


default search action
Computer Systems: Science & Engineering, Volume 44
Volume 44, Number 1, 2023
- R. Bhaskaran

, P. S. Sujith Kumar, G. Shanthi, Linesh Raja, Gyanendra Prasad Joshi, Woong Cho:
Metaheuristics Based Node Localization Approach for Real-Time Clustered Wireless Networks. 1-17 - P. Vasuki

:
Design of Hierarchical Classifier to Improve Speech Emotion Recognition. 19-33 - Mahmoud M. Khattab, Akram M. Zeki, Ali Amer Alwan, Belgacem Bouallegue, Safaa S. Matter, Abdelmoty M. Ahmed

:
A Hybrid Regularization-Based Multi-Frame Super-Resolution Using Bayesian Framework. 35-54 - P. Gnanasivam, G. T. Bharathy, V. Rajendran, T. Tamilselvi:

Efficient Centralized Cooperative Spectrum Sensing Techniques for Cognitive Networks. 55-65 - Saraswathi Shunmuganathan

:
Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack. 67-79 - Joe Louis Paul Ignatius, Sasirekha Selvakumar, Kavin Gabriel Joe Louis Paul, Aadhithya B. Kailash, S. Keertivaas, S. A. J. Akarvin Raja Prajan:

Histogram Matched Chest X-Rays Based Tuberculosis Detection Using CNN. 81-97 - D. Loganathan

, M. Balasubramani, R. Sabitha, S. Karthik:
Improved Load-Balanced Clustering for Energy-Aware Routing (ILBC-EAR) in WSNs. 99-112 - Aakib Jawed Khan, Shabana Mehfuz:

Fuzzy User Access Trust Model for Cloud Access Control. 113-128 - Fuad Ali Mohammed Al-Yarimi:

Arrhythmia Prediction on Optimal Features Obtained from the ECG as Images. 129-142 - M. Hema

, S. Kanaga Suba Raja
:
An Efficient Framework for Utilizing Underloaded Servers in Compute Cloud. 143-156 - J. S. Sujin

, S. Sophia:
Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method. 157-171 - B. Lalitha, V. Gomathi

:
Image Captioning Using Detectors and Swarm Based Learning Approach for Word Embedding Vectors. 173-189 - Deependra Sharma

, Zainul Abdin Jaffery:
Multiple Object Tracking through Background Learning. 191-204 - Jean Justus John

, U. Sakthi
, K. Priyadarshini, B. Thiyaneswaran
, Masoud Alajmi
, Marwa Ismael Obayya, Manar Ahmed Hamza:
Hybridization of Metaheuristics Based Energy Efficient Scheduling Algorithm for Multi-Core Systems. 205-219 - Ihsan Uluocak

, Hakan Yavuz
:
Model Predictive Control Coupled with Artificial Intelligence for Eddy Current Dynamometers. 221-234 - R. Bhaskaran

, S. Saravanan
, M. Kavitha, C. Jeyalakshmi
, Seifedine Kadry, Hafiz Tayyab Rauf, Reem Alkhammash:
Intelligent Machine Learning with Metaheuristics Based Sentiment Analysis and Classification. 235-247 - Dharini N, Jeevaa Katiravan

, S. M. Udhaya Sankar
:
Wireless Sensor Network-based Detection of Poisonous Gases Using Principal Component Analysis. 249-264 - M. Rajakani

, R. J. Kavitha, A. Ramachandran:
Adaptive Window Based 3-D Feature Selection for Multispectral Image Classification Using Firefly Algorithm. 265-280 - R. Prabhu, S. Rajesh:

An Advanced Dynamic Scheduling for Achieving Optimal Resource Allocation. 281-295 - J. Avila Selvi Therase, S. Allwin, A. Ahilan:

Full Duplex Media Access Control Protocol for Multihop Network Computing. 297-309 - Priti Shaw, Kaustubh Pachpor, Suresh Sankaranarayanan:

Explainable AI Enabled Infant Mortality Prediction Based on Neonatal Sepsis. 311-325 - K. Chitra, A. Tamilarasi

:
Community Detection Using Jaacard Similarity with SIM-Edge Detection Techniques. 327-337 - R. Rajadevi, K. Venkatachalam, Mehedi Masud, Mohammed A. Alzain, Mohamed Abouhawwash

