


default search action
Journal of King Saud University - Computer and Information Sciences, Volume 34
Volume 34, Number 1, January 2022
- Abdul Razaque

, Syed Rizvi, Meer Jaro Khan
, Muder Almiani
, Amer Al-Rahayfeh:
State-of-art review of information diffusion models and their impact on social network vulnerabilities. 1275-1294 - Patrick Kwabena Mensah

, Adebayo Felix Adekoya
, Mighty Abra Ayidzoe
, Edward Y. Baagyire:
Capsule Networks - A survey. 1295-1310
- A. N. M. JayaLakshmi, K. V. Krishna Kishore:

Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib. 1311-1319 - L. B. Krithika

, G. G. Lakshmi Priya
:
MAFONN-EP: A Minimal Angular Feature Oriented Neural Network based Emotion Prediction system in image processing. 1320-1329 - Aziz Qaroush, Bassam Jaber, Khader Mohammad

, Mahdi Washaha, Eman Maali, Nibal Nayef:
An efficient, font independent word and character segmentation algorithm for printed Arabic text. 1330-1344 - Rusul Nabeel, Mohammed H. Al-Jammas

:
The GOP Inter Prediction of H.264 AV\C. 1345-1351 - M. Anousouya Devi

, J. I. Sheeba
, K. Suresh Joseph:
Neutrosophic graph cut-based segmentation scheme for efficient cervical cancer detection. 1352-1360 - Pradip Salve

, Pravin L. Yannawar
, Milind Sardesai:
Multimodal plant recognition through hybrid feature fusion technique using imaging and non-imaging hyper-spectral data. 1361-1369 - Soufiane Khedairia

, Mohamed Tarek Khadir:
A multiple clustering combination approach based on iterative voting process. 1370-1380 - Hussein Abdel-Mawgoud, Salah Kamel

, Juan Yu, Francisco Jurado
:
Hybrid Salp Swarm Algorithm for integrating renewable distributed energy resources in distribution systems considering annual load growth. 1381-1393 - N. V. S. Lakshmipathi Raju, M. N. Seeta Ramanath, P. Srinivasa Rao:

An enhanced dynamic KC-slice model for privacy preserving data publishing with multiple sensitive attributes by inducing sensitivity. 1394-1406 - Radwa M. K. Saeed, Sherine Rady

, Tarek F. Gharib:
An ensemble approach for spam detection in Arabic opinion texts. 1407-1416 - Manreet Sohal, Sandeep Sharma

:
BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. 1417-1425 - Altaf Alaoui

, Dakki Mohamed, Soumia Ziti
, Badia Ettaki, Jamal Zerouaoui:
Model for data codification in hierarchical classifications with application to the biodiversity domain. 1426-1433 - Sanjaya Kumar Panda

, Shradha Surachita Nanda, Sourav Kumar Bhoi:
A pair-based task scheduling algorithm for cloud computing environment. 1434-1445 - Ahmed Farag

, Hatem Abd El-Kader, Rashed K. Salem
:
Parallel graph-based anomaly detection technique for sequential data. 1446-1454 - Deena P. Francis

, Kumudha Raimond
:
A practical streaming approximate matrix multiplication algorithm. 1455-1465 - Shikha Mehta

, Parul Agarwal
, Prakhar Shrivastava
, Jharna Barlawala:
Differential bond energy algorithm for optimal vertical fragmentation of distributed databases. 1466-1471 - Zouhaier Brahmia

, Hind Hamrouni, Rafik Bouaziz
:
TempoX: A disciplined approach for data management in multi-temporal and multi-schema-version XML databases. 1472-1488 - Sai Krishna Mothku

, Rashmi Ranjan Rout
:
Fuzzy logic based adaptive duty cycling for sustainability in energy harvesting sensor actor networks. 1489-1497 - Kamel Aizi, Mohamed Ouslim:

Score level fusion in multi-biometric identification based on zones of interest. 1498-1509 - C. Kalaiarasy

, N. Sreenath:
An incentive-based co-operation motivating pseudonym changing strategy for privacy preservation in mixed zones in vehicular networks. 1510-1520 - Myat Cho Mon Oo, Thandar Thein:

An efficient predictive analytics system for high dimensional big data. 1521-1532 - Sakshi Dhall, Saibal K. Pal, Kapil Sharma

:
A chaos-based probabilistic block cipher for image encryption. 1533-1543
Volume 34, Number 2, February 2022
- Anureet Kaur

, Kulwant Kaur:
Systematic literature review of mobile application development and testing effort estimation. 1-15 - Martin Luther Mfenjou, Ado Adamou Abba Ari

, Arouna Ndam Njoya, David Jaurès Fotsa-Mbogne
, Kolyang, Wahabou Abdou
, François Spies:
Control points deployment in an Intelligent Transportation System for monitoring inter-urban network roadway. 16-26 - Vishal Kumar Arora

, Vishal Sharma, Monika Sachdeva
:
On QoS evaluation for ZigBee incorporated Wireless Sensor Network (IEEE 802.15.4) using mobile sensor nodes. 27-35 - Aya H. Allam, Mohamed Taha

, Hala H. Zayed
:
Enhanced Zone-Based Energy Aware Data Collection Protocol for WSNs (E-ZEAL). 36-46 - Aya Ayadi

, Oussama Ghorbel, M. S. Ben Saleh, Mohamed Abid:
A framework of monitoring water pipeline techniques based on sensors technologies. 47-57 - P. Shamna, V. K. Govindan, K. A. Abdul Nazeer:

Content-based medical image retrieval by spatial matching of visual words. 58-71 - Meera Doshi, Prakash Gajjar, Ashish Kothari

:
Zoom based image super-resolution using DCT with LBP as characteristic model. 72-85 - Md Shamim Hossain

:
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images. 86-94 - Anisha M. Lal

, S. Margret Anouncia
:
Modernizing the multi-temporal multispectral remotely sensed image change detection for global maxima through binary particle swarm optimization. 95-103 - De Rosal Ignatius Moses Setiadi:

Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. 104-114 - Abhishek Bal

, Minakshi Banerjee, Amlan Chakrabarti
, Punit Sharma:
MRI Brain Tumor Segmentation and Analysis using Rough-Fuzzy C-Means and Shape Based Properties. 115-133 - Agnieszka Jastrzebska:

Time series classification through visual pattern recognition. 134-142 - Dande Anil Kumar, A. S. C. S. Sastry, P. V. V. Kishore

, Kiran Kumar Eepuri
:
3D sign language recognition using spatio temporal graph kernels. 143-152 - Muhammad Aminu, Noor Atinah Ahmad:

Locality preserving partial least squares discriminant analysis for face recognition. 153-164 - Priya Mariam Raju

, Madhu S. Nair:
Copy-move forgery detection using binary discriminant features. 165-178 - Rami Mustafa A. Mohammad:

An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime. 179-190 - Md Tarique Jamal Ansari

, Dhirendra Pandey
, Mamdouh Alenezi
:
STORE: Security Threat Oriented Requirements Engineering Methodology. 191-203 - Lamiaa A. Elrefaei

, Ashwaq M. Al-Mohammadi:
Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme. 204-217 - Mudasir Ahmad Wani

, Suraiya Jabin
:
Mutual clustering coefficient-based suspicious-link detection approach for online social networks. 218-231 - Abdul A. Orunsolu, Adesina S. Sodiya, A. T. Akinwale:

A predictive model for phishing detection. 232-247 - Dheeraj Malhotra

, Om Prakash Rishi
:
IMSS-P: An intelligent approach to design & development of personalized meta search & page ranking system. 248-263 - Ema Utami

, Anggit Dwi Hartanto
, Sumarni Adi
, Irwan Oyong
, Suwanto Raharjo
:
Profiling analysis of DISC personality traits based on Twitter posts in Bahasa Indonesia. 264-269 - N. Arunachalam, A. Amuthan

:
Improved Cosine Similarity-based Artificial Bee Colony Optimization scheme for reactive and dynamic service composition. 270-281 - Suvendu Chandan Nayak

, Sasmita Parida
, Chitaranjan Tripathy, Prasant Kumar Pattnaik
:
An enhanced deadline constraint based task scheduling mechanism for cloud environment. 282-294 - Qurrat Ain, Muhammad Amir Mehmood:

Runtime performance evaluation and optimization of type-2 hypervisor for MIPS64 architecture. 295-307 - Sankalap Arora

, Ranjit Kaur:
An escalated convergent firefly algorithm. 308-315 - Hichem Haouassi, Elkamel Merah, Mehdaoui Rafik

, Maarouk Toufik Messaoud
, Ouahiba Chouhal:
A new binary grasshopper optimization algorithm for feature selection problem. 316-328 - Allam Mohan, Malaiyappan Nandhini

:
Optimal feature selection using binary teaching learning based optimization algorithm. 329-341 - Hajer Toumi, Zaki Brahmi, Mohamed Mohsen Gammoudi

:
RTSLPS: Real time server load prediction system for the ever-changing cloud computing environment. 342-353 - Mutaz A. B. Al-Tarawneh

, Amjed A. Al-Mousa:
Adaptive user-oriented fuzzy-based service broker for cloud services. 354-364 - Zubair Jeelani

, Fasel Qadir:
Cellular automata-based approach for salt-and-pepper noise filtration. 365-374 - Kaavya Kanagaraj, G. G. Lakshmi Priya

:
Curvelet transform based feature extraction and selection for multimedia event classification. 375-383 - Kasiprasad Mannepalli, Panyam Narahari Sastry

, Maloji Suman:
Emotion recognition in speech signals using optimization based multi-SVNN classifier. 384-397 - Ismail Keshta

:
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice. 398-407 - Mona Moradi

, Mohammad Rahmanimanesh, Ali Shahzadi
:
On evaluating the collaborative research areas: A case study. 408-420 - Ankita Gupta

, Chetna Gupta:
CDBR: A semi-automated collaborative execute-before-after dependency-based requirement prioritization approach. 421-432 - Saeid Masoumi

, Ali Mahjur:
A new way of crosscutting roles in set oriented programming. 433-442 - Debashreet Das, Chita Ranjan Tripathy, Pradyumna Kumar Tripathy

, Manas Ranjan Kabat:
A Genetic Algorithm based approach for designing multi-state computational grid with cost and bandwidth constraints. 443-456 - R. Padmanaban, M. Thirumaran, P. Anitha, A. Moshika:

Computability evaluation of RESTful API using Primitive Recursive Function. 457-467 - Gebeyehu Belay Gebremeskel, Birhanu Hailu Belay, Belete Biazen:

Architecture and optimization of data mining modeling for visualization of knowledge extraction: Patient safety care. 468-479 - Guru Prasad Bhandari

, Ratneshwer Gupta:
Dependency-based fault diagnosis approach for SOA-based systems using Colored Petri Nets. 480-491 - M. Chennakesavulu, T. Jayachandra Prasad, V. Sumalatha

:
Data encoding techniques to improve the performance of System on Chip. 492-503
Volume 34, Number 3, March 2022
- Anwar Shah

, Javed Iqbal Bangash, Abdul Waheed Khan, Imran Ahmed, Abdullah Khan, Asfandyar Khan, Arshad Khan:
Comparative analysis of median filter and its variants for removal of impulse noise from gray scale images. 505-519 - Pawan Kumar Upadhyay, Satish Chandra:

An improved bag of dense features for skin lesion recognition. 520-525 - Md. Mahmodul Hasan

, Nazrul Islam
, Mohammad Motiur Rahman:
Gastrointestinal polyp detection through a fusion of contourlet transform and Neural features. 526-533 - Kavitha A. V.

, Srikrishna Atluri
, Satyanarayana Ch.:
Crop image classification using spherical contact distributions from remote sensing images. 534-545 - Fahima Tabassum, Md. Imdadul Islam, Risala Tasin Khan, M. Ruhul Amin:

Human face recognition with combination of DWT and machine learning. 546-556 - C. Jaspin Jeba Sheela, G. Suganthi:

Automatic Brain Tumor Segmentation from MRI using Greedy Snake Model and Fuzzy C-Means Optimization. 557-566 - Ivan William Harsono

, Suryadiputra Liawatimena
, Tjeng Wawan Cenggoro:
Lung nodule detection and classification from Thorax CT-scan using RetinaNet with transfer learning. 567-577 - Aparna, Yukti Bhatia, Rachna Rai, Varun Gupta, Naveen Aggarwal, Aparna Akula:

Convolutional neural networks based potholes detection using thermal imaging. 578-588 - Leena Mary Francis, N. Sreenath:

Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine. 589-604 - Dhani Ariatmanto

, Ferda Ernawan
:
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking. 605-614 - Vipul Sharma

, Roohie Naaz Mir:
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. 615-626 - Subiono

, Joko Cahyono, Dieky Adzkiya
, Bijan Davvaz:
A cryptographic algorithm using wavelet transforms over max-plus algebra. 627-635 - Subhadeep Koley

:
A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography. 636-645 - Ismail Boucherit

, Mohamed Ould-Zmirli, Hamza Hentabli, Bakhtiar Affendi Rosdi:
Finger vein identification using deeply-fused Convolutional Neural Network. 646-656 - Alka Agrawal, Mamdouh Alenezi

, Suhel Ahmad Khan
, Rajeev Kumar
, Raees Ahmad Khan:
Multi-level Fuzzy system for usable-security assessment. 657-665 - Anak Agung Gde Agung

, Rini Handayani:
Blockchain for smart grid. 666-675 - N. Sasikaladevi

, K. Geetha, A. Revathi
:
EMOTE - Multilayered encryption system for protecting medical images based on binary curve. 676-686 - Stéphane Cédric Koumétio Tékouabou

, El Arbi Abdellaoui Alaoui, Walid Cherif, Hassan Silkan
:
Improving parking availability prediction in smart cities with IoT and ensemble-based model. 687-697 - Akber Ali Khan

, Vinod Kumar
, Musheer Ahmad:
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. 698-705 - Gandeva Bayu Satrya

, Soo Young Shin:
Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks. 706-715 - Kale Navnath Dattatraya

, K. Raghava Rao:
Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN. 716-726 - Shahan Yamin Siddiqui, Muhammad Adnan Khan

, Sagheer Abbas
, M. Farrukh Khan:
Smart occupancy detection for road traffic parking using deep extreme learning machine. 727-733 - Anvesha Katti

:
Target coverage in random wireless sensor networks using cover sets. 734-746 - Marwa K. Elteir, Shaimaa Lazem

, Mohamed Azab:
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study. 747-756 - Sheikh Fahad Ahmad

, Deepak Kumar Singh
:
Automatic detection of tree cutting in forests using acoustic properties. 757-763 - Mohammad K. Nammous

, Khalid Saeed, Pawel Kobojek:
Using a small amount of text-independent speech data for a BiLSTM large-scale speaker identification approach. 764-770 - P. K. Athira, C. J. Sruthi

, A. Lijiya
:
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario. 771-781 - Obed Appiah, Michael Asante, James Benjamin Hayfron-Acquah:

Improved approximated median filter algorithm for real-time computer vision applications. 782-792 - Taushif Anwar

, V. Uma
:
CD-SPM: Cross-domain book recommendation using sequential pattern mining and rule mining. 793-800 - Dede Rohidin, Noor Azah Samsudin, Mustafa Mat Deris:

Association rules of fuzzy soft set based classification for text classification problem. 801-812 - Amanpreet Kaur

, Bikrampal Kaur:
Load balancing optimization based on hybrid Heuristic-Metaheuristic techniques in cloud environment. 813-824 - Rojalina Priyadarshini

, Rabindra Kumar Barik:
A deep learning based intelligent framework to mitigate DDoS attack in fog environment. 825-831 - Kareem Kamal A. Ghany

, Amr Mohamed AbdelAziz, Taysir Hassan A. Soliman, Adel Abu El-Magd Sewisy:
A hybrid modified step Whale Optimization Algorithm with Tabu Search for data clustering. 832-839 - Ali Sabah Abdulameer, Sabrina Tiun

, Nor Samsiah Sani
, Masri Ayob, Adil Yaseen Taha
:
Enhanced clustering models with wiki-based k-nearest neighbors-based representation for web search result clustering. 840-850 - Mamta Kayest, Sanjay Kumar Jain:

Optimization driven cluster based indexing and matching for the document retrieval. 851-861 - Saiteja Prasad Chatrati, Gahangir Hossain

, Ayush Goyal
, Anupama Bhan
, Sayantan Bhattacharya, Devottam Gaurav, Sanju Mishra Tiwari:
Smart home health monitoring system for predicting type 2 diabetes and hypertension. 862-870 - Abdelaziz I. Hammouri:

A modified biogeography-based optimization algorithm with guided bed selection mechanism for patient admission scheduling problems. 871-879 - Rasmita Dash

, Rajashree Dash
, Rasmita Rautray
:
An evolutionary framework based microarray gene selection and classification approach using binary shuffled frog leaping algorithm. 880-891 - Ahmed Aziz, Walid Osamy, Ahmed M. Khedr, Ahmed Salim:

Iterative selection and correction based adaptive greedy algorithm for compressive sensing reconstruction. 892-900 - Abid Ismail, K. S. Kuppusamy:

Web accessibility investigation and identification of major issues of higher education websites with statistical measures: A case study of college websites. 901-911 - Md. Shahidul Islam

, Md. Rafiqul Islam:
A hybrid framework based on genetic algorithm and simulated annealing for RNA structure prediction with pseudoknots. 912-922 - R. Sakthi Murugan, V. S. Ananthanarayana:

WordCode using WordTrie. 923-933 - Ensaf Hussein Mohamed, Eyad Mohamed Shokry:

QSST: A Quranic Semantic Search Tool based on word embedding. 934-945 - Anureet Kaur

, Kulwant Kaur:
A COSMIC function points based test effort estimation model for mobile applications. 946-963 - Bata Krishna Tripathy, Kshira Sagar Sahoo

, Ashish Kr. Luhach
, N. Z. Jhanjhi
, Swagat Kumar Jena
:
A virtual execution platform for OpenFlow controller using NFV. 964-971 - Sharmila Subudhi

