default search action
The Computer Journal, Volume 65
Volume 65, Number 1, January 2022
- Biswajit Biswas, Swarup Kr Ghosh, Moumita Hore, Anupam Ghosh:
SIFT-Based Visual Tracking using Optical Flow and Belief Propagation Algorithm. 1-17 - Amjad Osmani, Jamshid Bagherzadeh Mohasefi, Farhad Soleimanian Gharehchopogh:
Sentiment Classification Using Two Effective Optimization Methods Derived From The Artificial Bee Colony Optimization And Imperialist Competitive Algorithm. 18-66 - Sandeep Kumar Sood, Vaishali Sood, Isha Mahajan, Sahil:
Fog-Cloud Assisted IoT-Based Hierarchical Approach For Controlling Dengue Infection. 67-79 - Mala Saraswat, Shampa Chakraverty:
Enriching Topic Coherence on Reviews for Cross-Domain Recommendation. 80-90 - Mohammed Zubair M. Shamim, Sadatullah Syed, Mohammad Shiblee, Mohammed Usman, Syed Jaffar Ali, Hany S. Hussein, Mohammed Farrag:
Automated Detection of Oral Pre-Cancerous Tongue Lesions Using Deep Learning for Early Diagnosis of Oral Cavity Cancer. 91-104 - Qasem Qananwah, Ali Mohammad Alqudah, Moh'd Alodat, Ahmad Dagamseh, Oliver Hayden:
Detecting Cognitive Features of Videos Using EEG Signal. 105-123 - Arjun Puri, Manoj Kumar Gupta:
Improved Hybrid Bag-Boost Ensemble With K-Means-SMOTE-ENN Technique for Handling Noisy Class Imbalanced Data. 124-138 - Akshma Chadha, Baijnath Kaushik:
Performance Evaluation of Learning Models for Identification of Suicidal Thoughts. 139-154
Volume 65, Number 2, February 2022
- Syed Saqib Ali Kazmi, Mehreen Ahmed, Rafia Mumtaz, Zahid Anwar:
Spatiotemporal Clustering and Analysis of Road Accident Hotspots by Exploiting GIS Technology and Kernel Density Estimation. 155-176 - Lei Wang, Qing Qian, Qiang Zhang, Jishuai Wang, Wenbo Cheng, Wei Yan:
Classification Model on Big Data in Medical Diagnosis Based on Semi-Supervised Learning. 177-191 - Imen Touati, Mariem Ellouze, Marwa Graja, Lamia Hadrich Belguith:
Appraisal of Two Arabic Opinion Summarization Methods: Statistical Versus Machine Learning. 192-202 - Xinpeng Zhang, Jigang Wu, Min Meng:
Small Target Recognition Using Dynamic Time Warping and Visual Attention. 203-216 - Ping-Chi Hsieh, Der-Juinn Horng, Hong-Yi Chang:
International Expansion Selection Model by Machine Learning - A Proprietary Model. 217-236 - Xia-an Bi, Hao Wu, Xi Hu, Yu Fu, Shaoliang Peng:
Clustering-Evolutionary Random Support Vector Machine Ensemble for fMRI-Based Asperger Syndrome Diagnosis. 251-260 - Qinglong Wang, Xiaoying Sun, Dekun Cao, Guohong Liu:
Enhanced Interactive Performance of Zoom-In/Out Gestures Using Electrostatic Tactile Feedback on Touchscreens. 261-274 - R. Geetha, S. Karthika, Ponnurangam Kumaraguru:
'Will I Regret for This Tweet?' - Twitter User's Behavior Analysis System for Private Data Disclosure. 275-296 - Zolfaghar Salmanian, Habib Izadkhah, Ayaz Isazadeh:
Auto-Scale Resource Provisioning In IaaS Clouds. 297-309 - Patrick Erik Bradley, Markus Wilhelm Jahn:
On the Behaviour of p -Adic Scaled Space Filling Curve Indices for High-Dimensional Data. 310-330 - Syed Saqib Raza Rizvi, Muhammad Adnan Khan, Sagheer Abbas, Muhammad AsadUllah, Nida Anwer, Areej Fatima:
Deep Extreme Learning Machine-Based Optical Character Recognition System for Nastalique Urdu-Like Script Languages. 331-344 - S. Hasanzadeh, Seyed Mostafa Fakhrahmad, Mohammad Taheri:
Review-Based Recommender Systems: A Proposed Rating Prediction Scheme Using Word Embedding Representation of Reviews. 345-354 - Shitala Prasad, Tingting Chai:
Palmprint for Individual's Personality Behavior Analysis. 355-370 - Dong Xu, Wei Dong, Han Zhou:
Sclera Recognition Based on Efficient Sclera Segmentation and Significant Vessel Matching. 371-381 - M. Gokuldhev, G. Singaravel:
Local Pollination-Based Moth Search Algorithm for Task-Scheduling Heterogeneous Cloud Environment. 382-395 - Negin Manshouri, Mesut Melek, Temel Kayikçioglu:
Detection of 2D and 3D Video Transitions Based on EEG Power. 396-409 - Wangli Hao, Meng Han, Shancang Li, Fuzhong Li:
An Attention Enhanced Cross-Modal Image-Sound Mutual Generation Model for Birds. 410-422 - Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Abdelzahir Abdelmaboud, Manar Ahmed Hamza, Mohammad Mahzari, Abdulkhaleq Q. A. Hassan:
A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet. 423-435 - P. Suthanthiradevi, S. Karthika:
Rumor Identification and Verification for Text in Social Media Content. 436-455
Volume 65, Number 3, March 2022
- Aqib Mumtaz, Allah Bux Sargano, Zulfiqar Habib:
Fast Learning Through Deep Multi-Net CNN Model For Violence Recognition In Video Surveillance. 457-472 - Alev Mutlu, Furkan Göz:
SkySlide: A Hybrid Method for Landslide Susceptibility Assessment based on Landslide-Occurring Data Only. 473-483 - Sagheer Abbas, Muhammad Adnan Khan, Atifa Athar, Syed Ali Shan, Anwar Saeed, Tahir Alyas:
Enabling Smart City With Intelligent Congestion Control Using Hops With a Hybrid Computational Approach. 484-494 - Omid Davoodi, Mehrdad Ashtiani, Morteza Rajabi:
An Approach for the Evaluation and Correction of Manually Designed Video Game Levels Using Deep Neural Networks. 495-515 - Hager Kammoun, Imen Gabsi, Ikram Amous:
MeSH-Based Semantic Indexing Approach to Enhance Biomedical Information Retrieval. 516-536 - Kai Zhang, Yuan Zhou, Zheng Chen, Yufei Liu, Zhuo Tang, Li Yin, Jihong Chen:
Incorporating Biterm Correlation Knowledge into Topic Modeling for Short Texts. 537-553 - Yu Yang, Beifang Chen, Guoping Zhang, Yongming Li, Daoqiang Sun, Hongbo Liu:
Algorithms Based on Path Contraction Carrying Weights for Enumerating Subtrees of Tricyclic Graphs. 554-572 - Jianbin Huang, Heli Sun, He Li, Longji Huang, Ao Li, Xiangyu Wang:
Central Station-Based Demand Prediction for Determining Target Inventory in a Bike-Sharing System. 573-588 - Yanze Huang, Limei Lin, Li Xu:
Subgraph Reliability of Alternating Group Graph With Uniform and Nonuniform Vertex Fault-Free Probabilities. 589-605 - Anass Nouri, Christophe Charrier, Olivier Lézoray:
A Genetically Based Combination of Visual Saliency and Roughness for FR 3D Mesh Quality Assessment: A Statistical Study. 606-620 - Xiaoying Sun, Chen Zhang, Guohong Liu:
Improved Tactile Perception of 3D Geometric Bumps Using Coupled Electrovibration and Mechanical Vibration Stimuli. 621-630 - Sukhmani K. Thethi, Ravi Kumar:
Dynamic Frequency Scaling of a Single-Core Processor Using Machine Learning Paradigms. 631-654 - Tamil Selvi M, Jaison B:
Lemuria: A Novel Future Crop Prediction Algorithm Using Data Mining. 655-666 - Andrew Larkin, Perry Hystad:
Integrating Geospatial Data and Social Media in Bidirectional Long-Short Term Memory Models to Capture Human Nature Interactions. 667-678 - Yiqin Luo, Yanpeng Sun, Liang Chang, Tianlong Gu, Chenzhong Bin, Long Li:
Considering Fine-Grained and Coarse-Grained Information for Context-Aware Recommendations. 679-688 - Runze Yang, Jian Song, Baoqi Huang, Wuyungerile Li, Guodong Qi:
An Energy-Efficient Step-Counting Algorithm for Smartphones. 689-700 - M. KrishnaSiva Prasad, Poonam Sharma:
Similarity of Sentences With Contradiction Using Semantic Similarity Measures. 701-717 - Kyriakos Georgiou, Zbigniew Chamski, Andrés Amaya García, David May, Kerstin Eder:
Lost In Translation: Exposing Hidden Compiler Optimization Opportunities. 718-735 - Adel Alti, Lamri Laouamer:
Agent-Based Autonomic Semantic Context-Aware Platform for Smart Health Monitoring and Disease Detection. 736-755
Volume 65, Number 4, April 2022
- Anil B. Gavade, Vijay S. Rajpurohit:
S-DolLion-MSVNN: A Hybrid Model for Developing the Super-Resolution Image From the Multispectral Satellite Image. 757-772 - David Oro, Carles Fernández, Xavier Martorell, Javier Hernando:
Work-Efficient Parallel Non-Maximum Suppression Kernels. 773-787 - Amin Rezaeipanah, Gholamreza Ahmadi:
Breast Cancer Diagnosis Using Multi-Stage Weight Adjustment In The MLP Neural Network. 788-804 - Nitesh Pradhan, Vijaypal Singh Dhaka, Geeta Rani, Himanshu Chaudhary:
Machine Learning Model for Multi-View Visualization of Medical Images. 805-817 - Luoyang Xue, Ang Xu, Qirong Mao, Lijian Gao, Jie Chen:
Weakly Supervised Sentiment-Specific Region Discovery for VSA. 818-830 - Muralidhar Pantula, K. S. Kuppusamy:
A Machine Learning-Based Model to Evaluate Readability and Assess Grade Level for the Web Pages. 831-842 - Ravindra Kumar Singh, Harsh Kumar Verma:
Redis-Based Messaging Queue and Cache-Enabled Parallel Processing Social Media Analytics Framework. 843-857 - Yang Li, Heli Sun, Liang He, Jianbin Huang, Jiyin Chen, Hui He, Xiaolin Jia:
Querying Tenuous Group in Attributed Networks. 858-873 - Chunlin Li, Yihan Zhang, Xiaomei Qu, Youlong Luo:
Cost- and Time-Based Data Deployment for Improving Scheduling Efficiency in Distributed Clouds. 874-889 - Liqiong Xu, Litao Guo:
Analysis on the Component Connectivity of Enhanced Hypercubes. 890-896 - Thamba Meshach W, Hemajothi S, E. A. Mary Anita:
Smart Affect Recognition System for Real-Time Biometric Surveillance Using Hybrid Features and Multilayered Binary Structured Support Vector Machine. 897-917 - Khalid Masood, Muhammad Adnan Khan, Usman Saeed, Mohammad A. Alghamdi, Muhammad Asif, Muhammad Arfan:
Semantic Analysis to Identify Students' Feedback. 918-925 - Amita Jain, Kanika Mittal, Kunwar Singh Vaisla:
FLAKE: Fuzzy Graph Centrality-based Automatic Keyword Extraction. 926-939 - Muhammad Sajid, Nouman Ali, Naeem Iqbal Ratyal, Muhammad Usman, Faisal Mehmood Butt, Imran Riaz, Usman Musaddiq, Mirza Jabbar Aziz Baig, Shahbaz Baig, Umair Ahmad Salaria:
Deep Learning in Age-invariant Face Recognition: A Comparative Study. 940-972 - José Wagner de Andrade Júnior, Rodrigo Duarte Seabra:
Fully Retroactive Minimum Spanning Tree Problem. 973-982 - Abhishek Kashyap, B. Suresh, Hariom Gupta:
Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm. 983-996 - Doaa Wagdy Trabay, Ibrahim M. El-Henawy, Wajeb Gharibi:
A Trust Framework Utilization in Cloud Computing Environment Based on Multi-criteria Decision-Making Methods. 997-1005 - Xiao Lin, Zhi-Jie Wang, Lizhuang Ma, Renjie Li, Mei-E Fang:
Salient Object Detection Based on Multiscale Segmentation and Fuzzy Broad Learning. 1006-1019 - Shimin Li, Xin Wang, Rui Xue:
Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications. 1020-1028 - Katukuri Arun Kumar, Ravi Boda:
A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification. 1029-1052
Volume 65, Number 5, May 2022
- (Withdrawn) Withdrawn: Editorial.
- Mohammad Bidoki, M. Fakhrahmad, Mohammad R. Moosavi:
Text Summarization as a Multi-objective Optimization Task: Applying Harmony Search to Extractive Multi-Document Summarization. 1053-1072 - Marcel Wild:
Compression with Wildcards: From CNFs to Orthogonal DNFs by Imposing the Clauses One-by-One. 1073-1087 - Hieu Trung Huynh, Tran Minh Hoang:
A Novel Approach for Determining Meal Plan for Gestational Diabetes Mellitus Using Artificial Intelligence. 1088-1097 - Norah Alajlan, Mohammed Hadwan, Dina M. Ibrahim:
Effectiveness of Adopting Cloud-Based E-Learning at Qassim University. 1098-1106 - Tao Peng, Thomas Canhao Xu, Yihuai Wang, Fanzhang Li:
Deep Belief Network and Closed Polygonal Line for Lung Segmentation in Chest Radiographs. 1107-1128 - Shurong Zhang, Dongyue Liang, Lin Chen, Ronghua Li, Weihua Yang:
The Component Diagnosability of Hypercubes with Large-Scale Faulty Nodes. 1129-1143 - Mehdi Ahmed-Nacer, Slim Kallel, Faiez Zalila, Philippe Merle, Walid Gaaloul:
Model-Driven Simulation of Elastic OCCI Cloud Resources. 1144-1166 - Anurag Sohane, Ravinder Agarwal:
Knee Muscle Force Estimating Model Using Machine Learning Approach. 1167-1177 - Ujjwal Kumar Mishra, Kalpana Mahalingam, Raghavan Rama:
Watson-Crick Jumping Finite Automata: Combination, Comparison and Closure. 1178-1188 - Huan Wang, Qing Gao, Hao Li, Hao Wang, Liping Yan, Guanghua Liu:
A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social Networks. 1189-1199 - Gilad Baruch, Shmuel T. Klein, Dana Shapira:
Enhanced Context Sensitive Flash Codes. 1200-1210 - Y. Srinivasa Rao, R. Madhu:
Channel Estimation for Millimeter Wave Massive MIMO System: Proposed Hybrid Optimization with Heuristic-Enabled Precoding and Combining. 1211-1224 - A. Francis Alexander Raghu, John Patrick Ananth:
Object Detection and Localization Using Sparse-FCM and Optimization-driven Deep Convolutional Neural Network. 1225-1241 - Stephen Manko Wambura, Jianbin Huang, He Li:
Robust Anomaly Detection in Feature-Evolving Time Series. 1242-1256 - Afef Abidi, Ibtihel Nouira, Ines Assali, Mohamed Ali Saafi, Mohamed Hedi Bedoui:
Hybrid Multi-Channel EEG Filtering Method for Ocular and Muscular Artifact Removal Based on the 3D Spline Interpolation Technique. 1257-1271 - Felix M. Philip, Jayakrishnan V, Ajesh F, Haseena P:
Video Anomaly Detection Using the Optimization-Enabled Deep Convolutional Neural Network. 1272-1292 - Hossein Rajaby Faghihi, MohammadAmin Fazli, Jafar Habibi:
Hybrid Learning Approach Toward Situation Recognition and Handling. 1293-1305 - Debasish Pattanayak, Kaushik Mondal, Partha Sarathi Mandal, Stefan Schmid:
Area Convergence of Monoculus Robots With Additional Capabilities. 1306-1319 - Wenfa Qi, Sirui Guo, Yuxin Liu, Xiang Wang, Zongming Guo:
Research on Reversible Visible Watermarking Algorithms Based on Vectorization Compression Method. 1320-1337 - D. Venkata Vara Prasad, Srinivas Gumparthi, Lokeswari Y. Venkataramana, S. Srinethe, R. M. Sruthi Sree, K. Nishanthi:
Prediction of Stock Prices Using Statistical and Machine Learning Models: A Comparative Analysis. 1338-1351 - Felix M. Philip, Jayakrishnan V, Ajesh F, Haseena P:
Corrigendum to: Video Anomaly Detection Using the Optimization-Enabled Deep Convolutional Neural Network. 1352
Volume 65, Number 6, June 2022
- Yati Phyo, Canh Minh Do, Kazuhiro Ogata:
A Divide & Conquer Approach to Leads-to Model Checking. 1353-1364 - C. Venkata Narasimhulu:
A New Blind Watermark Embedding Model: Spiral Updated Rider Optimization Algorithm. 1365-1385 - Carlo Blundo, Stelvio Cimato, Luisa Siniscalchi:
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints. 1386-1411 - Tomasz Boinski, Pawel Czarnul:
Optimization of Data Assignment for Parallel Processing in a Hybrid Heterogeneous Environment Using Integer Linear Programming. 1412-1433 - Sreenithya Sumesh, Aneesh Krishna:
Sensitivity Analysis of Conflicting Goals in the i* Goal Model. 1434-1460 - Lei Wang, Qiang Zhang, Qing Qian, Jishuai Wang, Yujun Pan, Renbing Yang, Wenbo Cheng:
Multispectral Palm Print and Palm Vein Acquisition Platform and Recognition Method Based on Convolutional Neural Network. 1461-1471 - Fernando J. Fiori, Waltteri Pakalén, Jorma Tarhio:
Approximate String Matching with SIMD. 1472-1488 - Shengyuan Feng, Junqing Gong, Jie Chen:
Binary Tree Encryption with Constant-Size Public Key in the Standard Model. 1489-1511 - Tonglai Liu, Jigang Wu, Jiaxing Li, Jingyi Li, Zikai Zhang:
Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network. 1512-1526 - Surbhi Gupta, Manoj Kumar Gupta:
Computational Prediction of Cervical Cancer Diagnosis Using Ensemble-Based Classification Algorithm. 1527-1539 - Sahil, Sandeep Kumar Sood:
Fog-assisted Energy Efficient Cyber Physical System for Panic-based Evacuation during Disasters. 1540-1559 - Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. 1560-1573 - Meijuan Huang, Bo Yang, Yanwei Zhou, Xuewei Hu:
Continual Leakage-Resilient Hedged Public-Key Encryption. 1574-1585 - G. Gokulkumari:
Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features. 1586-1597 - Zeyi Liu, Weijuan Zhang, Ji Xiang, Daren Zha, Lei Wang:
NP-LFA: Non-profiled Leakage Fingerprint Attacks against Improved Rotating S-box Masking Scheme. 1598-1610 - Selvapandian Arumugam, Nagendra Prabhu Selvaraj, P. Sivakumar, Jagannadha Rao D. B.:
Lung Cancer Detection and Severity Level Classification Using Sine Cosine Sail Fish Optimization Based Generative Adversarial Network with CT Images. 1611-1630 - Qiong Sun, Xiankai Huang, Zheng Liu:
Tourists' Digital Footprint: Prediction Method of Tourism Consumption Decision Preference. 1631-1638 - I Edwin Albert, A. J. Deepa, A. Lenin Fred:
Fidelity Homogenous Genesis Recommendation Model for User Trust with Item Ratings. 1639-1652
Volume 65, Number 7, July 2022
- Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang:
Forward-Secure Edge Authentication for Graphs. 1653-1665 - Faisal Khurshid, Yan Zhu, Jie Hu, Muqeet Ahmad, Mushtaq Ahmad:
Battering Review Spam Through Ensemble Learning in Imbalanced Datasets. 1666-1678 - Jiang Che, Wanyue Xu, Xiaotian Zhou, Zhongzhi Zhang, Haibin Kan:
Some Combinatorial Problems in Power-Law Graphs. 1679-1691 - Jianchang Lai, Xinyi Huang, Debiao He, Wei Wu:
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. 1692-1701 - Intissar Khalifa, Ridha Ejbali, Raimondo Schettini, Mourad Zaied:
Deep Multi-Stage Approach For Emotional Body Gesture Recognition In Job Interview. 1702-1716 - M. Ramchandran, E. N. Ganesh:
MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks. 1717-1725 - Hao Wang, Huan Wang:
Differentially Private Publication For Correlated Non-Numerical Data. 1726-1739 - Talha Mahboob Alam, Kamran Shaukat, Haris Mahboob, Muhammad Umer Sarwar, Farhat Iqbal, Adeel Nasir, Ibrahim A. Hameed, Suhuai Luo:
A Machine Learning Approach for Identification of Malignant Mesothelioma Etiological Factors in an Imbalanced Dataset. 1740-1751 - G. S. Smrithy, Ramadoss Balakrishnan:
A Statistical-Based Light-Weight Anomaly Detection Framework for Wireless Body Area Networks. 1752-1759 - Wenzheng Zhang, Zirui Qiao, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Continuous Leakage-Amplified Public-Key Encryption With CCA Security. 1760-1775 - Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo:
A New Code-Based Blind Signature Scheme. 1776-1786 - Suliman Mohamed Fati:
Detecting Cyberbullying across Social Media Platforms in Saudi Arabia Using Sentiment Analysis: A Case Study. 1787-1794 - Antony Jaya Mabel Rani, Albert Pravin:
Optimization Enabled Black Hole Entropic Fuzzy Clustering Approach for Medical Data. 1795-1811 - T. Daniya, S. Vigneshwari:
Deep Neural Network for Disease Detection in Rice Plant Using the Texture and Deep Features. 1812-1825 - Shujiao Cao, Rui Xue:
The (Im)Possibility on Constructing Verifiable Random Functions. 1826-1845 - Yanbo Wang, Fasheng Wang, Chang Wang, Fuming Sun, Jianjun He:
Learning Saliency-Aware Correlation Filters for Visual Tracking. 1846-1859 - Pradeep Krishnadoss, L. Javid Ali, Gobalakrishnan Natesan, C. J. Raman, Manikandan Nanjappan:
CWOA: Hybrid Approach for Task Scheduling in Cloud Environment. 1860-1873 - Shiying Wang, Xiaolei Ma:
The Matching Preclusion of Enhanced Hypercubes. 1874-1890 - Maximiliano Cristiá, Ricardo D. Katz, Gianfranco Rossi:
Proof Automation in the Theory of Finite Sets and Finite Set Relation Algebra. 1891-1903 - Lavanya Ravala, Rajini G. K:
Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network. 1904-1922 - V. Betcy Thanga Shoba, I. Shatheesh Sam:
Aging Facial Recognition for Feature Extraction Using Adaptive Fully Recurrent Deep Neural Learning. 1923-1936 - Yonghong Hou, Lin Xue, Shuo Li, Jiaming Xing:
Corrigendum: User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming. 1937 - Juan Li, Dandan Xiao, Ting Zhang, Chun Liu, Yuan-Xiang Li, Gaige Wang:
Corrigendum to: Multi-Swarm Cuckoo Search Algorithm with Q-Learning Model. 1938
Volume 65, Number 8, August 2022
- Di Yan, Hanlin Liu, Shuoyao Zhao, Yu Yu:
On the Hardness of Sparsely Learning Parity with Noise. 1939-1947 - Ping Yu, Wei Ni, Hua Zhang, Ren Ping Liu, Qiaoyan Wen, Wenmin Li, Fei Gao:
Secure and Differentiated Fog-Assisted Data Access for Internet of Things. 1948-1963 - Zhen Bao Fan, Yi-Na Li, Kang Zhang, Jinhui Yu, Mao Lin Huang:
Measuring and Evaluating the Visual Complexity Of Chinese Ink Paintings. 1964-1976 - Rung-Shiang Cheng, Yin-Ming Li, Chung-Ming Huang:
The Collision Avoidance and Situation-Aware Media Access Scheme Using the Registered-Backoff-Time Method for the IEEE 802.11ah-Based IoT Wireless Networks. 1977-1997 - Morteza Rakhshaninejad, Mohammad Fathian, Babak Amiri, Navid Yazdanjue:
An Ensemble-Based Credit Card Fraud Detection Algorithm Using an Efficient Voting Strategy. 1998-2015 - Zhenghao Zhang, Jianbin Huang, Qinglin Tan:
Multi-view Dynamic Heterogeneous Information Network Embedding. 2016-2033 - Yifan Xia, Baosheng Liang, Zhaotong Li, Song Gao:
Gaze Estimation Using Neural Network And Logistic Regression. 2034-2043 - Veruska Borges Santos, Carlos Eduardo S. Pires, Dimas Cassimiro do Nascimento, Andreza Raquel Monteiro de Queiroz:
A Decision Tree Ensemble Model for Predicting Bus Bunching. 2044-2062 - Sujuan Li, Futai Zhang:
eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage. 2063-2072 - Luis H. M. Sepulvene, Isabela Drummond, Bruno Tardiole Kuehne, Rafael M. D. Frinhani, Dionisio Machado Leite Filho, Maycon L. M. Peixoto, Stephan Reiff-Marganiec, Bruno G. Batista:
Performance Evaluation of Machine Learning Techniques for Fault Diagnosis in Vehicle Fleet Tracking Modules. 2073-2086 - Hussein El Ghor, Maryline Chetto:
Optimal Real-Time Scheduling Algorithm for Wireless Sensors with Regenerative Energy. 2087-2097 - May S. Altulyan, Lina Yao, Xianzhi Wang, Chaoran Huang, Salil S. Kanhere, Quan Z. Sheng:
A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions. 2098-2132 - Taotao Li, Dequan Li, Mingsheng Wang:
Blockchain-based Fair and Decentralized Data Trading Model. 2133-2145 - Maher Alrahhal, Supreethi K. P.:
COVID-19 Diagnostic System Using Medical Image Classification and Retrieval: A Novel Method for Image Analysis. 2146-2163 - Weidong Wang, Xiaofeng Li, He Zhao:
DCAF: Dynamic Cross-Chain Anchoring Framework using Smart Contracts. 2164-2182 - R. Vinoth, J. P. Ananth:
Rider Chicken Optimization Algorithm-Based Recurrent Neural Network for Big Data Classification in Spark Architecture. 2183-2196 - Mengjie Lv, Jianxi Fan, Jingya Zhou, Jia Yu, Xiaohua Jia:
The Reliability of k-Ary n-Cube Based on Component Connectivity. 2197-2208 - Xue Zhang, Zhongxiang Zheng, Anyu Wang:
A Refinement of Key Mismatch Attack on NewHope. 2209-2220 - Lin Jiao, Yongqiang Li, Shaoyu Du:
Guess-and-Determine Attacks on AEGIS. 2221-2230 - Fusong Xiong, Jian Zhang, Yun Ling, Zhiqiang Zhang:
A Novel Image Thresholding Method Combining Entropy With Parzen Window Estimation. 2231-2244 - Muhammad Sajid, Nouman Ali, Naeem Iqbal Ratyal, Muhammad Usman, Faisal Mehmood Butt, Imran Riaz, Usman Musaddiq, Mirza Jabbar Aziz Baig, Shahbaz Baig, Umair Ahmad Salaria:
Corrigendum to: Deep Learning in Age-invariant Face Recognition: A Comparative Study. 2245
Volume 65, Number 9, September 2022
- Zheng Xu, Yongqiang Li, Mingsheng Wang:
Observations on the Security of COMET. 2247-2261 - Yanan Cheng, Tingting Chai, Zhaoxin Zhang, Keyu Lu, Yuejin Du:
Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules. 2262-2275 - Keyu Lu, Tingting Chai, Haiyan Xu, Shitala Prasad, Jianen Yan, Zhaoxin Zhang:
Research on Unexpected DNS Response from Open DNS Resolvers. 2276-2298 - Charles Bouillaguet, Florette Martinez, Damien Vergnaud:
Cryptanalysis of Modular Exponentiation Outsourcing Protocols. 2299-2314 - B. Janardhana Rao, Y. Chakrapani, S. Srinivas Kumar:
Hybridized Cuckoo Search with Multi-Verse Optimization-Based Patch Matching and Deep Learning Concept for Enhancing Video Inpainting. 2315-2338 - Shanshan Yin, Liqiong Xu:
On the g-Extra Connectivity of the Enhanced Hypercubes. 2339-2346 - Yucheng Wang, Yuhao Yi, Wanyue Xu, Zhongzhi Zhang:
Modeling Higher-Order Interactions in Complex Networks by Edge Product of Graphs. 2347-2359 - Salim El Khediri, Adel Thaljaoui, Fayez Alfayez:
A Novel Decision-Making Process for COVID-19 Fighting Based on Association Rules and Bayesian Methods. 2360-2376 - Binlei Cai, Qin Guo, Junfeng Yu:
LraSched: Admitting More Long-Running Applications via Auto-Estimating Container Size and Affinity. 2377-2391 - Sadia Sharmin:
An Experimental Approach to Exact and Random Boolean-Widths and Their Comparison with Other Width Parameters. 2392-2399 - Pingyuan Zhang, Han Jiang, Zhihua Zheng, Hao Wang, Qiuliang Xu:
A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort. 2400-2410 - Manman Li, Shaozhen Chen:
Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC. 2411-2420 - Meenakshi Kansal, Amit Kumar Singh, Ratna Dutta:
Efficient Multi-Signature Scheme Using Lattice. 2421-2429 - Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu:
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things. 2430-2438 - Yoganand S, Chithra S:
Bat Ant Lion Optimization-Based Generative Adversarial Network For Structural Heath Monitoring In IoT. 2439-2453 - Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li:
On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers. 2454-2469 - Fatiha Youbi, Nesma Settouti:
Analysis of Machine Learning and Deep Learning Frameworks for Opinion Mining on Drug Reviews. 2470-2483 - Tarek Moulahi:
Joining Formal Concept Analysis to Feature Extraction for Data Pruning in Cloud of Things. 2484-2492 - Bashar Al-Shboul, Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Thar Baker:
Social Network Analysis of the Panama Papers Concentrating on the MENA Region. 2493-2505 - Gurukumar Lokku, Gangireddy Harinatha Reddy, M. N. Giri Prasad:
Optimized Scale-Invariant Feature Transform with Local Tri-directional Patterns for Facial Expression Recognition with Deep Learning Model. 2506-2527 - Xiaowang Li, Shuming Zhou, Tianlong Ma, Xia Guo, Xiangyu Ren:
The h-Restricted Connectivity of a Class of Hypercube-Based Compound Networks. 2528-2534 - Abidin Çaliskan:
A New Ensemble Approach for Congestive Heart Failure and Arrhythmia Classification Using Shifted One-Dimensional Local Binary Patterns with Long Short-Term Memory. 2535-2546
Volume 65, Number 10, October 2022
- Rajalakshmi Shenbaga Moorthy, Parameswaran Pabitha:
Accelerating Analytics Using Improved Binary Particle Swarm Optimization for Discrete Feature Selection. 2547-2569 - Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang:
Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification. 2570-2588 - Muhammad Inaam Ul Haq, Qianmu Li, Jun Hou:
Analyzing the Research Trends of IoT Using Topic Modeling. 2589-2609 - Michael H. Albert, Vincent Vatter:
How Many Pop-Stacks Does It Take To Sort A Permutation? 2610-2614 - Zhiyao Li, Wei Liu, Xiaofeng Gao, Guihai Chen:
Friends-Based Crowdsourcing: Algorithms For Task Dissemination Over Social Groups. 2615-2630 - Elif Ustundag Soykan, Leyli Karaçay, Zeki Bilgin, Emrah Tomur, Mehmet Akif Ersoy, Ferhat Karakoç, Pinar Çomak:
Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data. 2631-2640 - Mohsen Salehi, Jafar Razmara, Shahriar Lotfi, Farnaz Mahan:
A One-Dimensional Probabilistic Convolutional Neural Network for Prediction of Breast Cancer Survivability. 2641-2653 - Mehmet Akif Bülbül, Celal Öztürk, Mehmet Fatih Isik:
Optimization of Climatic Conditions Affecting Determination of the Amount of Water Needed by Plants in Relation to Their Life Cycle with Particle Swarm Optimization, and Determining the Optimum Irrigation Schedule. 2654-2663 - Shefali Gupta, Ankit Goel, Meenu Dave:
Tunicate Swarm Magnetic Optimization With Deep Convolution Neural Network For Collaborative Filter Recommendation. 2664-2677 - S. Guruvammal, T. Chellatamilan, L. Jegatha Deborah:
Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning. 2678-2692 - Xiaoyang Liu, Xiang Li:
A Social Network Link Prediction Method Based on Stacked Generalization. 2693-2708 - Pramod Ganapathi, Rezaul Chowdhury:
Parallel Divide-and-Conquer Algorithms for Bubble Sort, Selection Sort and Insertion Sort. 2709-2719 - Yanzhao Shen, Ting Wu, Gaoli Wang, Xinfeng Dong, Haifeng Qian:
Improved Collision Detection Of MD5 Using Sufficient Condition Combination. 2720-2729 - Vikas Chaurasia, Saurabh Pal:
Ensemble Technique to Predict Breast Cancer on Multiple Dataset. 2730-2740 - Ayoub Lahmidi, Khalid Minaoui, Chouaib Moujahdi, Mohammed Rziza:
Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons. 2741-2754 - María Magdalena Payeras Capellà, Macià Mut Puigserver, Miquel A. Cabot-Nadal, Llorenç Huguet i Rotger:
Blockchain-Based Confidential Multiparty Contract Signing Protocol Without TTP Using Elliptic Curve Cryptography. 2755-2768 - Milad Seddigh, Hadi Soleimany:
Flush+Reload Attacks on SEED. 2769-2779 - Amel Mammar, Lazhar Hamel, Mohamed Graiet:
An Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications. 2780-2800 - Sohei Ito, Kenji Osari, Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki:
Efficient Realizability Checking by Modularization of LTL Specifications. 2801-2814 - Muhammad Asif, Maaz Bin Ahmad, Shiza Mushtaq, Khalid Masood, Toqeer Mahmood, Arfan Ali Nagra:
Long Multi-digit Number Recognition from Images Empowered by Deep Convolutional Neural Networks. 2815-2827 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation. 2828-2844 - M. KrishnaSiva Prasad, Poonam Sharma:
Corrigendum to: Similarity of Sentences With Contradiction Using Semantic Similarity Measures. 2845 - Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai:
Erratum to: MoG: Behavior-Obfuscation Resistance Malware Detection. 2846
Volume 65, Number 11, November 2022
- Honghao Gao, Zhiyuan Tan:
Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses. 2847-2848 - Zhuo Lv, Hongbo Cao, Feng Zhang, Yuange Ren, Bin Wang, Cen Chen, Nuannuan Li, Hao Chang, Wei Wang:
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT. 2849-2859 - Qingkui Zeng, Liwen Zhou, Zhuotao Lian, Huakun Huang, Jung Yoon Kim:
Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things. 2860-2869 - Jin Cao, Liwei Lin, Ruhui Ma, Haibing Guan, Mengke Tian, Yong Wang:
An Efficient Deep Learning Approach To IoT Intrusion Detection. 2870-2879 - Yan Liu, Haisheng Yu, Wenyong Wang, Sai Zou, Dong Liu, Daobiao Gong, Zhen Li:
A Robust Blockchain-Based Distribution Master For Distributing Root Zone Data In DNS. 2880-2893 - Zhaodi Zhang, Jing Liu, Min Zhang, Haiying Sun:
Efficient Robustness Verification of the Deep Neural Networks for Smart IoT Devices. 2894-2908 - Peng Chen, Hongyun Liu, Ruyue Xin, Thierry Carval, Jiale Zhao, Yunni Xia, Zhiming Zhao:
Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model. 2909-2925 - Minxian Wang, Zijian Zhang, Jialing He, Feng Gao, Meng Li, Shubin Xu, Liehuang Zhu:
Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin. 2926-2938 - Jiawei Wu, Huangfei Cheng, Bin Cao, Jiaxing Wang, Jing Fan:
ASCUE: An Adversarial Network-Based Semantical Conformance Checking Method for Unsupervised Event Extraction in Social Internet of Things. 2939-2952 - Peng Zhang, Baoxi Liu, Tun Lu, Hansu Gu, Xianghua Ding, Ning Gu:
A Semantic Embedding Enhanced Topic Model For User-Generated Textual Content Modeling In Social Ecosystems. 2953-2968 - Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu:
Evaluating Membership Inference Through Adversarial Robustness. 2969-2978
Volume 65, Number 12, December 2022
- Yifeng Wang, Baolei Cheng, Jianxi Fan, Yu Qian, Ruofan Jiang:
An Algorithm to Construct Completely Independent Spanning Trees in Line Graphs. 2979-2990 - Lin Zhu, Wen Ming Li, Liang Feng Zhang:
On the Modulus in Matching Vector Codes. 2991-2997 - Ha Thi Thu Doan, Kazuhiro Ogata:
Specifying and Model Checking Distributed Control Algorithms at Meta-level. 2998-3019 - Gongxian Zeng, Meiqi He, Siu-Ming Yiu, Zhengan Huang:
A Self-Tallying Electronic Voting Based on Blockchain. 3020-3034 - Alan Ramírez-Noriega, Reyes Juárez-Ramírez, Juan Carlos Leyva López, Samantha Jiménez, J. Francisco Figueroa Pérez:
A Method for Building the Quantitative and Qualitative Part of Bayesian Networks for Intelligent Tutoring Systems. 3035-3048 - Parvin Rastegari, Willy Susilo:
On Random-Oracle-Free Top-Level Secure Certificateless Signature Schemes. 3049-3061 - Mingjiang Huang, Zhen Xu, Liming Wang:
On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers. 3062-3080 - Pham The Bao, Tran Anh Tuan, Le Nhi Lam Thuy, Jin Young Kim, João Manuel R. S. Tavares:
White Matter, Gray Matter and Cerebrospinal Fluid Segmentation from Brain Magnetic Resonance Imaging Using Adaptive U-Net and Local Convolutional Neural Network. 3081-3090 - Mabin Joseph, Gautham Sekar, R. Balasubramanian, G. Venkiteswaran:
On the Security of the Stream Ciphers RCR-64 and RCR-32. 3091-3099 - Wenbin Chen, Jianer Chen:
Approximating Closest Vector Problem in ℓ∞-Norm Revisited. 3100-3105 - Zhiyao Li, Siru Ouyang, Xiaofeng Gao, Guihai Chen:
Two-Hop Relay Deployment Based on User Trajectory in Wireless Networks. 3106-3122 - Ehsan Ataie, Athanasia Evangelinou, Eugenio Gianniti, Danilo Ardagna:
A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications. 3123-3140 - Qi Bao, Wanyue Xu, Zhongzhi Zhang:
Benchmark for Discriminating Power of Edge Centrality Metrics. 3141-3155 - Lina Ba, Heping Zhang:
The Star-Structure Connectivity and Star-Substructure Connectivity of Hypercubes and Folded Hypercubes. 3156-3166 - Narayana Satyala, Suresh Babu Chandanapalli, Mekala Srinivasa Rao, Kalyanapu Srinivas:
Ant Cat Swarm Optimization-Enabled Deep Recurrent Neural Network for Big Data Classification Based on Map Reduce Framework. 3167-3180 - Mohan Kumar Chandol, M. Kameswara Rao:
Border Collie Cat Optimization for Intrusion Detection System in Healthcare IoT Network Using Deep Recurrent Neural Network. 3181-3198 - Yi Yi, Jianxi Fan, Baolei Cheng, Yan Wang, Jia Yu:
The 3-Extra Connectivity of the Data Center Network BCube. 3199-3208 - Pooja Shashank Pol, Vinod Keshaorao Pachghare:
Quality of Service Estimation Enabled With Trust-Based Resource Allocation in Collaborative Cloud Using Improved Grey Wolf Optimization. 3209-3222 - Fucai Luo, Saif M. Al-Kuwari, Changlu Lin, Fuqun Wang, Kefei Chen:
Provable Data Possession Schemes from Standard Lattices for Cloud Computing. 3223-3239 - Muthukumaran Vijayakarthick, Eganathan Sivaraman, Santhanam Sathishbabu, Natarajan Vinoth, S. N. Sivaraj:
Modelling and Predictive Analytics of COVID-19 Transmission Using Gustafson-Kessel Fuzzy Clustering Approach. 3240-3249 - S. Arul Antran Vijay, V. Jothi Prakash:
A Modified Firefly Deep Ensemble for Microarray Data Classification. 3265-3274
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.