:
Proof of Activity Protocol for IoMT Data Security. 339-350 - Iyyappan M

, Arvind Kumar
, Sultan Ahmad
, Sudan Jha
, Bader Alouffi, Abdullah Alharbi:
A Component Selection Framework of Cohesion and Coupling Metrics. 351-365 - S. Meenakshi Ammal, P. S. Manoharan

:
Multi-Headed Deep Learning Models to Detect Abnormality of Alzheimer's Patients. 367-390 - R. Krishnaswamy

, Kamalraj Subramaniam, V. Nandini, K. Vijayalakshmi, Seifedine Kadry, Yunyoung Nam:
Metaheuristic Based Clustering with Deep Learning Model for Big Data Classification. 391-406 - Basit Shahzad, Wardah Naeem Awan, Fazal-e-Amin

, Ahsanullah Abro, Muhammad Shoaib
, Sultan Alyahya
:
Framework for Effective Utilization of Distributed Scrum in Software Projects. 407-422 - R. Ganesh Babu, Hemanand Duraivelu

, V. Amudha, S. Sugumaran:
Design of Clustering Techniques in Cognitive Radio Sensor Networks. 441-456 - D. Palanikkumar, Adel Fahad Alrasheedi

, P. Parthasarathi, Sameh S. Askar, Mohamed Abouhawwash
:
Hybrid Smart Contracts for Securing IoMT Data. 457-469 - Son-Lam Vu, Quang-Hung Le

:
A Deep Learning Based Approach for Context-Aware Multi-Criteria Recommender Systems. 471-483 - K. Sailaja Kumar, H. K. Manoj, D. Evangelin Geetha:

Twitter Data Analysis Using Hadoop and 'R' and Emotional Analysis Using Optimized SVNN. 485-499 - K. Nagalakshmi, S. Suriya:

Performance Analysis of Breast Cancer Detection Method Using ANFIS Classification Approach. 501-517 - Md. Saiful Islam, Shuvo Jyoti Das, Md. Riajul Alam Khan, Sifat Momen

, Nabeel Mohammed:
Detection of COVID-19 and Pneumonia Using Deep Convolutional Neural Network. 519-534 - Nguyen Tu Trung, Tran Thi Ngan, Tran Manh Tuan, To Huu Nguyen:

Combining Entropy Optimization and Sobel Operator for Medical Image Fusion. 535-544 - S. Michael Dinesh, A. R. Kavitha:

Development of Algorithm for Person Re-Identification Using Extended Openface Method. 545-561 - Mahdi Jemmali

, Lotfi Hidri:
Hybrid Flow Shop with Setup Times Scheduling Problem. 563-577 - V. R. Kavitha, K. Nimala, A. Beno, K. C. Ramya, Seifedine Kadry, Byeong-Gwon Kang, Yunyoung Nam:

Oppositional Harris Hawks Optimization with Deep Learning-Based Image Captioning. 579-593 - D. Banumathy, Osamah Ibrahim Khalaf, Carlos Andrés Tavera Romero, P. Vishnu Raja, Dilip Kumar Sharma

:
Breast Calcifications and Histopathological Analysis on Tumour Detection by CNN. 595-612 - L. K. Shoba, P. Mohan Kumar:

An Ophthalmic Evaluation of Central Serous Chorioretinopathy. 613-628 - P. Renukadevi

, A. Rajiv Kannan:
Covid-19 Forecasting with Deep Learning-based Half-binomial Distribution Cat Swarm Optimization. 629-645 - Kyamelia Roy, Sheli Sinha Chaudhuri, Sayan Pramanik, Soumen Banerjee:

Deep Neural Network Based Detection and Segmentation of Ships for Maritime Surveillance. 647-662 - Moonseong Kim, Woochan Lee:

Novel Sensing Hole Recovery with Expanded Relay Node Capability. 663-675 - Moeiz Miraoui

:
A Smart Room to Promote Autonomy of Disabled People due to Stroke. 677-692 - Kingsley A. Ogudo, R. Surendran, Osamah Ibrahim Khalaf:

Optimal Artificial Intelligence Based Automated Skin Lesion Detection and Classification Model. 693-707 - K. Dinesh Babu, C. Senthil Singh:

Brain Tumor Segmentation through Level Based Learning Model. 709-720 - Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng

:
A Steganography Based on Optimal Multi-Threshold Block Labeling. 721-739 - K. Chola Raja

, S. Kannimuthu
:
Conditional Generative Adversarial Network Approach for Autism Prediction. 741-755 - Polin Rahman, Ahmed Rifat, Md. Iftehadamjad Chy, Mohammad Monirujjaman Khan, Mehedi Masud, Sultan Aljahdali:

Machine Learning and Artificial Neural Network for Predicting Heart Failure Risk. 757-775 - R. N. Karthika, C. Valliyammai, M. Naveena:

Phish Block: A Blockchain Framework for Phish Detection in Cloud. 777-795 - R. Bharathi

, T. Abirami:
Energy Aware Clustering with Medical Data Classification Model in IoT Environment. 797-811 - M. Geetha

, R. Vijayabhasker, Suresh Seetharaman
:
Computerised Gate Firing Control for 17-Level MLI using Staircase PWM. 813-832 - S. Mohan Kumar

, T. Kumanan:
Skin Lesion Classification System Using Shearlets. 833-844 - Muhammad Shahzeb Ali, Ali Alqahtani, Ansar Munir Shah, Adel D. Rajab, Mahmood Ul Hassan

, Asadullah Shaikh
, Khairan Rajab, Basit Shahzad:
Improved-Equalized Cluster Head Election Routing Protocol for Wireless Sensor Networks. 845-858 - Fawaz Alassery, Ahmed Alzahrani

, Asif Irshad Khan
, Kanika Sharma, Masood Ahmad
, Raees Ahmad Khan:
Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique. 859-872 - Suvitha D, Vijayalakshmi M:

Vehicle Density Prediction in Low Quality Videos with Transformer Timeseries Prediction Model (TTPM). 873-894 - Sara A. Alameen, Areej Matoog Alhothali:

A Lightweight Driver Drowsiness Detection System Using 3DCNN With LSTM. 895-912 - M. Manikandakumar, P. Karthikeyan:

Weed Classification Using Particle Swarm Optimization and Deep Learning Models. 913-927 - N. Jagadeeswari, V. Mohan Raj:

Homogeneous Batch Memory Deduplication Using Clustering of Virtual Machines. 929-943 - G. Ravikumar, K. Venkatachalam, Mohammed A. Alzain, Mehedi Masud, Mohamed Abouhawwash

:
Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT. 945-959
Volume 44, Number 2, 2023
- E. Dhiravidachelvi

, M. Suresh Kumar, L. D. Vijay Anand, D. Pritima, Seifedine Kadry, Byeong-Gwon Kang, Yunyoung Nam:
Intelligent Deep Learning Enabled Human Activity Recognition for Improved Medical Services. 961-977 - Narendran Sobanapuram Muruganandam

, Umamakeswari Arumugam:
Dynamic Ensemble Multivariate Time Series Forecasting Model for PM2.5. 979-989 - Sathit Prasomphan

:
Rice Bacterial Infection Detection Using Ensemble Technique on Unmanned Aerial Vehicles Images. 991-1007 - Mini Prince, P. M. Joe Prathap

:
An Imbalanced Dataset and Class Overlapping Classification Model for Big Data. 1009-1024 - S. R. Sylaja Vallee Narayan, R. Jemila Rose

:
Cervical Cancer Detection Based on Novel Decision Tree Approach. 1025-1038 - Hani Mahmoud Al-Mimi

, Yousef Alrabanah, Mosleh M. Abu-Alhaj
, Sumaya N. Al-Khatib:
Enhancing Bandwidth Utilization of IP Telephony Over IPv6 Networks. 1039-1049 - K. Vignesh, Abdulkhader Askarunisa, Ariyur Mahadevan Abirami:

Optimized Deep Learning Methods for Crop Yield Prediction. 1051-1067 - Waqar Hafeez

, Nazrina Aziz:
Designing Bayesian Two-Sided Group Chain Sampling Plan for Gamma Prior Distribution. 1069-1079 - P. Immaculate Rexi Jenifer, S. Kannan:

Deep Learning with Optimal Hierarchical Spiking Neural Network for Medical Image Classification. 1081-1097 - B. Dhiyanesh