, Suvasini Panigrahi:
Application of OPTICS and ensemble learning for Database Intrusion Detection. 972-981 - Jihene Younes, Hadhemi Achour

, Emna Souissi, Ahmed Ferchichi:
Romanized Tunisian dialect transliteration using sequence labelling techniques. 982-992 - Sonali Pradhan, Mitrabinda Ray

, Santosh Kumar Swain
:
Transition coverage based test case generation from state chart diagram. 993-1002 - Samuel Asante Gyamerah:

On forecasting the intraday Bitcoin price using ensemble of variational mode decomposition and generalized additive model. 1003-1009
Volume 34, Number 4, April 2022
- Nouf Ibrahim Altmami, Mohamed El Bachir Menai:

Automatic summarization of scientific articles: A survey. 1011-1028 - Adhika Pramita Widyassari

, Supriadi Rustad, Guruh Fajar Shidik
, Edi Noersasongko
, Abdul Syukur, Affandy Affandy, De Rosal Ignatius Moses Setiadi:
Review of automatic text summarization techniques & methods. 1029-1046 - Bam Bahadur Sinha

, R. Dhanalakshmi:
Evolution of recommender paradigm optimization over time. 1047-1059 - Utkarsh Mahadeo Khaire, R. Dhanalakshmi:

Stability of feature selection algorithm: A review. 1060-1073 - Amer F. Al-Badarneh, Salahaldeen Atef Rababa:

An analysis of two-way equi-join algorithms under MapReduce. 1074-1085 - Punam Kumari, K. R. Seeja

:
Periocular biometrics: A survey. 1086-1097 - Madhulika Yarlagadda

, Gangadhara Rao Kancherla, Srikrishna Atluri
:
Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering. 1098-1109 - Salha Alzahrani

, Hanan Aljuaid
:
Identifying cross-lingual plagiarism using rich semantic features and deep neural networks: A study on Arabic-English plagiarism cases. 1110-1123 - Hanane Zitouni, Souham Meshoul

, Chaker Mezioud:
New contextual collaborative filtering system with application to personalized healthy nutrition education. 1124-1137 - Mantim Innocent Fale

, Abdulsalam Ya'u Gital:
Dr. Flynxz - A First Aid Mamdani-Sugeno-type fuzzy expert system for differential symptoms-based diagnosis. 1138-1149 - Amina Boufrida, Zizette Boufaïda:

Rule extraction from scientific texts: Evaluation in the specialty of gynecology. 1150-1160 - Ghassen Hamdi, Abdelmoutia Telli

, Mohamed Nazih Omri:
Querying of several DL-Lite knowledge bases from various information sources-based polynomial response unification approach. 1161-1171 - Sanjay Agrawal

, Rutuparna Panda, Pranaba K. Mishro
, Ajith Abraham:
A novel joint histogram equalization based image contrast enhancement. 1172-1182 - B. Rose Kavitha

, C. Srimathi
:
Benchmarking on offline Handwritten Tamil Character Recognition using convolutional neural networks. 1183-1190 - M. S. Safna Asiq, W. R. Sam Emmanuel:

Efficient colour filter array demosaicking with prior error reduction. 1191-1199 - Md. Tarek Habib, Md. Jueal Mia

, Mohammad Shorif Uddin, Farruk Ahmed:
An in-depth exploration of automated jackfruit disease recognition. 1200-1209 - Amlan Jyoti Das, Navajit Saikia:

Design of pedestrian detectors using combinations of scale spaces and classifiers. 1210-1218 - Bouchra Honnit, Khaoula Belhaj Soulami, Mohamed Nabil Saidi, Ahmed Tamtaoui:

Moving objects multi-classification based on information fusion. 1219-1230 - Ranjeet Kumar

, Utpreksh Patbhaje, Anil Kumar
:
An efficient technique for image compression and quality retrieval using matrix completion. 1231-1239 - Leonardo Orazi

, Barbara Reggiani:
A novel algorithm for a continuous and fast 3D projection of points on triangulated surfaces for CAM/CAD/CAE applications. 1240-1245 - Mahmoud E. Hodeish, Linas Bukauskas

, Vikas T. Humbe:
A new efficient TKHC-based image sharing scheme over unsecured channel. 1246-1262 - Haider Ismael Shahadi, Ahmed Toman Thahab, Hameed R. Farhan

:
A novel robust approach for image copyright protection based on concentric rectangles. 1263-1274 - Vani Krishnaswamy, Sunilkumar S. Manvi:

Palm tree structure based data aggregation and routing in underwater wireless acoustic sensor networks: Agent oriented approach. 1275-1284 - Mudassar Ali Syed

, Raziuddin Syed:
Weighted Salp Swarm Algorithm and its applications towards optimal sensor deployment. 1285-1295 - Marziyeh Karimiyan Khouzani, Sadegh Sulaimany

:
Identification of the effects of the existing network properties on the performance of current community detection methods. 1296-1304 - Pardeep Kumar, Seema Verma

:
Implementation of modified OLSR protocol in AANETs for UDP and TCP environment. 1305-1311 - Shardha Porwal, Sangeeta Mittal

:
HE3: A hierarchical attribute based secure and efficient things-to-fog content sharing protocol. 1312-1325 - Loganathan Jayakumar

, S. Janakiraman
:
A novel need based free channel selection scheme for cooperative CRN using EFAHP-TOPSIS. 1326-1342 - Norah Alanazi, Esam Khan

, Adnan Gutub
:
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses. 1343-1356 - Anuraj Singh

, Sumit Raj:
Securing password using dynamic password policy generator algorithm. 1357-1361 - Tohari Ahmad

, Alek Nur Fatman:
Improving the performance of histogram-based data hiding method in the video environment. 1362-1372 - Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar

, Sunny Behal
:
E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks. 1373-1387 - Adnan Alrabea

:
A modified Boneh-Lynn-Shacham signing dynamic auditing in cloud computing. 1388-1394 - Aditya Kumar Sahu

, Gandharba Swain:
High fidelity based reversible data hiding using modified LSB matching and pixel difference. 1395-1409 - Emna Benmohamed

, Hela Ltifi, Mounir Ben Ayed:
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning. 1410-1422 - Brijesh B. Mehta

, Udai Pratap Rao:
Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing. 1423-1430 - Mohamed-Hamed Mousa

, Mohamed-K. Hussein
:
Surface approximation using GPU-based localized fourier transform. 1431-1438 - Chuya China Bhanja, Mohammad Azharuddin Laskar

, Rabul Hussain Laskar, Sivaji Bandyopadhyay:
Deep neural network based two-stage Indian language identification system using glottal closure instants as anchor points. 1439-1454 - Lei Li

, Zhaoqiang Xia, Jun Wu, Lei Yang, Huijian Han
:
Face presentation attack detection based on optical flow and texture analysis. 1455-1467 - Maryam Shabbir, Fahad Ahmad

, Ayesha Shabbir, Saad Awadh Alanazi:
Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution. 1468-1485 - Fawad Javaid, Anyi Wang, Muhammad Usman Sana, Hafiz Zameer ul Hassan, Imran Ashraf:

A dual channel and node mobility based cognitive approach to optimize wireless networks in coal mines. 1486-1497 - Desoky Abdelqawy, Abeer Elkorany

, Amr Kamel, Soha Makady:
Hub-OS: An interoperable IoT computing platform for resources utilization with real-time support. 1498-1510 - Siddhant Sinha, Shambhavi Mishra, Vipul Kumar Mishra

, Tanveer Ahmed:
Sector influence aware stock trend prediction using 3D convolutional neural network. 1511-1522 - Smita Athanere

, Ramesh Thakur:
Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing. 1523-1534 - Xinyu Gao, Jun Mou

, Santo Banerjee
, Yinghong Cao, Li Xiong, Xiaoyang Chen:
An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map. 1535-1551 - Sheuli Chakraborty

, Kaushik Mazumdar:
Sustainable task offloading decision using genetic algorithm in sensor mobile edge computing. 1552-1568 - Xiao Jian Tan, Wai Loon Cheor, Kwok Shien Yeo, Wai Zhe Leow:

Expert systems in oil palm precision agriculture: A decade systematic review. 1569-1594 - Partha Pratim Ray:

A review on TinyML: State-of-the-art and prospects. 1595-1623
Volume 34, Number 5, May 2022
- Mutasem K. Alsmadi, Ibrahim Almarashdeh

:
A survey on fish classification techniques. 1625-1638 - Sunil Kumar

, Krishna Kumar Mohbey
:
A review on big data based parallel and distributed approaches of pattern mining. 1639-1662 - Mohd Saad Hamid

, Nurulfajar Abd Manap
, Rostam Affendi Hamzah
, Ahmad Fauzan Kadmin
:
Stereo matching algorithm based on deep learning: A survey. 1663-1673 - Zhihuo Xu

, Hongchen Zhang, Yuexia Wang
, Xiaoyue Wang, Shuaikang Xue, Weixue Liu:
Dynamic detection of offshore wind turbines by spatial machine learning from spaceborne synthetic aperture radar imagery. 1674-1686 - Vipul Sharma

, Roohie Naaz Mir:
Saliency guided faster-RCNN (SGFr-RCNN) model for object detection and recognition. 1687-1699 - Priyadarshini Adyasha Pattanaik

, Mohit Mittal, Mohammad Zubair Khan
, Surya Narayan Panda:
Malaria detection using deep residual networks with mobile microscopy. 1700-1705 - Supriya Suresh, Subaji Mohan:

NROI based feature learning for automated tumor stage classification of pulmonary lung nodules using deep convolutional neural networks. 1706-1717 - Moses Apambila Agebure

, Elkanah Olaosebikan Oyetunji, Edward Yellakuor Baagyere:
A three-tier road condition classification system using a spiking neural network model. 1718-1729 - Pallavi Pandey

, K. R. Seeja
:
Subject independent emotion recognition from EEG using VMD and deep learning. 1730-1738 - Leila Boussaad, Aldjia Boucetta:

An effective component-based age-invariant face recognition using Discriminant Correlation Analysis. 1739-1747 - J. Loveline Zeema, D. Francis Xavier Christopher:

Evolving Optimized Neutrosophic C means clustering using Behavioral Inspiration of Artificial Bacterial Foraging (ONCMC-ABF) in the Prediction of Dyslexia. 1748-1754 - Xiangyu Lu, Rui Yang, Jun Zhou, Jie Jiao, Fei Liu, Yufei Liu, Baofeng Su, Peiwen Gu:

A hybrid model of ghost-convolution enlightened transformer for effective diagnosis of grape leaf disease and pest. 1755-1767 - Adeel Shiraz Hashmi, Tanvir Ahmad

:
GP-ELM-RNN: Garson-pruned extreme learning machine based replicator neural network for anomaly detection. 1768-1774 - Rubaiya Hafiz

, Mohammad Reduanul Haque, Aniruddha Rakshit
, Mohammad Shorif Uddin:
Image-based soft drink type classification and dietary assessment system using deep convolutional neural network with transfer learning. 1775-1784 - P. Anitha, Malini M. Patil:

RFM model for customer purchase behavior using K-Means algorithm. 1785-1792 - Rihem Mahmoud

, Selma Belgacem
, Mohamed Nazih Omri:
Deep signature-based isolated and large scale continuous gesture recognition approach. 1793-1807 - Mohammed Alweshah

, Lobna Rababa, Mohammed Hashem Ryalat
, Ammar Al Momani, Mohamed F. Ababneh
:
African buffalo algorithm: Training the probabilistic neural network to solve classification problems. 1808-1818 - Kaoutar Ahed, Maria Benamar, Ayoub Ait Lahcen

, Rajae El Ouazzani:
Forwarding strategies in vehicular named data networks: A survey. 1819-1835 - A. Amuthan

, Ramu Kaviarasan
:
Rank Criteria Improved Confidence-based centroid scheme for Non Line of Sight node localizations in vehicular networks. 1836-1844 - Tushar Kanta Samal, Sushree Chinmayee Patra, Manas Ranjan Kabat:

An adaptive cuckoo search based algorithm for placement of relay nodes in wireless body area networks. 1845-1856 - Aljapur Vinitha, Mulpuri Santhi Sri Rukmini, Dhirajsunehra:

Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. 1857-1868 - Kamal Berahmand

, Sogol Haghani, Mehrdad Rostami
, Yuefeng Li:
A new attributed graph clustering by using label propagation in complex networks. 1869-1883 - Richa Sharma, Vasudha Vashisht

, Umang Singh:
Fuzzy modelling based energy aware clustering in wireless sensor networks using modified invasive weed optimization. 1884-1894 - Bandi Rambabu

, Venugopal Reddy Ananthula, Sengathir Janakiraman:
Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSNs. 1895-1905 - Kapil Netaji Vhatkar, Girish P. Bhole:

Optimal container resource allocation in cloud architecture: A new hybrid model. 1906-1918 - Shikah J. Alsunaidi

, Abdullah Mohammed Almuhaideb
:
Investigation of the optimal method for generating and verifying the Smartphone's fingerprint: A review. 1919-1932 - P. Karthik, P. Shanthi Bala

:
A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function. 1933-1949 - Benfano Soewito

, Agung Suwandaru
:
Android sensitive data leakage prevention with rooting detection using Java function hooking. 1950-1957 - Abhishek Kesarwani

, Pabitra Mohan Khilar:
Development of trust based access control models using fuzzy logic in cloud computing. 1958-1967 - Olorunjube James Falana

, Adesina Simon Sodiya, Saidat Adebukola Onashoga
, Biodun Surajudeen Badmus:
Mal-Detect: An intelligent visualization approach for malware detection. 1968-1983 - S. H. Kok, Azween B. Abdullah, N. Z. Jhanjhi

:
Early detection of crypto-ransomware using pre-encryption detection algorithm. 1984-1999 - R. Vidhya, M. Brindha

:
A chaos based image encryption algorithm using Rubik's cube and prime factorization process (CIERPF). 2000-2016 - Fatuma Saeid Hassan, Adnan Gutub

:
Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme. 2017-2030 - Rachana Yogesh Patil, Satish R. Devane

:
Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime. 2031-2044 - Ahmed Manasrah, Thair Khdour, Raeda Freehat:

DGA-based botnets detection using DNS traffic mining. 2045-2061 - G. Kalyani, Shilpa Chaudhari

:
Data privacy preservation in MAC aware Internet of things with optimized key generation. 2062-2071 - Md. Wahidur Rahman

, Rahabul Islam
, Arafat Hasan
, Nasima Islam Bithi, Md. Mahmodul Hasan, Mohammad Motiur Rahman:
Intelligent waste management system using deep learning with IoT. 2072-2087 - Kanika Sharma, Alka Agrawal, Dhirendra Pandey

, Raees Ahmad Khan, Shail Kumar Dinkar:
RSA based encryption approach for preserving confidentiality of big data. 2088-2097 - Aytug Onan:

Bidirectional convolutional recurrent neural network architecture with group-wise enhancement mechanism for text sentiment classification. 2098-2117 - Akhilesh Dwivedi, R. P. Pant:

An algorithmic implementation of entropic ternary reduct soft sentiment set (ETRSSS) using soft computing technique on big data sentiment analysis (BDSA) for optimal selection of a decision based on real-time update in online reviews. 2118-2130 - Zouaoui Samia, Khaled Rezeg:

Multi-Agents Indexing System (MAIS) for Plagiarism Detection. 2131-2140 - Deepa Anand, Rupali S. Wagh

:
Effective deep learning approaches for summarization of legal texts. 2141-2150 - Siti Syakirah Sazali, Nurazzah Abdul Rahman, Zainab Abu Bakar:

Characteristics of Malay translated hadith corpus. 2151-2160 - Rizka W. Sholikah, Agus Zainal Arifin, Chastine Fatichah, Ayu Purwarianti

:
Multi task learning with general vector space for cross-lingual semantic relation detection. 2161-2169 - Zarmeen Nasim

, Sajjad Haider:
Cluster analysis of urdu tweets. 2170-2179 - Allah Ditta

, Muhammad Azeem, Shahid Naseem
, Khurram Gulzar Rana, Muhammad Adnan Khan
, Zafar Iqbal:
A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode. 2180-2191 - Ashwani Kumar, Ravinder Kumar, Ashutosh Aggarwal

:
S2RC: A multi-objective route planning and charging slot reservation approach for electric vehicles considering state of traffic and charging station. 2192-2206 - Bayadir A. Issa, Abdulmuttalib Turky Rashid:

Multi-robot control for a static polygon formation using Neighbor-Leader algorithm. 2207-2217 - Bhawna Saxena

, Vikas Saxena:
Hurst exponent based approach for influence maximization in social networks. 2218-2230 - Nouran Ayman R. Abd Al-Azim, Tarek F. Gharib, Mohamed Hamdy, Yasmine M. Afify

:
Influence propagation in social networks: Interest-based community ranking model. 2231-2243 - Bhawani Sankar Biswal, Anjali Mohapatra, Swati Vipsita

:
Ensemble Neighborhood Search (ENS) for biclustering of gene expression microarray data and single cell RNA sequencing data. 2244-2251 - Abdullatif Baba

:
A new design of a flying robot, with advanced computer vision techniques to perform self-maintenance of smart grids. 2252-2261 - Vishal Vyas, V. Uma

, Kumar Ravi
:
Aspect-based approach to measure performance of financial services using voice of customer. 2262-2270 - Omar M. Salih

, Mohammed H. Rasheed
, Mohammed M. Siddeq, Marcos A. Rodrigues
:
Image compression for quality 3D reconstruction. 2271-2287 - Ankita Gupta

, Chetna Gupta:
A novel collaborative requirement prioritization approach to handle priority vagueness and inter-relationships. 2288-2297 - Bilqis Amaliah, Chastine Fatichah

, Erma Suryani:
A new heuristic method of finding the initial basic feasible solution to solve the transportation problem. 2298-2307
Volume 34, Number 6, Part A, June 2022
- Saydul Akbar Murad

