209 - Mehdi Gheisari
, Amir Javadpour, Jiechao Gao, Aaqif Afzaal Abbasi, Quoc-Viet Pham
, Yang Liu
:
PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things. 5211-5223 - Noorshella Binti Che Nawi, Abdullah Al Mamun
, Noorul Azwin Md Nasir, Muhammad Khalilur Rahman:
Analyzing customer acceptance of the internet of things (IoT) in the retail industry. 5225-5237 - Qingjuan Li, Huansheng Ning
, Lingfeng Mao, Liming Chen
:
Using model's temporal features and hierarchical structure for similar activity recognition. 5239-5248 - Munish Bhatia, Simranpreet Kaur, Sandeep K. Sood
:
IoT-inspired smart home based urine infection prediction. 5249-5263 - Khaled Abdalgader
, Rahma Al Ajmi, Dinesh Kumar Saini
:
IoT-based system to measure thermal insulation efficiency. 5265-5278 - Weiping Zhu
, Yaodong Li, Shu Li, Yi Xu, Xiaohui Cui:
Optimal bandwidth allocation for web crawler systems with time constraints. 5279-5292
Special Issue on Deep Learning Methods for Biomedical Information Analysis
- Yudong Zhang, Zhengchao Dong, Shuai Li, Carlo Cattani:
Deep learning methods for biomedical information analysis. 5293-5296 - AliReza Hajieskandar, Javad Mohammadzadeh
, Majid Khalilian, Ali Najafi:
Molecular cancer classification method on microarrays gene expression data using hybrid deep neural network and grey wolf algorithm. 5297-5307 - Deepak Chowdary Edara
, Lakshmi Prasanna Vanukuri, Venkatramaphanikumar Sistla
, Venkata Krishna Kishore Kolli
:
Sentiment analysis and text categorization of cancer medical records with LSTM. 5309-5325 - Akshi Kumar
, Geetanjali Garg:
Empirical study of shallow and deep learning models for sarcasm detection using context in benchmark datasets. 5327-5342 - Zhuqing Jiao, Xuelian Ming, Yin Cao, Chun Cheng, Shui-Hua Wang:
Module partitioning for multilayer brain functional network using weighted clustering ensemble. 5343-5353 - Nasrin Tavakoli, Maryam Karimi
, Alireza Norouzi
, Nader Karimi
, Shadrokh Samavi, S. M. Reza Soroushmehr
:
Detection of abnormalities in mammograms using deep features. 5355-5367 - Shuaiqi Liu, Chuanqing Zhao, Ming Liu, Qi Xin, Shui-Hua Wang:
Diffusion tensor imaging denoising based on Riemann nonlocal similarity. 5369-5382 - Kabil Boukhari, Mohamed Nazih Omri:
DL-VSM based document indexing approach for information retrieval. 5383-5394 - Siyuan Lu
, Kaijian Xia, Shui-Hua Wang:
Diagnosis of cerebral microbleed via VGG and extreme learning machine trained by Gaussian map bat algorithm. 5395-5406 - Thippa Reddy Gadekallu
, Neelu Khare, Sweta Bhattacharya
, Saurabh Singh, Praveen Kumar Reddy Maddikunta
, Gautam Srivastava:
Deep neural networks to predict diabetic retinopathy. 5407-5420 - S. Pradeepa
, K. Geetha, K. Kannan, K. R. Manjula:
DEODORANT: a novel approach for early detection and prevention of polycystic ovary syndrome using association rule in hypergraph with the dominating set property. 5421-5437 - Zhuqing Jiao, Yixin Ji, Peng Gao, Shui-Hua Wang:
Extraction and analysis of brain functional statuses for early mild cognitive impairment using variational auto-encoder. 5439-5450 - Guanglei Sheng, Chao Zhang, Hengfei Wu, Xiujian Hu, Yuanpeng Zhang
:
Stylistic data-driven possibilistic fuzzy clustering and real-life application on epilepsy biomedical electronic signals detection. 5451-5462 - Vandad Davoodnia
, Monet Slinowsky, Ali Etemad:
Deep multitask learning for pervasive BMI estimation and identity recognition in smart beds. 5463-5477 - Wei Luo, Jian Liu, Yidi Huang, Ning Zhao:
An effective vitiligo intelligent classification system. 5479-5488 - Jayesh George Melekoodappattu
, Perumal Sankar Subbian:
Automated breast cancer detection using hybrid extreme learning machine classifier. 5489-5498 - Zhaoyang Liu
, Kun Fu, Hongsheng Yin
, Kaijian Xia, Yuteng Xiao
, Honglei Wang, Gangshen Li:
Dm6A-TSVM: detection of N6-methyladenosine (m6A) sites from RNA transcriptomes using the twin support vector machines. 5499-5505 - Yuanbin Wang, Yujing Wang, Langfei Dang:
Video detection of foreign objects on the surface of belt conveyor underground coal mine based on improved SSD. 5507-5516 - Yamin Deng
, Huifang Fan, Shiman Wu:
A hybrid ARIMA-LSTM model optimized by BP in the forecast of outpatient visits. 5517-5527 - Tongguang Ni
, Xiaoqing Gu, Yizhang Jiang:
Transfer discriminative dictionary learning with label consistency for classification of EEG signals of epilepsy. 5529-5540 - Neha Gianchandani, Aayush Jaiswal, Dilbag Singh
, Vijay Kumar
, Manjit Kaur:
Rapid COVID-19 diagnosis using ensemble deep transfer learning models from chest radiographic images. 5541-5553 - Yuantao Chen
, Haopeng Zhang, Linwu Liu, Jiajun Tao, Qian Zhang, Kai Yang, Runlong Xia, Jingbo Xie:
Research on image inpainting algorithm of improved total variation minimization method. 5555-5564 - Anand Motwani
, Piyush Kumar Shukla
, Mahesh Kumar Pawar
:
Novel framework based on deep learning and cloud analytics for smart patient monitoring and recommendation (SPMR). 5565-5580 - Kang Li
, Tongguang Ni, Jing Xue, Yizhang Jiang:
Deep soft clustering: simultaneous deep embedding and soft-partition clustering. 5581-5593 - Nimmagadda Satyanarayana Murthy, Chaitanya Bethala:
Review paper on research direction towards cancer prediction and prognosis using machine learning and deep learning models. 5595-5613 - Xihe Qiu, Xiaoyu Tan
, Fengting Yan, Qianmin Su, Jue Chen, Xiaoyan Jiang:
Semi-supervised recommender system for bone implant ratio recommendation. 5615-5624 - Yarong Li, Pengjiang Qian
, Shuihua Wang, Shitong Wang:
Novel multi-view Takagi-Sugeno-Kang fuzzy system for epilepsy EEG detection. 5625-5645 - Zhengming Li, Zheng Zhang
, Shuihua Wang, Ruijun Ma
, Fangyuan Lei, Dan Xiang:
Structured analysis dictionary learning based on discriminative Fisher pair. 5647-5664 - Mohamed Ramzy Ibrahim
, Sherin M. Youssef
, Karma M. Fathalla