, K. Karthick
, R. Radha
, Anita Venaik:
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing. 1099-1107 - Ishani Mishra

, Sanjay Jain, Vivek Maik:
Secured ECG Signal Transmission Using Optimized EGC with Chaotic Neural Network in WBSN. 1109-1123 - Feslin Anish Mon Solomon

, Godfrey Winster Sathianesan
, R. Ramesh
:
Logistic Regression Trust-A Trust Model for Internet-of-Things Using Regression Analysis. 1125-1142 - Kotchaporn Karoon, Yupaporn Areepong, Saowanit Sukparungsee:

Trend Autoregressive Model Exact Run Length Evaluation on a Two-Sided Extended EWMA Chart. 1143-1160 - Romany Fouad Mansour, Eatedal Alabdulkreem:

Disaster Monitoring of Satellite Image Processing Using Progressive Image Classification. 1161-1169 - Ligang Yuan, Jiazhi Jin, Yan Xu

, Ningning Zhang, Bing Zhang:
Study on Recognition Method of Similar Weather Scenes in Terminal Area. 1171-1185 - Rajeshkumar G

, M. Vinoth Kumar
, K. Sailaja Kumar, Surbhi Bhatia
, Arwa A. Mashat, Pankaj Dadheech
:
An Improved Multi-Objective Particle Swarm Optimization Routing on MANET. 1187-1200 - Darpan Majumder, S. Mohan Kumar

:
Optimal and Effective Resource Management in Edge Computing. 1201-1217 - Ashit Kumar Dutta, Manal Al Faraj, Yasser Albagory

, Mohammad zeid M. Alzamil, Abdul Rahaman Wahab Sait
:
Intelligent Smart Grid Stability Predictive Model for Cyber-Physical Energy Systems. 1219-1231 - Reddipalayam Murugeshan Bhavadharini, S. Karthik:

Blockchain Enabled Metaheuristic Cluster Based Routing Model for Wireless Networks. 1233-1250 - S. Rajalakshmi

, K. R. Santha:
Hybrid Recommender System Using Systolic Tree for Pattern Mining. 1251-1262 - Thanh X. Le, An T. Le, Quang H. Nguyen:

Emotional Vietnamese Speech Synthesis Using Style-Transfer Learning. 1263-1278 - C. Aswini, M. L. Valarmathi

:
Artificial Intelligence Based Smart Routing in Software Defined Networks. 1279-1293 - Sathit Prasomphan

:
Toward Fine-grained Image Retrieval with Adaptive Deep Learning for Cultural Heritage Image. 1295-1307 - Junaid Rashid, Sumera Kanwal, Muhammad Wasif Nisar, Jungeun Kim, Amir Hussain:

An Artificial Neural Network-Based Model for Effective Software Development Effort Estimation. 1309-1324 - G. Karthikeyan

, G. Kousalya
:
GTCS-Vagus Nerve Stimulator Automation Using Private IoT-Blockchain Smartcontract. 1325-1340 - Valliappan Raman

, Khaled ELKarazle, Patrick H. H. Then:
Artificially Generated Facial Images for Gender Classification Using Deep Learning. 1341-1355 - Christy James Jose, M. S. Rajasree:

Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning. 1357-1372 - P. Ramadevi, T. Jayasankar

, V. Dinesh
, M. Dhamodaran:
Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems. 1373-1385 - S. Devi Mahalakshmi:

An Optimized Transfer Learning Model Based Kidney Stone Classification. 1387-1395 - Qiuyu Hu, Wu Zeng, Yi Sheng, Jian Xu, Weihua Ou, Ruochen Tan:

Study on Real-Time Heart Rate Detection Based on Multi-People. 1397-1408 - A. M. Almohaimeed, El Amjed Hajlaoui

, Ziyad M. Almohaimeed:
Single Band EBG Antenna for Wireless Power Transfer Applications. 1409-1417 - Ashit Kumar Dutta, Yasser Albagory

, Manal Al Faraj, Majed Alsanea
, Abdul Rahaman Wahab Sait
:
Cat Swarm with Fuzzy Cognitive Maps for Automated Soil Classification. 1419-1432 - Tariq Mohammed Alqahtani:

Big Data Analytics with Optimal Deep Learning Model for Medical Image Classification. 1433-1449 - A. Jameer Basha

, S. Aswini, S. Aarthini, Yunyoung Nam, Mohamed Abouhawwash
:
Genetic-Chicken Swarm Algorithm for Minimizing Energy in Wireless Sensor Network. 1451-1466 - A. Alice Blessie, P. Ramesh:

Novel Contiguous Cross Propagation Neural Network Built CAD for Lung Cancer. 1467-1484 - Ahmed S. Almasoud:

Intelligent Deep Learning Enabled Wild Forest Fire Detection System. 1485-1498 - Pelin Yildirim Taser:

An Ordinal Multi-Dimensional Classification (OMDC) for Predictive Maintenance. 1499-1516 - Ashit Kumar Dutta, Yasser Albagory

, Manal Al Faraj, Yasir A. M. Eltahir, Abdul Rahaman Wahab Sait
:
Optimal Sparse Autoencoder Based Sleep Stage Classification Using Biomedical Signals. 1517-1529 - N. Krishnammal, C. Kalaiarasan, A. Bharathi

:
Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks. 1531-1549 - Chin-Feng Lee, Kuo-Chung Chan:

Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy. 1551-1566 - R. Gopi, R. Sheeba

, K. Anguraj, T. Chelladurai, Haya Mesfer Alshahrani, Nadhem Nemri
, Tarek Lamoudan
:
Intelligent Intrusion Detection System for Industrial Internet of Things Environment. 1567-1582 - P. Rahul, N. Kanthimathi, B. Kaarthick, M. Leeban Moses:

Fuzzy Fruit Fly Optimized Node Quality-Based Clustering Algorithm for Network Load Balancing. 1583-1600 - Ghassan Ahmed Ali, Thamer Mitib Ahmad Al Sariera, Muhammad Akram

, Adel Sulaiman, Fekry Olayah:
Detection and Classification of Hemorrhages in Retinal Images. 1601-1616 - S. Sivanantham

, V. Mohanraj, Y. Suresh
, J. Senthilkumar:
Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network. 1617-1631 - Qiang Wu, Zhaoyang Han, Ghulam Mohiuddin, Yongjun Ren:

Distributed Timestamp Mechanism Based on Verifiable Delay Functions. 1633-1646 - M. Usharani, B. Sakthivel, S. Gayathri Priya

, T. Nagalakshmi, J. Shirisha:
An Optimized Deep-Learning-Based Low Power Approximate Multiplier Design. 1647-1657 - Joseph Sathiadhas Esra, Y. Sukhi

:
Speech Separation Methodology for Hearing Aid. 1659-1678 - Abdullah Alshehri

, Nayeem Khan
, Ali Alowayr, Mohammed Yahya Alghamdi:
Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics. 1679-1689 - K. Saraswathi, V. Mohanraj, Y. Suresh

, J. Senthilkumar:
Deep Learning Enabled Social Media Recommendation Based on User Comments. 1691-1702 - V. Arulalan

, Dhananjay Kumar:
Efficient Object Detection and Classification Approach Using HTYOLOV4 and M2RFO-CNN. 1703-1717 - S. Nandagopal

, Gopalan Karthy
, A. Sheryl Oliver, M. Subha:
Optimal Deep Convolutional Neural Network with Pose Estimation for Human Activity Recognition. 1719-1733 - M. Antony Joans Kumar

, C. Christopher Columbus, E. Ben George, T. Ajith Bosco Raj:
A Virtual Cloud Storage Architecture for Enhanced Data Security. 1735-1747 - R. Soundhara Raja Pandian, C. Christopher Columbus:

Rider Optimization Algorithm Based Optimal Cloud Server Selection in E-Learning. 1749-1762 - Mohamed Abbas Ahamed Farook, S. Rukmanidevi

, N. R. Shanker:
Haemoglobin Measurement from Eye Anterior Ciliary Arteries through Borescope Camera. 1763-1774 - Md. Anwar Hussen Wadud

, Muhammad Firoz Mridha, Jungpil Shin, Kamruddin Nur
, Aloke Kumar Saha:
Deep-BERT: Transfer Learning for Classifying Multilingual Offensive Texts on Social Media. 1775-1791 - G. Ignisha Rajathi