, Abu Jafar Md Muzahid
, Zafril Rizal M. Azmi, Md Imdadul Hoque, Md. Kowsher:
A review on job scheduling technique in cloud computing and priority rule based intelligent framework. 2309-2331 - Uttam Kumar Jena

, Pradipta Kumar Das
, Manas Ranjan Kabat:
Hybridization of meta-heuristic algorithm for load balancing in cloud computing environment. 2332-2342 - Danish Ahamad

, Shabi Alam Hameed
, Md. Mobin Akhtar
:
A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. 2343-2358 - Koneti Kalyan Chakravarthi, L. Shyamala, Vaidehi V.:

TOPSIS inspired cost-efficient concurrent workflow scheduling algorithm in cloud. 2359-2369 - Seema A. Alsaidy

, Amenah D. Abbood
, Mouayad A. Sahib
:
Heuristic initialization of PSO task scheduling algorithm in cloud computing. 2370-2382 - Kasturi Dhal

, Satyananda Champati Rai, Prasant Kumar Pattnaik
:
LIKC: A liberty of encryption and decryption through imploration from K-cloud servers. 2383-2390 - Ali Belgacem, Saïd Mahmoudi

, Maria Kihl:
Intelligent multi-agent reinforcement learning model for resources allocation in cloud computing. 2391-2404 - Hanae Errousso, Jihane El Ouadi, El Arbi Abdellaoui Alaoui, Siham Benhadou, Hicham Medromi:

A hybrid modeling approach for parking assignment in urban areas. 2405-2418 - Shimaa A. Abdel Hakeem

, Hanan H. Hussein, HyungWon Kim:
Vision and research directions of 6G technologies and applications. 2419-2442 - N. S. Saba Farheen, Anuj Jain:

Improved routing in MANET with optimized multi path routing fine tuned with hybrid modeling. 2443-2450 - Babatoundé O. Simon Biaou

, Ayodeji O. Oluwatope, Helen O. Odukoya, Ajiboye Babalola, Oluwafolake E. Ojo, Eric Herbert Sossou:
Ayo game approach to mitigate free riding in peer-to-peer networks. 2451-2460 - Lyamine Guezouli

, Kamel Barka, Asma Djehiche
:
UAVs's efficient controlled mobility management for mobile heterogeneous wireless sensor networks. 2461-2470 - Francisco Talavera, Isaac Lera, Carlos Guerrero:

Analysis of wireless network access logs for a hierarchical characterization of user mobility. 2471-2487 - Gazi Zahirul Islam

, Mohammod Abul Kashem:
Efficient resource allocation in the IEEE 802.11ax network leveraging OFDMA technology. 2488-2496 - Fatimah Hussain Al-Naji, Rachid Zagrouba:

CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things. 2497-2514 - Touseef Iqbal, Shaima Qureshi:

The survey: Text generation models in deep learning. 2515-2528 - Omar AlZoubi, Saja Khaled Tawalbeh, Mohammad Al-Smadi

:
Affect detection from arabic tweets using ensemble and deep learning techniques. 2529-2539 - Himansu Das

, Bighnaraj Naik
, Himansu Sekhar Behera, Shalini Jaiswal
, Priyanka Mahato, Minakhi Rout:
Biomedical data analysis using neuro-fuzzy model with post-feature reduction. 2540-2550 - Abdullah Khan, Junaid Bukhari, Javed Iqbal Bangash, Asfandyar Khan, Muhammad Imran, Muhammad Asim, Muhammad Ishaq

, Arshad Khan:
Optimizing connection weights of functional link neural network using APSO algorithm for medical data classification. 2551-2561 - Srinidhi Hiriyannaiah

, G. M. Siddesh, K. G. Srinivasa
:
Deep visual ensemble similarity (DVESM) approach for visually aware recommendation and search in smart community. 2562-2573 - Patrick Kwabena Mensah

, Benjamin Asubam Weyori
, Mighty Abra Ayidzoe
:
Exploring the performance of LBP-capsule networks with K-Means routing on complex images. 2574-2588 - Indrajeet Kumar

, Chandradeep Bhatt, Kamred Udham Singh
:
Entropy based automatic unsupervised brain intracranial hemorrhage segmentation using CT images. 2589-2600 - Salah Alghyaline

:
Real-time Jordanian license plate recognition using deep learning. 2601-2609 - Abu Sufian

, Anirudha Ghosh, Avijit Naskar, Farhana Sultana, Jaya Sil, M. M. Hafizur Rahman
:
BDNet: Bengali Handwritten Numeral Digit Recognition based on Densely connected Convolutional Neural Networks. 2610-2620 - Ayad Tareq Imam

, Basma R. Al-Srour, Aysh Alhroob
:
The automation of the detection of large class bad smell by using genetic algorithm and deep learning. 2621-2636 - Vijayaprabakaran K.

, Sathiyamurthy K.:
Towards activation function search for long short-term model network: A differential evolution based approach. 2637-2650 - Dimah Alahmadi, Arwa M. Wali

, Sarah Alzahrani:
TAAM: Topic-aware abstractive arabic text summarisation using deep recurrent neural networks. 2651-2665 - Shridhar B. Devamane, Rajeshwari L. Itagi

:
Recurrent neural network based turbo decoding algorithms for different code rates. 2666-2679 - Arif Rahman, Edi Winarko

, Khabib Mustofa
:
Product image retrieval using category-aware siamese convolutional neural network feature. 2680-2687 - Afreen Khan

, Swaleha Zubair:
An Improved Multi-Modal based Machine Learning Approach for the Prognosis of Alzheimer's disease. 2688-2706 - Summrina Kanwal

, Faiza Khan, Sultan Alamri:
A multimodal deep learning infused with artificial algae algorithm - An architecture of advanced E-health system for cancer prognosis prediction. 2707-2719 - Ming-Fang Li, Guo-Xiang Zhang, Lu-Tao Zhao

, Tao Song:
Extracting product competitiveness through user-generated content: A hybrid probabilistic inference model. 2720-2732 - Nasir Jalal, Arif Mehmood

, Gyu Sang Choi, Imran Ashraf:
A novel improved random forest for text classification using feature ranking and optimal number of trees. 2733-2742 - Muhammad Hassan

, Yan Wang, Wei Pang
, Di Wang
, Daixi Li, You Zhou, Dong Xu:
IPAS-Net: A deep-learning model for generating high-fidelity shoeprints from low-quality images with no natural references. 2743-2757 - Mohamed Zouheir Kastouni, Ayoub Ait Lahcen

:
Big data analytics in telecommunications: Governance, architecture and use cases. 2758-2770 - Ruby Rani

, D. K. Lobiyal:
Performance evaluation of text-mining models with Hindi stopwords lists. 2771-2786 - Israa Al-Badarneh

, Maria Habib, Ibrahim Aljarah, Hossam Faris:
Neuro-evolutionary models for imbalanced classification problems. 2787-2797 - Manjunath K. Vanahalli, Nagamma Patil:

An efficient colossal closed itemset mining algorithm for a dataset with high dimensionality. 2798-2808 - Maryem Rhanoui, Mounia Mikram, Siham Yousfi, Ayoub Kasmi, Naoufel Zoubeidi:

A hybrid recommender system for patron driven library acquisition and weeding. 2809-2819 - Honey Jindal, Neetu Sardana:

Web navigation prediction based on dynamic threshold heuristics. 2820-2830 - Kristo Radion Purba, David Asirvatham

, Raja Kumar Murugesan
:
Influence maximization diffusion models based on engagement and activeness on instagram. 2831-2839 - Basavaraj N. Hiremath

, Malini M. Patil:
Enhancing Optimized Personalized Therapy in Clinical Decision Support System using Natural Language Processing. 2840-2848 - Manar Alassaf, Ali Mustafa Qamar

:
Improving Sentiment Analysis of Arabic Tweets by One-way ANOVA. 2849-2859 - Ravindra Kumar Singh, Harsh Kumar Verma:

Effective Parallel Processing Social Media Analytics Framework. 2860-2870 - Yanyi Nie, Xiaoni Zhong, Tao Wu, Yanbing Liu, Tao Lin, Wei Wang:

Effects of network temporality on coevolution spread epidemics in higher-order network. 2871-2882 - Fernando Pinciroli

, José Luís Barros Justo, Raymundo Forradellas:
Systematic mapping study: On the coverage of aspect-oriented methodologies for the early phases of the software development life cycle. 2883-2896 - Neha Gupta

, Arun Sharma
, Manoj Kumar Pachariya:
Multi-objective test suite optimization for detection and localization of software faults. 2897-2909 - José-Ramón Sánchez-Couso, Fernando Arroyo, Victor Mitrana

, Andrei Paun, Mihaela Paun:
Accepting multiple splicing systems. 2910-2915 - Sarvesh Pandey

, Udai Shanker
:
RAPID: A real time commit protocol. 2916-2925 - Malek Alzaqebah

, Sana Jawarneh
, Maram Al-Wohaibi
, Mutasem K. Alsmadi, Ibrahim Almarashdeh
, Rami Mustafa A. Mohammad:
Hybrid Brain Storm Optimization algorithm and Late Acceptance Hill Climbing to solve the Flexible Job-Shop Scheduling Problem. 2926-2937 - Utpal Barman

, Ridip Dev Choudhury
:
Smartphone image based digital chlorophyll meter to estimate the value of citrus leaves chlorophyll using Linear Regression, LMBP-ANN and SCGBP-ANN. 2938-2950 - Zeyad Safaa Younus

, Mohammed Khaire Hussain
:
Image steganography using exploiting modification direction for compressed encrypted data. 2951-2963 - Mohd Rafi Lone

:
A high speed and memory efficient algorithm for perceptually-lossless volumetric medical image compression. 2964-2974 - Leila Boussaad, Aldjia Boucetta:

Deep-learning based descriptors in application to aging problem in face recognition. 2975-2981 - K. Prabha

, I. Shatheesh Sam:
An effective robust and imperceptible blind color image watermarking using WHT. 2982-2992 - Yongming Zhang, Ruoyu Zhao, Yushu Zhang, Rushi Lan, Xiuli Chai:

High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. 2993-3010 - Aziz Qaroush, Abdalkarim Awad, Mohammad Modallal, Malik Ziq:

Segmentation-based, omnifont printed Arabic character recognition without font identification. 3025-3039 - Shankru Guggari

, Vijayakumar Kadappa, Umadevi V
, Ajith Abraham:
Music rhythm tree based partitioning approach to decision tree classifier. 3040-3054 - Amita Singha

, Muhammad Ahsan Ullah:
Development of an audio watermarking with decentralization of the watermarks. 3055-3061 - Aasim Zafar

, Arshad Iqbal:
Application of soft computing techniques in machine reading of Quranic Kufic manuscripts. 3062-3069 - Franklin Tchakounté, Koudanbe Amadou Calvin, Ado Adamou Abba Ari

, David Jaurès Fotsa-Mbogne
:
A smart contract logic to reduce hoax propagation across social media. 3070-3078 - Jamal N. Al-Karaki, Amjad Gawanmeh

, Sanaa El-Yassami
:
GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking. 3079-3095 - Kazi Masudul Alam, J. M. Ashfiqur Rahman, Anisha Tasnim

, Aysha Akther:
A Blockchain-based Land Title Management System for Bangladesh. 3096-3110
Volume 34, Number 6, Part B, June 2022
- Maniah, Benfano Soewito

, Ford Lumban Gaol, Edi Abdurachman:
A systematic literature Review: Risk analysis in cloud migration. 3111-3120 - Uma Narayanan

, Varghese Paul, Shelbi Joseph:
A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. 3121-3135 - Mohamed Lamine Berkane, Mahmoud Boufaïda, Nour El Houda Bouzerzour:

Modelling elastic scaling of cloud with energy-efficiency: Application to smart-university. 3136-3150 - Rohit Kumar Tiwari

, Rakesh Kumar:
A framework for prioritizing cloud services in neutrosophic environment. 3151-3166 - Junwen Lu, Yongsheng Hao

, Kesou Wu, Yuming Chen
, Qin Wang:
Dynamic offloading for energy-aware scheduling in a mobile cloud. 3167-3177 - V. Seethalakshmi

, Govindasamy Vaiyapuri
, Akila Venkatesan
:
Real-coded multi-objective genetic algorithm with effective queuing model for efficient job scheduling in heterogeneous Hadoop environment. 3178-3190 - Damián Fernández-Cerero

, José A. Troyano, Agnieszka Jakóbik, Alejandro Fernández-Montes
:
Machine learning regression to boost scheduling performance in hyper-scale cloud-computing data centres. 3191-3203 - Jyotismita Chaki

, S. Thillai Ganesh, S. K. Cidham
, S. Ananda Theertan
:
Machine learning and artificial intelligence based Diabetes Mellitus detection and self-management: A systematic review. 3204-3225 - Rafid Mostafiz

, Mohammad Shorif Uddin, Nur-A-Alam, Md. Mahfuz Reza, Mohammad Motiur Rahman:
Covid-19 detection in chest X-ray through random forest classifier using a hybridization of deep CNN and DWT optimized features. 3226-3235 - B. Chithra, R. Nedunchezhian

:
Dynamic neutrosophic cognitive map with improved cuckoo search algorithm (DNCM-ICSA) and ensemble classifier for rheumatoid arthritis (RA) disease. 3236-3246 - Agus Subhan Akbar

, Chastine Fatichah, Nanik Suciati
:
Single level UNet3D with multipath residual attention block for brain tumor segmentation. 3247-3258 - D. Rammurthy, P. K. Mahesh:

Whale Harris hawks optimization based deep learning classifier for brain tumor detection using MRI images. 3259-3272 - Yujun Kim

, Jin-Yong Yu, Euijong Lee
, Young-Gab Kim
:
Video anomaly detection using Cross U-Net and cascade sliding window. 3273-3284 - Rashmi Patil

, Sreepathi Bellary:
Machine learning approach in melanoma cancer stage detection. 3285-3293 - Amani Ali Ahmed Ali, Suresha Mallaiah:

Intelligent handwritten recognition using hybrid CNN architectures based-SVM classifier with dropout. 3294-3300 - M. Sreeraj, Jestin Joy, Manu Jose, Meenu Varghese, T. J. Rejoice:

Comparative analysis of Machine Learning approaches for early stage Cervical Spondylosis detection. 3301-3309 - Imran Ul Haq

, Haider Ali, Hong Yu Wang, Lei Cui, Hazrat Ali
:
Feature fusion and Ensemble learning-based CNN model for mammographic image classification. 3310-3318 - Vani V

, K. V. Mahendra Prashanth
:
Ulcer detection in Wireless Capsule Endoscopy images using deep CNN. 3319-3331 - Vicky Zilvan

, Ade Ramdan
, Ana Heryana, Dikdik Krisnandi
, Endang Suryawati
, Raden Sandra Yuwana
, R. Budiarianto S. Kusumo, Hilman F. Pardede
:
Convolutional variational autoencoder-based feature learning for automatic tea clone recognition. 3332-3342 - Shyamal Virnodkar

, Vinod Keshaorao Pachghare
, Virupakshagouda C. Patil
, Sunil Kumar Jha:
CaneSat dataset to leverage convolutional neural networks for sugarcane classification from Sentinel-2. 3343-3355 - Mohammad Meraj Khan, Mohammad Shorif Uddin, Mohammad Zavid Parvez

, Lutfur Nahar
:
A squeeze and excitation ResNeXt-based deep learning model for Bangla handwritten compound character recognition. 3356-3364 - Sofian Kassaymeh

, Salwani Abdullah, Mohammed Azmi Al-Betar
, Mohammed Alweshah:
Salp swarm optimizer for modeling the software fault prediction problem. 3365-3378 - Yousef Elsheikh, Yousef Alqasrawi, Mohammad Azzeh

:
On obtaining a stable vote ranking methodology for implementing e-government strategies. 3379-3392 - Jaseena K. U

, Binsu C. Kovoor:
Deterministic weather forecasting models based on intelligent predictors: A survey. 3393-3412 - Asniar

, Nur Ulfa Maulidevi, Kridanto Surendro
:
SMOTE-LOF for noise identification in imbalanced data classification. 3413-3423 - Pramoda Patro

, Krishna Kumar
, G. Suresh Kumar
, Gandharba Swain
:
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network. 3424-3432 - Zhengjing Ma

, Gang Mei
, Salvatore Cuomo
, Francesco Piccialli:
Heterogeneous data fusion considering spatial correlations using graph convolutional networks and its application in air quality prediction. 3433-3447 - Parth Shah

, Priteshkumar Prajapati
:
Provable Data Possession using Additive Homomorphic Encryption. 3448-3453 - Ajay K. Gupta

, Udai Shanker
:
MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS. 3454-3467 - Muhamad Najib Zamri

, Mohd Shahrizal Sunar
:
Atmospheric cloud modeling methods in computer graphics: A review, trends, taxonomy, and future directions. 3468-3488 - Meenu Suresh, I. Shatheesh Sam:

Optimized interesting region identification for video steganography using Fractional Grey Wolf Optimization along with multi-objective cost function. 3489-3496 - Manal El Rhazi, Arsalane Zarghili, Aicha Majda, Ayat Allah Oufkir

:
3D facial attractiveness enhancement using free form deformation. 3497-3505 - Saiqa Khan, Meera Narvekar

:
Novel fusion of color balancing and superpixel based approach for detection of tomato plant diseases in natural complex environment. 3506-3516 - Aziz Fajar

, Riyanarto Sarno
, Chastine Fatichah
, Achmad Fahmi
:
Reconstructing and resizing 3D images from DICOM files. 3517-3526 - Vicky Mudeng

, Wahdiyatun Nisa, Sena Sukmananda Suprapto:
Computational image reconstruction for multi-frequency diffuse optical tomography. 3527-3538 - Sharifah Noor Masidayu Sayed Ismail

, Nor Azlina Bt Ab. Aziz, Siti Zainab Ibrahim:
A comparison of emotion recognition system using electrocardiogram (ECG) and photoplethysmogram (PPG). 3539-3558 - Supriadi Rustad, De Rosal Ignatius Moses Setiadi, Abdul Syukur, Pulung Nurtantio Andono:

Inverted LSB image steganography using adaptive pattern to improve imperceptibility. 3559-3568 - Priyank Sunhare, Rameez R. Chowdhary, Manju K. Chattopadhyay

:
Internet of things and data mining: An application oriented survey. 3569-3590 - Teng Wang, Zhi Hu:

Local differential privacy-based frequent sequence mining. 3591-3601 - Tanzeela Javid

, Manoj Kumar Gupta, Abhishek Gupta
:
A hybrid-security model for privacy-enhanced distributed data mining. 3602-3614 - Walid Osamy, Ahmed M. Khedr:

FACS: Fairness aware clustering scheme for monitoring applications of internet of things based wireless sensor networks. 3615-3629 - Ummer Iqbal, Ajaz Hussain Mir:

Secure and practical access control mechanism for WSN with node privacy. 3630-3646 - Cristina Satizábal

, Rafael Páez
, Jordi Forné
:
Secure Internet Voting Protocol (SIVP): A secure option for electoral processes. 3647-3660 - Sonal Gahlot, S. R. N. Reddy, Dinesh Kumar:

Early congenital heart defect diagnosis in neonates using novel WBAN based three-tier network architecture. 3661-3672 - Jingzhi Tu, Gang Mei

, Francesco Piccialli:
An improved Nyström spectral graph clustering using k-core decomposition as a sampling strategy for large networks. 3673-3684 - Titus Issac

, Salaja Silas
, Elijah Blessing Rajsingh
:
Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network. 3685-3702 - Rahabul Islam, Md. Wahidur Rahman, Rahmina Rubaiat, Md. Mahmodul Hasan, Md. Mahfuz Reza, Mohammad Motiur Rahman:

LoRa and server-based home automation using the internet of things (IoT). 3703-3712 - K. Krishna Jyothi

, Shilpa Chaudhari:
A novel block chain based cluster head authentication protocol for machine-type communication in LTE network: Statistical analysis on attack detection. 3713-3721 - Mostafa Hamadi

, Jamal El-Den
, Sami Azam
, Narumon Cherry Sriratanaviriyakul
:
Integrating social media as cooperative learning tool in higher education classrooms: An empirical study. 3722-3731 - Muneera Alhoshan, Najwa Altwaijry

:
AUSS: An arabic query-based update-summarization system. 3732-3743 - Gheith A. Abandah

, Ashraf Suyyagh
, Mohammad R. Abdel-Majeed
:
Transfer learning and multi-phase training for accurate diacritization of Arabic poetry. 3744-3757 - Hamza Alami

, Saïd El Alaoui Ouatik
, Khalid Alaoui Zidani, Noureddine En-Nahnahi
:
Arabic duplicate questions detection based on contextual representation, class label matching, and structured self attention. 3758-3765 - Sumaira Saeed

, Sania Yousuf, Faiza Khan, Quratulain Rajput:
Social network analysis of Hadith narrators. 3766-3774 - Gheith A. Abandah

, Mohammed Z. Khedher
, Mohammad Abdel-Majeed
, Hamdi M. Mansour, Salma F. Hulliel, Lara M. Bisharat:
Classifying and diacritizing Arabic poems using deep recurrent neural networks. 3775-3788 - Naoual Nassiri

, Abdelhak Lakhouaja
, Violetta Cavalli-Sforza
:
Arabic L2 readability assessment: Dimensionality reduction study. 3789-3799 - Karma Wangchuk

, Panomkhawn Riyamongkol
, Rattapoom Waranusast:
Next syllables prediction system in Dzongkha using long short-term memory. 3800-3806 - Suyanto Suyanto

, Andi Sunyoto
, Rezza Nafi Ismail, Ema Rachmawati
, Warih Maharani
:
Stemmer and phonotactic rules to improve n-gram tagger-based indonesian phonemicization. 3807-3814 - Abedalmuhdi Almomany

, Walaa R. Ayyad, Amin Jarrah:
Optimized implementation of an improved KNN classification algorithm using Intel FPGA platform: Covid-19 case study. 3815-3827 - Teng Li, Amin Rezaeipanah, ElSayed M. Tag El Din:

An ensemble agglomerative hierarchical clustering algorithm based on clusters clustering technique and the novel similarity measurement. 3828-3842 - Mohammad Hasan

, Abu Saleh Musa Miah
, Md. Moazzem Hossain, Md. Sabir Hossain
:
LL-PMS8: A time efficient approach to solve planted motif search problem. 3843-3850 - Himansu Das

, Bighnaraj Naik
, Himansu Sekhar Behera:
A Jaya algorithm based wrapper method for optimal feature selection in supervised classification. 3851-3863 - Navin Mani Upadhyay

, Ravi Shankar Singh
:
An effective scheme for memory congestion reduction in multi-core environment. 3864-3877 - Keshav Kumar

, K. R. Ramkumar, Amanpreet Kaur
:
A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. 3878-3885
Volume 34, Number 7, July 2022
- Maria Ashraf, Muhammad Shiraz, Almas Abbasi, Saleh Albahli:

Distributed application execution in fog computing: A taxonomy, challenges and future directions. 3887-3909 - Dalia Abdulkareem Shafiq

, N. Z. Jhanjhi
, Azween B. Abdullah:
Load balancing techniques in cloud computing environment: A review. 3910-3933 - Imtiaz Ahmad, Mohammad Gh. AlFailakawi, Asayel AlMutawa

, Latifa Alsalman
:
Container scheduling techniques: A Survey and assessment. 3934-3947 - Kalka Dubey

, S. C. Sharma:
An extended intelligent water drop approach for efficient VM allocation in secure cloud computing framework. 3948-3958 - Jianmin Li, Ying Zhong, Shunzhi Zhu, Yongsheng Hao

:
Energy-aware service composition in multi-Cloud. 3959-3967 - Maad M. Khalill

, Anatoly D. Khomonenko
, M. D. Matushko:
Measuring the effect of monitoring on a cloud computing system by estimating the delay time of requests. 3968-3972 - Wiem Matoussi, Tarek Hamrouni:

A new temporal locality-based workload prediction approach for SaaS services in a cloud environment. 3973-3987 - Arabinda Pradhan, Sukant Kishoro Bisoy:

A novel load balancing technique for cloud computing platform based on PSO. 3988-3995 - Priteshkumar Prajapati

, Parth Shah
:
A Review on Secure Data Deduplication: Cloud Storage Security Issue. 3996-4007 - Baidaa Abdulrahman Jalil

, Taha Mohammed Hasan, Ghassan Sabeeh Mahmood, Hazim Noman Abed:
A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol. 4008-4021 - Shuang-Gen Liu, Ru Liu, Siyuan Rao:

Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home. 4022-4030 - Abin Oommen Philip

, R. K. K. Saravanaguru:
Smart contract based digital evidence management framework over blockchain for vehicle accident investigation in IoV era. 4031-4046 - Reddy SaiSindhuTheja

, Gopal Krishna Shyam
:
A machine learning based attack detection and mitigation using a secure SaaS framework. 4047-4061 - Seyyed Mohammad Safi, Ali Movaghar, Mohammad Ghorbani:

Privacy protection scheme for mobile social network. 4062-4074 - Lynda Kacha, Abdelhafid Zitouni, Mahieddine Djoudi:

KAB: A new k-anonymity approach based on black hole algorithm. 4075-4088 - Diwakar Agarwal

, Atul Bansal
:
Fingerprint liveness detection through fusion of pores perspiration and texture features. 4089-4098 - Lee Jia Thun, Phoey Lee Teh

, Chi-Bin Cheng:
CyberAid: Are your children safe from cyberbullying? 4099-4108 - M. Vasanthi, K. Seetharaman:

Facial image recognition for biometric authentication systems using a combination of geometrical feature points and low-level visual features. 4109-4121 - José de Jesús Rugeles Uribe, Edward Paul Guillen

, Leonardo S. Cardoso:
A technical review of wireless security for the internet of things: Software defined radio perspective. 4122-4134 - Manzoor Ahmed, Salman Raza, Muhammad Ayzed Mirza, Abdul Aziz, Manzoor Ahmed Khan, Wali Ullah Khan

, Jianbo Li, Zhu Han:
A survey on vehicular task offloading: Classification, issues, and challenges. 4135-4162 - Moussa Aboubakar

, Mounir Kellil, Pierre Roux
:
A review of IoT network management: Current status and perspectives. 4163-4176 - Tanvi Sood

, Kanika Sharma:
LUET: A novel lines-of-uniformity based clustering protocol for heterogeneous-WSN for multiple-applications. 4177-4190 - Jahoon Koo, Young-Gab Kim

:
Resource identifier interoperability among heterogeneous IoT platforms. 4191-4208 - Gousia Thahniyath

, M. Jayaprasad:
Secure and load balanced routing model for wireless sensor networks. 4209-4218 - Dandy Pramana Hostiadi

, Tohari Ahmad
:
Hybrid model for bot group activity detection using similarity and correlation approaches based on network traffic flows analysis. 4219-4232 - Indu Bala

, Ashutosh Sharma
, Alexey A. Tselykh, Byung-Gyu Kim:
Throughput optimization of interference limited cognitive radio-based Internet of Things (CR-IoT) network. 4233-4243 - Gousia Habib

, Shaima Qureshi:
Optimization and acceleration of convolutional neural networks: A survey. 4244-4268 - Ritam Sarkar

, Debaditya Barman, Nirmalya Chowdhury:
Domain knowledge based genetic algorithms for mobile robot path planning having single and multiple targets. 4269-4283 - Ammar Elhassan

, Saleh M. Abu-Soud, Firas Alghanim
, Walid A. Salameh
:
ILA4: Overcoming missing values in machine learning datasets - An inductive learning approach. 4284-4295 - Mohamed Abdel-Basset, Hossam Hawash, Karam M. Sallam

, Sameh S. Askar, Mohamed Abouhawwash
:
STLF-Net: Two-stream deep network for short-term load forecasting in residential buildings. 4296-4311 - Fan Ding, Fei Zhu:

HLifeRL: A hierarchical lifelong reinforcement learning framework. 4312-4321 - Meiyao Tao, Shanshan Gao, Deqian Mao, Hong Huang:

Knowledge graph and deep learning combined with a stock price prediction network focusing on related stocks and mutation points. 4322-4334 - Shakir Khan

, Mohd Fazil, Vineet Kumar Sejwal, Mohammed Ali Alshara, Reemiah Muneer Alotaibi, Ashraf Kamal
, Abdul Rauf Baig:
BiCHAT: BiLSTM with deep CNN and hierarchical attention for hate speech detection. 4335-4344 - Silvester Dian Handy Permana, Gusti Saputra, Budi Arifitama

, Yaddarabullah, Wahyu Caesarendra
, Robbi Rahim
:
Classification of bird sounds as an early warning method of forest fires using Convolutional Neural Network (CNN) algorithm. 4345-4357 - Mavra Mehmood, Nasser O. Alshammari, Saad Awadh Alanazi, Asma Basharat, Fahad Ahmad

, Muhammad Sajjad, Kashaf Junaid:
Improved colorization and classification of intracranial tumor expanse in MRI images via hybrid scheme of Pix2Pix-cGANs and NASNet-large. 4358-4374 - Kristiawan Nugroho, Edi Noersasongko

, Purwanto, Muljono, De Rosal Ignatius Moses Setiadi:
Enhanced Indonesian Ethnic Speaker Recognition using Data Augmentation Deep Neural Network. 4375-4384 - Didar Dadebayev

, Wei Wei Goh
, Tan Ee Xion:
EEG-based emotion recognition: Review of commercial EEG devices and machine learning techniques. 4385-4401 - Prabhash Kumar Singh

, Biswapati Jana, Kakali Datta:
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA. 4402-4420 - Meili Sun, Liancheng Xu, Rong Luo, Yuqi Lu, Weikuan Jia:

GHFormer-Net: Towards more accurate small green apple/begonia fruit detection in the nighttime. 4421-4432 - Vaishali M. Joshi, Rajesh B. Ghongade:

IDEA: Intellect database for emotion analysis using EEG signal. 4433-4447 - Fajar Astuti Hermawati

, Handayani Tjandrasa
, Nanik Suciati
:
Phase-based thresholding schemes for segmentation of fetal thigh cross-sectional region in ultrasound images. 4448-4460 - Leena Jain, Palwinder Singh

:
A novel wavelet thresholding rule for speckle reduction from ultrasound images. 4461-4471 - Xiyao Liu, Zhaoying Li, Junxing Ma, Wei Zhang, Jian Zhang, Yipeng Ding:

Robust coverless steganography using limited mapping images. 4472-4482 - Asha Durafe

, Vinod Patidar
:
Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover. 4483-4498 - Kartik Budholiya

, Shailendra Kumar Shrivastava, Vivek Sharma:
An optimized XGBoost based diagnostic system for effective prediction of heart disease. 4514-4523 - Manoj Kumar Naik

, Rutuparna Panda
, Ajith Abraham
:
Normalized square difference based multilevel thresholding technique for multispectral images using leader slime mould algorithm. 4524-4536 - H. M. Nandini, H. K. Chethan, B. S. Rashmi

:
Shot based keyframe extraction using edge-LBP approach. 4537-4545 - Santisudha Panigrahi

, Jayshankar Das, Tripti Swarnkar
:
Capsule network based analysis of histopathological images of oral squamous cell carcinoma. 4546-4553 - Kazim Hanbay

:
A new standard error based artificial bee colony algorithm and its applications in feature selection. 4554-4567 - Vineet Kumar

, Abhijit R. Asati
, Anu Gupta:
Dedicated hardware architecture for localizing iris in VW images. 4568-4578 - Mazida A. Ahmed

, Ridip Dev Choudhury
, Kishore Kashyap
:
Race estimation with deep networks. 4579-4591 - Sangita B. Nemade, Shefali Sonavane

:
Co-occurrence patterns based fruit quality detection for hierarchical fruit image annotation. 4592-4606 - Rajdeep Kaur

, Kuljit Kaur Chahal, Munish Saini
:
Understanding community participation and engagement in open source software Projects: A systematic mapping study. 4607-4625 - Leonice Souza-Pereira

, Nuno Pombo
, Sofia Ouhbi
:
Software quality: Application of a process model for quality-in-use assessment. 4626-4634 - Rajni Sehgal, Deepti Mehrotra

, Renuka Nagpal
, Ramanuj Sharma:
Green software: Refactoring approach. 4635-4643 - Vyacheslav S. Lapshin

, Yuri I. Rogozov, Sergey Kucherov
:
Method for building an information model specification based on a sensemaking approach to user involvement in the development process. 4644-4658 - Zeinab Rabea

, Sara El-Metwally
, Samir Elmougy, Magdi Zakaria:
A fast algorithm for constructing suffix arrays for DNA alphabets. 4659-4668 - Saja Taha Ahmed

, Loay Edwar George:
Lightweight hash-based de-duplication system using the self detection of most repeated patterns as chunks divisors. 4669-4678 - Hao Peng, Cheng Qian

, Dandan Zhao, Ming Zhong, Xianwen Ling, Wei Wang:
Disintegrate hypergraph networks by attacking hyperedge. 4679-4685
Volume 34, Number 8, Part A, September 2022
- Mazin Alshamrani

:
IoT and artificial intelligence implementations for remote healthcare monitoring systems: A survey. 4687-4701 - Vidhya Mohan

, Aji Sivanandan:
A systematic review on the developments and evaluation of twin learning algorithms. 4702-4711 - Naveen Kumar

, Deepak Sinwar, Monika Saini, Dinesh Kumar Saini
, Ashish Kumar
, Manjit Kaur, Dilbag Singh, Heung-No Lee:
Efficient computational stochastic framework for performance optimization of E-waste management plant. 4712-4728 - Yanshen Sun, Yen-Cheng Lu, Kaiqun Fu, Fanglan Chen, Chang-Tien Lu

:
Detecting anomalous traffic behaviors with seasonal deep Kalman filter graph convolutional neural networks. 4729-4742 - Prajna Paramita Debata, Puspanjali Mohapatra:

Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm. 4743-4755 - Brahim Ait Skourt, Abdelhamid El Hassani, Aicha Majda:

Mixed-pooling-dropout for convolutional neural network regularization. 4756-4762 - Archana R. Panhalkar

, Dharmpal D. Doye:
Optimization of decision trees using modified African buffalo algorithm. 4763-4772 - Md. Saikat Islam Khan, Nazrul Islam

, Jia Uddin, Sifatul Islam, Mostofa Kamal Nasir:
Water quality prediction and classification based on principal component regression and gradient boosting classifier approach. 4773-4781 - Lamees Mohammad Dalbah

, Mohammed Azmi Al-Betar
, Mohammed A. Awadallah
, Raed Abu Zitar
:
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem. 4782-4795 - Abdessamad Chanaa

, Nour-Eddine El Faddouli
:
An Analysis of learners' affective and cognitive traits in Context-Aware Recommender Systems (CARS) using feature interactions and Factorization Machines (FMs). 4796-4809 - Aybike Simsek

:
Lexical sorting centrality to distinguish spreading abilities of nodes in complex networks under the Susceptible-Infectious-Recovered (SIR) model. 4810-4820 - Zaid Abdi Alkareem Alyasseri, Mohammed Azmi Al-Betar

, Mohammed A. Awadallah
, Sharif Naser Makhadmeh, Ammar Kamal Abasi, Iyad Abu Doush, Osama Ahmad Alomari
:
A hybrid flower pollination with β-hill climbing algorithm for global optimization. 4821-4835 - Amina Benkessirat, Nadjia Benblidia:

A novel feature selection approach based on constrained eigenvalues optimization. 4836-4846 - Bashar A. Aldeeb, Mohammed Azmi Al-Betar

, Norita Md Norwawi, Khalid Adnan Alissa, Mutasem K. Alsmadi, Ayman A. Hazaymeh, Malek Alzaqebah
:
Hybrid intelligent water Drops algorithm for examination timetabling problem. 4847-4859 - Khin Maung Htay

, Rozmie Razif Othman
, Amiza Amir, Jalal Mohammed Hachim Alkanaani:
Gravitational search algorithm based strategy for combinatorial t-way test suite generation. 4860-4873 - Beibei Shi, Hua Ye, Ali Asghar Heidari

, Long Zheng, Zhongyi Hu, Huiling Chen, Hamza Turabieh
, Majdi M. Mafarja
, Peiliang Wu:
Analysis of COVID-19 severity from the perspective of coagulation index using evolutionary machine learning with enhanced brain storm optimization. 4874-4887 - Arabinda Pradhan, Sukant Kishoro Bisoy, Amardeep Das:

A survey on PSO based meta-heuristic scheduling mechanism in cloud computing environment. 4888-4901 - Reza Noorian Talouki

, Mirsaeid Hosseini Shirvani
, Homayun Motameni:
A heuristic-based task scheduling algorithm for scientific workflows in heterogeneous cloud computing platforms. 4902-4913 - Kaushik Mishra

, Jharashree Pati, Santosh Kumar Majhi
:
A dynamic load scheduling in IaaS cloud using binary JAYA algorithm. 4914-4930 - Christiana Zaraket, Khalil Hariss, Maroun Chamoun, Tony Nicolas:

Cloud based private data analytic using secure computation over encrypted data. 4931-4942 - Suraj Kotecha, Adithya Vasudevan, V. M. K. Kashyap Holla, Satyam Kumar, Dayananda Pruthviraja

, Mrityunjaya Vithal Latte:
3D visualization cloud based model to detect and classify the polyps according to their sizes for CT colonography. 4943-4955 - Tabassum N. Mujawar, Lokesh B. Bhajantri:

Behavior and feedback based trust computation in cloud environment. 4956-4967 - Judith Santos-Pereira

, Le Gruenwald, Jorge Bernardino:
Top data mining tools for the healthcare industry. 4968-4982 - Mohamed Amine Ferradji, Fouzia Benchikha:

Enhanced metrics for temporal dimensions toward assessing Linked Data: A case study of Wikidata. 4983-4992 - Muhammed Niyas K. P.

