


default search action
The Journal of Supercomputing, Volume 80
Volume 80, Number 1, January 2024
- Zhiyong Zhou, Yuanning Liu, Xiaodong Zhu, Shuai Liu, Shaoqiang Zhang, Yuanfeng Li, Zhen Liu:
Lifelong iris presentation attack detection without forgetting. 1-19 - Dahai Xia, Xinyun Wu, Meng Yan, Caiquan Xiong:
An adaptive stochastic ranking-based tournament selection method for differential evolution. 20-49 - Khalid Javeed, Ali El-Moursy, David Gregg:
E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p). 50-74 - Chandan Kumar
, Sudhanshu Kumar Jha
, Dilip Kumar Yadav, Shiv Prakash, Mukesh Prasad:
A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic. 75-97 - Avita Katal, Tanupriya Choudhury
, Susheela Dahiya:
Energy optimized container placement for cloud data centers: a meta-heuristic approach. 98-140 - Sally Mohamed Sameh, Hossam El-Din Moustafa
, Ehab H. Abdelhay
, Mohamed Maher Ata:
An effective chaotic maps image encryption based on metaheuristic optimizers. 141-201 - Huafeng Wu, Feng Wang, Xiaojun Mei
, Linian Liang, Bing Han, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li
:
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors. 202-225 - Omar Younis Abdulhammed:
A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. 226-248 - Na Dong, Qingyue Feng, Jianfang Chang, Xiaoming Mai:
White blood cell classification based on a novel ensemble convolutional neural network framework. 249-270 - R. Rajalakshmi, P. Sivakumar, L. Krishna Kumari, M. Chengathir Selvi:
A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism. 271-291 - Rebecca H. K. Emanuel, Paul David Docherty, Helen Lunt, Knut Möller:
The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration. 292-312 - Yonghao Lai, Xiaohui Hua:
Component edge connectivity and extra edge connectivity of alternating group networks. 313-330 - Jin Yang, Wangdong Yang, Ruixuan Qi, Qinyun Tsai
, Shengle Lin
, Fengkun Dong, Kenli Li, Keqin Li:
Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer. 331-362 - Chih-Yung Chang, Syu-Jhih Jhang
, Shih-Jung Wu, Diptendu Sinha Roy:
JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP. 363-394 - Ruisheng Ran, Ting Wang, Zheng Li, Bin Fang:
Polynomial linear discriminant analysis. 413-434 - Ju-Won Park
, Xin Huang
, Chul-Ho Lee:
Analyzing and predicting job failures from HPC system log. 435-462 - Emmanuel Ahishakiye, Waweru Mwangi, Petronilla Muriithi, Fredrick Kanobe, Godliver Owomugisha, Danison Taremwa, Lenard Nkalubo:
Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data. 463-485 - Beste Ustubioglu
, Gul Tahaoglu, Güzin Ulutas, Arda Ustubioglu, Muhammed Kiliç
:
Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach. 486-518 - Tian Tian, Anshi Wang, Xiuting Yang, Dunwei Gong, Tie Hou, Xiangjuan Yao:
Parallel program testing based on critical communication and branch transformation. 519-548 - Tobias Piontek, Kawsar Haghshenas
, Marco Aiello:
Carbon emission-aware job scheduling for Kubernetes deployments. 549-569 - Yashar Salami
, Vahid Khajehvand, Esmaeil Zeinali:
SOS-FCI: a secure offloading scheme in fog-cloud-based IoT. 570-600 - Hamed Jalilian:
Total variation method based on modified Barzilai-Borwein algorithm to noise reduction in MRI images. 601-619 - Qun Li, Bei Tang, Jianxin Li, Siguang Chen:
User satisfaction-based energy-saving computation offloading in fog computing networks. 620-641 - Rong Gao, Wei He, Lingyu Yan, Donghua Liu, Yonghong Yu, Zhiwei Ye:
Hybrid graph transformer networks for multivariate time series anomaly detection. 642-669 - Fatemeh Vardi, Alireza Mahjoub
:
A hot-module-aware mapping approach in network-on-chip. 670-702 - Sujit Sangram Sahoo
, Vijay Kumar Chaurasiya:
Proof of location based delivery system using multi-party virtual state channel: a blockchain model. 703-733 - Mao-Lun Chiang, Hui-Ching Hsieh, Tzu-Ling Lin, Tsui-Ping Chang, Hong-Wei Chen:
Dynamic weight-based connectivity recovery in wireless sensor and actor networks. 734-760 - Elham Dalirinia, Mehrdad Jalali
, Mahdi Yaghoobi, Hamid Tabatabaee:
Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization. 761-799 - Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee
, Ahmad Keshavarz:
A new improved KNN-based recommender system. 800-834 - Dikshit Chauhan
, Anupam Yadav:
Stability and agent dynamics of artificial electric field algorithm. 835-864 - Namrata Singh
, Ayan Kumar Das:
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor. 865-914 - Zahra Mahmoodabadi, Mostafa Nouri Baygi:
An approximation algorithm for virtual machine placement in cloud data centers. 915-941 - Rakesh Kumar
, Sunil K. Singh
, D. K. Lobiyal:
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks. 942-969 - Sheng-Tzong Cheng, Gwo-Jiun Horng, Chih-Wei Hsu, Z.-Yu Su:
Per-user network access control kernel module with secure multifactor authentication. 970-1008 - Maedeh Khalifavi, Zahra Shirmohammadi, Sahar Kianian:
FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method. 1009-1036 - Tariq Shah, Tanveer ul Haq:
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. 1037-1058 - Mehmet Bozdal
, Kadir Ileri
, Ali Ozkahraman:
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset. 1059-1079 - Indushree M, Manish Raj
:
A novel Blockchain-based authentication scheme for telecare medical information system. 1080-1108 - Sadoon Azizi, Pedram Farzin, Mohammad Shojafar, Omer F. Rana
:
A scalable and flexible platform for service placement in multi-fog and multi-cloud environments. 1109-1136 - Tundong Liu, Fengqiang Gao, Xin Chen, Guifang Shao, Chenhan Wang:
Research on load-balancing scheduling optimization for wafer surface defect detection. 1137-1159 - Jihene Latrech
, Zahra Kodia
, Nadia Ben Azzouna:
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning. 1160-1182 - Zuoyan Zhang
, Jinchen Xu, Jiangwei Hao, Yang Qu, Haotian He, Bei Zhou:
Hierarchical search algorithm for error detection in floating-point arithmetic expressions. 1183-1205 - Abdelhakim Baouya
, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaz-Nava, Enrico Ferrera:
Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance. 1206-1237 - Sumit Sharma
, Sarika Jain:
CovidO: an ontology for COVID-19 metadata. 1238-1267 - Sibo Qi
, Juan Chen, Peng Chen
, Peian Wen, Xianhua Niu, Lei Xu:
An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers. 1268-1293 - Xiaomei Li
, Ye Lu, Xiaoyu Zhao, Xiong Deng, Zhijiang Xie:
Path planning for intelligent vehicles based on improved D* Lite. 1294-1330 - C. Pabitha, B. Vanathi:
Dense Mesh RCNN: assessment of human skin burn and burn depth severity. 1331-1362 - Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien-Hsiung Weng, Kuan-Ching Li
:
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data. 1363-1364 - Minghua Tang, Enrico Russo, Maurizio Palesi:
Correction to: The position-based compression techniques for DNN model. 1365 - Yifei Wang, Mert Pilanci:
Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path. 1366
Volume 80, Number 2, January 2024
- Preetpal Kaur Buttar
, Manoj Kumar Sachan:
Semantic segmentation of satellite images for crop type identification in smallholder farms. 1367-1395 - Zhonghua Chen, S. B. Goyal, Anand Singh Rajawat
:
Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. 1396-1425 - Xiaoxin Gao
, Fazhi He, Songwei Zhang, Jinkun Luo, Bo Fan:
A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively. 1426-1463 - Bahram Rashidi:
Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection. 1464-1490 - Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:
An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing. 1491-1521 - Santosh Kumar Uppada, B. S. Ashwin, B. Sivaselvan:
A novel evolutionary approach-based multimodal model to detect fake news in OSNs using text and metadata. 1522-1553 - Melika Amiri, Massoud Dousti, Majid Mohammadi:
Design and implementation of carry-save adder using quantum-dot cellular automata. 1554-1567 - Md Yeasin, Ranjit Kumar Paul:
OptiSembleForecasting: optimization-based ensemble forecasting using MCS algorithm and PCA-based error index. 1568-1597 - Carmen Carrión
:
Research streams and open challenges in the metaverse. 1598-1639 - Zhaoxia Tian, Mingzu Zhang, Xing Feng:
Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links. 1640-1667 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures. 1668-1693 - Yi Yang
, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 1694-1727 - Amjad Qtaish, Malik Braik
, Dheeb Albashish, Mohammad T. Alshammari
, Abdulrahman Alreshidi, Eissa Jaber Alreshidi:
Optimization of K-means clustering method using hybrid capuchin search algorithm. 1728-1787 - Shaurya Sood, Neminath Hubballi:
SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters. 1788-1817 - Arvind Mewada
, Rupesh Kumar Dewang:
NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media. 1818-1851 - Mirna Magdy, Mohamed O. Grida, Gawaher S. Hussein:
Disruption mitigation in the semiconductors supply chain by using public blockchains. 1852-1906 - Huanwen Zhang, Yan Wang, Jianxi Fan, Yuejuan Han, Baolei Cheng:
Constructing edge-disjoint spanning trees in several cube-based networks with applications to edge fault-tolerant communication. 1907-1934 - Nartay Aikyn
, Ardan Zhanegizov
, Temirlan Aidarov, Dinh-Mao Bui, Nguyen Anh Tu
:
Efficient facial expression recognition framework based on edge computing. 1935-1972 - Divya Paikaray, Ashok Kumar Mehta, Danish Ali Khan:
Optimized convolutional neural network for the classification of lung cancer. 1973-1989 - Ramzi A. Haraty, Ali Assaf:
DG-means: a superior greedy algorithm for clustering distributed data. 1990-2024 - Yanjiang Han, Fengping Wang, Wei Wang, Xiangyu Li, Jianyang Zhang
:
YOLO-SG: Small traffic signs detection method in complex scene. 2025-2046 - Yuju Wang
, Liang-Hong Wu
, Liang-Chuan Wu
:
An integrative extraction approach for index-tracking portfolio construction and forecasting under a deep learning framework. 2047-2066 - Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi
, Shahram Etemadi Borujeni:
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems. 2067-2127 - Massoud Seifpour, Seyyed Amir Asghari, Mostafa Ghobaei-Arani
:
A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach. 2128-2163 - P. Mathivanan
, Maran Ponnambalam:
Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 2164-2195 - Xiaohong Li, Qixuan Peng, Ruihong Li, Huifang Ma:
Dual graph neural network for overlapping community detection. 2196-2222 - Pijush Kanti Dutta Pramanik
, Saurabh Pal
, Prasenjit Choudhury
:
Mobile crowd computing: potential, architecture, requirements, challenges, and applications. 2223-2318 - Haiying Liu, Zhihao Li, Kuihua Huang, Rui Wang, Guangquan Cheng, Tiexiang Li:
Evolutionary reinforcement learning algorithm for large-scale multi-agent cooperation and confrontation applications. 2319-2346 - S. Saumiya, S. Wilfred Franklin
:
Unified automated deep learning framework for segmentation and classification of liver tumors. 2347-2380 - Hengliang Guo, Long Zhang, Yi Zhang, Jianan Li, Xiaoyue Xu, Lu Liu, Kuangsheng Cai, Dan Wu, Shuxin Yang, Lingbo Kong, Xu Gao
:
OpenMP offloading data transfer optimization for DCUs. 2381-2402 - Shaimaa E. Nassar
, Ibrahim Yasser, Hanan M. Amer, Mohamed A. Mohamed:
A robust MRI-based brain tumor classification via a hybrid deep learning technique. 2403-2427 - Chakaravarthi Sivanandam, Vaishnnave Mala Perumal, Jagadeesh Mohan
:
A novel light GBM-optimized long short-term memory for enhancing quality and security in web service recommendation system. 2428-2460 - Usha Patel, Vibha Patel:
Active learning-based hyperspectral image classification: a reinforcement learning approach. 2461-2486 - Chenxing Xia
, Difeng Chen, Xiuju Gao, Bin Ge, Kuan-Ching Li
, Xianjin Fang, Yan Zhang, Ke Yang:
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection. 2487-2513 - Chandrashekhar Meshram, Mohammad S. Obaidat, Rabha W. Ibrahim, Sarita Gajbhiye Meshram
, Arpit Vijay Raikwar:
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments. 2514-2537 - Tinka Singh, Ramagopal V. S. Uppaluri:
Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters. 2538-2571 - Khalid A. Darabkh, Thara A. Alzboun, Marwa H. Al-Tahaineh:
A novel routing protocol for stable route selection in IoT networks. 2572-2600 - Bahar Ghasemi, Mahmood Ahmadi
, Hamed Alimohammadi
:
A neural gas network-based scheme for SDN many-field packet classification. 2601-2632 - Oussama Azzouzi, Mohamed Anane, Mouloud Koudil, Mohamed Issad, Yassine Himeur:
Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA. 2633-2659 - Anil Kumar Kamboj
, Poonam Jindal, Pankaj Verma:
Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks. 2660-2680 - Divya Rani
, Sachin Tripathi:
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. 2681-2717 - Peda Gopi Arepalli
, K. Jairam Naik:
A deep learning-enabled IoT framework for early hypoxia detection in aqua water using light weight spatially shared attention-LSTM network. 2718-2747 - Bo Zhou, Hai Huang, Jun Xia, Donghai Tian:
A novel malware detection method based on API embedding and API parameters. 2748-2766 - Lijun Qi, Jincheng Zhuang:
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing. 2767-2798 - Youwei Wang, Lizhou Feng, Ao Liu, Weiqi Wang, Yudong Hou:
Dual BiGRU-CNN-based sentiment classification method combining global and local attention. 2799-2837 - Tengteng Cheng, Guosun Zeng, Zhipeng Sun:
A big graph clustering method to support parallel processing by perceiving graph's application algorithm semantics. 2838-2861 - G. Sivapriya, R. Manjula Devi, Keerthika Periasamy
:
Computer-aided diagnostic model for retinal vascular diseases using graph-based attention mechanism. 2862-2888 - Yuxin Tang
, Yudi Qiu
, Yanwei Liu, Jie Jiao, Peng Zhang, Yibo Fan:
Scalable short-entry dual-grain coherence directories with flexible region granularity. 2889-2911 - Raushan Kumar Singh
, Mukesh Kumar:
Correction to: Future trends of path planning framework considering accident attributes for smart cities. 2912 - Parisa Kavianpour, Mohammadreza Kavianpour, Ehsan Jahani, Amin Ramezani:
Correction to: A CNN-BiLSTM model with attention mechanism for earthquake prediction. 2913 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures. 2914-2915
Volume 80, Number 3, February 2024
- Ismail Biri, Ülkü Tuncer Küçüktas
, Fatih Uysal, Firat Hardalaç:
Forecasting the future popularity of the anti-vax narrative on Twitter with machine learning. 2917-2947 - Jiaxin Chen, Xuguang Zhang, Yinggan Tang, Hui Yu
:
ICE-YoloX: research on face mask detection algorithm based on improved YoloX network. 2948-2969 - Divyanshu Awasthi
, Priyank Khare, Vinay Kumar Srivastava
:
Internet of medical things-based authentication for an optimized watermarking of encrypted EEG. 2970-3004 - Luttfi A. Al-Haddad
, Alaa Abdulhady Jaber
, Sinan A. Al-Haddad
, Yousif M. Al-Muslim
:
Fault diagnosis of actuator damage in UAVs using embedded recorded data and stacked machine learning models. 3005-3024 - Guangjin Wang
, Yuanying Wang, Fuyong Xu, Yongsheng Zhang, Peiyu Liu:
Syntactic and semantic dual-enhanced bidirectional network for aspect sentiment triplet extraction. 3025-3041 - Hongxia Zhang, Mengde Wu, Qiqi Feng, Hao Li:
AERQP: adaptive embedding representation-based QoS prediction for web service recommendation. 3042-3065 - Arash Ahmadi, Amanj Khorramian
:
Efficient Brute-force state space search for Yin-Yang puzzle. 3066-3088 - K. Uma Maheswari
, S. Mary Saira Bhanu, Nickolas Savarimuthu:
Clustering-based data integrity verification approach for multi-replica in a fog environment. 3089-3113 - Yilu Chen, Miaodi Su, Hongzhi Ding, Shaohong Weng, Zhifeng Lin, Xiqiong Bai:
High-correlation 3D routability estimation for congestion-guided global routing. 3114-3141 - Xuesong Wang
, Zheng Zhang, Dongsheng Zhang, Limin Ding:
Pose visual detection method for cellphone dropping process incorporating prior information. 3142-3161 - Ruihang Xu, Peisen Wang, Xuanjing Li, Ruifeng Nie:
YOLO-ARGhost: a lightweight face mask detection model. 3162-3182 - Mei Bai, Qibo Wang, Shihan Chang, Xite Wang, Guanyu Li:
Location-based skyline query processing technology in road networks. 3183-3211 - Yanni Yang, Yiting Tan, Jintao Min, Zhengwei Huang:
Automatic text summarization for government news reports based on multiple features. 3212-3228 - Saif Eddine Khouni, Tidjani Menacer:
Nizar optimization algorithm: a novel metaheuristic algorithm for global optimization and engineering applications. 3229-3281 - Lin Zhang, Fang'ai Liu, Hongchen Wu, Xuqiang Zhuang, Yaoyao Yan:
CFF: combining interactive features and user interest features for click-through rate prediction. 3282-3309 - Xiao Liu, Junlong Chen, Deyu Qi, Tong Zhang:
Exploration of low-resource language-oriented machine translation system of genetic algorithm-optimized hyper-task network under cloud platform technology. 3310-3333 - Jianxin Tang, Shihui Song, Hongyu Zhu, Qian Du, Jitao Qu:
Sequential seeding policy on social influence maximization: a Q-learning-driven discrete differential evolution optimization. 3334-3359 - Junfan Wang, Yi Chen, Yeting Gu, Yunfeng Yan, Qi Li, Mingyu Gao, Zhekang Dong
:
A lightweight vehicle mounted multi-scale traffic sign detector using attention fusion pyramid. 3360-3381 - Xu Gu, Xiaoliang Chen, Peng Lu, Xiang Lan, Xianyong Li, Yajun Du:
SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing. 3382-3411 - Xinnan Ding, Shan Du
, Yu Zhang
, Kejun Wang:
Spatiotemporal multi-scale bilateral motion network for gait recognition. 3412-3440 - Louiza Belkhiri-Brahmi, Samira Yessad, Fouzi Semchedine
:
Congestion control-based sink MOBility pattern for data gathering optimization in WSN. 3441-3479 - Wei Li, Yetong Gao, Lei Wang:
A multipopulation particle swarm optimization based on divergent guidance and knowledge transfer for multimodal multiobjective problems. 3480-3527 - Soroush Babaee Khobdeh, Mohammad Reza Yamaghani
, Siavash Khodaparast Sareshkeh:
Basketball action recognition based on the combination of YOLO and a deep fuzzy LSTM network. 3528-3553 - Rajesh Dwivedi
, Aruna Tiwari
, Neha Bharill, Milind B. Ratnaparkhe, Parul Mogre, Pranjal Gadge, Kethavath Jagadeesh:
A novel apache spark-based 14-dimensional scalable feature extraction approach for the clustering of genomics data. 3554-3588 - Quan Yuan, Shanshan Wang, Mai Hu, Liang Zeng
:
SLDChOA: a comprehensive and competitive multi-strategy-enhanced chimp algorithm for global optimization and engineering design. 3589-3643 - Runsheng Liu, Wencong Cai, Junyang Zhang, Xiaoling Wu, Lilin Yang, Kaiqing Luo:
CF-lines: a fusing contour features optimization method for line segment detector. 3644-3662 - Nan Gao, Bowei Yang, Peng Chen, Li Ping Qian:
A multi-stage recognizer for nested named entity with weakly labeled data. 3663-3693 - Samira Shirinabadi Farahani, Mohammad Reza Reshadinezhad, Seyed Erfan Fatemieh:
New design for error-resilient approximate multipliers used in image processing in CNTFET technology. 3694-3712 - A. Ahila, V. Prema, S. Ayyasamy, M. Sivasubramanian:
An enhanced deep learning model for high-speed classification of plant diseases with bioinspired algorithm. 3713-3737 - Sarra Cherbal, Abdelhak Zier, Sara Hebal, Lemia Louail, Boubakeur Annane:
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. 3738-3816 - Yaqian Tang, Baolei Cheng, Yan Wang, Yuejuan Han, Jia Yu, Jianxi Fan:
Connectivity and diagnosability of a class of recursive networks. 3817-3848 - Zhenghong Wang, Fanhua Yu, Dan Wang, Taihui Liu, Rongjun Hu:
Multi-threshold segmentation of breast cancer images based on improved dandelion optimization algorithm. 3849-3874 - Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai:
STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things. 3875-3901 - Djihad Arrar, Nadjet Kamel, Abdelaziz Lakhfif
:
A comprehensive survey of link prediction methods. 3902-3942 - Sultan Noman Qasem
:
A novel honey badger algorithm with multilayer perceptron for predicting COVID-19 time series data. 3943-3969 - Ismael Boureima, Manish Bhattarai, Maksim Ekin Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov
:
Distributed out-of-memory NMF on CPU/GPU architectures. 3970-3999 - Neha Bansal, Shelly Sachdeva, Lalit Kumar Awasthi
:
Schema generation for document stores using workload-driven approach. 4000-4048 - Subeen Leem, Jisong Oh, Jihoon Moon, Mucheol Kim, Seungmin Rho:
Enhancing multistep-ahead bike-sharing demand prediction with a two-stage online learning-based time-series model: insight from Seoul. 4049-4082 - Salih Berkan Aydemir:
Ideal solution candidate search for starling murmuration optimizer and its applications on global optimization and engineering problems. 4083-4156 - Rihab Abidi
, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos, Nabil Sahli
:
A study of mechanisms and approaches for IoV trust models requirements achievement. 4157-4201 - Xiaoyu Zheng, Dewang Chen, Zhiming Lin, Liping Zhuang, Wendi Zhao:
Method on generating massive virtual driving curves for high-speed trains of the Cross-Taiwan Strait Railway and its statistical analysis. 4202-4225 - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:
Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services. 4226-4247 - Chao Yin, Qin Fang, Hongyi Li, Yingjian Peng, Xiaogang Xu, Dan Tang:
An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing. 4248-4285 - Shwet Ketu, Pramod Kumar Mishra:
An intelligent hybrid classification model for heart disease detection using imbalanced electrocardiogram signals. 4286-4308 - Junjun Jiao, Zhisheng Chen, Tao Zhou:
Minimal Kapur cross-entropy-based image segmentation for distribution grid inspection using improved INFO optimization algorithm. 4309-4352 - Shengbin Liang, Fuqi Sun
, Haoran Sun, Tingting Chen, Wencai Du:
A medical text classification approach with ZEN and capsule network. 4353-4377 - Ashok Kumar Yadav, Karan Singh, Pramod Kumar Srivastava:
Probabilistic estimation of comprehensive utility based on user preference and network condition for network selection in future in HetNet. 4378-4400 - Yuan Zhou, Lei Xiang, Fan Liu, Haoran Duan
, Yang Long:
Dynamic visual-guided selection for zero-shot learning. 4401-4419 - P. Mathivanan
, Maran Ponnambalam
:
Correction to: Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 4420-4422
Volume 80, Number 4, March 2024
- Di Li, Lang Li, Yu Ou:
Side-channel analysis based on Siamese neural network. 4423-4450 - Hongwei Zhang, Shuaibo Liu, Chi Wang, Shuai Lu, Wenbo Xiong:
Color-patterned fabric defect detection algorithm based on triplet attention multi-scale U-shape denoising convolutional auto-encoder. 4451-4476 - K. Hemant Kumar Reddy, Rajat Shubhra Goswami, Diptendu Sinha Roy:
A deep learning-based smart service model for context-aware intelligent transportation system. 4477-4499 - Yanru Liu, Jiali Xu, Austin Lin Yee:
The analysis of Iris image acquisition and real-time detection system using convolutional neural network. 4500-4532 - Mehmet Akif Bülbül
:
Optimization of artificial neural network structure and hyperparameters in hybrid model by genetic algorithm: iOS-android application for breast cancer diagnosis/prediction. 4533-4553 - Masashi Kuwano, Mio Hosoe, Taku Moriyama:
Prediction of railroad user count using number of route searches via bivariate state-space modeling. 4554-4576 - Yuqin Song, Jitao Zhao, Chunliang Shang:
A multi-stage feature fusion defogging network based on the attention mechanism. 4577-4599 - Mahboubeh Afzali, Amin Mohammad Vali Samani, Hamid Reza Naji
:
An efficient resource allocation of IoT requests in hybrid fog-cloud environment. 4600-4624 - Shao Deng
, Shanzhu Xiao, Qiuqun Deng, Huanzhang Lu:
A hovering swarm particle swarm optimization algorithm based on node resource attributes for hardware/software partitioning. 4625-4647 - Anit Kumar Ghosal
, Amit Sardar, Dipanwita Roychowdhury:
Differential fault analysis attack-tolerant hardware implementation of AES. 4648-4681 - Min Tian, Qi Liu, Jingshan Pan, Ying Gou, Zanjun Zhang:
swPTS: an efficient parallel Thomas split algorithm for tridiagonal systems on Sunway manycore processors. 4682-4706 - Sadiqa Jafari, Yung Cheol Byun:
Accurate remaining useful life estimation of lithium-ion batteries in electric vehicles based on a measurable feature-based approach with explainable AI. 4707-4732 - Eht E. Sham
, Deo Prakash Vidyarthi:
A modified fuzzy similarity measure for trapezoidal fuzzy number with their applications. 4733-4759 - Rawaa Alatrash, Rojalina Priyadarshini
, Hadi Ezaldeen:
Collaborative filtering integrated fine-grained sentiment for hybrid recommender system. 4760-4807 - Ali Dabba, Abdelkamel Tari, Samy Meftali:
A novel grey wolf optimization algorithm based on geometric transformations for gene selection and cancer classification. 4808-4840 - Adeola Borode
, Peter A. Olubambi:
Optimisation of artificial intelligence models and response surface methodology for predicting viscosity and relative viscosity of GNP-alumina hybrid nanofluid: incorporating the effects of mixing ratio and temperature. 4841-4869 - Neetu Sharma
, Rajesh Rohilla:
A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management. 4870-4913 - Ruyi Cao, Wanghao Mo, Wendong Zhang:
MFMDet: multi-scale face mask detection using improved Cascade rcnn. 4914-4942 - Xiaoxiao Sun, Siqing Yang, Chenying Zhao, Dongjin Yu:
Design-time business process compliance assessment based on multi-granularity semantic information. 4943-4971 - Jingan Lu, Zhenfang Zhu, Kefeng Li, Shuai Gong, Hongli Pei, Wenling Wang:
Gtpsum: guided tensor product framework for abstractive summarization. 4972-4995 - Guifang Zhang, Hon-Cheng Wong:
Saliency-based dual-attention network for unsupervised video object segmentation. 4996-5010 - Mohamed Yassine Landolsi
, Lotfi Ben Romdhane, Lobna Hlaoua:
Hybrid medical named entity recognition using document structure and surrounding context. 5011-5041 - Yan Kang
, Xiaoshe Dong, Ziheng Wang, Heng Chen, Qiang Wang:
Parallel implementations of post-quantum leighton-Micali signature on multiple nodes. 5042-5072 - Siti Nuraishah Agos Jawaddi, Azlan Ismail, Muhammad Nur Haziq Mohammad Hatta, Anis Faqihah Kamarulzaman:
Insights into cloud autoscaling: a unique perspective through MDP and DTMC formal models. 5073-5107 - Shreyshi Shree, Chen Zhou, Masoud Barati:
Data protection in internet of medical things using blockchain and secret sharing method. 5108-5135 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang
, Peiying Zhang, Laith Abualigah
:
Load balancing strategy for SDN multi-controller clusters based on load prediction. 5136-5162 - Swati Gupta, Niraj Pratap Singh:
Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directions. 5163-5196 - Chunjing Xiao, Shenkai Lv, Wei Fan, W. H. Ip
:
Temporal-order association-based dynamic graph evolution for recommendation. 5197-5223 - N. Sheena
, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
EMCP: evolutionary multi-objective clustering protocol for prolonged lifetime of heterogeneous IoT networks. 5224-5254 - Ehsan Jafari, Ardeshir Dolati, Kamran Layeghi:
Object tracking using local structural information and energy minimization. 5255-5278 - Yinsheng Tong, Zuoyong Li, Hui Huang, Libin Gao
, Minghai Xu, Zhongyi Hu:
Research of spatial context convolutional neural networks for early diagnosis of Alzheimer's disease. 5279-5297 - Taymaz Akan
, Diego Oliva
, Ali-Reza Feizi-Derakhshi
, Amir-Reza Feizi-Derakhshi
, Marco Pérez-Cisneros
, Mohammad Alfrad Nobel Bhuiyan
:
Battle royale optimizer for multilevel image thresholding. 5298-5340 - Liqiang Song, Huaiguang Wang, Baojian Yang:
Hybrid compression scheme based on VMD optimization algorithm application to mechanical equipment monitoring. 5341-5362 - Yue Zhao, Yuan Yao, Tong He, Xingshe Zhou, Bo Shen:
Sl4u: a scenario description language for unmanned swarm. 5363-5389 - Jingbo Sun, Weiming Peng, Tianbao Song, Haitao Liu, Shuqin Zhu, Jihua Song:
Enhanced cross-prompt trait scoring via syntactic feature fusion and contrastive learning. 5390-5407 - Ru Sun, Ting Yang:
Hybrid parameter-based PSO flexible needle percutaneous puncture path planning. 5408-5427 - Zhiyi Yu
, Hong Li, Jialin Feng:
Contrastive learning for unsupervised sentence embeddings using negative samples with diminished semantics. 5428-5445 - Jin Xu, Huiqun Yu, Guisheng Fan, Jiayin Zhang
, Zengpeng Li
, Qifeng Tang:
Adaptive edge service deployment in burst load scenarios using deep reinforcement learning. 5446-5471 - Jing-Wei Liu
, Ming-Hua Hsu, Chun-Liang Lai, Sheng-K. Wu:
Using video analysis and artificial neural network to explore association rules and influence scenarios in elite table tennis matches. 5472-5489 - Chang Jie, Chen Jiming, Shao Ying, Yanchun Tong, Haodong Ren:
A pyramid GNN model for CXR-based COVID-19 classification. 5490-5508 - Fei Yang, Huyin Zhang, Shiming Tao, Xiying Fan:
Simple hierarchical PageRank graph neural networks. 5509-5539 - Prashant Vaish, Niharika Anand, Vishal Krishna Singh
, Gaurav Sharma:
Applications hosting over cloud-assisted IOT: a productivity model and method defining accessibility of data security. 5540-5564 - Raghuraj Singh
, Kuldeep Kumar
:
Hybrid optimization-enabled deep Q network for fault prediction in service-oriented architecture. 5565-5592 - Zixiang Nie, Jin Li, Fenghui Duan, Yueming Lu:
A collaborative ledger storing model for lightweight blockchains based on Chord Ring. 5593-5615 - Zhen Li, Zining Cao, Chao Xing:
Performance modeling and quantitative evaluation for cyber-physical systems based on LTS. 5616-5653 - Weibei Fan, Xuanli Liu, Mengjie Lv:
Hamiltonian cycle embedding with fault-tolerant edges and adaptive diagnosis in half hypercube. 5654-5674 - Azad Johari, Azlan Ismail:
PMLAP: a methodology for annotating SSML elements into HTML5. 5675-5707 - Viswanatha Reddy G, B. S. N. V. Chaitanya, Prathyush P, Sumanth M, Mrinalini C, Dileep Kumar P, Snehasis Mukherjee:
DFW-PP: dynamic feature weighting-based popularity prediction for social media content. 5708-5730 - Ismael Boureima, Manish Bhattarai, Maksim Ekin Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov
:
Correction to: Distributed out-of-memory NMF on CPU/GPU architectures. 5731-5732
Volume 80, Number 5, March 2024
- Zhaojun Wang
, Xindong You, Xueqiang Lv:
A relation enhanced model for temporal knowledge graph alignment. 5733-5755 - Samaher Al-Janabi
, Ghada Mohammed
:
An intelligent returned energy model of cell and grid using a gain sharing knowledge enhanced long short-term memory neural network. 5756-5814 - Peng Li, Cheng Che, Rui Hou:
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning. 5815-5831 - Kangjin Huang, Yonggang Che, Chuanfu Xu, Zhe Dai, Jian Zhang:
Improving CUDA performance of an unstructured high-order CFD application under OP2 framework. 5832-5846 - Yueting Xiang, Yangfen Chen, Wenjuan Fan, Hui Ye:
Enhancing computer-aided translation system with BiLSTM and convolutional neural network using a knowledge graph approach. 5847-5869 - Inam Ullah, Asra Noor, Shah Nazir, Farhad Ali, Yazeed Yasin Ghadi
, Nida Aslam:
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. 5870-5899 - S. Muthulakshmi, R. Chitra:
Interplanetary file system and blockchain for secured smart grid networks. 5900-5922 - Abbas Rammal, Kenneth Ezukwoke, Anis Hoayek, Mireille Batton-Hubert:
Unsupervised approach for an optimal representation of the latent space of a failure analysis dataset. 5923-5949 - S. Nikkath Bushra
, Nalini Subramanian, G. Shobana
, S. Radhika:
A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment. 5950-5978 - Sait Alp
, Rahim Dehkharghani, Taymaz Akan, Mohammad A. N. Bhuiyan:
MOBRO: multi-objective battle royale optimizer. 5979-6016 - Shilpi
, Arvind Kumar:
Application of Jaya algorithm for solving localization problem in a distributed Wireless Sensor Network. 6017-6041 - Rui-Yun Chang, Xiufang Feng, Chengye Zou, Hao Zhang:
Multimodal medical image protection algorithm based on 3D-CICCM and Fresnel transform. 6042-6067 - Fanfan Li:
Chord-based music generation using long short-term memory neural networks in the context of artificial intelligence. 6068-6092 - Xiaoxuan Ma, Boyang Sun, Weifeng Liu
, Dong Sui, Sihan Shan, Jing Chen, Zhaofeng Tian:
Tnseg: adversarial networks with multi-scale joint loss for thyroid nodule segmentation. 6093-6118 - Hongjie Geng, Mingming Zhou:
Novel post-photographic technique based on deep convolutional neural network and blockchain technology. 6119-6139 - Jingwen Xiong, Wenke Zang
, Yuzhen Zhao, Xiyu Liu:
Density peaks clustering algorithm with connected local density and punished relative distance. 6140-6168 - Huan Liu, Jian Wu, Rui He:
IDPNet: a light-weight network and its variants for human pose estimation. 6169-6191 - Qianqiu Wang, Ge Nong, Wenbo Wu:
Linear structure index for network-constrained moving objects. 6192-6220 - Tianhua Chen, Yanyue Li, Qinghua Qiao:
Fine-grained bird image classification based on counterfactual method of vision transformer model. 6221-6239 - Jubin Wang, Yuan Zhuang, Yunhui Zeng
:
A transmission optimization method for MPI communications. 6240-6263 - Ahmed N. Bakry
, Almohammady S. Alsharkawy
, Mohamed S. Farag
, Kamal R. Raslan:
Automatic suppression of false positive alerts in anti-money laundering systems using machine learning. 6264-6284 - Yifei Sun, Jigang Wu, Yalan Wu, Long Chen, Weijun Sun:
Efficient approaches for task offloading in point-of-interest based vehicular fog computing. 6285-6310 - Juan Fang, Zhichao Wei, Yaqi Liu, Yumin Hou:
TB-TBP: a task-based adaptive routing algorithm for network-on-chip in heterogenous CPU-GPU architectures. 6311-6335 - Huarui Wu, Chang Liu, Chunjiang Zhao:
Personalized agricultural knowledge services: a framework for privacy-protected user portraits and efficient recommendation. 6336-6355 - Ali Abbas, Raza Hasan
:
A multi-attribute-based data forwarding scheme for delay tolerant networks. 6356-6381 - Ali Asghari
, Hossein Azgomi, Ali Abbas Zoraghchian, Abbas Barzegarinezhad
:
Energy-aware server placement in mobile edge computing using trees social relations optimization algorithm. 6382-6410 - Neeraj Kumar Shukla
, Abdulilah M. Mayet, M. Ram Kumar Raja
, Muneer Parayangat, Mohammed Usman, Rajesh Verma, Javed Khan Bhutto:
A unified test data volume compression scheme for circular scan architecture using hosted cuckoo optimization. 6411-6434 - Sumera Naz, Aqsa Shafiq, Maheen Abbas:
An approach for 2-tuple linguistic q-rung orthopair fuzzy MAGDM for the evaluation of historical sites with power Heronian mean. 6435-6485 - Muhanad Mohammed Kadum, Xiaoheng Deng:
Allocating energy-objective aware workflow in distributed edge micro data centres. 6486-6521 - Haiyan Li, Shaolin Peng, Xun Lang, Shuhua Ye, Hongsong Li:
Spatial-guided informative semantic joint transformer for single-image deraining. 6522-6551 - Mahnaz Khojand, Kambiz Majidzadeh, Mohammad Masdari, Yousef Farhang:
Controller placement in SDN using game theory and a discrete hybrid metaheuristic algorithm. 6552-6600 - Marzieh Varposhti:
Distributed homology-based sensor selection and scheduling in wireless sensor networks. 6601-6621 - Hind Idrissi, Paolo Palmieri:
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems. 6622-6660 - Yibo Huang, Bo Wang, Xiang-rong Pu, Yian Li, Qiuyu Zhang:
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. 6661-6698 - Zahra Valadanzoj
, Hassan Daryanavard
, Abbas Harifi
:
High-speed YOLOv4-tiny hardware accelerator for self-driving automotive. 6699-6724 - Hui Ma:
Development of a smart tourism service system based on the Internet of Things and machine learning. 6725-6745 - Ali Jameel Hashim
, M. A. Balafar, Jafar Tanha:
NEAE: NeuroEvolution AutoEncoder for anomaly detection in internet traffic data. 6746-6777 - Shiqiang Zhang, Dongzhi Cao:
A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT. 6778-6808 - Saeid Ghafouri, Seyed Hossein Khasteh, Seyed Omid Azarkasb:
Influence maximization (IM) in complex networks with limited visibility using statistical methods. 6809-6854 - Naveen Chandra Gowda, Sunilkumar S. Manvi, A. Bharathi Malakreddy, Rajkumar Buyya:
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments. 6855-6890 - Redouane Benabdallah Benarmas, Kadda Beghdad Bey:
A deep learning-based framework for road traffic prediction. 6891-6916 - Yuqing Cheng, Zhiying Cao, Xiuguo Zhang, Qilei Cao, Dezhen Zhang:
Multi objective dynamic task scheduling optimization algorithm based on deep reinforcement learning. 6917-6945 - Marzieh Varposhti:
Distributed homology-based algorithm for solving Set k-Cover problem in heterogeneous directional sensor networks. 6946-6964 - Yong Niu, Xing Xing, Zhichun Jia, Mindong Xin, Junye Xing:
SMIGNN: social recommendation with multi-intention knowledge distillation based on graph neural network. 6965-6988 - Mukesh Patidar, Ankit Jain, Keshav Patidar, Surendra Kumar Shukla
, Ali H. Majeed, Namit Gupta, Nilesh Patidar:
An ultra-dense and cost-efficient coplanar RAM cell design in quantum-dot cellular automata technology. 6989-7027 - Nadia Nedjah, Sérgio de Souza Raposo, Luiza de Macedo Mourelle:
Dedicated hardware design for efficient quantum computations using classical logic gates. 7028-7070 - Kun Yang, Lin Jiang, Rui Shan, Kangle Li, Xinyue Cui:
RMSRM: real-time monitoring-based self-reconfiguration mechanism in reconfigurable PE array. 7071-7101 - Donaldo Garcia
, José de Jesús Rubio, Humberto Sossa, Jaime Pacheco, Guadalupe Juliana Gutierrez, Carlos Aguilar Ibáñez:
Electricity consumption modeling by a chaotic convolutional radial basis function network. 7102-7119 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang
, Peiying Zhang, Laith Abualigah
:
Correction to: Load balancing strategy for SDN multi-controller clusters based on load prediction. 7120-7121
Volume 80, Number 6, April 2024
- Junfeng Wang:
The use of fuzzy authentication integrated with convolutional neural networks in digital content protection. 7123-7146 - Xiaohong Wang, Xu Zhao, Kun Xu, Shihao Xu:
Multi-scale adaptive atrous graph convolution for point cloud analysis. 7147-7170 - Lisheng Wu, Xiaoming You, Sheng Liu:
Heterogeneous ant colony algorithm based on selective evolution mechanism and game strategy. 7171-7206 - Mohammad Hassan Almaspoor
, Ali A. Safaei, Afshin Salajegheh, Behrouz Minaei-Bidgoli:
Distributed independent vector machine for big data classification problems. 7207-7244 - Xinfeng He
, Riyang Li:
Malware detection for container runtime based on virtual machine introspection. 7245-7268 - Kai Song, Huaqiong Ma, Haiming Zhang, Liping Yan:
Research of ReLU output device in ternary optical computer based on parallel fully connected layer. 7269-7292 - Yuqin Song, Chunliang Shang, Jitao Zhao:
LBCNet: A lightweight bilateral cascaded feature fusion network for real-time semantic segmentation. 7293-7315 - Saif Ur Rehman Khan
, Ming Zhao, Sohaib Asif
, Xuehan Chen, Yusen Zhu:
GLNET: global-local CNN's-based informed model for detection of breast cancer categories from histopathological slides. 7316-7348 - Chenghao Wang
, Zhongqiang Luo, Ziyuan Qi:
Transformer oil leakage detection with sampling-WIoU module. 7349-7368 - Yen-Liang Chen, Chia-Chi Wu, Po-Cheng Shih:
Using personalized next session to improve session-based recommender systems. 7369-7398 - Jing Zhang, Zuanyang Zeng, Kunliang Si, Xiucai Ye:
Entropy-driven differential privacy protection scheme based on social graphlet attributes. 7399-7432 - Blessy Antony, S. Revathy:
A novel model for Sybil attack detection in online social network using optimal three-stream double attention network. 7433-7482 - Jun Shi, Peiyi Zhang, Sihan Du, Wanyong Liang, Weifeng Cao, Qingbo Li, Hechao Hou:
Chipping value prediction for dicing saw based on sparrow search algorithm and neural networks. 7483-7506 - Ashkan Emami
, Ghazaleh Keshavarz Kalhori, Sheyda Mirzakhani, Mohammad Ali Akhaee:
A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach. 7507-7556 - Dan Li, Wenbo Shi, Ning Lu, Sang-Su Lee, Sokjoon Lee:
ARdetector: android ransomware detection framework. 7557-7584 - Yuanxiang Wang, Zhen Xu, Lei Yang:
Plus-profile energy harvested prediction and adaptive energy management for solar-powered wireless sensor networks. 7585-7603 - Chao Zhu, Benshun Yi, Laigan Luo:
Triple-channel graph attention network for improving aspect-level sentiment analysis. 7604-7623 - You-Shyang Chen, Jieh-Ren Chang, Yaswanth P. K. Thotakura, Ashraf Mohammad:
A hybrid four-stage detection model to pre-identify the sustainable manufacturing process of Li-ion battery pack. 7624-7661 - Yaonan Guan, Yunwen Xu, Yugeng Xi, Dewei Li:
Variational auto encoder fused with Gaussian process for unsupervised anomaly detection. 7662-7690 - Niloofar Zahedy, Behrang Barekatain
, Alfonso Ariza-Quintana:
RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm. 7691-7749 - Peyman Shobeiri, Mehdi Akbarian Rastaghi, Saeid Abrishami, Behnam Shobiri:
PCP-ACO: a hybrid deadline-constrained workflow scheduling algorithm for cloud environment. 7750-7780 - Ature Angbera
, Huah Yong Chan:
An adaptive XGBoost-based optimized sliding window for concept drift handling in non-stationary spatiotemporal data streams classifications. 7781-7811 - Safdar Rostami, Ali Broumandnia
, Ahmad Khademzadeh:
An energy-efficient task scheduling method for heterogeneous cloud computing systems using capuchin search and inverted ant colony optimization algorithm. 7812-7848 - Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz
:
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model. 7849-7875 - Bakht Sher Ali
, Inam Ullah, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi
, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam:
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. 7876-7905 - A. Moradikashkooli, H. Haj Seyyed Javadi, Sam Jabbehdari:
An efficient optimization algorithm for nonlinear 2D fractional optimal control problems. 7906-7930 - Yang Liu:
Depression clinical detection model based on social media: a federated deep learning approach. 7931-7954 - Shweta Mittal, Mohona Ghosh:
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication. 7955-7992 - Tajinder Singh
, Madhu Kumari, Daya Sagar Gupta:
Rumor identification and diffusion impact analysis in real-time text stream using deep learning. 7993-8037 - Jingjing Han, Guangqi Yang, Hongyang Wei, Weijun Gong, Yurong Qian
:
ST-YOLOX: a lightweight and accurate object detection network based on Swin Transformer. 8038-8059 - Xiangyu Deng
, Xikai Huang, Haiyue Yu:
Frequency-domain characteristic analysis of PCNN. 8060-8093 - Ones Sidhom, Haythem Ghazouani
, Walid Barhoumi
:
Three-phases hybrid feature selection for facial expression recognition. 8094-8128 - Khadijeh Moeini Roodbali, Ebrahim Abiri, Kourosh Hassanli:
Highly efficient low-area gate-diffusion-input-based approximate full adders for image processing computing. 8129-8155 - Ayesha Kanwal, Kashif Javed
, Sara Ali, Saddaf Rubab
, Muhammad Attique Khan, Areej Alasiry, Mehrez Marzougui
, Mohammad Shabaz
:
A hybrid framework for detection of autism using ConvNeXt-T and embedding clusters. 8156-8178 - Ali Khalouta:
A new decomposition transform method for solving nonlinear fractional logistic differential equation. 8179-8201 - Nilesh Kumar Verma, K. Jairam Naik:
Optimized fog community framework with advanced genetic algorithm for enhanced performance dynamics. 8202-8235 - Reza Feizabadi, Mehri Bagherian, Hamidreza Vaziri, Maziar Salahi
:
PLEACH: a new heuristic algorithm for pure parsimony haplotyping problem. 8236-8258 - Davide Ferraris, M. Carmen Fernández Gago, Rodrigo Roman, Javier López:
A survey on IoT trust model frameworks. 8259-8296 - Yiming Shu, Yiru Dai:
An effective link prediction method for industrial knowledge graphs by incorporating entity description and neighborhood structure information. 8297-8329 - Faezeh Rohani
, Kamrad Khoshhal Roudposhti
, Hamidreza Taheri, Ali Mashhadi, Andreas Mueller:
Extracting gait and balance pattern features from skeleton data to diagnose attention deficit/hyperactivity disorder in children. 8330-8356 - J. Jayachitra, K. Suganya Devi, S. V. Manisekaran, Satish Kumar Satti
:
Terahertz video-based hidden object detection using YOLOv5m and mutation-enabled salp swarm algorithm for enhanced accuracy and faster recognition. 8357-8382 - Minhaz Mahmud, Md. Soharab Hossain Sohan, Saha Reno
, M. A. Baten Sikder, Fakir Sharif Hossain:
Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology. 8383-8405 - Arti Gupta
, Vijay Kumar Chaurasiya:
Integrating Healthcare 4.0 and WBAN: efficient redundancy reduction and adaptive packet scheduling using AR-DRL. 8406-8433 - Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari:
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare. 8434-8468 - Shibao Li, Chenxu Ma, Yunwu Zhang
, Longfei Li, Chengzhi Wang, Xuerong Cui, Jianhang Liu:
Attention-based variable-size feature compression module for edge inference. 8469-8484 - Joonhyouk Jang, Minho Park, Jiman Hong:
Hybrid booting with incremental hibernation for the baseboard management controllers. 8485-8504 - Kaiyi Deng, Guanen Wang:
Online mode development of Korean art learning in the post-epidemic era based on artificial intelligence and deep learning. 8505-8528 - Wei Zhang, Ping He, Chuntian Qin, Fan Yang, Ying Liu:
A graph attention network-based model for anomaly detection in multivariate time series. 8529-8549 - Yi Yang, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
Correction to: A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 8550 - Pooya Tavallali, Peyman Tavallali, Mukesh Singhal:
Correction: K-means tree: an optimal clustering tree for unsupervised learning. 8551
Volume 80, Number 7, May 2024
- Bowen Guan, Chencheng Zhao, Xianghui Yuan, Jun Long
, Xiang Li:
Price prediction in China stock market: an integrated method based on time series clustering and image feature extraction. 8553-8591 - Hathem Khelil, Mahmoud Brahimi:
Toward an efficient web service composition based on an improved BTLBO algorithm. 8592-8613 - Xiaowen Sun, Zhenfang Zhu, Jiangtao Qi, Zhen Zhao, Hongli Pei:
Affective Commonsense Knowledge Enhanced Dependency Graph for aspect sentiment triplet extraction. 8614-8636 - Chao Shao, Hairui Zhang:
Climate change characteristics and population health impact factors using deep neural network and hyperautomation mechanism. 8637-8667 - Khushboo Gupta, Vinod Kumar:
KMS-AMI: an efficient and scalable key management scheme for secure two-way communications in advanced metering infrastructure of smart grid. 8668-8701 - Xin-Duo Liu, Weijia He, Ming-Lin Yang, Xin-Qing Sheng:
Massive parallelization of multilevel fast multipole algorithm for 3-D electromagnetic scattering problems on SW26010 many-core cluster. 8702-8718 - José de Jesús Rubio, Marco Antonio Islas
, Donaldo Garcia
, Jaime Pacheco, Alejandro Zacarias
, Carlos Aguilar Ibáñez:
Optimized radial basis function network for the fatigue driving modeling. 8719-8741 - Youlin Li:
Constructing the intelligent expressway traffic monitoring system using the internet of things and inspection robot. 8742-8766 - Jie Zhang, Jingshun Bi, Jinyou Hou, Qinggang Xie:
Dynamical analysis, circuit realization, and applications of 4D hyperchaotic systems with bursty oscillations and infinite attractor coexistence. 8767-8800 - Yumeng Yang, Li Wang, Zizhen Cheng:
Density peaks algorithm based on information entropy and merging strategy for power load curve clustering. 8801-8832 - Liwei Yang, Boyu Jia, Xue Liang, Fang Wang, Xiangyuan Peng:
Visible light communication and WiFi hybrid networks based on dynamic resource allocation algorithm. 8833-8856 - Xuzhen Deng, Dengxu He, Liangdong Qu:
A novel hybrid algorithm based on arithmetic optimization algorithm and particle swarm optimization for global optimization problems. 8857-8897 - Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan:
Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker. 8898-8932 - Yue Miao, Siyuan Tang, Zhuqiang Zhang, Jukun Song, Zhi Liu, Qiang Chen, Miao Zhang:
Application of deep learning and XGBoost in predicting pathological staging of breast cancer MR images. 8933-8953 - Mersedeh Sadeghi, Alessio Carenini, Óscar Corcho, Matteo Rossi, Riccardo Santoro, Andreas Vogelsang:
Interoperability of heterogeneous Systems of Systems: from requirements to a reference architecture. 8954-8987 - Negar Abbasi, Mohammadreza Soltanaghaei, Farsad Zamani Boroujeni:
Anomaly detection in IOT edge computing using deep learning and instance-level horizontal reduction. 8988-9018 - Manzoor Ansari
, Mansaf Alam:
A novel hybrid time-series approach for IoT-cloud-enabled environment monitoring. 9019-9053 - Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Simulation-based uprighting of a capsized ship in wave-induced environments. 9054-9072 - Fan Ouyang
, Bo Shen:
A mutual mean teacher framework for cross-domain aspect-based sentiment analysis. 9073-9095 - Yu'e Lin, Houguo Li, Xingzhu Liang
, Mengfan Li, Huilin Liu:
AAR:Attention Remodulation for Weakly Supervised Semantic Segmentation. 9096-9114 - Junhao Wang, Jiarong Liang, Qingnian Li:
On the construction of quality extended virtual backbones in wireless sensor networks using cooperative communication. 9115-9139 - Juanjuan Ren, Siti Salwa Salleh:
Green urban logistics path planning design based on physical network system in the context of artificial intelligence. 9140-9161 - Ke Hou, Jianping Sun
, Mingcheng Guo, Ming Pang
, Na Wang:
TentISSA-BPNN: a novel evaluation model for cloud service providers for petroleum enterprises. 9162-9193 - Fangyin Zhu, Wei Xu, Duanyang Liu, Haiyan Shi:
TSANET: transportation mode recognition model with global and local spatiotemporal features. 9194-9219 - Archana Bomnale, Avinash More:
Node utilization index-based data routing and aggregation protocol for energy-efficient wireless sensor networks. 9220-9252 - Apurva Kumari
, Subhendu Kumar Sahoo:
An effective and robust single-image dehazing method based on gamma correction and adaptive Gaussian notch filtering. 9253-9276 - Xiaolong Wang, Ling Cai, Yunhao Xu:
Creation mechanism of new media art combining artificial intelligence and internet of things technology in a metaverse environment. 9277-9297 - Marcelo Tosini, Martín Vázquez, Lucas Leiva
:
Analysis and efficient implementation of IEEE-754 decimal floating point adders/subtractors in FPGAs for DPD and BID encoding. 9298-9326 - Lina She, Hongfang Gong, Siyu Zhang:
An interactive multi-head self-attention capsule network model for aspect sentiment classification. 9327-9352 - Yi'an Zhu
, Jie Chen, Lian Li:
A critical path task scheduling algorithm based on sequential failure factor. 9353-9383 - Mirsaeid Hosseini Shirvani:
A survey study on task scheduling schemes for workflow executions in cloud computing environment: classification and challenges. 9384-9437 - S. Deepanjali, S. K. Noor Mahammad:
A twofold bio-inspired system for mitigating SEUs in the controllers of digital system deployed on FPGA. 9438-9470 - Tao Tang, Kai Lu, Lin Peng, Yingbo Cui, Jianbin Fang, Chun Huang, Ruibo Wang, Canqun Yang, Yifei Guo:
SNCL: a supernode OpenCL implementation for hybrid computing arrays. 9471-9493 - Nadim Elsakaan
, Kamal Amroun
:
A novel privacy-aware global infrastructure for ecological footprint calculator based on the Internet of things and blockchain. 9494-9531 - Martha Dais Ferreira, Zahra Sadeghi, Stan Matwin:
Exploring autoregression patterns for automatic vessel type classification. 9532-9553 - Sheng Wang, Shiping Chen, Yumei Shi:
Utilization-prediction-aware energy optimization approach for heterogeneous GPU clusters. 9554-9578 - Habib Ullah Khan
, Waseem Afsar, Shah Nazir, Asra Noor, Mahwish Kundi, Mashael S. Maashi
, Haya Mesfer Alshahrani:
Revolutionizing software developmental processes by utilizing continuous software approaches. 9579-9608 - Noshin A. Sabuwala, Rohin D. Daruwala:
An approach to enhance the security of unmanned aerial vehicles (UAVs). 9609-9639 - Chenguang Fan, Muyao Li, Wenzhong Liu, Jingjing Cheng:
FPGA-based downhole real-time inversion of petrophysical information for NMR-LWD tools with periodic thermal management. 9640-9662 - Dayasagar Chowdary S, M. S. Sudhakar:
Linear programming-based multi-objective floorplanning optimization for system-on-chip. 9663-9686 - Mohammadreza Sheikhattar
, Alireza Mansouri
:
A Topic Mapping-based framework to analyze textual risk reports from social media big data contents. 9687-9712 - Zhiheng Zhou, Xiaomei Huang, Naixue Xiong, Guoqiong Liao, Xiaobin Deng:
A self-attention model with contrastive learning for online group recommendation in event-based social networks. 9713-9741 - Higinio Mora, María Teresa Signes Pont, Francisco Antonio Pujol López, Jerónimo Mora Pascual, Juan Manuel García Chamizo:
Advancements in number representation for high-precision computing. 9742-9761 - Sanjib Roy, Ayan Kumar Das:
Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication. 9762-9811 - JongHyuk Kim, Yong Moon, Hoon Ko:
Correlation-based advanced feature analysis for wireless sensor networks. 9812-9828 - Hyunjun Kim, Hwansoo Han:
GPU thread throttling for page-level thrashing reduction via static analysis. 9829-9847 - Shahzadi Bano, Weimei Zhi, Baozhi Qiu, Muhammad Raza, Nabila Sehito
, Mian Muhammad Kamal
, Ghadah Aldehim, Nuha Alruwais:
Self-paced ensemble and big data identification: a classification of substantial imbalance computational analysis. 9848-9869 - Yinsheng Chen
, Jiahao Li, Kun Sun, Ying Zhang:
A lightweight early forest fire and smoke detection method. 9870-9893 - Qingchun Bai, Mengmeng Tang, Yang Song, Jun Xiao:
Extracting entity and relationship interactions from danmaku-video comments using a neural bootstrapping framework. 9894-9916 - Weihong Fu, Haoyi Li:
An improved phase gradient autofocus algorithm for ISAR phase autofocus problem. 9917-9934 - Yi Qing
, Xiangyu Liu
, Yanhui Du:
Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks. 9935-9960 - Yu-Wei Chan, Endah Kristiani, Halim Fathoni, Chien-Yi Chen, Chao-Tung Yang:
A smart edge computing infrastructure for air quality monitoring using LPWAN and MQTT technologies. 9961-9985 - Praveen Shukla
, C. Rama Krishna, Nilesh Vishwasrao Patil:
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review. 9986-10043 - Iman Kadhum Abbood, Ali Kadhum Idrees:
Data reduction techniques for wireless multimedia sensor networks: a systematic literature review. 10044-10089 - Xin Zhong, Nan Wang:
Ensemble learning method based on CNN for class imbalanced data. 10090-10121 - Sapna Juneja, Ali Nauman
, Mudita Uppal
, Deepali Gupta
, Roobaea Alroobaea
, Bahodir Muminov
, Yuning Tao
:
Machine learning-based defect prediction model using multilayer perceptron algorithm for escalating the reliability of the software. 10122-10147 - ZhongGui Pei:
Framework design based on data-driven for evaluating the efficiency of group collaboration in scientific research teams. 10148-10171 - Xin-miao Chen, Shi Wang, Yong-jin Ye, Yong-zheng Wu, Bo Jiang:
BQA: a high-performance quantum circuits scheduling strategy based on heuristic search. 10172-10189 - Umair Khan
, Muazzam Maqsood, Saira Andleeb Gillani, Mehr Yahya Durrani, Irfan Mehmood, Sanghyun Seo
:
Correction to: A deep learning-based framework for accurate identification and crop estimation of olive trees. 10190 - Bowen Guan, Chencheng Zhao, Xianghui Yuan, Jun Long, Xiang Li:
Correction to: Price prediction in China stock market: an integrated method based on time series clustering and image feature extraction. 10191 - Retraction Note: Encryption scheme with mixed homomorphic signature based on message authentication for digital image. 10192
- Retraction Note: Fuzzy clustering-based skyline query preprocessing algorithm for large-scale flow data analysis. 10193
- Retraction Note: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. 10194-10195
Volume 80, Number 8, May 2024
- Chaozhi Cai, Xiaoyu Guo, Yingfang Xue, Jianhua Ren:
Structure damage diagnosis of bleacher based on DSKNet model. 10197-10222 - G. Jagadeesh, J. Gitanjali, J. Vellingiri, M. Pounambal, E. Sathiyamoorthy, Celestine Iwendi
:
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment. 10223-10254 - Abdulrahman Alahmadi, Haroon Ahmed Khan
, Ghufran Shafiq, Junaid Ahmed, Bakhtiar Ali
, Muhammad Awais Javed, Mohammad Zubair Khan
, Rayan Hamza Alsisi, Ahmed H. Alahmadi:
A privacy-preserved IoMT-based mental stress detection framework with federated learning. 10255-10274 - Ruizhong Du, Jingya Wang, Yan Gao:
Computing offloading and resource scheduling based on DDPG in ultra-dense edge computing networks. 10275-10300 - Ramesh Chandra Sahoo, Tapas Kumar, Poonam Tanwar, Jyoti Pruthi, Sanjay Singh
:
An efficient meta-heuristic algorithm based on water flow optimizer for data clustering. 10301-10326 - Yang Liu:
Depression detection via a Chinese social media platform: a novel causal relation-aware deep learning approach. 10327-10356 - Hongxi Liu, Mingzu Zhang, Weihua Yang:
On modified l-embedded edge-connectivity of enhanced hypercubes. 10357-10369 - Jianxing Zheng, Sen Chen, Feng Cao, Furong Peng, Mingqing Huang:
Explainable recommendation based on fusion representation of multi-type feature embedding. 10370-10393 - Rounak Saha, Anurag Satpathy, Sourav Kanti Addya:
FASE: fast deployment for dependent applications in serverless environments. 10394-10417 - Yuting Tan, Junfeng Zhou, Xinqi Rong, Ming Du, Caiyun Qi:
Efficient computation of maximum weighted independent sets on weighted dynamic graph. 10418-10443 - Jing Long, Cuiting Luo, Ruxin Chen, Jianping Yu, Kuan-Ching Li:
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection. 10444-10468 - Haifeng Yu, Lei Cai, Hong Min
, Xin Su:
Advancing medical data classification through federated learning and blockchain incentive mechanism: implications for modern software systems and applications. 10469-10484 - Ruizhong Du, Bowen Cao, Yan Gao:
Collaborative framework for UAVs-assisted mobile edge computing: a proximity policy optimization approach. 10485-10510 - Gopi Krishna Jagarlamudi
, Abbas Yazdinejad, Reza M. Parizi, Seyedamin Pouriyeh:
Exploring privacy measurement in federated learning. 10511-10551 - Lucia Pons, Salvador Petit, Julio Pons
, María Engracia Gómez, Julio Sahuquillo:
A modular approach to build a hardware testbed for cloud resource management research. 10552-10583 - Mingyang Song, Chunlin Li, Youlong Luo:
A pricing strategy for federated learning in UAV-enabled MEC. 10584-10609 - Jianjiang Li, Jiabi Liang, Wei Xue, Zhengding Hu, Lin Li, Jinliang Shi:
Toward efficient structured-grid triangular solver on sunway many-core processors. 10610-10636 - Jixian Zhang
, Hao Sun, Weidong Li
:
Lowest revenue limit-based truthful auction mechanism for cloud resource allocation. 10637-10666 - Yun Fen Yong, Chee Keong Tan, Ian K. T. Tan
, Su Wei Tan:
C-VoNNI: a precise fingerprint construction for indoor positioning systems using natural neighbor methods with clustering-based Voronoi diagrams. 10667-10694 - Wangxing Chen
, Haifeng Sang
, Jinyu Wang, Zishan Zhao:
STIGCN: spatial-temporal interaction-aware graph convolution network for pedestrian trajectory prediction. 10695-10719 - Fatemeh Fathinezhad, Peyman Adibi, Bijan Shoushtarian, Jocelyn Chanussot:
Local and soft feature selection for value function approximation in batch reinforcement learning for robot navigation. 10720-10745 - Rohit Kundu, Soumitri Chattopadhyay, Sayan Nag, Mario A. Navarro
, Diego Oliva
:
Prism refraction search: a novel physics-based metaheuristic algorithm. 10746-10795 - Hamid Reza Naji, Soodeh Shadravan, Hossien Mousa Jafarabadi, Hossien Momeni:
Parallel design of SFO optimization algorithm based on FPGA. 10796-10817 - Bita Jafari, Peyman Bayat:
Performance improvement of distributed cache using middleware session. 10818-10862 - Mahjoubeh Tajgardan, Habib Izadkhah, Shahriar Lotfi:
IAFCO: an intelligent agent-based framework for combinatorial optimization. 10863-10930 - Hanyu Wang, Ying Li:
Limited environmental information path planning based on 3D point cloud reconstruction. 10931-10958 - Xiang Chen
, Yingjie Yang, Jie Sun
, Yelin Deng, Yinnan Yuan:
A novel time series forecasting model for capacity degradation path prediction of lithium-ion battery pack. 10959-10984 - Saeed Sharifian Moghimi Moghaddam
, Vahid Rashtchi, Ali Azarpeyvand:
Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation. 10985-11013 - Chanchal Ahlawat
, Rajalakshmi Krishnamurthi
:
HCDQN-ORA: a novel hybrid clustering and deep Q-network technique for dynamic user location-based optimal resource allocation in a fog environment. 11014-11065 - Mojtaba Maleknejad, Fazel Sharifi, Hojjat Sharifi:
A fast and energy-efficient hybrid 4-2 compressor for multiplication in nanotechnology. 11066-11088 - Ziwei Wang, Bin Li, Liang Deng, Jie Cao, Jiantao Wang, Fengshun Lu, Zhaolin Fan, Xiong Jiang:
Massively parallel simulations of multi-stage compressors on Sunway TaihuLight. 11089-11128 - Chuanjun Zhao, Xuzhuang Sun, Rong Feng:
Multi-strategy text data augmentation for enhanced aspect-based sentiment analysis in resource-limited scenarios. 11129-11148 - Senthil Kumar Chandrasekaran
, Vijay Anand Rajasekaran
:
Energy-efficient cluster head using modified fuzzy logic with WOA and path selection using enhanced CSO in IoT-enabled smart agriculture systems. 11149-11190 - Mohammad Sadeghzadeh, Reza Mohammadi, Mohammad Nassiri:
An intelligent real-time workloads allocation in IoT-fog networks. 11191-11213 - Farzaneh Asadzadeh, Akram Reza, Midia Reshadi, Ahmad Khademzadeh:
Thermal-aware application mapping using genetic and fuzzy logic techniques for minimizing temperature in three-dimensional network-on-chip. 11214-11240 - Shoubin Wang, Zimeng Gao, Denghui Jin, Shuming Gong, Guili Peng
, Zijian Yang:
AMEA-YOLO: a lightweight remote sensing vehicle detection algorithm based on attention mechanism and efficient architecture. 11241-11260 - Aokang Pang, Huijun Liang, Chenhao Lin, Lei Yao:
A binary bat algorithm with improved crossover operators and Cauchy mutation for unit commitment problem. 11261-11292 - Baiyou Qiao, Jiaqi Wu, Rui Wang, Yuanqing Hao, Peirui Wang, Donghong Han, Gang Wu
:
A parallel feature selection method based on NMI-XGBoost and distance correlation for typhoon trajectory prediction. 11293-11321 - Yuanmeng Zheng, Qingbin Luo, Qiang Li, Yi Lv:
Quantum circuit implementations of lightweight authenticated encryption ASCON. 11322-11337 - Vishal Sharma
, Rohit Beniwal
, Vinod Kumar
:
Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications. 11338-11381 - Dan Zhang, Hui Wang, Shuang Li, Baonan Wang:
Progress in the prime factorization of large numbers. 11382-11400 - Wanling Lin
, Hongbin Zhuang
, Xiao-Yan Li
, Yufang Zhang:
Reliability evaluation of generalized exchanged X-cubes under the Rg-conditional restriction. 11401-11430 - Rania Mzid:
Real-time design patterns for the verification of safety-critical embedded systems in model-based approach. 11431-11473 - Tianlei Zhu
, Xin Yang, Hongwei Wang, Jianjun Wu:
A performance assessment method for urban rail transit last train network based on percolation theory. 11474-11490 - Mahfooz Alam
, Mohammad Shahid
, Suhel Mustajab
:
Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions. 11491-11555 - Njoud O. Almaaitah
, David E. Singh, Taylan Özden, Jesús Carretero:
Performance-driven scheduling for malleable workloads. 11556-11584 - Shiwei Gao, Jingyu Wang
, Yufeng Zeng, Xiaohui Dong:
TGIE4REC: enhancing session-based recommendation with transition and global information. 11585-11613 - Minglong Chen, Jiuzhen Liang, Hao Liu:
Multi-stream P&U adaptive graph convolutional networks for skeleton-based action recognition. 11614-11639 - Bagyammal Thirumurthy
, Latha Parameswaran, Karthikeyan Vaiapury:
A deep learning and transfer learning model for intra-change detection in images. 11640-11660 - Conghui Wang, Shiwu Yang, Chang Liu:
A novel health state prediction approach based on artificial intelligence combination strategy for compensation capacitors in track circuit. 11661-11681 - Jorge Vázquez-Pérez, César Piñeiro, Juan Carlos Pichel, Tomás F. Pena, Andrés Gómez:
QPU integration in OpenCL for heterogeneous programming. 11682-11703 - Yushen Zhang, Mingzu Zhang, Weihua Yang:
Reliability analysis of the augmented cubes in terms of the h-extra r-component edge-connectivity. 11704-11718 - Miho Chiyonobu
, Takahiro Miyamae, Masami Takata, Jun Harayama, Kinji Kimura, Yoshimasa Nakamura:
Singular value decomposition for complex matrices using two-sided Jacobi method. 11719-11740 - Loris Belcastro, Salvatore Giampà, Fabrizio Marozzo, Domenico Talia, Paolo Trunfio
, Rosa M. Badia, Jorge Ejarque, Nihad Mammadli:
Boosting HPC data analysis performance with the ParSoDA-Py library. 11741-11761 - Chao Ma, Haiying Gao, Bin Hu
:
A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme. 11762-11797 - Gianmarco Accordi
, Davide Gadioli, Emanuele Vitali, Luigi Crisci
, Biagio Cosenza
, Andrea Beccari, Gianluca Palermo:
Out of kernel tuning and optimizations for portable large-scale docking experiments on GPUs. 11798-11815 - Asma Douadi, Nadjet Kamel, Lakhdar Sais:
Label propagation algorithm for community discovery based on centrality and common neighbours. 11816-11842 - Dewei Pan, Zhijie Liu, Qiang Zhang, Ying Liu, Wencai Feng, Shiyu Ji, Wei Zhang, Zhen Min:
Correction to: Simulation-based uprighting of a capsized ship in wave-induced environments. 11843 - Retraction Note: An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation. 11844
Volume 80, Number 9, June 2024
- Yi Wan, Lingjie Yi, Bo Jiang, Junfan Chen, Yi Jiang, Xianzhong Xie:
AENet: attention enhancement network for industrial defect detection in complex and sensitive scenarios. 11845-11868 - Chao-Hsien Hsieh, Xinyu Yao, Zhen Wang, Hongmei Wang:
KMSSA optimization algorithm for bandwidth allocation in internet of vehicles based on edge computing. 11869-11892 - Qianwei Lv, He Luo, Guoqiang Wang, Jianwei Tai, Shengzhi Zhang:
PEDI-GAN: power equipment data imputation based on generative adversarial networks with auxiliary encoder. 11893-11922 - Shiladitya Bhattacharjee, Himanshi Sharma, Tanupriya Choudhury
, Ahmed M. Abdelmoniem
:
Leveraging chaos for enhancing encryption and compression in large cloud data transfers. 11923-11957 - Limin Xia, Xin Wen:
Multi-stream network with key frame sampling for human action recognition. 11958-11988 - Takafumi Ueki, Masahito Ohue
:
Antibody complementarity-determining region design using AlphaFold2 and DDG predictor. 11989-12002 - Jianchang Zheng, Hongjuan Wang:
FSBPR: a novel approach to improving BPR for recommendation with the fusion of similarity. 12003-12020 - Reza Sajedi
, Mohammadreza Razzazi
:
Data stream classification in dynamic feature space using feature mapping. 12043-12061 - Abhishek Narwaria
, Keshav Soni, Arka Prokash Mazumdar:
A position and energy aware multi-objective controller placement and re-placement scheme in distributed SDWSN. 12062-12090 - Masami Takata, Natsu Kidoguchi, Miho Chiyonobu
:
Stock recommendation methods for stability. 12091-12101 - Seyed Jalalaldin Gharibi, Karamollah Bagherifard, Hamid Parvin, Samad Nejatian, S. Hadi Yaghoubyan:
Ontology-based recommender system: a deep learning approach. 12102-12122 - Kai Zhou, Chuanhe Tan, Yanqiang Wu, Bo Yang, Xiaojun Long:
Research on low-carbon flexible job shop scheduling problem based on improved Grey Wolf Algorithm. 12123-12153 - Shiori Ishikawa, Miho Chiyonobu
, Sayaka Iida, Masami Takata:
Improvement of recognition rate using data augmentation with blurred images. 12154-12165 - Fang Liang, Jingde Zhang:
Neural network-based cross-channel chroma prediction for versatile video coding. 12166-12185 - Rui Zhong
, Enzhi Zhang, Masaharu Munetomo:
Evolutionary multi-mode slime mold optimization: a hyper-heuristic algorithm inspired by slime mold foraging behaviors. 12186-12217 - Nidhi Joraviya
, Bhavesh N. Gohil, Udai Pratap Rao:
DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment. 12218-12246 - Feixiang Yao, Zhonghao Zhang, Zeyu Ji
, Bin Liu, Haoyuan Gao:
LBB: load-balanced batching for efficient distributed learning on heterogeneous GPU cluster. 12247-12272 - Mostafa Taghizade Firouzjaee, Kamal Jamshidi, Neda Moghim
:
A novel user preference-aware content caching algorithm in mobile edge networks. 12273-12296 - Jin Matsuzaki, Kazutoshi Sakakibara, Masaki Nakamura, Shinya Watanabe:
Large neighborhood local search method with MIP techniques for large-scale machining scheduling with many constraints. 12297-12312 - Jiazhen Huo, Zhikai Hong, Mingzhou Chen, Yongrui Duan:
MIFNet: multimodal interactive fusion network for medication recommendation. 12313-12345 - Yuansheng Gao
, Jiahui Zhang, Yulin Wang, Jinpeng Wang
, Lang Qin:
Love Evolution Algorithm: a stimulus-value-role theory-inspired evolutionary algorithm for global optimization. 12346-12407 - Aymar Cublier Martínez
, Jesús Carretero, David E. Singh:
Detailed parallel social modeling for the analysis of COVID-19 spread. 12408-12429 - Anwar Mira
, Olaf Hellwich:
Deep learning models beyond temporal frame-wise features for hand gesture video recognition. 12430-12462 - Carlos Juiz, Belén Bermejo:
On the scalability of the speedup considering the overhead of consolidating virtual machines in servers for data centers. 12463-12511 - Bo Zhu, Shumin Zhang, Jinyu Zou, Chengfu Ye:
The g-faulty-block connectivity of folded hypercubes. 12512-12526 - Francisco Orts
, Gloria Ortega, Elías F. Combarro, Ignacio F. Rúa, Ester M. Garzón:
Quantum circuits for computing Hamming distance requiring fewer T gates. 12527-12542 - Javier Lopez-Fandino
, Dora B. Heras, Francisco Argüello:
Using heterogeneous computing and edge computing to accelerate anomaly detection in remotely sensed multispectral images. 12543-12563 - Blas Gómez
, Estefanía Coronado, José Villalón, Antonio Garrido:
Energy-focused simulation of edge computing architectures in 5G networks. 12564-12584 - Mohamad Abdallah
:
Generalized 4-connectivity of alternating group networks. 12585-12598 - Manuel Costanzo, Enzo Rucci, Carlos García Sánchez
, Marcelo R. Naiouf, Manuel Prieto-Matías:
Assessing opportunities of SYCL for biological sequence alignment on GPU-based systems. 12599-12622 - Cristián Ramírez, Adrián Castelló, Héctor Martínez, Enrique S. Quintana-Ortí:
Parallel GEMM-based convolution for deep learning on multicore RISC-V processors. 12623-12643 - Enzhi Zhang, Bochen Dong, Mohamed Wahib, Rui Zhong
, Masaharu Munetomo:
Meta generative image and text data augmentation optimization. 12644-12662 - Fazel Sharifi, Hossein Momeni, Amirhossein Hosseini:
Ternary bistable ring PUF for high-secure applications. 12663-12685 - Nicolás Hernández
, Francisco Almeida, Vicente Blanco Pérez
:
Optimizing convolutional neural networks for IoT devices: performance and energy efficiency of quantization techniques. 12686-12705 - Mazin Kadhum Hameed, Ali Kadhum Idrees
:
Energy-aware scheduling protocol-based hybrid metaheuristic technique to optimize the lifespan in WSNs. 12706-12726 - Vicente González Ruiz, Juan José Moreno, José-Jesús Fernández:
Acceleration of 3D feature-enhancing noise filtering in hybrid CPU/GPU systems. 12727-12742 - Changqing Gong, Weiqi Guan, Hongsheng Zhu, Abdullah Gani, Han Qi:
Network intrusion detection based on variational quantum convolution neural network. 12743-12770 - Daniel Suárez, Francisco Almeida, Vicente Blanco
:
Comprehensive analysis of energy efficiency and performance of ARM and RISC-V SoCs. 12771-12789 - Xiangyu Li, Fengping Wang, Wei Wang, Yanjiang Han, Jianyang Zhang
:
DM-YOLOX aerial object detection method with intensive attention mechanism. 12790-12812 - Atiyeh Abdollahpour, Alireza Rouhi
, Einollah Pira:
An improved gazelle optimization algorithm using dynamic opposition-based learning and chaotic mapping combination for solving optimization problems. 12813-12843 - German Leon
, José M. Badía
, Jose A. Belloch
, Almudena Lindoso, Luis Entrena:
Comparative analysis of soft-error sensitivity in LU decomposition algorithms on diverse GPUs. 12844-12862 - Xingye Li
, Jin Liu
, Zhengyu Tang, Bing Han, Zhongdai Wu:
MEDMCN: a novel multi-modal EfficientDet with multi-scale CapsNet for object detection. 12863-12890 - Sergio Afonso, Óscar Gómez-Cárdenes, Paula Expósito, Vicente Blanco
, Francisco Almeida:
Parallel programming in mobile devices with FancyJCL. 12891-12909 - Felipe Romero, Pilar M. Ortigosa, Gerardo Bandera, Luis F. Romero:
SkewEngine: enhancing performance of intensive calculations on regular meshes. 12910-12928 - Suvita Rani Sharma
, Birmohan Singh, Manpreet Kaur:
Improvement of medical data security using SABES optimization algorithm. 12929-12965 - Adriano Marques Garcia
, Dalvan Griebler
, Claudio Schepke, José Daniel García, Javier Fernández Muñoz, Luiz Gustavo Fernandes:
Performance and programmability of GrPPI for parallel stream processing on multi-cores. 12966-13000 - Huijing Yang, Juan Fang, Xing Su, Zhi Cai, Yuening Wang:
RL-CoPref: a reinforcement learning-based coordinated prefetching controller for multiple prefetchers. 13001-13026 - Yu Morikawa, Kilho Shin, Masataka Kubouchi, Hiroaki Ohshima:
Prediction of specific surface area of metal-organic frameworks by graph kernels. 13027-13047 - Alberto Ottimo
, Gabriele Mencagli, Marco Danelutto:
Boosting general-purpose stream processing with reconfigurable hardware. 13048-13078 - Fang Liu, Kejie Hu, Jing He, Wei Hu, Heyuan Li, Min Peng, Yanxiang He:
A fault-tolerant scheduling algorithm that minimizes the number of replicas in heterogeneous service-oriented cloud computing systems. 13079-13095 - Junnan Li, Qing Zhao, Shuang Liu:
A heuristic hybrid instance reduction approach based on adaptive relative distance and k-means clustering. 13096-13123 - Tongdian Wang, Qingyang Xu:
Research on safety verification methods of static data of train control systems based on deep association rules. 13124-13140 - Sanjeev Kumar
, Manjeet Singh:
Auto-localization algorithm for mobile sensor nodes in wireless sensor networks. 13141-13175 - Jose A. Belloch
, Raul Coronado, Óscar Valls, Rocío del Amor, German Leon
, Valery Naranjo, Manuel F. Dolz, Adrian Amor-Martin
, Gema Piñero
:
Urban sound classification using neural networks on embedded FPGAs. 13176-13186 - Sensen Wang, Wenjun Liu, Shuaibin Yang, Hui Huang:
An optimized AdaBoost algorithm with atherosclerosis diagnostic applications: adaptive weight-adjustable boosting. 13187-13216 - Ruo-Wei Hung, Ling-Ju Hung:
Paired restraint domination in extended supergrid graphs. 13217-13249 - Mengfan Zhao, Yutao Zhang, Guozheng Rao:
Fake news detection based on dual-channel graph convolutional attention network. 13250-13271 - Zouhair Mbarki, Amine Ben Slama, Yessine Amri
, Hedi Trabelsi, Hassene Seddik:
BTS-ADCNN: brain tumor segmentation based on rapid anisotropic diffusion function combined with convolutional neural network using MR images. 13272-13294 - Silvia R. Alcaraz
, Ruben Laso
, Oscar G. Lorenzo, David López Vilariño, Tomás F. Pena, Francisco F. Rivera:
Assessing Intel OneAPI capabilities and cloud-performance for heterogeneous computing. 13295-13316 - A Anilet Bala, P. Aruna Priya
, Vivek Maik:
Hybrid technique for fundus image enhancement using modified morphological filter and denoising net. 13317-13340 - Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee, Ahmad Keshavarz:
A hybrid semantic recommender system based on an improved clustering. 13341-13385 - Carlos Reaño
, Ricardo Olanda, Elvira Baydal, Mariano Pérez, Juan M. Orduña:
Accelerating the detection of DNA differentially methylated regions using multiple GPUs. 13386-13410 - Philipp Diel
, Antonio Jesús Muñoz-Montoro, Julio J. Carabias-Orti, José Ranilla:
Efficient FPGA implementation for sound source separation using direction-informed multichannel non-negative matrix factorization. 13411-13433 - Nadim Elsakaan
, Kamal Amroun
:
A novel multi-level hybrid load balancing and tasks scheduling algorithm for cloud computing environment. 13434-13474 - Syeda Afiya, M. Rajesh:
Embedding (K9-C9)n into interconnection networks. 13475-13491 - Saeed Sharifian Moghimi Moghaddam, Vahid Rashtchi, Ali Azarpeyvand:
Publisher Correction: Parallel chaos-based image encryption algorithm: high-level synthesis and FPGA implementation. 13492 - Shiladitya Bhattacharjee, Himanshi Sharma, Tanupriya Choudhury
, Ahmed M. Abdelmoniem
:
Publisher Correction to: Leveraging chaos for enhancing encryption and compression in large cloud data transfers. 13493-13494 - Retraction Note: Gauss interference ant colony algorithm-based optimization of UAV mission planning. 13495
- Retraction Note: Unsupervised video multi-target tracking based on fast resampling particle filter. 13496
- Retraction Note: Simulation of cross-modal image-text retrieval algorithm under convolutional neural network structure and hash method. 13497
Volume 80, Number 10, July 2024
- Yang Song, Haiying Gao, Shiyu Wang, Chao Ma, Keshuo Sun:
Token open secure and practical NTRU-based updatable encryption. 13499-13532 - Herbert Owen, Oriol Lehmkuhl
, Pasqua D'Ambra
, Fabio Durastante
, Salvatore Filippone:
Alya toward exascale: algorithmic scalability using PSCToolkit. 13533-13556 - Sidra Abbas, Shtwai Alsubai
, Stephen Ojo, Gabriel Avelino R. Sampedro
, Ahmad S. Almadhor, Abdullah Al Hejaili, Imen Bouazzi:
An efficient deep recurrent neural network for detection of cyberattacks in realistic IoT environment. 13557-13575 - Nafe Muhtasim Hye
, Umma Hany, Tahmina Islam, Nusrat Nawreen, Abdullah Al Mamun:
Artificial intelligence for detection of lung cancer using transfer learning and morphological features. 13576-13606 - Junfeng Li, Jianyu Wang:
An improved resampling particle filter algorithm based on digital twin. 13607-13631 - Yiming Ouyang, Cheng Cao, Dongyu Xu, Wu Zhou, Zhengfeng Huang, Huaguo Liang:
DBU-PG: energy-efficient noc design using dual-buffering power gating. 13632-13656 - Ruohan Wu, Xianyu Zhu, Junshi Chen, Sha Liu, Tianyu Zheng, Xin Liu, Hong An:
SWattention: designing fast and memory-efficient attention for a new Sunway Supercomputer. 13657-13680 - Zhixiang Zhao, Guoyin Zhang, Yanxia Wu, Ruize Hong
, Yiqing Yang, Yan Fu:
Block-wise dynamic mixed-precision for sparse matrix-vector multiplication on GPUs. 13681-13713 - Millán Álvarez Martínez
, Basilio B. Fraguela
, José Carlos Cabaleiro
, Francisco F. Rivera
:
A new thread-level speculative automatic parallelization model and library based on duplicate code execution. 13714-13737 - Esteban Stafford, José Luis Bosque:
Enhancing heterogeneous cluster efficiency through node-centric scheduling. 13738-13753 - Kaizhong Zuo, Xixi Chu, Peng Hu, Tianjiao Ni, Tingting Jin, Fulong Chen, Zhangyi Shen:
Security enhanced privacy-preserving data aggregation scheme for intelligent transportation system. 13754-13781 - Kimia Shirini
, Hadi S. Aghdasi, Saeed Saeedvand:
Modified imperialist competitive algorithm for aircraft landing scheduling problem. 13782-13812 - Muhammad Rizwan
, Enoch Jung, Jongsun Choi, Jaeyoung Choi:
Revisiting the performance optimization of QR factorization on Intel KNL and SKL multiprocessors. 13813-13836 - Ehsan Goudarzi, Hamid Esmaeeli, Kia Parsa, Shervin Asadzadeh:
Energy-efficient resource-constrained multi-project scheduling problem with generalized precedence relations and multi-skilled resources. 13837-13872 - Guillermo Alaejos, Héctor Martínez, Adrián Castelló, Manuel F. Dolz, Francisco D. Igual
, Pedro Alonso-Jordá, Enrique S. Quintana-Ortí:
Automatic generation of ARM NEON micro-kernels for matrix multiplication. 13873-13899 - Laura María Donaire
, Gloria Ortega, Ester M. Garzón, Francisco Orts
:
Lowering the cost of quantum comparator circuits. 13900-13917 - Hidangmayum Satyajeet Sharma, Khundrakpam Johnson Singh
:
Intrusion detection system: a deep neural network-based concatenated approach. 13918-13948 - Qiang Han
, Lu Wang, Haoyu Zhang, Leyi Shi, Danxin Wang:
Ethchecker: a context-guided fuzzing for smart contracts. 13949-13975 - Manish Kumar Maurya, Vivek Kumar Singh
, Sandeep Kumar Shaw, Manish Kumar:
Fft-asvr: an adaptive approach for accurate prediction of IoT data streams. 13976-13999 - Yumiao Zhao, Huanle Rao, Kelei Le, Wei Wang, Youqing Xu, Gangyong Jia:
RCFS: rate and cost fair CPU scheduling strategy in edge nodes. 14000-14028 - Federico Galetto
, Hiram H. López
, Mehdi Rahmati, Janche Sang
, Chansu Yu:
Experience in teaching quantum computing with hands-on programming labs. 14029-14056 - Xiao Chen, Chenye Fan, Jingjing Shi, Haiyan Wang, Haiyang Yao:
Underwater target detection and embedded deployment based on lightweight YOLO_GN. 14057-14084 - Pu Han
, Haobo Hua, Hai Wang, Fei Xue, Changmao Wu, Jiandong Shang:
A universal parallel simulation framework for energy pipeline networks on high-performance computers. 14085-14115 - Masahito Ohue
, Kotoyu Sasayama, Masami Takata:
Mathematical modeling and problem solving: from fundamentals to applications. 14116-14119 - Jiangsheng Wu, Xiaoming Lai, Xingliang Chai, Kai Yang, Tianming Wang, Haibo Liu, Yongqing Wang:
Feature-based point cloud simplification method: an effective solution for balancing accuracy and efficiency. 14120-14142 - Dinh-Dong Dau
, Soojin Lee
, Hanseok Kim
:
A comprehensive comparison study of ML models for multistage APT detection: focus on data preprocessing and resampling. 14143-14179 - Nan Xiang, Mingwei You, Qilin Wang, Bingdi Tian:
Hypergraph network embedding for community detection. 14180-14202 - Youssef Faqir-Rhazoui
, Carlos García
:
SYCL in the edge: performance and energy evaluation for heterogeneous acceleration. 14203-14223 - Huimei Guo
, Rong-Xia Hao, Jou-Ming Chang, Young Soo Kwon:
Hyper star structure connectivity of hierarchical folded cubic networks. 14224-14241 - José Irineu Ferreira Júnior, Alvaro Sobrinho
, Leandro Dias da Silva, Paulo Cunha, Thiago D. Cordeiro, Angelo Perkusich, Antonio Marcus Nogueira de Lima
:
A coloured Petri nets-based system for validation of biomedical signal acquisition devices. 14242-14271 - Maryam Imani, Amin Zehtabian:
Attention based morphological guided deep learning network for neuron segmentation in electron microscopy. 14272-14294 - Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy:
Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detection. 14295-14329 - Alberto González-Ruiz, Antonio Jesús Díaz-Honrubia
, Santiago Tapia-Fernández
, David García-Lucas
, Gabriel Cebrián-Márquez
, Luis Mengual Galan
:
Adaptive quadtree splitting parallelization (AQSP) algorithm for the VVC standard. 14330-14345 - Md Asif Thanedar
, Sanjaya Kumar Panda:
Energy and priority-aware scheduling algorithm for handling delay-sensitive tasks in fog-enabled vehicular networks. 14346-14368 - Giulio Malenza
, Valentina Cesare, Marco Aldinucci, Ugo Becciani, Alberto Vecchiato:
Toward HPC application portability via C++ PSTL: the Gaia AVU-GSR code assessment. 14369-14390 - Soukaina Hamou
, Mustapha Moufassih, Ousama Tarahi, Said Agounad
, Hafida Idrissi Azami:
Hybrid approach: combining eCCA and SSCOR for enhancing SSVEP decoding. 14391-14416 - Kairi Furui
, Masahito Ohue
:
Fastlomap: faster lead optimization mapper algorithm for large-scale relative free energy perturbation. 14417-14432 - Tongfeng Li, Ruisheng Zhang, Yabing Yao, Yunwu Liu, Jun Ma, Jianxin Tang:
Graph regularized autoencoding-inspired non-negative matrix factorization for link prediction in complex networks using clustering information and biased random walk. 14433-14469 - Xiaohong Li, Ruihong Li, Qixuan Peng, Jin Yao:
Graph neural news recommendation based on multi-view representation learning. 14470-14488 - Soham Biswas, Md. Sarfaraj Alam Ansari:
Securing IoT networks in cloud computing environments: a real-time IDS. 14489-14519 - Sunakshi Mehra
, Virender Ranga
, Ritu Agarwal
:
A deep learning approach to dysarthric utterance classification with BiLSTM-GRU, speech cue filtering, and log mel spectrograms. 14520-14547 - Ning Kang
, Zhan Wang, Fan Yang, Xiaoxiao Ma, Zhenlong Ma, Guojun Yuan, Guangming Tan:
Towards connection-scalable RNIC architecture. 14548-14572 - Alejandro Fernández-Fraga
, Jorge González-Domínguez, María J. Martín
:
PARamrfinder: detecting allele-specific DNA methylation on multicore clusters. 14573-14599 - Yanhua Liu, Wentao Deng, Zhihuang Liu, Fanhao Zeng:
Semi-supervised attack detection in industrial control systems with deviation networks and feature selection. 14600-14621 - Han Qi, Xinyu Liu, Abdullah Gani, Changqing Gong:
Quantum particle Swarm optimized extreme learning machine for intrusion detection. 14622-14644 - Thomas Jakobs, Oliver Klöckner, Gudula Rünger:
Parallelization with load balancing of the weather scheme WSM7 for heterogeneous CPU-GPU platforms. 14645-14665 - Pablo Antonio Martínez
, Gregorio Bernabé
, José Manuel García
:
POAS: a framework for exploiting accelerator level parallelism in heterogeneous environments. 14666-14693 - Jie Zhang, Enze Liu, Yan Guo:
A new three-dimensional memristor chaotic circuit design and its application in image encryption. 14694-14724 - Qi-An Huang, Yain-Whar Si:
Blockchain-based autonomous decentralized trust management for social network. 14725-14751 - Ying Duan, Chunmao Jiang:
Binary task offloading strategy for cloud robots using improved game theory in cloud-edge collaboration. 14752-14772 - Ako Muhammad Abdullah:
An efficient energy-aware and reliable routing protocol to enhance the performance of wireless body area networks. 14773-14798 - Wenbing Yang, Mingqiang Zhao, Jingbo Li, Xingjun Zhang:
Energy-efficient DAG scheduling with DVFS for cloud data centers. 14799-14823 - Georgios Zioviris, Kostas Kolomvatsos, Georgios I. Stamoulis:
An intelligent sequential fraud detection model based on deep learning. 14824-14847 - Gowri Shankar Manivannan
, C. Ganesh Babu
, Harikumar Rajaguru
:
Amelioration of multitudinous classifiers performance with hyper-parameters tuning in elephant search optimization for cardiac arrhythmias detection. 14848-14924 - Yue Lin, Erhu Liu, Xingzhu Liang
, Miaomiao Chen, Xinyun Yan:
Global-local Bi-alignment for purer unsupervised domain adaptation. 14925-14952 - Zhiyuan Shen, Qinshuai Zhao
, Yiyang Liu:
MAML-SGD: a reliable airline rescheduling algorithm for small-sample learning based on MAML and SGD. 14953-14977 - Majid Salimi Beni
, Sascha Hunold, Biagio Cosenza
:
Analysis and prediction of performance variability in large-scale computing systems. 14978-15005 - Md Arshad Jamal, Sriram Kailasam, Bhumanyu Goyal, Varun Singh:
DiGTreeS: a distributed resilient framework for generalized tree search. 15006-15037 - Jianguo Yu, Lin Ge, Minghui Wu:
Proposal Distribution optimization for Endorsement Strategy in Hyperledger Fabric. 15038-15065 - Alemeh Matani
, Amir Sahafi, Ali Broumandnia
:
Improving query processing in blockchain systems by using a multi-level sharding mechanism. 15066-15096 - Yuansheng Gao, Jiahui Zhang, Yulin Wang, Jinpeng Wang, Lang Qin:
Correction to: Love evolution algorithm: a stimulus-value-role theory-inspired evolutionary algorithm for global optimization. 15097-15099 - Retraction Note: FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. 15100
- Retraction Note: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction. 15101
- Retraction Note: Design and implementation of CfoTS networks for industrial fault detection and correction mechanism. 15102
- Retraction Note: Multilingual hate speech detection sentimental analysis on social media platforms using optimal feature extraction and hybrid diagonal gated recurrent neural network. 15103
Volume 80, Number 11, July 2024
- Zaid A. Hussain, Fawaz Alazemi
, Bader F. AlBdaiwi:
Completely independent spanning trees in Eisenstein-Jacobi networks. 15105-15121 - Yiqing Yang, Guoyin Zhang, Yanxia Wu, Zhixiang Zhao, Yan Fu:
Split-bucket partition (SBP): a novel execution model for top-K and selection algorithms on GPUs. 15122-15160 - Yichao Gao, Dake Zhou, Yaqi Shen, Xin Yang:
Dual experience replay-based TD3 for single intersection signal control. 15161-15182 - Xiao-dan Sun, Xiao-Fang Sun:
An edge detection algorithm based upon the adaptive multi-directional anisotropic gaussian filter and its applications. 15183-15214 - Bing Leng, Hao Jiang, Bidou Wang, Jinxian Wang
, Gangyin Luo:
A lightweight deep learning model for acute myeloid leukemia-related blast cell identification. 15215-15244 - Keyu Zhong, Fen Xiao, Xieping Gao:
Wind farm layout optimization using adaptive equilibrium optimizer. 15245-15291 - Saurabh Chandra
, Rajeev Arya, Maheshwari Prasad Singh:
Mellin transform-based D2D power optimization in 5G-enabled social IoT network. 15292-15329 - Junjie Cao
, Zhiyong Yu, Jian Yang:
A migration strategy based on cluster collaboration predictions for mobile edge computing-enabled smart rail system. 15330-15361 - Hongtai Yao, Zewen Li, Yong Jin, Zhentao Hu, Qinglan Peng:
Secure symbol-level precoding for reconfigurable intelligent surface-aided cell-free networks. 15362-15385 - Kamal Singh
, Nitin Singha:
Credit-based energy trading system using blockchain and machine learning. 15386-15407 - Shangdong Liu, Longfei Zhou, Sisi Shao, Jun Zuo, Yimu Ji:
CBGA: A deep learning method for power grid communication networks service activity prediction. 15408-15428 - Sibasish Dhibar, Madhu Jain:
Particle swarm optimization and FM/FM/1/WV retrial queues with catastrophes: application to cloud storage. 15429-15463 - Xiaojun Zhu, Xiaowei Zhao, Chao Dong:
Optimal UAV deployment with star topology in area coverage problems. 15464-15484 - Cemil Közkurt, Aykut Diker
, Abdullah Elen, Serhat Kiliçarslan
, Emrah Dönmez, Fahrettin Burak Demir:
Trish: an efficient activation function for CNN models and analysis of its effectiveness with optimizers in diagnosing glaucoma. 15485-15516 - Bengong Yu, Chunyang Gao, Shuwen Zhang:
Training with One2MultiSeq: CopyBART for social media keyphrase generation. 15517-15544 - Puranam Revanth Kumar, Rajesh Kumar Jha, P. Akhendra Kumar:
Brain hyperintensities: automatic segmentation of white matter hyperintensities in clinical brain MRI images using improved deep neural network. 15545-15581 - Alperen Cakin, Selma Dilek, Suleyman Tosun:
Energy-aware application mapping methods for mesh-based hybrid wireless network-on-chips. 15582-15612 - Shiyu Liu, Qicheng Liu:
A sentiment analysis model based on dynamic pre-training and stacked involutions. 15613-15635 - Gautam Amiya, Pallikonda Rajasekaran Murugan, Kottaimalai Ramaraj, Vishnuvarthanan Govindaraj, Muneeswaran Vasudevan, M. Thirumurugan, S. Sheik Abdullah, Arunprasath Thiyagarajan:
LMGU-NET: methodological intervention for prediction of bone health for clinical recommendations. 15636-15663 - Abdulrahman Ahmed Jasim
, Layth Rafea Hazim, Hayder Mohammedqasim
, Roa'a Mohammedqasem
, Oguz Ata
, Omar Hussein Salman:
e-Diagnostic system for diabetes disease prediction on an IoMT environment-based hyper AdaBoost machine learning model. 15664-15689 - Amira Jouirou, Ines Souissi, Walid Barhoumi
:
Two-level content-based mammogram retrieval using the ACR BI-RADS assessment code and learning-driven distance selection. 15690-15724 - Apurba Debnath, Anirban Tarafdar
, A. Poojitha Reddy, Paritosh Bhattacharya:
ROVM integrated advanced machine learning-based malaria prediction strategy in Tripura. 15725-15762 - Rong Fan, Zhenhai Wang, Yunlong Guo, Yuhao Xu, Zhiru Wang, Weimin Li:
Robust enhanced collaborative filtering without explicit noise filtering. 15763-15782 - Savari Prabhu
, V. Manimozhi
, Akbar Davoodi, Juan Luis García Guirao:
Fault-tolerant basis of generalized fat trees and perfect binary tree derived architectures. 15783-15798 - Alessia Antelmi
, Massimo Torquati, Giacomo Corridori, Daniele Gregori, Francesco Polzella, Gianmarco Spinatelli, Marco Aldinucci:
Analyzing FOSS license usage in publicly available software at scale via the SWH-analytics framework. 15799-15833 - Md Saquib Jawed
, Mohammad Sajid:
CryptoHHO: a bio-inspired cryptosystem for data security in Fog-Cloud architecture. 15834-15867 - Jing Zhang, Zhanwei Han:
Optimization of uncertain dependent task mapping on heterogeneous computing platforms. 15868-15893 - Fanny Spagnolo, Pasquale Corsonello, Fabio Frustaci, Stefania Perri:
Approximate bilateral filters for real-time and low-energy imaging applications on FPGAs. 15894-15916 - Samira Shahinifar
, Mohammad Taghi Kheirabadi, Ali Broumandnia
, Kambiz Rahbar:
Fog-Marketing: auction-based multi-tier decentralized markets for fog resource provisioning. 15917-15939 - Rongbiao Ji, Jianke Yang, Yehui Wu, Yadong Li, Rujia Li, Jiaojiao Chen, Jianping Yang:
Construction and analysis of students' physical health portrait based on principal component analysis improved Canopy-K-means algorithm. 15940-15973 - Udit Mittal
, Uma Nangia, Narender Kumar Jain, Saket Gupta:
Optimal power flow solution using a learning-based sine-cosine algorithm. 15974-16012 - JiaCheng Lin, Huanle Rao, SongSong Liang, Yumiao Zhao, Qing Ren, Gangyong Jia:
Aphto: a task offloading strategy for autonomous driving under mobile edge. 16013-16045 - Zhaoqi Wang, Lei Wang, Qiaoyong Jiang, Xinhui Duan, Zhennan Wang, Liangliang Wang:
Multiple search operators selection by adaptive probability allocation for fast convergent multitask optimization. 16046-16092 - Zhouhao Zhang, Hailin Jiang, Hongli Zhao, Yang Li:
Federated learning-based edge computing for automatic train operation in communication-based train control systems. 16093-16111 - R. Gregor Weiß
, Sergey Lesnik
, Flavio Cesar Cunha Galeazzo
, Andreas Ruopp
, Henrik Rusche
:
Coherent mesh representation for parallel I/O of unstructured polyhedral meshes. 16112-16132 - Ashish Kumari, Shailender Kumar, Ram Shringar Raw:
Advancing VANET stability: enhanced cluster head selection with iTTM and weighted CRITIC. 16133-16172 - Baydaa Sulaiman Bahnam
, Suhair Abd Dawwod, Mohammed Chachan Younis
:
Optimizing software reliability growth models through simulated annealing algorithm: parameters estimation and performance analysis. 16173-16201 - Abubakr S. Issa, Yossra H. Ali, Tarik A. Rashid
:
BCDDO: Binary Child Drawing Development Optimization. 16202-16221 - Ayushi Jain, Mehak Garg, Anvita Gupta, Shivangi Batra, Bhawna Narwal:
IoMT-BADT: A blockchain-envisioned secure architecture with a lightweight authentication scheme for the Digital Twin environment in the Internet of Medical Things. 16222-16253 - Jiankai Xue, Bo Shen, Anqi Pan:
A multi-strategy-guided sparrow search algorithm to solve numerical optimization and predict the remaining useful life of li-ion batteries. 16254-16300 - Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini:
Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers. 16301-16333 - Umer Farooq, Shahid Naseem, Tariq Mahmood, Jianqiang Li, Amjad Rehman, Tanzila Saba, Luqman Mustafa
:
Transforming educational insights: strategic integration of federated learning for enhanced prediction of student learning outcomes. 16334-16367 - Marco La Salvia, Emanuele Torti, Elisa Marenzi
, Giovanni Danese, Francesco Leporati:
Edge and cloud computing approaches in the early diagnosis of skin cancer with attention-based vision transformer through hyperspectral imaging. 16368-16392 - Raneem Qaddoura, Hossam Faris:
Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection. 16393-16427 - Po-Jen Chuang, Pang-Yu Huang:
Enhancing network intrusion detection by lifelong active online learning. 16428-16451 - Ni An, Mengjie Lv, Weibei Fan, Lei Han, Fu Xiao:
Extra connectivity of the data center network - RRect. 16452-16473 - Hongye Li, Fuyong Xu, Zhiyu Zhang, Peiyu Liu, Wenyin Zhang:
Aspect-level sentiment classification with aspect-opinion sentence pattern connection graph convolutional networks. 16474-16496