, R. Ramesh Kumar
, D. Ravikumar, T. Joel, Seifedine Kadry, Chang-Won Jeong, Yunyoung Nam:
Brain Tumor Diagnosis Using Sparrow Search Algorithm Based Deep Learning Model. 1793-1806 - V. Premanand

, Dhananjay Kumar:
Moving Multi-Object Detection and Tracking Using MRNN and PS-KM Models. 1807-1821 - B. Jai Shankar, Raghunathan Anitha

, Finney Daniel Shadrach
, M. Sivarathinabala, V. Balamurugan
:
Music Genre Classification Using African Buffalo Optimization. 1823-1836 - Phan Thanh Thao, Nguyen Thanh Hung, Pham Thi Le My, Nguyen Xuan Hiep, Duy-Nam Phan:

Designing Software to Analyze Sewing Process of Industrial Knitted Products. 1837-1852 - Nasser Ali Aljarallah, Ashit Kumar Dutta, Majed Alsanea

, Abdul Rahaman Wahab Sait
:
Intelligent Student Mental Health Assessment Model on Learning Management System. 1853-1868
Volume 44, Number 3, 2023
- S. Siamala Devi, K. Venkatachalam, Yunyoung Nam, Mohamed Abouhawwash:

Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT. 1869-1880 - S. Stewart Kirubakaran

, V. P. Arunachalam, S. Karthik, Srihari Kannan:
Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment. 1881-1895 - R. Vijay Anandh

, S. Rukmani Devi
:
Visual Enhancement of Underwater Images Using Transmission Estimation and Multi-Scale Fusion. 1897-1910 - Mohammad Alkhawatrah

, Ahmad Alamayreh, Nidal Qasem
:
Cooperative Relay Networks Based on the OAM Technique for 5G Applications. 1911-1919 - Anas Basalamah, Mahedi Hasan, Shovan Bhowmik

, Shaikh Akib Shahriyar
:
A Highly Accurate Dysphonia Detection System Using Linear Discriminant Analysis. 1921-1938 - Dhanalakshmi R, Sovan Samanta

, Arun Kumar Sivaraman, Jeong Gon Lee, Ananthakrishnan Balasundaram
, Sanamdikar Sanjay Tanaji, Priya Ravindran:
Multi-attribute Group Decision-making Based on Hesitant Bipolar-valued Fuzzy Information and Social Network. 1939-1950 - A. Durgadevi, N. Shanmugavadivoo:

Availability Capacity Evaluation and Reliability Assessment of Integrated Systems Using Metaheuristic Algorithm. 1951-1971 - Aishah Alrashidi, Ali Mustafa Qamar:

Data-Driven Load Forecasting Using Machine Learning and Meteorological Data. 1973-1988 - Kandasamy Kittusamy

, Latha Shanmuga Vadivu Sampath Kumar:
Non Sub-Sampled Contourlet with Joint Sparse Representation Based Medical Image Fusion. 1989-2005 - N. Anita, M. Vijayalakshmi, S. Mercy Shalinie:

Proof-of-Improved-Participation: A New Consensus Protocol for Blockchain Technology. 2007-2018 - Faizan Ahmed Khan

, Farooq Ahmad, Arfat Ahmad Khan, Chitapong Wechtaisong:
Process Discovery and Refinement of an Enterprise Management System. 2019-2032 - P. Nalayini

, R. Arun Prakash:
Hierarchical Data Aggregation with Data Offloading Scheme for Fog Enabled IoT Environment. 2033-2047 - Mayada Tarek:

Face Templates Encryption Technique Based on Random Projection and Deep Learning. 2049-2063 - P. D. Sheena Smart, K. K. Thanammal, S. S. Sujatha:

An Ontology Based Multilayer Perceptron for Object Detection. 2065-2080 - S. Subha, S. Baghavathi Priya:

Prediction Model for a Good Learning Environment Using an Ensemble Approach. 2081-2093 - Khalil Hamdi Ateyeh Al-Shqeerat:

An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography. 2095-2107 - Zhengshu Zhou, Shunya Yamada, Yousuke Watanabe, Hiroaki Takada:

Tracking Pedestrians Under Occlusion in Parking Space. 2109-2127 - V. Thanikachalam, M. G. Kavitha, V. Sivamurugan:

Diabetic Retinopathy Diagnosis Using Interval Neutrosophic Segmentation with Deep Learning Model. 2129-2145 - V. Joseph Raymond, R. Jeberson Retna Raj:

Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm. 2147-2163 - Fayez Alfayez

:
Algorithms for Pre-Compiling Programs by Parallel Compilers. 2165-2176 - Mouna Bedoui

, Belgacem Bouallegue, Abdelmoty M. Ahmed
, Belgacem Hamdi, Mohsen Machhout
, Mahmoud M. Khattab:
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm. 2177-2193 - Ashit Kumar Dutta, Nazik M. A. Zakari, Yasser Albagory

, Abdul Rahaman Wahab Sait:
Colliding Bodies Optimization with Machine Learning Based Parkinson's Disease Diagnosis. 2195-2207 - S. Siamala Devi, Chandrakala Kuruba

, Yunyoung Nam, Mohamed Abouhawwash:
Paillier Cryptography Based Message Authentication Code for IoMT Security. 2209-2223 - Prasant Ku. Dash, Lopamudra Hota

, Madhumita Panda, N. Z. Jhanjhi
, Kshira Sagar Sahoo, Mehedi Masud:
FSE2R: An Improved Collision-Avoidance-based Energy Efficient Route Selection Protocol in USN. 2225-2242 - B. Kalpana

, S. Dhanasekaran, T. Abirami, Ashit Kumar Dutta, Marwa Ismael Obayya, Jaber S. Alzahrani, Manar Ahmed Hamza:
Cat and Mouse Optimizer with Artificial Intelligence Enabled Biomedical Data Classification. 2243-2257 - Vinay Gautam, Naresh Kumar Trivedi, Abhineet Anand

, Rajeev Tiwari, Atef Zaguia, Deepika Koundal, Sachin Jain
:
Early Skin Disease Identification Using eep Neural Network. 2259-2275 - Ashit Kumar Dutta, Mazen Mushabab Alqahtani, Yasser Albagory

, Abdul Rahaman Wahab Sait, Majed Alsanea
:
Optimal Machine Learning Enabled Performance Monitoring for Learning Management Systems. 2277-2292 - B. Murugeshwari, S. Rajalakshmi, K. Sudharson

:
Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation. 2293-2307 - Mahmoud Ragab

, Jaber Alyami:
Stacked Gated Recurrent Unit Classifier with CT Images for Liver Cancer Classification. 2309-2322 - N. Vanitha

, Chinnanadar Ramachandran Rene Robin, D. Doreen Hephzibah Miriam:
An Ontology Based Cyclone Tracks Classification Using SWRL Reasoning and SVM. 2323-2336 - S. A. Arunmozhi, S. Rajeswari, Y. Venkataramani:

Swarm Intelligence Based Routing with Black Hole Attack Detection in MANET. 2337-2347 - I. Vallirathi, S. Ebenezer Juliet:

Joint Energy Predication and Gathering Data in Wireless Rechargeable Sensor Network. 2349-2360 - Rehab Alanazi, Ahamed Aljuhani:

Anomaly Detection for Industrial Internet of Things Cyberattacks. 2361-2378 - S. Rameshkumar, R. Ganesan

, A. Merline:
Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN. 2379-2394 - Ashit Kumar Dutta, Basit Qureshi, Yasser Albagory

, Majed Alsanea
, Manal Al Faraj, Abdul Rahaman Wahab Sait:
Optimal Weighted Extreme Learning Machine for Cybersecurity Fake News Classification. 2395-2409 - Zhipeng Li, Shanshan Feng, Jun Shi, Yang Zhou, Yong Liao, Yangzhao Yang, Yangyang Li, Nenghai Yu, Xun Shao:

Future Event Prediction Based on Temporal Knowledge Graph Embedding. 2411-2423 - Muhammad I. Masud, Iqbal A. Khan:

CNTFET Based Fully Differential First Order All Pass Filter. 2425-2438 - C. P. Thamil Selvi, R. Pushpalaksmi:

SA-MSVM: Hybrid Heuristic Algorithm-based Feature Selection for Sentiment Analysis in Twitter. 2439-2456 - Mahesh B. Shelke