, Thiyagarajan Paramasivan:
Feature selection using efficient fusion of Fisher Score and greedy searching for Alzheimer's classification. 4993-5006 - Tossapon Boongoen

, Natthakan Iam-On
, James Mullaney:
Providing contexts for classification of transients in a wide-area sky survey: An application of noise-induced cluster ensemble. 5007-5019 - Hasan Deeb

, Archana Sarangi, Debahuti Mishra
, Shubhendu Kumar Sarangi
:
Improved Black Hole optimization algorithm for data clustering. 5020-5029 - Saptarshi Paul

, Bipul Shyam Purkhyastha:
Detailed analysis of implementation of aviation NMT system and the effects of aviation post-processing tools on TDIL tourism corpus. 5030-5044 - Khaled Shuaib, Juhar Ahmed Abdella, Farag M. Sallabi, Mohamed Adel Serhani:

Secure decentralized electronic health records sharing system based on blockchains. 5045-5058 - Ahmed Arafa, Nawal A. El-Fishawy

, Mohamed Alfateh Badawy, Marwa Radad
:
RN-SMOTE: Reduced Noise SMOTE based on DBSCAN for enhancing imbalanced data classification. 5059-5074 - Pranali D. Sheth

, Shrishailappa T. Patil, Manikrao L. Dhore
:
Evolutionary computing for clinical dataset classification using a novel feature selection algorithm. 5075-5082 - Babita Pandey, Devendra Kumar Pandey, Brijendra Pratap Mishra, Wasiur Rhmann:

A comprehensive survey of deep learning in the field of medical imaging and medical natural language processing: Challenges and research directions. 5083-5099 - Ashish Nainwal, Yatindra Kumar, Bhola Jha:

Arrhythmia classification based on improved monarch butterfly optimization algorithm. 5100-5109 - Vithyatheri Govindan

, Vimala Balakrishnan:
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection. 5110-5120 - Bhushankumar Nemade

, Deven Shah:
An efficient IoT based prediction system for classification of water using novel adaptive incremental learning framework. 5121-5131 - Rami Mohammad Jomaa

, Md. Saiful Islam
, Hassan Mathkour, Saad Al-Ahmadi
:
A multilayer system to boost the robustness of fingerprint authentication against presentation attacks by fusion with heart-signal. 5132-5143 - Md. Saiful Islam

:
Using ECG signal as an entropy source for efficient generation of long random bit sequences. 5144-5155 - Weikuan Jia, Zhifen Wang, Zhonghua Zhang, Xinbo Yang, Sujuan Hou, Yuanjie Zheng:

A fast and efficient green apple object detection model based on Foveabox. 5156-5169 - Md. Shoaib Ahmed

, Tanjim Taharat Aurpa
, Md. Abul Kalam Azad:
Fish Disease Detection Using Image Based Machine Learning Technique in Aquaculture. 5170-5182 - Jyothi S. Nayak

, M. Indiramma
:
An approach to enhance age invariant face recognition performance based on gender classification. 5183-5191 - Maram Al-Wohaibi

, Malek Alzaqebah
, Noura M. Alotaibi
, Abeer M. Alzahrani
, Mariem Zouch
:
A hybrid multi-stage learning technique based on brain storming optimization algorithm for breast cancer recurrence prediction. 5192-5203 - Tayeb Bahram

:
A texture-based approach for offline writer identification. 5204-5222 - Suchithra Madathil

, Soman Kutti Padannayil:
MC-DMD: A data-driven method for blood vessel enhancement in retinal images using morphological closing and dynamic mode decomposition. 5223-5239 - Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty:

Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion. 5240-5260 - Khaled Hatem Almotairi

:
Hybrid adaptive method for lane detection of degraded road surface condition. 5261-5272 - Puneeth Guddhur Jayadev, Sreepathi Bellary:

A hybrid approach for classification and identification of iris damaged levels of alcohol drinkers. 5273-5285 - Eko Prasetyo

, Nanik Suciati
, Chastine Fatichah
:
Multi-level residual network VGGNet for fish species classification. 5286-5295 - Prabodh Kumar Sahoo, Priyadarshi Kanungo

, Satyasis Mishra
, Bibhuprasad Mohanty:
Entropy feature and peak-means clustering based slowly moving object detection in head and shoulder video sequences. 5296-5304 - Sami Al-Yazidi, Jawad Berri, Mohammad Mehedi Hassan:

Novel hybrid model for organizations' reputation in online social networks. 5305-5317 - Sharhabeel H. Alnabelsi

, Haythem Bany Salameh, Ramzi R. Saifan, Khalid A. Darabkh:
A multi-layer hyper-graph routing with jamming-awareness for improved throughput in full-duplex cognitive radio networks. 5318-5332 - Sercan Yalçin, Ebubekir Erdem

:
TEO-MCRP: Thermal exchange optimization-based clustering routing protocol with a mobile sink for wireless sensor networks. 5333-5348 - Proton Sarkar, Sudipta Kumar Ghosal

, Madhulina Sarkar:
Stego-chain: A framework to mine encoded stego-block in a decentralized network. 5349-5365 - Sakthibalan P., Devarajan K.:

DFMS: Differential flow management scheme for denial of service impact mitigation in 5G communications. 5366-5374 - Kamal Berahmand

, Elahe Nasiri
, Saman Forouzandeh
, Yuefeng Li
:
A preference random walk algorithm for link prediction through mutual influence nodes in complex networks. 5375-5387 - Sheng Hao, Huyin Zhang:

Performance analysis of PHY layer for RIS-assisted wireless communication systems with retransmission protocols. 5388-5404 - Manisha A. Dudhedia

, Yerram Ravinder
:
Performance analysis of game based MAC protocol for cognitive radio based wireless network. 5405-5419 - Bimal Patel

, Parth Shah
:
Operating system support, protocol stack with key concerns and testbed facilities for IoT: A case study perspective. 5420-5434 - Himanshu Agrawal, Krishna Asawa:

Distributed learning algorithm with synchronized epochs for dynamic spectrum access in unknown environment using multi-user restless multi-armed bandit. 5435-5447 - Tushar Kanta Samal

, Manas Ranjan Kabat:
A prioritized traffic scheduling with load balancing in wireless body area networks. 5448-5455 - Anam Qureshi

, Murk Marvi
, Jawwad Ahmed Shamsi, Adnan Aijaz:
eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles. 5456-5467 - Diana Nuñez-Ramirez

, David Mata-Mendoza
, Manuel Cedillo-Hernandez
:
Improving preprocessing in reversible data hiding based on contrast enhancement. 5468-5477 - Mallikarjun Reddy Dorsala

, V. N. Sastry, Sudhakar Chapram:
Fair payments for privacy-preserving aggregation of mobile crowdsensing data. 5478-5492 - Atef Bentahar

, Abdallah Meraoumia
, Louardi Bradji, Hakim Bendjenna:
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme. 5493-5509 - Kumari Rinki, Puspneel Verma, Ranjeet Kumar Singh:

A novel matrix multiplication based LSB substitution mechanism for data security and authentication. 5510-5524 - Mohammad Alsulmi

, Reham Alshamarani:
Framework for tasks suggestion on web search based on unsupervised learning techniques. 5525-5532 - Amit Rathee

, Jitender Kumar Chhabra
:
Metrics for reusability of java language components. 5533-5551 - Samah Salem

, Fouzia Benchikha:
LODQuMa: A Free-ontology process for Linked (Open) Data quality management. 5552-5563 - Shambhu Nath Sharma, Prasanna Sadagopan:

Influence of conditional holoentropy-based feature selection on automatic recommendation system in E-commerce sector. 5564-5577 - Mansi Jhamb, Ratnesh Mohan

:
Ultra low power design of multi-valued logic circuit for binary interfaces. 5578-5586
Volume 34, Number 8, Part B, September 2022
- Rajesh Singh

, Anita Gehlot
, Shaik Vaseem Akram
, Amit Kumar Thakur, Dharam Buddhi
, Prabin Kumar Das
:
Forest 4.0: Digitalization of forest using the Internet of Things (IoT). 5587-5601 - Ravesa Akhter

, Shabir Ahmad Sofi:
Precision agriculture using IoT data analytics and machine learning. 5602-5618 - Rabah Boucetti

, Ouassila Hioual, Sofiane Mounine Hemam:
An approach based on genetic algorithms and neural networks for QoS-aware IoT services composition. 5619-5632 - Halima Bouazza, Bachir Said

, Fatima Zohra Laallam:
A hybrid IoT services recommender system using social IoT. 5633-5645 - Norah Alotaibi

, Delel Rhouma:
A review on community structures detection in time evolving social networks. 5646-5662 - Partha Pratim Ray:

A survey on cognitive packet networks: Taxonomy, state-of-the-art, recurrent neural networks, and QoS metrics. 5663-5683 - Bhanu Chander

, Kumaravelan Gopalakrishnan:
Outlier detection strategies for WSNs: A survey. 5684-5707 - Vibha Jain, Bijendra Kumar, Aditya Gupta

:
Cybertwin-driven resource allocation using deep reinforcement learning in 6G-enabled edge environment. 5708-5720 - P. Aravind, G. P. Saradhi Varma, P. V. G. D. Prasad Reddy:

Simulated annealing based optimal controller placement in software defined networks with capacity constraint and failure awareness. 5721-5733 - Suyoto Suyoto

, Sugihartono Sugihartono, Iskandar Iskandar, Adit Kurniawan
:
Robust time synchronization for NC-OFDM cognitive radio systems. 5734-5745 - Hajar Bennouri

, Amine Berqia
, N'Guessan Koffi Patrick:
U-NewReno transmission control protocol to improve TCP performance in Underwater Wireless Sensors Networks. 5746-5758 - Sateesh Gudla, Nageswara Rao Kuda:

Learning automata based energy efficient and reliable data delivery routing mechanism in wireless sensor networks. 5759-5765 - Jagpreet Kaur

, K. R. Ramkumar:
The recent trends in cyber security: A review. 5766-5781 - Tripti Rathee

, Parvinder Singh
:
A systematic literature mapping on secure identity management using blockchain technology. 5782-5796 - Punam Bedi, Anuradha Singhal:

Estimating cover image for universal payload region detection in stego images. 5797-5809 - Vidhi Bansal

, Surabhi Garg:
A cancelable biometric identification scheme based on bloom filter and format-preserving encryption. 5810-5821 - Afrig Aminuddin

, Ferda Ernawan
:
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking. 5822-5840 - Suganthi Kumar

, Rajkumar Soundrapandiyan
:
A multi-image hiding technique in dilated video regions based on cooperative game-theoretic approach. 5841-5855 - Mahbuba Begum

, Jannatul Ferdush, Mohammad Shorif Uddin:
A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. 5856-5867 - Ching-Yu Yang, Wen-Fong Wang

:
An efficient data hiding for ECG signals based on the integer wavelet transform and block standard deviation. 5868-5882 - Gurpreet Kaur

, Rekha Agarwal, Vinod Patidar
:
Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation. 5883-5897 - Amina Adadi

, Mohammed Lahmer
, Samia Nasiri:
Artificial Intelligence and COVID-19: A Systematic umbrella review and roads ahead. 5898-5920 - Issam W. Damaj, Salwa K. Al Khatib, Tarek Naous, Wafic Lawand

, Zainab Z. Abdelrazzak, Hussein T. Mouftah:
Intelligent transportation systems: A survey on modern hardware devices for the era of machine learning. 5921-5942 - Stéphane Cédric Koumétio Tékouabou, El Bachir Diop

, Rida Azmi
, Remi Jaligot, Jerome Chenal:
Reviewing the application of machine learning methods to model urban form indicators in planning decision support systems: Potential, issues and challenges. 5943-5967 - Murat Kirisçi, Necip Simsek:

Decision making method related to Pythagorean Fuzzy Soft Sets with infectious diseases application. 5968-5978 - Shaymaa E. Sorour

, Hanan E. Abdelkader, Karam M. Sallam
, Ripon K. Chakrabortty, Michael J. Ryan, Amr A. Abohany:
An analytical code quality methodology using Latent Dirichlet Allocation and Convolutional Neural Networks. 5979-5997 - Krishnakumar Arunachalam

, Senthilkumaran Thangamuthu, Vijayanand Shanmugam, Mukesh Raju, Kamali Premraj:
Deep learning and optimisation for quality of service modelling. 5998-6007 - Runlong Xia, Yuantao Chen, Binbin Ren:

Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter. 6008-6018 - Prabin Kumar Panigrahi, Sukant Kishoro Bisoy:

Localization strategies for autonomous mobile robots: A review. 6019-6039 - Fitri Utaminingrum, Ahmad Wali Satria Bahari Johan, I Komang Somawirata, Risnandar

, Anindita Septiarini:
Descending stairs and floors classification as control reference in autonomous smart wheelchair. 6040-6047 - Fatima-Zahra El-Alami, Said Ouatik El Alaoui

, Noureddine En-Nahnahi
:
A multilingual offensive language detection method based on transfer learning from transformer fine-tuning model. 6048-6056 - Minakshi Tomer

, Manoj Kumar
:
Multi-document extractive text summarization based on firefly algorithm. 6057-6065 - Yasser Mohamed Saber, Hala Abdel-Galil

, Mohamed Abd El-Fatah Belal:
Arabic ontology extraction model from unstructured text. 6066-6076 - Koundinya Koorapati, Rubini Pandu

, Prem Kumar Ramesh, Sairam Veeraswamy, Usha Narasappa:
Towards a unified ontology for IoT fabric with SDDC. 6077-6091 - Archana Kumari

, D. K. Lobiyal:
Efficient estimation of Hindi WSD with distributed word representation in vector space. 6092-6103 - Milliam Maxime Zekeng Ndadji

, Maurice Tchoupé Tchendji, Clémentin Tayou Djamégni, Didier Parigot:
A projection-stable grammatical model for the distributed execution of administrative processes with emphasis on actors' views. 6104-6115 - Youness Chaabi

, Fadoua Ataa-Allah
:
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram. 6116-6124 - Ahmed Taki Eddine Dib, Ramdane Maamri

:
A multi-layered bigraphical modelling approach for context-aware systems. 6125-6139 - Ali Alwehaibi

, Marwan Bikdash, Mohammad Albogmi, Kaushik Roy:
A study of the performance of embedding methods for Arabic short-text sentiment analysis using deep learning approaches. 6140-6149 - Rashedul Islam, Md. Rafiqul Islam, Kamrul Hasan Talukder:

An efficient ROI detection algorithm for Bangla text extraction and recognition from natural scene images. 6150-6164 - Ankita Vaish, Saumya Patel

:
A sparse representation based compression of fused images using WDR coding. 6165-6178 - Xiangbin Liu, Shuqi Chen, Liping Song, Marcin Wozniak

, Shuai Liu
:
Self-attention negative feedback network for real-time image super-resolution. 6179-6186 - H. N. Veena, A. Muruganandham

, T. Senthil Kumaran
:
A novel optic disc and optic cup segmentation technique to diagnose glaucoma using deep learning convolutional neural network over retinal fundus images. 6187-6198 - Özgür Özdemir, Elena Battini Sönmez

:
Attention mechanism and mixup data augmentation for classification of COVID-19 Computed Tomography images. 6199-6207 - Jisha Anu Jose, C. Sathish Kumar, S. Sureshkumar

:
A deep multi-resolution approach using learned complex wavelet transform for tuna classification. 6208-6216 - Md. Saikat Islam Khan, Ashef Shahrior, Razaul Karim, Mahmodul Hasan, Anichur Rahman

:
MultiNet: A deep neural network approach for detecting breast cancer through multi-scale feature fusion. 6217-6228 - Nivea Kesav

, M. G. Jibukumar:
Efficient and low complex architecture for detection and classification of Brain Tumor using RCNN with Two Channel CNN. 6229-6242 - A. N. Omara, Tarek M. Salem, Sherif Elsanadily

