


default search action
The Journal of Supercomputing, Volume 80
Volume 80, Number 1, January 2024
- Zhiyong Zhou, Yuanning Liu, Xiaodong Zhu, Shuai Liu, Shaoqiang Zhang, Yuanfeng Li, Zhen Liu:

Lifelong iris presentation attack detection without forgetting. 1-19 - Dahai Xia, Xinyun Wu, Meng Yan, Caiquan Xiong:

An adaptive stochastic ranking-based tournament selection method for differential evolution. 20-49 - Khalid Javeed, Ali El-Moursy, David Gregg:

E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p). 50-74 - Chandan Kumar

, Sudhanshu Kumar Jha
, Dilip Kumar Yadav, Shiv Prakash, Mukesh Prasad:
A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic. 75-97 - Avita Katal, Tanupriya Choudhury

, Susheela Dahiya:
Energy optimized container placement for cloud data centers: a meta-heuristic approach. 98-140 - Sally Mohamed Sameh, Hossam El-Din Moustafa

, Ehab H. Abdelhay
, Mohamed Maher Ata:
An effective chaotic maps image encryption based on metaheuristic optimizers. 141-201 - Huafeng Wu, Feng Wang, Xiaojun Mei

, Linian Liang, Bing Han, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li
:
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors. 202-225 - Omar Younis Abdulhammed:

A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. 226-248 - Na Dong, Qingyue Feng, Jianfang Chang, Xiaoming Mai:

White blood cell classification based on a novel ensemble convolutional neural network framework. 249-270 - R. Rajalakshmi, P. Sivakumar, L. Krishna Kumari, M. Chengathir Selvi

:
A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism. 271-291 - Rebecca H. K. Emanuel, Paul David Docherty

, Helen Lunt, Knut Möller:
The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration. 292-312 - Yonghao Lai, Xiaohui Hua:

Component edge connectivity and extra edge connectivity of alternating group networks. 313-330 - Jin Yang, Wangdong Yang, Ruixuan Qi, Qinyun Tsai

, Shengle Lin
, Fengkun Dong, Kenli Li, Keqin Li:
Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer. 331-362 - Chih-Yung Chang, Syu-Jhih Jhang

, Shih-Jung Wu, Diptendu Sinha Roy:
JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP. 363-394 - Ruisheng Ran, Ting Wang, Zheng Li, Bin Fang:

Polynomial linear discriminant analysis. 413-434 - Ju-Won Park

, Xin Huang
, Chul-Ho Lee:
Analyzing and predicting job failures from HPC system log. 435-462 - Emmanuel Ahishakiye, Waweru Mwangi, Petronilla Muriithi, Fredrick Kanobe, Godliver Owomugisha, Danison Taremwa, Lenard Nkalubo:

Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data. 463-485 - Beste Ustubioglu

, Gul Tahaoglu
, Güzin Ulutas, Arda Ustubioglu, Muhammed Kiliç
:
Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach. 486-518 - Tian Tian, Anshi Wang, Xiuting Yang, Dunwei Gong, Tie Hou, Xiangjuan Yao:

Parallel program testing based on critical communication and branch transformation. 519-548 - Tobias Piontek, Kawsar Haghshenas

, Marco Aiello:
Carbon emission-aware job scheduling for Kubernetes deployments. 549-569 - Yashar Salami

, Vahid Khajehvand
, Esmaeil Zeinali:
SOS-FCI: a secure offloading scheme in fog-cloud-based IoT. 570-600 - Hamed Jalilian:

Total variation method based on modified Barzilai-Borwein algorithm to noise reduction in MRI images. 601-619 - Qun Li, Bei Tang, Jianxin Li, Siguang Chen:

User satisfaction-based energy-saving computation offloading in fog computing networks. 620-641 - Rong Gao, Wei He, Lingyu Yan, Donghua Liu, Yonghong Yu, Zhiwei Ye

:
Hybrid graph transformer networks for multivariate time series anomaly detection. 642-669 - Fatemeh Vardi, Alireza Mahjoub

:
A hot-module-aware mapping approach in network-on-chip. 670-702 - Sujit Sangram Sahoo

, Vijay Kumar Chaurasiya:
Proof of location based delivery system using multi-party virtual state channel: a blockchain model. 703-733 - Mao-Lun Chiang, Hui-Ching Hsieh, Tzu-Ling Lin, Tsui-Ping Chang, Hong-Wei Chen:

Dynamic weight-based connectivity recovery in wireless sensor and actor networks. 734-760 - Elham Dalirinia, Mehrdad Jalali

, Mahdi Yaghoobi, Hamid Tabatabaee:
Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization. 761-799 - Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee

, Ahmad Keshavarz:
A new improved KNN-based recommender system. 800-834 - Dikshit Chauhan

, Anupam Yadav:
Stability and agent dynamics of artificial electric field algorithm. 835-864 - Namrata Singh

, Ayan Kumar Das:
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor. 865-914 - Zahra Mahmoodabadi, Mostafa Nouri Baygi:

An approximation algorithm for virtual machine placement in cloud data centers. 915-941 - Rakesh Kumar

, Sunil K. Singh
, D. K. Lobiyal:
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks. 942-969 - Sheng-Tzong Cheng, Gwo-Jiun Horng, Chih-Wei Hsu, Z.-Yu Su:

Per-user network access control kernel module with secure multifactor authentication. 970-1008 - Maedeh Khalifavi, Zahra Shirmohammadi, Sahar Kianian:

FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method. 1009-1036 - Tariq Shah, Tanveer ul Haq:

Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. 1037-1058 - Mehmet Bozdal

, Kadir Ileri
, Ali Ozkahraman:
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset. 1059-1079 - Indushree M, Manish Raj

:
A novel Blockchain-based authentication scheme for telecare medical information system. 1080-1108 - Sadoon Azizi, Pedram Farzin, Mohammad Shojafar, Omer F. Rana

:
A scalable and flexible platform for service placement in multi-fog and multi-cloud environments. 1109-1136 - Tundong Liu, Fengqiang Gao, Xin Chen, Guifang Shao, Chenhan Wang:

Research on load-balancing scheduling optimization for wafer surface defect detection. 1137-1159 - Jihene Latrech

