default search action
Journal of King Saud University - Computer and Information Sciences, Volume 34
Volume 34, Number 1, January 2022
- Abdul Razaque, Syed Rizvi, Meer Jaro Khan, Muder Almiani, Amer Al-Rahayfeh:
State-of-art review of information diffusion models and their impact on social network vulnerabilities. 1275-1294 - Patrick Kwabena Mensah, Adebayo Felix Adekoya, Mighty Abra Ayidzoe, Edward Y. Baagyire:
Capsule Networks - A survey. 1295-1310
- A. N. M. JayaLakshmi, K. V. Krishna Kishore:
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib. 1311-1319 - L. B. Krithika, G. G. Lakshmi Priya:
MAFONN-EP: A Minimal Angular Feature Oriented Neural Network based Emotion Prediction system in image processing. 1320-1329 - Aziz Qaroush, Bassam Jaber, Khader Mohammad, Mahdi Washaha, Eman Maali, Nibal Nayef:
An efficient, font independent word and character segmentation algorithm for printed Arabic text. 1330-1344 - Rusul Nabeel, Mohammed H. Al-Jammas:
The GOP Inter Prediction of H.264 AV\C. 1345-1351 - M. Anousouya Devi, J. I. Sheeba, K. Suresh Joseph:
Neutrosophic graph cut-based segmentation scheme for efficient cervical cancer detection. 1352-1360 - Pradip Salve, Pravin L. Yannawar, Milind Sardesai:
Multimodal plant recognition through hybrid feature fusion technique using imaging and non-imaging hyper-spectral data. 1361-1369 - Soufiane Khedairia, Mohamed Tarek Khadir:
A multiple clustering combination approach based on iterative voting process. 1370-1380 - Hussein Abdel-Mawgoud, Salah Kamel, Juan Yu, Francisco Jurado:
Hybrid Salp Swarm Algorithm for integrating renewable distributed energy resources in distribution systems considering annual load growth. 1381-1393 - N. V. S. Lakshmipathi Raju, M. N. Seeta Ramanath, P. Srinivasa Rao:
An enhanced dynamic KC-slice model for privacy preserving data publishing with multiple sensitive attributes by inducing sensitivity. 1394-1406 - Radwa M. K. Saeed, Sherine Rady, Tarek F. Gharib:
An ensemble approach for spam detection in Arabic opinion texts. 1407-1416 - Manreet Sohal, Sandeep Sharma:
BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. 1417-1425 - Altaf Alaoui, Dakki Mohamed, Soumia Ziti, Badia Ettaki, Jamal Zerouaoui:
Model for data codification in hierarchical classifications with application to the biodiversity domain. 1426-1433 - Sanjaya Kumar Panda, Shradha Surachita Nanda, Sourav Kumar Bhoi:
A pair-based task scheduling algorithm for cloud computing environment. 1434-1445 - Ahmed Farag, Hatem Abd El-Kader, Rashed K. Salem:
Parallel graph-based anomaly detection technique for sequential data. 1446-1454 - Deena P. Francis, Kumudha Raimond:
A practical streaming approximate matrix multiplication algorithm. 1455-1465 - Shikha Mehta, Parul Agarwal, Prakhar Shrivastava, Jharna Barlawala:
Differential bond energy algorithm for optimal vertical fragmentation of distributed databases. 1466-1471 - Zouhaier Brahmia, Hind Hamrouni, Rafik Bouaziz:
TempoX: A disciplined approach for data management in multi-temporal and multi-schema-version XML databases. 1472-1488 - Sai Krishna Mothku, Rashmi Ranjan Rout:
Fuzzy logic based adaptive duty cycling for sustainability in energy harvesting sensor actor networks. 1489-1497 - Kamel Aizi, Mohamed Ouslim:
Score level fusion in multi-biometric identification based on zones of interest. 1498-1509 - C. Kalaiarasy, N. Sreenath:
An incentive-based co-operation motivating pseudonym changing strategy for privacy preservation in mixed zones in vehicular networks. 1510-1520 - Myat Cho Mon Oo, Thandar Thein:
An efficient predictive analytics system for high dimensional big data. 1521-1532 - Sakshi Dhall, Saibal K. Pal, Kapil Sharma:
A chaos-based probabilistic block cipher for image encryption. 1533-1543
Volume 34, Number 2, February 2022
- Anureet Kaur, Kulwant Kaur:
Systematic literature review of mobile application development and testing effort estimation. 1-15 - Martin Luther Mfenjou, Ado Adamou Abba Ari, Arouna Ndam Njoya, David Jaurès Fotsa-Mbogne, Kolyang, Wahabou Abdou, François Spies:
Control points deployment in an Intelligent Transportation System for monitoring inter-urban network roadway. 16-26 - Vishal Kumar Arora, Vishal Sharma, Monika Sachdeva:
On QoS evaluation for ZigBee incorporated Wireless Sensor Network (IEEE 802.15.4) using mobile sensor nodes. 27-35 - Aya H. Allam, Mohamed Taha, Hala H. Zayed:
Enhanced Zone-Based Energy Aware Data Collection Protocol for WSNs (E-ZEAL). 36-46 - Aya Ayadi, Oussama Ghorbel, M. S. Ben Saleh, Mohamed Abid:
A framework of monitoring water pipeline techniques based on sensors technologies. 47-57 - P. Shamna, V. K. Govindan, K. A. Abdul Nazeer:
Content-based medical image retrieval by spatial matching of visual words. 58-71 - Meera Doshi, Prakash Gajjar, Ashish Kothari:
Zoom based image super-resolution using DCT with LBP as characteristic model. 72-85 - Md Shamim Hossain:
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images. 86-94 - Anisha M. Lal, S. Margret Anouncia:
Modernizing the multi-temporal multispectral remotely sensed image change detection for global maxima through binary particle swarm optimization. 95-103 - De Rosal Ignatius Moses Setiadi:
Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. 104-114 - Abhishek Bal, Minakshi Banerjee, Amlan Chakrabarti, Punit Sharma:
MRI Brain Tumor Segmentation and Analysis using Rough-Fuzzy C-Means and Shape Based Properties. 115-133 - Agnieszka Jastrzebska:
Time series classification through visual pattern recognition. 134-142 - Dande Anil Kumar, A. S. C. S. Sastry, P. V. V. Kishore, Kiran Kumar Eepuri:
3D sign language recognition using spatio temporal graph kernels. 143-152 - Muhammad Aminu, Noor Atinah Ahmad:
Locality preserving partial least squares discriminant analysis for face recognition. 153-164 - Priya Mariam Raju, Madhu S. Nair:
Copy-move forgery detection using binary discriminant features. 165-178 - Rami Mustafa A. Mohammad:
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime. 179-190 - Md Tarique Jamal Ansari, Dhirendra Pandey, Mamdouh Alenezi:
STORE: Security Threat Oriented Requirements Engineering Methodology. 191-203 - Lamiaa A. Elrefaei, Ashwaq M. Al-Mohammadi:
Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme. 204-217 - Mudasir Ahmad Wani, Suraiya Jabin:
Mutual clustering coefficient-based suspicious-link detection approach for online social networks. 218-231 - Abdul A. Orunsolu, Adesina S. Sodiya, A. T. Akinwale:
A predictive model for phishing detection. 232-247 - Dheeraj Malhotra, Om Prakash Rishi:
IMSS-P: An intelligent approach to design & development of personalized meta search & page ranking system. 248-263 - Ema Utami, Anggit Dwi Hartanto, Sumarni Adi, Irwan Oyong, Suwanto Raharjo:
Profiling analysis of DISC personality traits based on Twitter posts in Bahasa Indonesia. 264-269 - N. Arunachalam, A. Amuthan:
Improved Cosine Similarity-based Artificial Bee Colony Optimization scheme for reactive and dynamic service composition. 270-281 - Suvendu Chandan Nayak, Sasmita Parida, Chitaranjan Tripathy, Prasant Kumar Pattnaik:
An enhanced deadline constraint based task scheduling mechanism for cloud environment. 282-294 - Qurrat Ain, Muhammad Amir Mehmood:
Runtime performance evaluation and optimization of type-2 hypervisor for MIPS64 architecture. 295-307 - Sankalap Arora, Ranjit Kaur:
An escalated convergent firefly algorithm. 308-315 - Hichem Haouassi, Elkamel Merah, Mehdaoui Rafik, Maarouk Toufik Messaoud, Ouahiba Chouhal:
A new binary grasshopper optimization algorithm for feature selection problem. 316-328 - Allam Mohan, Malaiyappan Nandhini:
Optimal feature selection using binary teaching learning based optimization algorithm. 329-341 - Hajer Toumi, Zaki Brahmi, Mohamed Mohsen Gammoudi:
RTSLPS: Real time server load prediction system for the ever-changing cloud computing environment. 342-353 - Mutaz A. B. Al-Tarawneh, Amjed A. Al-Mousa:
Adaptive user-oriented fuzzy-based service broker for cloud services. 354-364 - Zubair Jeelani, Fasel Qadir:
Cellular automata-based approach for salt-and-pepper noise filtration. 365-374 - Kaavya Kanagaraj, G. G. Lakshmi Priya:
Curvelet transform based feature extraction and selection for multimedia event classification. 375-383 - Kasiprasad Mannepalli, Panyam Narahari Sastry, Maloji Suman:
Emotion recognition in speech signals using optimization based multi-SVNN classifier. 384-397 - Ismail Keshta:
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice. 398-407 - Mona Moradi, Mohammad Rahmanimanesh, Ali Shahzadi:
On evaluating the collaborative research areas: A case study. 408-420 - Ankita Gupta, Chetna Gupta:
CDBR: A semi-automated collaborative execute-before-after dependency-based requirement prioritization approach. 421-432 - Saeid Masoumi, Ali Mahjur:
A new way of crosscutting roles in set oriented programming. 433-442 - Debashreet Das, Chita Ranjan Tripathy, Pradyumna Kumar Tripathy, Manas Ranjan Kabat:
A Genetic Algorithm based approach for designing multi-state computational grid with cost and bandwidth constraints. 443-456 - R. Padmanaban, M. Thirumaran, P. Anitha, A. Moshika:
Computability evaluation of RESTful API using Primitive Recursive Function. 457-467 - Gebeyehu Belay Gebremeskel, Birhanu Hailu Belay, Belete Biazen:
Architecture and optimization of data mining modeling for visualization of knowledge extraction: Patient safety care. 468-479 - Guru Prasad Bhandari, Ratneshwer Gupta:
Dependency-based fault diagnosis approach for SOA-based systems using Colored Petri Nets. 480-491 - M. Chennakesavulu, T. Jayachandra Prasad, V. Sumalatha:
Data encoding techniques to improve the performance of System on Chip. 492-503
Volume 34, Number 3, March 2022
- Anwar Shah, Javed Iqbal Bangash, Abdul Waheed Khan, Imran Ahmed, Abdullah Khan, Asfandyar Khan, Arshad Khan:
Comparative analysis of median filter and its variants for removal of impulse noise from gray scale images. 505-519 - Pawan Kumar Upadhyay, Satish Chandra:
An improved bag of dense features for skin lesion recognition. 520-525 - Md. Mahmodul Hasan, Nazrul Islam, Mohammad Motiur Rahman:
Gastrointestinal polyp detection through a fusion of contourlet transform and Neural features. 526-533 - Kavitha A. V., Srikrishna Atluri, Satyanarayana Ch.:
Crop image classification using spherical contact distributions from remote sensing images. 534-545 - Fahima Tabassum, Md. Imdadul Islam, Risala Tasin Khan, M. Ruhul Amin:
Human face recognition with combination of DWT and machine learning. 546-556 - C. Jaspin Jeba Sheela, G. Suganthi:
Automatic Brain Tumor Segmentation from MRI using Greedy Snake Model and Fuzzy C-Means Optimization. 557-566 - Ivan William Harsono, Suryadiputra Liawatimena, Tjeng Wawan Cenggoro:
Lung nodule detection and classification from Thorax CT-scan using RetinaNet with transfer learning. 567-577 - Aparna, Yukti Bhatia, Rachna Rai, Varun Gupta, Naveen Aggarwal, Aparna Akula:
Convolutional neural networks based potholes detection using thermal imaging. 578-588 - Leena Mary Francis, N. Sreenath:
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine. 589-604 - Dhani Ariatmanto, Ferda Ernawan:
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking. 605-614 - Vipul Sharma, Roohie Naaz Mir:
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. 615-626 - Subiono, Joko Cahyono, Dieky Adzkiya, Bijan Davvaz:
A cryptographic algorithm using wavelet transforms over max-plus algebra. 627-635 - Subhadeep Koley:
A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography. 636-645 - Ismail Boucherit, Mohamed Ould-Zmirli, Hamza Hentabli, Bakhtiar Affendi Rosdi:
Finger vein identification using deeply-fused Convolutional Neural Network. 646-656 - Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan:
Multi-level Fuzzy system for usable-security assessment. 657-665 - Anak Agung Gde Agung, Rini Handayani:
Blockchain for smart grid. 666-675 - N. Sasikaladevi, K. Geetha, A. Revathi:
EMOTE - Multilayered encryption system for protecting medical images based on binary curve. 676-686 - Stéphane Cédric Koumétio Tékouabou, El Arbi Abdellaoui Alaoui, Walid Cherif, Hassan Silkan:
Improving parking availability prediction in smart cities with IoT and ensemble-based model. 687-697 - Akber Ali Khan, Vinod Kumar, Musheer Ahmad:
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. 698-705 - Gandeva Bayu Satrya, Soo Young Shin:
Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks. 706-715 - Kale Navnath Dattatraya, K. Raghava Rao:
Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN. 716-726 - Shahan Yamin Siddiqui, Muhammad Adnan Khan, Sagheer Abbas, M. Farrukh Khan:
Smart occupancy detection for road traffic parking using deep extreme learning machine. 727-733 - Anvesha Katti:
Target coverage in random wireless sensor networks using cover sets. 734-746 - Marwa K. Elteir, Shaimaa Lazem, Mohamed Azab:
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study. 747-756 - Sheikh Fahad Ahmad, Deepak Kumar Singh:
Automatic detection of tree cutting in forests using acoustic properties. 757-763 - Mohammad K. Nammous, Khalid Saeed, Pawel Kobojek:
Using a small amount of text-independent speech data for a BiLSTM large-scale speaker identification approach. 764-770 - P. K. Athira, C. J. Sruthi, A. Lijiya:
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario. 771-781 - Obed Appiah, Michael Asante, James Benjamin Hayfron-Acquah:
Improved approximated median filter algorithm for real-time computer vision applications. 782-792 - Taushif Anwar, V. Uma:
CD-SPM: Cross-domain book recommendation using sequential pattern mining and rule mining. 793-800 - Dede Rohidin, Noor Azah Samsudin, Mustafa Mat Deris:
Association rules of fuzzy soft set based classification for text classification problem. 801-812 - Amanpreet Kaur, Bikrampal Kaur:
Load balancing optimization based on hybrid Heuristic-Metaheuristic techniques in cloud environment. 813-824 - Rojalina Priyadarshini, Rabindra Kumar Barik:
A deep learning based intelligent framework to mitigate DDoS attack in fog environment. 825-831 - Kareem Kamal A. Ghany, Amr Mohamed AbdelAziz, Taysir Hassan A. Soliman, Adel Abu El-Magd Sewisy:
A hybrid modified step Whale Optimization Algorithm with Tabu Search for data clustering. 832-839 - Ali Sabah Abdulameer, Sabrina Tiun, Nor Samsiah Sani, Masri Ayob, Adil Yaseen Taha:
Enhanced clustering models with wiki-based k-nearest neighbors-based representation for web search result clustering. 840-850 - Mamta Kayest, Sanjay Kumar Jain:
Optimization driven cluster based indexing and matching for the document retrieval. 851-861 - Saiteja Prasad Chatrati, Gahangir Hossain, Ayush Goyal, Anupama Bhan, Sayantan Bhattacharya, Devottam Gaurav, Sanju Mishra Tiwari:
Smart home health monitoring system for predicting type 2 diabetes and hypertension. 862-870 - Abdelaziz I. Hammouri:
A modified biogeography-based optimization algorithm with guided bed selection mechanism for patient admission scheduling problems. 871-879 - Rasmita Dash, Rajashree Dash, Rasmita Rautray:
An evolutionary framework based microarray gene selection and classification approach using binary shuffled frog leaping algorithm. 880-891 - Ahmed Aziz, Walid Osamy, Ahmed M. Khedr, Ahmed Salim:
Iterative selection and correction based adaptive greedy algorithm for compressive sensing reconstruction. 892-900 - Abid Ismail, K. S. Kuppusamy:
Web accessibility investigation and identification of major issues of higher education websites with statistical measures: A case study of college websites. 901-911 - Md. Shahidul Islam, Md. Rafiqul Islam:
A hybrid framework based on genetic algorithm and simulated annealing for RNA structure prediction with pseudoknots. 912-922 - R. Sakthi Murugan, V. S. Ananthanarayana:
WordCode using WordTrie. 923-933 - Ensaf Hussein Mohamed, Eyad Mohamed Shokry:
QSST: A Quranic Semantic Search Tool based on word embedding. 934-945 - Anureet Kaur, Kulwant Kaur:
A COSMIC function points based test effort estimation model for mobile applications. 946-963 - Bata Krishna Tripathy, Kshira Sagar Sahoo, Ashish Kr. Luhach, N. Z. Jhanjhi, Swagat Kumar Jena:
A virtual execution platform for OpenFlow controller using NFV. 964-971 - Sharmila Subudhi, Suvasini Panigrahi:
Application of OPTICS and ensemble learning for Database Intrusion Detection. 972-981 - Jihene Younes, Hadhemi Achour, Emna Souissi, Ahmed Ferchichi:
Romanized Tunisian dialect transliteration using sequence labelling techniques. 982-992 - Sonali Pradhan, Mitrabinda Ray, Santosh Kumar Swain:
Transition coverage based test case generation from state chart diagram. 993-1002 - Samuel Asante Gyamerah:
On forecasting the intraday Bitcoin price using ensemble of variational mode decomposition and generalized additive model. 1003-1009
Volume 34, Number 4, April 2022
- Nouf Ibrahim Altmami, Mohamed El Bachir Menai:
Automatic summarization of scientific articles: A survey. 1011-1028 - Adhika Pramita Widyassari, Supriadi Rustad, Guruh Fajar Shidik, Edi Noersasongko, Abdul Syukur, Affandy Affandy, De Rosal Ignatius Moses Setiadi:
Review of automatic text summarization techniques & methods. 1029-1046 - Bam Bahadur Sinha, R. Dhanalakshmi:
Evolution of recommender paradigm optimization over time. 1047-1059 - Utkarsh Mahadeo Khaire, R. Dhanalakshmi:
Stability of feature selection algorithm: A review. 1060-1073 - Amer F. Al-Badarneh, Salahaldeen Atef Rababa:
An analysis of two-way equi-join algorithms under MapReduce. 1074-1085 - Punam Kumari, K. R. Seeja:
Periocular biometrics: A survey. 1086-1097 - Madhulika Yarlagadda, Gangadhara Rao Kancherla, Srikrishna Atluri:
Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering. 1098-1109 - Salha Alzahrani, Hanan Aljuaid:
Identifying cross-lingual plagiarism using rich semantic features and deep neural networks: A study on Arabic-English plagiarism cases. 1110-1123 - Hanane Zitouni, Souham Meshoul, Chaker Mezioud:
New contextual collaborative filtering system with application to personalized healthy nutrition education. 1124-1137 - Mantim Innocent Fale, Abdulsalam Ya'u Gital:
Dr. Flynxz - A First Aid Mamdani-Sugeno-type fuzzy expert system for differential symptoms-based diagnosis. 1138-1149 - Amina Boufrida, Zizette Boufaïda:
Rule extraction from scientific texts: Evaluation in the specialty of gynecology. 1150-1160 - Ghassen Hamdi, Abdelmoutia Telli, Mohamed Nazih Omri:
Querying of several DL-Lite knowledge bases from various information sources-based polynomial response unification approach. 1161-1171 - Sanjay Agrawal, Rutuparna Panda, Pranaba K. Mishro, Ajith Abraham:
A novel joint histogram equalization based image contrast enhancement. 1172-1182 - B. Rose Kavitha, C. Srimathi:
Benchmarking on offline Handwritten Tamil Character Recognition using convolutional neural networks. 1183-1190 - M. S. Safna Asiq, W. R. Sam Emmanuel:
Efficient colour filter array demosaicking with prior error reduction. 1191-1199 - Md. Tarek Habib, Md. Jueal Mia, Mohammad Shorif Uddin, Farruk Ahmed:
An in-depth exploration of automated jackfruit disease recognition. 1200-1209 - Amlan Jyoti Das, Navajit Saikia:
Design of pedestrian detectors using combinations of scale spaces and classifiers. 1210-1218 - Bouchra Honnit, Khaoula Belhaj Soulami, Mohamed Nabil Saidi, Ahmed Tamtaoui:
Moving objects multi-classification based on information fusion. 1219-1230 - Ranjeet Kumar, Utpreksh Patbhaje, Anil Kumar:
An efficient technique for image compression and quality retrieval using matrix completion. 1231-1239 - Leonardo Orazi, Barbara Reggiani:
A novel algorithm for a continuous and fast 3D projection of points on triangulated surfaces for CAM/CAD/CAE applications. 1240-1245 - Mahmoud E. Hodeish, Linas Bukauskas, Vikas T. Humbe:
A new efficient TKHC-based image sharing scheme over unsecured channel. 1246-1262 - Haider Ismael Shahadi, Ahmed Toman Thahab, Hameed R. Farhan:
A novel robust approach for image copyright protection based on concentric rectangles. 1263-1274 - Vani Krishnaswamy, Sunilkumar S. Manvi:
Palm tree structure based data aggregation and routing in underwater wireless acoustic sensor networks: Agent oriented approach. 1275-1284 - Mudassar Ali Syed, Raziuddin Syed:
Weighted Salp Swarm Algorithm and its applications towards optimal sensor deployment. 1285-1295 - Marziyeh Karimiyan Khouzani, Sadegh Sulaimany:
Identification of the effects of the existing network properties on the performance of current community detection methods. 1296-1304 - Pardeep Kumar, Seema Verma:
Implementation of modified OLSR protocol in AANETs for UDP and TCP environment. 1305-1311 - Shardha Porwal, Sangeeta Mittal:
HE3: A hierarchical attribute based secure and efficient things-to-fog content sharing protocol. 1312-1325 - Loganathan Jayakumar, S. Janakiraman:
A novel need based free channel selection scheme for cooperative CRN using EFAHP-TOPSIS. 1326-1342 - Norah Alanazi, Esam Khan, Adnan Gutub:
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses. 1343-1356 - Anuraj Singh, Sumit Raj:
Securing password using dynamic password policy generator algorithm. 1357-1361 - Tohari Ahmad, Alek Nur Fatman:
Improving the performance of histogram-based data hiding method in the video environment. 1362-1372 - Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar, Sunny Behal:
E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks. 1373-1387 - Adnan Alrabea:
A modified Boneh-Lynn-Shacham signing dynamic auditing in cloud computing. 1388-1394 - Aditya Kumar Sahu, Gandharba Swain:
High fidelity based reversible data hiding using modified LSB matching and pixel difference. 1395-1409 - Emna Benmohamed, Hela Ltifi, Mounir Ben Ayed:
ITNO-K2PC: An improved K2 algorithm with information-theory-centered node ordering for structure learning. 1410-1422 - Brijesh B. Mehta, Udai Pratap Rao:
Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing. 1423-1430 - Mohamed-Hamed Mousa, Mohamed-K. Hussein:
Surface approximation using GPU-based localized fourier transform. 1431-1438 - Chuya China Bhanja, Mohammad Azharuddin Laskar, Rabul Hussain Laskar, Sivaji Bandyopadhyay:
Deep neural network based two-stage Indian language identification system using glottal closure instants as anchor points. 1439-1454 - Lei Li, Zhaoqiang Xia, Jun Wu, Lei Yang, Huijian Han:
Face presentation attack detection based on optical flow and texture analysis. 1455-1467 - Maryam Shabbir, Fahad Ahmad, Ayesha Shabbir, Saad Awadh Alanazi:
Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution. 1468-1485 - Fawad Javaid, Anyi Wang, Muhammad Usman Sana, Hafiz Zameer ul Hassan, Imran Ashraf:
A dual channel and node mobility based cognitive approach to optimize wireless networks in coal mines. 1486-1497 - Desoky Abdelqawy, Abeer Elkorany, Amr Kamel, Soha Makady:
Hub-OS: An interoperable IoT computing platform for resources utilization with real-time support. 1498-1510 - Siddhant Sinha, Shambhavi Mishra, Vipul Kumar Mishra, Tanveer Ahmed:
Sector influence aware stock trend prediction using 3D convolutional neural network. 1511-1522 - Smita Athanere, Ramesh Thakur:
Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing. 1523-1534 - Xinyu Gao, Jun Mou, Santo Banerjee, Yinghong Cao, Li Xiong, Xiaoyang Chen:
An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map. 1535-1551 - Sheuli Chakraborty, Kaushik Mazumdar:
Sustainable task offloading decision using genetic algorithm in sensor mobile edge computing. 1552-1568 - Xiao Jian Tan, Wai Loon Cheor, Kwok Shien Yeo, Wai Zhe Leow:
Expert systems in oil palm precision agriculture: A decade systematic review. 1569-1594 - Partha Pratim Ray:
A review on TinyML: State-of-the-art and prospects. 1595-1623
Volume 34, Number 5, May 2022
- Mutasem K. Alsmadi, Ibrahim Almarashdeh:
A survey on fish classification techniques. 1625-1638 - Sunil Kumar, Krishna Kumar Mohbey:
A review on big data based parallel and distributed approaches of pattern mining. 1639-1662 - Mohd Saad Hamid, Nurulfajar Abd Manap, Rostam Affendi Hamzah, Ahmad Fauzan Kadmin:
Stereo matching algorithm based on deep learning: A survey. 1663-1673 - Zhihuo Xu, Hongchen Zhang, Yuexia Wang, Xiaoyue Wang, Shuaikang Xue, Weixue Liu:
Dynamic detection of offshore wind turbines by spatial machine learning from spaceborne synthetic aperture radar imagery. 1674-1686 - Vipul Sharma, Roohie Naaz Mir:
Saliency guided faster-RCNN (SGFr-RCNN) model for object detection and recognition. 1687-1699 - Priyadarshini Adyasha Pattanaik, Mohit Mittal, Mohammad Zubair Khan, Surya Narayan Panda:
Malaria detection using deep residual networks with mobile microscopy. 1700-1705 - Supriya Suresh, Subaji Mohan:
NROI based feature learning for automated tumor stage classification of pulmonary lung nodules using deep convolutional neural networks. 1706-1717 - Moses Apambila Agebure, Elkanah Olaosebikan Oyetunji, Edward Yellakuor Baagyere:
A three-tier road condition classification system using a spiking neural network model. 1718-1729 - Pallavi Pandey, K. R. Seeja:
Subject independent emotion recognition from EEG using VMD and deep learning. 1730-1738 - Leila Boussaad, Aldjia Boucetta:
An effective component-based age-invariant face recognition using Discriminant Correlation Analysis. 1739-1747 - J. Loveline Zeema, D. Francis Xavier Christopher:
Evolving Optimized Neutrosophic C means clustering using Behavioral Inspiration of Artificial Bacterial Foraging (ONCMC-ABF) in the Prediction of Dyslexia. 1748-1754 - Xiangyu Lu, Rui Yang, Jun Zhou, Jie Jiao, Fei Liu, Yufei Liu, Baofeng Su, Peiwen Gu:
A hybrid model of ghost-convolution enlightened transformer for effective diagnosis of grape leaf disease and pest. 1755-1767 - Adeel Shiraz Hashmi, Tanvir Ahmad:
GP-ELM-RNN: Garson-pruned extreme learning machine based replicator neural network for anomaly detection. 1768-1774 - Rubaiya Hafiz, Mohammad Reduanul Haque, Aniruddha Rakshit, Mohammad Shorif Uddin:
Image-based soft drink type classification and dietary assessment system using deep convolutional neural network with transfer learning. 1775-1784 - P. Anitha, Malini M. Patil:
RFM model for customer purchase behavior using K-Means algorithm. 1785-1792 - Rihem Mahmoud, Selma Belgacem, Mohamed Nazih Omri:
Deep signature-based isolated and large scale continuous gesture recognition approach. 1793-1807 - Mohammed Alweshah, Lobna Rababa, Mohammed Hashem Ryalat, Ammar Al Momani, Mohamed F. Ababneh:
African buffalo algorithm: Training the probabilistic neural network to solve classification problems. 1808-1818 - Kaoutar Ahed, Maria Benamar, Ayoub Ait Lahcen, Rajae El Ouazzani:
Forwarding strategies in vehicular named data networks: A survey. 1819-1835 - A. Amuthan, Ramu Kaviarasan:
Rank Criteria Improved Confidence-based centroid scheme for Non Line of Sight node localizations in vehicular networks. 1836-1844 - Tushar Kanta Samal, Sushree Chinmayee Patra, Manas Ranjan Kabat:
An adaptive cuckoo search based algorithm for placement of relay nodes in wireless body area networks. 1845-1856 - Aljapur Vinitha, Mulpuri Santhi Sri Rukmini, Dhirajsunehra:
Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. 1857-1868 - Kamal Berahmand, Sogol Haghani, Mehrdad Rostami, Yuefeng Li:
A new attributed graph clustering by using label propagation in complex networks. 1869-1883 - Richa Sharma, Vasudha Vashisht, Umang Singh:
Fuzzy modelling based energy aware clustering in wireless sensor networks using modified invasive weed optimization. 1884-1894 - Bandi Rambabu, Venugopal Reddy Ananthula, Sengathir Janakiraman:
Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSNs. 1895-1905 - Kapil Netaji Vhatkar, Girish P. Bhole:
Optimal container resource allocation in cloud architecture: A new hybrid model. 1906-1918 - Shikah J. Alsunaidi, Abdullah Mohammed Almuhaideb:
Investigation of the optimal method for generating and verifying the Smartphone's fingerprint: A review. 1919-1932 - P. Karthik, P. Shanthi Bala:
A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function. 1933-1949 - Benfano Soewito, Agung Suwandaru:
Android sensitive data leakage prevention with rooting detection using Java function hooking. 1950-1957 - Abhishek Kesarwani, Pabitra Mohan Khilar:
Development of trust based access control models using fuzzy logic in cloud computing. 1958-1967 - Olorunjube James Falana, Adesina Simon Sodiya, Saidat Adebukola Onashoga, Biodun Surajudeen Badmus:
Mal-Detect: An intelligent visualization approach for malware detection. 1968-1983 - S. H. Kok, Azween B. Abdullah, N. Z. Jhanjhi:
Early detection of crypto-ransomware using pre-encryption detection algorithm. 1984-1999 - R. Vidhya, M. Brindha:
A chaos based image encryption algorithm using Rubik's cube and prime factorization process (CIERPF). 2000-2016 - Fatuma Saeid Hassan, Adnan Gutub:
Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme. 2017-2030 - Rachana Yogesh Patil, Satish R. Devane:
Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime. 2031-2044 - Ahmed M. Manasrah, Thair Khdour, Raeda Freehat:
DGA-based botnets detection using DNS traffic mining. 2045-2061 - G. Kalyani, Shilpa Chaudhari:
Data privacy preservation in MAC aware Internet of things with optimized key generation. 2062-2071 - Md. Wahidur Rahman, Rahabul Islam, Arafat Hasan, Nasima Islam Bithi, Md. Mahmodul Hasan, Mohammad Motiur Rahman:
Intelligent waste management system using deep learning with IoT. 2072-2087 - Kanika Sharma, Alka Agrawal, Dhirendra Pandey, Raees Ahmad Khan, Shail Kumar Dinkar:
RSA based encryption approach for preserving confidentiality of big data. 2088-2097 - Aytug Onan:
Bidirectional convolutional recurrent neural network architecture with group-wise enhancement mechanism for text sentiment classification. 2098-2117 - Akhilesh Dwivedi, R. P. Pant:
An algorithmic implementation of entropic ternary reduct soft sentiment set (ETRSSS) using soft computing technique on big data sentiment analysis (BDSA) for optimal selection of a decision based on real-time update in online reviews. 2118-2130 - Zouaoui Samia, Khaled Rezeg:
Multi-Agents Indexing System (MAIS) for Plagiarism Detection. 2131-2140 - Deepa Anand, Rupali S. Wagh:
Effective deep learning approaches for summarization of legal texts. 2141-2150 - Siti Syakirah Sazali, Nurazzah Abdul Rahman, Zainab Abu Bakar:
Characteristics of Malay translated hadith corpus. 2151-2160 - Rizka W. Sholikah, Agus Zainal Arifin, Chastine Fatichah, Ayu Purwarianti:
Multi task learning with general vector space for cross-lingual semantic relation detection. 2161-2169 - Zarmeen Nasim, Sajjad Haider:
Cluster analysis of urdu tweets. 2170-2179 - Allah Ditta, Muhammad Azeem, Shahid Naseem, Khurram Gulzar Rana, Muhammad Adnan Khan, Zafar Iqbal:
A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode. 2180-2191 - Ashwani Kumar, Ravinder Kumar, Ashutosh Aggarwal:
S2RC: A multi-objective route planning and charging slot reservation approach for electric vehicles considering state of traffic and charging station. 2192-2206 - Bayadir A. Issa, Abdulmuttalib Turky Rashid:
Multi-robot control for a static polygon formation using Neighbor-Leader algorithm. 2207-2217 - Bhawna Saxena, Vikas Saxena:
Hurst exponent based approach for influence maximization in social networks. 2218-2230 - Nouran Ayman R. Abd Al-Azim, Tarek F. Gharib, Mohamed Hamdy, Yasmine M. Afify:
Influence propagation in social networks: Interest-based community ranking model. 2231-2243 - Bhawani Sankar Biswal, Anjali Mohapatra, Swati Vipsita:
Ensemble Neighborhood Search (ENS) for biclustering of gene expression microarray data and single cell RNA sequencing data. 2244-2251 - Abdullatif Baba:
A new design of a flying robot, with advanced computer vision techniques to perform self-maintenance of smart grids. 2252-2261 - Vishal Vyas, V. Uma, Kumar Ravi:
Aspect-based approach to measure performance of financial services using voice of customer. 2262-2270 - Omar M. Salih, Mohammed H. Rasheed, Mohammed M. Siddeq, Marcos A. Rodrigues:
Image compression for quality 3D reconstruction. 2271-2287 - Ankita Gupta, Chetna Gupta:
A novel collaborative requirement prioritization approach to handle priority vagueness and inter-relationships. 2288-2297 - Bilqis Amaliah, Chastine Fatichah, Erma Suryani:
A new heuristic method of finding the initial basic feasible solution to solve the transportation problem. 2298-2307
Volume 34, Number 6, Part A, June 2022
- Saydul Akbar Murad, Abu Jafar Md Muzahid, Zafril Rizal M. Azmi, Md Imdadul Hoque, Md. Kowsher:
A review on job scheduling technique in cloud computing and priority rule based intelligent framework. 2309-2331 - Uttam Kumar Jena, Pradipta Kumar Das, Manas Ranjan Kabat:
Hybridization of meta-heuristic algorithm for load balancing in cloud computing environment. 2332-2342 - Danish Ahamad, Shabi Alam Hameed, Md. Mobin Akhtar:
A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. 2343-2358 - Koneti Kalyan Chakravarthi, L. Shyamala, Vaidehi V.:
TOPSIS inspired cost-efficient concurrent workflow scheduling algorithm in cloud. 2359-2369 - Seema A. Alsaidy, Amenah D. Abbood, Mouayad A. Sahib:
Heuristic initialization of PSO task scheduling algorithm in cloud computing. 2370-2382 - Kasturi Dhal, Satyananda Champati Rai, Prasant Kumar Pattnaik:
LIKC: A liberty of encryption and decryption through imploration from K-cloud servers. 2383-2390 - Ali Belgacem, Saïd Mahmoudi, Maria Kihl:
Intelligent multi-agent reinforcement learning model for resources allocation in cloud computing. 2391-2404 - Hanae Errousso, Jihane El Ouadi, El Arbi Abdellaoui Alaoui, Siham Benhadou, Hicham Medromi:
A hybrid modeling approach for parking assignment in urban areas. 2405-2418 - Shimaa A. Abdel Hakeem, Hanan H. Hussein, HyungWon Kim:
Vision and research directions of 6G technologies and applications. 2419-2442 - N. S. Saba Farheen, Anuj Jain:
Improved routing in MANET with optimized multi path routing fine tuned with hybrid modeling. 2443-2450 - Babatoundé O. Simon Biaou, Ayodeji O. Oluwatope, Helen O. Odukoya, Ajiboye Babalola, Oluwafolake E. Ojo, Eric Herbert Sossou:
Ayo game approach to mitigate free riding in peer-to-peer networks. 2451-2460 - Lyamine Guezouli, Kamel Barka, Asma Djehiche:
UAVs's efficient controlled mobility management for mobile heterogeneous wireless sensor networks. 2461-2470 - Francisco Talavera, Isaac Lera, Carlos Guerrero:
Analysis of wireless network access logs for a hierarchical characterization of user mobility. 2471-2487 - Gazi Zahirul Islam, Mohammod Abul Kashem:
Efficient resource allocation in the IEEE 802.11ax network leveraging OFDMA technology. 2488-2496 - Fatimah Hussain Al-Naji, Rachid Zagrouba:
CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things. 2497-2514 - Touseef Iqbal, Shaima Qureshi:
The survey: Text generation models in deep learning. 2515-2528 - Omar AlZoubi, Saja Khaled Tawalbeh, Mohammad Al-Smadi:
Affect detection from arabic tweets using ensemble and deep learning techniques. 2529-2539 - Himansu Das, Bighnaraj Naik, Himansu Sekhar Behera, Shalini Jaiswal, Priyanka Mahato, Minakhi Rout:
Biomedical data analysis using neuro-fuzzy model with post-feature reduction. 2540-2550 - Abdullah Khan, Junaid Bukhari, Javed Iqbal Bangash, Asfandyar Khan, Muhammad Imran, Muhammad Asim, Muhammad Ishaq, Arshad Khan:
Optimizing connection weights of functional link neural network using APSO algorithm for medical data classification. 2551-2561 - Srinidhi Hiriyannaiah, G. M. Siddesh, K. G. Srinivasa:
Deep visual ensemble similarity (DVESM) approach for visually aware recommendation and search in smart community. 2562-2573 - Patrick Kwabena Mensah, Benjamin Asubam Weyori, Mighty Abra Ayidzoe:
Exploring the performance of LBP-capsule networks with K-Means routing on complex images. 2574-2588 - Indrajeet Kumar, Chandradeep Bhatt, Kamred Udham Singh:
Entropy based automatic unsupervised brain intracranial hemorrhage segmentation using CT images. 2589-2600 - Salah Alghyaline:
Real-time Jordanian license plate recognition using deep learning. 2601-2609 - Abu Sufian, Anirudha Ghosh, Avijit Naskar, Farhana Sultana, Jaya Sil, M. M. Hafizur Rahman:
BDNet: Bengali Handwritten Numeral Digit Recognition based on Densely connected Convolutional Neural Networks. 2610-2620 - Ayad Tareq Imam, Basma R. Al-Srour, Aysh Alhroob:
The automation of the detection of large class bad smell by using genetic algorithm and deep learning. 2621-2636 - Vijayaprabakaran K., Sathiyamurthy K.:
Towards activation function search for long short-term model network: A differential evolution based approach. 2637-2650 - Dimah Alahmadi, Arwa Wali, Sarah Alzahrani:
TAAM: Topic-aware abstractive arabic text summarisation using deep recurrent neural networks. 2651-2665 - Shridhar B. Devamane, Rajeshwari L. Itagi:
Recurrent neural network based turbo decoding algorithms for different code rates. 2666-2679 - Arif Rahman, Edi Winarko, Khabib Mustofa:
Product image retrieval using category-aware siamese convolutional neural network feature. 2680-2687 - Afreen Khan, Swaleha Zubair:
An Improved Multi-Modal based Machine Learning Approach for the Prognosis of Alzheimer's disease. 2688-2706 - Summrina Kanwal, Faiza Khan, Sultan Alamri:
A multimodal deep learning infused with artificial algae algorithm - An architecture of advanced E-health system for cancer prognosis prediction. 2707-2719 - Ming-Fang Li, Guo-Xiang Zhang, Lu-Tao Zhao, Tao Song:
Extracting product competitiveness through user-generated content: A hybrid probabilistic inference model. 2720-2732 - Nasir Jalal, Arif Mehmood, Gyu Sang Choi, Imran Ashraf:
A novel improved random forest for text classification using feature ranking and optimal number of trees. 2733-2742 - Muhammad Hassan, Yan Wang, Wei Pang, Di Wang, Daixi Li, You Zhou, Dong Xu:
IPAS-Net: A deep-learning model for generating high-fidelity shoeprints from low-quality images with no natural references. 2743-2757 - Mohamed Zouheir Kastouni, Ayoub Ait Lahcen:
Big data analytics in telecommunications: Governance, architecture and use cases. 2758-2770 - Ruby Rani, D. K. Lobiyal:
Performance evaluation of text-mining models with Hindi stopwords lists. 2771-2786 - Israa Al-Badarneh, Maria Habib, Ibrahim Aljarah, Hossam Faris:
Neuro-evolutionary models for imbalanced classification problems. 2787-2797 - Manjunath K. Vanahalli, Nagamma Patil:
An efficient colossal closed itemset mining algorithm for a dataset with high dimensionality. 2798-2808 - Maryem Rhanoui, Mounia Mikram, Siham Yousfi, Ayoub Kasmi, Naoufel Zoubeidi:
A hybrid recommender system for patron driven library acquisition and weeding. 2809-2819 - Honey Jindal, Neetu Sardana:
Web navigation prediction based on dynamic threshold heuristics. 2820-2830 - Kristo Radion Purba, David Asirvatham, Raja Kumar Murugesan:
Influence maximization diffusion models based on engagement and activeness on instagram. 2831-2839 - Basavaraj N. Hiremath, Malini M. Patil:
Enhancing Optimized Personalized Therapy in Clinical Decision Support System using Natural Language Processing. 2840-2848 - Manar Alassaf, Ali Mustafa Qamar:
Improving Sentiment Analysis of Arabic Tweets by One-way ANOVA. 2849-2859 - Ravindra Kumar Singh, Harsh Kumar Verma:
Effective Parallel Processing Social Media Analytics Framework. 2860-2870 - Yanyi Nie, Xiaoni Zhong, Tao Wu, Yanbing Liu, Tao Lin, Wei Wang:
Effects of network temporality on coevolution spread epidemics in higher-order network. 2871-2882 - Fernando Pinciroli, José Luís Barros Justo, Raymundo Forradellas:
Systematic mapping study: On the coverage of aspect-oriented methodologies for the early phases of the software development life cycle. 2883-2896 - Neha Gupta, Arun Sharma, Manoj Kumar Pachariya:
Multi-objective test suite optimization for detection and localization of software faults. 2897-2909 - José-Ramón Sánchez-Couso, Fernando Arroyo, Victor Mitrana, Andrei Paun, Mihaela Paun:
Accepting multiple splicing systems. 2910-2915 - Sarvesh Pandey, Udai Shanker:
RAPID: A real time commit protocol. 2916-2925 - Malek Alzaqebah, Sana Jawarneh, Maram Al-Wohaibi, Mutasem K. Alsmadi, Ibrahim Almarashdeh, Rami Mustafa A. Mohammad:
Hybrid Brain Storm Optimization algorithm and Late Acceptance Hill Climbing to solve the Flexible Job-Shop Scheduling Problem. 2926-2937 - Utpal Barman, Ridip Dev Choudhury:
Smartphone image based digital chlorophyll meter to estimate the value of citrus leaves chlorophyll using Linear Regression, LMBP-ANN and SCGBP-ANN. 2938-2950 - Zeyad Safaa Younus, Mohammed Khaire Hussain:
Image steganography using exploiting modification direction for compressed encrypted data. 2951-2963 - Mohd Rafi Lone:
A high speed and memory efficient algorithm for perceptually-lossless volumetric medical image compression. 2964-2974 - Leila Boussaad, Aldjia Boucetta:
Deep-learning based descriptors in application to aging problem in face recognition. 2975-2981 - K. Prabha, I. Shatheesh Sam:
An effective robust and imperceptible blind color image watermarking using WHT. 2982-2992 - Yongming Zhang, Ruoyu Zhao, Yushu Zhang, Rushi Lan, Xiuli Chai:
High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. 2993-3010 - Aziz Qaroush, Abdalkarim Awad, Mohammad Modallal, Malik Ziq:
Segmentation-based, omnifont printed Arabic character recognition without font identification. 3025-3039 - Shankru Guggari, Vijayakumar Kadappa, V. Umadevi, Ajith Abraham:
Music rhythm tree based partitioning approach to decision tree classifier. 3040-3054 - Amita Singha, Muhammad Ahsan Ullah:
Development of an audio watermarking with decentralization of the watermarks. 3055-3061 - Aasim Zafar, Arshad Iqbal:
Application of soft computing techniques in machine reading of Quranic Kufic manuscripts. 3062-3069 - Franklin Tchakounté, Koudanbe Amadou Calvin, Ado Adamou Abba Ari, David Jaurès Fotsa-Mbogne:
A smart contract logic to reduce hoax propagation across social media. 3070-3078 - Jamal N. Al-Karaki, Amjad Gawanmeh, Sanaa El-Yassami:
GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking. 3079-3095 - Kazi Masudul Alam, J. M. Ashfiqur Rahman, Anisha Tasnim, Aysha Akther:
A Blockchain-based Land Title Management System for Bangladesh. 3096-3110
Volume 34, Number 6, Part B, June 2022
- Maniah, Benfano Soewito, Ford Lumban Gaol, Edi Abdurachman:
A systematic literature Review: Risk analysis in cloud migration. 3111-3120 - Uma Narayanan, Varghese Paul, Shelbi Joseph:
A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment. 3121-3135 - Mohamed Lamine Berkane, Mahmoud Boufaïda, Nour El Houda Bouzerzour:
Modelling elastic scaling of cloud with energy-efficiency: Application to smart-university. 3136-3150 - Rohit Kumar Tiwari, Rakesh Kumar:
A framework for prioritizing cloud services in neutrosophic environment. 3151-3166 - Junwen Lu, Yongsheng Hao, Kesou Wu, Yuming Chen, Qin Wang:
Dynamic offloading for energy-aware scheduling in a mobile cloud. 3167-3177 - V. Seethalakshmi, Govindasamy Vaiyapuri, Akila Venkatesan:
Real-coded multi-objective genetic algorithm with effective queuing model for efficient job scheduling in heterogeneous Hadoop environment. 3178-3190 - Damián Fernández-Cerero, José A. Troyano, Agnieszka Jakóbik, Alejandro Fernández-Montes:
Machine learning regression to boost scheduling performance in hyper-scale cloud-computing data centres. 3191-3203 - Jyotismita Chaki, S. Thillai Ganesh, S. K. Cidham, S. Ananda Theertan:
Machine learning and artificial intelligence based Diabetes Mellitus detection and self-management: A systematic review. 3204-3225 - Rafid Mostafiz, Mohammad Shorif Uddin, Nur-A-Alam, Md. Mahfuz Reza, Mohammad Motiur Rahman:
Covid-19 detection in chest X-ray through random forest classifier using a hybridization of deep CNN and DWT optimized features. 3226-3235 - B. Chithra, R. Nedunchezhian:
Dynamic neutrosophic cognitive map with improved cuckoo search algorithm (DNCM-ICSA) and ensemble classifier for rheumatoid arthritis (RA) disease. 3236-3246 - Agus Subhan Akbar, Chastine Fatichah, Nanik Suciati:
Single level UNet3D with multipath residual attention block for brain tumor segmentation. 3247-3258 - D. Rammurthy, P. K. Mahesh:
Whale Harris hawks optimization based deep learning classifier for brain tumor detection using MRI images. 3259-3272 - Yujun Kim, Jin-Yong Yu, Euijong Lee, Young-Gab Kim:
Video anomaly detection using Cross U-Net and cascade sliding window. 3273-3284 - Rashmi Patil, Sreepathi Bellary:
Machine learning approach in melanoma cancer stage detection. 3285-3293 - Amani Ali Ahmed Ali, Suresha Mallaiah:
Intelligent handwritten recognition using hybrid CNN architectures based-SVM classifier with dropout. 3294-3300 - M. Sreeraj, Jestin Joy, Manu Jose, Meenu Varghese, T. J. Rejoice:
Comparative analysis of Machine Learning approaches for early stage Cervical Spondylosis detection. 3301-3309 - Imran Ul Haq, Haider Ali, Hong Yu Wang, Lei Cui, Hazrat Ali:
Feature fusion and Ensemble learning-based CNN model for mammographic image classification. 3310-3318 - Vani V, K. V. Mahendra Prashanth:
Ulcer detection in Wireless Capsule Endoscopy images using deep CNN. 3319-3331 - Vicky Zilvan, Ade Ramdan, Ana Heryana, Dikdik Krisnandi, Endang Suryawati, Raden Sandra Yuwana, R. Budiarianto S. Kusumo, Hilman F. Pardede:
Convolutional variational autoencoder-based feature learning for automatic tea clone recognition. 3332-3342 - Shyamal Virnodkar, Vinod Keshaorao Pachghare, Virupakshagouda C. Patil, Sunil Kumar Jha:
CaneSat dataset to leverage convolutional neural networks for sugarcane classification from Sentinel-2. 3343-3355 - Mohammad Meraj Khan, Mohammad Shorif Uddin, Mohammad Zavid Parvez, Lutfur Nahar:
A squeeze and excitation ResNeXt-based deep learning model for Bangla handwritten compound character recognition. 3356-3364 - Sofian Kassaymeh, Salwani Abdullah, Mohammed Azmi Al-Betar, Mohammed Alweshah:
Salp swarm optimizer for modeling the software fault prediction problem. 3365-3378 - Yousef Elsheikh, Yousef Alqasrawi, Mohammad Azzeh:
On obtaining a stable vote ranking methodology for implementing e-government strategies. 3379-3392 - Jaseena K. U, Binsu C. Kovoor:
Deterministic weather forecasting models based on intelligent predictors: A survey. 3393-3412 - Asniar, Nur Ulfa Maulidevi, Kridanto Surendro:
SMOTE-LOF for noise identification in imbalanced data classification. 3413-3423 - Pramoda Patro, Krishna Kumar, G. Suresh Kumar, Gandharba Swain:
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network. 3424-3432 - Zhengjing Ma, Gang Mei, Salvatore Cuomo, Francesco Piccialli:
Heterogeneous data fusion considering spatial correlations using graph convolutional networks and its application in air quality prediction. 3433-3447 - Parth Shah, Priteshkumar Prajapati:
Provable Data Possession using Additive Homomorphic Encryption. 3448-3453 - Ajay K. Gupta, Udai Shanker:
MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS. 3454-3467 - Muhamad Najib Zamri, Mohd Shahrizal Sunar:
Atmospheric cloud modeling methods in computer graphics: A review, trends, taxonomy, and future directions. 3468-3488 - Meenu Suresh, I. Shatheesh Sam:
Optimized interesting region identification for video steganography using Fractional Grey Wolf Optimization along with multi-objective cost function. 3489-3496 - Manal El Rhazi, Arsalane Zarghili, Aicha Majda, Ayat Allah Oufkir:
3D facial attractiveness enhancement using free form deformation. 3497-3505 - Saiqa Khan, Meera Narvekar:
Novel fusion of color balancing and superpixel based approach for detection of tomato plant diseases in natural complex environment. 3506-3516 - Aziz Fajar, Riyanarto Sarno, Chastine Fatichah, Achmad Fahmi:
Reconstructing and resizing 3D images from DICOM files. 3517-3526 - Vicky Mudeng, Wahdiyatun Nisa, Sena Sukmananda Suprapto:
Computational image reconstruction for multi-frequency diffuse optical tomography. 3527-3538 - Sharifah Noor Masidayu Sayed Ismail, Nor Azlina Bt Ab. Aziz, Siti Zainab Ibrahim:
A comparison of emotion recognition system using electrocardiogram (ECG) and photoplethysmogram (PPG). 3539-3558 - Supriadi Rustad, De Rosal Ignatius Moses Setiadi, Abdul Syukur, Pulung Nurtantio Andono:
Inverted LSB image steganography using adaptive pattern to improve imperceptibility. 3559-3568 - Priyank Sunhare, Rameez R. Chowdhary, Manju K. Chattopadhyay:
Internet of things and data mining: An application oriented survey. 3569-3590 - Teng Wang, Zhi Hu:
Local differential privacy-based frequent sequence mining. 3591-3601 - Tanzeela Javid, Manoj Kumar Gupta, Abhishek Gupta:
A hybrid-security model for privacy-enhanced distributed data mining. 3602-3614 - Walid Osamy, Ahmed M. Khedr:
FACS: Fairness aware clustering scheme for monitoring applications of internet of things based wireless sensor networks. 3615-3629 - Ummer Iqbal, Ajaz Hussain Mir:
Secure and practical access control mechanism for WSN with node privacy. 3630-3646 - Cristina Satizábal, Rafael Páez, Jordi Forné:
Secure Internet Voting Protocol (SIVP): A secure option for electoral processes. 3647-3660 - Sonal Gahlot, S. R. N. Reddy, Dinesh Kumar:
Early congenital heart defect diagnosis in neonates using novel WBAN based three-tier network architecture. 3661-3672 - Jingzhi Tu, Gang Mei, Francesco Piccialli:
An improved Nyström spectral graph clustering using k-core decomposition as a sampling strategy for large networks. 3673-3684 - Titus Issac, Salaja Silas, Elijah Blessing Rajsingh:
Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network. 3685-3702 - Rahabul Islam, Md. Wahidur Rahman, Rahmina Rubaiat, Md. Mahmodul Hasan, Md. Mahfuz Reza, Mohammad Motiur Rahman:
LoRa and server-based home automation using the internet of things (IoT). 3703-3712 - K. Krishna Jyothi, Shilpa Chaudhari:
A novel block chain based cluster head authentication protocol for machine-type communication in LTE network: Statistical analysis on attack detection. 3713-3721 - Mostafa Hamadi, Jamal El-Den, Sami Azam, Narumon Cherry Sriratanaviriyakul:
Integrating social media as cooperative learning tool in higher education classrooms: An empirical study. 3722-3731 - Muneera Alhoshan, Najwa Altwaijry:
AUSS: An arabic query-based update-summarization system. 3732-3743 - Gheith A. Abandah, Ashraf Suyyagh, Mohammad R. Abdel-Majeed:
Transfer learning and multi-phase training for accurate diacritization of Arabic poetry. 3744-3757 - Hamza Alami, Saïd El Alaoui Ouatik, Khalid Alaoui Zidani, Noureddine En-Nahnahi:
Arabic duplicate questions detection based on contextual representation, class label matching, and structured self attention. 3758-3765 - Sumaira Saeed, Sania Yousuf, Faiza Khan, Quratulain Rajput:
Social network analysis of Hadith narrators. 3766-3774 - Gheith A. Abandah, Mohammed Z. Khedher, Mohammad Abdel-Majeed, Hamdi M. Mansour, Salma F. Hulliel, Lara M. Bisharat:
Classifying and diacritizing Arabic poems using deep recurrent neural networks. 3775-3788 - Naoual Nassiri, Abdelhak Lakhouaja, Violetta Cavalli-Sforza:
Arabic L2 readability assessment: Dimensionality reduction study. 3789-3799 - Karma Wangchuk, Panomkhawn Riyamongkol, Rattapoom Waranusast:
Next syllables prediction system in Dzongkha using long short-term memory. 3800-3806 - Suyanto Suyanto, Andi Sunyoto, Rezza Nafi Ismail, Ema Rachmawati, Warih Maharani:
Stemmer and phonotactic rules to improve n-gram tagger-based indonesian phonemicization. 3807-3814 - Abedalmuhdi Almomany, Walaa R. Ayyad, Amin Jarrah:
Optimized implementation of an improved KNN classification algorithm using Intel FPGA platform: Covid-19 case study. 3815-3827 - Teng Li, Amin Rezaeipanah, ElSayed M. Tag El Din:
An ensemble agglomerative hierarchical clustering algorithm based on clusters clustering technique and the novel similarity measurement. 3828-3842 - Mohammad Hasan, Abu Saleh Musa Miah, Md. Moazzem Hossain, Md. Sabir Hossain:
LL-PMS8: A time efficient approach to solve planted motif search problem. 3843-3850 - Himansu Das, Bighnaraj Naik, Himansu Sekhar Behera:
A Jaya algorithm based wrapper method for optimal feature selection in supervised classification. 3851-3863 - Navin Mani Upadhyay, Ravi Shankar Singh:
An effective scheme for memory congestion reduction in multi-core environment. 3864-3877 - Keshav Kumar, K. R. Ramkumar, Amanpreet Kaur:
A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. 3878-3885
Volume 34, Number 7, July 2022
- Maria Ashraf, Muhammad Shiraz, Almas Abbasi, Saleh Albahli:
Distributed application execution in fog computing: A taxonomy, challenges and future directions. 3887-3909 - Dalia Abdulkareem Shafiq, N. Z. Jhanjhi, Azween B. Abdullah:
Load balancing techniques in cloud computing environment: A review. 3910-3933 - Imtiaz Ahmad, Mohammad Gh. AlFailakawi, Asayel AlMutawa, Latifa Alsalman:
Container scheduling techniques: A Survey and assessment. 3934-3947 - Kalka Dubey, S. C. Sharma:
An extended intelligent water drop approach for efficient VM allocation in secure cloud computing framework. 3948-3958 - Jianmin Li, Ying Zhong, Shunzhi Zhu, Yongsheng Hao:
Energy-aware service composition in multi-Cloud. 3959-3967 - Maad M. Khalill, Anatoly D. Khomonenko, M. D. Matushko:
Measuring the effect of monitoring on a cloud computing system by estimating the delay time of requests. 3968-3972 - Wiem Matoussi, Tarek Hamrouni:
A new temporal locality-based workload prediction approach for SaaS services in a cloud environment. 3973-3987 - Arabinda Pradhan, Sukant Kishoro Bisoy:
A novel load balancing technique for cloud computing platform based on PSO. 3988-3995 - Priteshkumar Prajapati, Parth Shah:
A Review on Secure Data Deduplication: Cloud Storage Security Issue. 3996-4007 - Baidaa Abdulrahman Jalil, Taha Mohammed Hasan, Ghassan Sabeeh Mahmood, Hazim Noman Abed:
A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol. 4008-4021 - Shuang-Gen Liu, Ru Liu, Si Yuan Rao:
Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home. 4022-4030 - Abin Oommen Philip, R. K. K. Saravanaguru:
Smart contract based digital evidence management framework over blockchain for vehicle accident investigation in IoV era. 4031-4046 - Reddy SaiSindhuTheja, Gopal Krishna Shyam:
A machine learning based attack detection and mitigation using a secure SaaS framework. 4047-4061 - Seyyed Mohammad Safi, Ali Movaghar, Mohammad Ghorbani:
Privacy protection scheme for mobile social network. 4062-4074 - Lynda Kacha, Abdelhafid Zitouni, Mahieddine Djoudi:
KAB: A new k-anonymity approach based on black hole algorithm. 4075-4088 - Diwakar Agarwal, Atul Bansal:
Fingerprint liveness detection through fusion of pores perspiration and texture features. 4089-4098 - Lee Jia Thun, Phoey Lee Teh, Chi-Bin Cheng:
CyberAid: Are your children safe from cyberbullying? 4099-4108 - M. Vasanthi, K. Seetharaman:
Facial image recognition for biometric authentication systems using a combination of geometrical feature points and low-level visual features. 4109-4121 - José de Jesús Rugeles Uribe, Edward Paul Guillen, Leonardo S. Cardoso:
A technical review of wireless security for the internet of things: Software defined radio perspective. 4122-4134 - Manzoor Ahmed, Salman Raza, Muhammad Ayzed Mirza, Abdul Aziz, Manzoor Ahmed Khan, Wali Ullah Khan, Jianbo Li, Zhu Han:
A survey on vehicular task offloading: Classification, issues, and challenges. 4135-4162 - Moussa Aboubakar, Mounir Kellil, Pierre Roux:
A review of IoT network management: Current status and perspectives. 4163-4176 - Tanvi Sood, Kanika Sharma:
LUET: A novel lines-of-uniformity based clustering protocol for heterogeneous-WSN for multiple-applications. 4177-4190 - Jahoon Koo, Young-Gab Kim:
Resource identifier interoperability among heterogeneous IoT platforms. 4191-4208 - Gousia Thahniyath, M. Jayaprasad:
Secure and load balanced routing model for wireless sensor networks. 4209-4218 - Dandy Pramana Hostiadi, Tohari Ahmad:
Hybrid model for bot group activity detection using similarity and correlation approaches based on network traffic flows analysis. 4219-4232 - Indu Bala, Ashutosh Sharma, Alexey A. Tselykh, Byung-Gyu Kim:
Throughput optimization of interference limited cognitive radio-based Internet of Things (CR-IoT) network. 4233-4243 - Gousia Habib, Shaima Qureshi:
Optimization and acceleration of convolutional neural networks: A survey. 4244-4268 - Ritam Sarkar, Debaditya Barman, Nirmalya Chowdhury:
Domain knowledge based genetic algorithms for mobile robot path planning having single and multiple targets. 4269-4283 - Ammar Elhassan, Saleh M. Abu-Soud, Firas Alghanim, Walid A. Salameh:
ILA4: Overcoming missing values in machine learning datasets - An inductive learning approach. 4284-4295 - Mohamed Abdel-Basset, Hossam Hawash, Karam M. Sallam, Sameh S. Askar, Mohamed Abouhawwash:
STLF-Net: Two-stream deep network for short-term load forecasting in residential buildings. 4296-4311 - Fan Ding, Fei Zhu:
HLifeRL: A hierarchical lifelong reinforcement learning framework. 4312-4321 - Meiyao Tao, Shanshan Gao, Deqian Mao, Hong Huang:
Knowledge graph and deep learning combined with a stock price prediction network focusing on related stocks and mutation points. 4322-4334 - Shakir Khan, Mohd Fazil, Vineet Kumar Sejwal, Mohammed Ali Alshara, Reemiah Muneer Alotaibi, Ashraf Kamal, Abdul Rauf Baig:
BiCHAT: BiLSTM with deep CNN and hierarchical attention for hate speech detection. 4335-4344 - Silvester Dian Handy Permana, Gusti Saputra, Budi Arifitama, Yaddarabullah, Wahyu Caesarendra, Robbi Rahim:
Classification of bird sounds as an early warning method of forest fires using Convolutional Neural Network (CNN) algorithm. 4345-4357 - Mavra Mehmood, Nasser O. Alshammari, Saad Awadh Alanazi, Asma Basharat, Fahad Ahmad, Muhammad Sajjad, Kashaf Junaid:
Improved colorization and classification of intracranial tumor expanse in MRI images via hybrid scheme of Pix2Pix-cGANs and NASNet-large. 4358-4374 - Kristiawan Nugroho, Edi Noersasongko, Purwanto, Muljono, De Rosal Ignatius Moses Setiadi:
Enhanced Indonesian Ethnic Speaker Recognition using Data Augmentation Deep Neural Network. 4375-4384 - Didar Dadebayev, Wei Wei Goh, Tan Ee Xion:
EEG-based emotion recognition: Review of commercial EEG devices and machine learning techniques. 4385-4401 - Prabhash Kumar Singh, Biswapati Jana, Kakali Datta:
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA. 4402-4420 - Meili Sun, Liancheng Xu, Rong Luo, Yuqi Lu, Weikuan Jia:
GHFormer-Net: Towards more accurate small green apple/begonia fruit detection in the nighttime. 4421-4432 - Vaishali M. Joshi, Rajesh B. Ghongade:
IDEA: Intellect database for emotion analysis using EEG signal. 4433-4447 - Fajar Astuti Hermawati, Handayani Tjandrasa, Nanik Suciati:
Phase-based thresholding schemes for segmentation of fetal thigh cross-sectional region in ultrasound images. 4448-4460 - Leena Jain, Palwinder Singh:
A novel wavelet thresholding rule for speckle reduction from ultrasound images. 4461-4471 - Xiyao Liu, Zhaoying Li, Junxing Ma, Wei Zhang, Jian Zhang, Yipeng Ding:
Robust coverless steganography using limited mapping images. 4472-4482 - Asha Durafe, Vinod Patidar:
Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover. 4483-4498 - Kartik Budholiya, Shailendra Kumar Shrivastava, Vivek Sharma:
An optimized XGBoost based diagnostic system for effective prediction of heart disease. 4514-4523 - Manoj Kumar Naik, Rutuparna Panda, Ajith Abraham:
Normalized square difference based multilevel thresholding technique for multispectral images using leader slime mould algorithm. 4524-4536 - H. M. Nandini, H. K. Chethan, B. S. Rashmi:
Shot based keyframe extraction using edge-LBP approach. 4537-4545 - Santisudha Panigrahi, Jayshankar Das, Tripti Swarnkar:
Capsule network based analysis of histopathological images of oral squamous cell carcinoma. 4546-4553 - Kazim Hanbay:
A new standard error based artificial bee colony algorithm and its applications in feature selection. 4554-4567 - Vineet Kumar, Abhijit R. Asati, Anu Gupta:
Dedicated hardware architecture for localizing iris in VW images. 4568-4578 - Mazida A. Ahmed, Ridip Dev Choudhury, Kishore Kashyap:
Race estimation with deep networks. 4579-4591 - Sangita B. Nemade, Shefali Sonavane:
Co-occurrence patterns based fruit quality detection for hierarchical fruit image annotation. 4592-4606 - Rajdeep Kaur, Kuljit Kaur Chahal, Munish Saini:
Understanding community participation and engagement in open source software Projects: A systematic mapping study. 4607-4625 - Leonice Souza-Pereira, Nuno Pombo, Sofia Ouhbi:
Software quality: Application of a process model for quality-in-use assessment. 4626-4634 - Rajni Sehgal, Deepti Mehrotra, Renuka Nagpal, Ramanuj Sharma:
Green software: Refactoring approach. 4635-4643 - Vyacheslav S. Lapshin, Yuri I. Rogozov, Sergey Kucherov:
Method for building an information model specification based on a sensemaking approach to user involvement in the development process. 4644-4658 - Zeinab Rabea, Sara El-Metwally, Samir Elmougy, Magdi Zakaria:
A fast algorithm for constructing suffix arrays for DNA alphabets. 4659-4668 - Saja Taha Ahmed, Loay Edwar George:
Lightweight hash-based de-duplication system using the self detection of most repeated patterns as chunks divisors. 4669-4678 - Hao Peng, Cheng Qian, Dandan Zhao, Ming Zhong, Xianwen Ling, Wei Wang:
Disintegrate hypergraph networks by attacking hyperedge. 4679-4685
Volume 34, Number 8, Part A, September 2022
- Mazin Alshamrani:
IoT and artificial intelligence implementations for remote healthcare monitoring systems: A survey. 4687-4701 - Vidhya Mohan, Aji Sivanandan:
A systematic review on the developments and evaluation of twin learning algorithms. 4702-4711 - Naveen Kumar, Deepak Sinwar, Monika Saini, Dinesh Kumar Saini, Ashish Kumar, Manjit Kaur, Dilbag Singh, Heung-No Lee:
Efficient computational stochastic framework for performance optimization of E-waste management plant. 4712-4728 - Yanshen Sun, Yen-Cheng Lu, Kaiqun Fu, Fanglan Chen, Chang-Tien Lu:
Detecting anomalous traffic behaviors with seasonal deep Kalman filter graph convolutional neural networks. 4729-4742 - Prajna Paramita Debata, Puspanjali Mohapatra:
Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm. 4743-4755 - Brahim Ait Skourt, Abdelhamid El Hassani, Aicha Majda:
Mixed-pooling-dropout for convolutional neural network regularization. 4756-4762 - Archana R. Panhalkar, Dharmpal D. Doye:
Optimization of decision trees using modified African buffalo algorithm. 4763-4772 - Md. Saikat Islam Khan, Nazrul Islam, Jia Uddin, Sifatul Islam, Mostofa Kamal Nasir:
Water quality prediction and classification based on principal component regression and gradient boosting classifier approach. 4773-4781 - Lamees Mohammad Dalbah, Mohammed Azmi Al-Betar, Mohammed A. Awadallah, Raed Abu Zitar:
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem. 4782-4795 - Abdessamad Chanaa, Nour-Eddine El Faddouli:
An Analysis of learners' affective and cognitive traits in Context-Aware Recommender Systems (CARS) using feature interactions and Factorization Machines (FMs). 4796-4809 - Aybike Simsek:
Lexical sorting centrality to distinguish spreading abilities of nodes in complex networks under the Susceptible-Infectious-Recovered (SIR) model. 4810-4820 - Zaid Abdi Alkareem Alyasseri, Mohammed Azmi Al-Betar, Mohammed A. Awadallah, Sharif Naser Makhadmeh, Ammar Kamal Abasi, Iyad Abu Doush, Osama Ahmad Alomari:
A hybrid flower pollination with β-hill climbing algorithm for global optimization. 4821-4835 - Amina Benkessirat, Nadjia Benblidia:
A novel feature selection approach based on constrained eigenvalues optimization. 4836-4846 - Bashar A. Aldeeb, Mohammed Azmi Al-Betar, Norita Md Norwawi, Khalid Adnan Alissa, Mutasem K. Alsmadi, Ayman A. Hazaymeh, Malek Alzaqebah:
Hybrid intelligent water Drops algorithm for examination timetabling problem. 4847-4859 - Khin Maung Htay, Rozmie Razif Othman, Amiza Amir, Jalal Mohammed Hachim Alkanaani:
Gravitational search algorithm based strategy for combinatorial t-way test suite generation. 4860-4873 - Beibei Shi, Hua Ye, Ali Asghar Heidari, Long Zheng, Zhongyi Hu, Huiling Chen, Hamza Turabieh, Majdi M. Mafarja, Peiliang Wu:
Analysis of COVID-19 severity from the perspective of coagulation index using evolutionary machine learning with enhanced brain storm optimization. 4874-4887 - Arabinda Pradhan, Sukant Kishoro Bisoy, Amardeep Das:
A survey on PSO based meta-heuristic scheduling mechanism in cloud computing environment. 4888-4901 - Reza Noorian Talouki, Mirsaeid Hosseini Shirvani, Homayun Motameni:
A heuristic-based task scheduling algorithm for scientific workflows in heterogeneous cloud computing platforms. 4902-4913 - Kaushik Mishra, Jharashree Pati, Santosh Kumar Majhi:
A dynamic load scheduling in IaaS cloud using binary JAYA algorithm. 4914-4930 - Christiana Zaraket, Khalil Hariss, Maroun Chamoun, Tony Nicolas:
Cloud based private data analytic using secure computation over encrypted data. 4931-4942 - Suraj Kotecha, Adithya Vasudevan, V. M. K. Kashyap Holla, Satyam Kumar, Dayananda Pruthviraja, Mrityunjaya Vithal Latte:
3D visualization cloud based model to detect and classify the polyps according to their sizes for CT colonography. 4943-4955 - Tabassum N. Mujawar, Lokesh B. Bhajantri:
Behavior and feedback based trust computation in cloud environment. 4956-4967 - Judith Santos-Pereira, Le Gruenwald, Jorge Bernardino:
Top data mining tools for the healthcare industry. 4968-4982 - Mohamed Amine Ferradji, Fouzia Benchikha:
Enhanced metrics for temporal dimensions toward assessing Linked Data: A case study of Wikidata. 4983-4992 - Muhammed Niyas K. P., Thiyagarajan Paramasivan:
Feature selection using efficient fusion of Fisher Score and greedy searching for Alzheimer's classification. 4993-5006 - Tossapon Boongoen, Natthakan Iam-On, James Mullaney:
Providing contexts for classification of transients in a wide-area sky survey: An application of noise-induced cluster ensemble. 5007-5019 - Hasan Deeb, Archana Sarangi, Debahuti Mishra, Shubhendu Kumar Sarangi:
Improved Black Hole optimization algorithm for data clustering. 5020-5029 - Saptarshi Paul, Bipul Shyam Purkhyastha:
Detailed analysis of implementation of aviation NMT system and the effects of aviation post-processing tools on TDIL tourism corpus. 5030-5044 - Khaled Shuaib, Juhar Ahmed Abdella, Farag M. Sallabi, Mohamed Adel Serhani:
Secure decentralized electronic health records sharing system based on blockchains. 5045-5058 - Ahmed Arafa, Nawal A. El-Fishawy, Mohamed Alfateh Badawy, Marwa Radad:
RN-SMOTE: Reduced Noise SMOTE based on DBSCAN for enhancing imbalanced data classification. 5059-5074 - Pranali D. Sheth, Shrishailappa T. Patil, Manikrao L. Dhore:
Evolutionary computing for clinical dataset classification using a novel feature selection algorithm. 5075-5082 - Babita Pandey, Devendra Kumar Pandey, Brijendra Pratap Mishra, Wasiur Rhmann:
A comprehensive survey of deep learning in the field of medical imaging and medical natural language processing: Challenges and research directions. 5083-5099 - Ashish Nainwal, Yatindra Kumar, Bhola Jha:
Arrhythmia classification based on improved monarch butterfly optimization algorithm. 5100-5109 - Vithyatheri Govindan, Vimala Balakrishnan:
A machine learning approach in analysing the effect of hyperboles using negative sentiment tweets for sarcasm detection. 5110-5120 - Bhushankumar Nemade, Deven Shah:
An efficient IoT based prediction system for classification of water using novel adaptive incremental learning framework. 5121-5131 - Rami Mohammad Jomaa, Md. Saiful Islam, Hassan Mathkour, Saad Al-Ahmadi:
A multilayer system to boost the robustness of fingerprint authentication against presentation attacks by fusion with heart-signal. 5132-5143 - Md. Saiful Islam:
Using ECG signal as an entropy source for efficient generation of long random bit sequences. 5144-5155 - Weikuan Jia, Zhifen Wang, Zhonghua Zhang, Xinbo Yang, Sujuan Hou, Yuanjie Zheng:
A fast and efficient green apple object detection model based on Foveabox. 5156-5169 - Md. Shoaib Ahmed, Tanjim Taharat Aurpa, Md. Abul Kalam Azad:
Fish Disease Detection Using Image Based Machine Learning Technique in Aquaculture. 5170-5182 - Jyothi S. Nayak, M. Indiramma:
An approach to enhance age invariant face recognition performance based on gender classification. 5183-5191 - Maram Al-Wohaibi, Malek Alzaqebah, Noura M. Alotaibi, Abeer M. Alzahrani, Mariem Zouch:
A hybrid multi-stage learning technique based on brain storming optimization algorithm for breast cancer recurrence prediction. 5192-5203 - Tayeb Bahram:
A texture-based approach for offline writer identification. 5204-5222 - Suchithra Madathil, Soman Kutti Padannayil:
MC-DMD: A data-driven method for blood vessel enhancement in retinal images using morphological closing and dynamic mode decomposition. 5223-5239 - Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty:
Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion. 5240-5260 - Khaled Hatem Almotairi:
Hybrid adaptive method for lane detection of degraded road surface condition. 5261-5272 - Puneeth Guddhur Jayadev, Sreepathi Bellary:
A hybrid approach for classification and identification of iris damaged levels of alcohol drinkers. 5273-5285 - Eko Prasetyo, Nanik Suciati, Chastine Fatichah:
Multi-level residual network VGGNet for fish species classification. 5286-5295 - Prabodh Kumar Sahoo, Priyadarshi Kanungo, Satyasis Mishra, Bibhuprasad Mohanty:
Entropy feature and peak-means clustering based slowly moving object detection in head and shoulder video sequences. 5296-5304 - Sami Al-Yazidi, Jawad Berri, Mohammad Mehedi Hassan:
Novel hybrid model for organizations' reputation in online social networks. 5305-5317 - Sharhabeel H. Alnabelsi, Haythem Bany Salameh, Ramzi R. Saifan, Khalid A. Darabkh:
A multi-layer hyper-graph routing with jamming-awareness for improved throughput in full-duplex cognitive radio networks. 5318-5332 - Sercan Yalçin, Ebubekir Erdem:
TEO-MCRP: Thermal exchange optimization-based clustering routing protocol with a mobile sink for wireless sensor networks. 5333-5348 - Proton Sarkar, Sudipta Kumar Ghosal, Madhulina Sarkar:
Stego-chain: A framework to mine encoded stego-block in a decentralized network. 5349-5365 - Sakthibalan P., Devarajan K.:
DFMS: Differential flow management scheme for denial of service impact mitigation in 5G communications. 5366-5374 - Kamal Berahmand, Elahe Nasiri, Saman Forouzandeh, Yuefeng Li:
A preference random walk algorithm for link prediction through mutual influence nodes in complex networks. 5375-5387 - Sheng Hao, Huyin Zhang:
Performance analysis of PHY layer for RIS-assisted wireless communication systems with retransmission protocols. 5388-5404 - Manisha A. Dudhedia, Yerram Ravinder:
Performance analysis of game based MAC protocol for cognitive radio based wireless network. 5405-5419 - Bimal Patel, Parth Shah:
Operating system support, protocol stack with key concerns and testbed facilities for IoT: A case study perspective. 5420-5434 - Himanshu Agrawal, Krishna Asawa:
Distributed learning algorithm with synchronized epochs for dynamic spectrum access in unknown environment using multi-user restless multi-armed bandit. 5435-5447 - Tushar Kanta Samal, Manas Ranjan Kabat:
A prioritized traffic scheduling with load balancing in wireless body area networks. 5448-5455 - Anam Qureshi, Murk Marvi, Jawwad Ahmed Shamsi, Adnan Aijaz:
eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles. 5456-5467 - Diana Nuñez-Ramirez, David Mata-Mendoza, Manuel Cedillo-Hernandez:
Improving preprocessing in reversible data hiding based on contrast enhancement. 5468-5477 - Mallikarjun Reddy Dorsala, V. N. Sastry, Sudhakar Chapram:
Fair payments for privacy-preserving aggregation of mobile crowdsensing data. 5478-5492 - Atef Bentahar, Abdallah Meraoumia, Louardi Bradji, Hakim Bendjenna:
Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme. 5493-5509 - Kumari Rinki, Puspneel Verma, Ranjeet Kumar Singh:
A novel matrix multiplication based LSB substitution mechanism for data security and authentication. 5510-5524 - Mohammad Alsulmi, Reham Alshamarani:
Framework for tasks suggestion on web search based on unsupervised learning techniques. 5525-5532 - Amit Rathee, Jitender Kumar Chhabra:
Metrics for reusability of java language components. 5533-5551 - Samah Salem, Fouzia Benchikha:
LODQuMa: A Free-ontology process for Linked (Open) Data quality management. 5552-5563 - Shambhu Nath Sharma, Prasanna Sadagopan:
Influence of conditional holoentropy-based feature selection on automatic recommendation system in E-commerce sector. 5564-5577 - Mansi Jhamb, Ratnesh Mohan:
Ultra low power design of multi-valued logic circuit for binary interfaces. 5578-5586
Volume 34, Number 8, Part B, September 2022
- Rajesh Singh, Anita Gehlot, Shaik Vaseem Akram, Amit Kumar Thakur, Dharam Buddhi, Prabin Kumar Das:
Forest 4.0: Digitalization of forest using the Internet of Things (IoT). 5587-5601 - Ravesa Akhter, Shabir Ahmad Sofi:
Precision agriculture using IoT data analytics and machine learning. 5602-5618 - Rabah Boucetti, Ouassila Hioual, Sofiane Mounine Hemam:
An approach based on genetic algorithms and neural networks for QoS-aware IoT services composition. 5619-5632 - Halima Bouazza, Bachir Said, Fatima Zohra Laallam:
A hybrid IoT services recommender system using social IoT. 5633-5645 - Norah Alotaibi, Delel Rhouma:
A review on community structures detection in time evolving social networks. 5646-5662 - Partha Pratim Ray:
A survey on cognitive packet networks: Taxonomy, state-of-the-art, recurrent neural networks, and QoS metrics. 5663-5683 - Bhanu Chander, Kumaravelan Gopalakrishnan:
Outlier detection strategies for WSNs: A survey. 5684-5707 - Vibha Jain, Bijendra Kumar, Aditya Gupta:
Cybertwin-driven resource allocation using deep reinforcement learning in 6G-enabled edge environment. 5708-5720 - P. Aravind, G. P. Saradhi Varma, P. V. G. D. Prasad Reddy:
Simulated annealing based optimal controller placement in software defined networks with capacity constraint and failure awareness. 5721-5733 - Suyoto Suyoto, Sugihartono Sugihartono, Iskandar Iskandar, Adit Kurniawan:
Robust time synchronization for NC-OFDM cognitive radio systems. 5734-5745 - Hajar Bennouri, Amine Berqia, N'Guessan Koffi Patrick:
U-NewReno transmission control protocol to improve TCP performance in Underwater Wireless Sensors Networks. 5746-5758 - Sateesh Gudla, Nageswara Rao Kuda:
Learning automata based energy efficient and reliable data delivery routing mechanism in wireless sensor networks. 5759-5765 - Jagpreet Kaur, K. R. Ramkumar:
The recent trends in cyber security: A review. 5766-5781 - Tripti Rathee, Parvinder Singh:
A systematic literature mapping on secure identity management using blockchain technology. 5782-5796 - Punam Bedi, Anuradha Singhal:
Estimating cover image for universal payload region detection in stego images. 5797-5809 - Vidhi Bansal, Surabhi Garg:
A cancelable biometric identification scheme based on bloom filter and format-preserving encryption. 5810-5821 - Afrig Aminuddin, Ferda Ernawan:
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking. 5822-5840 - Suganthi Kumar, Rajkumar Soundrapandiyan:
A multi-image hiding technique in dilated video regions based on cooperative game-theoretic approach. 5841-5855 - Mahbuba Begum, Jannatul Ferdush, Mohammad Shorif Uddin:
A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. 5856-5867 - Ching-Yu Yang, Wen-Fong Wang:
An efficient data hiding for ECG signals based on the integer wavelet transform and block standard deviation. 5868-5882 - Gurpreet Kaur, Rekha Agarwal, Vinod Patidar:
Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation. 5883-5897 - Amina Adadi, Mohammed Lahmer, Samia Nasiri:
Artificial Intelligence and COVID-19: A Systematic umbrella review and roads ahead. 5898-5920 - Issam W. Damaj, Salwa K. Al Khatib, Tarek Naous, Wafic Lawand, Zainab Z. Abdelrazzak, Hussein T. Mouftah:
Intelligent transportation systems: A survey on modern hardware devices for the era of machine learning. 5921-5942 - Stéphane Cédric Koumétio Tékouabou, El Bachir Diop, Rida Azmi, Remi Jaligot, Jerome Chenal:
Reviewing the application of machine learning methods to model urban form indicators in planning decision support systems: Potential, issues and challenges. 5943-5967 - Murat Kirisçi, Necip Simsek:
Decision making method related to Pythagorean Fuzzy Soft Sets with infectious diseases application. 5968-5978 - Shaymaa E. Sorour, Hanan E. Abdelkader, Karam M. Sallam, Ripon K. Chakrabortty, Michael J. Ryan, Amr A. Abohany:
An analytical code quality methodology using Latent Dirichlet Allocation and Convolutional Neural Networks. 5979-5997 - Krishnakumar Arunachalam, Senthilkumaran Thangamuthu, Vijayanand Shanmugam, Mukesh Raju, Kamali Premraj:
Deep learning and optimisation for quality of service modelling. 5998-6007 - Runlong Xia, Yuantao Chen, Binbin Ren:
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter. 6008-6018 - Prabin Kumar Panigrahi, Sukant Kishoro Bisoy:
Localization strategies for autonomous mobile robots: A review. 6019-6039 - Fitri Utaminingrum, Ahmad Wali Satria Bahari Johan, I Komang Somawirata, Risnandar, Anindita Septiarini:
Descending stairs and floors classification as control reference in autonomous smart wheelchair. 6040-6047 - Fatima-Zahra El-Alami, Said Ouatik El Alaoui, Noureddine En-Nahnahi:
A multilingual offensive language detection method based on transfer learning from transformer fine-tuning model. 6048-6056 - Minakshi Tomer, Manoj Kumar:
Multi-document extractive text summarization based on firefly algorithm. 6057-6065 - Yasser Mohamed Saber, Hala Abdel-Galil, Mohamed Abd El-Fatah Belal:
Arabic ontology extraction model from unstructured text. 6066-6076 - Koundinya Koorapati, Rubini Pandu, Prem Kumar Ramesh, Sairam Veeraswamy, Usha Narasappa:
Towards a unified ontology for IoT fabric with SDDC. 6077-6091 - Archana Kumari, D. K. Lobiyal:
Efficient estimation of Hindi WSD with distributed word representation in vector space. 6092-6103 - Milliam Maxime Zekeng Ndadji, Maurice Tchoupé Tchendji, Clémentin Tayou Djamégni, Didier Parigot:
A projection-stable grammatical model for the distributed execution of administrative processes with emphasis on actors' views. 6104-6115 - Youness Chaabi, Fadoua Ataa-Allah:
Amazigh spell checker using Damerau-Levenshtein algorithm and N-gram. 6116-6124 - Ahmed Taki Eddine Dib, Ramdane Maamri:
A multi-layered bigraphical modelling approach for context-aware systems. 6125-6139 - Ali Alwehaibi, Marwan Bikdash, Mohammad Albogmi, Kaushik Roy:
A study of the performance of embedding methods for Arabic short-text sentiment analysis using deep learning approaches. 6140-6149 - Rashedul Islam, Md. Rafiqul Islam, Kamrul Hasan Talukder:
An efficient ROI detection algorithm for Bangla text extraction and recognition from natural scene images. 6150-6164 - Ankita Vaish, Saumya Patel:
A sparse representation based compression of fused images using WDR coding. 6165-6178 - Xiangbin Liu, Shuqi Chen, Liping Song, Marcin Wozniak, Shuai Liu:
Self-attention negative feedback network for real-time image super-resolution. 6179-6186 - H. N. Veena, A. Muruganandham, T. Senthil Kumaran:
A novel optic disc and optic cup segmentation technique to diagnose glaucoma using deep learning convolutional neural network over retinal fundus images. 6187-6198 - Özgür Özdemir, Elena Battini Sönmez:
Attention mechanism and mixup data augmentation for classification of COVID-19 Computed Tomography images. 6199-6207 - Jisha Anu Jose, C. Sathish Kumar, S. Sureshkumar:
A deep multi-resolution approach using learned complex wavelet transform for tuna classification. 6208-6216 - Md. Saikat Islam Khan, Ashef Shahrior, Razaul Karim, Mahmodul Hasan, Anichur Rahman:
MultiNet: A deep neural network approach for detecting breast cancer through multi-scale feature fusion. 6217-6228 - Nivea Kesav, M. G. Jibukumar:
Efficient and low complex architecture for detection and classification of Brain Tumor using RCNN with Two Channel CNN. 6229-6242 - A. N. Omara, Tarek M. Salem, Sherif Elsanadily, Mostafa M. Elsherbini:
SSIM-based sparse image restoration. 6243-6254 - V. Deepa, C. Sathish Kumar, Thomas Cherian:
Ensemble of multi-stage deep convolutional neural networks for automated grading of diabetic retinopathy using image patches. 6255-6265 - Sakinat Oluwabukonla Folorunso, Sulaimon A. Afolabi, Adeoye B. Owodeyi:
Dissecting the genre of Nigerian music with machine learning models. 6266-6279 - Rasmiranjan Mohakud, Rajashree Dash:
Designing a grey wolf optimization based hyper-parameter optimized convolutional neural network classifier for skin cancer detection. 6280-6291 - Suyanto Suyanto, Prasti Eko Yunanto, Tenia Wahyuningrum, Siti Khomsah:
A multi-voter multi-commission nearest neighbor classifier. 6292-6302 - Rama Ranjan Panda, Naresh Kumar Nagwani:
Classification and intuitionistic fuzzy set based software bug triaging techniques. 6303-6323 - Saqib Iqbal, Issam Al-Azzoni:
Test case prioritization for model transformations. 6324-6338 - Navneet Kaur, Hardeep Singh:
An empirical assessment of threshold techniques to discriminate the fault status of software. 6339-6353 - Purvi Prajapati, Amit Thakkar:
Performance improvement of extreme multi-label classification using K-way tree construction with parallel clustering algorithm. 6354-6364 - Nawaf H. M. M. Shrifan, Muhammad Firdaus Akbar, Nor Ashidi Mat Isa:
An adaptive outlier removal aided k-means clustering algorithm. 6365-6376 - Sezai Tokat, Kenan Karagul, Yusuf Sahin, Erdal Aydemir:
Fuzzy c-means clustering-based key performance indicator design for warehouse loading operations. 6377-6384 - Naina Yadav, Sukomal Pal, Anil Kumar Singh, Kartikey Singh:
Clus-DR: Cluster-based pre-trained model for diverse recommendation generation. 6385-6399 - Harshvardhan GM, Mahendra Kumar Gourisaria, Siddharth Swarup Rautaray, Manjusha Pandey:
UBMTR: Unsupervised Boltzmann machine-based time-aware recommendation system. 6400-6413 - Amrendra Singh Yadav, Shivani Agrawal, Dharmender Singh Kushwaha:
Distributed Ledger Technology-based land transaction system with trusted nodes consensus mechanism. 6414-6424 - Youssef Harrath:
A three-stage layer-based heuristic to solve the 3D bin-packing problem under balancing constraint. 6425-6431 - Abdülkadir Gümüsçü, Serkan Kaya, Mehmet Emin Tenekeci, Izzettin Hakan Karaçizmeli, Ibrahim Berkan Aydilek:
The impact of local search strategies on chaotic hybrid firefly particle swarm optimization algorithm in flow-shop scheduling. 6432-6440 - Kunal Das, Arindam Sadhu:
Experimental study on the quantum search algorithm over structured datasets using IBMQ experience. 6441-6452 - Vaishnavi Kumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
Quantum true random number generation on IBM's cloud platform. 6453-6465 - Muhammet Yorulmaz, Gülin Feryal Can:
Task and user-based Entropy-Rank Sum-TPOP integration proposal for usability evaluation of web applications. 6466-6480 - Priyanka Nehra, A. Nagaraju:
Host utilization prediction using hybrid kernel based support vector regression in cloud data centers. 6481-6490 - Sunil Kumar, Krishna Kumar Mohbey:
Memory-optimized distributed utility mining for big data. 6491-6503
Volume 34, Number 9, October 2022
- Ibrahim A. Ahmed, Fatima N. Al-Aswadi, Khaled M. G. Noaman, Wafa' Za'al Alma'aitah:
Arabic Knowledge Graph Construction: A close look in the present and into the future. 6505-6523 - Salha Alyami, Areej Alhothali, Amani T. Jamal:
Systematic literature review of arabic aspect-based sentiment analysis. 6524-6551 - Amit Kumar, Rajesh Kumar Mundotiya, Ajay Pratap, Anil Kumar Singh:
TLSPG: Transfer learning-based semi-supervised pseudo-corpus generation approach for zero-shot translation. 6552-6563 - Ftoon Kedwan:
NLQ into SQL translation using computational linguistics. 6564-6582 - Hamza Alami, Noureddine En-Nahnahi, Abdelkader El Mahdaouy, Saïd El Alaoui Ouatik:
Embedding arabic questions by feature-level fusion of word representations for questions classification: It is worth doing? 6583-6594 - Samah M. Alzanin, Aqil M. Azmi, Hatim A. Aboalsamh:
Short text classification for Arabic social media tweets. 6595-6604 - Eftekhar Hossain, Omar Sharif, Mohammed Moshiul Hoque, M. Ali Akber Dewan, Nazmul H. Siddique, Md. Azad Hossain:
Identification of Multilingual Offense and Troll from Social Media Memes Using Weighted Ensemble of Multimodal Features. 6605-6623 - Pankaj Dadure, Partha Pakray, Sivaji Bandyopadhyay:
Embedding and generalization of formula with context in the retrieval of mathematical information. 6624-6634 - Hamood Alshalabi, Sabrina Tiun, Nazlia Omar, Fatima N. Al-Aswadi, Kamal Ali Alezabi:
Arabic light-based stemmer using new rules. 6635-6642 - Nazreena Rahman, Bhogeswar Borah:
An unsupervised method for word sense disambiguation. 6643-6651 - Mohammed M. Abdelgwad, Taysir Hassan A. Soliman, Ahmed I. Taloba, Mohamed Fawzy Farghaly:
Arabic aspect based sentiment analysis using bidirectional GRU based models. 6652-6662 - Prashanth K. V. T. K. N., Tene Ramakrishnudu:
A novel method for detecting psychological stress at tweet level using neighborhood tweets. 6663-6680 - Divya Jatain, Vikram Singh, Naveen Dahiya:
A contemplative perspective on federated machine learning: Taxonomy, threats & vulnerability assessment and challenges. 6681-6698 - Iyolita Islam, Muhammad Nazrul Islam:
Digital intervention to reduce counterfeit and falsified medicines: A systematic review and future research agenda. 6699-6718 - Ahmed G. Gad, Diana T. Mosa, Laith Abualigah, Amr A. Abohany:
Emerging Trends in Blockchain Technology and Applications: A Review and Outlook. 6719-6742 - Raza Imam, Kaushal Kumar, Syed Mehran Raza, Rumi Sadaf, Faisal Anwer, Noor Fatima, Mohammad Nadeem, Mohamed Abbas, Obaidur Rahman:
A systematic literature review of attribute based encryption in health services. 6743-6774 - Murat Aydos, Çigdem Aldan, Evren Coskun, Alperen Soydan:
Security testing of web applications: A systematic mapping of the literature. 6775-6792 - Bela Shrimali, Hiren B. Patel:
Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities. 6793-6807 - Jasleen Kaur, Alka Agrawal, Raees Ahmad Khan:
Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario. 6808-6817 - De Rosal Ignatius Moses Setiadi, Eko Hari Rachmawanto, Rahmawati Zulfiningrum:
Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling. 6818-6828 - Mukul Majhi, Ajay Kumar Mallick:
Random projection and hashing based privacy preserving for image retrieval paradigm using invariant and clustered feature. 6829-6846 - Atef Ibrahim, Fayez Gebali:
Compact modular multiplier design for strong security capabilities in resource-limited Telehealth IoT devices. 6847-6854 - Syada Tasmia Alvi, Mohammed Nasir Uddin, Linta Islam, Sajib Ahamed:
DVTChain: A blockchain-based decentralized mechanism to ensure the security of digital voting system voting system. 6855-6871 - Chirag Joshi, Ranjeet Kumar Ranjan, Vishal Bharti:
A Fuzzy Logic based feature engineering approach for Botnet detection using ANN. 6872-6882 - Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi, Alvine Boaye Belle:
Probing AndroVul dataset for studies on Android malware classification. 6883-6894 - Mohammed Imtyaz Ahmed, Govindaraj Kannan:
Secure and lightweight privacy preserving Internet of things integration for remote patient monitoring. 6895-6908 - Faiza Al-Shaarani, Adnan Gutub:
Securing matrix counting-based secret-sharing involving crypto steganography. 6909-6924 - Manasha Saqib, Jasra Bhat, Ayaz Hassan Moon:
A lightweight three factor authentication framework for IoT based critical applications. 6925-6937 - Abdelhakim Zeroual, Mohamed Amroune, Makhlouf Derdour, Atef Bentahar:
Lightweight deep learning model to secure authentication in Mobile Cloud Computing. 6938-6948 - Partha Pratim Ray:
A review on 6G for space-air-ground integrated network: Key enablers, open challenges, and future direction. 6949-6976 - Alaa Abu-Srhan, Mohammad A. M. Abushariah, Omar Sultan Al-Kadi:
The effect of loss function on conditional generative adversarial networks. 6977-6988 - Ranjita Joon, Parul Tomar:
Energy Aware Q-learning AODV (EAQ-AODV) routing for cognitive radio sensor networks. 6989-7000 - Massa Ndong, Mohammad Hayajneh, Najah Abu Ali, Shayma Alkobaisi:
Towards a 3-tiered space-air-ground network with reinforcement learning. 7001-7013 - Abir Benabid Najjar, Arwa Rashed Al-Issa, Manar Hosny:
Dynamic indoor path planning for the visually impaired. 7014-7024 - Amol Vasudeva, Manu Sood:
On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering. 7025-7044 - Abdullah Alamri, Rayan Ali Alturki, Sultan Alamri:
Multi-user routing algorithm for indoor spaces - Adapted for social distancing. 7045-7058 - Kamila Koteish, Hassan Harb, Mohammad Dbouk, Chamseddine Zaki, Chady Abou Jaoude:
AGRO: A smart sensing and decision-making mechanism for real-time agriculture monitoring. 7059-7069 - Ishfaq Hussain, Janibul Bashir:
Dynamic MTU: A smaller path MTU size technique to reduce packet drops in IPv6. 7070-7088 - Amira S. Ibrahim, Hassan Al-Mahdi, Hamed Nassar:
Characterization of task response time in a fog-enabled IoT network using queueing models with general service times. 7089-7100 - Alvin Riady, Gede Putra Kusuma:
Indoor positioning system using hybrid method of fingerprinting and pedestrian dead reckoning. 7101-7110 - Ernando Batista, Gustavo B. Figueiredo, Cássio V. S. Prazeres:
Load balancing between fog and cloud in fog of things based platforms through software-defined networking. 7111-7125 - Mamoun Awad, Farag M. Sallabi, Khaled Shuaib, Faisal Naeem:
Artificial intelligence-based fault prediction framework for WBAN. 7126-7137 - Dimple Nagpal, Surya Narayan Panda, Muthukumaran Malarvel, Priyadarshini Adyasha Pattanaik, Mohammad Zubair Khan:
A review of diabetic retinopathy: Datasets, approaches, evaluation metrics and future trends. 7138-7152 - Naseem Ahmad, Kuldeep Singh Yadav, Manir Ahmed, Rabul Hussain Laskar, Ashraf Hossain:
An integrated approach for eye centre localization using deep networks and rectangular-intensity-gradient technique. 7153-7167 - Usman Ali, Ikhyun Lee, Muhammad Tariq Mahmood:
Robust regularization for single image dehazing. 7168-7173 - Md. Jueal Mia, Rafat Bin Mahmud, Md. Safein Sadad, Hafiz Al Asad, Rafat Hossain:
An in-depth automated approach for fish disease recognition. 7174-7183 - Genji Yuan, Jianbo Li, Xue Liu, Zheng Yang:
Weakly supervised road network extraction for remote sensing image based scribble annotation and adversarial learning. 7184-7199 - Jaba Deva Krupa Abel, Samiappan Dhanalakshmi, Khin Wee Lai, Yongqi Tan, Xiang Wu:
An IoMT enabled deep learning framework for automatic detection of fetal QRS: A solution to remote prenatal care. 7200-7211 - Sharad Hasan, Sarwar Jahan, Md. Imdadul Islam:
Disease detection of apple leaf with combination of color segmentation and modified DWT. 7212-7224 - Tomasz Kocejko, Jacek Ruminski, Magdalena Mazur-Milecka, Marzena Romanowska-Kocejko, Krzysztof Chlebus, Kang-Hyun Jo:
Using convolutional neural networks for corneal arcus detection towards familial hypercholesterolemia screening. 7225-7235 - Hady Pranoto, Yaya Heryadi, Harco Leslie Hendric Spits Warnars, Widodo Budiharto:
Enhanced IPCGAN-Alexnet model for new face image generating on age target. 7236-7246 - Lalit Maurya, Viney Lohchab, Prasant Kumar Mahapatra, János Abonyi:
Contrast and brightness balance in image enhancement using Cuckoo Search-optimized image fusion. 7247-7258 - Jie Liu, Yanna Zhao, Weikuan Jia, Ze Ji:
DLNet: Accurate segmentation of green fruit in obscured environments. 7259-7270 - Soumya Kuruvayil, Suja Palaniswamy:
Emotion recognition from facial images with simultaneous occlusion, pose and illumination variations using meta-learning. 7271-7282 - Ahmed Iqbal, Muhammad Sharif:
MDA-Net: Multiscale dual attention-based network for breast lesion segmentation using ultrasound images. 7283-7299 - Hussain Dawood, Sajid Saleem, Farman Hassan, Ali Javed:
A robust voice spoofing detection system using novel CLS-LBP features and LSTM. 7300-7312 - G. Deekshitha, Leena Mary:
Multilingual broad phoneme recognition and language-independent spoken term detection for low-resourced languages. 7313-7323 - Rajesh Kumar Mundotiya, Arpit Mehta, Rupjyoti Baruah, Anil Kumar Singh:
Integration of morphological features and contextual weightage using monotonic chunk attention for part of speech tagging. 7324-7334 - Muzaffer Aslan:
CNN based efficient approach for emotion recognition. 7335-7346 - Enoch Arulprakash, Martin Aruldoss:
A study on generic object detection with emphasis on future research directions. 7347-7365 - Badr Ben Elallid, Nabil Benamar, Abdelhakim Senhaji Hafid, Tajjeeddine Rachidi, Nabil Mrani:
A Comprehensive Survey on the Application of Deep and Reinforcement Learning Approaches in Autonomous Driving. 7366-7390 - Shahid Hussain, Subhasis Thakur, Saurabh Shukla, John G. Breslin, Qasim Jan, Faisal Khan, Yunsu Kim:
A two-layer decentralized charging approach for residential electric vehicles based on fuzzy data fusion. 7391-7405 - Safouane El Ghazouali, Alain Vissiere, Louis-Ferdinand Lafon, Mohamed Lamjed Bouazizi, Hichem Nouira:
Optimised calibration of machine vision system for close range photogrammetry based on machine learning. 7406-7418 - Amgad Muneer, Suliman Mohamed Fati, Nur Arifin Akbar, David Agustriawan, Setyanto Tri Wahyudi:
iVaccine-Deep: Prediction of COVID-19 mRNA vaccine degradation using deep learning. 7419-7432 - Subba Rao Polamuri, Kudipudi Srinivas, A. Krishna Mohan:
Multi-Model Generative Adversarial Network Hybrid Prediction Algorithm (MMGAN-HPA) for stock market prices prediction. 7433-7444 - Mohsen Ahmadi, Ali Taghavirashidizadeh, Danial Javaheri, Armin Masoumian, Saeid Jafarzadeh Ghoushchi, Yaghoub Pourasad:
DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering. 7445-7458 - Moch Saiful Umam, Mustafid Mustafid, Suryono Suryono:
A hybrid genetic algorithm and tabu search for minimizing makespan in flow shop scheduling problem. 7459-7467 - Gayathri Rajendran, V. Uma, Bettina O'Brien:
Unified robot task and motion planning with extended planner using ROS simulator. 7468-7481 - Neetika Jain, Sangeeta Mittal:
Bayesian Nash Equilibrium based Gaming Model for Eco-safe Driving. 7482-7493 - Olivier Debauche, Saïd Mahmoudi, Pierre Manneback, Frédéric Lebeau:
Cloud and distributed architectures for data management in agriculture 4.0 : Review and future trends. 7494-7514 - Imene Latreche, Sihem Slatnia, Okba Kazar, Mohamed Batouche:
A third generation genetic algorithm NSGAIII for task scheduling in cloud computing. 7515-7529 - Arvind Mewada, Rupesh Kumar Dewang:
Research on false review detection Methods: A state-of-the-art review. 7530-7546 - Inderpreet Singh, Gulshan Goyal, Anmol Chandel:
AlexNet architecture based convolutional neural network for toxic comments classification. 7547-7558 - Mohamed Mahdi Malik, Hichem Haouassi:
Efficient sequential covering strategy for classification rules mining using a discrete equilibrium optimization algorithm. 7559-7569 - Shashank Sheshar Singh, Divya Srivastava, Madhushi Verma, Jagendra Singh:
Influence maximization frameworks, performance, challenges and directions on social network: A theoretical study. 7570-7603 - Bouchra El Idrissi, Salah Baïna, Anass Mamouny, Mina Elmaallam:
RDF/OWL storage and management in relational database management systems: A comparative study. 7604-7620 - Kamalakant Laxman Bawankule, Rupesh Kumar Dewang, Anil Kumar Singh:
A classification framework for straggler mitigation and management in a heterogeneous Hadoop cluster: A state-of-art survey. 7621-7644 - Fethi Fkih:
Similarity measures for Collaborative Filtering-based Recommender Systems: Review and experimental comparison. 7645-7669 - Jeevamol Joy, Renumol Vemballiveli Govinda Pillai:
Review and classification of content recommenders in E-learning environment. 7670-7685 - Brahim Djellabi, Mourad Amad, Abderrahmene Baadache:
Handfan: A flexible peer-to-peer service discovery system for internet of things applications. 7686-7698 - Aziz Qaroush, Abdalkarim Awad, Abualsoud Hanani, Khader Mohammad, Basam Jaber, Ala Hasheesh:
Learning-free, divide and conquer text-line extraction algorithm for printed Arabic text with diacritics. 7699-7709 - Nor Ashidah Selamat, Azizi Abdullah, Norizan Mat Diah:
Association features of smote and rose for drug addiction relapse risk. 7710-7719 - Mohammed Mounir Bouhamed, Allaoua Chaoui, Radouane Nouara, Gregorio Díaz, Abderraouf Dembri:
Reducing the number of migrated instances during business process change: A graph rewriting approach. 7720-7734 - Ebenezer Fiifi Emire Atta Mills, Siegfried Kafui Anyomi:
A hybrid two-stage robustness approach to portfolio construction under uncertainty. 7735-7750 - M. I. R. Shuvo, M. A. H. Akhand, Nazmul H. Siddique:
Handwritten numeral recognition through superimposition onto printed form. 7751-7764 - Dipika Singh, Rakhi Garg:
NI-Louvain: A novel algorithm to detect overlapping communities with influence analysis. 7765-7774 - Oguzhan Ahmet Arik:
Fuzzy rule-based acceptance criterion in metaheuristic algorithms. 7775-7789 - Ravita Mishra, Sheetal Rathi:
Enhanced DSSM (deep semantic structure modelling) technique for job recommendation. 7790-7802 - Samer Sawalha, Ghazi Al-Naymat:
Towards an efficient big data management schema for IoT. 7803-7818 - Khushboo Jain, Meera M. Dhabu, Omprakash Kakde, Nitesh A. Funde:
Completely fair energy scheduling mechanism in a smart distributed multi-microgrid system. 7819-7829 - Prasetyo Wibowo, Chastine Fatichah:
Pruning-based oversampling technique with smoothed bootstrap resampling for imbalanced clinical dataset of Covid-19. 7830-7839
Volume 34, Number 10, Part A, November 2022
- Mustafa R. Kadhim, Guangyao Zhou, Wenhong Tian:
A novel self-directed learning framework for cluster ensemble. 7841-7855 - Umer Ali Khan, Ali Javed:
A hybrid CBIR system using novel local tetra angle patterns and color moment features. 7856-7873 - Md. Mahbubur Rahman, Dipanjali Kundu, Sayma Alam Suha, Umme Raihan Siddiqi, Samrat Kumar Dey:
Hospital patients' length of stay prediction: A federated learning approach. 7874-7884 - Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Abdullah Abdulrehman Alabdulatif, Mehak Maqbool Memon, Rabeea Jaffari, Mohd Nasir Abdullah:
RZee: Cryptographic and statistical model for adversary detection and filtration to preserve blockchain privacy. 7885-7910 - Arouna Ndam Njoya, Christopher Thron, Marah Nana Awa, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui:
Power-saving system designs for hexagonal cell based wireless sensor networks with directional transmission. 7911-7919 - Federico Gatta, Fabio Giampaolo, Edoardo Prezioso, Gang Mei, Salvatore Cuomo, Francesco Piccialli:
Neural networks generative models for time series. 7920-7939 - Manzoor Ahmed, Zain Ali, Wali Ullah Khan, Omer Waqar, Muhammad Asif, Abd Ullah Khan, Muhammad Awais Javed, Fahd N. Al-Wesabi:
Cooperative backscatter NOMA with imperfect SIC: Towards energy efficient sum rate maximization in sustainable 6G networks. 7940-7947 - Yongheng Zhang, Feng Zhang, Si Tong, Amin Rezaeipanah:
A dynamic planning model for deploying service functions chain in fog-cloud computing. 7948-7960 - Sheela Ramachandra, Suchithra Ramachandran:
Region specific and subimage based neighbour gradient feature extraction for robust periocular recognition. 7961-7973 - Ahmed Al Hamoud, Amber Hoenig, Kaushik Roy:
Sentence subjectivity analysis of a political and ideological debate dataset using LSTM and BiLSTM with attention and GRU models. 7974-7987 - Jiajia Jiang, Yushu Zhang, Youwen Zhu, Xuewen Dong, Liangmin Wang, Yong Xiang:
DCIV: Decentralized cross-chain data integrity verification with blockchain. 7988-7999 - Afreen Khan, Swaleha Zubair:
Development of a three tiered cognitive hybrid machine learning algorithm for effective diagnosis of Alzheimer's disease. 8000-8018 - Mohammed A. H. Ali, Saad Mekhilef, Yusoff Nukman, Bushroa Abdul Razak:
Laser simulator logic: A novel inference system for highly overlapping of linguistic variable in membership functions. 8019-8040 - Ssu-Han Chen, Yu-Wei Lai, Chung-Lun Kuo, Chieh-Yi Lo, Yu-Sung Lin, Yan-Rung Lin, Chih-Hsiang Kang, Chia-Chun Tsai:
A surface defect detection system for golden diamond pineapple based on CycleGAN and YOLOv4. 8041-8053 - Wanying Guo, Nawab Muhammad Faseeh Qureshi, Isma Farah Siddiqui, Dong Ryeol Shin:
Cooperative Communication Resource Allocation Strategies for 5G and Beyond Networks: A Review of Architecture, Challenges and Opportunities. 8054-8078 - Ruifeng Li, Xu An Wang, Haibin Yang, Ke Niu, Dianhua Tang, Xiaoyuan Yang:
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit. 8079-8089 - Antoni Jaszcz, Dawid Polap:
AIMM: Artificial Intelligence Merged Methods for flood DDoS attacks detection. 8090-8101 - Wenxian Jia, Guohong Qi, Menghan Liu, Jie Zhou:
A high accuracy localization algorithm with DV-Hop and fruit fly optimization in anisotropic wireless networks. 8102-8111 - Jawad Ahmad, Syed Aziz Shah, Shahid Latif, Fawad Ahmed, Zhuo Zou, Nikolaos Pitropakis:
DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. 8112-8121 - Mehdi Hassan, Safdar Ali, Hani Alquhayz, Jin Young Kim, Muhammad Sanaullah:
Developing liver cancer drug response prediction system using late fusion of reduced deep features. 8122-8135 - Moatsum Alawida, Je Sen Teh, Abid Mehmood, Abdulhadi Shoufan, Wafa' Hamdan Alshoura:
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations. 8136-8151 - Chunyang Wu, Fei Zhu, Quan Liu:
Explore the weakness: Instructive exploration adversarial robust reinforcement learning. 8152-8161 - Sani Isah Abba, Mohammed Benaafi, Abdullahi Garba Usman, Isam H. Aljundi:
Inverse groundwater salinization modeling in a sandstone's aquifer using stand-alone models with an improved non-linear ensemble machine learning technique. 8162-8175 - Moatsum Alawida, Abiodun Esther Omolara, Oludare Isaac Abiodun, Murad Al-Rajab:
A deeper look into cybersecurity issues in the wake of Covid-19: A survey. 8176-8206 - Rami Sihwail, Obadah Said Solaiman, Khairul Akram Zainol Ariffin:
New robust hybrid Jarratt-Butterfly optimization algorithm for nonlinear models. 8207-8220 - Hongsheng Li, Amjad Osmani, Amira Sayed A. Aziz:
A fuzzy-based fast routing algorithm with guaranteed latency-throughput over software defined networks. 8221-8233 - Devi Fitrianah, Hisyam Fahmi, Achmad Nizar Hidayanto, Aniati Murni Arymurthy:
Improved partitioning technique for density cube-based spatio-temporal clustering method. 8234-8244 - Jie Wang, Lingfeng Liu, Mengfei Xu, Xiangjun Li:
A novel content-selected image encryption algorithm based on the LS chaotic model. 8245-8259 - Qiang Zhao, Changwei Li:
A new point-infilling and level-setting algorithm enhanced by heuristic searching and incremental clustering to solve global optimization problems. 8260-8283 - Chenbin Ma, Peng Zhang, Longsheng Pan, Xuemei Li, Chunyu Yin, Ailing Li, Rui Zong, Zhengbo Zhang:
Two-stage framework for automatic diagnosis of multi-task in essential tremor via multi-sensory fusion parameters. 8284-8296 - Yao Zhang, Jianpeng Xie, Yang Liu, Chaoqun Li, Jing Xiao, Hongliang Ma, Jie Zhou:
An immune chaotic adaptive evolutionary algorithm for energy-efficient clustering management in LPWSN. 8297-8306 - Yasemin Eryoldas, Alptekin Durmusoglu:
An efficient parameter tuning method based on the Latin Hypercube Hammersley Sampling and fuzzy C-Means clustering methods. 8307-8322 - Harcharan Jit Singh, Seema Bawa:
LaMeta: An efficient locality aware metadata management technique for an ultra-large distributed storage system. 8323-8335 - Zafar Masood, Jiangbin Zheng, Idrees Ahmad, Muhammad Irfan:
High-performance adaptive texture streaming for planetary-scale high-mobility information visualization. 8336-8349 - Yinghui Zhang, Xuanni Wei, Jin Cao, Jianting Ning, Zuobin Ying, Dong Zheng:
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare. 8350-8361 - Yongming Nian, Yanping Chen, Yongbin Qin, Ruizhang Huang, Ruixue Tang, Hu Ying:
A joint model for entity boundary detection and entity span recognition. 8362-8369 - Hongwu Qin, Yuntao Cheng, Xiuqin Ma, Fei Li, Jemal H. Abawajy:
Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security. 8370-8379 - Wasim Ahmad Bhat:
FUSE based file system for efficient storage and retrieval of fragmented multimedia files. 8380-8389 - P. Shanmuga Sundari, M. Subaji:
An improved hidden behavioral pattern mining approach to enhance the performance of recommendation system in a big data environment. 8390-8400 - Himansu Sekhar Pattanayak, Harsh Kumar Verma, Amrit Lal Sangal:
Lengthening of average path length in social networks due to the effect of community structure. 8401-8421 - Fatima-Zahra El-Alami, Said Ouatik El Alaoui, Noureddine En-Nahnahi:
Contextual semantic embeddings based on fine-tuned AraBERT model for Arabic text multi-class categorization. 8422-8428 - Saeed Salah, Mohammad Nassar, Raid Zaghal, Osama Hamed:
Towards the automatic generation of Arabic Lexical Recognition Tests using orthographic and phonological similarity maps. 8429-8439 - Shruti Mittal, Chander Kumar Nagpal:
Predicting a reliable stock for mid and long term investment. 8440-8448 - Sonal Gore, Jayant Jagtap:
Radiogenomic analysis: 1p/19q codeletion based subtyping of low-grade glioma by analysing advanced biomedical texture descriptors. 8449-8458 - Febina Ikbal, Rajamma Gopikakumari:
Image block generation from block-based SMRT in colour image encryption and its performance analysis. 8459-8477 - Hicham Reguieg, Benallal Mohamed Anis:
Processes meet Big Data: Scaling process discovery algorithms in Big Data environment. 8478-8489 - Abdulelah Alwabel:
CoEdit: A novel error correction mechanism in compilers using spelling correction algorithms. 8490-8500 - Amarjeet Prajapati:
A particle swarm optimization approach for large-scale many-objective software architecture recovery. 8501-8513 - Amit Hirawat, Swapnesh Taterh, Tarun Kumar Sharma:
A dynamic window-size based segmentation technique to detect driver entry and exit from a car. 8514-8522 - Vipin Kumar, Prem Shankar Singh Aydav, Sonajharia Minz:
Multi-view ensemble learning using multi-objective particle swarm optimization for high dimensional data classification. 8523-8537 - Ridouane Tachicart, Karim Bouzoubaa:
Moroccan Arabic vocabulary generation using a rule-based approach. 8538-8548 - Sumitra Nuanmeesri:
Development of community tourism enhancement in emerging cities using gamification and adaptive tourism recommendation. 8549-8563 - Panimalar Kathiroli, Kanmani Selvadurai:
Energy efficient cluster head selection using improved Sparrow Search Algorithm in Wireless Sensor Networks. 8564-8575 - Ruhul Amin Hazarika, Debdatta Kandar, Arnab Kumar Maji:
An experimental analysis of different Deep Learning based Models for Alzheimer's Disease classification using Brain Magnetic Resonance Images. 8576-8598 - Rajesh Kumar, Rewa Sharma:
Leveraging blockchain for ensuring trust in IoT: A survey. 8599-8622 - Yamina Moualkia, Mourad Amad, Abderrahmane Baadache:
Hierarchical and scalable peer-to-peer architecture for online social network. 8623-8636 - Dina Shehada, Amjad Gawanmeh, Chan Yeob Yeun, M. Jamal Zemerly:
Fog-based distributed trust and reputation management system for internet of things. 8637-8646 - S. Sharan Ranjit, Raj K. Jaiswal:
Intrinsic decomposition with deep supervision from a single image. 8647-8657 - Raveena Aggarwal, Jyoti Verma, Manvi Siwach:
Small files' problem in Hadoop: A systematic literature review. 8658-8674 - Umamaheswara Sharma Bhutamapuram, Ravichandra Sadam:
With-in-project defect prediction using bootstrap aggregation based diverse ensemble learning technique. 8675-8691 - Mouna Hadj-Kacem, Nadia Bouassida:
A multi-label classification approach for detecting test smells over java projects. 8692-8701 - Mohamed Attia, Manal A. Abdel-Fattah, Ayman E. Khedr:
A proposed multi criteria indexing and ranking model for documents and web pages on large scale data. 8702-8715 - Azizkhan F. Pathan, Chetana Prakash:
Attention-based position-aware framework for aspect-based opinion mining using bidirectional long short-term memory. 8716-8726 - Altaf Alam, Laxman Singh, Zainul Abdin Jaffery, Yogesh Kumar Verma, Manoj Diwakar:
Distance-based confidence generation and aggregation of classifier for unstructured road detection. 8727-8738 - Rajesh Kumar Mundotiya, Swasti Mishra, Anil Kumar Singh:
Hierarchical self attention based sequential labelling model for Bhojpuri, Maithili and Magahi languages. 8739-8749 - Abd Ullah Khan, Muhammad Tanveer, Wali Ullah Khan:
On reliability in the performance analysis of cognitive radio networks. 8750-8756 - Chetna Gupta, Pedro R. M. Inácio, Mário M. Freire:
Improving software maintenance with improved bug triaging. 8757-8764 - Sugyan Kumar Mishra, Anirban Sarkar:
Service-oriented architecture for Internet of Things: A semantic approach. 8765-8776 - Sudeepa Das, Tirath Prasad Sahu, Rekh Ram Janghel:
Stock market forecasting using intrinsic time-scale decomposition in fusion with cluster based modified CSA optimized ELM. 8777-8793 - Biswajit Bera, Pravat Kumar Shit, Nairita Sengupta, Soumik Saha, Sumana Bhattacharjee:
Susceptibility of deforestation hotspots in Terai-Dooars belt of Himalayan Foothills: A comparative analysis of VIKOR and TOPSIS models. 8794-8806 - Kai Li, Hui Wang, Wenjun Wang, Feng Wang, Zhihua Cui:
Improving artificial bee colony algorithm using modified nearest neighbor sequence. 8807-8824 - Ammar Mohammed, Rania Kora:
An effective ensemble deep learning framework for text classification. 8825-8837 - Monalisa Sahu, Neelamadhab Padhy, Sasanko Sekhar Gantayat:
Multi-directional PVD steganography avoiding PDH and boundary issue. 8838-8851 - Satwinder Singh, Himanshu Beniwal:
A survey on near-human conversational agents. 8852-8866 - Ikhlasse Hamzaoui, Benjamin Duthil, Vincent Courboulay, Hicham Medromi:
Recent implications towards sustainable and energy efficient AI and big data implementations in cloud-fog systems: A newsworthy inquiry. 8867-8887 - Franklin Tchakounté, Jim Carlson Teukeng Ngnintedem, Irepran Damakoa, Ahmadou Faissal, Franck Arnaud Kuate Fotso:
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism. 8888-8898
Volume 34, Number 10, Part B, November 2022
- Nurbaity Sabri, Haza Nuzly Abdull Hamed, Zaidah Ibrahim, Kamalnizat Ibrahim, Mohd Adham Isa, Norizan Mat Diah:
The hybrid feature extraction method for classification of adolescence idiopathic scoliosis using Evolving Spiking Neural Network. 8899-8908 - Zarah M. Mannaa, Aqil M. Azmi, Hatim A. Aboalsamh:
Computer-assisted i'raab of Arabic sentences for teaching grammar to students. 8909-8926 - Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Musheer Ahmad, Ahmed A. Abd El-Latif:
Color stereo image encryption and local zero-watermarking schemes using octonion Hahn moments and modified Henon map. 8927-8954 - Prabhujit Mohapatra:
Combined economic emission dispatch in hybrid power systems using competitive swarm optimization. 8955-8971 - Xinguo Yu, Huihui Sun, Chao Sun:
A relation-centric algorithm for solving text-diagram function problems. 8972-8984 - Ravi Sharma, Balázs Villányi:
A spatiotemporal Order-Revealing query processing approach for Industrial Internet of Things. 8985-8995 - Song Zhang, Yanbing Liu, Yunpeng Xiao, Rui He:
Spatial-temporal upsampling graph convolutional network for daily long-term traffic speed prediction. 8996-9010 - Siti Zulaikha Mohd Jamaludin, Nurul Atiqah Romli, Mohd Shareduwan Mohd Kasihmuddin, Aslina Baharum, Mohd. Asyraf Mansor, Muhammad Fadhil Marsani:
Novel logic mining incorporating log linear approach. 9011-9027 - Pulung Nurtantio Andono, Catur Supriyanto:
Keypoints class distribution based entropy for weighting scheme on image classification. 9028-9038 - Yuan Zhao, Zhiyu Xiang, Kang Chen, Zhisheng Ye, Qi Lu:
Modelling and optimization for cognitive radio networks with preemption backoff mechanism. 9039-9051 - Yi Xie, Xianliang Jiang, Guang Jin, Ziyi Jiang, Diqun Yan:
NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks. 9052-9059 - Muhammad Husnain Haider, Zhonglai Wang, Abdullah Aman Khan, Hub Ali, Hao Zheng, Shaban Usman, Rajesh Kumar, M. Usman Maqbool Bhutta, Pengpeng Zhi:
Robust mobile robot navigation in cluttered environments based on hybrid adaptive neuro-fuzzy inference and sensor fusion. 9060-9070 - Chaoqun Li, Yang Liu, Yao Zhang, Mengying Xu, Jing Xiao, Jie Zhou:
A novel multi-level population hybrid search evolution algorithm for constrained multi-objective optimization problems. 9071-9087 - Yassine Zahraoui, Khalid Errajraji, Salah-Eddine Ramah, Afaf Bouhoute, Ismail Berrada:
Driver profiling: The pathway to deeper personalization. 9088-9101 - Mohamad Mulham Belal, Sundaram Divya Meena:
Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends. 9102-9131 - Fatima Azzam, Mohammed Kayed, Abdelmgied Ali:
A model for generating a user dynamic profile on social media. 9132-9145 - Eko Sediyono, Ferry Wahyu Wibowo, Hindriyanto Dwi Purnomo:
Leader election of dynamic wireless intelligent control machine in sensor network distributed processing. 9146-9162 - Yizhao Wu, Yanping Chen, Yongbin Qin, Ruizhang Huang, Ruixue Tang:
A marker collaborating model for entity and relation extraction. 9163-9172 - Xiaoyu Xu, Hui Wang, Wuquan Li, Meiqiao Wang:
Distributed output tracking via event-triggered control for nonlinear multi-agent systems. 9173-9183 - Ahmed Khudhur Nsaif, Sawal Hamid Md. Ali, Asama Kuder Nseaf, Khider Nassif Jassim, Ammar Al-Qaraghuli, Riza Sulaiman:
Robust and Swift Iris Recognition at distance based on novel pupil segmentation. 9184-9206 - Liang'an Huo, Ruifang Zhao, Laijun Zhao:
Effects of official information and rumor on resource-epidemic coevolution dynamics. 9207-9215 - Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu:
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV. 9216-9227 - Shiraz Ali Wagan, Jahwan Koo, Isma Farah Siddiqui, Muhammad Attique, Dong Ryeol Shin, Nawab Muhammad Faseeh Qureshi:
Internet of medical things and trending converged technologies: A comprehensive review on real-time applications. 9228-9251 - Zhihua Gan, Shiping Song, Lin Zhou, Daojun Han, Jiangyu Fu, Xiuli Chai:
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication. 9252-9272 - Nazife Cevik, Taner Çevik, Onur Osman, Ahmet Gürhanli, Sajjad Nematzadeh, Fatih Sahin:
Improved exploiting modification direction steganography for hexagonal image processing. 9273-9283 - Dragan Korac, Boris Damjanovic, Dejan Simic, Kim-Kwang Raymond Choo:
A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity. 9284-9300 - Yaolin Zhu, Huang JiaYI, Yunhong Li, Wenya Li:
Image identification of cashmere and wool fibers based on the improved Xception network. 9301-9310 - Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais:
Predicting input validation vulnerabilities based on minimal SSA features and machine learning. 9311-9331 - Khalid Alkharabsheh, Sadi Alawadi, Karam Ignaim, Nabeel Zanoon, Yania Crespo, M. Esperanza Manso, José Ángel Taboada González:
Prioritization of god class design smell: A multi-criteria based approach. 9332-9342 - Seung Gu Kim, Jiho Choi, Jin Seong Hong, Kang Ryoung Park:
Spoof detection based on score fusion using ensemble networks robust against adversarial attacks of fake finger-vein images. 9343-9362 - Jiawei Shen, Junfeng Tian, Ziyuan Wang, Hongyun Cai:
Friendship links-based privacy-preserving algorithm against inference attacks. 9363-9375 - Umar Ishfaq, Hikmat Ullah Khan, Saqib Iqbal:
Identifying the influential nodes in complex social networks using centrality-based approach. 9376-9392 - Zafar Masood, Jiangbin Zheng, Idrees Ahmad, Muhammad Irfan, Nafees Ahmad:
A novel method for adaptive terrain rendering using memory-efficient tessellation codes for virtual globes. 9393-9408 - Hongwu Qin, Meng Zhao, Xiuqin Ma, Huanling Sun, Weiyi Wei:
BMCR: A collaborator recommendation model based on Scholars' academic level. 9409-9418 - Jiexian Zeng, Huan Ouyang, Min Liu, Lu Leng, Xiang Fu:
Multi-scale YOLACT for instance segmentation. 9419-9427 - Said Agounad, Soukaina Hamou, Ousama Tarahi, Mustapha Moufassih, Md Kafiul Islam:
Intelligent fuzzy system for automatic artifact detection and removal from EEG signals. 9428-9441 - Abeer Almaghrabi, Areej Alhogail:
Blockchain-based donations traceability framework. 9442-9454 - Mengdie Han, Jiliang Zhang:
On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems. 9455-9463 - Parnika Bhat, Kamlesh Dutta:
A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain. 9464-9477 - Ruchin Gupta, Sandeep Kumar Singh:
A Novel Metric based Detection of Temporary Field Code Smell and its Empirical Analysis. 9478-9500 - Risnandar:
DeSa COVID-19: Deep salient COVID-19 image-based quality assessment. 9501-9512 - Bassam AlKindy, Christophe Guyeux:
Impact of Insertion Sequences and RNAs on Genomic Inversions in Pseudomonas aeruginosa. 9513-9522 - Supriya Agrahari, Anil Kumar Singh:
Concept Drift Detection in Data Stream Mining : A literature review. 9523-9540 - Gunjan Beniwal, Anita Singhrova:
"A systematic literature review on IoT gateways". 9541-9563 - Shini Renjith, Annie Abraham, Surya B. Jyothi, Lekshmi Chandran, Jincy Thomson:
An ensemble deep learning technique for detecting suicidal ideation from posts in social media platforms. 9564-9575 - Hanae Errousso, Jihane El Ouadi, El Arbi Abdellaoui Alaoui, Siham Benhadou:
Dynamic parking space allocation at urban scale: Problem formulation and resolution. 9576-9590 - Dwi Sunaryono, Riyanarto Sarno, Joko Siswantoro:
Gradient boosting machines fusion for automatic epilepsy detection from EEG signals based on wavelet features. 9591-9607 - Partha Pratim Ray, Dinesh Dash:
IoT-edge anomaly detection for covariate shifted and point time series health data. 9608-9621 - Preeti Monga, Manik Sharma, Sanjeev Kumar Sharma:
A comprehensive meta-analysis of emerging swarm intelligent computing techniques and their research trend. 9622-9643 - Aarthi Paramasivam, S. Jaya Nirmala:
A survey on textual entailment based question answering. 9644-9653 - Mohamed Awni, Mahmoud I. Khalil, Hazem M. Abbas:
Offline Arabic handwritten word recognition: A transfer learning approach. 9654-9661 - Sibang Liu, Kuili Liu, Zhen Zhong, Jinghan Yi, Hamdulah Aliev:
A novel wheeled mobile robots control based on robust hybrid controller: Mixed H2/H∞ and predictive algorithm approach. 9662-9676 - Guruprakash Jayabalasamy, Srinivas Koppu:
High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem. 9677-9687 - Pawan Kumar Upadhyay, Somil Rastogi, K. Vimal Kumar:
Coherent convolution neural network based retinal disease detection using optical coherence tomographic images. 9688-9695 - Mohammad Haris, Swaleha Zubair:
Mantaray modified multi-objective Harris hawk optimization algorithm expedites optimal load balancing in cloud computing. 9696-9709 - Abdulaziz M. Alayba, Vasile Palade:
Leveraging Arabic sentiment classification using an enhanced CNN-LSTM approach and effective Arabic text preparation. 9710-9722 - Muhammad Asif, Sagheer Abbas, M. A. Khan, Areej Fatima, Muhammad Adnan Khan, Sang-Woong Lee:
MapReduce based intelligent model for intrusion detection using machine learning technique. 9723-9731 - Simi Venuji Renuka, Damodar Reddy Edla, Justin Joseph:
An objective measure for assessing the quality of contrast enhancement on magnetic resonance images. 9732-9744 - Satish Kumar Satti, K. SuganyaDevi, Prasad Maddula, N. V. Vishnumurthy Ravipati:
Unified approach for detecting traffic signs and potholes on Indian roads. 9745-9756 - Swadhin Kumar Barisal, Shorya Pratap Singh Chauhan, Arpita Dutta, Sangharatna Godboley, Bibhudatta Sahoo, Durga Prasad Mohapatra:
BOOMPizer: Minimization and prioritization of CONCOLIC based boosted MC/DC test cases. 9757-9776 - Siham Yousfi, Dalila Chiadmi, Maryem Rhanoui:
Smart big data framework for insight discovery. 9777-9792 - Kyoung-Sook Kim, Dinh-Lam Pham, Young-In Park, Kwanghoon Pio Kim:
Experimental verification and validation of the SICN-oriented process mining algorithm and system. 9793-9813 - Abhishek Gupta, Somesh Kumar, Manisha Pattanaik:
Coverage hole detection using social spider optimized Gaussian Mixture Model. 9814-9821 - Manasi Jana, Biswapati Jana, Subhankar Joardar:
Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic. 9822-9835 - Radhakrishna Dodmane, Ganesh Aithal, Surendra Shetty:
Construction of vector space and its application to facilitate bitwise XOR - Free operation to minimize the time complexity. 9836-9843 - Mouna Bedoui, Hassen Mestiri, Belgacem Bouallegue, Belgacem Hamdi, Mohsen Machhout:
An improvement of both security and reliability for AES implementations. 9844-9851 - Meryem Soysaldi, Sedat Akleylek:
A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model. 9852-9866 - Sanjay Madan, Sanjeev Sofat, Divya Bansal:
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review. 9867-9888 - Rasmiranjan Mohakud, Rajashree Dash:
Skin cancer image segmentation utilizing a novel EN-GWO based hyper-parameter optimized FCEDN. 9889-9904 - Naeem Ullah, Ali Javed, Mustansar Ali Ghazanfar, Abdulmajeed Alsufyani, Sami Bourouis:
A novel DeepMaskNet model for face mask detection and masked facial recognition. 9905-9914 - Özkan Arslan, Mustafa Karhan:
Effect of Hilbert-Huang transform on classification of PCG signals using machine learning. 9915-9925 - Mohamed Maazouz, Abdelmoughni Toubal, Billel Bengherbia, Oussama Houhou, Noureddine Batel:
FPGA implementation of a chaos-based image encryption algorithm. 9926-9941 - Mohd Rafi Lone, Ekram Khan:
A good neighbor is a great blessing: Nearest neighbor filtering method to remove impulse noise. 9942-9952 - Gopal Behera, Neeta Nain:
Handling data sparsity via item metadata embedding into deep collaborative recommender system. 9953-9963 - Ramen Pal, Somnath Mukhopadhyay, Debasish Chakraborty, Ponnuthurai Nagaratnam Suganthan:
Very high-resolution satellite image segmentation using variable-length multi-objective genetic clustering for multi-class change detection. 9964-9976 - Andrea Vázquez-Ingelmo, Francisco José García-Peñalvo, Roberto Therón:
MetaViz - A graphical meta-model instantiator for generating information dashboards and visualizations. 9977-9990 - Nilayam Kumar Kamila, Jaroslav Frnda, Subhendu Kumar Pani, Rashmi Das, Sardar M. N. Islam, P. K. Bharti, Kamalakanta Muduli:
Machine learning model design for high performance cloud computing & load balancing resiliency: An innovative approach. 9991-10009 - Banghua Wu, Xuebin Lv, Wameed Deyah Shamsi, Ebrahim Gholami Dizicheh:
Optimal deploying IoT services on the fog computing: A metaheuristic-based multi-objective approach. 10010-10027 - Feras Al-Hawari:
Software design patterns for data management features in web-based information systems. 10028-10043 - Junyong Wang, Thar Baker, Yingnan Zhou, Ali Ismail Awad, Bin Wang, Yongsheng Zhu:
Automatic mapping of configuration options in software using static analysis. 10044-10055 - Nur Hidayah Mohammad Ismail, Md Yushalify Misro:
An improved image encryption algorithm based on Bézier coefficients matrix. 10056-10067 - Aseel Alsaedi, Abeer Alhuzali, Omaimah Bamasag:
Effective and scalable black-box fuzzing approach for modern web applications. 10068-10078 - Sholiq Sholiq, Riyanarto Sarno, Endang Siti Astuti:
Generating BPMN diagram from textual requirements. 10079-10093 - Ruiqi Guo, Yong Peng, Wanzeng Kong, Fan Li:
A semi-supervised label distribution learning model with label correlations and data manifold exploration. 10094-10108 - Sadia Afroze, Md. Rajib Hossain, Mohammed Moshiul Hoque:
DeepFocus: A visual focus of attention detection framework using deep learning in multi-object scenarios. 10109-10124 - Miguel Ángel Álvarez-Carmona, Ramón Aranda, Ansel Y. Rodríguez-González, Daniel Fajardo-Delgado, María Guadalupe Sánchez, Humberto Pérez Espinosa, Juan Martínez-Miranda, Rafael Guerrero-Rodríguez, Lázaro Bustio-Martínez, Ángel Díaz-Pacheco:
Natural language processing applied to tourism research: A systematic review and future research directions. 10125-10144 - ShuangGen Liu, Yu Zhu, RuiYun Wang:
Pairing-free certificateless blind signature scheme for smart grid. 10145-10156 - Huifang Yu, Jiafeng Shi:
Certificateless multi-source signcryption with lattice. 10157-10166 - Ziwen Zhu, Lingfeng Liu:
Thumbnail-preserving encryption based on improved logistic system. 10167-10179 - Francisco de Arriba-Pérez, Silvia García-Méndez, Francisco J. González-Castaño, Jaime González-González:
Explainable machine learning multi-label classification of Spanish legal judgements. 10180-10192 - Mohammed Ayub, Tarek Helmy:
Concurrent kernel execution and interference analysis on GPUs using deep learning approaches. 10193-10204 - Areej Bin Suhaim, Jawad Berri:
Directional user similarity model for personalized recommendation in online social networks. 10205-10216 - Oludare Isaac Abiodun, Moatsum Alawida, Abiodun Esther Omolara, Abdulatif Alabdulatif:
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. 10217-10245 - Pritom Biswas Udas, Md. Ebtidaul Karim, Kowshik Sankar Roy:
SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks. 10246-10272 - Se Woon Cho, Na Rae Baek, Kang Ryoung Park:
Deep Learning-based Multi-stage segmentation method using ultrasound images for breast cancer diagnosis. 10273-10292 - Feng Ye, Jun Sun, Zeyin Du, Nadia Nedjah, Wei Liu, Lin Lan:
Efficient data replay mechanism of sensor stream data based on concurrent buffer pool. 10293-10303 - Mohamed Elshrkawey, Hassan Al-Mahdi, Walid Atwa:
An enhanced routing algorithm based on a re-position particle swarm optimization (RA-RPSO) for wireless sensor network. 10304-10318 - Tauseef Rana, Ayesha Maqbool, Toqir Ahmad Rana, Alina Mirza, Zeshan Iqbal, Muhammad Attique Khan, Majed Alhaisoni, Abdullah Alqahtani, Ye Jin Kim, Byoungchol Chang:
Achieving stepwise construction of cyber physical systems in EX-MAN component model. 10319-10338 - Gazal, Kapil Juneja:
Two-phase fuzzy feature-filter based hybrid model for spam classification. 10339-10355 - Mohammed A. Alqarni, Mohamed-Hamed Mousa, Mohamed-K. Hussein:
Task offloading using GPU-based particle swarm optimization for high-performance vehicular edge computing. 10356-10364 - Yanhui Liu, Zhang Jianbiao, Muhammad Salman Pathan, Yuan Yijian, Zhang Puzhe, Sarah Maroc, Avishek Nag:
Research on identity authentication system of Internet of Things based on blockchain technology. 10365-10377 - Wenkai Li, Jiuyang Bu, Xiaoqi Li, Hongli Peng, Yuanzheng Niu, Yuqing Zhang:
A survey of DeFi security: Challenges and opportunities. 10378-10404 - Kwabena Sarpong, Jehoiada Kofi Jackson, Derrick Effah, Daniel Addo, Sophyani Banaamwini Yussif, Mohammad Awrangjeb, Rutherford Agbeshi Patamia, Juliana Mantebea Danso, Zhiguang Qin:
Classification from Sky: A Robust Remote Sensing Time Series Image Classification Using Spatial Encoder and Multi-Fast Channel Attention. 10405-10422 - Linh-An Phan, Taehong Kim:
Hybrid time synchronization protocol for large-scale wireless sensor networks. 10423-10433 - Rishabh Bhardwaj, Tushar Vaidya, Soujanya Poria:
Towards solving NLP tasks with optimal transport loss. 10434-10443 - Devika Kuttala, Dwarikanath Mahapatra, Ramanathan Subramanian, Venkata Ramana Murthy Oruganti:
Dense attentive GAN-based one-class model for detection of autism and ADHD. 10444-10458 - Zhengli Liu, Bing Li, Jian Wang, Yu Qiao:
A method of value model convergence and profit optimization for crossover services. 10459-10473 - Ganbayar Batchuluun, Se Hyun Nam, Kang Ryoung Park:
Deep learning-based plant classification and crop disease classification by thermal camera. 10474-10486 - Wanying Guo, Jahwan Koo, Isma Farah Siddiqui, Nawab Muhammad Faseeh Qureshi, Dong Ryeol Shin:
QoS-Aware Energy-Efficient MicroBase Station Deployment for 5G-Enabled HetNets. 10487-10495
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.