default search action
The Computer Journal, Volume 66
Volume 66, Number 1, January 2023
- Nagaraj Honnikoll, Ishwar Baidari:
Mean Error Rate Weighted Online Boosting Method. 1-15 - Saihua Cai, Jinfu Chen, Haibo Chen, Chi Zhang, Qian Li, Dengzhou Shi, Wei Lin:
Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints. 16-34 - Sana Khanam, Safdar Tanweer, Syed Sibtain Khalid:
Youtube Trending Videos: Boosting Machine Learning Results Using Exploratory Data Analysis. 35-46 - Alonso Tenorio-Trigoso, Manuel Castillo-Cara, Giovanny Mondragón-Ruiz, Carmen Carrión, María Blanca Caminero:
An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study. 47-60 - Jafar Majidpour, Samer Kais Jameel, Jihad Anwar Qadir:
Face Identification System Based on Synthesizing Realistic Image using Edge-Aided GANs. 61-69 - Niharika Gupta, Baij Nath Kaushik:
Prognosis and Prediction of Breast Cancer Using Machine Learning and Ensemble-Based Training Model. 70-85 - Surbhi Gupta, Manoj Kumar Gupta:
Computational Model for Prediction of Malignant Mesothelioma Diagnosis. 86-100 - Parsi Kalpana:
Chronological Sailfish Optimizer for Preserving Privacy in Cloud Based on Khatri-Rao Product. 101-113 - Qiaohong Hao, Qi Zhao, Mateu Sbert, Qinghe Feng, Cosmin Ancuti, Miquel Feixas, Màrius Vila, Jiawan Zhang:
Information-Theoretic Channel for Multi-exposure Image Fusion. 114-127 - Mohammad Nabipour, Amir Reza Momen:
A Novel Approach to Adaptive Resource Allocation for Energy Saving in Reconfigurable Heterogeneous Networks. 128-143 - Ankush Manocha, Gulshan Kumar, Munish Bhatia:
IoT Analytics-inspired Real-time Monitoring for Early Prediction of COVID-19 Symptoms. 144-159 - Xiaodan Li, Wenling Wu:
Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure. 160-173 - Qing Wang, Xi Zhang, Jing Qin, Jixin Ma, Xinyi Huang:
A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree. 174-183 - Jinlu Liu, Bo Zhao, Jing Qin, Xi Zhang, Jixin Ma:
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing. 184-196 - Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu:
Multi-key Fully Homomorphic Encryption from Additive Homomorphism. 197-207 - Chingfang Hsu, Lein Harn, Zhe Xia, Jianqun Cui, Jingxue Chen:
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks. 208-220 - Yulong Wei, Ronghua Li, Weihua Yang:
Hybrid Fault Diagnosis Capability Analysis of Highly Connected Graphs. 221-228 - Mohammad Jalilvand Aghdam Bonab, Ramin Shaghaghi Kandovan:
Effective Resource Allocation and Load Balancing in Hierarchical HetNets: Toward QoS-Aware Multi-Access Edge Computing. 229-244 - Ramachandro Majji, R. Rajeswari, Ch. Vidyadhari, Rajan Cristin:
Squirrel Search Deer Hunting-Based Deep Recurrent Neural Network for Survival Prediction Using PAN-Cancer Gene Expression Data. 245-266 - Muthumanikandan Vanamoorthy, Valliyammai Chinnaiah:
Corrigendum to: Congestion Free Transient Plane(CFTP) using bandwidth sharing during link failures in SDN. 267
Volume 66, Number 2, February 2023
- Wenqin Cao, Wentao Zhang, Xuefeng Zhao:
The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis. 269-279 - Penta Anil Kumar, R. Gunasundari, R. Aarthi:
Fractional Sailfish Optimizer with Deep Convolution Neural Network for Compressive Sensing Based Magnetic Resonance Image Reconstruction. 280-294 - Cinzia Bernardeschi, Andrea Domenici, Adriano Fagiolini, Maurizio Palmieri:
Co-simulation and Formal Verification of Co-operative Drone Control With Logic-Based Specifications. 295-317 - Kailun Yan, Jilian Zhang, Yongdong Wu:
Improving Bitcoin Transaction Propagation Efficiency through Local Clique Network. 318-332 - Wiselin Jiji Ganasigamony, G. Merlin, Rajesh Athiswamy:
Assessment and Monitoring of Salinity of Soils After Tsunami in Nagapattinam Area Using Fuzzy Logic-Based Classification. 333-341 - Subrata Datta, Kalyani Mali, Udit Ghosh, Subrata Bose, Sourav Das, Sourav Ghosh:
Rare Correlated Coherent Association Rule Mining With CLS-MMS. 342-359 - Hector B. Hougaard, Atsuko Miyaji:
Authenticated Tree-Based R-LWE Group Key Exchange. 360-372 - Cong Lu, Jianbin Huang, Longji Huang:
Detecting Urban Anomalies Using Factor Analysis and One Class Support Vector Machine. 373-383 - Shudan Xue, Qingying Deng, Pingshan Li:
Fault-Tolerant Strongly Hamiltonian Laceability and Hyper-Hamiltonian Laceability of Cayley Graphs Generated by Transposition Trees. 384-398 - Zahraa E. Mohamed, Hussein H. Saleh:
Potential of Machine Learning Based Support Vector Regression for Solar Radiation Prediction. 399-415 - P. Radha, N. Selvakumar, J. Raja Sekar, J. V. Johnsonselva:
Density-Based Dynamically Self-Parameterized Clustering for Material Inspection. 416-428 - Piyush Kumar Shukla, Vandana Roy, Prashant Kumar Shukla, Anoop Kumar Chaturvedi, Aumreesh Kumar Saxena, Manish Maheshwari, Parashu Ram Pal:
An Advanced EEG Motion Artifacts Eradication Algorithm. 429-440 - Xiao-Yan Li, Yufang Zhang, Ximeng Liu, Xiangke Wang, Hongju Cheng:
Reliability Evaluation of Clustered Faults for Regular Networks Under the Probabilistic Diagnosis Model. 441-462 - Oswald C., B. Sivaselvan:
Smart Multimedia Compressor - Intelligent Algorithms for Text and Image Compression. 463-478 - Tao Hou, Ting Cui, Jiyan Zhang:
Practical Attacks on Reduced-Round 3D and Saturnin. 479-495 - Mohammad Reza Zarrabi, Nasrollah Moghaddam Charkari:
Single-Point And Triple-Point Queries Visibility Constrained Minimum Link Paths In Simple Polygons. 496-507 - S. Christina Magneta, C. Sundar, Muniyandi Suruli Thanabal:
Lung Lobe Segmentation and Feature Extraction-Based Hierarchical Attention Network for COVID-19 Prediction from Chest X-Ray Images. 508-522 - Gongxian Zeng, Meiqi He, Siu-Ming Yiu, Zhengan Huang:
Corrigendum to: A Self-Tallying Electronic Voting Based on Blockchain. 523 - Ehsan Ataie, Athanasia Evangelinou, Eugenio Gianniti, Danilo Ardagna:
Erratum to: A Hybrid Machine Learning Approach for Performance Modeling of Cloud-Based Big Data Applications. 524
Volume 66, Number 3, March 2023
- A Krishan, D. Mittal:
Multi-Class Liver Cancer Diseases Classification Using CT Images. 525-539 - Weina Niu, Yuheng Luo, Kangyi Ding, Xiaosong Zhang, Yanping Wang, Beibei Li:
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning. 540-553 - K. Durga Devi, P. Uma Maheswari, Phani Kumar Polasi, R. Preetha, M. Vidhyalakshmi:
Pattern Matching Model for Recognition of Stone Inscription Characters. 554-564 - Zhiqiang Lv, Jianbo Li, Chuanhao Dong, Zhihao Xu:
DeepSTF: A Deep Spatial-Temporal Forecast Model of Taxi Flow. 565-580 - Furkan Gözükara, Selma Ayse Özel:
An Incremental Hierarchical Clustering Based System For Record Linkage In E-Commerce Domain. 581-602 - Pramod Ganapathi, Rezaul Chowdhury:
A Unified Framework to Discover Permutation Generation Algorithms. 603-614 - Taha Mansouri, Mohammad Reza Sadeghi Moghadam, Fatemeh Monshizadeh, Ahad Zareravasan:
IoT Data Quality Issues and Potential Solutions: A Literature Review. 615-625 - Kaiju Li, Chunhua Xiao:
PBFL: Communication-Efficient Federated Learning via Parameter Predicting. 626-642 - Jie Ma, Bin Qi, Kewei Lv:
Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet. 643-661 - Chuanxiang Ju, Hangqi Ding, Benjia Hu:
A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition. 662-677 - Yalan Wu, Jiaquan Yan, Long Chen, Jigang Wu, Yidong Li:
Efficient Parameter Server Placement for Distributed Deep Learning in Edge Computing. 678-691 - Zhiwang Xu, Huibin Qin, Shengying Yang, Seyedeh Maryam Arefzadeh:
A New Approach for Resource Recommendation in the Fog-Based IoT Using a Hybrid Algorithm. 692-710 - Yuchen Tian, Weizhe Zhang, Andrew Simpson, Yang Liu, Zoe Lin Jiang:
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning. 711-726 - Sheela J, Janet B:
Caviar-Sunflower Optimization Algorithm-Based Deep Learning Classifier for Multi-Document Summarization. 727-742 - Rahul Ramesh Chakre, Dipak V. Patil:
Particle Rider Mutual Information and Dendritic-Squirrel Search Algorithm With Artificial Immune Classifier for Brain Tumor Classification. 743-762 - Maximiliano Cristiá, Andrea Fois, Gianfranco Rossi:
Declarative Programming with Intensional Sets in Java Using JSetL. 763-784
Volume 66, Number 4, April 2023
- Sweta Jain, Pruthviraj Choudhari, Mahesh Gour:
Pulmonary Lung Nodule Detection from Computed Tomography Images Using Two-Stage Convolutional Neural Network. 785-795 - Karine Altisen, Stéphane Devismes, Erwan Jahier:
sasa: a SimulAtor of Self-stabilizing Algorithms. 796-814 - Bharathi Gopal, Anandharaj Ganesan:
Sentiment Classification of Tourist's Opinion on Tourist Places of Interest in South India using Tweet Reviews. 815-825 - Qianru Zhou, Shuming Zhou, Xiaoqing Liu, Zhengqin Yu:
Cluster Connectivity And Super Cluster Connectivity Of DQcube. 826-841 - Jixin Zhang, Jiageng Chen:
Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain. 842-865 - Mehmet Duran Toksari, Berrin Atalay:
Some Scheduling Problems With Job Rejection And A Learning Effect. 866-872 - R. Sekar, Ravi G.:
Taylor Sun Flower Optimization-Based Compressive Sensing for Image Compression and Recovery. 873-887 - Cheng Zhang, Bo Ou, Xiaolong Li, Jianqin Xiong:
Human Visual System Guided Reversible Data Hiding Based On Multiple Histograms Modification. 888-906 - Simone Faro, Thierry Lecroq, Kunsoo Park, Stefano Scafiti:
On the Longest Common Cartesian Substring Problem. 907-923 - Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. 924-940 - Yue Li, Jianfang Qi, Xiaoquan Chu, Weisong Mu:
Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm. 941-962 - Amitabha Acharya, Aman Aryan, Sujay Saha, Anupam Ghosh:
Impact of COVID-19 on the Human Personality: An Analysis Based on Document Modeling Using Machine Learning Tools. 963-969 - Jialiang Hua, Tai Liu, Yulong Cui, Lingyue Qin, Xiaoyang Dong, Huiyong Cui:
Low-Data Cryptanalysis On SKINNY Block Cipher. 970-986 - Hailun Yan, Serge Vaudenay, Daniel Collins, Andrea Caforio:
Optimal Symmetric Ratcheting for Secure Communication. 987-1016 - Li Zhang, Wenling Wu, Yafei Zheng, Bolin Wang:
Cryptanalysis on Reduced-Round 3D and Saturnin. 1017-1029 - K. Ravishankar, C. Jothikumar:
Analysis Performance Of Image Processing Technique Its Application by Decision Support Systems On Covid-19 Disease Prediction Using Convolution Neural Network. 1030-1039 - Erdogan Berkay Tekincan, Tülin Erçelebi Ayyildiz, Nizam Ayyildiz:
Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers. 1040-1052
Volume 66, Number 5, May 2023
- Sudhin Chandran, R. Rajesh, M. Dev Anand:
Laser Beam Welded Aluminum-Titanium Dissimilar Sheet Metals: Neural Network Based Strength and Hardness Prediction Model. 1053-1068 - Hao Guo, Zhiyu Zhang, Qianqian Yang, Lei Hu, Yiyuan Luo:
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT. 1069-1082 - Md Abu Marjan, Md. Palash Uddin, Masud Ibn Afjal:
An Educational Data Mining System For Predicting And Enhancing Tertiary Students' Programming Skill. 1083-1101 - Bin-Bin Cai, Yusen Wu, Jing Dong, Su-Juan Qin, Fei Gao, Qiao-Yan Wen:
Quantum Attacks on 1K-AES and PRINCE. 1102-1110 - Guofeng Tang, Zhenfeng Zhang:
Two-Party Signing For ISO/IEC Digital Signature Standards. 1111-1125 - K. Suresh, S. S. Sreeja Mole, A. Joseph Selva Kumar:
F2SO: An Energy Efficient Cluster Based Routing Protocol Using Fuzzy Firebug Swarm Optimization Algorithm in WSN. 1126-1138 - Shobhan Kumar, Arun Chauhan:
A Transformer Based Encodings for Detection of Semantically Equivalent Questions in cQA. 1139-1155 - Yanna Wang, Bo Zhou:
Residual Closeness, Matching Number and Chromatic Number. 1156-1166 - Xiaodi Wang, Xiaoge Pan, Tian Yang, Jianhua Xie, Mingwei Tang:
Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network. 1167-1183 - Yanze Huang, Limei Lin, Eddie Cheng, Li Xu:
Component Fault Diagnosis and Fault Tolerance of Alternating Group Graphs. 1184-1194 - Xiaoli Dong, Yongzhuang Wei, Wen Gao, Jie Chen:
New Meet-in-the-Middle Attacks on FOX Block Cipher. 1195-1212 - Luming Yang, Shaojing Fu, Yongjun Wang, Kaitai Liang, Fan Mo, Bo Liu:
DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic. 1213-1227 - Mona Mosa, Nedaa Agami, Ghada Elkhayat, Mohamed Kholief:
A Novel Hybrid Segmentation Approach for Decision Support: A Case Study in Banking. 1228-1240 - Mengzhu Yu, Zhenjun Tang, Zhixin Li, Xiaoping Liang, Xianquan Zhang:
Robust Image Hashing With Saliency Map And Sparse Model. 1241-1255 - Bishal Basak Papan, Protik Bose Pranto, Md. Saidur Rahman:
On 2-Interval Pairwise Compatibility Properties of Two Classes of Grid Graphs. 1256-1267 - Zhen Shi, Chenhui Jin:
Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search. 1268-1278 - J. Shobana, M. Murali:
An Improved Self Attention Mechanism Based on Optimized BERT-BiLSTM Model for Accurate Polarity Prediction. 1279-1294 - Bo Pang, Gang Liang, Jin Yang, Yijing Chen, Xinyi Wang, Wenbo He:
CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network. 1295-1309
Volume 66, Number 6, June 2023
- Tomer Ashur, Chris J. Mitchell:
Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword. 1311 - Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar:
How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk. 1312-1319 - Nina Bindel, Sarah McCarthy:
The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices. 1320-1334 - Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom:
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung. 1335-1341 - Daniel Shumow:
Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts. 1342-1349 - Satish Muppidi, Om Prakash P. G, B. Kishore:
Dragonfly Political Optimizer Algorithm-Based Rider Deep Long Short-Term Memory for Soil Moisture and Heat Level Prediction in IoT. 1350-1365 - Hieu Minh Truong, Hieu Trung Huynh:
A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning. 1366-1375 - Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma:
On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. 1376-1399 - Shusen Wu, Xiaoshe Dong, Heng Chen, Longxiang Wang, Qiang Wang, Zhengdong Zhu:
Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description. 1400-1418 - Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan:
A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs. 1419-1433 - Hailong Zhang, Wei Yang:
Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations. 1434-1451 - Hisaki Kobayashi, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
A Self-Stabilizing Distributed Algorithm for the Generalized Dominating Set Problem With Safe Convergence. 1452-1476 - Damian Arellanes, Kung-Kiu Lau, Rizos Sakellariou:
Decentralized Data Flows for the Functional Scalability of Service-Oriented IoT Systems. 1477-1506 - Ti Wang, Yongbin Zhou, Hui Ma, Rui Zhang:
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud. 1507-1524 - Sinam Ajitkumar Singh, Ningthoujam Dinita Devi, Swanirbhar Majumder:
An Improved Unsegmented Phonocardiogram Classification Using Nonlinear Time Scattering Features. 1525-1540 - Ahmet Gökçen, Alkim Gokcen, Savas Sahin:
Prediction of Li-Ion Battery Discharge Patterns in IoT Devices Under Random Use Via Machine Learning Algorithms. 1541-1548 - Pravin Narayan Kathavate:
Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment. 1549-1562 - Corrigendum to: IoT Data Quality Issues and Potential Solutions: A Literature Review. 1563
- Corrigendum to: A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification. 1564
Volume 66, Number 7, July 2023
- Jan A. Bergstra, John V. Tucker:
On The Axioms Of Common Meadows: Fracterm Calculus, Flattening And Incompleteness. 1565-1572 - Zhiruo Zhao, Lei Cao, Xiliang Chen, Jun Lai, Legui Zhang:
Improvement of MADRL Equilibrium Based on Pareto Optimization. 1573-1585 - Tiziana Calamoneri, Daniele Tavernelli:
Modeling and Approximating the Visit of a Set of Sites With a Fleet of UAVs. 1586-1594 - Aravindkumar Sekar, Varalakshmi Perumal:
A Novel SGD-U-Network-Based Pixel-Level Road Crack Segmentation and Classification. 1595-1608 - Lingyuan Yin, Jing Xu, Zhenfeng Zhang:
Interopera: An Efficient Cross-Chain Trading Protocol. 1609-1621 - Poongodi K, Dhananjay Kumar:
Mining Frequent Serial Positioning Episode Rules with Forward and Backward Search Technique from Event Sequences. 1622-1643 - Anjushi Verma, Tirthankar Gayen:
Reliability Assessment of Combined Hardware-Software Non-repairable Time-Critical Systems. 1644-1663 - Wanwan Zheng, Mingzhe Jin:
Improving the Performance of Feature Selection Methods with Low-Sample-Size Data. 1664-1686 - Samer Kais Jameel, Jafar Majidpour, Abdulbasit K. Al-Talabani, Jihad Anwar Qadir:
Face Identification Using Conditional Generative Adversarial Network. 1687-1697 - Elham Raisi Sarbizhan, Mohammad Mehdi Zahedi, Marzieh Shamsizadeh:
L-graph Automata And Some Applications. 1698-1716 - Shiyou Xu, Jian Wang, Liangliang Wang:
Indistinguishable Leakage-Resilient Circuit Compiler. 1717-1732 - Yeting Li, Haiming Chen, Zixuan Chen:
Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples. 1733-1748 - Muath AlShaikh:
A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis. 1749-1760