, Zahra Kodia
, Nadia Ben Azzouna:
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning. 1160-1182 - Zuoyan Zhang

, Jinchen Xu, Jiangwei Hao, Yang Qu, Haotian He, Bei Zhou:
Hierarchical search algorithm for error detection in floating-point arithmetic expressions. 1183-1205 - Abdelhakim Baouya

, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaz-Nava, Enrico Ferrera:
Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance. 1206-1237 - Sumit Sharma

, Sarika Jain
:
CovidO: an ontology for COVID-19 metadata. 1238-1267 - Sibo Qi

, Juan Chen, Peng Chen
, Peian Wen, Xianhua Niu, Lei Xu:
An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers. 1268-1293 - Xiaomei Li

, Ye Lu, Xiaoyu Zhao, Xiong Deng, Zhijiang Xie:
Path planning for intelligent vehicles based on improved D* Lite. 1294-1330 - C. Pabitha, B. Vanathi

:
Dense Mesh RCNN: assessment of human skin burn and burn depth severity. 1331-1362 - Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien-Hsiung Weng, Kuan-Ching Li

:
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data. 1363-1364 - Minghua Tang, Enrico Russo, Maurizio Palesi:

Correction to: The position-based compression techniques for DNN model. 1365 - Yifei Wang, Mert Pilanci:

Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path. 1366
Volume 80, Number 2, January 2024
- Preetpal Kaur Buttar

, Manoj Kumar Sachan:
Semantic segmentation of satellite images for crop type identification in smallholder farms. 1367-1395 - Zhonghua Chen, S. B. Goyal, Anand Singh Rajawat

:
Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. 1396-1425 - Xiaoxin Gao

, Fazhi He, Songwei Zhang, Jinkun Luo, Bo Fan:
A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively. 1426-1463 - Bahram Rashidi:

Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection. 1464-1490 - Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:

An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing. 1491-1521 - Santosh Kumar Uppada

, B. S. Ashwin, B. Sivaselvan
:
A novel evolutionary approach-based multimodal model to detect fake news in OSNs using text and metadata. 1522-1553 - Melika Amiri, Massoud Dousti, Majid Mohammadi:

Design and implementation of carry-save adder using quantum-dot cellular automata. 1554-1567 - Md Yeasin

, Ranjit Kumar Paul:
OptiSembleForecasting: optimization-based ensemble forecasting using MCS algorithm and PCA-based error index. 1568-1597 - Carmen Carrión

:
Research streams and open challenges in the metaverse. 1598-1639 - Zhaoxia Tian, Mingzu Zhang, Xing Feng:

Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links. 1640-1667 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:

Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures. 1668-1693 - Yi Yang

, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 1694-1727 - Amjad Qtaish, Malik Braik

, Dheeb Albashish, Mohammad T. Alshammari
, Abdulrahman Alreshidi, Eissa Jaber Alreshidi
:
Optimization of K-means clustering method using hybrid capuchin search algorithm. 1728-1787 - Shaurya Sood, Neminath Hubballi:

SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters. 1788-1817 - Arvind Mewada

, Rupesh Kumar Dewang
:
NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media. 1818-1851 - Mirna Magdy, Mohamed O. Grida, Gawaher S. Hussein:

Disruption mitigation in the semiconductors supply chain by using public blockchains. 1852-1906 - Huanwen Zhang, Yan Wang, Jianxi Fan, Yuejuan Han, Baolei Cheng:

Constructing edge-disjoint spanning trees in several cube-based networks with applications to edge fault-tolerant communication. 1907-1934 - Nartay Aikyn

, Ardan Zhanegizov
, Temirlan Aidarov, Dinh-Mao Bui, Nguyen Anh Tu
:
Efficient facial expression recognition framework based on edge computing. 1935-1972 - Divya Paikaray, Ashok Kumar Mehta, Danish Ali Khan:

Optimized convolutional neural network for the classification of lung cancer. 1973-1989 - Ramzi A. Haraty, Ali Assaf:

DG-means: a superior greedy algorithm for clustering distributed data. 1990-2024 - Yanjiang Han, Fengping Wang, Wei Wang, Xiangyu Li, Jianyang Zhang

:
YOLO-SG: Small traffic signs detection method in complex scene. 2025-2046 - Yuju Wang

, Liang-Hong Wu
, Liang-Chuan Wu
:
An integrative extraction approach for index-tracking portfolio construction and forecasting under a deep learning framework. 2047-2066 - Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi

, Shahram Etemadi Borujeni:
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems. 2067-2127 - Massoud Seifpour, Seyyed Amir Asghari, Mostafa Ghobaei-Arani

:
A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach. 2128-2163 - P. Mathivanan

, Maran Ponnambalam:
Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 2164-2195 - Xiaohong Li, Qixuan Peng, Ruihong Li, Huifang Ma:

Dual graph neural network for overlapping community detection. 2196-2222 - Pijush Kanti Dutta Pramanik

, Saurabh Pal
, Prasenjit Choudhury
:
Mobile crowd computing: potential, architecture, requirements, challenges, and applications. 2223-2318 - Haiying Liu, Zhihao Li, Kuihua Huang, Rui Wang, Guangquan Cheng, Tiexiang Li:

Evolutionary reinforcement learning algorithm for large-scale multi-agent cooperation and confrontation applications. 2319-2346 - S. Saumiya, S. Wilfred Franklin

:
Unified automated deep learning framework for segmentation and classification of liver tumors. 2347-2380 - Hengliang Guo, Long Zhang, Yi Zhang, Jianan Li, Xiaoyue Xu, Lu Liu, Kuangsheng Cai, Dan Wu, Shuxin Yang, Lingbo Kong, Xu Gao

:
OpenMP offloading data transfer optimization for DCUs. 2381-2402 - Shaimaa E. Nassar

, Ibrahim Yasser
, Hanan M. Amer, Mohamed A. Mohamed:
A robust MRI-based brain tumor classification via a hybrid deep learning technique. 2403-2427 - Chakaravarthi Sivanandam, Vaishnnave Mala Perumal, Jagadeesh Mohan