:
Abnormality detection and intelligent severity assessment of human chest computed tomography scans using deep learning: a case study on SARS-COV-2 assessment. 5665-5688 - Song Guo
:
DPN: detail-preserving network with high resolution representation for efficient segmentation of retinal vessels. 5689-5702 - Jing-Shan Huang
, Bin-Qiang Chen, Nianyin Zeng
, Xincheng Cao, Yang Li:
Accurate classification of ECG arrhythmia using MOWPT enhanced fast compression deep learning networks. 5703-5720 - S. Vasavi
, P. R. S. Swaroop, Roshni Srinivas:
Medical assistive system for automatic identification of prescribed medicines by visually challenged from the medicine box using invariant feature extraction. 5721-5730
Special Issue on Smart innovation for IoT and mobile networks
- Nisrine Ibadah
, Mohammed Rziza
, Khalid Minaoui
, Mohammed Oumsis
, César Benavente-Peces
:
Flexible synthetic mobility modeling to discover trajectories for complex areas of mobile wireless networks. 5735-5748 - Aellison Cassimiro T. dos Santos
, José L. Soares Filho, Ávilla Í. S. Silva, Vivek Nigam, Iguatemi E. Fonseca:
BLE injection-free attack: a novel attack on bluetooth low energy devices. 5749-5759 - Sindhu Hak Gupta
, Niveditha Devarajan:
Performance exploration of on-body WBAN using CM3A-IEEE 802.15.6 channel model. 5761-5772 - Arpita Biswas, Abhishek Majumdar
, Sourav Nath
, A. Dutta, Krishna Lal Baishnab:
LRBC: a lightweight block cipher design for resource constrained IoT devices. 5773-5787 - Neha Arora
, Sindhu Hak Gupta, Basant Kumar:
An approach to investigate the best location for the central node placement for energy efficient WBAN. 5789-5800 - Chinmoy Biswas
, Ratna Dutta:
Implementation of key predistribution scheme in WSN based on binary Goppa codes and Reed Solomon codes with enhanced connectivity and resiliency. 5801-5816 - Pinaki Sarkar:
Strongly-resilient, well connected, non-interactive and gateway-free hierarchical deterministic key agreement schemes using Chinese remainder theorem. 5817-5836 - Mankour Mohamed
, Sami Ben Slama:
Mitigation of commutation failure method in LCC converter based on HVDC systems by mean of modeling and simulation. 5837-5852 - Munir Ahmad, Muhammad Abdul Qadir
, Atta Rahman
, Rachid Zagrouba
, Fahd A. Alhaidari
, Tariq Ali, Farzana Zahid:
Enhanced query processing over semantic cache for cloud based relational databases. 5853-5871 - Smita Das
, Mrinal Kanti Debbarma
:
CHPT: an improved coverage-hole patching technique based on tree-center in wireless sensor networks. 5873-5884 - Abdulrahman Alamer
:
An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things. 5885-5902 - Syed Rameem Zahra
, Mohammad Ahsan Chishti:
Fuzzy logic and Fog based Secure Architecture for Internet of Things (FLFSIoT). 5903-5927 - Atta Rahman
:
GRBF-NN based ambient aware realtime adaptive communication in DVB-S2. 5929-5939 - Ramin Yarinezhad
, Seyed Naser Hashemi:
A sensor deployment approach for target coverage problem in wireless sensor networks. 5941-5956 - Fahd A. Alhaidari
, Atta Rahman
, Rachid Zagrouba
:
Cloud of Things: architecture, applications and challenges. 5957-5975 - Mohsen Attaran
:
The impact of 5G on the evolution of intelligent automation and industry digitization. 5977-5993 - Arun Sundararaman
, K. Sudharson
:
DEFECT: discover and eradicate fool around node in emergency network using combinatorial techniques. 5995-6006 - Shi Qiu, Xuemei Li:
Moving target extraction and background reconstruction algorithm. 6007-6015 - Ali Akbar Movassagh, Jafar Ahmad Abed Alzubi, Mehdi Gheisari
, Mohamadtaghi Rahimi, Senthilkumar Mohan, Aaqif Afzaal Abbasi
, Narjes Nabipour:
Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model. 6017-6025 - Niloofar Mohammadzadeh, Marsa Gholamzadeh
, Soheila Saeedi, Sorayya Rezayi
:
The application of wearable smart sensors for monitoring the vital signs of patients in epidemics: a systematic literature review. 6027-6041 - Diego V. Queiroz
, Ruan Delgado Gomes, Iguatemi E. Fonseca, Marcelo S. Alencar
, César Benavente-Peces
:
Channel assignment in TSCH-based wireless sensor networks using fuzzy logic. 6043-6062 - Haseena Gul, Ghufran Ullah
, Muzammil Khan, Yosra Khan:
EERBCR: Energy-efficient regional based cooperative routing protocol for underwater sensor networks with sink mobility. 6063-6075 - Ahmed Ragab, Ahmed Madani, Abdelmoniem Wahdan, Gamal M. I. Selim:
Design, analysis, and implementation of a new lightweight block cipher for protecting IoT smart devices. 6077-6094 - Qingling Liu, Kefa G. Mkongwa, Chaozhu Zhang, Shubin Wang:
A simple cross-layer mechanism for congestion control and performance enhancement in a localized multiple wireless body area networks. 6095-6112 - Ayoub Alsarhan
, Mohammad Alauthman
, Esra'a Alshdaifat, Abdel-Rahman Al-Ghuwairi, Ahmed Al-Dubai
:
Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. 6113-6122 - Mohd Asifuddola
, Mohammad Ahsan Chishti:
A novel fast and fair asynchronous channel hopping rendezvous scheme in cognitive radio networks for internet of things. 6123-6135 - Majid H. Alsulami
, Saleh Naif Almuayqil, Anthony S. Atkins:
A comparison between heart-rate monitoring smart devices for ambient assisted living. 6137-6148 - Rajender Kumar, Krishan Kumar, Shubham Mahajan, Amit Kant Pandit:
Study and implementation of K-multiple constraint shortest path for H.265 HEVC for optimal video compression. 6149-6164 - Jogendra Kumar, Annapurna Singh, Harvendra Singh Bhadauria:
Link discontinuity and optimal route data delivery for random waypoint model. 6165-6179 - Hamdi Ouechtati
, Nadia Ben Azzouna, Lamjed Ben Said:
A fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things. 6181-6200 - Li Yang, Huihui Guo, Jiaxue Wang:
An automatic crisis information recognition model based on BP neural networks. 6201-6212 - Majid H. Alsulami
:
Challenges facing the implementation of 5G. 6213-6226 - K. Nimmy
, Sriram Sankaran, Krishnashree Achuthan:
A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database. 6227-6242 - Samir Ifzarne
, Imad Hafidi, Nadia Idrissi:
Compressive sensing and paillier cryptosystem based secure data collection in WSN. 6243-6250 - Maryam Najimi:
Energy harvesting relay selection and power allocation in cooperative secure NOMA networks with imperfect SIC over Nakagami-m channel. 6251-6261 - Hanan S. Ghanem, Rasha M. Al-Makhlasawy
, Walid El Shafai, Maha Elsabrouty, Hesham F. A. Hamed, Gerges M. Salama
, Fathi E. Abd El-Samie:
Wireless modulation classification based on Radon transform and convolutional neural networks. 6263-6272 - Cheng Gong
, Ling Xiong
, Xingyu He, Xianhua Niu:
Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. 6273-6286 - Abhishek Joshi
, Sarang Dhongdi, Mihir Dharmadhikari, Ojit Mehta, K. R. Anupama:
Enclosing and monitoring of disaster area boundary using multi-UAV network. 6287-6305 - Dinesh Dash
:
Plane sweep algorithms for data collection for energy harvesting wireless sensor networks using mobile sink. 6307-6320 - Alireza Shirmarz
, Ali Ghaffari:
Network traffic discrimination improvement in software defined network (SDN) with deep autoencoder and ensemble method. 6321-6337 - Anas Bushnag
:
An improved air quality and climate control monitoring system using fuzzy logic for enclosed areas. 6339-6347 - Mohammed Alweshah
, Abdelaziz I. Hammouri, Saleh Alkhalaileh, Omar A. Alzubi
:
Intrusion detection for the internet of things (IoT) based on the emperor penguin colony optimization algorithm. 6349-6366 - He Du, Zhiwen Yu
, Bin Guo
, Qi Han, Chao Chen:
GroupShop: monitoring group shopping behavior in real world using mobile devices. 6367-6378 - Sergio Barroso-Ramírez
, Pablo Bustos
, Pedro Núñez
:
Towards a cyber-physical system for sustainable and smart building: a use case for optimising water consumption on a SmartCampus. 6379-6399 - Yuxin Ding
, Xiao Zhang, Jieke Hu, Wenting Xu:
Android malware detection method based on bytecode image. 6401-6410 - Amit Kumar
:
Single server multiple vacation queue with discouragement solve by confluent hypergeometric function. 6411-6422
Volume 14, Number 6, June 2023
- Mehran Pourmohammad Abdollahi, Javad Musevi Niya
, Mahmood Mohassel Feghhi
:
On the outage performance of energy harvesting NOMA-based simultaneous cooperate and transmit IoT networks. 6423-6433 - Ting Jin
, Hongxuan Xia:
Lookback option pricing models based on the uncertain fractional-order differential equation with Caputo type. 6435-6448 - Mayura Kinikar, B. Saleena
:
An intelligent personalized web user information retrieval using partial least squares and artificial neural networks. 6449-6461 - Arindam Sarkar
:
Generative adversarial network-based efficient synchronization of group of neural networks to exchange the neural key. 6463-6488 - A. Ilavendhan
, K. Saruladha:
Stackelberg security game to mitigate the DoS attack in vehicular ad-hoc networks. 6489-6496 - Azam Aghighi, Alireza Goli
, Behnam Malmir, Erfan Babaee Tirkolaee
:
The stochastic location-routing-inventory problem of perishable products with reneging and balking. 6497-6516 - Eduardo Garea Llano
, Annette Morales-González:
Framework for biometric iris recognition in video, by deep learning and quality assessment of the iris-pupil region. 6517-6529 - Xiuling Zhang, Ziyun Wu, Tingbo Wan, Bingce Du:
Smaller and efficient mobile network design for image classification. 6531-6544 - M. J. Jeyasheela Rakkini
, K. Geetha:
Deep learning classification of bitcoin miners and exploration of upper confidence bound algorithm with less regret for the selection of honest mining. 6545-6561 - Florentin Thullier
, Sylvain Hallé, Sébastien Gaboury:
LE2ML: a microservices-based machine learning workbench as part of an agnostic, reliable and scalable architecture for smart homes. 6563-6584 - Pradeep Tiwari
, Harshil Rathod, Sakshee Thakkar, Anand D. Darji:
Multimodal emotion recognition using SDA-LDA algorithm in video clips. 6585-6602 - Long Zhang
, Shanshan Zhuge, Yao Wang, Haitao Xu, Enchang Sun:
Energy-delay tradeoff for virtual machine placement in virtualized multi-access edge computing: a two-sided matching approach. 6603-6621 - Joydeep Dey
, Arindam Sarkar, Sunil Karforma, Bappaditya Chowdhury:
Metaheuristic secured transmission in Telecare Medical Information System (TMIS) in the face of post-COVID-19. 6623-6644 - R. Vidhya, M. Brindha
:
Evaluation and performance analysis of Chinese remainder theorem and its application to lossless image compression. 6645-6660 - Shilpa Choudhary, S. Sugumaran, Akram Belazi, Ahmed A. Abd El-Latif
:
Linearly decreasing inertia weight PSO and improved weight factor-based clustering algorithm for wireless sensor networks. 6661-6679 - Mehri Davtalab
, Ali Asghar Alesheikh:
A multi-criteria point of interest recommendation using the dominance concept. 6681-6696 - Ejaz Ul Haq
, Jianjun Huang
, Kang Li, Hafeez Ul Haq, Tijiang Zhang:
An MRI-based deep learning approach for efficient classification of brain tumors. 6697-6718 - Asif Iqbal Middya
, Sarbani Roy
, Rituparna Das:
Spatiotemporal variability analysis of air pollution data from IoT based participatory sensing. 6719-6734 - Sumit Kumar
, Rajeev Tiwari
:
Optimization of content-centric networking based IoT systems using partitioning-heuristics in-network caching. 6735-6749 - Andrew Hu, Dhruv Phadnis, Seyed Reza Shahamiri
:
Generating synthetic dysarthric speech to overcome dysarthria acoustic data scarcity. 6751-6768 - Fatemeh Keshavarz-Ghorbani, Seyed Hamid Reza Pasandideh
:
A model of determining the ordering strategy for a multi-product problem with lateral transshipment approach: hybrid metaheuristic algorithms. 6769-6782 - Akhil Kumar
, Arvind Kalia, Akashdeep Sharma
, Manisha Kaushal:
A hybrid tiny YOLO v4-SPP module based improved face mask detection vision system. 6783-6796 - Aneesh M. Koya
, P. P. Deepthi:
Efficient on-site confirmatory testing for atrial fibrillation with derived 12-lead ECG in a wireless body area network. 6797-6815 - Rajni Aron
, Deepak kumar Aggarwal:
Resource scheduling of concurrency based applications in IoT based cloud environment. 6817-6828 - Adam A. Q. Mohammed
, Jiancheng Lv, Md. Sajjatul Islam
, Yongsheng Sang:
Multi-model ensemble gesture recognition network for high-accuracy dynamic hand gesture recognition. 6829-6842 - Antonio Candelieri, Andrea Ponti, Francesco Archetti:
Uncertainty quantification and exploration-exploitation trade-off in humans. 6843-6876 - U. Hariharan
, K. Rajkumar
, T. Akilan
, A. Ponmalar:
A multi-hop protocol using advanced multi-hop Dijkstras algorithm and tree based remote vector for wireless sensor network. 6877-6895 - Arunodaya Raj Mishra
, Pratibha Rani:
A q-rung orthopair fuzzy ARAS method based on entropy and discrimination measures: an application of sustainable recycling partner selection. 6897-6918 - Noor Azzah Awang, Lazim Abdullah
, Hazwani Hashim:
A Bonferroni mean considering Shapley fuzzy measure under hesitant bipolar-valued neutrosophic set environment for an investment decision. 6919-6946 - Yun Li, Yibin Song, Amin Rezaeipanah:
Generation a shooting on the walking for soccer simulation 3D league using Q-learning algorithm. 6947-6957 - Hang Du, Haidong Hu, Dayi Wang, Xinru Xie, Shuanfeng Xu, Chunling Wei, Yingzi He, Hao Gao:
Autonomous measurement and semantic segmentation of non-cooperative targets with deep convolutional neural networks. 6959-6973 - Arijit Mondal
, Sankar Kumar Roy
, Sudipta Midya:
Intuitionistic fuzzy sustainable multi-objective multi-item multi-choice step fixed-charge solid transportation problem. 6975-6999 - Mohamed Gafsi
, Mohamed Ali Hajjaji, Jihene Malek
, Abdellatif Mtibaa
:
FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption. 7001-7022 - S. Sam Karthik, A. Kavithamani:
OELF: short term load forecasting for an optimal electrical load forecasting using hybrid whale optimization based convolutional neural network. 7023-7031 - Tanmoy Hazra, Kushal Anjaria:
Analysis and applications of a bridge game. 7033-7045 - T. Kujani
, V. Dhilip Kumar:
Head movements for behavior recognition from real time video based on deep learning ConvNet transfer learning. 7047-7061 - Prateek
, Rajeev Arya
:
T-LOC: RSSI-based, range-free, triangulation assisted localization for convex relaxation with limited node range under uncertainty skew constraint. 7063-7077 - Jianhu Gong, Hamed Nazari:
A fuzzy bandwidth and delay guaranteed routing algorithm for performance enhancement of video conference over MPLS networks. 7079-7090 - Murali Dasari, A. Srinivasula Reddy, M. Vijaya Kumar:
Modified Luo converter based FOPID controller for torque ripple minimization in BLDC drive system. 7091-7108 - M. Premkumar
, Pradeep Jangir
, Rajvikram Madurai Elavarasan, Ravichandran Sowmya:
Opposition decided gradient-based optimizer with balance analysis and diversity maintenance for parameter identification of solar photovoltaic models. 7109-7131 - G. El Damrawi, M. A. Zahran, Elshaimaa Amin, Mohamed M. Abdelsalam
:
Numerical detection of diabetic retinopathy stages by multifractal analysis for OCTA macular images using multistage artificial neural network. 7133-7145 - Bala Gangadhara Gutam, Praveen Kumar Donta
, Chandra Sekhara Rao Annavarapu, Yu-Chen Hu:
Optimal rendezvous points selection and mobile sink trajectory construction for data collection in WSNs. 7147-7158 - Shuai Dong, Weixi Zhang, Wei Wang, Kun Zou
:
Action recognition based on dynamic mode decomposition. 7159-7172 - Mehmood Nawaz
, Rizwan Qureshi
, Mansoor Ali Teevno
, Ali Raza Shahid
:
Object detection and segmentation by composition of fast fuzzy C-mean clustering based maps. 7173-7188 - Oladayo Olufemi Olakanmi
, Kehinde Oluwasesan Odeyemi:
Expressible access control scheme for data sharing and collaboration in cloud-centric Internet of medical Things system. 7189-7205 - Anand Kumar Madasamy
, Soman Kotti Padannayil:
Transfer learning based code-mixed part-of-speech tagging using character level representations for Indian languages. 7207-7218 - R. Jothin
, C. Vasanthanayaki, P. Sreelatha, M. Peer Mohamed:
Comparison and extension of high performance adders for hybrid and error tolerant applications. 7219-7230 - Amarjit Malhotra, Sanjay K. Dhurandher, Megha Gupta
:
Data storage and range queries in ubiquitous mobile data cloud. 7231-7245 - Yuning Zheng, Sheng Hong
, Jun Wang, Yuejiao Zhang, Bin Zhang:
Research on mapping algorithm of distributed virtual storage space based on digital certificate authentication. 7247-7254 - Jiande Huang, Yue Huang, Shahbaz Gul Hassan, Longqin Xu, Shuangyin Liu
:
Dissolved oxygen content interval prediction based on auto regression recurrent neural network. 7255-7264 - Gaofeng Che
, Xiaoqiang Hu
:
Optimal trajectory-tracking control for underactuated AUV with unknown disturbances via single critic network based adaptive dynamic programming. 7265-7279 - Arkan Hammoodi Hasan Kabla
, Mohammed Anbar
, Taief Alaa Alamiedy:
Deep learning approach for detecting router advertisement flooding-based DDoS attacks. 7281-7295 - ShaoDong Cui, Yi La Su
, Kaibo Duan, Yingxi Liu:
Maize leaf disease classification using CBAM and lightweight Autoencoder network. 7297-7307 - S. Parthasarathy:
OSVR: an efficient support vector regression model based host overload detection and secure virtual machine migration. 7309-7317 - Mingjun Tian, Minjuan Zheng, Shi Qiu, Yang Song:
A prediction model of microcirculation disorder in myocardium based on ultrasonic images. 7319-7330 - Sharaf AlKheder, Fahad AlRukaibi, Ahmad Aiash
:
Support Vector Machine (SVM), Random Forest (RF), Artificial Neural Network (ANN) and Bayesian Network for prediction and analysis of GCC traffic accidents. 7331-7339 - Jiaju Tang, Qifang Luo, Yongquan Zhou
:
Enhanced artificial ecosystem-based optimization self-organizing RBF neural network. 7341-7353 - Yu Xue
, Xu Cai, Weiwei Jia:
Particle swarm optimization based on filter-based population initialization method for feature selection in classification. 7355-7366 - Samrah Mehraj, Subreena Mushtaq, Shabir A. Parah, Kaiser J. Giri, Javaid A. Sheikh
:
A robust watermarking scheme for hybrid attacks on heritage images. 7367-7380 - Mirza Anas Wahid, Syed Hashim Raza Bukhari, Ahmad Daud, Saeed Ehsan Awan
, Muhammad Asif Zahoor Raja
:
COVICT: an IoT based architecture for COVID-19 detection and contact tracing. 7381-7398 - David Tomás
, Reynier Ortega-Bueno, Guobiao Zhang, Paolo Rosso, Rossano Schifanella:
Transformer-based models for multimodal irony detection. 7399-7410 - Lu Yang
:
Uncertain age-dependent population equation with migration source. 7411-7425 - Sheikh Abdul Hameed Ayubkhan, Wun-She Yap
, Ezra Morris, Mumtaj Begam Kasim Rawthar:
A practical intrusion detection system based on denoising autoencoder and LightGBM classifier with improved detection performance. 7427-7452 - Ahmad Esfandiari
, Faezeh Farivar, Hamid Khaloozadeh:
Fractional-order binary bat algorithm for feature selection on high-dimensional microarray data. 7453-7467 - Jiaming Wu, Zhehuang Huang, Jinjin Li, Danyue Liu:
Three-way multi-attribute decision-making with multiple decision makers in heterogeneous incomplete decision systems. 7469-7483 - Navdeep Kaur
, Ajay Mittal:
CheXPrune: sparse chest X-ray report generation model using multi-attention and one-shot global pruning. 7485-7497 - Anjali Ahuja
, Anamika Jain
:
Fuzzy analysis of a queueing system featuring an unreliable service provider and geometric arrivals by incorporating constant retrial policy and delayed threshold recovery. 7499-7518 - Li Li
, Xiaohua Zheng, Jing Han, Fei Hao:
Information cascades blocking through influential nodes identification on social networks. 7519-7530 - Laaziz Lahlou
, Chafika Tata
, Nadjia Kara, Aris Leivadeas, Abdelouahed Gherbi:
Edge-cloud online joint placement of Virtual Network Functions and allocation of compute and network resources using meta-heuristics. 7531-7558 - Meysam Ghahramani
, Hamed HaddadPajouh, Reza Javidan, Saru Kumari:
VQR: vulnerability analysis in quadratic residues-based authentication protocols. 7559-7574 - Reza Ghanbarzadeh
, Ali Hosseinalipour, Ali Ghaffari:
A novel network intrusion detection method based on metaheuristic optimisation algorithms. 7575-7592 - Yuhang Han
, Hongyu Xiang, Jianing Cao, Xiaohua Yang, Nan Pan
, Linhai Huang:
Study on optimization of multi-UAV nucleic acid sample delivery paths in large cities under the influence of epidemic environment. 7593-7620 - Asmaa H. Rabie, Ahmed I. Saleh, Nehal A. Mansour:
Red piranha optimization (RPO): a natural inspired meta-heuristic algorithm for solving complex optimization problems. 7621-7648 - A. S. Shinde
, R. S. Bichkar:
Energy efficient active/sleep scheduling of sensor nodes in target based WSN using genetic algorithm with dither creeping mutation. 7649-7662 - Shan Ai, Chang Chen
, Juan Tang, Pengfei Huang, Yanli Liu:
B2IPTS: A blockchain-based intellectual property transaction framework. 7663-7678 - Xiaohu Wang, Yong Wang
, Jianjian Peng, Zhicheng Zhang:
Multivariate long sequence time-series forecasting using dynamic graph learning. 7679-7693 - Chang-Shing Lee
, Mei-Hui Wang, Marek Z. Reformat, Sheng-Hui Huang:
Human intelligence-based metaverse for co-learning of students and smart machines. 7695-7718 - Muhammad Kashif Afzal, Matthew Shardlow, Suppawong Tuarob, Farooq Zaman, Raheem Sarwar
, Mohsen Ali
, Naif Radi Aljohani, Miltiades D. Lytras, Raheel Nawaz
, Saeed-Ul Hassan:
Generative image captioning in Urdu using deep learning. 7719-7731 - Himanshu Gupta
, Javed Imran, Chandani Sharma
:
Flu-Net: two-stream deep heterogeneous network to detect flu like symptoms from videos using grey wolf optimization algorithm. 7733-7745 - Walaa Aly, Ahmed I. Shahin, Saleh K. H. Aly:
A novel modular deep fully convolutional network for efficient low resolution facial expression recognition. 7747-7759 - Numrena Farooq, Arvind Selwal:
Image steganalysis using deep learning: a systematic review and open research challenges. 7761-7793 - Aaliya Sarfaraz, Ripon K. Chakrabortty, Daryl Essam:
Reputation based proof of cooperation: an efficient and scalable consensus algorithm for supply chain applications. 7795-7811 - A. S. Joseph Charles, Kalavathi Palanisamy
, M. Venugopal
, S. Shanmugam:
RPL enhancement with E-Sigma routing method. 7813-7826 - Bukhoree Sahoh
, Anant Choksuriwong:
The role of explainable Artificial Intelligence in high-stakes decision-making systems: a systematic review. 7827-7843 - Julien Maitre
, Kévin Bouchard, Sébastien Gaboury:
Data filtering and deep learning for enhanced human activity recognition from UWB radars. 7845-7856 - Sakshi Gupta
, Itu Snigdh:
Applying Bayesian belief in LoRa: smart parking case study. 7857-7870 - Nicole Taylor, Karel Kruger
, Anriëtte Bekker
:
A human cyber-physical system for human-centered computing in seafaring. 7871-7884 - Shwetha G. Krishnappa
, K. R. Udaya Kumar Reddy:
Breast cancer classification from histopathological images using dual deep network architecture. 7885-7896 - Hossam Magdy Balaha, Esraa Raffik Antar, Mahmoud M. Saafan
, Eman M. El-Gendy:
A comprehensive framework towards segmenting and classifying breast cancer patients using deep learning and Aquila optimizer. 7897-7917 - Salman Nazari Shirkouhi
, Ali Badizadeh, Mosayeb Dashtpeyma
, Reza Ghodsi:
A model to improve user acceptance of e-services in healthcare systems based on technology acceptance model: an empirical study. 7919-7935 - Zheng Wu, Kehua Guo