, Mostafa M. Elsherbini:
SSIM-based sparse image restoration. 6243-6254 - V. Deepa, C. Sathish Kumar, Thomas Cherian:

Ensemble of multi-stage deep convolutional neural networks for automated grading of diabetic retinopathy using image patches. 6255-6265 - Sakinat Oluwabukonla Folorunso

, Sulaimon A. Afolabi, Adeoye B. Owodeyi:
Dissecting the genre of Nigerian music with machine learning models. 6266-6279 - Rasmiranjan Mohakud

, Rajashree Dash
:
Designing a grey wolf optimization based hyper-parameter optimized convolutional neural network classifier for skin cancer detection. 6280-6291 - Suyanto Suyanto, Prasti Eko Yunanto, Tenia Wahyuningrum, Siti Khomsah

:
A multi-voter multi-commission nearest neighbor classifier. 6292-6302 - Rama Ranjan Panda, Naresh Kumar Nagwani:

Classification and intuitionistic fuzzy set based software bug triaging techniques. 6303-6323 - Saqib Iqbal

, Issam Al-Azzoni:
Test case prioritization for model transformations. 6324-6338 - Navneet Kaur, Hardeep Singh:

An empirical assessment of threshold techniques to discriminate the fault status of software. 6339-6353 - Purvi Prajapati

, Amit Thakkar
:
Performance improvement of extreme multi-label classification using K-way tree construction with parallel clustering algorithm. 6354-6364 - Nawaf H. M. M. Shrifan, Muhammad Firdaus Akbar

, Nor Ashidi Mat Isa
:
An adaptive outlier removal aided k-means clustering algorithm. 6365-6376 - Sezai Tokat

, Kenan Karagul, Yusuf Sahin, Erdal Aydemir
:
Fuzzy c-means clustering-based key performance indicator design for warehouse loading operations. 6377-6384 - Naina Yadav, Sukomal Pal, Anil Kumar Singh, Kartikey Singh:

Clus-DR: Cluster-based pre-trained model for diverse recommendation generation. 6385-6399 - Harshvardhan GM

, Mahendra Kumar Gourisaria, Siddharth Swarup Rautaray, Manjusha Pandey:
UBMTR: Unsupervised Boltzmann machine-based time-aware recommendation system. 6400-6413 - Amrendra Singh Yadav

, Shivani Agrawal, Dharmender Singh Kushwaha:
Distributed Ledger Technology-based land transaction system with trusted nodes consensus mechanism. 6414-6424 - Youssef Harrath

:
A three-stage layer-based heuristic to solve the 3D bin-packing problem under balancing constraint. 6425-6431 - Abdülkadir Gümüsçü

, Serkan Kaya
, Mehmet Emin Tenekeci, Izzettin Hakan Karaçizmeli
, Ibrahim Berkan Aydilek:
The impact of local search strategies on chaotic hybrid firefly particle swarm optimization algorithm in flow-shop scheduling. 6432-6440 - Kunal Das, Arindam Sadhu:

Experimental study on the quantum search algorithm over structured datasets using IBMQ experience. 6441-6452 - Vaishnavi Kumar

, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan
, Padmapriya Praveenkumar
:
Quantum true random number generation on IBM's cloud platform. 6453-6465 - Muhammet Yorulmaz, Gülin Feryal Can:

Task and user-based Entropy-Rank Sum-TPOP integration proposal for usability evaluation of web applications. 6466-6480 - Priyanka Nehra, A. Nagaraju:

Host utilization prediction using hybrid kernel based support vector regression in cloud data centers. 6481-6490 - Sunil Kumar

, Krishna Kumar Mohbey
:
Memory-optimized distributed utility mining for big data. 6491-6503
Volume 34, Number 9, October 2022
- Ibrahim A. Ahmed, Fatima N. Al-Aswadi

, Khaled M. G. Noaman, Wafa' Za'al Alma'aitah:
Arabic Knowledge Graph Construction: A close look in the present and into the future. 6505-6523 - Salha Alyami

, Areej Alhothali, Amani T. Jamal
:
Systematic literature review of arabic aspect-based sentiment analysis. 6524-6551 - Amit Kumar, Rajesh Kumar Mundotiya, Ajay Pratap, Anil Kumar Singh:

TLSPG: Transfer learning-based semi-supervised pseudo-corpus generation approach for zero-shot translation. 6552-6563 - Ftoon Kedwan:

NLQ into SQL translation using computational linguistics. 6564-6582 - Hamza Alami

, Noureddine En-Nahnahi, Abdelkader El Mahdaouy
, Saïd El Alaoui Ouatik
:
Embedding arabic questions by feature-level fusion of word representations for questions classification: It is worth doing? 6583-6594 - Samah M. Alzanin, Aqil M. Azmi

, Hatim A. Aboalsamh:
Short text classification for Arabic social media tweets. 6595-6604 - Eftekhar Hossain, Omar Sharif, Mohammed Moshiul Hoque, M. Ali Akber Dewan, Nazmul H. Siddique, Md. Azad Hossain

:
Identification of Multilingual Offense and Troll from Social Media Memes Using Weighted Ensemble of Multimodal Features. 6605-6623 - Pankaj Dadure

, Partha Pakray, Sivaji Bandyopadhyay:
Embedding and generalization of formula with context in the retrieval of mathematical information. 6624-6634 - Hamood Alshalabi, Sabrina Tiun

, Nazlia Omar, Fatima N. Al-Aswadi
, Kamal Ali Alezabi:
Arabic light-based stemmer using new rules. 6635-6642 - Nazreena Rahman

, Bhogeswar Borah
:
An unsupervised method for word sense disambiguation. 6643-6651 - Mohammed M. Abdelgwad

, Taysir Hassan A. Soliman, Ahmed I. Taloba
, Mohamed Fawzy Farghaly:
Arabic aspect based sentiment analysis using bidirectional GRU based models. 6652-6662 - Prashanth K. V. T. K. N.

, Tene Ramakrishnudu
:
A novel method for detecting psychological stress at tweet level using neighborhood tweets. 6663-6680 - Divya Jatain

, Vikram Singh
, Naveen Dahiya
:
A contemplative perspective on federated machine learning: Taxonomy, threats & vulnerability assessment and challenges. 6681-6698 - Iyolita Islam

, Muhammad Nazrul Islam
:
Digital intervention to reduce counterfeit and falsified medicines: A systematic review and future research agenda. 6699-6718 - Ahmed G. Gad

, Diana T. Mosa, Laith Abualigah
, Amr A. Abohany:
Emerging Trends in Blockchain Technology and Applications: A Review and Outlook. 6719-6742 - Raza Imam, Kaushal Kumar, Syed Mehran Raza, Rumi Sadaf, Faisal Anwer, Noor Fatima

, Mohammad Nadeem, Mohamed Abbas, Obaidur Rahman:
A systematic literature review of attribute based encryption in health services. 6743-6774 - Murat Aydos

, Çigdem Aldan
, Evren Coskun, Alperen Soydan:
Security testing of web applications: A systematic mapping of the literature. 6775-6792 - Bela Shrimali

, Hiren B. Patel
:
Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities. 6793-6807 - Jasleen Kaur

, Alka Agrawal, Raees Ahmad Khan:
Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario. 6808-6817 - De Rosal Ignatius Moses Setiadi, Eko Hari Rachmawanto

, Rahmawati Zulfiningrum:
Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling. 6818-6828 - Mukul Majhi, Ajay Kumar Mallick

:
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature. 6829-6846 - Atef Ibrahim, Fayez Gebali:

Compact modular multiplier design for strong security capabilities in resource-limited Telehealth IoT devices. 6847-6854 - Syada Tasmia Alvi, Mohammed Nasir Uddin

, Linta Islam, Sajib Ahamed:
DVTChain: A blockchain-based decentralized mechanism to ensure the security of digital voting system voting system. 6855-6871 - Chirag Joshi

, Ranjeet Kumar Ranjan
, Vishal Bharti
:
A Fuzzy Logic based feature engineering approach for Botnet detection using ANN. 6872-6882 - Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi, Alvine Boaye Belle:

Probing AndroVul dataset for studies on Android malware classification. 6883-6894 - Mohammed Imtyaz Ahmed, Govindaraj Kannan:

Secure and lightweight privacy preserving Internet of things integration for remote patient monitoring. 6895-6908 - Faiza Al-Shaarani, Adnan Gutub

:
Securing matrix counting-based secret-sharing involving crypto steganography. 6909-6924 - Manasha Saqib

, Jasra Bhat
, Ayaz Hassan Moon:
A lightweight three factor authentication framework for IoT based critical applications. 6925-6937 - Abdelhakim Zeroual, Mohamed Amroune

, Makhlouf Derdour
, Atef Bentahar
:
Lightweight deep learning model to secure authentication in Mobile Cloud Computing. 6938-6948 - Partha Pratim Ray:

A review on 6G for space-air-ground integrated network: Key enablers, open challenges, and future direction. 6949-6976 - Alaa Abu-Srhan

, Mohammad A. M. Abushariah, Omar S. Al-Kadi
:
The effect of loss function on conditional generative adversarial networks. 6977-6988 - Ranjita Joon, Parul Tomar:

Energy Aware Q-learning AODV (EAQ-AODV) routing for cognitive radio sensor networks. 6989-7000 - Massa Ndong

, Mohammad Hayajneh, Najah Abu Ali
, Shayma Alkobaisi
:
Towards a 3-tiered space-air-ground network with reinforcement learning. 7001-7013 - Abir Benabid Najjar

, Arwa Rashed Al-Issa, Manar Hosny:
Dynamic indoor path planning for the visually impaired. 7014-7024 - Amol Vasudeva, Manu Sood:

On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering. 7025-7044 - Abdullah Alamri, Rayan Ali Alturki, Sultan Alamri:

Multi-user routing algorithm for indoor spaces - Adapted for social distancing. 7045-7058 - Kamila Koteish, Hassan Harb, Mohammad Dbouk, Chamseddine Zaki

, Chady Abou Jaoude:
AGRO: A smart sensing and decision-making mechanism for real-time agriculture monitoring. 7059-7069 - Ishfaq Hussain

, Janibul Bashir:
Dynamic MTU: A smaller path MTU size technique to reduce packet drops in IPv6. 7070-7088 - Amira S. Ibrahim, Hassan Al-Mahdi, Hamed Nassar:

Characterization of task response time in a fog-enabled IoT network using queueing models with general service times. 7089-7100 - Alvin Riady

, Gede Putra Kusuma:
Indoor positioning system using hybrid method of fingerprinting and pedestrian dead reckoning. 7101-7110 - Ernando Batista

, Gustavo B. Figueiredo, Cássio V. S. Prazeres:
Load balancing between fog and cloud in fog of things based platforms through software-defined networking. 7111-7125 - Mamoun Awad

, Farag M. Sallabi
, Khaled Shuaib, Faisal Naeem
:
Artificial intelligence-based fault prediction framework for WBAN. 7126-7137 - Dimple Nagpal

, Surya Narayan Panda, Muthukumaran Malarvel
, Priyadarshini Adyasha Pattanaik
, Mohammad Zubair Khan
:
A review of diabetic retinopathy: Datasets, approaches, evaluation metrics and future trends. 7138-7152 - Naseem Ahmad

, Kuldeep Singh Yadav
, Manir Ahmed, Rabul Hussain Laskar, Ashraf Hossain:
An integrated approach for eye centre localization using deep networks and rectangular-intensity-gradient technique. 7153-7167 - Usman Ali

, Ikhyun Lee, Muhammad Tariq Mahmood:
Robust regularization for single image dehazing. 7168-7173 - Md. Jueal Mia

, Rafat Bin Mahmud, Md. Safein Sadad, Hafiz Al Asad, Rafat Hossain:
An in-depth automated approach for fish disease recognition. 7174-7183 - Genji Yuan

, Jianbo Li, Xue Liu, Zheng Yang:
Weakly supervised road network extraction for remote sensing image based scribble annotation and adversarial learning. 7184-7199 - Jaba Deva Krupa Abel, Samiappan Dhanalakshmi

, Khin Wee Lai
, Yongqi Tan, Xiang Wu:
An IoMT enabled deep learning framework for automatic detection of fetal QRS: A solution to remote prenatal care. 7200-7211 - Sharad Hasan, Sarwar Jahan, Md. Imdadul Islam:

Disease detection of apple leaf with combination of color segmentation and modified DWT. 7212-7224 - Tomasz Kocejko, Jacek Ruminski

, Magdalena Mazur-Milecka, Marzena Romanowska-Kocejko, Krzysztof Chlebus
, Kang-Hyun Jo:
Using convolutional neural networks for corneal arcus detection towards familial hypercholesterolemia screening. 7225-7235 - Hady Pranoto

, Yaya Heryadi
, Harco Leslie Hendric Spits Warnars, Widodo Budiharto:
Enhanced IPCGAN-Alexnet model for new face image generating on age target. 7236-7246 - Lalit Maurya

, Viney Lohchab
, Prasant Kumar Mahapatra, János Abonyi:
Contrast and brightness balance in image enhancement using Cuckoo Search-optimized image fusion. 7247-7258 - Jie Liu, Yanna Zhao, Weikuan Jia, Ze Ji

:
DLNet: Accurate segmentation of green fruit in obscured environments. 7259-7270 - Soumya Kuruvayil, Suja Palaniswamy:

Emotion recognition from facial images with simultaneous occlusion, pose and illumination variations using meta-learning. 7271-7282 - Ahmed Iqbal

, Muhammad Sharif
:
MDA-Net: Multiscale dual attention-based network for breast lesion segmentation using ultrasound images. 7283-7299 - Hussain Dawood

, Sajid Saleem, Farman Hassan
, Ali Javed:
A robust voice spoofing detection system using novel CLS-LBP features and LSTM. 7300-7312 - G. Deekshitha, Leena Mary:

Multilingual broad phoneme recognition and language-independent spoken term detection for low-resourced languages. 7313-7323 - Rajesh Kumar Mundotiya

, Arpit Mehta, Rupjyoti Baruah, Anil Kumar Singh:
Integration of morphological features and contextual weightage using monotonic chunk attention for part of speech tagging. 7324-7334 - Muzaffer Aslan

:
CNN based efficient approach for emotion recognition. 7335-7346 - Enoch Arulprakash

, Martin Aruldoss
:
A study on generic object detection with emphasis on future research directions. 7347-7365 - Badr Ben Elallid, Nabil Benamar, Abdelhakim Senhaji Hafid, Tajjeeddine Rachidi, Nabil Mrani:

A Comprehensive Survey on the Application of Deep and Reinforcement Learning Approaches in Autonomous Driving. 7366-7390 - Shahid Hussain

, Subhasis Thakur
, Saurabh Shukla
, John G. Breslin
, Qasim Jan
, Faisal Khan, Yunsu Kim:
A two-layer decentralized charging approach for residential electric vehicles based on fuzzy data fusion. 7391-7405 - Safouane El Ghazouali

, Alain Vissiere, Louis-Ferdinand Lafon, Mohamed Lamjed Bouazizi, Hichem Nouira:
Optimised calibration of machine vision system for close range photogrammetry based on machine learning. 7406-7418 - Amgad Muneer

, Suliman Mohamed Fati, Nur Arifin Akbar
, David Agustriawan, Setyanto Tri Wahyudi
:
iVaccine-Deep: Prediction of COVID-19 mRNA vaccine degradation using deep learning. 7419-7432 - Subba Rao Polamuri, Kudipudi Srinivas

, A. Krishna Mohan:
Multi-Model Generative Adversarial Network Hybrid Prediction Algorithm (MMGAN-HPA) for stock market prices prediction. 7433-7444 - Mohsen Ahmadi

, Ali Taghavirashidizadeh, Danial Javaheri
, Armin Masoumian
, Saeid Jafarzadeh Ghoushchi
, Yaghoub Pourasad:
DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering. 7445-7458 - Moch Saiful Umam, Mustafid Mustafid

, Suryono Suryono:
A hybrid genetic algorithm and tabu search for minimizing makespan in flow shop scheduling problem. 7459-7467 - Gayathri Rajendran, V. Uma, Bettina O'Brien:

Unified robot task and motion planning with extended planner using ROS simulator. 7468-7481 - Neetika Jain, Sangeeta Mittal

:
Bayesian Nash Equilibrium based Gaming Model for Eco-safe Driving. 7482-7493 - Olivier Debauche

, Saïd Mahmoudi
, Pierre Manneback, Frédéric Lebeau:
Cloud and distributed architectures for data management in agriculture 4.0 : Review and future trends. 7494-7514 - Imene Latreche, Sihem Slatnia, Okba Kazar

, Mohamed Batouche:
A third generation genetic algorithm NSGAIII for task scheduling in cloud computing. 7515-7529 - Arvind Mewada

, Rupesh Kumar Dewang
:
Research on false review detection Methods: A state-of-the-art review. 7530-7546 - Inderpreet Singh, Gulshan Goyal, Anmol Chandel:

AlexNet architecture based convolutional neural network for toxic comments classification. 7547-7558 - Mohamed Mahdi Malik, Hichem Haouassi:

Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm. 7559-7569 - Shashank Sheshar Singh

, Divya Srivastava
, Madhushi Verma, Jagendra Singh:
Influence maximization frameworks, performance, challenges and directions on social network: A theoretical study. 7570-7603 - Bouchra El Idrissi

, Salah Baïna, Anass Mamouny, Mina Elmaallam:
RDF/OWL storage and management in relational database management systems: A comparative study. 7604-7620 - Kamalakant Laxman Bawankule

, Rupesh Kumar Dewang
, Anil Kumar Singh:
A classification framework for straggler mitigation and management in a heterogeneous Hadoop cluster: A state-of-art survey. 7621-7644 - Fethi Fkih

:
Similarity measures for Collaborative Filtering-based Recommender Systems: Review and experimental comparison. 7645-7669 - Jeevamol Joy

, Renumol Vemballiveli Govinda Pillai:
Review and classification of content recommenders in E-learning environment. 7670-7685 - Brahim Djellabi, Mourad Amad, Abderrahmene Baadache:

Handfan: A flexible peer-to-peer service discovery system for internet of things applications. 7686-7698 - Aziz Qaroush, Abdalkarim Awad, Abualsoud Hanani, Khader Mohammad, Basam Jaber, Ala Hasheesh:

Learning-free, divide and conquer text-line extraction algorithm for printed Arabic text with diacritics. 7699-7709 - Nor Ashidah Selamat, Azizi Abdullah, Norizan Mat Diah:

Association features of smote and rose for drug addiction relapse risk. 7710-7719 - Mohammed Mounir Bouhamed

, Allaoua Chaoui, Radouane Nouara, Gregorio Díaz
, Abderraouf Dembri:
Reducing the number of migrated instances during business process change: A graph rewriting approach. 7720-7734 - Ebenezer Fiifi Emire Atta Mills, Siegfried Kafui Anyomi:

A hybrid two-stage robustness approach to portfolio construction under uncertainty. 7735-7750 - M. I. R. Shuvo, M. A. H. Akhand, Nazmul H. Siddique:

Handwritten numeral recognition through superimposition onto printed form. 7751-7764 - Dipika Singh, Rakhi Garg

:
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis. 7765-7774 - Oguzhan Ahmet Arik

:
Fuzzy rule-based acceptance criterion in metaheuristic algorithms. 7775-7789 - Ravita Mishra

, Sheetal Rathi
:
Enhanced DSSM (deep semantic structure modelling) technique for job recommendation. 7790-7802 - Samer Sawalha

, Ghazi Al-Naymat
:
Towards an efficient big data management schema for IoT. 7803-7818 - Khushboo Jain

, Meera M. Dhabu, Omprakash Kakde, Nitesh A. Funde:
Completely fair energy scheduling mechanism in a smart distributed multi-microgrid system. 7819-7829 - Prasetyo Wibowo

, Chastine Fatichah
:
Pruning-based oversampling technique with smoothed bootstrap resampling for imbalanced clinical dataset of Covid-19. 7830-7839
Volume 34, Number 10, Part A, November 2022
- Mustafa Raad Kadhim

, Guangyao Zhou, Wenhong Tian:
A novel self-directed learning framework for cluster ensemble. 7841-7855 - Umer Ali Khan, Ali Javed:

A hybrid CBIR system using novel local tetra angle patterns and color moment features. 7856-7873 - Md. Mahbubur Rahman, Dipanjali Kundu, Sayma Alam Suha

, Umme Raihan Siddiqi, Samrat Kumar Dey
:
Hospital patients' length of stay prediction: A federated learning approach. 7874-7884 - Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Abdullah Abdulrehman Alabdulatif, Mehak Maqbool Memon

, Rabeea Jaffari
, Mohd Nasir Abdullah:
RZee: Cryptographic and statistical model for adversary detection and filtration to preserve blockchain privacy. 7885-7910 - Arouna Ndam Njoya, Christopher Thron

, Marah Nana Awa, Ado Adamou Abba Ari
, Abdelhak Mourad Guéroui:
Power-saving system designs for hexagonal cell based wireless sensor networks with directional transmission. 7911-7919 - Federico Gatta

, Fabio Giampaolo, Edoardo Prezioso, Gang Mei
, Salvatore Cuomo
, Francesco Piccialli:
Neural networks generative models for time series. 7920-7939 - Manzoor Ahmed, Zain Ali

, Wali Ullah Khan
, Omer Waqar, Muhammad Asif, Abd Ullah Khan
, Muhammad Awais Javed, Fahd N. Al-Wesabi:
Cooperative backscatter NOMA with imperfect SIC: Towards energy efficient sum rate maximization in sustainable 6G networks. 7940-7947 - Yongheng Zhang, Feng Zhang, Si Tong, Amin Rezaeipanah:

A dynamic planning model for deploying service functions chain in fog-cloud computing. 7948-7960 - Sheela Ramachandra

, Suchithra Ramachandran
:
Region specific and subimage based neighbour gradient feature extraction for robust periocular recognition. 7961-7973 - Ahmed Al Hamoud, Amber Hoenig, Kaushik Roy:

Sentence subjectivity analysis of a political and ideological debate dataset using LSTM and BiLSTM with attention and GRU models. 7974-7987 - Jiajia Jiang

, Yushu Zhang, Youwen Zhu, Xuewen Dong, Liangmin Wang, Yong Xiang:
DCIV: Decentralized cross-chain data integrity verification with blockchain. 7988-7999 - Afreen Khan, Swaleha Zubair:

Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer's disease. 8000-8018 - Mohammed A. H. Ali

, Saad Mekhilef
, Yusoff Nukman, Bushroa Abdul Razak:
Laser simulator logic: A novel inference system for highly overlapping of linguistic variable in membership functions. 8019-8040 - Ssu-Han Chen

, Yu-Wei Lai, Chung-Lun Kuo, Chieh-Yi Lo, Yu-Sung Lin, Yan-Rung Lin, Chih-Hsiang Kang, Chia-Chun Tsai:
A surface defect detection system for golden diamond pineapple based on CycleGAN and YOLOv4. 8041-8053 - Wanying Guo, Nawab Muhammad Faseeh Qureshi

, Isma Farah Siddiqui
, Dong Ryeol Shin:
Cooperative Communication Resource Allocation Strategies for 5G and Beyond Networks: A Review of Architecture, Challenges and Opportunities. 8054-8078 - Ruifeng Li, Xu An Wang

, Haibin Yang, Ke Niu, Dianhua Tang, Xiaoyuan Yang:
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit. 8079-8089 - Antoni Jaszcz

, Dawid Polap
:
AIMM: Artificial Intelligence Merged Methods for flood DDoS attacks detection. 8090-8101 - Wenxian Jia, Guohong Qi, Menghan Liu, Jie Zhou:

A high accuracy localization algorithm with DV-Hop and fruit fly optimization in anisotropic wireless networks. 8102-8111 - Jawad Ahmad, Syed Aziz Shah

, Shahid Latif
, Fawad Ahmed
, Zhuo Zou, Nikolaos Pitropakis
:
DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. 8112-8121 - Mehdi Hassan

, Safdar Ali, Hani Alquhayz
, Jin Young Kim, Muhammad Sanaullah:
Developing liver cancer drug response prediction system using late fusion of reduced deep features. 8122-8135 - Moatsum Alawida, Je Sen Teh, Abid Mehmood

, Abdulhadi Shoufan, Wafa' Hamdan Alshoura:
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. 8136-8151 - Chunyang Wu, Fei Zhu

, Quan Liu:
Explore the weakness: Instructive exploration adversarial robust reinforcement learning. 8152-8161 - Sani Isah Abba, Mohammed Benaafi

, Abdullahi Garba Usman
, Isam H. Aljundi:
Inverse groundwater salinization modeling in a sandstone's aquifer using stand-alone models with an improved non-linear ensemble machine learning technique. 8162-8175 - Moatsum Alawida, Abiodun Esther Omolara, Oludare Isaac Abiodun, Murad Al-Rajab:

A deeper look into cybersecurity issues in the wake of Covid-19: A survey. 8176-8206 - Rami Sihwail

, Obadah Said Solaiman
, Khairul Akram Zainol Ariffin:
New robust hybrid Jarratt-Butterfly optimization algorithm for nonlinear models. 8207-8220 - Hongsheng Li, Amjad Osmani, Amira Sayed A. Aziz:

A fuzzy-based fast routing algorithm with guaranteed latency-throughput over software defined networks. 8221-8233 - Devi Fitrianah, Hisyam Fahmi

, Achmad Nizar Hidayanto, Aniati Murni Arymurthy:
Improved partitioning technique for density cube-based spatio-temporal clustering method. 8234-8244 - Jie Wang, Lingfeng Liu, Mengfei Xu, Xiangjun Li:

A novel content-selected image encryption algorithm based on the LS chaotic model. 8245-8259 - Qiang Zhao, Changwei Li:

A new point-infilling and level-setting algorithm enhanced by heuristic searching and incremental clustering to solve global optimization problems. 8260-8283 - Chenbin Ma, Peng Zhang

, Longsheng Pan, Xuemei Li, Chunyu Yin, Ailing Li, Rui Zong, Zhengbo Zhang:
Two-stage framework for automatic diagnosis of multi-task in essential tremor via multi-sensory fusion parameters. 8284-8296 - Yao Zhang, Jianpeng Xie, Yang Liu, Chaoqun Li, Jing Xiao, Hongliang Ma, Jie Zhou:

An immune chaotic adaptive evolutionary algorithm for energy-efficient clustering management in LPWSN. 8297-8306 - Yasemin Eryoldas, Alptekin Durmusoglu:

An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods. 8307-8322 - Harcharan Jit Singh

, Seema Bawa:
LaMeta: An efficient locality aware metadata management technique for an ultra-large distributed storage system. 8323-8335 - Zafar Masood

, Jiangbin Zheng, Idrees Ahmad, Muhammad Irfan:
High-performance adaptive texture streaming for planetary-scale high-mobility information visualization. 8336-8349 - Yinghui Zhang, Xuanni Wei, Jin Cao, Jianting Ning, Zuobin Ying

, Dong Zheng:
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare. 8350-8361 - Yongming Nian, Yanping Chen, Yongbin Qin, Ruizhang Huang, Ruixue Tang, Ying Hu:

A joint model for entity boundary detection and entity span recognition. 8362-8369 - Hongwu Qin, Yuntao Cheng, Xiuqin Ma, Fei Li, Jemal H. Abawajy:

Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security. 8370-8379 - Wasim Ahmad Bhat

:
FUSE based file system for efficient storage and retrieval of fragmented multimedia files. 8380-8389 - P. Shanmuga Sundari, M. Subaji:

An improved hidden behavioral pattern mining approach to enhance the performance of recommendation system in a big data environment. 8390-8400 - Himansu Sekhar Pattanayak

, Harsh Kumar Verma, Amrit Lal Sangal:
Lengthening of average path length in social networks due to the effect of community structure. 8401-8421 - Fatima-Zahra El-Alami, Said Ouatik El Alaoui

, Noureddine En-Nahnahi
:
Contextual semantic embeddings based on fine-tuned AraBERT model for Arabic text multi-class categorization. 8422-8428 - Saeed Salah

, Mohammad Nassar, Raid Zaghal, Osama Hamed:
Towards the automatic generation of Arabic Lexical Recognition Tests using orthographic and phonological similarity maps. 8429-8439 - Shruti Mittal

, Chander Kumar Nagpal
:
Predicting a reliable stock for mid and long term investment. 8440-8448 - Sonal Gore

, Jayant Jagtap
:
Radiogenomic analysis: 1p/19q codeletion based subtyping of low-grade glioma by analysing advanced biomedical texture descriptors. 8449-8458 - Febina Ikbal

, Rajamma Gopikakumari:
Image block generation from block-based SMRT in colour image encryption and its performance analysis. 8459-8477 - Hicham Reguieg

, Benallal Mohamed Anis
:
Processes meet Big Data: Scaling process discovery algorithms in Big Data environment. 8478-8489 - Abdulelah Alwabel

:
CoEdit: A novel error correction mechanism in compilers using spelling correction algorithms. 8490-8500 - Amarjeet Prajapati:

A particle swarm optimization approach for large-scale many-objective software architecture recovery. 8501-8513 - Amit Hirawat

, Swapnesh Taterh
, Tarun Kumar Sharma:
A dynamic window-size based segmentation technique to detect driver entry and exit from a car. 8514-8522 - Vipin Kumar, Prem Shankar Singh Aydav, Sonajharia Minz:

Multi-view ensemble learning using multi-objective particle swarm optimization for high dimensional data classification. 8523-8537 - Ridouane Tachicart

, Karim Bouzoubaa:
Moroccan Arabic vocabulary generation using a rule-based approach. 8538-8548 - Sumitra Nuanmeesri

:
Development of community tourism enhancement in emerging cities using gamification and adaptive tourism recommendation. 8549-8563 - Panimalar Kathiroli

, Kanmani Selvadurai:
Energy efficient cluster head selection using improved Sparrow Search Algorithm in Wireless Sensor Networks. 8564-8575 - Ruhul Amin Hazarika, Debdatta Kandar, Arnab Kumar Maji

:
An experimental analysis of different Deep Learning based Models for Alzheimer's Disease classification using Brain Magnetic Resonance Images. 8576-8598 - Rajesh Kumar

, Rewa Sharma:
Leveraging blockchain for ensuring trust in IoT: A survey. 8599-8622 - Yamina Moualkia, Mourad Amad, Abderrahmane Baadache:

Hierarchical and scalable peer-to-peer architecture for online social network. 8623-8636 - Dina Shehada

, Amjad Gawanmeh, Chan Yeob Yeun, M. Jamal Zemerly
:
Fog-based distributed trust and reputation management system for internet of things. 8637-8646 - S. Sharan Ranjit, Raj K. Jaiswal:

Intrinsic decomposition with deep supervision from a single image. 8647-8657 - Raveena Aggarwal

, Jyoti Verma
, Manvi Siwach
:
Small files' problem in Hadoop: A systematic literature review. 8658-8674 - Umamaheswara Sharma Bhutamapuram

, Ravichandra Sadam
:
With-in-project defect prediction using bootstrap aggregation based diverse ensemble learning technique. 8675-8691 - Mouna Hadj-Kacem, Nadia Bouassida:

A multi-label classification approach for detecting test smells over java projects. 8692-8701 - Mohamed Attia, Manal A. Abdel-Fattah

, Ayman E. Khedr:
A proposed multi criteria indexing and ranking model for documents and web pages on large scale data. 8702-8715 - Azizkhan F. Pathan

, Chetana Prakash:
Attention-based position-aware framework for aspect-based opinion mining using bidirectional long short-term memory. 8716-8726 - Altaf Alam, Laxman Singh

, Zainul Abdin Jaffery, Yogesh Kumar Verma
, Manoj Diwakar:
Distance-based confidence generation and aggregation of classifier for unstructured road detection. 8727-8738 - Rajesh Kumar Mundotiya

, Swasti Mishra
, Anil Kumar Singh:
Hierarchical self attention based sequential labelling model for Bhojpuri, Maithili and Magahi languages. 8739-8749 - Abd Ullah Khan

, Muhammad Tanveer
, Wali Ullah Khan
:
On reliability in the performance analysis of cognitive radio networks. 8750-8756 - Chetna Gupta, Pedro R. M. Inácio, Mário M. Freire

:
Improving software maintenance with improved bug triaging. 8757-8764 - Sugyan Kumar Mishra, Anirban Sarkar:

Service-oriented architecture for Internet of Things: A semantic approach. 8765-8776 - Sudeepa Das

, Tirath Prasad Sahu, Rekh Ram Janghel:
Stock market forecasting using intrinsic time-scale decomposition in fusion with cluster based modified CSA optimized ELM. 8777-8793 - Biswajit Bera, Pravat Kumar Shit, Nairita Sengupta, Soumik Saha

, Sumana Bhattacharjee
:
Susceptibility of deforestation hotspots in Terai-Dooars belt of Himalayan Foothills: A comparative analysis of VIKOR and TOPSIS models. 8794-8806 - Kai Li, Hui Wang, Wenjun Wang, Feng Wang, Zhihua Cui:

Improving artificial bee colony algorithm using modified nearest neighbor sequence. 8807-8824 - Ammar Mohammed

, Rania Kora:
An effective ensemble deep learning framework for text classification. 8825-8837 - Monalisa Sahu

, Neelamadhab Padhy, Sasanko Sekhar Gantayat
:
Multi-directional PVD steganography avoiding PDH and boundary issue. 8838-8851 - Satwinder Singh

, Himanshu Beniwal
:
A survey on near-human conversational agents. 8852-8866 - Ikhlasse Hamzaoui, Benjamin Duthil, Vincent Courboulay, Hicham Medromi:

Recent implications towards sustainable and energy efficient AI and big data implementations in cloud-fog systems: A newsworthy inquiry. 8867-8887 - Franklin Tchakounté, Jim Carlson Teukeng Ngnintedem, Irepran Damakoa, Ahmadou Faissal

, Franck Arnaud Kuate Fotso:
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism. 8888-8898
Volume 34, Number 10, Part B, November 2022
- Nurbaity Sabri, Haza Nuzly Abdull Hamed, Zaidah Ibrahim, Kamalnizat Ibrahim, Mohd Adham Isa, Norizan Mat Diah:

The hybrid feature extraction method for classification of adolescence idiopathic scoliosis using Evolving Spiking Neural Network. 8899-8908 - Zarah M. Mannaa, Aqil M. Azmi

, Hatim A. Aboalsamh:
Computer-assisted i'raab of Arabic sentences for teaching grammar to students. 8909-8926 - Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri

, Hassan Qjidaa, Musheer Ahmad
, Ahmed A. Abd El-Latif
:
Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map. 8927-8954 - Prabhujit Mohapatra

:
Combined economic emission dispatch in hybrid power systems using competitive swarm optimization. 8955-8971 - Xinguo Yu

, Huihui Sun, Chao Sun:
A relation-centric algorithm for solving text-diagram function problems. 8972-8984 - Ravi Sharma

, Balázs Villányi:
A spatiotemporal Order-Revealing query processing approach for Industrial Internet of Things. 8985-8995 - Song Zhang

, Yanbing Liu, Yunpeng Xiao, Rui He:
Spatial-temporal upsampling graph convolutional network for daily long-term traffic speed prediction. 8996-9010 - Siti Zulaikha Mohd Jamaludin, Nurul Atiqah Romli

, Mohd Shareduwan Mohd Kasihmuddin, Aslina Baharum, Mohd. Asyraf Mansor, Muhammad Fadhil Marsani
:
Novel logic mining incorporating log linear approach. 9011-9027 - Pulung Nurtantio Andono, Catur Supriyanto:

Keypoints class distribution based entropy for weighting scheme on image classification. 9028-9038 - Yuan Zhao, Zhiyu Xiang