:
A novel light GBM-optimized long short-term memory for enhancing quality and security in web service recommendation system. 2428-2460 - Usha Patel, Vibha Patel:

Active learning-based hyperspectral image classification: a reinforcement learning approach. 2461-2486 - Chenxing Xia

, Difeng Chen, Xiuju Gao, Bin Ge, Kuan-Ching Li
, Xianjin Fang, Yan Zhang, Ke Yang:
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection. 2487-2513 - Chandrashekhar Meshram, Mohammad S. Obaidat, Rabha W. Ibrahim, Sarita Gajbhiye Meshram

, Arpit Vijay Raikwar:
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments. 2514-2537 - Tinka Singh, Ramagopal V. S. Uppaluri:

Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters. 2538-2571 - Khalid A. Darabkh, Thara A. Alzboun, Marwa H. Al-Tahaineh:

A novel routing protocol for stable route selection in IoT networks. 2572-2600 - Bahar Ghasemi, Mahmood Ahmadi

, Hamed Alimohammadi
:
A neural gas network-based scheme for SDN many-field packet classification. 2601-2632 - Oussama Azzouzi, Mohamed Anane, Mouloud Koudil, Mohamed Issad, Yassine Himeur:

Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA. 2633-2659 - Anil Kumar Kamboj

, Poonam Jindal, Pankaj Verma
:
Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks. 2660-2680 - Divya Rani

, Sachin Tripathi:
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. 2681-2717 - Peda Gopi Arepalli

, K. Jairam Naik:
A deep learning-enabled IoT framework for early hypoxia detection in aqua water using light weight spatially shared attention-LSTM network. 2718-2747 - Bo Zhou, Hai Huang, Jun Xia, Donghai Tian:

A novel malware detection method based on API embedding and API parameters. 2748-2766 - Lijun Qi, Jincheng Zhuang:

RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing. 2767-2798 - Youwei Wang, Lizhou Feng, Ao Liu, Weiqi Wang, Yudong Hou:

Dual BiGRU-CNN-based sentiment classification method combining global and local attention. 2799-2837 - Tengteng Cheng

, Guosun Zeng, Zhipeng Sun:
A big graph clustering method to support parallel processing by perceiving graph's application algorithm semantics. 2838-2861 - G. Sivapriya, R. Manjula Devi, Keerthika Periasamy

:
Computer-aided diagnostic model for retinal vascular diseases using graph-based attention mechanism. 2862-2888 - Yuxin Tang

, Yudi Qiu
, Yanwei Liu, Jie Jiao, Peng Zhang, Yibo Fan:
Scalable short-entry dual-grain coherence directories with flexible region granularity. 2889-2911 - Raushan Kumar Singh

, Mukesh Kumar:
Correction to: Future trends of path planning framework considering accident attributes for smart cities. 2912 - Parisa Kavianpour, Mohammadreza Kavianpour, Ehsan Jahani, Amin Ramezani:

Correction to: A CNN-BiLSTM model with attention mechanism for earthquake prediction. 2913 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:

Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures. 2914-2915
Volume 80, Number 3, February 2024
- Ismail Biri, Ülkü Tuncer Küçüktas

, Fatih Uysal, Firat Hardalaç
:
Forecasting the future popularity of the anti-vax narrative on Twitter with machine learning. 2917-2947 - Jiaxin Chen, Xuguang Zhang, Yinggan Tang, Hui Yu

:
ICE-YoloX: research on face mask detection algorithm based on improved YoloX network. 2948-2969 - Divyanshu Awasthi

, Priyank Khare, Vinay Kumar Srivastava
:
Internet of medical things-based authentication for an optimized watermarking of encrypted EEG. 2970-3004 - Luttfi A. Al-Haddad

, Alaa Abdulhady Jaber
, Sinan A. Al-Haddad
, Yousif M. Al-Muslim
:
Fault diagnosis of actuator damage in UAVs using embedded recorded data and stacked machine learning models. 3005-3024 - Guangjin Wang

, Yuanying Wang, Fuyong Xu, Yongsheng Zhang, Peiyu Liu:
Syntactic and semantic dual-enhanced bidirectional network for aspect sentiment triplet extraction. 3025-3041 - Hongxia Zhang, Mengde Wu, Qiqi Feng, Hao Li:

AERQP: adaptive embedding representation-based QoS prediction for web service recommendation. 3042-3065 - Arash Ahmadi, Amanj Khorramian

:
Efficient Brute-force state space search for Yin-Yang puzzle. 3066-3088 - K. Uma Maheswari

, S. Mary Saira Bhanu, Nickolas Savarimuthu:
Clustering-based data integrity verification approach for multi-replica in a fog environment. 3089-3113 - Yilu Chen, Miaodi Su, Hongzhi Ding, Shaohong Weng, Zhifeng Lin, Xiqiong Bai:

High-correlation 3D routability estimation for congestion-guided global routing. 3114-3141 - Xuesong Wang

, Zheng Zhang, Dongsheng Zhang, Limin Ding:
Pose visual detection method for cellphone dropping process incorporating prior information. 3142-3161 - Ruihang Xu, Peisen Wang, Xuanjing Li, Ruifeng Nie:

YOLO-ARGhost: a lightweight face mask detection model. 3162-3182 - Mei Bai, Qibo Wang, Shihan Chang, Xite Wang, Guanyu Li:

Location-based skyline query processing technology in road networks. 3183-3211 - Yanni Yang, Yiting Tan, Jintao Min, Zhengwei Huang:

Automatic text summarization for government news reports based on multiple features. 3212-3228 - Saif Eddine Khouni, Tidjani Menacer:

Nizar optimization algorithm: a novel metaheuristic algorithm for global optimization and engineering applications. 3229-3281 - Lin Zhang, Fang'ai Liu, Hongchen Wu, Xuqiang Zhuang, Yaoyao Yan:

CFF: combining interactive features and user interest features for click-through rate prediction. 3282-3309 - Xiao Liu, Junlong Chen, Deyu Qi, Tong Zhang:

Exploration of low-resource language-oriented machine translation system of genetic algorithm-optimized hyper-task network under cloud platform technology. 3310-3333 - Jianxin Tang, Shihui Song, Hongyu Zhu, Qian Du, Jitao Qu:

Sequential seeding policy on social influence maximization: a Q-learning-driven discrete differential evolution optimization. 3334-3359 - Junfan Wang, Yi Chen, Yeting Gu, Yunfeng Yan, Qi Li, Mingyu Gao, Zhekang Dong

:
A lightweight vehicle mounted multi-scale traffic sign detector using attention fusion pyramid. 3360-3381 - Xu Gu, Xiaoliang Chen, Peng Lu, Xiang Lan, Xianyong Li, Yajun Du:

SiMaLSTM-SNP: novel semantic relatedness learning model preserving both Siamese networks and membrane computing. 3382-3411 - Xinnan Ding, Shan Du

, Yu Zhang
, Kejun Wang:
Spatiotemporal multi-scale bilateral motion network for gait recognition. 3412-3440 - Louiza Belkhiri-Brahmi, Samira Yessad, Fouzi Semchedine

:
Congestion control-based sink MOBility pattern for data gathering optimization in WSN. 3441-3479 - Wei Li, Yetong Gao, Lei Wang:

A multipopulation particle swarm optimization based on divergent guidance and knowledge transfer for multimodal multiobjective problems. 3480-3527 - Soroush Babaee Khobdeh, Mohammad Reza Yamaghani

, Siavash Khodaparast Sareshkeh:
Basketball action recognition based on the combination of YOLO and a deep fuzzy LSTM network. 3528-3553 - Rajesh Dwivedi

, Aruna Tiwari
, Neha Bharill, Milind B. Ratnaparkhe, Parul Mogre, Pranjal Gadge, Kethavath Jagadeesh:
A novel apache spark-based 14-dimensional scalable feature extraction approach for the clustering of genomics data. 3554-3588 - Quan Yuan, Shanshan Wang, Mai Hu, Liang Zeng

:
SLDChOA: a comprehensive and competitive multi-strategy-enhanced chimp algorithm for global optimization and engineering design. 3589-3643 - Runsheng Liu, Wencong Cai, Junyang Zhang, Xiaoling Wu, Lilin Yang, Kaiqing Luo:

CF-lines: a fusing contour features optimization method for line segment detector. 3644-3662 - Nan Gao, Bowei Yang, Peng Chen, Li Ping Qian

:
A multi-stage recognizer for nested named entity with weakly labeled data. 3663-3693 - Samira Shirinabadi Farahani, Mohammad Reza Reshadinezhad, Seyed Erfan Fatemieh:

New design for error-resilient approximate multipliers used in image processing in CNTFET technology. 3694-3712 - A. Ahila, V. Prema, S. Ayyasamy, M. Sivasubramanian:

An enhanced deep learning model for high-speed classification of plant diseases with bioinspired algorithm. 3713-3737 - Sarra Cherbal, Abdelhak Zier, Sara Hebal, Lemia Louail

, Boubakeur Annane
:
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. 3738-3816 - Yaqian Tang, Baolei Cheng, Yan Wang, Yuejuan Han, Jia Yu, Jianxi Fan:

Connectivity and diagnosability of a class of recursive networks. 3817-3848 - Zhenghong Wang, Fanhua Yu, Dan Wang, Taihui Liu, Rongjun Hu:

Multi-threshold segmentation of breast cancer images based on improved dandelion optimization algorithm. 3849-3874 - Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai:

STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things. 3875-3901 - Djihad Arrar, Nadjet Kamel, Abdelaziz Lakhfif

:
A comprehensive survey of link prediction methods. 3902-3942 - Sultan Noman Qasem

:
A novel honey badger algorithm with multilayer perceptron for predicting COVID-19 time series data. 3943-3969 - Ismael Boureima, Manish Bhattarai, Maksim Ekin Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov

:
Distributed out-of-memory NMF on CPU/GPU architectures. 3970-3999 - Neha Bansal

, Shelly Sachdeva
, Lalit Kumar Awasthi
:
Schema generation for document stores using workload-driven approach. 4000-4048 - Subeen Leem, Jisong Oh, Jihoon Moon, Mucheol Kim, Seungmin Rho:

Enhancing multistep-ahead bike-sharing demand prediction with a two-stage online learning-based time-series model: insight from Seoul. 4049-4082 - Salih Berkan Aydemir:

Ideal solution candidate search for starling murmuration optimizer and its applications on global optimization and engineering problems. 4083-4156 - Rihab Abidi

, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos, Nabil Sahli
:
A study of mechanisms and approaches for IoV trust models requirements achievement. 4157-4201 - Xiaoyu Zheng, Dewang Chen

, Zhiming Lin, Liping Zhuang, Wendi Zhao:
Method on generating massive virtual driving curves for high-speed trains of the Cross-Taiwan Strait Railway and its statistical analysis. 4202-4225 - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:

Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services. 4226-4247 - Chao Yin, Qin Fang, Hongyi Li, Yingjian Peng, Xiaogang Xu, Dan Tang:

An optimized resource scheduling algorithm based on GA and ACO algorithm in fog computing. 4248-4285 - Shwet Ketu, Pramod Kumar Mishra:

An intelligent hybrid classification model for heart disease detection using imbalanced electrocardiogram signals. 4286-4308 - Junjun Jiao, Zhisheng Chen, Tao Zhou:

Minimal Kapur cross-entropy-based image segmentation for distribution grid inspection using improved INFO optimization algorithm. 4309-4352 - Shengbin Liang, Fuqi Sun

, Haoran Sun, Tingting Chen, Wencai Du:
A medical text classification approach with ZEN and capsule network. 4353-4377 - Ashok Kumar Yadav, Karan Singh, Pramod Kumar Srivastava:

Probabilistic estimation of comprehensive utility based on user preference and network condition for network selection in future in HetNet. 4378-4400 - Yuan Zhou, Lei Xiang, Fan Liu, Haoran Duan

, Yang Long:
Dynamic visual-guided selection for zero-shot learning. 4401-4419 - P. Mathivanan

, Maran Ponnambalam
:
Correction to: Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 4420-4422
Volume 80, Number 4, March 2024
- Di Li, Lang Li, Yu Ou:

Side-channel analysis based on Siamese neural network. 4423-4450 - Hongwei Zhang, Shuaibo Liu, Chi Wang, Shuai Lu, Wenbo Xiong:

Color-patterned fabric defect detection algorithm based on triplet attention multi-scale U-shape denoising convolutional auto-encoder. 4451-4476 - K. Hemant Kumar Reddy, Rajat Shubhra Goswami

, Diptendu Sinha Roy:
A deep learning-based smart service model for context-aware intelligent transportation system. 4477-4499 - Yanru Liu, Jiali Xu, Austin Lin Yee:

The analysis of Iris image acquisition and real-time detection system using convolutional neural network. 4500-4532 - Mehmet Akif Bülbül

:
Optimization of artificial neural network structure and hyperparameters in hybrid model by genetic algorithm: iOS-android application for breast cancer diagnosis/prediction. 4533-4553 - Masashi Kuwano, Mio Hosoe, Taku Moriyama:

Prediction of railroad user count using number of route searches via bivariate state-space modeling. 4554-4576 - Yuqin Song, Jitao Zhao, Chunliang Shang:

A multi-stage feature fusion defogging network based on the attention mechanism. 4577-4599 - Mahboubeh Afzali, Amin Mohammad Vali Samani, Hamid Reza Naji

:
An efficient resource allocation of IoT requests in hybrid fog-cloud environment. 4600-4624 - Shao Deng

, Shanzhu Xiao, Qiuqun Deng, Huanzhang Lu:
A hovering swarm particle swarm optimization algorithm based on node resource attributes for hardware/software partitioning. 4625-4647 - Anit Kumar Ghosal

, Amit Sardar, Dipanwita Roychowdhury:
Differential fault analysis attack-tolerant hardware implementation of AES. 4648-4681 - Min Tian, Qi Liu, Jingshan Pan, Ying Gou, Zanjun Zhang:

swPTS: an efficient parallel Thomas split algorithm for tridiagonal systems on Sunway manycore processors. 4682-4706 - Sadiqa Jafari, Yung Cheol Byun:

Accurate remaining useful life estimation of lithium-ion batteries in electric vehicles based on a measurable feature-based approach with explainable AI. 4707-4732 - Eht E. Sham

, Deo Prakash Vidyarthi:
A modified fuzzy similarity measure for trapezoidal fuzzy number with their applications. 4733-4759 - Rawaa Alatrash, Rojalina Priyadarshini

, Hadi Ezaldeen:
Collaborative filtering integrated fine-grained sentiment for hybrid recommender system. 4760-4807 - Ali Dabba, Abdelkamel Tari, Samy Meftali:

A novel grey wolf optimization algorithm based on geometric transformations for gene selection and cancer classification. 4808-4840 - Adeola Borode

, Peter A. Olubambi:
Optimisation of artificial intelligence models and response surface methodology for predicting viscosity and relative viscosity of GNP-alumina hybrid nanofluid: incorporating the effects of mixing ratio and temperature. 4841-4869 - Neetu Sharma

, Rajesh Rohilla:
A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management. 4870-4913 - Ruyi Cao, Wanghao Mo, Wendong Zhang:

MFMDet: multi-scale face mask detection using improved Cascade rcnn. 4914-4942 - Xiaoxiao Sun, Siqing Yang, Chenying Zhao, Dongjin Yu:

Design-time business process compliance assessment based on multi-granularity semantic information. 4943-4971 - Jingan Lu, Zhenfang Zhu, Kefeng Li, Shuai Gong, Hongli Pei, Wenling Wang:

Gtpsum: guided tensor product framework for abstractive summarization. 4972-4995 - Guifang Zhang, Hon-Cheng Wong:

Saliency-based dual-attention network for unsupervised video object segmentation. 4996-5010 - Mohamed Yassine Landolsi

, Lotfi Ben Romdhane, Lobna Hlaoua:
Hybrid medical named entity recognition using document structure and surrounding context. 5011-5041 - Yan Kang

, Xiaoshe Dong, Ziheng Wang, Heng Chen, Qiang Wang:
Parallel implementations of post-quantum leighton-Micali signature on multiple nodes. 5042-5072 - Siti Nuraishah Agos Jawaddi, Azlan Ismail, Muhammad Nur Haziq Mohammad Hatta, Anis Faqihah Kamarulzaman:

Insights into cloud autoscaling: a unique perspective through MDP and DTMC formal models. 5073-5107 - Shreyshi Shree, Chen Zhou, Masoud Barati:

Data protection in internet of medical things using blockchain and secret sharing method. 5108-5135 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang

, Peiying Zhang, Laith Abualigah
:
Load balancing strategy for SDN multi-controller clusters based on load prediction. 5136-5162 - Swati Gupta

, Niraj Pratap Singh:
Underwater wireless sensor networks: a review of routing protocols, taxonomy, and future directions. 5163-5196 - Chunjing Xiao, Shenkai Lv, Wei Fan, W. H. Ip

:
Temporal-order association-based dynamic graph evolution for recommendation. 5197-5223 - N. Sheena

, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
EMCP: evolutionary multi-objective clustering protocol for prolonged lifetime of heterogeneous IoT networks. 5224-5254 - Ehsan Jafari, Ardeshir Dolati, Kamran Layeghi:

Object tracking using local structural information and energy minimization. 5255-5278 - Yinsheng Tong, Zuoyong Li, Hui Huang, Libin Gao

, Minghai Xu, Zhongyi Hu:
Research of spatial context convolutional neural networks for early diagnosis of Alzheimer's disease. 5279-5297 - Taymaz Akan

, Diego Oliva
, Ali-Reza Feizi-Derakhshi
, Amir-Reza Feizi-Derakhshi
, Marco Pérez-Cisneros
, Mohammad Alfrad Nobel Bhuiyan
:
Battle royale optimizer for multilevel image thresholding. 5298-5340 - Liqiang Song, Huaiguang Wang, Baojian Yang:

Hybrid compression scheme based on VMD optimization algorithm application to mechanical equipment monitoring. 5341-5362 - Yue Zhao, Yuan Yao, Tong He, Xingshe Zhou, Bo Shen:

Sl4u: a scenario description language for unmanned swarm. 5363-5389 - Jingbo Sun, Weiming Peng, Tianbao Song, Haitao Liu, Shuqin Zhu, Jihua Song:

Enhanced cross-prompt trait scoring via syntactic feature fusion and contrastive learning. 5390-5407 - Ru Sun, Ting Yang:

Hybrid parameter-based PSO flexible needle percutaneous puncture path planning. 5408-5427 - Zhiyi Yu

, Hong Li, Jialin Feng:
Contrastive learning for unsupervised sentence embeddings using negative samples with diminished semantics. 5428-5445 - Jin Xu, Huiqun Yu, Guisheng Fan, Jiayin Zhang

, Zengpeng Li
, Qifeng Tang:
Adaptive edge service deployment in burst load scenarios using deep reinforcement learning. 5446-5471 - Jing-Wei Liu

, Ming-Hua Hsu, Chun-Liang Lai, Sheng-K. Wu:
Using video analysis and artificial neural network to explore association rules and influence scenarios in elite table tennis matches. 5472-5489 - Chang Jie, Chen Jiming, Shao Ying, Yanchun Tong, Haodong Ren:

A pyramid GNN model for CXR-based COVID-19 classification. 5490-5508 - Fei Yang, Huyin Zhang, Shiming Tao, Xiying Fan:

Simple hierarchical PageRank graph neural networks. 5509-5539 - Prashant Vaish, Niharika Anand, Vishal Krishna Singh

, Gaurav Sharma:
Applications hosting over cloud-assisted IOT: a productivity model and method defining accessibility of data security. 5540-5564 - Raghuraj Singh

, Kuldeep Kumar
:
Hybrid optimization-enabled deep Q network for fault prediction in service-oriented architecture. 5565-5592 - Zixiang Nie, Jin Li, Fenghui Duan, Yueming Lu:

A collaborative ledger storing model for lightweight blockchains based on Chord Ring. 5593-5615 - Zhen Li, Zining Cao, Chao Xing:

Performance modeling and quantitative evaluation for cyber-physical systems based on LTS. 5616-5653 - Weibei Fan, Xuanli Liu, Mengjie Lv:

Hamiltonian cycle embedding with fault-tolerant edges and adaptive diagnosis in half hypercube. 5654-5674 - Azad Johari, Azlan Ismail:

PMLAP: a methodology for annotating SSML elements into HTML5. 5675-5707 - Viswanatha Reddy G, B. S. N. V. Chaitanya, Prathyush P, Sumanth M, Mrinalini C, Dileep Kumar P, Snehasis Mukherjee:

DFW-PP: dynamic feature weighting-based popularity prediction for social media content. 5708-5730 - Ismael Boureima, Manish Bhattarai, Maksim Ekin Eren, Erik Skau, Philip Romero, Stephan J. Eidenbenz, Boian S. Alexandrov

:
Correction to: Distributed out-of-memory NMF on CPU/GPU architectures. 5731-5732
Volume 80, Number 5, March 2024
- Zhaojun Wang

, Xindong You, Xueqiang Lv:
A relation enhanced model for temporal knowledge graph alignment. 5733-5755 - Samaher Al-Janabi

, Ghada Mohammed
:
An intelligent returned energy model of cell and grid using a gain sharing knowledge enhanced long short-term memory neural network. 5756-5814 - Peng Li, Cheng Che

, Rui Hou:
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning. 5815-5831 - Kangjin Huang, Yonggang Che, Chuanfu Xu, Zhe Dai, Jian Zhang:

Improving CUDA performance of an unstructured high-order CFD application under OP2 framework. 5832-5846 - Yueting Xiang, Yangfen Chen, Wenjuan Fan, Hui Ye:

Enhancing computer-aided translation system with BiLSTM and convolutional neural network using a knowledge graph approach. 5847-5869 - Inam Ullah

, Asra Noor, Shah Nazir, Farhad Ali, Yazeed Yasin Ghadi
, Nida Aslam:
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. 5870-5899 - S. Muthulakshmi, R. Chitra:

Interplanetary file system and blockchain for secured smart grid networks. 5900-5922 - Abbas Rammal, Kenneth Ezukwoke, Anis Hoayek

, Mireille Batton-Hubert:
Unsupervised approach for an optimal representation of the latent space of a failure analysis dataset. 5923-5949 - S. Nikkath Bushra

, Nalini Subramanian, G. Shobana
, S. Radhika:
A novel Jarratt butterfly Ebola optimization-based attentional random forest for data anonymization in cloud environment. 5950-5978 - Sait Alp

, Rahim Dehkharghani, Taymaz Akan, Mohammad A. N. Bhuiyan:
MOBRO: multi-objective battle royale optimizer. 5979-6016 - Shilpi

, Arvind Kumar
:
Application of Jaya algorithm for solving localization problem in a distributed Wireless Sensor Network. 6017-6041 - Rui-Yun Chang, Xiufang Feng, Chengye Zou, Hao Zhang

:
Multimodal medical image protection algorithm based on 3D-CICCM and Fresnel transform. 6042-6067 - Fanfan Li:

Chord-based music generation using long short-term memory neural networks in the context of artificial intelligence. 6068-6092 - Xiaoxuan Ma, Boyang Sun, Weifeng Liu

, Dong Sui, Sihan Shan, Jing Chen, Zhaofeng Tian:
Tnseg: adversarial networks with multi-scale joint loss for thyroid nodule segmentation. 6093-6118 - Hongjie Geng, Mingming Zhou:

Novel post-photographic technique based on deep convolutional neural network and blockchain technology. 6119-6139 - Jingwen Xiong, Wenke Zang

, Yuzhen Zhao, Xiyu Liu:
Density peaks clustering algorithm with connected local density and punished relative distance. 6140-6168 - Huan Liu, Jian Wu, Rui He

:
IDPNet: a light-weight network and its variants for human pose estimation. 6169-6191 - Qianqiu Wang, Ge Nong, Wenbo Wu:

Linear structure index for network-constrained moving objects. 6192-6220 - Tianhua Chen, Yanyue Li, Qinghua Qiao:

Fine-grained bird image classification based on counterfactual method of vision transformer model. 6221-6239 - Jubin Wang, Yuan Zhuang, Yunhui Zeng