, Sheng Ren, Xiangyuan Zhu, Rui Ding, Liwei Wang:
GREB: gradient re-balanced loss for long-tailed multi-lable classification. 7937-7948 - S. Sundaresan
, M. Surendar, T. Ananthkumar, K. Sureshkumar, Jefrin Sharmitha Prabhu:
Impact of wind farms on surveillance radar system: a realistic scenario in Palakkad gap region. 7949-7956 - David Cortés-Polo
, Luis-Ignacio Jimenez
, Mercedes Eugenia Paoletti
, Jesús Calle-Cancho, Juan A. Rico-Gallego:
Orthogonal projection for anomaly detection in networking datasets. 7957-7966 - Alexandru-Ionut Siean, Cristian Pamparau, Arthur Sluÿters, Radu-Daniel Vatavu, Jean Vanderdonckt:
Flexible gesture input with radars: systematic literature review and taxonomy of radar sensing integration in ambient intelligence environments. 7967-7981 - Dilli Babu Salvakkam
, Rajendra Pamula:
An improved lattice based certificateless data integrity verification techniques for cloud computing. 7983-8002 - Hongwei Ding, Xiaohui Cui:
A clustering and generative adversarial networks-based hybrid approach for imbalanced data classification. 8003-8018 - Ximu Zeng, Xue Chen, Xiao Peng, Xiaoshan Zhang, Hao Wang, Zhengquan Xu:
Differentially private publication for related POI discovery. 8019-8033 - Upma Singh
, M. Rizwan:
Analysis of wind turbine dataset and machine learning based forecasting in SCADA-system. 8035-8044 - Sinem Akyol
:
A new hybrid method based on Aquila optimizer and tangent search algorithm for global optimization. 8045-8065 - Choel-Hui Lee, Hyun-Ji Kim, Young-Tak Kim, Hakseung Kim, Jung-Bin Kim, Dong-Joo Kim:
SleepExpertNet: high-performance and class-balanced deep learning approach inspired from the expert neurologists for sleep stage classification. 8067-8083 - Choel-Hui Lee, Hyun-Ji Kim, Young-Tak Kim, Hakseung Kim, Jung-Bin Kim
, Dong-Joo Kim:
Correction to: SleepExpertNet: high‑performance and class‑balanced deep learning approach inspired from the expert neurologists for sleep stage classification. 8085
Volume 14, Number 7, July 2023
- Leijian Yu, Erfu Yang
, Cai Luo, Peng Ren:
AMCD: an accurate deep learning-based metallic corrosion detector for MAV-based real-time visual inspection. 8087-8098 - Enas M. F. El Houby
:
Machine learning techniques for pathogenicity prediction of non-synonymous single nucleotide polymorphisms in human body. 8099-8113 - Khadijeh Mahdikhanlou, Hossein Ebrahimnezhad
:
Object manipulation and deformation using hand gestures. 8115-8133 - Christine Dewi, Rung-Ching Chen
, Hui Yu
, Xiaoyi Jiang:
Robust detection method for improving small traffic sign recognition based on spatial pyramid pooling. 8135-8152 - Mobina Mousapour Mamoudan
, Danial Forouzanfar, Zahra Mohammad-Nazari
, Amir Aghsami
, Fariborz Jolai
:
Factor identification for insurance pricing mechanism using data mining and multi criteria decision making. 8153-8172 - Minyoung Lee, Eunil Park:
Real-time Korean voice phishing detection based on machine learning approaches. 8173-8184 - Pooja Verma, Raghav Prasad Parouha:
An advanced hybrid algorithm for constrained function optimization with engineering applications. 8185-8217 - Sourodeep Roy, Debjit Sarkar, Samir Malakar
, Ram Sarkar
:
Offline signature verification system: a graph neural network based approach. 8219-8229 - A. A. Periola, V. A. Ajisafe
, M. O. Oyediran:
Cloud platform incorporating dynamic modularity for improved service to subscribers. 8231-8247 - Jamal Nahofti Kohneh
, Hadis Derikvand, Masoud Amirdadi
, Ebrahim Teimoury:
A blood supply chain network design with interconnected and motivational strategies: a case study. 8249-8269 - Mengzheng Lv
, Jianzhou Wang, Xinsong Niu
, Haiyan Lu:
A newly combination model based on data denoising strategy and advanced optimization algorithm for short-term wind speed prediction. 8271-8290 - Peyman Tirandazi
, Atefeh Rahiminasab, Mohammad Javad Ebadi:
An efficient coverage and connectivity algorithm based on mobile robots for wireless sensor networks. 8291-8313 - Sasmita Parida, Bibudhendu Pati, Suvendu Chandan Nayak
, Chhabi Rani Panigrahi:
eMRA: an efficient multi-optimization based resource allocation technique for infrastructure cloud. 8315-8333 - Xingmei Wang, Jiahao Shi, Hamido Fujita
, Yilin Zhao:
Aggregate attention module for fine-grained image classification. 8335-8345 - Tribhuvan Singh
, Shubhendu Shekhar Panda, Soumya Ranjan Mohanty, Anubhab Dwibedy:
Opposition learning based Harris hawks optimizer for data clustering. 8347-8362 - Ibrahim Mustafa Mehedi
, Mohd Heidir Mohd Shah:
Categorization of Webpages using dynamic mutation based differential evolution and gradient boost classifier. 8363-8374 - Raed Abu Zitar
, Laith Abualigah
, Nidal A. Al-Dmour
:
Review and analysis for the Red Deer Algorithm. 8375-8385 - Bhanu Priya
, Jyoteesh Malhotra
:
5GhNet: an intelligent QoE aware RAT selection framework for 5G-enabled healthcare network. 8387-8408 - Elham Abbasi
, Mohammad Reza Hooshmandasl
:
Semi-explicit mixture of experts based on information table. 8409-8420 - Miao Wei, Songbin Li
, Peng Liu
, Yongfeng Huang
, Qiandong Yan, Jingang Wang
, Cheng Zhang
:
Frame-level steganalysis of QIM steganography in compressed speech based on multi-dimensional perspective of codeword correlations. 8421-8431 - Rifat Sonmez
, Ferda Özdemir Sönmez
, Salar Ahmadisheykhsarmast
:
Blockchain in project management: a systematic review of use cases and a design decision framework. 8433-8447 - Yanan Li
, Ming Sun, Yang Qi:
Common pests classification based on asymmetric convolution enhance depthwise separable neural network. 8449-8457 - Yogesh Kumar
, Apeksha Koul, Ruchi Singla, Muhammad Fazal Ijaz
:
Artificial intelligence in disease diagnosis: a systematic literature review, synthesizing framework and future research agenda. 8459-8486 - Saeid Jafarzadeh Ghoushchi
, Ramin Ranjbarzadeh
, Saeed Aghasoleimani Najafabadi
, Elnaz Osgooei, Erfan Babaee Tirkolaee
:
An extended approach to the diagnosis of tumour location in breast cancer using deep learning. 8487-8497 - Fatma M. Talaat, Samah A. Gamel
:
Predicting the impact of no. of authors on no. of citations of research publications based on neural networks. 8499-8508 - Xieji li, Xia Cao:
Human motion recognition information processing system based on LSTM Recurrent Neural Network Algorithm. 8509-8521 - Yuan Cao, Yongmao Wang:
Reliability analysis of computer adaptive system based on artificial intelligence recognition model. 8523-8530 - Mohammad Khalily Dermany
:
Multi-criteria itinerary planning for the mobile sink in heterogeneous wireless sensor networks. 8531-8550 - Subrata Datta
, Kalyani Mali, Sourav Das, Srijita Kundu, Sayanta Harh:
Rhythmus periodic frequent pattern mining without periodicity threshold. 8551-8563 - C. Ravindra Murthy
, K. Balaji:
Moon phase wavelet model with chain rule neural network classifier for breast cancer detection. 8565-8582 - Rathindra Nath Biswas, Swarup Kumar Mitra, Mrinal Kanti Naskar
:
Localization under node capture attacks using fuzzy based anchor mobility control. 8583-8612 - Md. Jakir Hossain
, Chunxiang Xu, Yuan Zhang, Xiaojun Zhang, Wanpeng Li
:
LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator. 8613-8629 - Kulanthaivel Balakrishnan, R. Dhanalakshmi, Utkarsh Mahadeo Khaire
:
A novel control factor and Brownian motion-based improved Harris Hawks Optimization for feature selection. 8631-8653 - Lin Yang, Junling Liu, Zehao Fan, Dafei Yang:
Governance of executive personal characteristics and corporate performance based on empirical evidence based on machine learning. 8655-8665 - Gerard Deepak
, A. Santhanavijayan:
OntoDynS: expediting personalization and diversification in semantic search by facilitating cognitive human interaction through ontology bagging and dynamic ontology alignment. 8667-8691 - S. A. Eshtehardian, Saeed Khodaygan
:
A continuous RRT*-based path planning method for non-holonomic mobile robots using B-spline curves. 8693-8702 - Yijia Zhang
, Wanli Zuo, Zhenkun Shi
, Binod Kumar Adhikari:
Integrating reviews and ratings into graph neural networks for rating prediction. 8703-8723 - Alfonso Mastropietro
, Filippo Palumbo
, Silvia Orte
, Michele Girolami, Francesco Furfari, Paolo Baronti, Ciprian Candea, Christina Roecke
, Lucia Tarro, Martin Sykora, Simone Porcelli, Giovanna Rizzo
:
A multi-domain ontology on healthy ageing for the characterization of older adults status and behaviour. 8725-8743 - Dhara Hitarth Buch
, Haresh S. Bhatt:
Trilochan: a solution to detect cross-VM direct timing attack. 8745-8763 - Muhammad Akram, Umaira Amjad, José Carlos R. Alcantud, Gustavo Santos-García
:
Complex fermatean fuzzy N-soft sets: a new hybrid model with applications. 8765-8798 - Mingru Dong, Haibin Li
, Cheng Li, Yuhua Qin, Yongtao Hu:
A localization algorithm for compensating stratification effect based on improved particle swarm optimization in underwater acoustic sensor network. 8799-8809 - Deepsubhra Guha Roy
, Bipasha Mahato, Debashis De, Satish Narayana Srirama:
Quality of experience aware recommendation system with IoT data filtration for handshaking among users using MQTT-SN protocol. 8811-8826 - Ugur Erkan
, Abdurrahim Toktas
, Deniz Ustun
:
Hyperparameter optimization of deep CNN classifier for plant species identification using artificial bee colony algorithm. 8827-8838 - Mohammed Abdullahi
, Md. Asri Ngadi, Salihu Idi Dishing, Shafii Muhammad Abdulhamid:
An adaptive symbiotic organisms search for constrained task scheduling in cloud computing. 8839-8850 - Munivenkatappa Nagabushanam
, G. S. Nandeesh
, Venkateshappa
, R. Vijayarajeswari:
Detection and localization of brain tumors using Fractional Hartley Transform and adaptive neuro-fuzzy inference system classification methods. 8851-8858 - M. S. Antony Vigil
, V. Subbiah Bharathi:
Classification of periodontitis stages in mandibular area from dental panoramic radiograph using Adaptive Center Line-Distance Based image processing approach. 8859-8869 - Gabriella Casalino
, Giovanna Castellano, Gianluca Zaza
:
Evaluating the robustness of a contact-less mHealth solution for personal and remote monitoring of blood oxygen saturation. 8871-8880 - Mandeep Kaur Saggi
, Sushma Jain, Amandeep Singh Bhatia, Rakesh Sharda:
Proposition of new ensemble data-intelligence model for evapotranspiration process simulation. 8881-8897 - Seyed Mehdi Mohtavipour
, Hadi Shahriar Shahhoseini
:
An analytically derived vectorized model for application graph mapping in interconnection networks. 8899-8911 - Zulqurnain Sabir
, Mohamed R. Ali
, R. Sadat:
Gudermannian neural networks using the optimization procedures of genetic algorithm and active set approach for the three-species food chain nonlinear model. 8913-8922 - Reza Davoudabadi, Seyed Meysam Mousavi, Amirhosein Patoghi:
A new fuzzy simulation approach for project evaluation based on concepts of risk, strategy, and group decision making with interval-valued intuitionistic fuzzy sets. 8923-8941 - Pufang Shan, Jialei Chen
, Chong Fu
, Lin Cao, Ming Tie, Chiu-Wing Sham:
Automatic skin lesion classification using a novel densely connected convolutional network integrated with an attention module. 8943-8956 - Rajasi Gore
, Shashwati Banerjea, Neeraj Tyagi:
A heterogeneous soft-hard fusion framework on fog based private SaS model for smart monitoring of public restrooms. 8957-8984 - Chen Yang
, Kaibo Huo, Long-Fei Geng, Kuizhi Mei:
DRGN: a dynamically reconfigurable accelerator for graph neural networks. 8985-9000 - Gamini Joshi
, Vidushi Sharma
:
A robust and trusted framework for IoT networks. 9001-9019 - Yi-Yu Chou, Muhamad Amirul Haq, Shanq-Jang Ruan
, Peter Chondro
:
Power constrained exposure correction network for mobile devices. 9021-9033 - Xiang Li
, Jiao Gui, Jiaming Liu:
Data-driven traffic congestion patterns analysis: a case of Beijing. 9035-9048 - Juan A. Dominguez
, Javier Campillo, Kiara Coralia Campo-Landines
, Sonia H. Contreras Ortiz:
Impact of emotional states on the effective range of electric vehicles. 9049-9058 - Murapaka Dhanalakshmi Bhavani, R. Murugan
, Tripti Goel:
An efficient dehazing method of single image using multi-scale fusion technique. 9059-9071 - Sumika Chauhan
, Govind Vashishtha
, Anil Kumar:
Approximating parameters of photovoltaic models using an amended reptile search algorithm. 9073-9088 - Krishan Kumar
:
R3N2: a novel approach for review based custom star rating using recurrent neural network. 9089-9097 - Yunfan Chen, Wenqi Zheng, Hyunchul Shin
:
Infrared and visible image fusion using a feature attention guided perceptual generative adversarial network. 9099-9112 - Jaidip Kotak
, Yuval Elovici:
IoT device identification based on network communication analysis using deep learning. 9113-9129 - Raut Chandrakant, R. Rajesh
:
Social sustainability, corporate governance, and sustainability performances: an empirical study of the effects. 9131-9143 - Chen Liu, Ziran Li, Lixin Zhou:
Missing nodes detection for complex networks based on graph convolutional networks. 9145-9158 - Rong Gao, Yebao Ma
, Dan A. Ralescu:
Uncertain multilevel programming with application to omni-channel vehicle routing problem. 9159-9171 - Jiankai Xue, Bo Shen
, Anqi Pan:
An intensified sparrow search algorithm for solving optimization problems. 9173-9189 - Divyateja Yentrapragada:
Deep features based convolutional neural network to detect and automatic classification of white blood cells. 9191-9205 - Jiatong Liu, Jianzhou Wang, Shuai Wang
, Weigang Zhao:
Wind speed point prediction and interval prediction method based on linear prediction model, neural network, and deep learning. 9207-9216 - Osama S. Faragallah
, Heba M. Elhoseny, Hala S. El-sayed
:
Efficient COVID-19 super pixel segmentation algorithm using MCFO-based SLIC. 9217-9232 - Sajjad Jalil, Muhammad Usman, Alvis Cheuk M. Fong:
Highly accurate phishing URL detection based on machine learning. 9233-9251 - Teresa Cristóbal
, Alexis Quesada-Arencibia
, Gabriele Salvatore de Blasio
, Gabino Padrón
, Francisco Alayón Hernández, Carmelo R. García
:
Data mining methodology for obtaining epidemiological data in the context of road transport systems. 9253-9275 - Kamlesh Kumar Pandey
, Diwakar Shukla:
Cancer tissue detection using improved K-means initialization method for multi-dimensional microarray big data clustering. 9277-9303 - A. Jayachandran
, G. Shunmugarathinam, T. Sudarson Rama Perumal:
Retinal vessels segmentation of colour fundus images using two stages cascades convolutional neural networks. 9305-9315 - Tao Ning
, Jiayu Wang, Xiaodong Duan:
Research on expressway traffic flow prediction model based on MSTA-GCN. 9317-9328 - Mengmeng Sheng, Zidong Wang
, Weibo Liu
, Xi Wang, Shengyong Chen, Xiaohui Liu:
A swarm optimizer with attention-based particle sampling and learning for large scale optimization. 9329-9341 - Sudesh Kumar
, Neeraj Kumar Rathore, Mamtha Prajapati
, Suresh Kumar Sharma
:
SF-GoeR: an emergency information dissemination routing in flying Ad-hoc network to support healthcare monitoring. 9343-9353 - Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat:
Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures. 9355-9381 - Marc-André Fiedler
, Philipp Werner, Michal Rapczynski, Ayoub Al-Hamadi:
Deep face segmentation for improved heart and respiratory rate estimation from videos. 9383-9402 - Asma Baghdadi
, Rahma Fourati
, Yassine Aribi, Sameh S. Daoud, Mariem Dammak, Chokri Mhiri, Habib Chabchoub, Patrick Siarry, Adel M. Alimi
:
A channel-wise attention-based representation learning method for epileptic seizure detection and type classification. 9403-9418 - Jenish Dhanani
, Rupa G. Mehta
, Dipti P. Rana:
DSPWE: distributed sentiment polarized word embedding for voluminous textual data. 9419-9433 - Turker Tuncer, Sengul Dogan, Abdulhamit Subasi
:
Automated facial expression recognition using novel textural transformation. 9435-9449 - Anh Mai The, Dang Thai Son, Ta Hung Cuong, Ho Sy Phuong
:
Comprehensive optimal fuzzy control for a two-wheeled balancing mobile robot. 9451-9467 - Sudeshna Devnath
, Manoranjan De, Seema Sarkar Mondal, Manoranjan Maiti:
Two-stage multi-item 4-dimensional transportation problem with fuzzy risk and substitution. 9469-9496 - Eman Thabet Khalid
, Mustafa Salah Khalefa, Wijdan Yassen
, Ali A. Yassin
:
Omicron virus emotions understanding system based on deep learning architecture. 9497-9507 - Lingamallu Naga Srinivasu
, Vijayaraghavan Veeramani
:
Steganography using wavelet transform for secured data transmission. 9509-9527 - Ruhul Amin
, Sakshita Jayaswal, Venkatasamy Sureshkumar, Balram Rathore, Ananya Jha, Mohammad Abdussami
:
IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication. 9529-9542 - Sakshi Indolia, Swati Nigam, Rajiv Singh
:
A framework for facial expression recognition using deep self-attention network. 9543-9562 - Aolei Yang
, Guancheng Liu, Wasif Naeem, Dakui Wu, Yinghong Zhou, Ling Chen:
A monocular 3D human pose estimation approach for virtual character skeleton retargeting. 9563-9574 - Homayoun Honari, Saeed Khodaygan
:
Deep reinforcement learning-based framework for constrained any-objective optimization. 9575-9591 - Muhammad Riaz
, Hafiz Muhammad Athar Farid, Rukhsana Kausar
:
Innovative intuitionistic fuzzy fairly aggregation operators with linear programming based decision-making approach. 9593-9605 - Venkateswarlu Nalluri
, Jing-Rong Chang, Long-Sheng Chen
, Jia-Chuan Chen:
Building prediction models and discovering important factors of health insurance fraud using machine learning methods. 9