, Jeong Gon Lee, Sovan Samanta
, Sachin N. Deshmukh, Daulappa G. Bhalke, Rahul B. Mannade, Arun Kumar Sivaraman:
An Ensemble Based Approach for Sentiment Classification in Asian Regional Language. 2457-2468 - E. Afreen Banu, V. Rajamani:

Design of Online Vitals Monitor by Integrating Big Data and IoT. 2469-2487 - Saranya Veerapaulraj, M. Karthikeyan, S. Sasipriya, A. S. Shanthi:

An Optimized Novel Trust-Based Security Mechanism Using Elephant Herd Optimization. 2489-2500 - Deuk-Hun Kim, Heejin Kim, Jin Kwak:

Secure e-Prescription Management System: Mitigating Blended Threat in IoBE. 2501-2519 - Abu Saleh Musa Miah

, Jungpil Shin, Md. Al Mehedi Hasan, Md. Abdur Rahim
, Yuichi Okuyama:
Rotation, Translation and Scale Invariant Sign Word Recognition Using Deep Learning. 2521-2536 - K. Selvasheela

, Ariyur Mahadevan Abirami, Abdulkhader Askarunisa:
Effective Customer Review Analysis Using Combined Capsule Networks with Matrix Factorization Filtering. 2537-2552 - Abdul Rahaman Wahab Sait, Mohamad Khairi Ishak:

Deep Learning with Natural Language Processing Enabled Sentimental Analysis on Sarcasm Classification. 2553-2567 - T. Jagadesh, B. Sheela Rani:

Time Delay Estimation in Radar System using Fuzzy Based Iterative Unscented Kalman Filter. 2569-2583 - V. Nirmala, B. Gomathy

:
Hybrid Deep Learning Method for Diagnosis of Cucurbita Leaf Diseases. 2585-2601 - Vani A. Hiremani

, Kishore Kumar Senapati
:
Human and Machine Vision Based Indian Race Classification Using Modified-Convolutional Neural Network. 2603-2618 - J. Shanthini, P. Punitha, S. Karthik:

Improvisation of Node Mobility Using Cluster Routing-based Group Adaptive in MANET. 2619-2636 - Rajagopal Reddy N

, Mohammad Zubair Khan
, Shaik Sharief Basha, Abdulrahman Alahmadi, Ahmed H. Alahmadi, Chiranji Lal Chowdhary:
The Laplacian Energy of Hesitancy Fuzzy Graphs in Decision-Making Problems. 2637-2653 - K. Nithya

, V. Rajamani:
Triplet Label Based Image Retrieval Using Deep Learning in Large Database. 2655-2666 - Na Hyoun Kim, Namgyu Kim:

Effective Denoising Architecture for Handling Multiple Noises. 2667-2682 - S. Prabhakaran, R. Annie Uthra, J. Preetha Roselyn:

Deep Learning-Based Model for Defect Detection and Localization on Photovoltaic Panels. 2683-2700 - Ashit Kumar Dutta, T. Meyyappan, Basit Qureshi, Majed Alsanea

, Anas Waleed Abulfaraj, Manal Al Faraj, Abdul Rahaman Wahab Sait:
Optimal Deep Belief Network Enabled Cybersecurity Phishing Email Classification. 2701-2713 - Antonitta Eileen Pious, U. K. Sridevi:

A Novel Segment White Matter Hyperintensities Approach for Detecting Alzheimer. 2715-2726 - S. Gopikha, M. Balamurugan:

Regularised Layerwise Weight Norm Based Skin Lesion Features Extraction and Classification. 2727-2742 - Saleh Albahli, Ghulam Nabi Ahmad Hassan Yar

:
Efficient Grad-Cam-Based Model for COVID-19 Classification and Detection. 2743-2757 - R. Punithavathi

, A. Delphin Carolina Rani, K. R. Sughashini, Chinnarao Kurangi, M. Nirmala, Hasmath Farhana Thariq Ahmed, S. P. Balamurugan:
Computer Vision and Deep Learning-enabled Weed Detection Model for Precision Agriculture. 2759-2774 - S. Neelavathy Pari, K. Sudharson

:
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET. 2775-2789 - Navleen S. Rekhi

, Jagroop S. Sidhu, Amit Arora
:
Gamma Correction for Brightness Preservation in Natural Images. 2791-2807

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