:
A transmission optimization method for MPI communications. 6240-6263 - Ahmed N. Bakry

, Almohammady S. Alsharkawy
, Mohamed S. Farag
, Kamal R. Raslan:
Automatic suppression of false positive alerts in anti-money laundering systems using machine learning. 6264-6284 - Yifei Sun, Jigang Wu, Yalan Wu, Long Chen, Weijun Sun:

Efficient approaches for task offloading in point-of-interest based vehicular fog computing. 6285-6310 - Juan Fang, Zhichao Wei, Yaqi Liu, Yumin Hou

:
TB-TBP: a task-based adaptive routing algorithm for network-on-chip in heterogenous CPU-GPU architectures. 6311-6335 - Huarui Wu, Chang Liu, Chunjiang Zhao:

Personalized agricultural knowledge services: a framework for privacy-protected user portraits and efficient recommendation. 6336-6355 - Ali Abbas, Raza Hasan

:
A multi-attribute-based data forwarding scheme for delay tolerant networks. 6356-6381 - Ali Asghari

, Hossein Azgomi, Ali Abbas Zoraghchian, Abbas Barzegarinezhad
:
Energy-aware server placement in mobile edge computing using trees social relations optimization algorithm. 6382-6410 - Neeraj Kumar Shukla

, Abdulilah M. Mayet, M. Ram Kumar Raja
, Muneer Parayangat, Mohammed Usman, Rajesh Verma, Javed Khan Bhutto:
A unified test data volume compression scheme for circular scan architecture using hosted cuckoo optimization. 6411-6434 - Sumera Naz, Aqsa Shafiq, Maheen Abbas:

An approach for 2-tuple linguistic q-rung orthopair fuzzy MAGDM for the evaluation of historical sites with power Heronian mean. 6435-6485 - Muhanad Mohammed Kadum, Xiaoheng Deng:

Allocating energy-objective aware workflow in distributed edge micro data centres. 6486-6521 - Haiyan Li, Shaolin Peng, Xun Lang, Shuhua Ye, Hongsong Li:

Spatial-guided informative semantic joint transformer for single-image deraining. 6522-6551 - Mahnaz Khojand, Kambiz Majidzadeh, Mohammad Masdari

, Yousef Farhang:
Controller placement in SDN using game theory and a discrete hybrid metaheuristic algorithm. 6552-6600 - Marzieh Varposhti:

Distributed homology-based sensor selection and scheduling in wireless sensor networks. 6601-6621 - Hind Idrissi, Paolo Palmieri:

Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems. 6622-6660 - Yibo Huang, Bo Wang, Xiang-rong Pu, Yian Li, Qiuyu Zhang:

Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. 6661-6698 - Zahra Valadanzoj

, Hassan Daryanavard
, Abbas Harifi
:
High-speed YOLOv4-tiny hardware accelerator for self-driving automotive. 6699-6724 - Hui Ma:

Development of a smart tourism service system based on the Internet of Things and machine learning. 6725-6745 - Ali Jameel Hashim

, M. A. Balafar, Jafar Tanha:
NEAE: NeuroEvolution AutoEncoder for anomaly detection in internet traffic data. 6746-6777 - Shiqiang Zhang, Dongzhi Cao:

A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT. 6778-6808 - Saeid Ghafouri, Seyed Hossein Khasteh, Seyed Omid Azarkasb:

Influence maximization (IM) in complex networks with limited visibility using statistical methods. 6809-6854 - Naveen Chandra Gowda, Sunilkumar S. Manvi, A. Bharathi Malakreddy, Rajkumar Buyya:

TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments. 6855-6890 - Redouane Benabdallah Benarmas, Kadda Beghdad Bey:

A deep learning-based framework for road traffic prediction. 6891-6916 - Yuqing Cheng, Zhiying Cao, Xiuguo Zhang, Qilei Cao, Dezhen Zhang:

Multi objective dynamic task scheduling optimization algorithm based on deep reinforcement learning. 6917-6945 - Marzieh Varposhti:

Distributed homology-based algorithm for solving Set k-Cover problem in heterogeneous directional sensor networks. 6946-6964 - Yong Niu, Xing Xing, Zhichun Jia, Mindong Xin, Junye Xing:

SMIGNN: social recommendation with multi-intention knowledge distillation based on graph neural network. 6965-6988 - Mukesh Patidar

, Ankit Jain
, Keshav Patidar, Surendra Kumar Shukla
, Ali H. Majeed, Namit Gupta, Nilesh Patidar:
An ultra-dense and cost-efficient coplanar RAM cell design in quantum-dot cellular automata technology. 6989-7027 - Nadia Nedjah, Sérgio de Souza Raposo, Luiza de Macedo Mourelle:

Dedicated hardware design for efficient quantum computations using classical logic gates. 7028-7070 - Kun Yang, Lin Jiang, Rui Shan, Kangle Li, Xinyue Cui:

RMSRM: real-time monitoring-based self-reconfiguration mechanism in reconfigurable PE array. 7071-7101 - Donaldo Garcia

, José de Jesús Rubio, Humberto Sossa, Jaime Pacheco, Guadalupe Juliana Gutierrez, Carlos Aguilar Ibáñez:
Electricity consumption modeling by a chaotic convolutional radial basis function network. 7102-7119 - Junbi Xiao, Xingjian Pan, Jianhang Liu, Jian Wang

, Peiying Zhang, Laith Abualigah
:
Correction to: Load balancing strategy for SDN multi-controller clusters based on load prediction. 7120-7121
Volume 80, Number 6, April 2024
- Junfeng Wang:

The use of fuzzy authentication integrated with convolutional neural networks in digital content protection. 7123-7146 - Xiaohong Wang, Xu Zhao, Kun Xu, Shihao Xu:

Multi-scale adaptive atrous graph convolution for point cloud analysis. 7147-7170 - Lisheng Wu, Xiaoming You, Sheng Liu:

Heterogeneous ant colony algorithm based on selective evolution mechanism and game strategy. 7171-7206 - Mohammad Hassan Almaspoor