, Kang Chen, Zhisheng Ye, Qi Lu:
Modelling and optimization for cognitive radio networks with preemption backoff mechanism. 9039-9051 - Yi Xie, Xianliang Jiang

, Guang Jin, Ziyi Jiang, Diqun Yan:
NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks. 9052-9059 - Muhammad Husnain Haider, Zhonglai Wang, Abdullah Aman Khan, Hub Ali

, Hao Zheng, Shaban Usman
, Rajesh Kumar, M. Usman Maqbool Bhutta
, Pengpeng Zhi
:
Robust mobile robot navigation in cluttered environments based on hybrid adaptive neuro-fuzzy inference and sensor fusion. 9060-9070 - Chaoqun Li, Yang Liu, Yao Zhang, Mengying Xu, Jing Xiao, Jie Zhou:

A novel multi-level population hybrid search evolution algorithm for constrained multi-objective optimization problems. 9071-9087 - Yassine Zahraoui, Khalid Errajraji, Salah-Eddine Ramah

, Afaf Bouhoute, Ismail Berrada:
Driver profiling: The pathway to deeper personalization. 9088-9101 - Mohamad Mulham Belal, Sundaram Divya Meena

:
Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends. 9102-9131 - Fatima Azzam, Mohammed Kayed, Abdelmgied Ali:

A model for generating a user dynamic profile on social media. 9132-9145 - Eko Sediyono

, Ferry Wahyu Wibowo
, Hindriyanto Dwi Purnomo:
Leader election of dynamic wireless intelligent control machine in sensor network distributed processing. 9146-9162 - Yizhao Wu

, Yanping Chen, Yongbin Qin, Ruizhang Huang, Ruixue Tang:
A marker collaborating model for entity and relation extraction. 9163-9172 - Xiaoyu Xu, Hui Wang, Wuquan Li, Meiqiao Wang:

Distributed output tracking via event-triggered control for nonlinear multi-agent systems. 9173-9183 - Ahmed Khudhur Nsaif, Sawal Hamid Md. Ali, Asama Kuder Nseaf, Khider Nassif Jassim, Ammar Al-Qaraghuli

, Riza Sulaiman:
Robust and Swift Iris Recognition at distance based on novel pupil segmentation. 9184-9206 - Liang'an Huo, Ruifang Zhao, Laijun Zhao:

Effects of official information and rumor on resource-epidemic coevolution dynamics. 9207-9215 - Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu:

Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV. 9216-9227 - Shiraz Ali Wagan, Jahwan Koo, Isma Farah Siddiqui

, Muhammad Attique, Dong Ryeol Shin, Nawab Muhammad Faseeh Qureshi
:
Internet of medical things and trending converged technologies: A comprehensive review on real-time applications. 9228-9251 - Zhihua Gan, Shiping Song, Lin Zhou, Daojun Han, Jiangyu Fu, Xiuli Chai:

Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication. 9252-9272 - Nazife Cevik, Taner Çevik, Onur Osman, Ahmet Gürhanli

, Sajjad Nematzadeh
, Fatih Sahin:
Improved exploiting modification direction steganography for hexagonal image processing. 9273-9283 - Dragan Korac

, Boris Damjanovic, Dejan Simic, Kim-Kwang Raymond Choo:
A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity. 9284-9300 - Yaolin Zhu, Jiayi Huang, Yunhong Li, Wenya Li:

Image identification of cashmere and wool fibers based on the improved Xception network. 9301-9310 - Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais

:
Predicting input validation vulnerabilities based on minimal SSA features and machine learning. 9311-9331 - Khalid Alkharabsheh

, Sadi Alawadi, Karam Ignaim, Nabeel Zanoon, Yania Crespo
, M. Esperanza Manso, José Ángel Taboada González
:
Prioritization of god class design smell: A multi-criteria based approach. 9332-9342 - Seung Gu Kim, Jiho Choi, Jin Seong Hong, Kang Ryoung Park:

Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images. 9343-9362 - Jiawei Shen, Junfeng Tian, Ziyuan Wang, Hongyun Cai:

Friendship links-based privacy-preserving algorithm against inference attacks. 9363-9375 - Umar Ishfaq, Hikmat Ullah Khan

, Saqib Iqbal:
Identifying the influential nodes in complex social networks using centrality-based approach. 9376-9392 - Zafar Masood

, Jiangbin Zheng, Idrees Ahmad, Muhammad Irfan, Nafees Ahmad:
A novel method for adaptive terrain rendering using memory-efficient tessellation codes for virtual globes. 9393-9408 - Hongwu Qin, Meng Zhao, Xiuqin Ma, Huanling Sun, Weiyi Wei:

BMCR: A collaborator recommendation model based on Scholars' academic level. 9409-9418 - Jiexian Zeng, Huan Ouyang, Min Liu, Lu Leng, Xiang Fu:

Multi-scale YOLACT for instance segmentation. 9419-9427 - Said Agounad

, Soukaina Hamou, Ousama Tarahi, Mustapha Moufassih
, Md Kafiul Islam
:
Intelligent fuzzy system for automatic artifact detection and removal from EEG signals. 9428-9441 - Abeer Almaghrabi

, Areej Alhogail:
Blockchain-based donations traceability framework. 9442-9454 - Mengdie Han, Jiliang Zhang:

On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems. 9455-9463 - Parnika Bhat

, Kamlesh Dutta:
A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain. 9464-9477 - Ruchin Gupta

, Sandeep Kumar Singh
:
A Novel Metric based Detection of Temporary Field Code Smell and its Empirical Analysis. 9478-9500 - Risnandar

:
DeSa COVID-19: Deep salient COVID-19 image-based quality assessment. 9501-9512 - Bassam AlKindy

, Christophe Guyeux:
Impact of Insertion Sequences and RNAs on Genomic Inversions in Pseudomonas aeruginosa. 9513-9522 - Supriya Agrahari, Anil Kumar Singh:

Concept Drift Detection in Data Stream Mining : A literature review. 9523-9540 - Gunjan Beniwal, Anita Singhrova

:
"A systematic literature review on IoT gateways". 9541-9563 - Shini Renjith

, Annie Abraham, Surya B. Jyothi, Lekshmi Chandran, Jincy Thomson:
An ensemble deep learning technique for detecting suicidal ideation from posts in social media platforms. 9564-9575 - Hanae Errousso, Jihane El Ouadi, El Arbi Abdellaoui Alaoui, Siham Benhadou:

Dynamic parking space allocation at urban scale: Problem formulation and resolution. 9576-9590 - Dwi Sunaryono

, Riyanarto Sarno, Joko Siswantoro:
Gradient boosting machines fusion for automatic epilepsy detection from EEG signals based on wavelet features. 9591-9607 - Partha Pratim Ray, Dinesh Dash:

IoT-edge anomaly detection for covariate shifted and point time series health data. 9608-9621 - Preeti Monga, Manik Sharma, Sanjeev Kumar Sharma:

A comprehensive meta-analysis of emerging swarm intelligent computing techniques and their research trend. 9622-9643 - Aarthi Paramasivam

, S. Jaya Nirmala:
A survey on textual entailment based question answering. 9644-9653 - Mohamed Awni

, Mahmoud I. Khalil
, Hazem M. Abbas:
Offline Arabic handwritten word recognition: A transfer learning approach. 9654-9661 - Sibang Liu, Kuili Liu, Zhen Zhong, Jinghan Yi, Hamdulah Aliev

:
A novel wheeled mobile robots control based on robust hybrid controller: Mixed H2/H∞ and predictive algorithm approach. 9662-9676 - Guruprakash Jayabalasamy

, Srinivas Koppu:
High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem. 9677-9687 - Pawan Kumar Upadhyay, Somil Rastogi, K. Vimal Kumar:

Coherent convolution neural network based retinal disease detection using optical coherence tomographic images. 9688-9695 - Mohammad Haris

, Swaleha Zubair:
Mantaray modified multi-objective Harris hawk optimization algorithm expedites optimal load balancing in cloud computing. 9696-9709 - Abdulaziz M. Alayba

, Vasile Palade:
Leveraging Arabic sentiment classification using an enhanced CNN-LSTM approach and effective Arabic text preparation. 9710-9722 - Muhammad Asif

, Sagheer Abbas
, M. A. Khan, Areej Fatima
, Muhammad Adnan Khan, Sang-Woong Lee:
MapReduce based intelligent model for intrusion detection using machine learning technique. 9723-9731 - Simi Venuji Renuka, Damodar Reddy Edla, Justin Joseph

:
An objective measure for assessing the quality of contrast enhancement on magnetic resonance images. 9732-9744 - Satish Kumar Satti

, K. SuganyaDevi, Prasad Maddula
, N. V. Vishnumurthy Ravipati:
Unified approach for detecting traffic signs and potholes on Indian roads. 9745-9756 - Swadhin Kumar Barisal, Shorya Pratap Singh Chauhan, Arpita Dutta, Sangharatna Godboley, Bibhudatta Sahoo, Durga Prasad Mohapatra

:
BOOMPizer: Minimization and prioritization of CONCOLIC based boosted MC/DC test cases. 9757-9776 - Siham Yousfi, Dalila Chiadmi, Maryem Rhanoui:

Smart big data framework for insight discovery. 9777-9792 - Kyoung-Sook Kim, Dinh-Lam Pham

, Young-In Park, Kwanghoon Pio Kim
:
Experimental verification and validation of the SICN-oriented process mining algorithm and system. 9793-9813 - Abhishek Gupta

, Somesh Kumar, Manisha Pattanaik:
Coverage hole detection using social spider optimized Gaussian Mixture Model. 9814-9821 - Manasi Jana, Biswapati Jana, Subhankar Joardar:

Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic. 9822-9835 - Radhakrishna Dodmane

, Ganesh Aithal, Surendra Shetty:
Construction of vector space and its application to facilitate bitwise XOR - Free operation to minimize the time complexity. 9836-9843 - Mouna Bedoui

, Hassen Mestiri
, Belgacem Bouallegue, Belgacem Hamdi, Mohsen Machhout
:
An improvement of both security and reliability for AES implementations. 9844-9851 - Meryem Soysaldi, Sedat Akleylek:

A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model. 9852-9866 - Sanjay Madan, Sanjeev Sofat, Divya Bansal:

Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review. 9867-9888 - Rasmiranjan Mohakud, Rajashree Dash

:
Skin cancer image segmentation utilizing a novel EN-GWO based hyper-parameter optimized FCEDN. 9889-9904 - Naeem Ullah

, Ali Javed, Mustansar Ali Ghazanfar, Abdulmajeed Alsufyani, Sami Bourouis
:
A novel DeepMaskNet model for face mask detection and masked facial recognition. 9905-9914 - Özkan Arslan, Mustafa Karhan

:
Effect of Hilbert-Huang transform on classification of PCG signals using machine learning. 9915-9925 - Mohamed Maazouz, Abdelmoughni Toubal, Billel Bengherbia

, Oussama Houhou
, Noureddine Batel:
FPGA implementation of a chaos-based image encryption algorithm. 9926-9941 - Mohd Rafi Lone

, Ekram Khan:
A good neighbor is a great blessing: Nearest neighbor filtering method to remove impulse noise. 9942-9952 - Gopal Behera

, Neeta Nain:
Handling data sparsity via item metadata embedding into deep collaborative recommender system. 9953-9963 - Ramen Pal

, Somnath Mukhopadhyay, Debasish Chakraborty
, Ponnuthurai Nagaratnam Suganthan:
Very high-resolution satellite image segmentation using variable-length multi-objective genetic clustering for multi-class change detection. 9964-9976 - Andrea Vázquez-Ingelmo

, Francisco José García-Peñalvo
, Roberto Therón
:
MetaViz - A graphical meta-model instantiator for generating information dashboards and visualizations. 9977-9990 - Nilayam Kumar Kamila, Jaroslav Frnda

, Subhendu Kumar Pani, Rashmi Das, Sardar M. N. Islam
, P. K. Bharti, Kamalakanta Muduli
:
Machine learning model design for high performance cloud computing & load balancing resiliency: An innovative approach. 9991-10009 - Banghua Wu, Xuebin Lv, Wameed Deyah Shamsi, Ebrahim Gholami Dizicheh:

Optimal deploying IoT services on the fog computing: A metaheuristic-based multi-objective approach. 10010-10027 - Feras Al-Hawari

:
Software design patterns for data management features in web-based information systems. 10028-10043 - Junyong Wang, Thar Baker

, Yingnan Zhou, Ali Ismail Awad
, Bin Wang, Yongsheng Zhu:
Automatic mapping of configuration options in software using static analysis. 10044-10055 - Nur Hidayah Mohammad Ismail, Md Yushalify Misro

:
An improved image encryption algorithm based on Bézier coefficients matrix. 10056-10067 - Aseel Alsaedi, Abeer Alhuzali

, Omaimah Bamasag:
Effective and scalable black-box fuzzing approach for modern web applications. 10068-10078 - Sholiq Sholiq, Riyanarto Sarno, Endang Siti Astuti:

Generating BPMN diagram from textual requirements. 10079-10093 - Ruiqi Guo, Yong Peng

, Wanzeng Kong, Fan Li
:
A semi-supervised label distribution learning model with label correlations and data manifold exploration. 10094-10108 - Sadia Afroze, Md. Rajib Hossain, Mohammed Moshiul Hoque:

DeepFocus: A visual focus of attention detection framework using deep learning in multi-object scenarios. 10109-10124 - Miguel Ángel Álvarez-Carmona, Ramón Aranda

, Ansel Y. Rodríguez-González
, Daniel Fajardo-Delgado, María Guadalupe Sánchez, Humberto Pérez Espinosa, Juan Martínez-Miranda, Rafael Guerrero-Rodríguez
, Lázaro Bustio-Martínez
, Ángel Díaz-Pacheco
:
Natural language processing applied to tourism research: A systematic review and future research directions. 10125-10144 - ShuangGen Liu, Yu Zhu, RuiYun Wang:

Pairing-free certificateless blind signature scheme for smart grid. 10145-10156 - Huifang Yu

, Jiafeng Shi:
Certificateless multi-source signcryption with lattice. 10157-10166 - Ziwen Zhu, Lingfeng Liu:

Thumbnail-preserving encryption based on improved logistic system. 10167-10179 - Francisco de Arriba-Pérez

, Silvia García-Méndez
, Francisco J. González-Castaño, Jaime González-González
:
Explainable machine learning multi-label classification of Spanish legal judgements. 10180-10192 - Mohammed Ayub, Tarek Helmy:

Concurrent kernel execution and interference analysis on GPUs using deep learning approaches. 10193-10204 - Areej Bin Suhaim

, Jawad Berri:
Directional user similarity model for personalized recommendation in online social networks. 10205-10216 - Oludare Isaac Abiodun, Moatsum Alawida, Abiodun Esther Omolara, Abdulatif Alabdulatif:

Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. 10217-10245 - Pritom Biswas Udas, Md. Ebtidaul Karim

, Kowshik Sankar Roy
:
SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks. 10246-10272 - Se Woon Cho, Na Rae Baek, Kang Ryoung Park:

Deep Learning-based Multi-stage segmentation method using ultrasound images for breast cancer diagnosis. 10273-10292 - Feng Ye, Jun Sun, Zeyin Du, Nadia Nedjah, Wei Liu, Lin Lan:

Efficient data replay mechanism of sensor stream data based on concurrent buffer pool. 10293-10303 - Mohamed Elshrkawey, Hassan Al-Mahdi, Walid Atwa:

An enhanced routing algorithm based on a re-position particle swarm optimization (RA-RPSO) for wireless sensor network. 10304-10318 - Tauseef Rana, Ayesha Maqbool, Toqir Ahmad Rana

, Alina Mirza, Zeshan Iqbal
, Muhammad Attique Khan
, Majed Alhaisoni, Abdullah Alqahtani
, Ye Jin Kim, Byoungchol Chang:
Achieving stepwise construction of cyber physical systems in EX-MAN component model. 10319-10338 - Gazal, Kapil Juneja

:
Two-phase fuzzy feature-filter based hybrid model for spam classification. 10339-10355 - Mohammed A. Alqarni, Mohamed-Hamed Mousa

, Mohamed-K. Hussein
:
Task offloading using GPU-based particle swarm optimization for high-performance vehicular edge computing. 10356-10364 - Yanhui Liu, Zhang Jianbiao, Muhammad Salman Pathan

, Yuan Yijian, Zhang Puzhe, Sarah Maroc, Avishek Nag:
Research on identity authentication system of Internet of Things based on blockchain technology. 10365-10377 - Wenkai Li, Jiuyang Bu, Xiaoqi Li

, Hongli Peng, Yuanzheng Niu, Yuqing Zhang:
A survey of DeFi security: Challenges and opportunities. 10378-10404 - Kwabena Sarpong

, Jehoiada Kofi Jackson, Derrick Effah, Daniel Addo, Sophyani Banaamwini Yussif
, Mohammad Awrangjeb
, Rutherford Agbeshi Patamia, Juliana Mantebea Danso
, Zhiguang Qin:
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention. 10405-10422 - Linh-An Phan, Taehong Kim:

Hybrid time synchronization protocol for large-scale wireless sensor networks. 10423-10433 - Rishabh Bhardwaj, Tushar Vaidya

, Soujanya Poria
:
Towards solving NLP tasks with optimal transport loss. 10434-10443 - Devika Kuttala, Dwarikanath Mahapatra, Ramanathan Subramanian

, Venkata Ramana Murthy Oruganti:
Dense attentive GAN-based one-class model for detection of autism and ADHD. 10444-10458 - Zhengli Liu

, Bing Li, Jian Wang, Yu Qiao:
A method of value model convergence and profit optimization for crossover services. 10459-10473 - Ganbayar Batchuluun, Se Hyun Nam, Kang Ryoung Park:

Deep learning-based plant classification and crop disease classification by thermal camera. 10474-10486 - Wanying Guo, Jahwan Koo, Isma Farah Siddiqui

, Nawab Muhammad Faseeh Qureshi, Dong Ryeol Shin:
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets. 10487-10495

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














