default search action
Cluster Computing, Volume 22
Volume 22, Number Supplement 1, January 2019
- Natarajan Yuvaraj, K. R. SriPreethaa:
Diabetes prediction in healthcare systems using machine learning algorithms on Hadoop cluster. 1-9 - M. Annalakshmi, S. Mohamed Mansoor Roomi, Sheik Naveedh A:
A hybrid technique for gender classification with SLBP and HOG features. 11-20 - D. Sathiya, B. Gomathy:
Improved security and routing path learning in MANETs using Beer-Quiche game theoritical model in cloud computing. 21-31 - T. Kumaresan, S. Saravanakumar, Balamurugan Rengeswaran:
Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine. 33-46 - Suganya Ramamoorthy, S. Rajaram:
An efficient categorization of liver cirrhosis using convolution neural networks for health informatics. 47-56 - B. Santhosh Kumar, S. Karthik, V. P. Arunachalam:
Upkeeping secrecy in information extraction using 'k' division graph based postulates. 57-63 - S. Sathees Babu, K. Balasubadra:
Revamping data access privacy preservation method against inside attacks in wireless sensor networks. 65-75 - R. Jayanthi, M. Lilly Florence:
Software defect prediction techniques using metrics based on neural network classifier. 77-88 - M. Suganthi, V. Karunakaran:
Instance selection and feature extraction using cuttlefish optimization algorithm and principal component analysis using decision tree. 89-101 - S. Ilankumaran, Deisy Chelliah:
Multi-biometric authentication system using finger vein and iris in cloud computing. 103-117 - N. Rajesh, A. Arul Lawrence Selvakumar:
Association rules and deep learning for cryptographic algorithm in privacy preserving data mining. 119-131 - C. Viji, N. Rajkumar, S. Duraisamy:
Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithm. 133-143 - T. Tamilselvi, G. Tholkappia Arasu:
Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree construction. 145-155 - P. Supraja, V. M. Gayathri, R. Pitchai:
Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networks. 157-163 - V. M. Gayathri, R. Nedunchelian:
Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation. 165-176 - S. Anantha Padmanabhan, N. J. Krishna Kumar:
An effective pose invariant face recognition system with the aid of ABC optimized ANFIS. 177-187 - S. Chidambaram, K. G. Srinivasagan:
Performance evaluation of support vector machine classification approaches in data mining. 189-196 - Renuka Devi Rajagopal, Saravanan Murugan, Kottilingam Kottursamy, V. Raju:
Cluster based effective prediction approach for improving the curable rate of lymphatic filariasis affected patients. 197-205 - Eswaran Saravana Kumar, K. Vengatesan:
Trust based resource selection with optimization technique. 207-213 - J. Raja, K. Gunasekaran, R. Pitchai:
Prognostic evaluation of multimodal biometric traits recognition based human face, finger print and iris images using ensembled SVM classifier. 215-228 - V. Priya, K. Umamaheswari:
Enhanced continuous and discrete multi objective particle swarm optimization for text summarization. 229-240 - K. Sasi Kala Rani, S. N. Deepa:
Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networks. 241-254 - T. R. Vedhavathy, M. S. K. Manikandan:
Triple referee incentive mechanism for secure mobile adhoc networks. 255-264 - P. Bharathisindhu, S. Selva Brunda:
An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network. 265-275 - K. N. Anjan Kumar, S. Chitra, T. Satish Kumar:
Probabilistic classification techniques to perform geographical labeling of web objects. 277-285 - V. M. Arul Xavier, S. Annadurai:
Chaotic social spider algorithm for load balance aware task scheduling in cloud computing. 287-297 - (Withdrawn) Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment. 299-310
- D. Muthusankar, B. Kalaavathi, P. Kaladevi:
High performance feature selection algorithms using filter method for cloud-based recommendation system. 311-322 - Natesan Jayanthi, K. R. Valluvan:
Hybrid routing algorithm for improving path selection in sustainable network. 323-334 - K. Ilamathi, P. Rangarajan:
Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chip. 335-346 - R. Mohan Das, E. Chandira Sekaran:
A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motor. 347-360 - Y. Arockia Raj, P. Alli:
Turtle edge encoding and flood fill based image compression scheme. 361-377 - V. Ranganayaki, S. N. Deepa:
Linear and non-linear proximal support vector machine classifiers for wind speed prediction. 379-390 - Xiaoping Jiang, Jing Sun, Hao Ding, Chenghua Li:
A silhouette based novel algorithm for object detection and tracking using information fusion of video frames. 391-398 - K. Kalai Arasan, P. Anandhakumar:
A new GLoSM embedded virtual machine model for big data services in cloud storage systems. 399-405 - Valliyammai Chinnaiah, Bhuvaneswari Anbalagan:
Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks. 407-422 - Rakesh Rajendran, Sripathi Venkata Naga Santhosh Kumar, Yogesh Palanichamy, Kannan Arputharaj:
Detection of DoS attacks in cloud networks using intelligent rule based classification system. 423-434 - C. Mageshkumar, S. Karthik, V. P. Arunachalam:
Hybrid metaheuristic algorithm for improving the efficiency of data clustering. 435-442 - Archana Nandibewoor, Ravindra S. Hegadi:
A novel SMLR-PSO model to estimate the chlorophyll content in the crops using hyperspectral satellite images. 443-450 - (Withdrawn) Information security model of block chain based on intrusion sensing in the IoT environment. 451-468
- R. Aruna, R. Subramanian, P. Sengottuvelan, J. Shanthini:
Optimized energy efficient route assigning method using related node discovery algorithm in MANET. 469-479 - Haibo Liang, Guoliang Li, Wenlong Liang:
Intelligent early warning model of early-stage overflow based on dynamic clustering. 481-492 - Ke Wang, Huiqin Wang, Zhan Wang, Qinghua Gu, Ying Yin, Li Mao, Ying Lu:
Study of spectral reflectance reconstruction based on regularization matrix R method. 493-502 - Bei Li, Ying Sun, Gongfa Li, Jianyi Kong, Guozhang Jiang, Du Jiang, Bo Tao, Shuang Xu, Honghai Liu:
Gesture recognition based on modified adaptive orthogonal matching pursuit algorithm. 503-512 - Yong Lu, Na Sun:
An effective task scheduling algorithm based on dynamic energy management and efficient resource utilization in green cloud computing environment. 513-520 - Guiliang Zhou, Mengru Lv, Tianwen Bao, Lina Mao, Kai Huang:
Design of intelligent carpooling program based on big data analysis and multi-information perception. 521-532 - Pengbo Hu, Yue Ma, Huifeng Xue, Feng Zhang:
Application of low impact development technology in rainwater drainage system reconstruction project. 533-543 - Yun Jing, Yingke Liu, Mingkai Bi:
Quantum-inspired immune clonal algorithm for railway empty cars optimization based on revenue management and time efficiency. 545-554 - ChunYu Zhang, Lei Chen, Rui Bin Gou:
High-speed vision extraction based on the CamShift algorithm. 555-564 - Bin Zhao, Chuangbai Xiao, Yu Zhang, Peng Zhai, Zhi Wang:
Assessment of recommendation trust for access control in open networks. 565-571 - Lingling Tian, Juncheng Jiang, L. Tian:
Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithm. 573-582 - Zhi Xiong, Ting Guo, Zhongliang Xue, Weihong Cai, Lingru Cai, Nanfu Luo:
Online energy-efficient deployment based on equivalent continuous DFS for large-scale web cluster. 583-596 - (Withdrawn) Maximum data collection rate routing for data gather trees with data aggregation in rechargeable wireless sensor networks. 597-607
- Yegang Chen, Hongxiang Wang:
Evolutionary energy balanced ant colony algorithm based on WSNs. 609-621 - Hao Bu, Rong Zhu, Shihong Chen, Xiaoqiong Tan:
Research on concurrency comparison modeling based on $$\uppi $$ π calculus in future computer technology. 623-634 - E. Thangaselvi, K. Meena alias Jeyanthi:
Implementation of flexible denim nickel copper rip stop textile antenna for medical application. 635-645 - (Withdrawn) Splicing image forgery identification based on artificial neural network approach and texture features. 647-660
- Sivakumar Venu, A. M. J. Md. Zubair Rahman:
Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks. 661-671 - M. V. Ranjith Kumar, N. Bhalaji, Swathi Singh:
An augmented approach for pseudo-free groups in smart cyber-physical system. 673-692 - Shengjun Xue, Yue Peng, Xiaolong Xu, Jie Zhang, Chao Shen, Feng Ruan:
DSM: a dynamic scheduling method for concurrent workflows in cloud environment. 693-706 - Yajun Liu, Junying Zhang, Aimin Li, Yuanyuan Zhang, Yaoyao Li, Xiguo Yuan, Zhongzhen He, Zhaowen Liu, Shouheng Tuo:
Identification of PIWI-interacting RNA modules by weighted correlation network analysis. 707-717 - Zeyun Xiao, Bin Tian, Xiaochun Lu:
Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithm. 719-729 - Yanwei Xu:
Scalable top-k keyword search in relational databases. 731-747 - Jihui Liu, Zhijun He, Junhong Zhang:
The dynamic model of pulverized coal and waste plastic bonded together in flight combustion process. 749-757 - Yonghui Huang, Ze-ling Mao, Zhi-yu Zhang, Xin-han Li, Lei Yan:
Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rock. 759-768 - Jin Zhang, Shulin Wang, Yijun Zhou:
Analysis on key dimension's measurement error in high speed computing. 769-779 - Huixian Duan, Yihong Wu, Lei Song, Jun Wang, Na Liu:
Fitting a cluster of line images under central catadioptric camera. 781-793 - Qiming Fu, Wen Hu, Quan Liu, Heng Luo, Lingyao Hu, Jianping Chen:
Residual Sarsa algorithm with function approximation. 795-807 - Ming Wei, Bo Sun, Rong Sun:
Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithm. 809-818 - Zheyuan Liu, Xiaoteng Zhang, Lei Song, Zhengyan Ding, Huixian Duan:
More efficient and effective tricks for deep action recognition. 819-826 - Boping Zhang:
Distributed SVM face recognition based on Hadoop. 827-834 - (Withdrawn) Assembly sequence planning method based on particle swarm algorithm. 835-846
- Shengli Song, Wen Huang, Yulong Sun:
Semantic query graph based SPARQL generation from natural language questions. 847-858 - Xiang Pan:
Layered constraint united scheduling model of multi-line lock. 859-870 - Jun Zhang, Yanxiang He, Fanfan Shen, Qing'an Li, Hai Tan:
Memory-aware TLP throttling and cache bypassing for GPUs. 871-883 - Haibo Liu:
Resource recommendation via user tagging behavior analysis. 885-894 - Yong Zhang, Liyi Zhang, Jianfeng Han, Zhe Ban, Yi Yang:
A new DOA estimation algorithm based on compressed sensing. 895-903 - Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang, Shuting Cai:
On the use of chaotic iterations to design keyed hash function. 905-919 - Hyunjoo Kim, Jonghyun Kim, Youngsoo Kim, Ikkyun Kim, Kuinam J. Kim, Hyuncheol Kim:
Improvement of malware detection and classification using API call sequence alignment and visualization. 921-929 - Nakhoon Baek, Kuinam J. Kim:
Design and implementation of OpenGL SC 2.0 rendering pipeline. 931-936 - Kuinam J. Kim, Nakhoon Baek:
Providing profiling information for OpenGL ES application programs. 937-941 - Nakhoon Baek, Kuinam J. Kim:
Prototype implementation of the OpenGL ES 2.0 shading language offline compiler. 943-948 - Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C. Suh, Ikkyun Kim, Kuinam J. Kim:
A survey of deep learning-based network anomaly detection. 949-961 - Miroslav Bures, Tomás Cerný, Karel Frajták, Bestoun S. Ahmed:
Testing the consistency of business data objects using extended static testing of CRUD matrices. 963-976 - Dong Chun Lee, Do Hyeon Lee:
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks. 977-988 - Yuji Tamura, Doan Truong Thi, Takahiro Chiba, Myungryun Yoo, Takanori Yokoyama:
A real-time operating system supporting distributed shared memory for embedded control systems. 989-998 - Hyojin Park, Jinhong Yang, Hyuncheol Kim, Jun Kyun Choi:
Customized video service system design and implementation: from taste to image-based consuming method. 999-1009 - Cong Viet-Ngu Huynh, Jun-Ho Huh:
B+-tree construction on massive data with Hadoop. 1011-1021 - Tsung-Han Lee, Lin-Huang Chang, Yan-Wei Liu, Jiun-Jian Liaw, Hung-Chi Chu:
Priority-based scheduling using best channel in 6TiSCH networks. 1023-1033 - Hye-Young Kim, Kuinam J. Kim:
Optimized state update for mobile games in cloud networks. 1035-1041 - Linh Van Ma, Jaehyung Park, Jiseung Nam, Jonghyun Jang, Jinsul Kim:
An efficient scheduling multimedia transcoding method for DASH streaming in cloud environment. 1043-1053 - Nguyen Tan Cam, Van-Hau Pham, Tuan A. Nguyen:
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique. 1055-1064 - Sanja Lazarova-Molnar, Nader Mohamed:
Collaborative data analytics for smart buildings: opportunities and models. 1065-1077 - Ly Hoang Tuan, Nguyen Tan Cam, Van-Hau Pham:
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis. 1079-1085 - Karnam Sreenu, Sreelatha Malempati:
W-Scheduler: whale optimization for task scheduling in cloud computing. 1087-1098 - Vijayakumar Polepally, K. Shahu Chatrapati:
Dragonfly optimization and constraint measure-based load balancing in cloud computing. 1099-1111 - Ahamed Ali Samsu Aliar, M. Ramakrishnan:
Secure provable data possession scheme with replication support in the cloud using Tweaks. 1113-1123 - (Withdrawn) Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system. 1125-1135
- S. Bhaskaran, Santhi Balachandran:
An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computing. 1137-1149 - Xiang Li, Zhijian Wang:
A new recommendation algorithm combined with spectral clustering and transfer learning. 1151-1167 - Qiang Yu, Qi Liu:
Accurate detection of user interest data in cloud computing environment. 1169-1178 - (Withdrawn) A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing. 1179-1188
- (Withdrawn) Cluster and cloud computing framework for scientific metrology in flow control. 1189-1198
- (Withdrawn) Classification of sentence level sentiment analysis using cloud machine learning techniques. 1199-1209
- A. Kethsy Prabavathy, J. Devi Shree:
Histogram difference with Fuzzy rule base modeling for gradual shot boundary detection in video cloud applications. 1211-1218 - (Withdrawn) A FCM cluster: cloud networking model for intelligent transportation in the city of Macau. 1219-1228
- Xindong Duan:
Research on abnormal data detection method of web browser in cloud computing environment. 1229-1238 - M. Madhankumar, C. Suresh Gnana Dhas:
Improved continuous query plan with cluster weighted dominant querying in synthetic datasets. 1239-1246 - Esther Daniel, N. A. Vasanthi:
LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. 1247-1258 - M. R. M. VeeraManickam, M. Mohanapriya, Bishwajeet K. Pandey, Sushma Akhade, S. A. Kale, Reshma Patil, M. Vigneshwar:
Map-Reduce framework based cluster architecture for academic student's performance prediction using cumulative dragonfly based neural network. 1259-1275 - Ashok George, A. Sumathi:
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud. 1277-1288 - Sagenela Vijaya Kumar, C. Nagaraju:
FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale images. 1289-1311 - Deepak C. Mehetre, SusaiMichael Emalda Roslin, Sanjeev J. Wagh:
Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. 1313-1328 - Lakshmanan Ramanathan, G. Parthasarathy, K. Vijayakumar, L. Lakshmanan, S. Ramani:
Cluster-based distributed architecture for prediction of student's performance in higher education. 1329-1344 - Poonam Yadav:
Cluster based-image descriptors and fractional hybrid optimization for medical image retrieval. 1345-1359 - Praveen Kumar Reddy Maddikunta, Madda Rajasekhara Babu:
Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things. 1361-1372 - Arvind Madhukar Jagtap, N. Gomathi:
Minimizing movement for network connectivity in mobile sensor networks: an adaptive approach. 1373-1383 - J. Devagnanam, N. M. Elango:
Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud. 1385-1400 - C. Ashok Kumar, R. Vimala, K. R. Aravind Britto, S. Sathya Devi:
FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud model. 1401-1414 - Venkatesh Munagala, K. Satya Prasad:
Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systems. 1429-1441 - Dingyou Lei, Peng Zhang, Yinggui Zhang, Yangkun Xia, Shuo Zhao:
Research on coordinated scheduling of multiple systems and single jobs based on improved particle swarm optimization. 1443-1458