, Ali A. Safaei, Afshin Salajegheh, Behrouz Minaei-Bidgoli:
Distributed independent vector machine for big data classification problems. 7207-7244 - Xinfeng He

, Riyang Li:
Malware detection for container runtime based on virtual machine introspection. 7245-7268 - Kai Song, Huaqiong Ma, Haiming Zhang, Liping Yan:

Research of ReLU output device in ternary optical computer based on parallel fully connected layer. 7269-7292 - Yuqin Song, Chunliang Shang, Jitao Zhao:

LBCNet: A lightweight bilateral cascaded feature fusion network for real-time semantic segmentation. 7293-7315 - Saif Ur Rehman Khan

, Ming Zhao, Sohaib Asif
, Xuehan Chen, Yusen Zhu:
GLNET: global-local CNN's-based informed model for detection of breast cancer categories from histopathological slides. 7316-7348 - Chenghao Wang

, Zhongqiang Luo, Ziyuan Qi:
Transformer oil leakage detection with sampling-WIoU module. 7349-7368 - Yen-Liang Chen, Chia-Chi Wu, Po-Cheng Shih:

Using personalized next session to improve session-based recommender systems. 7369-7398 - Jing Zhang, Zuanyang Zeng, Kunliang Si, Xiucai Ye:

Entropy-driven differential privacy protection scheme based on social graphlet attributes. 7399-7432 - Blessy Antony, S. Revathy:

A novel model for Sybil attack detection in online social network using optimal three-stream double attention network. 7433-7482 - Jun Shi, Peiyi Zhang, Sihan Du, Wanyong Liang, Weifeng Cao, Qingbo Li, Hechao Hou:

Chipping value prediction for dicing saw based on sparrow search algorithm and neural networks. 7483-7506 - Ashkan Emami

, Ghazaleh Keshavarz Kalhori
, Sheyda Mirzakhani, Mohammad Ali Akhaee:
A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach. 7507-7556 - Dan Li, Wenbo Shi, Ning Lu, Sang-Su Lee, Sokjoon Lee:

ARdetector: android ransomware detection framework. 7557-7584 - Yuanxiang Wang, Zhen Xu, Lei Yang:

Plus-profile energy harvested prediction and adaptive energy management for solar-powered wireless sensor networks. 7585-7603 - Chao Zhu, Benshun Yi, Laigan Luo:

Triple-channel graph attention network for improving aspect-level sentiment analysis. 7604-7623 - You-Shyang Chen, Jieh-Ren Chang, Yaswanth P. K. Thotakura, Ashraf Mohammad:

A hybrid four-stage detection model to pre-identify the sustainable manufacturing process of Li-ion battery pack. 7624-7661 - Yaonan Guan, Yunwen Xu, Yugeng Xi, Dewei Li:

Variational auto encoder fused with Gaussian process for unsupervised anomaly detection. 7662-7690 - Niloofar Zahedy, Behrang Barekatain

, Alfonso Ariza-Quintana:
RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm. 7691-7749 - Peyman Shobeiri, Mehdi Akbarian Rastaghi, Saeid Abrishami, Behnam Shobiri:

PCP-ACO: a hybrid deadline-constrained workflow scheduling algorithm for cloud environment. 7750-7780 - Ature Angbera

, Huah Yong Chan:
An adaptive XGBoost-based optimized sliding window for concept drift handling in non-stationary spatiotemporal data streams classifications. 7781-7811 - Safdar Rostami, Ali Broumandnia

, Ahmad Khademzadeh:
An energy-efficient task scheduling method for heterogeneous cloud computing systems using capuchin search and inverted ant colony optimization algorithm. 7812-7848 - Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz

:
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model. 7849-7875 - Bakht Sher Ali

, Inam Ullah
, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi
, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam:
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. 7876-7905 - A. Moradikashkooli, H. Haj Seyyed Javadi, Sam Jabbehdari:

An efficient optimization algorithm for nonlinear 2D fractional optimal control problems. 7906-7930 - Yang Liu:

Depression clinical detection model based on social media: a federated deep learning approach. 7931-7954 - Shweta Mittal, Mohona Ghosh:

A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication. 7955-7992 - Tajinder Singh

, Madhu Kumari, Daya Sagar Gupta:
Rumor identification and diffusion impact analysis in real-time text stream using deep learning. 7993-8037 - Jingjing Han, Guangqi Yang, Hongyang Wei, Weijun Gong, Yurong Qian

:
ST-YOLOX: a lightweight and accurate object detection network based on Swin Transformer. 8038-8059 - Xiangyu Deng

, Xikai Huang, Haiyue Yu:
Frequency-domain characteristic analysis of PCNN. 8060-8093 - Ones Sidhom

, Haythem Ghazouani
, Walid Barhoumi
:
Three-phases hybrid feature selection for facial expression recognition. 8094-8128 - Khadijeh Moeini Roodbali, Ebrahim Abiri, Kourosh Hassanli:

Highly efficient low-area gate-diffusion-input-based approximate full adders for image processing computing. 8129-8155 - (Withdrawn) A hybrid framework for detection of autism using ConvNeXt-T and embedding clusters. 8156-8178

- Ali Khalouta

:
A new decomposition transform method for solving nonlinear fractional logistic differential equation. 8179-8201 - Nilesh Kumar Verma, K. Jairam Naik:

Optimized fog community framework with advanced genetic algorithm for enhanced performance dynamics. 8202-8235 - Reza Feizabadi, Mehri Bagherian

, Hamidreza Vaziri, Maziar Salahi
:
PLEACH: a new heuristic algorithm for pure parsimony haplotyping problem. 8236-8258 - Davide Ferraris, M. Carmen Fernández Gago, Rodrigo Roman, Javier López:

A survey on IoT trust model frameworks. 8259-8296 - Yiming Shu, Yiru Dai:

An effective link prediction method for industrial knowledge graphs by incorporating entity description and neighborhood structure information. 8297-8329 - Faezeh Rohani

, Kamrad Khoshhal Roudposhti
, Hamidreza Taheri, Ali Mashhadi, Andreas Mueller:
Extracting gait and balance pattern features from skeleton data to diagnose attention deficit/hyperactivity disorder in children. 8330-8356


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID