


default search action
Cluster Computing, Volume 22
Volume 22, Number Supplement 1, January 2019
- Natarajan Yuvaraj

, K. R. SriPreethaa:
Diabetes prediction in healthcare systems using machine learning algorithms on Hadoop cluster. 1-9 - M. Annalakshmi, S. Mohamed Mansoor Roomi, Sheik Naveedh A:

A hybrid technique for gender classification with SLBP and HOG features. 11-20 - D. Sathiya, B. Gomathy

:
Improved security and routing path learning in MANETs using Beer-Quiche game theoritical model in cloud computing. 21-31 - T. Kumaresan

, S. Saravanakumar, Balamurugan Rengeswaran
:
Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine. 33-46 - Suganya Ramamoorthy

, S. Rajaram
:
An efficient categorization of liver cirrhosis using convolution neural networks for health informatics. 47-56 - B. Santhosh Kumar

, S. Karthik, V. P. Arunachalam
:
Upkeeping secrecy in information extraction using 'k' division graph based postulates. 57-63 - S. Sathees Babu

, K. Balasubadra:
Revamping data access privacy preservation method against inside attacks in wireless sensor networks. 65-75 - R. Jayanthi, M. Lilly Florence

:
Software defect prediction techniques using metrics based on neural network classifier. 77-88 - M. Suganthi, V. Karunakaran:

Instance selection and feature extraction using cuttlefish optimization algorithm and principal component analysis using decision tree. 89-101 - S. Ilankumaran

, Deisy Chelliah
:
Multi-biometric authentication system using finger vein and iris in cloud computing. 103-117 - N. Rajesh, A. Arul Lawrence Selvakumar

:
Association rules and deep learning for cryptographic algorithm in privacy preserving data mining. 119-131 - C. Viji, N. Rajkumar

, S. Duraisamy:
Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithm. 133-143 - T. Tamilselvi

, G. Tholkappia Arasu
:
Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree construction. 145-155 - P. Supraja

, V. M. Gayathri, R. Pitchai:
Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networks. 157-163 - V. M. Gayathri

, R. Nedunchelian:
Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation. 165-176 - S. Anantha Padmanabhan, N. J. Krishna Kumar:

An effective pose invariant face recognition system with the aid of ABC optimized ANFIS. 177-187 - S. Chidambaram

, K. G. Srinivasagan:
Performance evaluation of support vector machine classification approaches in data mining. 189-196 - Renuka Devi Rajagopal, Saravanan Murugan

, Kottilingam Kottursamy
, V. Raju:
Cluster based effective prediction approach for improving the curable rate of lymphatic filariasis affected patients. 197-205 - Eswaran Saravana Kumar

, K. Vengatesan:
Trust based resource selection with optimization technique. 207-213 - J. Raja

, K. Gunasekaran, R. Pitchai:
Prognostic evaluation of multimodal biometric traits recognition based human face, finger print and iris images using ensembled SVM classifier. 215-228 - V. Priya

, K. Umamaheswari
:
Enhanced continuous and discrete multi objective particle swarm optimization for text summarization. 229-240 - K. Sasi Kala Rani

, S. N. Deepa
:
Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networks. 241-254 - T. R. Vedhavathy

, M. S. K. Manikandan:
Triple referee incentive mechanism for secure mobile adhoc networks. 255-264 - P. Bharathisindhu

, S. Selva Brunda:
An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network. 265-275 - K. N. Anjan Kumar, S. Chitra, T. Satish Kumar

:
Probabilistic classification techniques to perform geographical labeling of web objects. 277-285 - V. M. Arul Xavier

, S. Annadurai:
Chaotic social spider algorithm for load balance aware task scheduling in cloud computing. 287-297 - (Withdrawn) Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment. 299-310

- D. Muthusankar, B. Kalaavathi, P. Kaladevi

:
High performance feature selection algorithms using filter method for cloud-based recommendation system. 311-322 - Natesan Jayanthi

, K. R. Valluvan
:
Hybrid routing algorithm for improving path selection in sustainable network. 323-334 - K. Ilamathi, P. Rangarajan:

Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chip. 335-346 - R. Mohan Das, E. Chandira Sekaran:

A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motor. 347-360 - Y. Arockia Raj, P. Alli:

Turtle edge encoding and flood fill based image compression scheme. 361-377 - V. Ranganayaki, S. N. Deepa

:
Linear and non-linear proximal support vector machine classifiers for wind speed prediction. 379-390 - Xiaoping Jiang, Jing Sun, Hao Ding, Chenghua Li:

A silhouette based novel algorithm for object detection and tracking using information fusion of video frames. 391-398 - K. Kalai Arasan, P. Anandhakumar:

A new GLoSM embedded virtual machine model for big data services in cloud storage systems. 399-405 - Valliyammai Chinnaiah

, Bhuvaneswari Anbalagan
:
Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks. 407-422 - Rakesh Rajendran

, Sripathi Venkata Naga Santhosh Kumar
, Yogesh Palanichamy, Kannan Arputharaj
:
Detection of DoS attacks in cloud networks using intelligent rule based classification system. 423-434 - C. Mageshkumar, S. Karthik, V. P. Arunachalam

:
Hybrid metaheuristic algorithm for improving the efficiency of data clustering. 435-442 - Archana Nandibewoor

, Ravindra S. Hegadi
:
A novel SMLR-PSO model to estimate the chlorophyll content in the crops using hyperspectral satellite images. 443-450 - (Withdrawn) Information security model of block chain based on intrusion sensing in the IoT environment. 451-468

- R. Aruna, R. Subramanian, P. Sengottuvelan, J. Shanthini:

Optimized energy efficient route assigning method using related node discovery algorithm in MANET. 469-479 - Haibo Liang, Guoliang Li, Wenlong Liang:

Intelligent early warning model of early-stage overflow based on dynamic clustering. 481-492 - Ke Wang

, Huiqin Wang, Zhan Wang, Qinghua Gu, Ying Yin, Li Mao, Ying Lu:
Study of spectral reflectance reconstruction based on regularization matrix R method. 493-502 - Bei Li, Ying Sun, Gongfa Li, Jianyi Kong, Guozhang Jiang, Du Jiang, Bo Tao, Shuang Xu, Honghai Liu

:
Gesture recognition based on modified adaptive orthogonal matching pursuit algorithm. 503-512 - Yong Lu

, Na Sun:
An effective task scheduling algorithm based on dynamic energy management and efficient resource utilization in green cloud computing environment. 513-520 - Guiliang Zhou, Mengru Lv, Tianwen Bao, Lina Mao, Kai Huang:

Design of intelligent carpooling program based on big data analysis and multi-information perception. 521-532 - Pengbo Hu, Yue Ma, Huifeng Xue, Feng Zhang:

Application of low impact development technology in rainwater drainage system reconstruction project. 533-543 - Yun Jing, Yingke Liu, Mingkai Bi:

Quantum-inspired immune clonal algorithm for railway empty cars optimization based on revenue management and time efficiency. 545-554 - ChunYu Zhang, Lei Chen, Rui Bin Gou:

High-speed vision extraction based on the CamShift algorithm. 555-564 - Bin Zhao

, Chuangbai Xiao, Yu Zhang, Peng Zhai, Zhi Wang:
Assessment of recommendation trust for access control in open networks. 565-571 - Lingling Tian, Juncheng Jiang, L. Tian:

Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithm. 573-582 - Zhi Xiong

, Ting Guo, Zhongliang Xue, Weihong Cai, Lingru Cai, Nanfu Luo:
Online energy-efficient deployment based on equivalent continuous DFS for large-scale web cluster. 583-596 - (Withdrawn) Maximum data collection rate routing for data gather trees with data aggregation in rechargeable wireless sensor networks. 597-607

- Yegang Chen

, Hongxiang Wang:
Evolutionary energy balanced ant colony algorithm based on WSNs. 609-621 - Hao Bu, Rong Zhu, Shihong Chen, Xiaoqiong Tan:

Research on concurrency comparison modeling based on $$\uppi $$ π calculus in future computer technology. 623-634 - E. Thangaselvi, K. Meena alias Jeyanthi:

Implementation of flexible denim nickel copper rip stop textile antenna for medical application. 635-645 - (Withdrawn) Splicing image forgery identification based on artificial neural network approach and texture features. 647-660

- Sivakumar Venu

, A. M. J. Md. Zubair Rahman:
Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks. 661-671 - M. V. Ranjith Kumar

, N. Bhalaji
, Swathi Singh
:
An augmented approach for pseudo-free groups in smart cyber-physical system. 673-692 - Shengjun Xue, Yue Peng, Xiaolong Xu

, Jie Zhang, Chao Shen, Feng Ruan:
DSM: a dynamic scheduling method for concurrent workflows in cloud environment. 693-706 - Yajun Liu, Junying Zhang, Aimin Li

, Yuanyuan Zhang
, Yaoyao Li, Xiguo Yuan, Zhongzhen He, Zhaowen Liu, Shouheng Tuo:
Identification of PIWI-interacting RNA modules by weighted correlation network analysis. 707-717 - Zeyun Xiao, Bin Tian, Xiaochun Lu:

Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithm. 719-729 - Yanwei Xu:

Scalable top-k keyword search in relational databases. 731-747 - Jihui Liu, Zhijun He, Junhong Zhang:

The dynamic model of pulverized coal and waste plastic bonded together in flight combustion process. 749-757 - Yonghui Huang

, Zeling Mao, Zhiyu Zhang
, Xinhan Li, Lei Yan:
Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rock. 759-768 - Jin Zhang, Shulin Wang, Yijun Zhou:

Analysis on key dimension's measurement error in high speed computing. 769-779 - Huixian Duan, Yihong Wu, Lei Song, Jun Wang, Na Liu:

Fitting a cluster of line images under central catadioptric camera. 781-793 - Qiming Fu, Wen Hu, Quan Liu, Heng Luo, Lingyao Hu, Jianping Chen:

Residual Sarsa algorithm with function approximation. 795-807 - Ming Wei, Bo Sun, Rong Sun:

Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithm. 809-818 - Zheyuan Liu, Xiaoteng Zhang, Lei Song, Zhengyan Ding, Huixian Duan:

More efficient and effective tricks for deep action recognition. 819-826 - Boping Zhang

:
Distributed SVM face recognition based on Hadoop. 827-834 - (Withdrawn) Assembly sequence planning method based on particle swarm algorithm. 835-846

- Shengli Song

, Wen Huang, Yulong Sun:
Semantic query graph based SPARQL generation from natural language questions. 847-858 - Xiang Pan:

Layered constraint united scheduling model of multi-line lock. 859-870 - Jun Zhang, Yanxiang He, Fanfan Shen, Qing'an Li, Hai Tan:

Memory-aware TLP throttling and cache bypassing for GPUs. 871-883 - Haibo Liu

:
Resource recommendation via user tagging behavior analysis. 885-894 - Yong Zhang, Liyi Zhang, Jianfeng Han, Zhe Ban, Yi Yang:

A new DOA estimation algorithm based on compressed sensing. 895-903 - Zhuosheng Lin, Christophe Guyeux

, Simin Yu, Qianxue Wang, Shuting Cai:
On the use of chaotic iterations to design keyed hash function. 905-919 - Hyunjoo Kim, Jonghyun Kim, Youngsoo Kim

, Ikkyun Kim, Kuinam J. Kim, Hyuncheol Kim:
Improvement of malware detection and classification using API call sequence alignment and visualization. 921-929 - Nakhoon Baek

, Kuinam J. Kim:
Design and implementation of OpenGL SC 2.0 rendering pipeline. 931-936 - Kuinam J. Kim, Nakhoon Baek

:
Providing profiling information for OpenGL ES application programs. 937-941 - Nakhoon Baek

, Kuinam J. Kim:
Prototype implementation of the OpenGL ES 2.0 shading language offline compiler. 943-948 - Donghwoon Kwon, Hyunjoo Kim

, Jinoh Kim, Sang C. Suh, Ikkyun Kim, Kuinam J. Kim:
A survey of deep learning-based network anomaly detection. 949-961 - Miroslav Bures

, Tomás Cerný
, Karel Frajták, Bestoun S. Ahmed
:
Testing the consistency of business data objects using extended static testing of CRUD matrices. 963-976 - Dong Chun Lee

, Do Hyeon Lee:
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks. 977-988 - Yuji Tamura, Doan Truong Thi, Takahiro Chiba, Myungryun Yoo, Takanori Yokoyama

:
A real-time operating system supporting distributed shared memory for embedded control systems. 989-998 - Hyojin Park, Jinhong Yang, Hyuncheol Kim

, Jun Kyun Choi:
Customized video service system design and implementation: from taste to image-based consuming method. 999-1009 - Cong Viet-Ngu Huynh, Jun-Ho Huh

:
B+-tree construction on massive data with Hadoop. 1011-1021 - Tsung-Han Lee, Lin-Huang Chang

, Yan-Wei Liu, Jiun-Jian Liaw, Hung-Chi Chu:
Priority-based scheduling using best channel in 6TiSCH networks. 1023-1033 - Hye-Young Kim, Kuinam J. Kim:

Optimized state update for mobile games in cloud networks. 1035-1041 - Linh Van Ma, Jaehyung Park, Jiseung Nam, Jonghyun Jang, Jinsul Kim:

An efficient scheduling multimedia transcoding method for DASH streaming in cloud environment. 1043-1053 - Nguyen Tan Cam

, Van-Hau Pham, Tuan A. Nguyen
:
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique. 1055-1064 - Sanja Lazarova-Molnar

, Nader Mohamed:
Collaborative data analytics for smart buildings: opportunities and models. 1065-1077 - Ly Hoang Tuan, Nguyen Tan Cam, Van-Hau Pham:

Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis. 1079-1085 - Karnam Sreenu

, Sreelatha Malempati
:
W-Scheduler: whale optimization for task scheduling in cloud computing. 1087-1098 - Vijayakumar Polepally

, K. Shahu Chatrapati:
Dragonfly optimization and constraint measure-based load balancing in cloud computing. 1099-1111 - Ahamed Ali Samsu Aliar

, M. Ramakrishnan:
Secure provable data possession scheme with replication support in the cloud using Tweaks. 1113-1123 - (Withdrawn) Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system. 1125-1135

- S. Bhaskaran

, Santhi Balachandran
:
An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computing. 1137-1149 - Xiang Li

, Zhijian Wang:
A new recommendation algorithm combined with spectral clustering and transfer learning. 1151-1167 - Qiang Yu, Qi Liu:

Accurate detection of user interest data in cloud computing environment. 1169-1178 - (Withdrawn) A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing. 1179-1188

- (Withdrawn) Cluster and cloud computing framework for scientific metrology in flow control. 1189-1198

- (Withdrawn) Classification of sentence level sentiment analysis using cloud machine learning techniques. 1199-1209

- A. Kethsy Prabavathy, J. Devi Shree

:
Histogram difference with Fuzzy rule base modeling for gradual shot boundary detection in video cloud applications. 1211-1218 - (Withdrawn) A FCM cluster: cloud networking model for intelligent transportation in the city of Macau. 1219-1228

- Xindong Duan:

Research on abnormal data detection method of web browser in cloud computing environment. 1229-1238 - M. Madhankumar, C. Suresh Gnana Dhas:

Improved continuous query plan with cluster weighted dominant querying in synthetic datasets. 1239-1246 - Esther Daniel

, N. A. Vasanthi
:
LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. 1247-1258 - M. R. M. VeeraManickam, Mohanapriya M.

, Bishwajeet K. Pandey
, Sushma Akhade, S. A. Kale
, Reshma Patil, M. Vigneshwar:
Map-Reduce framework based cluster architecture for academic student's performance prediction using cumulative dragonfly based neural network. 1259-1275 - Ashok George, A. Sumathi:

Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud. 1277-1288 - Sagenela Vijaya Kumar

, C. Nagaraju
:
FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale images. 1289-1311 - Deepak C. Mehetre, SusaiMichael Emalda Roslin, Sanjeev J. Wagh

:
Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. 1313-1328 - Lakshmanan Ramanathan

, G. Parthasarathy
, K. Vijayakumar, L. Lakshmanan, S. Ramani:
Cluster-based distributed architecture for prediction of student's performance in higher education. 1329-1344 - Poonam Yadav:

Cluster based-image descriptors and fractional hybrid optimization for medical image retrieval. 1345-1359 - Praveen Kumar Reddy Maddikunta

, Madda Rajasekhara Babu:
Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things. 1361-1372 - Arvind Madhukar Jagtap, N. Gomathi:

Minimizing movement for network connectivity in mobile sensor networks: an adaptive approach. 1373-1383 - J. Devagnanam, N. M. Elango:

Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud. 1385-1400 - C. Ashok Kumar

, R. Vimala
, K. R. Aravind Britto
, S. Sathya Devi:
FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud model. 1401-1414 - Venkatesh Munagala

, K. Satya Prasad:
Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systems. 1429-1441 - Dingyou Lei, Peng Zhang, Yinggui Zhang, Yangkun Xia, Shuo Zhao:

Research on coordinated scheduling of multiple systems and single jobs based on improved particle swarm optimization. 1443-1458 - Yongjun Liu

, Yangjie Wei, Wang Yi:
Depth from defocus (DFD) based on VFISTA optimization algorithm in micro/nanometer vision. 1459-1467 - Xiaofei Li

, Di He, Jun-Yi Li:
Parallel image search application based on online hashing hierarchical ranking. 1469-1478 - Sheng Liu, Dongye Sun, Ensi Wu, Datong Qin:

Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmission. 1479-1493 - Yao yu-feng:

Semantic feature hierarchical clustering algorithm based on improved regional merging strategy. 1495-1503 - Yong-qiang Yang:

Research on the single image super-resolution method based on sparse Bayesian estimation. 1505-1513 - Kai-Jian Xia

, Hong-Sheng Yin, Jiangqiang Wang:
A novel improved deep convolutional neural network model for medical image fusion. 1515-1527 - Yan Zhou, Yu Wang, Xu-hui Wang:

Face recognition algorithm based on wavelet transform and local linear embedding. 1529-1540 - Xiang-dong Yin:

Dynamic data driven big data cooperative control scheme with virtual visualization for mobile multimedia communication. 1541-1548 - Xiangong Li, Xufeng Wang, Yu Fang:

Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network model. 1549-1557 - Liu Liu, Jin Xu, Zheng Liu:

Automatic segmentation of coronary lumen based on minimum path and image fusion from cardiac computed tomography images. 1559-1568 - Sheng Liu, Dongye Sun, Ensi Wu, Yong Luo, Datong Qin:

Application of computerized numerical modeling in multi-state wet wheel hub heat simulations. 1569-1580 - Ye Li, Zoe Lin Jiang, Lin Yao, Xuan Wang, Siu-Ming Yiu, Zhengan Huang:

Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties. 1581-1593 - Shehzad Ashraf Chaudhry

, I Luk Kim, Seungmin Rho, Mohammad Sabzinejad Farash
, Taeshik Shon:
An improved anonymous authentication scheme for distributed mobile cloud computing services. 1595-1609 - Ahmed M. Elmisery

, Seungmin Rho, Mohamed Aborizka:
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services. 1611-1638 - Ahmad M. Manasrah

, Ala'a Aldomi, Brij B. Gupta
:
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment. 1639-1653 - Chong-zhi Gao, Qiong Cheng, Xuan Li, Shi-bing Xia:

Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. 1655-1663 - Mahendra Kumar Murmu, Awadhesh Kumar Singh:

A bio-inspired leader election protocol for cognitive radio networks. 1665-1678 - Fan Zhao, Wenqi Shi, Yong Gan, Ziru Peng, Xiangyang Luo:

A localization and tracking scheme for target gangs based on big data of Wi-Fi locations. 1679-1690 - Li Yang, Xiaoyan Jin, Qi Jiang

:
Online handwritten signature verification based on the most stable feature and partition. 1691-1701 - Malik Najmus Saqib

, Junaid Kiani, Basit Shahzad, Adeel Anjum
, Saif Ur Rehman Malik
, Naveed Ahmad, Atta ur Rehman Khan
:
Anonymous and formally verified dual signature based online e-voting protocol. 1703-1716 - Zhengjun Jing

, Chunsheng Gu, Zhimin Yu, Peizhong Shi, Chongzhi Gao:
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. 1717-1727 - Chunyong Yin, Sun Zhang

, Zhichao Yin, Jin Wang
:
Anomaly detection model based on data stream clustering. 1729-1738 - Mariusz Gajewski

, Jordi Mongay Batalla
, George Mastorakis, Constandinos X. Mavromoustakis:
A distributed IDS architecture model for Smart Home systems. 1739-1749 - Fadi Al-Turjman:

A rational data delivery framework for disaster-inspired internet of nano-things (IoNT) in practice. 1751-1763 - Minsu Chae, HwaMin Lee

, Kiyeol Lee:
A performance comparison of linux containers and virtual machines using Docker and KVM. 1765-1775 - Daeyong Jung, Heeseok Jeong, Jaesung Kim, DaeWon Lee, Myungil Kim

:
The resource running time manager for integrated environment. 1777-1786 - Jin Wang

, Chunwei Ju, Hye-Jin Kim, R. Simon Sherratt, Sungyoung Lee:
A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs. 1787-1795 - Yan Li, Gangman Yi, Byeong-Seok Shin

:
Spatial task management method for location privacy aware crowdsourcing. 1797-1803 - Yongjun Ren

, Jin Wang
, Xiujuan Feng, Geumran Youn, Jeong-Uk Kim:
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment. 1805-1814 - Cheol Shim, Kwangho Cha

, Min Choi:
Design and implementation of initial OpenSHMEM on PCIe NTB based cloud computing. 1815-1826 - Duhoe Kim, Yong-Hyun Kim, Dongil Shin, Dongkyoo Shin:

Fast attack detection system using log analysis and attack tree generation. 1827-1835 - Hanjo Jeong, Byeonghwa Park, Minwoo Park, Ki-Bong Kim, Kiseok Choi:

Big data and rule-based recommendation system in Internet of Things. 1837-1846 - (Withdrawn) Development of healthcare service model using physical information data based on cluster sensing technology. 1847-1859

- Boyeon Song

, Jangwon Choi, Sang-Soo Choi, Jungsuk Song:
Visualization of security event logs across multiple networks and its application to a CSOC. 1861-1872 - Seong-Taek Park, Myeong-Ryoon Oh

:
An empirical study on the influential factors affecting continuous usage of mobile cloud service. 1873-1887 - Seungdo Jeong, Jungwon Cho

:
The supporting system for disabled person with the artificial hand controlled by muscle sensor. 1889-1898 - Seok-Woo Jang

, Myunghee Jung
:
Exposed body component-based harmful image detection in ubiquitous sensor data. 1899-1910 - Keon-Myung Lee

, Chan Sik Han, Kwang-Il Kim, Sang Ho Lee:
Word recommendation for English composition using big corpus data processing. 1911-1924 - Kyungyong Chung, Roy C. Park:

Chatbot-based heathcare service with a knowledge base for cloud computing. 1925-1937 - Suhyeon Yoo, O Young Kwon, Dae-hyun Jeong:

Research trend analysis on convergence and joint research of Korea using scientific papers. 1939-1948 - (Withdrawn) Development of a medical big-data mining process using topic modeling. 1949-1958

- Kyung Mi Lee, Yoon-Su Jeong, Sang Ho Lee, Keon-Myung Lee

:
Bucket-size balancing locality sensitive hashing using the map reduce paradigm. 1959-1971 - Gang Hee Jung, Yoon Young Park, Se Yeob Kim, Young Wook Cho:

The study on how to remove the shadow area for WSN based indoor disaster monitoring system. 1973-1984 - Woo-Sik Bae:

Verifying a secure authentication protocol for IoT medical devices. 1985-1990 - Cheol-Joo Chae, Ki-Bong Kim, Han-Jin Cho:

A study on secure user authentication and authorization in OAuth protocol. 1991-1999 - (Withdrawn) Cloud based u-healthcare network with QoS guarantee for mobile health service. 2001-2015

- Hyeok Kang, Keun-Ho Lee, Gui-Jung Kim

:
Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication. 2017-2026 - T. Prasanth

, M. Gunasekaran:
A mutual refinement technique for big data retrieval using hash tag graph. 2027-2037 - Suyi Kim

, So-Yeun Kim
, Kyungmee Choi
:
Modeling and analysis for stock return movements along with exchange rates and interest rates in Markov regime-switching models. 2039-2048 - Hyun-Kyo Oh, Jin-Woo Kim, Sang-Wook Kim, Kichun Lee:

A unified framework of trust prediction based on message passing. 2049-2061 - Suan Lee

, Seok Kang, Jinho Kim, Eun Jung Yu:
Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark cluster. 2063-2087 - Gaoyang Guo, Chaokun Wang, Jun Chen, Pengcheng Ge, Weijun Chen:

Who is answering whom? Finding "Reply-To" relations in group chats with deep bidirectional LSTM networks. 2089-2100 - Seung-Hee Kim

, Woo-Je Kim
:
Evaluation of software quality-in-use attributes based on analysis network process. 2101-2114 - Jooyoung Kim, Dongsoo Kim

:
Analyzing and visualizing comprehensive and personalized online product reviews. 2115-2128 - Xiong Wei, Ming Hu, Tao Peng, Minghua Jiang, Zhiying Wang, Xiao Qin

:
PRODA: improving parallel programs on GPUs through dependency analysis. 2129-2144 - Awais Mahmood

, Ghulam Muhammad
, Mansour Alsulaiman, Habib Dhahri, Esam Othman
, Mohammed Faisal
:
Moving average multi directional local features for speaker recognition. 2145-2157 - Wei She, Dingfang Li, Yongbo Xia, Shasha Tian:

Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanism. 2159-2167 - P. Kuppusamy

, R. Kalpana, P. V. Venkateswara Rao:
Optimized traffic control and data processing using IoT. 2169-2178 - A. M. Senthil Kumar, M. Venkatesan:

Task scheduling in a cloud computing environment using HGPSO algorithm. 2179-2185 - Shigeru Imai, Sida Chen, Wennan Zhu, Carlos A. Varela:

Dynamic data-driven learning for self-healing avionics. 2187-2210 - Elias David Niño Ruiz

, Adrian Sandu:
Efficient parallel implementation of DDDAS inference using an ensemble Kalman filter with shrinkage covariance matrix estimation. 2211-2221 - Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen, Swapna S. Gokhale:

Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform. 2223-2237 - Fangzhou Sun

, Abhishek Dubey
, Jules White, Aniruddha Gokhale
:
Transit-hub: a smart public transportation decision support system with multi-timescale analytical services. 2239-2254 - Xi Fei, Sun Youfu, Ruan Xuejun:

A simulation analysis method based on PSO-RBF model and its application. 2255-2261 - Lu Xin:

Apriori semantic processing orienting at the business English parallel corpus characteristics in business contract. 2263-2271 - Haoliang Lv, Xiaojun Zhou:

Anti load disturbance method for AC servo motor power system. 2273-2283 - Wang Min, Cheng Wen, Ren Jie-Hui, Meng Ting, Wan Tian:

Intelligent distribution characteristic analysis of heavy metals in reservoir sediments. 2285-2292 - Li Li, M. Shamim Hossain, Ahmed A. Abd El-Latif

, Mohammed F. Alhamid:
Distortion less secret image sharing scheme for Internet of Things system. 2293-2307 - (Withdrawn) An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology. 2309-2316

- Md. Abdur Rahman

, M. Shamim Hossain:
A cloud-based virtual caregiver for elderly people in a cyber physical IoT system. 2317-2330 - Hyuncheol Kim

:
Performance evaluation of revised virtual resources allocation scheme in network function virtualization (NFV) networks. 2331-2339 - Hyunjoo Kim

, Jonghyun Kim, Youngsoo Kim
, Ikkyun Kim, Kuinam J. Kim:
Design of network threat detection and classification based on machine learning on cloud computing. 2341-2350 - Sunyoung Kang, Seungae Kang:

The study on the application of virtual reality in adapted physical education. 2351-2355 - Tao Yu, Le Li, Lajiao Chen, Weijing Song:

Low-quality multivariate spatio-temporal serial data preprocessing. 2357-2370 - Yuzhu Wang

, Huiqun Hao
, Junqiang Zhang
, Jinrong Jiang, Juanxiong He, Yan Ma:
Performance optimization and evaluation for parallel processing of big data in earth system models. 2371-2381 - Shengtao Sun

, Jibing Gong, Albert Y. Zomaya
, Aizhi Wu:
A distributed incremental information acquisition model for large-scale text data. 2383-2394 - Dingding Li, Mianxiong Dong

, Yong Tang, Kaoru Ota
:
A novel disk I/O scheduling framework of virtualized storage system. 2395-2405 - Zhuowei Wang, Naixue Xiong, Hao Wang

, Lianglun Cheng, Wuqing Zhao:
Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-level. 2407-2423 - Ahmed A. Abd El-Latif

, M. Shamim Hossain, Ning Wang:
Score level multibiometrics fusion approach for healthcare. 2425-2436 - Samir Elmougy

, M. Shamim Hossain, Ahmed S. Tolba, Mohammed F. Alhamid, Ghulam Muhammad
:
A parameter based growing ensemble of self-organizing maps for outlier detection in healthcare. 2437-2460 - Hyun Seung Son, Young B. Park, Robert Young Chul Kim:

MCCFG: an MOF-based multiple condition control flow graph for automatic test case generation. 2461-2470 - Zhiqiang Zhang

, Jianghua Hu, Xiaoqin Xie, Haiwei Pan, Xiaoning Feng:
An iterative sampling method for online aggregation. 2471-2484 - Alexander Thomasian

:
Mirrored and hybrid disk arrays and their reliability. 2485-2494 - M. Vardhana

, Arunkumar N.
, Enas W. Abdulhay, P. V. Vishnuprasad:
Iot based real time trafic control using cloud computing. 2495-2504 - Chundong Wang

, Honglei Yao
, Zheli Liu:
An efficient DDoS detection based on SU-Genetic feature selection. 2505-2515 - I. Chandra, N. Sivakumar, Gokulnath Chandra Babu

, Parthasarathy Panchatcharam
:
IoT based fall detection and ambient assisted system for the elderly. 2517-2525 - Cao Ngoc Nguyen, Jaehwan Lee, Soonwook Hwang, Jik-Soo Kim

:
On the role of message broker middleware for many-task computing on a big-data platform. 2527-2540 - Ahmed Barnawi, Ahmed Awad, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise

, Sherif Sakr:
Correction to: Runtime self-monitoring approach of business process compliance in cloud environments. 2541
Volume 22, Number 1, March 2019
- Sheng-Yao Su, Wenbin Yao, Xiaoyong Li

:
SORD: a new strategy of online replica deduplication in Cloud-P2P. 1-23 - Ronnie Mativenga

, Joon-Young Paik, Youngjae Kim, Junghee Lee
, Tae-Sun Chung:
RFTL: improving performance of selective caching-based page-level FTL through replication. 25-41 - Sanket Desai

, Rabei Alhadad
, Naveen K. Chilamkurti
, Abdun Naser Mahmood:
A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure. 43-69 - Sugam Sharma, Victor Chang

, U. Sunday Tim, Johnny Wong, Shashi K. Gadia:
Cloud and IoT-based emerging services systems. 71-91 - S Sivaprakash

, M. Venkatesan:
A design and development of an intelligent jammer and jamming detection methodologies using machine learning approach. 93-101 - Natalia G. Miloslavskaya

, Alexander I. Tolstoy:
Internet of Things: information security challenges and solutions. 103-119 - Geunchul Park, Seungwoo Rho, Jik-Soo Kim, Dukyun Nam

:
Towards optimal scheduling policy for heterogeneous memory architecture in many-core system. 121-133 - Woong Sul

, Heon Y. Yeom, Hyungsoo Jung:
Towards Sustainable High-Performance Transaction Processing in Cloud-based DBMS - Design considerations and optimization for transaction processing performance in service-oriented DBMS organization. 135-145 - Jin Ma, Sik Lee, Kumwon Cho, Young-Kyoon Suh:

A simulation provenance data management system for efficient job execution on an online computational science engineering platform. 147-159 - Hanul Sung, Jeesoo Min, Sujin Ha, Hyeonsang Eom:

OMBM: optimized memory bandwidth management for ensuring QoS and high server utilization. 161-174 - Yoori Oh, Yoonhee Kim

:
A resource recommendation method based on dynamic cluster analysis of application characteristics. 175-184 - Javier Prades

, Carlos Reaño
, Federico Silla
:
On the effect of using rCUDA to provide CUDA acceleration to Xen virtual machines. 185-204 - André Felipe Monteiro, Orlando Loques:

Quantum virtual machine: power and performance management in virtualized web servers clusters. 205-221 - P. Muthi Reddy

, Ansaf Ahmed, S. H. Manjula, K. R. Venugopal:
Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers. 223-239 - Asmaa H. Rabie, Shereen H. Ali

, Hesham A. Ali, Ahmed I. Saleh:
A fog based load forecasting strategy for smart grids using big electrical data. 241-270 - Shunfu Jin

, Haixing Wu, Wuyi Yue:
Pricing policy for a cloud registration service with a novel cloud architecture. 271-283 - Yang Lu

, Jiguo Li:
Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. 285-299 - Syed Hamid Hussain Madni

, Muhammad Shafie Abdul Latif, Shafii Muhammad Abdulhamid
, Javed Ali
:
Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment. 301-334
Volume 22, Number 2, June 2019
- Uiseok Song, Bodon Jeong, Sungyong Park

, Kwongyong Lee:
Optimizing communication performance in scale-out storage system. 335-346 - Jangwoong Kim, Youngjae Kim, Awais Khan

, Sungyong Park
:
Understanding the performance of storage class memory file systems in the NUMA architecture. 347-360 - Qichen Chen, Hyojeong Lee, Yoonhee Kim

, Heon Young Yeom, Yongseok Son
:
Design and implementation of skiplist-based key-value store on non-volatile memory. 361-371 - Bodon Jeong, Awais Khan

, Sungyong Park
:
Async-LCAM: a lock contention aware messenger for Ceph distributed storage system. 373-384 - Sangkeun Lee, Hyogi Sim

, Youngjae Kim, Sudharshan S. Vazhkudai:
A programmable shared-memory system for an array of processing-in-memory devices. 385-398 - Ruxia Sun, Sun Zhang

, Chunyong Yin, Jin Wang
, Seungwook Min:
Strategies for data stream mining method applied in anomaly detection. 399-408 - Jianping Zhang, Hong Zhou

, Huimin Gao:
Approximation guarantees of evolutionary optimization on the minimum crossing spanning tree problem. 409-417 - Ammar Almomani

, Mohammad Alauthman
, Mohammed Alweshah
, Osama M. Dorgham
, Firas AlBalas
:
A comparative study on spiking neural network encoding schema: implemented with cloud computing. 419-433 - Xiang Zou, Jinghua Cao, Wei Sun, Quan Guo, Tao Wen:

Flow data processing paradigm and its application in smart city using a cluster analysis approach. 435-444 - Mehdi Pirahandeh

, Deok-Hwan Kim:
Energy-aware RAID scheduling methods in distributed storage applications. 445-454 - Mahmood Hosseini, Constantinos Marios Angelopoulos

, Wei Koong Chai, Stéphane Kuendig
:
Crowdcloud: a crowdsourced system for cloud infrastructure. 455-470 - Bashir Mohammed

, Irfan Awan, Hassan Ugail, Muhammad Younas:
Failure prediction using machine learning in a virtualised HPC system and application. 471-485 - Bozena Malysiak-Mrozek, Tomasz Baron, Dariusz Mrozek

:
Spark-IDPP: high-throughput and scalable prediction of intrinsically disordered protein regions with Spark clusters on the Cloud. 487-508 - Sanjaya K. Panda

, Prasanta K. Jana:
An energy-efficient task scheduling algorithm for heterogeneous cloud computing systems. 509-527 - Rajat Saxena

, Somnath Dey:
A generic approach for integrity verification of big data. 529-540 - Wei Luo

, Wenping Ma:
Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing. 541-551 - Divya Pandove

, Shivani Goel, Rinkle Rani:
General correlation coefficient based agglomerative clustering. 553-583 - Yuling Fang, Qingkui Chen:

A real-time and reliable dynamic migration model for concurrent taskflow in a GPU cluster. 585-599 - Aida A. Nasr

, Anthony T. Chronopoulos
, Nirmeen A. El-Bahnasawy, Gamal Attiya
, Ayman El-Sayed
:
A novel water pressure change optimization technique for solving scheduling problem in cloud computing. 601-617 - Parminder Singh

, Pooja Gupta
, Kiran Jyoti
:
TASM: technocrat ARIMA and SVR model for workload prediction of web applications in cloud. 619-633 - Motassem Al-Tarazi

, J. Morris Chang:
Network-aware energy saving multi-objective optimization in virtualized data centers. 635-647 - Je Sen Teh

, Kaijun Tan, Moatsum Alawida:
A chaos-based keyed hash function based on fixed point representation. 649-660
Volume 22, Number Supplement 2, March 2019
- Haibin Cai, Hao Wu:

An improved formalization analysis approach to determine schedulability of global multiprocessor scheduling based on symbolic safety analysis and statistical model checking in smartphone systems. 2543-2554 - Fang-Ju Ai

:
Research on a large-scale community detection algorithm based on non-weighted graph. 2555-2562 - Ya Gao

, Ying Xiao:
Frame based multicast scheduling for buffered Clos-network switches. 2563-2570 - Hejun Zhu, Liehuang Zhu:

Encrypted network behaviors identification based on dynamic time warping and k-nearest neighbor. 2571-2580 - Xiuqin Pan

, Yong Lu, Na Sun, Sumin Li:
A hybrid artificial bee colony algorithm with modified search model for numerical optimization. 2581-2588 - Weifeng Pan

, Chunlai Chai:
Measuring software stability based on complex networks in software. 2589-2598 - Guangzhi Zhang

, Shaobin Cai:
Universal secure error-correcting (SEC) schemes for network coding via McEliece cryptosystem based on QC-LDPC codes. 2599-2610 - Li Cheng, Gongping Wu:

Obstacles detection and depth estimation from monocular vision for inspection robot of high voltage transmission line. 2611-2627 - Shuang Fu

, Guoyin Zhang, Tingyi Shang:
Cross-layer parallel cooperative spectrum sensing for heterogeneous channels based on iterative KM algorithm. 2629-2637 - Ting You

, Yueli Hu:
Design of the linear controller of a class of time-delay chaos. 2639-2644 - Denghui Zhang

, Yiqi Zhou, Yang Guo:
A modeling and optimization method for heterogeneous objects based on complex networks theory. 2645-2654 - Xiaofei Li

, Di He:
HSBCS framework based performance detection for DS-UWB Systems. 2655-2665 - Shuang Fu

, Guoyin Zhang, Li Yang:
Spectrum sensing defending against PUE attack based on fractal dimension. 2667-2675 - Lei Wang, Xuhui Xia, Jianhua Cao, Xiang Liu:

Modeling and predicting remanufacturing time of equipment using deep belief networks. 2677-2688 - Liu Ang, Fu Shan-na, Zhen-Hong Xiao:

Study on risk assessment of overseas merger and acquisition knowledge integration based on character-weighted set pair. 2689-2700 - Na Zhao

, Yong Yu, Jian Wang, Zhongwen Xie, Zhendi Yang, Lei Cheng:
An extended object-oriented petri net supporting the description and evolution of components: EOOPN. 2701-2708 - Guanchun Li

, Xin Wang, Peng Cui, Jie Li:
Analysis of superconducting linear synchronous motor for electromagnetic propulsion. 2709-2717 - Gongfa Li, Heng Tang, Ying Sun, Jianyi Kong, Guozhang Jiang, Du Jiang, Bo Tao, Shuang Xu, Honghai Liu

:
Hand gesture recognition based on convolution neural network. 2719-2729 - Qingzhen Xu, Miao Li:

A new cluster computing technique for social media data analysis. 2731-2738 - Tao Wang, Zhengquan Xu, Dong Wang, Hao Wang:

Influence of data errors on differential privacy. 2739-2746 - Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang:

A competitive model of popularity prediction using correlation matrix. 2747-2759 - Xuan Chen

, Dan Long:
Task scheduling of cloud computing using integrated particle swarm algorithm and ant colony algorithm. 2761-2769 - Hui Du, Dacheng Liu:

Research and implementation of management information system for Engineering Training Center in university. 2771-2779 - Yanlan Mei, Kefan Xie:

An improved TOPSIS method for metro station evacuation strategy selection in interval type-2 fuzzy environment. 2781-2792 - Lihui Sun

:
A new method for sensorless control of brushless DC motor. 2793-2800 - Zhibo Guo, Kejun Lin

, Jian Huang, Ying Zhang
, Zhengda Cui:
Online object tracking by sparse and structural model. 2801-2808 - Wei Cui

, Ke Wang, Qiang Zhang
, KaiYu Wang:
Simulation on the weld crack growth in the surface of oil/gas pipes by using a magnetic-structural coupling algorithm. 2809-2822 - Xiuju Liu:

A collaborative filtering recommendation algorithm based on the influence sets of e-learning group's behavior. 2823-2833 - Qi Na, Jianyu Zhao, Yonghong Ma:

The optimization and simulation analysis of the enterprise's decision making system with the interference of the consumption strategy. 2835-2850 - Chun-Hong Huang, Yungho Leu

:
Multi-level dataset decomposition for parallel frequent itemset mining on a cluster of personal computers. 2851-2863 - Li Ni

, Manman Peng, Wenjun Jiang, Kenli Li:
A community detection algorithm based on multi-similarity method. 2865-2874 - Lu Liu, Yanqing Guo

, Yongling Fu, Chuangchuang Li
, Liang Guo:
A segmentation scheme with SVR-based prediction in stroke-sensing cylinder. 2875-2887 - S. Hameed Ibrahim

, S. Duraisamy, U. K. Sridevi
:
Flexible and reliable ERP project customization framework to improve user satisfaction level. 2889-2895 - Yunfei Zhou, Xiaocui Hui:

Fault diagnosis method of large-scale complex electromechanical system based on extension neural network. 2897-2906 - Xiang Wu

, Yuyang Wei, Yaqing Mao, Liang Wang
:
A differential privacy DNA motif finding method based on closed frequent patterns. 2907-2919 - Shiyuan Zhou, Yinglin Wang

:
Service ranking in service networks using parameters in complex networks: a comparative study. 2921-2930 - Tao Wang, Minghui Wang:

Distributed collaborative filtering recommendation algorithm based on DHT. 2931-2941 - (Withdrawn) Research on the selection model of technology-based intellectual property evaluation method based on analytic hierarchy process. 2943-2953

- Y. Song:

Load-deflection model for T-section rail press straightening process under lateral loads. 2955-2961 - Xuanqi Ou, Tingjie Lv, Xia Chen:

Research on telecom service providers' network charge strategy based on two-sided market theory. 2963-2969 - Kai Wang, Zhichun Gan, Jingzhi Liu, Wei He, Shun Xu:

Deterministic compressed sensing based channel estimation for MIMO OFDM systems. 2971-2980 - Wenjuan Wang, Yuwang Yang:

Sensor network based radiation detection for emergency system. 2981-2992 - (Withdrawn) An effiecient human tracking system using Haar-like and hog feature extraction. 2993-3000

- Cuifen Zhang

, Lina Hao, Li Fan:
Optimization and improvement of data mining algorithm based on efficient incremental kernel fuzzy clustering for large data. 3001-3010 - Yongcun Cao, Yong Lu, Xiuqin Pan, Na Sun:

An improved global best guided artificial bee colony algorithm for continuous optimization problems. 3011-3019 - Gelan Yang, Wei Tan

, Huixia Jin, Tuo Zhao, Li Tu:
Review wearable sensing system for gait recognition. 3021-3029 - Yong Wang, Changzhao Liu, Yinghua Liao:

Electromechanical dynamic simulation and experiment for multi-stage gear transmission system with planetary gears. 3031-3041 - Jiafeng Huang, Yun Xue, Xiaohui Hu, Huixia Jin, Xin Lu, Zhihuang Liu:

Sentiment analysis of Chinese online reviews using ensemble learning framework. 3043-3058 - Haijun Chen, Guanzheng Tan:

Adaptive iteration localization algorithm based on RSSI in wireless sensor networks. 3059-3067 - Ting Gao, Lina Hu, Zhizhen Jia, Tianna Xia, Chao Fang, Hongzhi Li, Li Hong Hu

, Yinghua Lu, Hui Li:
SPXYE: an improved method for partitioning training and validation sets. 3069-3078 - Xiaokan Wang

, Hairong Dong
, Qiong Wang:
Research of manipulator trajectory tracking based on adaptive robust iterative learning control. 3079-3086 - S. Bhama, G. R. Karpagam:

Application of multivariate Gaussian model for discovery of healthcare services in cloud. 3087-3094 - K. Kumaresan, P. Ganeshkumar:

Software reliability modeling using increased failure interval with ANN. 3095-3102 - Qiangliang Guo

, Jin Xiao
, Xiaoguang Hu, Baochang Zhang:
Local convolutional features and metric learning for SAR image registration. 3103-3114 - T. Rajendran

, T. Gnanasekaran
:
Multi level object relational similarity based image mining for improved image search using semantic ontology. 3115-3122 - Jinsheng Xing, Jianguo Ju

:
On the sub-low contact velocity control of rendezvous docking for smart world. 3123-3130 - R. Thanuja

, A. Umamakeswari
:
Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. 3131-3143 - P. J. A. Alphonse, Venkatramana Reddy Y

:
A method for obtaining authenticated scalable and efficient group key agreement for wireless ad-hoc networks. 3145-3151 - A. Amali Angel Punitha, G. Indumathi:

Centralized cloud information accountability with bat key generation algorithm (CCIA-BKGA) framework in cloud computing environment. 3153-3164 - S. Kayalvili

, M. Selvam:
Hybrid SFLA-GA algorithm for an optimal resource allocation in cloud. 3165-3173 - (Withdrawn) A novel approach for ranking customer reviews using a modified PSO-based aspect ranking algorithm. 3175-3181

- Amr Tolba

, Elsayed Elashkar
:
Soft computing approaches based bookmark selection and clustering techniques for social tagging systems. 3183-3189 - R. Sheeba

, G. Jiji
, T. Ajith Bosco Raj:
WFCM based big sensor data error detection and correction in wireless sensor network. 3191-3200 - (Withdrawn) Hybrid aggregated signcryption scheme using multi-constraints differential evolution algorithm for security. 3201-3211

- R. Sandhiya

, M. Sundarambal:
Clustering of biomedical documents using ontology-based TF-IGM enriched semantic smoothing model for telemedicine applications. 3213-3230 - T. J. Nikose, Ranjan S. Sonparote:

Dynamic along wind response of tall buildings using Artificial Neural Network. 3231-3246 - Mohammed Amoon

, Tarek E. El. Tobely:
A Green energy-efficient scheduler for cloud data centers. 3247-3259 - S. Savitha, P. Thangam

, L. Latha:
An enhancement to SePeCloud with improved security and efficient data management. 3261-3269 - Ke Huang, Hao Lan Zhang

, Gelan Yang:
An optimized IS-APCPSO algorithm for large scale complex traffic network. 3271-3284 - T. Yuvaraja

, R. S. Sabeenian
:
Performance analysis of medical image security using steganography based on fuzzy logic. 3285-3291 - Jingxian Yang:

A novel short-term multi-input-multi-output prediction model of wind speed and wind power with LSSVM based on improved ant colony algorithm optimization. 3293-3300 - A. Saravanaselvan, B. Paramasivan:

Design and implementation of an efficient attack resilient computation algorithm in WSN nodes. 3301-3311 - S. Madhurikkha, R. Sabitha:

A smart power saving protocol for IoT with wireless energy harvesting technique. 3313-3324 - K. Kannan, M. Devaraju:

QoS supported adaptive and multichannel MAC protocol in vehicular ad-hoc network. 3325-3337 - R. Yuvaraj, A. Chandrasekar, S. Jothi

:
Time orient LEAD based polling point selection algorithm for efficient data aggregation in wireless sensor networks. 3339-3346 - R. Kumuthaveni

, E. Chandra:
Iterative Conditional Entropy Kalman filter (ICEKF) for noise reduction and Neuro Optimized Emotional Classifier (NOEC). 3347-3363 - (Withdrawn) The relationship analysis between online reviews and online shopping based on B2C platform technology. 3365-3373

- (Withdrawn) Research on innovation path of school ideological and political work based on large data. 3375-3383

- Xuhua Yuan:

Image multi-target detection and segmentation algorithm based on regional proposed fast intelligent network. 3385-3393 - (Withdrawn) Discussion on new media communication strategy of sports events based on large data technology. 3395-3403

- Pingming Huang, Feng Hu, Fenghui Dong:

Parameter estimation of Gumbel distribution and its application to pitting corrosion depth of concrete girder bridges. 3405-3411 - (Withdrawn) Fuzzy neural network model construction based on shortest path parallel algorithm. 3413-3418

- Gaoxiang Lou, Zongyan Cai

:
Improved hybrid immune clonal selection genetic algorithm and its application in hybrid shop scheduling. 3419-3429 - Yanyu Chen

, Huaqi Chai, Yimiao Huang:
Research on risk assessment in the early development of state-level new areas based on the improved fuzzy comprehensive evaluation model. 3431-3444 - Jun Li Cao:

Algorithm research based on multi period fuzzy portfolio optimization model. 3445-3452 - Jing Gao, Jia-jia Zhang, Xu-liang Guang:

An improved routing algorithm for advanced metering infrastructure in smart grid. 3453-3462 - Yao Ying:

Research on college students' information literacy based on big data. 3463-3470 - (Withdrawn) Urban public art and interaction design strategy based on digital technology. 3471-3478

- Chunjiang Liu:

Optimal design of high-rise building wiring based on ant colony optimization. 3479-3486 - Xiumei Zhang, Chi Ma, Xinmiao Yu:

A neural network model for financial trend predicting. 3487-3494 - Wenjun Xiong, Qi Erna:

Research on brand crisis identify index model based on cluster analysis. 3495-3504 - (Withdrawn) Analysis of image processing algorithm based on bionic intelligent optimization. 3505-3512

- (Withdrawn) Research on semi supervised K-means clustering algorithm in data mining. 3513-3520

- S. Thanga Revathi, N. Ramaraj, Chithra Selvaraj

:
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing. 3521-3530 - (Withdrawn) Research on religious management based on big data. 3531-3542

- (Withdrawn) Researches on hybrid algorithm for moving target detection and tracking in sports video. 3543-3552

- Yun He, Quancheng Zhang:

Automatic generation algorithm analysis of dance movements based on music-action association. 3553-3561 - (Withdrawn) The big data impact and application study on the like ecosystem construction of open internet of things. 3563-3572

- (Withdrawn) Big data analysis and research on consumption demand of sports fitness leisure activities. 3573-3582

- Jie Xu, Yang Liu:

CET-4 score analysis based on data mining technology. 3583-3593 - Li Zhu, Heng Li, Yuxuan Feng:

Research on big data mining based on improved parallel collaborative filtering algorithm. 3595-3604 - (Withdrawn) Research on computer technical assistance tools for special children for music therapy. 3605-3612

- Jiangke Cheng, Xiaodong Mai, Shengnan Wang:

Research on abnormal data mining algorithm based on ICA. 3613-3619 - (Withdrawn) A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem. 3621-3641

- Junfeng Xin, Wang Lei, Shixin Li, Yongbo Zhang:

Improved eigensystem realization algorithm and its application on ocean platforms. 3643-3650 - Ye Zhang:

Multi scenario simulation analysis of environmental carrying capacity in western region based on fusion support vector machine regression prediction algorithm. 3651-3656 - Yangqin Wang:

Research on College English curriculum algorithm based on hierarchical model. 3657-3664 - Yi Liu, Jian Wang, Sabina Shahbazzade:

The improved AFSA algorithm for the berth allocation and quay crane assignment problem. 3665-3672 - Xiangming Mao:

Study on ant colony optimization algorithm for "one-day tour" traffic line. 3673-3680 - (Withdrawn) Research on Chinese and English language information retrieval algorithm based on bilingual theme model. 3681-3688

- (Withdrawn) Research on early warning and monitoring algorithm of financial crisis based on fuzzy cognitive map. 3689-3697

- Bo Liang, Jiatong Liu:

Design and development of sports training system based on image processing technology. 3699-3706 - Bo Wang:

Data analysis of the turning technique process of swimming athletes assisted by computer technology. 3707-3714 - N. Thamaraikannan, S. Kamalraj:

Utilization of compact genetic algorithm for optimal shortest path selection to improve the throughput in mobile Ad-Hoc networks. 3715-3726 - Balamanigandan Ramachandran

, Kamalraj Subramaniam
:
Secure and efficient data forwarding in untrusted cloud environment. 3727-3735 - M. Jamunarani

, C. Vasanthanayaki:
Shape adaptive DCT compression for high quality surveillance using wireless sensor networks. 3737-3747 - J. Vijayalakshmi

, Chinnanadar Ramachandran Rene Robin
:
An exponent based error detection mechanism against DXDOS attack for improving the security in cloud. 3749-3758 - R. Kingsly Stephen

, A. Chandrasekar, K. Dinakaran:
Sectional Transmission analysis approach for improved reliable transmission and secure routing in wireless sensor networks. 3759-3770 - Janani Arthanari

, R. Baskaran:
Enhancement of video streaming analysis using cluster-computing framework. 3771-3781 - A. Kalaivani, B. Ananthi, S. Sangeetha:

Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology. 3783-3790 - V. Kavitha, P. Balamurugan

:
A smart sensor network localization for electric grids. 3791-3799 - J. Arun, M. Karthikeyan:

Optimized cognitive radio network (CRN) using genetic algorithm and artificial bee colony algorithm. 3801-3810 - R. Adaline Suji

, D. Bright Anand, R. Lenin Babu:
Polar ice image segmentation using improved estimation and normalization of illumination. 3811-3819 - Zhihua Li:

An adaptive overload threshold selection process using Markov decision processes of virtual machine in cloud data center. 3821-3833 - K. Murugan, V. P. Arunachalam

, S. Karthik:
A hybird filtering approach for mri image with multiresolution. 3835-3840 - Xiaoping Zhou, Xun Liang

, Jichao Zhao, Aakas Zhiyuli, Haiyan Zhang:
Exploration of polygons in online social networks. 3841-3848 - Chaolong Zhang

, Yigang He, Lifen Yuan, Sheng Xiang:
A multiple heterogeneous kernel RVM approach for analog circuit fault prognostic. 3849-3861 - G. Shanmugaraj

, N. Kalaiarasi:
Hearing aid speech signal enhancement via N-parallel FIR-multiplying polynomials for Tamil language dialect syllable ripple and transition variation. 3863-3874 - M. Suganthy

, S. Manjula
:
Enhancement of SNR in fetal ECG signal extraction using combined SWT and WLSR in parallel EKF. 3875-3881 - (Withdrawn) A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud. 3883-3892

- S. J. Pradeeba, K. Sampath

, A. Ramadevi:
Photo-catalytic degradations of methylene blue, malachite green and Bismarck brown using poly(azomethine)/TiO2 nanocomposite. 3893-3909 - (Withdrawn) Improved image compression using effective lossless compression technique. 3911-3916

- C. Amuthadevi

, J. Sathya Priya
, B. Madhusudhanan:
Validation of multicast routing in cyber physical systems monitoring air quality. 3917-3923 - (Withdrawn) Research on fine grained software radio communication algorithm based on GPU parallel processing technology. 3925-3934

- (Withdrawn) Solving algorithm for inverse problem of partial differential equation parameter identification based on IGEP. 3935-3941

- (Withdrawn) Optimal design of transportation distance in logistics supply chain model based on data mining algorithm. 3943-3952

- R. Joseph Manoj, M. D. Anto Praveena

, K. Vijayakumar
:
An ACO-ANN based feature selection algorithm for big data. 3953-3960 - (Withdrawn) A hybrid multi-layer intrusion detection system in cloud. 3961-3969

- Wen Liu, Tuqian Zhang, Yan Liu, Ningning Zhang, Hongyu Tao, Guoqing Fu:

Improved artificial bee colony algorithm based on self-adaptive random optimization strategy. 3971-3980 - Yu Jiang

, Aiqun Hu, Jie Huang:
Importance-based entropy measures of complex networks' robustness to attacks. 3981-3988 - (Withdrawn) The application of particle swarm optimization for the training of neural network in English teaching. 3989-3998

- Yajie Li

, Yan Zhang, Mingxiao Yu, Xiaofei Li:
Drawing and studying on histogram. 3999-4006 - P. Selvarani, Annamalai Suresh

, Malarvizhi N
:
Secure and optimal authentication framework for cloud management using HGAPSO algorithm. 4007-4016 - N. Sridevi, Velmurugan Nagarajan

:
A curve based cryptography for wireless security in MANET. 4017-4025 - (Withdrawn) A new localization technique for node positioning in wireless sensor networks. 4027-4034

- A. N. Arularasan

, Annamalai Suresh
, Koteeswaran Seerangan
:
Identification and classification of best spreader in the domain of interest over the social networks. 4035-4045 - M. Jayekumar, Velmurugan Nagarajan

:
A novel DEA-OR algorithm for route failure recovery in dense wireless sensor networks. 4047-4055 - S. Balu, C. Nelson Kennedy Babu

, K. Amudha
:
Secure and efficient data transmission by video steganography in medical imaging system. 4057-4063 - (Withdrawn) A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks. 4065-4074

- Jiang Lanxiang, Honglei Wang, Zhijun Hu, Zhao Wei:

Repeated game analysis of power suppliers based on dynamic coopetition process and slightly altruistic factor. 4075-4084 - Jingyu Li, Ming Zhou, Gengyin Li:

Intelligent optimization of active power output of wind farm during fault recovery with wake effect. 4085-4090 - Xiao Chen, Liang Pang, Pengze Guo, Xingping Sun, Zhi Xue, N. Arunkumar

:
New upper degree of freedom in transmission system based on wireless G-MIMO communication channel. 4091-4099 - Xiaoqin Li, Qian-Jun Chen

, Zude Ding:
Structural damage diagnosis and fine scale finite element intelligence simulation of long span cable stayed bridges. 4101-4107 - Nan Jiang, Xuefeng Zhao, Jinlong Zhang:

An empirical study on the impact of information system absorption on the performance of troops' logistics organization. 4109-4118 - Wen Aihong, Yan Nan, Xu Caocao:

Multi-classification cluster analysis of large data based on knowledge element in microblogging short text. 4119-4127 - T. Joby Titus

, V. Vijayakumari:
Clock node capacity minimization using lookup table based controller for ultrasound and medical imaging processor. 4129-4134 - Wei Bai:

Hierarchical cluster based evaluation system for computer courses. 4135-4140 - Feifei Sun

, Pinghua Xu
, Xuemei Ding:
Multi-core SVM optimized visual word package model for garment style classification. 4141-4147 - Xinke Leng, Huijun Jiang, Zuo Xin:

Human action tracking design of neural network algorithm based on GA-PSO in physical training. 4149-4155 - Hongwang Zhao, Aicheng Zou:

Eigen vector buckling based boundary analysis method for free vibration of rectangular thin plates. 4157-4163 - Xue Wang, Yue Jin Wu, Ru Jing Wang, Yuan Yuan Wei, Yuanmiao Gui:

Gray BP neural network based prediction of rice protein interaction network. 4165-4171 - Mingze Xia, Xinming Zhang, Yong Zhu:

Real time localization algorithm based on local linear embedding optimization in sensor networks. 4173-4178 - S. Syed Jamaesha

, S. Bhavani:
A secure and efficient cluster based location aware routing protocol in MANET. 4179-4186 - R. Rani Saritha

, Varghese Paul, P. Ganesh Kumar:
Content based image retrieval using deep learning process. 4187-4200 - K. Praghash

, R. Ravi:
Physical-traffic attentive vigorous routing (P-TAVR) and hot-spot detection to reduce the bottleneck in WSN. 4201-4212 - S. Diwakaran

, Balasubramani Perumal
, K. Vimala Devi
:
An intelligent data aware and energy censoring scheme for wireless sensor networks. 4213-4220 - J. K. Mohan Kumar

, H. Abdul Rauf, R. Umamaheswari:
An improved design for grid based PV control systems using modified fuzzy logic with an improved switched capacitor DC-DC converter. 4221-4230 - He Xiao:

BIRCH algorithm and data management in financial enterprises based on dynamic panel GMM test. 4231-4237 - Pei Wang, Xiaodong Zhang, Boling Han, Maoxiang Lang:

Prediction model for railway freight volume with GCA-genetic algorithm-generalized neural network: empirical analysis of China. 4239-4248 - Wei Zhu, Yingsan Wei, Huan Xiao:

Fault diagnosis of neural network classified signal fractal feature based on SVM. 4249-4254 - Liuyi Wang, Wei Zhang:

Pilot multiplexing OFDM system frequency offset estimation method. 4255-4261 - Mao Jun:

Target detection and recognition algorithm for moving UAV based on machine vision. 4263-4269 - Shi Lei:

A novel WSNs routing algorithm based on game theory and energy consumption balance. 4271-4276 - Wendai Lv:

Method and application of data defect analysis based on linear discriminant regression of far subspace. 4277-4282 - Jiao Lei, Rui Manuel Campilho Pereira de Menezes:

Fairness evaluation method of resource allocation based on BPSO multidimensional perspective. 4283-4290 - Yuan-Qiang Lian:

Analysis method of competitive advantage of new industrial innovation alliance based on contraction factor particle swarm optimization (PSO). 4291-4297 - Ding Lei:

Black-Litterman asset allocation model based on principal component analysis (PCA) under uncertainty. 4299-4306 - Chang Liu, N. Arunkumar

:
Risk prediction and evaluation of transnational transmission of financial crisis based on complex network. 4307-4313 - Zhengyang Zhang:

Matrix decomposition model for robust based on M estimate and its application. 4315-4322 - Zhengyang Zhang, Zengyu Mi:

Preference risk assessment method based on grey multi index kernel support vector machine model. 4323-4329 - Liangcai Dong, Yang Yang, Siyun Sun:

QCs scheduling scheme of genetic algorithm (GA) and improved firefly algorithm (FA). 4331-4348 - Hui Wang, Shengnan Liu, Ao Kong:

Theoretical and empirical research on investment behavior strategy based on fuzzy probability. 4349-4359 - Ding Lei:

GARCH model prediction method based on Hessian matrix dynamic programming deep neural network. 4361-4366 - Lina Song:

Analysis of factors affecting investment efficiency based on analytic hierarchy process and support vector machine (SVM) model. 4367-4374 - C. Kavitha, S. Sakthivel

:
An effective mechanism for medical images authentication using quick response code. 4375-4382 - Wang Jue:

Prediction model of pulmonary tuberculosis based on gray kernel AR-SVM model. 4383-4387 - Li Mei:

Productivity prediction method based on analysis model of principal component neural network. 4389-4395 - Xiaobing Yang, Hongyun Liu, Yongmei Peng:

Enhanced perceptual psychopathology correlation mechanism model based on rough set and neural network. 4397-4403 - Zhongfu Wang, Yanhong Feng:

Evaluation model of economic competitiveness based on multi-layer fuzzy neural network. 4405-4412 - Yuan Wei, Dai Xu, Longbin Liu, Xiaodong Miao, Weihua Zhang:

Optimal design of honeycomb sandwich structure cover with multi-objective ant colony algorithm. 4413-4419 - V. Radhika

, K. Baskaran
:
High resolution DPWM clustered architecture for digitally controlled DC-DC converter using FPGA. 4421-4430 - K. Balasamy

, S. Ramakrishnan
:
An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. 4431-4442 - R. Vinu

, Paul Varghese:
Performance analysis of artificial intelligent controllers in PEM fuel cell voltage tracking. 4443-4455 - K. Sakthidasan Sankaran

, S. Prabha, P. M. Rubesh Anand
:
Optimized gradient histogram preservation with block wise SURE shrinkage for noise free image restoration. 4457-4478 - K. Kathiravan

, N. Rathina Prabha
:
Assessment of ramping cost for independent power producers using firefly algorithm and gray wolf optimization. 4479-4490 - Xiaoyu Chen, Jianyong Zheng, Jun Mei:

Grid Connected Photovoltaic Power Generation Control Method Based on Swarm Intelligence Algorithm. 4491-4501 - S. Mahaboob Basha

, M. Kannan:
Novel architecture and implementation of low power oriented full search block motion estimation. 4503-4509 - N. Nagaraju

, S. M. Ramesh:
Implementation of high speed and area efficient MAC unit for industrial applications. 4511-4517 - Yefei Han, Guangwei Bai, Gongxuan Zhang:

Power allocation algorithm based on mixed integer nonlinear programming in WSN. 4519-4525 - Zhuang Xu, Baojun Ge, Dajun Tao:

Multivariable bilinear subspace recursive likelihood identification for pumped storage motor. 4527-4533 - Arun Kumar Sangaiah

, Ahmed Fakhry, Mohamed Abdel-Basset
, Ibrahim M. El-Henawy:
Arabic text clustering using improved clustering algorithms with dimensionality reduction. 4535-4549 - Changhai Huang

, Shenping Hu:
Factors correlation mining on maritime accidents database using association rule learning algorithm. 4551-4559 - Bhalchandra M. Hardas

, Sanjay B. Pokle:
Analysis of OFDM system using DCT-PTS-SLM based approach for multimedia applications. 4561-4569 - Hu Yu, Rui Lv, Zhikun Wei, Zuo Jie, Tingshan Zhang, Chen Ran, Yiqiao Xu:

Potential and trend prediction of unconventional oil and gas resources based on combination forecasting model of variable weight for multi-factor. 4571-4577 - Wang Lei, Jia Zhen Yuan, Zhang Li:

Design of multi-functional simulation platform based on mining speed-regulating magnetic coupling. 4579-4588 - Yafei Wu:

Evaluation system construction of health policy based on system dynamics and complex network. 4589-4596 - Huiming Dai, Xin Zhang, Dacheng Yang:

Research on multichannel transmission of security information in MAC layer based on zoom and forward in VANETs. 4597-4602 - Li Futou, Liu Liang

:
Decision making based on grey model and support vector machine. 4603-4609 - Sarosh Dastoor

, Upena Dalal, Jignesh N. Sarvaiya:
Cellular planning for next generation wireless mobile network using novel energy efficient CoMP. 4611-4623 - Yuqiang Tu:

Benefit evaluation for ocean engineering based on grey Euclid model of game compromise. 4625-4630 - Xinke Leng, Huijun Jiang, Xunhao Zou, Xiaoling Zeng:

Motion feature quantization of athletic sports training based on fuzzy neural network theory. 4631-4638 - Rui Shi:

Analysis and strategy of related factors in patients with sudden cardiac death in Department of Cardiology. 4639-4645 - Kawther Ahmed, Belal Al-Khateeb

, Maher Mahmood
:
Application of chaos discrete particle swarm optimization algorithm on pavement maintenance scheduling problem. 4647-4657 - Yang Yun-xing, Huichang Zhao, Si Chen, Shuning Zhang:

Analysis and design of proximity fuze based on waveguide discontinuity. 4659-4664 - Guo Meng:

Construction of employee training program evaluation system of three exponential forecast based on sliding window. 4665-4671 - S. Karthik

, K. Srikanta Murthy:
Deep belief network based approach to recognize handwritten Kannada characters using distributed average of gradients. 4673-4681 - Moein Sarvaghad-Moghaddam, Ali A. Orouji

, Zeinab Ramezani, Mohamed Elhoseny
, Ahmed Farouk
, Arunkumar N.
:
Modelling the spice parameters of SOI MOSFET using a combinational algorithm. 4683-4692 - Yijiu Zhao, Shuangman Xiao:

Sparse multiband signal spectrum sensing with asynchronous coprime sampling. 4693-4702 - Yingchao Zhang, Yun Mao:

The mechanism of active respiratory circulation in patients with chronic respiratory failure COPD. 4703-4709 - Junting Chen, N. Arunkumar

:
Quantified comparative analysis of innovation and innovation based on multi orientation from the perspective of education and culture. 4711-4718 - Yanhong Wang:

Fuzzy TOPSIS analytic hierarchy process based cooperative development of cultural soft power. 4719-4727 - Mei Ze:

Local weighted regression statistical analysis based mathematical education evaluation. 4729-4735 - Jing Xu, Jian Guo:

Markov chain based simulation analysis of bone mineral density and changes in the level of biochemical markers of bone transformation in postmenopausal women. 4737-4744 - Alaa Tharwat, Mohamed Elhoseny

, Aboul Ella Hassanien
, Thomas Gabel, Arun Kumar Sangaiah:
Intelligent Bézier curve-based path planning model using Chaotic Particle Swarm Optimization algorithm. 4745-4766 - Miao Quan:

Finite element analysis based construction of foundation and foundation evaluation system of underground tunnel. 4767-4773 - Chun Fang, Manfeng Dou, Bo Tan, Jianwei Yang:

Parameter estimation for BLDCM in rescue hoist drive and reduction of torque ripple and winding loss using conditional extremum current model. 4775-4784 - Zhiying Chen, Dinghua Xu, Zhongyi Xiao:

Hybrid intelligent algorithm based option pricing method. 4785-4791 - Deng Yuan:

Intelligent innovative knowledge management integration method based on user generated content. 4793-4803 - Li Yongming, Ying Wang, Haohao Song:

Coordinated development model of E-sports based on three party game. 4805-4812 - Xi Ke, Huiyu Luo, He Xiaohua, Wu Meihua, Wu Guangfeng, Zhu Fang, Gao Fengping, Zeng Guihua:

Fuzzy regression model clustering algorithm based assessment, analysis and acceptance of palliative care and psychological behaviors of elderly patients with cancer pain. 4813-4820 - Liu Manqing, Wan Jin, Jing Chuya, Yanyan Wang, Hong Ganji, Ma qilin, Bi Min, Lu Congxia:

Simulation analysis of the pathogenesis of Parkinson's disease based on multiple factors leading to mitochondrial damage. 4821-4828 - Xiong Jiaxuan:

Research progress on non-fullerene receptor in organic solar cell. 4829-4835 - Yang Ning, Liu Chun Wah, Luo Erdan

:
Stock price prediction based on error correction model and Granger causality test. 4849-4858 - Zhouyu Tian, Guangsheng Zhang

, Jinqi Jiang, Mi Zhou, Xiaoli Yang, Zhenhua Wang:
Grey three index prediction method based on data assimilation preprocessing. 4859-4867 - Jiang Li:

Evaluation method based on neural network differential evolution. 4869-4875 - Yao Jun, Zhijin Wang:

A location algorithm based on Stiefel manifold particle filtering. 4877-4882 - Teng-Fei Wei, Xiaolan Wang:

Analysis and elimination of the return power of the pulse width modulation of the bidirectional full bridge DC-DC converter. 4883-4892 - Dan Li, Fanglei Xue:

Research on the influence of tea culture on tea product innovation based on the natural user interface (NUI) method. 4893-4899 - Li-jun Li, Xiao-guang Zhang:

Discrimination method of wire rope fault signal based on Holzer sensor for multi array weak magnetic detection. 4901-4906 - Minghong She, Baocang Ding:

Closed-loop subspace identification of multivariable dynamic errors-in-variables models based on ORT. 4907-4915 - Hao Shi, Yan Yu:

Discrete element analysis of particles flow in convex arc section of large corrugated sidewall belt conveyor. 4917-4925 - Pei Wang, Xiaodong Zhang, Boling Han, Maoxiang Lang:

Carrying capacity and efficiency optimization model for freight train segment train. 4927-4940 - LingXiao Hu:

A resource management method based on organizational behavior theory and hidden Markov algorithm. 4941-4948 - Tiantian Tang, Pei Hu:

Quantitative standard of promotion strategy and analysis on the influence of consumer purchase behavior. 4949-4955 - Lv Jing, Fangyuan Zhou, Peng Jing:

The longitudinal analysis of the genetic effects on craniofacial morphology in posterior-anterior and lateral cephalograms of female twins aged from 6 to 12 years. 4957-4969 - Fu Tian:

Autoregressive moving average model based relationship identification between exchange rate and export trade. 4971-4977 - He Qin:

The method of mutual influence object getting along with two parties based on repetitive game control. 4979-4987 - Zhiqiang Cao, Zheng Yang, Fang Liu, Ziyu Ye:

Buyback and stockout penalty newsvendor model based on reference point prospect theory. 4989-4999 - Du Chunyu, Wang Li:

High building layout design based on emotional differential evolution algorithm. 5001-5007 - Mingtao Fan, Jun Li, Gong-hui Liu:

Study on the sealing integrity of cement sheath during volume fracturing of shale gas of horizontal well. 5009-5016 - Sun Qiang:

Formulation of physical education and training program based on multidimensional education data mining. 5017-5023 - Yanping Gong, Peng Fan:

Research on the dynamic incentive mechanism of information sharing in social network services based on reputation mechanism. 5025-5031 - Yan-ning Wang, Qiang Zhang, Bin-song Jiang:

Method for analyzing the strength of sandstone with three intermittent fractures based on discrete fracture model as an approximation. 5033-5039 - Shasha Deng, Huoming Shen, Lang Liu, Huaiping Tang:

Numerical investigation of the drag force for cross-sea bridge based on the two-way fluid-structure interaction. 5041-5053 - Zhi-Xiang Liu, Chun-Xue Xie, Miao Xie, Jun Mao:

Mobile robot positioning method based on multi-sensor information fusion laser SLAM. 5055-5061 - Tiancheng Wang:

Research on the optimal cluster number of energy efficiency based on the block model of opportunistic signal. 5063-5069 - Yanyan Jiang:

Competition and the stepping-stone theory in the broadband access market. 5071-5087 - Yawei Cai

, Hui Zhao, Mudong Li, Hanqiao Huang:
3D real-time path planning based on cognitive behavior optimization algorithm for UAV with TLP model. 5089-5098 - Ting Wang

:
Aligning the large-scale ontologies on schema-level for weaving Chinese linked open data. 5099-5114 - Ke Zhang, Liru Guo, Ce Gao, Zhenbing Zhao:

Pyramidal RoR for image classification. 5115-5125
Volume 22, Number 3, September 2019
- Pradeeban Kathiravelu

, Peter Van Roy, Luís Veiga
:
SD-CPS: software-defined cyber-physical systems. Taming the challenges of CPS with workflows at the edge. 661-677 - Santiago Felici-Castell

, Jaume Segura-Garcia
, Miguel García-Pineda
:
Adaptive QoE-based architecture on cloud mobile media for live streaming. 679-692 - Carlos Galdamez, Raj Pamula, Zilong Ye

:
On efficient virtual network function chaining in NFV-based telecommunications networks. 693-703 - Albert Rego

, Sandra Sendra, José Miguel Jiménez
, Jaime Lloret:
Dynamic metric OSPF-based routing protocol for Software Defined Networks. 705-720 - Mona S. Kashkoush, Mohamed Azab, Gamal Attiya

, Amr S. Abed:
Online Smart Disguise: real-time diversification evading coresidency-based cloud attacks. 721-736 - Gabor Kecskemeti

, Zsolt Németh, Attila Kertész
, Rajiv Ranjan:
Cloud workload prediction based on workflow execution time discrepancies. 737-755 - Amir Hossein Borhani, Terence Hung, Bu-Sung Lee, Zheng Qin:

Power-network aware VM migration heuristics for multi-tier web applications. 757-782 - Rahma Djiroun, Kamel Boukhalfa

, Zaia Alimazighi:
Designing data cubes in OLAP systems: a decision makers' requirements-based approach. 783-803 - Ahmed Aboud

, Haifa Touati
, Brahim Hnich
:
Efficient forwarding strategy in a NDN-based internet of things. 805-818 - Ali M. Shatnawi

, Yathrip AlZahouri, Mohammed A. Shehab
, Yaser Jararweh, Mahmoud Al-Ayyoub:
Toward a new approach for sorting extremely large data files in the big data era. 819-828 - Sebastian Laskawiec

, Michal Choras, Rafal Kozik
:
New solutions for exposing clustered applications deployed in the cloud. 829-838 - Jonathan Muraña

, Sergio Nesmachnow, Fermin-Alberto Armenta-Cano, Andrei Tchernykh
:
Characterization, modeling and scheduling of power consumption of scientific computing applications in multicores. 839-859 - Xianhao Xu, Xiaozhen Zhao, Bipan Zou

, Mingze Li:
Optimal dimensions for multi-deep storage systems under class-based storage policies. 861-875 - Jordi Mateo

, Lluís M. Plà-Aragonés
, Francesc Solsona
, Adela Pagès
:
A scalable parallel implementation of the Cluster Benders Decomposition algorithm. 877-886 - Jens Haussmann

, Wolfgang Blochinger, Wolfgang Küchlin:
Cost-efficient parallel processing of irregularly structured problems in cloud computing environments. 887-909 - Bo Wang

, Ying Song, Yuzhong Sun, Jun Liu:
Analysis model for server consolidation of virtualized heterogeneous data centers providing internet services. 911-928 - A. S. Xie

:
Benchmarking based search framework. 929-951 - Ying Xie, Jinzhao Wu:

Multi-objective constraint task scheduling algorithm for multi-core processors. 953-964 - Haifeng Wang

, Yunpeng Cao:
Event driven power consumption optimization control model of GPU clusters. 965-979 - Anwar Kalghoum

, Leïla Azouz Saïdane:
FCR-NS: a novel caching and forwarding strategy for Named Data Networking based on Software Defined Networking. 981-994 - Emiliano Casalicchio

:
A study on performance measures for auto-scaling CPU-intensive containerized applications. 995-1006 - Haohao Zhou

, Guanghan Bai, Su Deng:
Optimal interval scheduling with nonidentical given machines. 1007-1015 - Stefan Bosse

, Dirk Lehmhus:
Material-integrated cluster computing in self-adaptive robotic materials using mobile multi-agent systems. 1017-1037
Volume 22, Number 4, December 2019
- Joo-Chang Kim, Kyungyong Chung:

Sequential-index pattern mining for lifecare telecommunication platform. 1039-1048 - Young Sung Cho, Won Shik Na, Song Chul Moon:

Periodicity analysis using weighted sequential pattern in recommending service. 1049-1056 - Youngjun Moon, Seokhoon Kim

, Intae Ryoo
:
High-performance internet file system based on multi-download for convergence computing in mobile communication systems. 1057-1071 - Lili He, Jin Wang

, Hongtao Bai, Yu Jiang, Tonglin Li:
A novel parallel and distributed magnetotelluric inversion algorithm on multi-threads workloads cluster. 1073-1083 - Aref M. Abdullah, Hesham A. Ali, Amira Y. Haikal:

A reliable, TOPSIS-based multi-criteria, and hierarchical load balancing method for computational grid. 1085-1106 - Ala Darabseh, Nikolaos M. Freris

:
A software-defined architecture for control of IoT cyberphysical systems. 1107-1122 - Guillaume Ruty

, Jean-Louis Rougier, Andre Surcouf, Aloÿs Augustin:
An initial evaluation of 6Stor, a dynamically scalable IPv6-centric distributed object storage system - Precise architecture description and first benchmark results. 1123-1142 - Kallol Krishna Karmakar

, Vijay Varadharajan
, Udaya Kiran Tupakula
:
Mitigating attacks in software defined networks. 1143-1157 - Vasily Tarasov, Lukas Rupprecht, Dimitris Skourtis, Wenji Li, Raju Rangaswami

, Ming Zhao:
Evaluating Docker storage performance: from workloads to graph drivers. 1159-1172 - Andrei Tchernykh

, Vanessa Miranda-López
, Mikhail G. Babenko
, Fermin-Alberto Armenta-Cano
, Gleb I. Radchenko
, Alexander Yu. Drozdov
, Arutyun Avetisyan
:
Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. 1173-1185 - Manuel Aurelio Rodriguez Pascual, José A. Moríñigo

, Rafael Mayo-García
:
Effect of MPI tasks location on cluster throughput using NAS. 1187-1198 - Said Limam

, Riad Mokadem
, Ghalem Belalem
:
Data replication strategy with satisfaction of availability, performance and tenant budget requirements. 1199-1210 - Ünal Çavusoglu, Sezgin Kaçar:

A novel parallel image encryption algorithm based on chaos. 1211-1223 - Pavithra Latha Kumaresan

, T. Sree Sharmila
:
An efficient seed points selection approach in dominant color descriptors (DCD). 1225-1240 - P. M. Rekha

, M. Dakshayini:
Efficient task allocation approach using genetic algorithm for cloud environment. 1241-1251 - Zahra Ghanbari

, Nima Jafari Navimipour
, Mehdi Hosseinzadeh
, Aso Mohammad Darwesh:
Resource allocation mechanisms and approaches on the Internet of Things. 1253-1282 - Ritu Garg

, Mamta Mittal
, Le Hoang Son:
Reliability and energy efficient workflow scheduling in cloud environment. 1283-1297 - Ta Nguyen Binh Duong

:
FC2 : cloud-based cluster provisioning for distributed machine learning. 1299-1315 - Ibrahim Aljarah

, Hossam Faris, Seyedali Mirjalili
, Nailah Al-Madi
, Alaa F. Sheta, Majdi M. Mafarja
:
Evolving neural networks using bird swarm algorithm for data classification and regression applications. 1317-1345 - Victor Aluko, Sherif Sakr

:
Big SQL systems: an experimental evaluation. 1347-1377 - Neelam Panwar

, Sarita Negi
, Man Mohan Singh Rauthan
, Kunwar Singh Vaisla
:
TOPSIS-PSO inspired non-preemptive tasks scheduling algorithm in cloud environment. 1379-1396 - Sima Jeddi, Saeed Sharifian

:
A water cycle optimized wavelet neural network algorithm for demand prediction in cloud computing. 1397-1412 - Zijian Cao

, Lei Wang:
An active learning brain storm optimization algorithm with a dynamically changing cluster cycle for global optimization. 1413-1429 - Pan Zhou, Hongfang Yu, Gang Sun

, Long Luo, Shouxi Luo, Zilong Ye:
Flow-aware explicit congestion notification for datacenter networks. 1431-1446
Volume 22, Number Supplement 3, May 2019
- Zhaoqiang Wang, Jian Yang, Mingen Wu, Gan He, Qilei Wang:

The performance simulation analysis of material tribological behavior based on the machine sensing algorithm. 5127-5134 - Qun Yin, Jianbo Zhang, Xinkai Wang, Si Liu:

The video intelligent car based on wireless sensor. 5135-5150 - Youquan Chen, Xinhui Liu, Xin Wang, Yanhong Song:

Control strategies and optimization analyses of front-mounted parallel system. 5151-5163 - Xuepeng Liu, Xiaohong Hao, Dongsheng Zhang:

The computation on compressor model of DC inverter based on the intelligent sensing algorithm of water heater system performance. 5165-5173 - Yan Cao, Wanyu Wei, Yu Bai, Hu Qiao:

Multi-base multi-UAV cooperative reconnaissance path planning with genetic algorithm. 5175-5184 - Zhen Guo, Hui Li, Chunjie Cao, Zhengxi Wei:

Verifiable algorithm for outsourced database with updating. 5185-5193 - Shengli Song, Nan Zhang, Haitao Huang:

Named entity recognition based on conditional random fields. 5195-5206 - Xuehua Sun:

Multi-attribute intelligent queueing method for onboard call centers. 5207-5215 - Lei Guo, Wei Zhang, Jialei Zhang:

Neural information coding on small-world spiking neuronal networks modulated by spike-timing-dependent plasticity under external noise stimulation. 5217-5231 - Wei Fang

, Xuezhi Wen, Jiang Xu, Jiezhong Zhu:
CSDA: a novel cluster-based secure data aggregation scheme for WSNs. 5233-5244 - Chang Chen, Shaohui Su, Zhangming Peng, Guojin Chen, Haiqiang Liu, Youping Gong:

A novel simulation strategy for equation-based models of cyber-physical systems. 5245-5255 - Zhizhou Zhang:

Adaptive notch filter design for levitation sensing system based on vibration computation. 5257-5267 - Haijun Xiong, Qi Zhang:

Simulation and real time analysis of network protection tripping strategy based on behavior trees. 5269-5278 - Quanhua Hou, Siliang Yang, Yinnan Fang, Lingda Zhang:

Research on the application of AVC theory in data analysis of urban affairs and planning method. 5279-5292 - Hongbin Sun, Yong Zhang, Bin Hu:

Self-healing reconfiguration scheme for distribution network with distributed generations based on multi-agent systems. 5293-5303 - Yameng Wang, Huanfang Liu:

The characteristic coefficient analysis of the pressure curve type based on the classification method. 5305-5313 - Xiaojie Xu, Juan Shi:

Research on the factors affecting safety behavior based on interpretative structural modeling. 5315-5322 - Wang Quan-wei, Xu Ge-ning, Wen Hao:

Research on health monitoring and sensing technology based on vulnerability analysis. 5323-5332 - Jing Ji

, Wenfu Zhang, Chaoqing Yuan, Yingchun Liu, Zhichao Xu
, Yang Wang, Xiaokun Chen
:
Finite element model based test and analysis on ACHC short columns and hoop coefficient. 5333-5345 - Zhoufeng Wang, Yujun Wang, Lei Wang, Tingshan Zhang, Zhangying Tang:

Research on the comprehensive evaluation system of eco-geological environmental carrying capacity based on the analytic hierarchy process. 5347-5356 - Tingshun Li, Li Xiong, Aiqiang Dong, Ze-San Liu, Wen Tan:

Optimization method based on big data in business process management. 5357-5365 - Mengyuan Chen:

Bionic SLAM based on MEMS pose measurement module and RTAB-Map closed loop detection algorithm. 5367-5378 - Quanfeng Qiu, Yuanhua Lin, Qiugui Shu, Xiangjun Xie:

Optimal evaluation of time step size in numerical simulation for two-dimensional flow sensing. 5379-5396 - Sitong Lv, Zhihong Qian, Yuxi Liu:

Outage probability of SSTS for distributed antenna systems over Rayleigh fading channels in multi-cell environment. 5397-5406 - Shanxiong Chen, Maoling Pen, Hailing Xiong, Sheng Wu:

An anomaly detection method based on Lasso. 5407-5419 - Qinglu Ma, Zheng Zou

, Saleem Ullah
:
An approach to urban traffic condition estimation by aggregating GPS data. 5421-5434 - Lerong Ma, Dandan Song, Lejian Liao, Yao Ni:

A joint deep model of entities and documents for cumulative citation recommendation. 5435-5446 - Kai Cui, Shupeng Fan:

Indoor direct shear and uniaxial compression testing of polymer-modified silt. 5447-5455 - Yongbin Zhu

, Jun-sheng Li:
Collective behavior simulation based on agent with artificial emotion. 5457-5465 - Jianliang Wei, Fei Meng:

Personalized information recommendation based on synonymy tag optimization. 5467-5478 - Qi Li, Chengze Li, Guangyu Gao, Yanyi Huang:

A novel method to find important apps base on the analysis of components relationship. 5479-5489 - Li Yang, Xiedong Cao, Xinyu Geng:

A novel intelligent assessment method for SCADA information security risk based on causality analysis. 5491-5503 - Hui Zhang, Tianming Fei, Wei Guan, Shengwen Zhang, Zhipeng Jin, Weikang Tang:

Research on visual 3D assembly process design and simulation for marine diesel engine. 5505-5519 - Zhisong Wang:

Research on subgraph distribution algorithm based on label null model. 5521-5533 - Qinglu Ma, Jianting Zhou, Saleem Ullah

, Qi Wang:
Operational modal analysis of rigid frame bridge with data from navigation satellite system measurements. 5535-5545 - Yanhong Qin, Guangxing Wei

, Jing-Xin Dong
:
The signaling game model under asymmetric fairness-concern information. 5547-5562 - Fanqi Meng

, Xiaohong Su:
WCET optimization strategy based on source code refactoring. 5563-5572 - Huan Wang

, Jian Gu, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui:
Research on classification and recognition of attacking factors based on radial basis function neural network. 5573-5585 - Jiaguo Lv, Bin Yang, Zhen Yang, Wei Zhang:

A community-based algorithm for influence blocking maximization in social networks. 5587-5602 - Yun Li, Sumit Chakravarty, Shanlin Sun, Zhicheng Tan, Lili Sheng, Ming Yang, Xintong Wu:

A passive detection and tracking divers method based on energy detection and EKF algorithm. 5603-5612 - Sha-Sha Li, Tie-Jun Cui, Jian Liu

:
Study on the construction and application of Cloudization Space Fault Tree. 5613-5633 - Datong Zhou, Huajiao Li

, Zhiping Li, Jinsheng Zhou, Donglong Lin:
Structure Characteristics Analysis of Diesel Sales in Complex Network Method. 5635-5645 - Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao:

Lossy trapdoor functions based on the PLWE. 5647-5654 - Yifeng Jiang, Ranran Liu

, Enxing Zheng:
Mobile sink discovery mechanism in wireless sensor networks with duty cycles. 5655-5662 - Wei Zhang, Sheng Gao, Xu He:

An improved LLE-based cluster security approach for nonlinear system fault diagnosis. 5663-5673 - Qing Su, Yihao Tang, Zhanyi Li

, Kai Liu, Tianyi Cheng:
Analysis of the structure of hive files and the implementation of pivotal operations for distributed computing environment. 5675-5689 - Xiulian Gao, Changyou Guo, Xiuling Yin, Xuedou Yu:

The computation on $$\alpha $$ α -connectedness index of uncertain graph. 5691-5701 - (Withdrawn) A dynamic clustering based method in community detection. 5703-5717

- Yang Gao, Yu Song:

Research on the interactive relationship between information communication technology and manufacturing industry. 5719-5729 - Dong Cui, Qiang Zhang

:
The RFID data clustering algorithm for improving indoor network positioning based on LANDMARC technology. 5731-5738 - Yongliang Ma

:
An object tracking algorithm based on optical flow and temporal-spatial context. 5739-5747 - Xin He, Yin Bo, Jie Du, Keguo Li, Hongcheng Wang, Zhongbao Zhao:

Landscape pattern analysis based on GIS technology and index analysis. 5749-5762 - Jun Hong, Tao Wen, Quan Guo, Zhengwang Ye, Ying Yin:

Privacy protection and integrity verification of aggregate queries in cloud computing. 5763-5773 - Yinqing Tang, Feng Du

:
A delay compensation approach based on internal model control for two-input two-output networked control systems. 5775-5786 - Debao Liu, Xiaofeng Zhao, Yanyan Wang:

Items assignment optimization for complex automated picking Systems. 5787-5797 - Fei Wang, Zhiqiang Chao, Lian-bing Huang, Huaying Li, Chuanqing Zhang:

Trajectory tracking control of robot manipulator based on RBF neural network and fuzzy sliding mode. 5799-5809 - Zhongxun Wang, Min Zhang, Xinglong Gao, Wenqi Wang, Xiaolin Li:

A clustering WSN routing protocol based on node energy and multipath. 5811-5823 - Fei Zhang:

Research for service flow module granularity design based on fuzzy spaces quotient theory. 5825-5837 - Jinzhan Feng, Shuqin Cai, Xiaomeng Ma:

Enhanced sentiment labeling and implicit aspect identification by integration of deep convolution neural network and sequential algorithm. 5839-5857 - Xiaohong Qin, Jingfeng Zhao:

The cognitive computation method of environment changes based on the assessment indicator system. 5859-5867 - Zhan Xu, Xiaoli Xu:

Research and implementation of synchronization for ultra-wide bandwidth receiver within enclosed metal cabin. 5869-5880 - Jingfeng Zhao, Han Zhao'an:

Research on coupling relationship between environmental quality and regional economic growth based on VAR model. 5881-5891 - Haiyan Li:

Dynamic trust game model between venture capitalists and entrepreneurs based on reinforcement learning theory. 5893-5904 - Youxi Wu, Yuehua Wang, Jingyu Liu, Ming Yu, Jing Liu, Yan Li:

Mining distinguishing subsequence patterns with nonoverlapping condition. 5905-5917 - Zhichao Li

, Ru Jia, Jilin Huang:
The simulation model on delay time of road accessibility based on intelligent traffic control system. 5919-5929 - Shufang Fan

, Guihong Guo, Wenguo Ma
, Xinmin Liu:
Dynamic stability of composite foundation under different area replacement ratio based on intelligent sensing technology. 5931-5940 - Xuesong Yan, Tian Li, Chengyu Hu

, Qinghua Wu:
Real-time localization of pollution source for urban water supply network in emergencies. 5941-5954 - Sicheng Li, Bin Wang:

Evolutionary game simulation of corporate investing and financing behavior from a risk perspective. 5955-5964 - Kun Zhang

, Chong Shen, Qun Zhou, Haifeng Wang, Qian Gao, Yushan Chen:
A combined GPS UWB and MARG locationing algorithm for indoor and outdoor mixed scenario. 5965-5974 - Fengjun Shang, Xuanling Chen, Chenyun Yan, Luzhong Li, Yuting Zhao:

The bandwidth-aware backup task scheduling strategy using SDN in Hadoop. 5975-5985 - Ting Sun, Chuangbai Xiao, Xiujie Xu:

A scheduling algorithm using sub-deadline for workflow applications under budget and deadline constrained. 5987-5996 - XueGang Chen, Sheng Duan, Lu-Da Wang:

Research on clustering analysis of Internet public opinion. 5997-6007 - Shouzhen Zhang, Changjun Xie

, Chunnian Zeng, Shuhai Quan:
SOC estimation optimization method based on parameter modified particle Kalman Filter algorithm. 6009-6018 - Yu-mei Sun, Ni Du, Qiao-yan Sun, Xiang-guang Chen, Jian-wen Yang:

Research and application of biological potency soft sensor modeling method in the industrial fed-batch chlortetracycline fermentation process. 6019-6030 - Lian Xiong, Xiaojun Liu, Daixin Guo, Zhihua Hu:

Access patterns mining from massive spatio-temporal data in a smart city. 6031-6041 - Qiao-yan Sun, Yu-mei Sun, Xuejiao Liu, Ying-xin Xie, Xiang-guang Chen:

Study on fault diagnosis algorithm in WSN nodes based on RPCA model and SVDD for multi-class classification. 6043-6057 - Jun Tie, Wen Ying Chen, Chong Sun, Tengyue Mao, Guanglin Xing:

The application of agglomerative hierarchical spatial clustering algorithm in tea blending. 6059-6068 - Linan Wang, Bo Yi

:
Research on O2O take-away restaurant recommendation system: taking ele.me APP as an example. 6069-6077 - Jinhang Liu, Xian Zhong

:
An object tracking method based on Mean Shift algorithm with HSV color space and texture features. 6079-6090 - Shaoliang Wei, Wenbo Qin, Lianwei Han, Fengyu Cheng:

The research on compensation algorithm of infrared temperature measurement based on intelligent sensors. 6091-6100 - Hong Liu

, Chunmei Ai:
Empirical research on rural e-commerce development level index system based on catastrophe progression method. 6101-6109 - Fangbo Cai, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, Yi Yu:

Survey of access control models and technologies for cloud computing. 6111-6122 - Cao Honggang, Chen Kai, Zhong Xu:

The linear regression method of the influencing factors of cultural industry based on the classification of structural data sources. 6123-6132 - Fang'ai Liu, Qianqian Wang, Xin Wang:

Improved algorithm for parallel mining collaborative frequent itemsets in multiple data streams. 6133-6141 - Meng Han, Wenyu Chen, Alemu Dagmawi Moges:

Fast image captioning using LSTM. 6143-6155 - Shiming Deng, Peipei Liu:

The impact of attention heterogeneity on stock market in the era of big data. 6157-6170 - Liwen Peng, Yongguo Liu

:
Attribute weights-based clustering centres algorithm for initialising K-modes clustering. 6171-6179 - Weihao Liang, Jianhua He, Shixiong Wang, Lei Yang, Fang Chen:

Improved cluster collaboration algorithm based on wolf pack behavior. 6181-6196 - Jiahui Li, Jianhong Gong, Qiaoling Chen, Shengnan Liu, Jun Gao:

The first-principle calculation method for thermal structure stability analysis based on the simulation and sensing on cohesive energy. 6197-6208 - Yinjun Zhang, Yinghui Li, Jianhuan Su:

Iterative learning control for a class of parabolic system fault diagnosis. 6209-6217 - Shun Wang, Ye Du, Zhen Han:

An improved method of k-induction combined with predicate abstraction and CEGAR for software model checking. 6219-6229 - Feng Lin, Mingqi Lv, Ting Wang, Tieming Chen

:
Map matching based on Cell-ID localization for mobile phone users. 6231-6239 - Hailong Xu, Xiaofeng Bie, Hui Feng, Ye Tian:

Multiclass SVM active learning algorithm based on decision directed acyclic graph and one versus one. 6241-6251 - Yang Bo:

The data clustering based dynamic risk identification of biological immune system: mechanism, method and simulation. 6253-6266 - Hui Zhao, Yu Zhang, Lin Cao, Xiaodong Kang, Xiaoqing Xie:

Constrained short-term and long-term multi-objective production optimization using general stochastic approximation algorithm. 6267-6281 - Huanli Gao, Fuchun Liu:

Delay-dependent robust resilient H∞ control for uncertain singular time-delay system with Markovian jumping parameters. 6283-6294 - Mingchuan Zhang, Ruijuan Zheng, Jing Chen, Junlong Zhu, Ruoshui Liu

, Shibao Sun, Qingtao Wu:
Emotional component analysis and forecast public opinion on micro-blog posts based on maximum entropy model. 6295-6304 - Hua Zhang, Wenqi Lu

, Chuanyu Wu, Kong Tu:
Velocity optimization algorithm of 4-DOF robot end-effectors. 6305-6314 - Longqin Yao, Hengquan Zhang, Chenjun Zhang, Wanli Zhang:

Driving effects of spatial differences of water consumption based on LMDI model construction and data description. 6315-6334 - Pengyu Chen

:
Study on coordinated development of urban environment and economy based on cluster computing. 6335-6343 - Xu Zhao, Chuanchao Huang, Hufei Pan:

Online comments of multi-category commodities based on emotional tendency analysis. 6345-6357 - Zhongxun Wang, Yang Lou, Wen-qi Wang, Min Zhang, Xiao-lin Li:

Research on the application of LDPC code in chaotic sequence image encryption. 6359-6370 - Jianfeng Shang, Xiaohua Gu, Liping Yang

, Haihong Tang, Kun Zhang, Zhongli Ji:
Preference-driven yield-and-quality optimization for high-sulfur gas sweetening process by extreme learning machine model. 6371-6381 - Liupeng Jiang, Jie Ji, Yuhua Lu, Yanan Chen, Yue Jia:

Mathematical modeling and simulated annealing algorithm for spatial layout problem. 6383-6391 - Jiawen Liu, Jinlong Zhang, Yeming Gong

:
An integrated data analysis of configurations of supply chain integration. 6393-6404 - Hu Qiao, Fan Feng, Jianyao Qi, Ying Xiang:

A scalable product configuration model and algorithm. 6405-6415 - Lijie Zhang

, Jianchang Liu, Shubin Tan:
The radial basis function analysis of fire evacuation model based on RBF neural network. 6417-6424 - Zhiqi Huang:

Partial least squares regression analysis to factor of influence for ecological footprint. 6425-6433 - Chunhua Zhao

, Simon Blackmore, Michael Warbrick, Sam Wane
:
Design and evaluate intelligent control safety systems on the TOMI robot. 6435-6448 - Guangmei Wu, Bipan Zou

, Xianhao Xu:
Shuttle-based operating policies for multiple-lift compact automated parking systems based on queuing networks. 6449-6460 - Xiao-ping Jing, Cheng-yu Wen, Wen-pu Wang, Yong Feng:

A matching model for plant growth environment based on weighted multi-dimensional tree designed for big data. 6461-6469 - Gan Lin, Lu Ming, Tao Feng-he, Men Xiang-dong:

A simplified method for calculating surface stress of thick walled cylinder based on numerical calculation method. 6471-6482 - Kun Zheng, Kang Zheng, Falin Fang, Miao Zhang, Qi Li, Yanghui Wang, Wenyu Zhao:

An extra spatial hierarchical schema in key-value store. 6483-6497 - Shifeng Wu, Huazhu Song, Ting Li, Xian Zhong

:
Integration and formal representation in civil engineering supervision based on data-driven. 6499-6516 - Xian Tang, Ziyang Chen, Kai Li, Xiang Liu:

Efficient computation of the transitive closure size. 6517-6527 - (Withdrawn) Research on consumers online shopping decision-making and recommendation of commodity based on social media network. 6529-6539

- Rong-yong Ma, Yi Du

, Kai Li:
Study on flood control risk of flood control engineering system based on the clustering of measured data. 6541-6549 - Liang Zhao, Chu-Jun Li, Zhong-Xing Duan, Wei Wang, Xiao-dong Wu:

The metal thickness detection using pulsed eddy-current computation and detection method. 6551-6562 - Tie-Jun Cui, Sha-Sha Li:

Study on the construction and application of discrete space fault tree modified by fuzzy structured element. 6563-6577 - Xu Wang:

Study on relationship between green logistics activity and logistics performance. 6579-6588 - Jie Li, Wei Wang, Xiaoli Gao, Liang Zhou:

Strong conflicting evidences fusion based on belief interval distance measurement. 6589-6598 - (Withdrawn) Research on the interaction between quantum entanglement and thinking consciousness. 6599-6607

- Yong Lu, Yongming Huang, Wei Xue, Guobao Zhang

:
Seismic data processing method based on wavelet transform for de-noising. 6609-6620 - Yanxin Zhu

, Sujian Li, Yongfang Peng:
Research on duplicate combined forecasting method based on supply chain coordination. 6621-6632 - Wenbo Chen, Dewei Li, Yugeng Xi, Yuli Xu, Zhongxue Gan:

The research of grid-connected inverter control based on decaying amplification aggregation strategy in predictive control. 6633-6646 - Qian Li, Endong Guo, Tianyang Yu:

Study on seismic safety evaluation of water supply pipeline networks. 6647-6656 - Xiaoyuan Lu, Yanwei Xu:

SFabric: a scalable SDN based large layer 2 data center network fabric. 6657-6668 - Jing Chen, Mingxin Liu, Xian Liu:

Research on of overlapping community detection algorithm based on tag influence. 6669-6679 - Rui Hou, Lang Zhang, Tingting Wu, Tengyue Mao, Jiangtao Luo:

Bloom-filter-based request node collaboration caching for named data networking. 6681-6692 - Xiaoqing Zuo, Jinwei Bu, Xiangxin Li, Jun Chang, Xiangmei Li:

The quality analysis of GNSS satellite positioning data. 6693-6708 - Xing Wei, Lei Liu, Yongji Wang:

Reliability-based linear parameter varying robust non-fragile control for hypersonic vehicles with disturbance observer. 6709-6728 - Wei Chen, Ziyang Chen, Jia Liu, Qingzhang Yang:

A novel shortest path query algorithm. 6729-6740 - Hanyou Wang:

User classified algorithm and model based gold jewelry design definition. 6741-6753 - Shaosheng Fan, Xuhong Wang, Yihuan Zhang:

Study on PD detection for GIS based on autocorrelation coefficient and similar Wavelet soft threshold. 6755-6766 - Wei Li, Changwu Xu, Yue He, Liguo Chen, Lining Sun, Guoqiang Fang:

Design of horizontal airspace dividing radar antenna array. 6767-6780 - Yu Yao, Xuan Li, Lenan Wu:

Study of range-extended target detection performance based optimized EBSPK signals. 6781-6793 - Wei Zhang, Hongwei Wang

, Yilei Liu, Junyi Zuo, Heping Wang:
A novel aerodynamic parameter estimation algorithm via sigma point Rauch-Tung-Striebel smoother using expectation maximization. 6795-6806 - Bo Yang, Yan'an Chen:

Evolution model and simulation of logistics outsourcing for manufacturing enterprises based on multi-agent modeling. 6807-6815 - Xinwei Zhang, Shaohua Dong:

Analysis on supply-demand system of automotive manufacturer-supplier with Synergetics. 6817-6826 - Bingnan Huo

:
New urbanization path planning based on cluster calculation. 6827-6835 - S. Subiramoniyan, S. Joseph Jawhar:

Cluster computing based optimization techniques for control of electrical drives. 6837-6847 - M. Deva Brinda

, Alex Suresh
, M. R. Rashmi
:
Optimal sizing and distribution system reconfiguration of hybrid FC/WT/PV system using cluster computing based on harmony search algorithm. 6849-6854 - S. Bagavathy

, P. Maruthupandi:
Sensorless cluster based neural-fuzzy control strategy for four quadrant operation of three phase BLDC motor with load variations. 6855-6864 - Guo Meng, N. Arunkumar

:
Construction of employee training program evaluation system of three exponential forecast based on sliding window. 6865-6870 - Yuehui Peng, Zhuang Yuan, Yang Huibao:

Development of a representative driving cycle for urban buses based on the K-means cluster method. 6871-6880 - Yongjun Zhang, Jialin Ma, Zijian Wang:

Semi supervised classification of scientific and technical literature based on semi supervised hierarchical description of improved latent dirichlet allocation (LDA). 6881-6889 - M. Suguna

, S. Mercy Shalinie
:
Privacy preserving auditing protocol for remote data storage. 6891-6898 - Ilangovan Sangaiya

, A. Vincent Antony Kumar:
Improving medical diagnosis performance using hybrid feature selection via relieff and entropy based genetic search (RF-EGA) approach: application to breast cancer prediction. 6899-6906 - K. Sakthimurugan, K. Geetha

:
Designing low power magentic flip flop in 45 nm FDSOI technology for large scale cluster based engineering application. 6907-6912 - S. Ashokkumar

, Alex Suresh
, M. G. Kavitha
:
Implication of video summarization and editing of video based on human faces and objects using SURF (speeded up robust future). 6913-6919 - S. Rajalakshmi, Vijaya V. Chamundeeswari

:
Mineral exploration by decision tree classification using multi temporal cluster images in Jharkhand region. 6921-6926 - V. Balasubramanian

, T. Mala
:
Cloud data integrity checking using bilinear pairing and network coding. 6927-6935 - Xiaofen Tang, Li Chen:

Artificial bee colony optimization-based weighted extreme learning machine for imbalanced data learning. 6937-6952 - Qin Liu, Jiakai Xiao, Hongming Zhu:

Feature selection for software effort estimation with localized neighborhood mutual information. 6953-6961 - Jenn-Wei Lin, Joseph M. Arul, Chi-Yi Lin:

Joint deadline-constrained and influence-aware design for allocating MapReduce jobs in cloud computing systems. 6963-6976 - N. Gobi

, A. Rathinavelu:
Analyzing cloud based reviews for product ranking using feature based clustering algorithm. 6977-6984 - V. Kavitha

, Resham Lohani
:
A critical study on the use of artificial intelligence, e-Learning technology and tools to enhance the learners experience. 6985-6989 - J. Bhavithra

, A. Saradha:
Personalized web page recommendation using case-based clustering and weighted association rule mining. 6991-7002 - Karpagam Kanagarajan, Saradha Arumugam:

Intelligent sentence retrieval using semantic word based answer generation algorithm with cuckoo search optimization. 7003-7013 - P. Arunkumar, S. P. Shantharajah

, Mohanasuram Geetha
:
Improved canny detection algorithm for processing and segmenting text from the images. 7015-7021 - Ved Prakash Mishra

, Balvinder Shukla
, Abhay Bansal:
Analysis of alarms to prevent the organizations network in real-time using process mining approach. 7023-7030 - Jiang Li:

Contrastive analysis of English literature comparative literature based on Bayesian clustering approach to big data. 7031-7037 - Rajagopal Venkatesan, Balakrishnan Srinivasan, Periyasamy Rajendiran

:
Tiger hash based AdaBoost machine learning classifier for secured multicasting in mobile healthcare system. 7039-7053 - Rui Zeng, Ying-yan Wang:

Forward looking infrared target matching algorithm based on depth learning and matrix double transformation. 7055-7062 - V. Kavitha

, S. Mohanraj:
High performance Viterbi decoder design. 7063-7068 - M. Arul Selvan, S. Selvakumar:

Malicious node identification using quantitative intrusion detection techniques in MANET. 7069-7077 - Mohamed Hashem, Azza S. Hassanein:

Jaw fracture classification using meta heuristic firefly algorithm with multi-layered associative neural networks. 7079-7086 - Stanley Lima, Álvaro Rocha

, Licínio Roque
:
An overview of OpenStack architecture: a message queuing services node. 7087-7098 - Farman Ali Khan, Faisal Shahzad, Muhammad Altaf:

Fuzzy based approach for adaptivity evaluation of web based open source Learning Management Systems. 7099-7109 - Muqaddas Abid, Muhammad Ishtiaq, Farman Ali Khan, Salabat Khan, Rashid Ahmad

, Peer Azmat Shah
:
Computationally efficient generic adaptive filter (CEGAF). 7111-7121 - Ruifan Li, Fangxiang Feng, Ibrar Ahmad, Xiaojie Wang:

Retrieving real world clothing images via multi-weight deep convolutional neural networks. 7123-7134 - Danish Wadood, Azhar Rauf

, Shah Khusro, Shaukat Ali:
Identifying key influential parameters of high profile criminals through statistical correlation. 7135-7148 - Sumbal Riaz, Mehvish Fatima, Muhammad Kamran

, Muhammad Wasif Nisar:
Opinion mining on large scale data using sentiment analysis and k-means clustering. 7149-7164 - Hammad Majeed

, Samina Naz:
Deja Vu: a hyper heuristic framework with Record and Recall (2R) modules. 7165-7179 - Muhammad Zubair Asghar

, Aurangzeb Khan, Syeda Rabail Zahra, Shakeel Ahmad, Fazal Masud Kundi:
Aspect-based opinion mining framework using heuristic patterns. 7181-7199 - Syed Ali Tariq

, Shahzaib Iqbal
, Mubeen Ghafoor, Imtiaz A. Taj
, Mohammad Noman Jafri, Muhammad Saad Razzaq, Tehseen Zia
:
Massively parallel palmprint identification system using GPU. 7201-7216 - Adriano Lino

, Álvaro Rocha
, Amanda Sizo
:
Virtual teaching and learning environments: automatic evaluation with artificial neural networks. 7217-7227 - Mehr Yahya Durrani, Salabat Khan, Shehzad Khalid:

VerSig: a new approach for online signature verification. 7229-7239 - Adnan Idris

, Muhammad Aksam Iftikhar, Zia ur Rehman:
Intelligent churn prediction for telecom using GP-AdaBoost learning and PSO undersampling. 7241-7255 - Mohsin Bilal

, Faisal Karim Shaikh, Muhammad Arif
, Mudasser F. Wyne:
A revised framework of machine learning application for optimal activity recognition. 7257-7273 - Shaukat Ali, Azhar Rauf

, Naveed Islam
, Haleem Farman
:
A framework for secure and privacy protected collaborative contents sharing using public OSN. 7275-7286 - Rashid Naseem

, Mustafa Mat Deris, Onaiza Maqbool, Sara Shahzad:
Euclidean space based hierarchical clusterers combinations: an application to software clustering. 7287-7311 - Iftikhar Ahmad

, Javeria Iqbal:
A novel time series behavior matching algorithm for online conversion algorithms. 7313-7320 - Salma Noor

, Sehrish Jamil, Neelam Gohar, Lubna Shah:
Knowledge retrieval of historic concepts using semantic web. 7321-7332 - Neelam Gohar

, Salma Noor, Faiza Fareed Babar, Ammara Malik, Sania Shaheen:
Dynamics of manipulation in voting, veto and plurality. 7333-7345 - Jiazhong Lu

, Kai Chen, Zhongliu Zhuo, Xiaosong Zhang:
A temporal correlation and traffic analysis approach for APT attacks detection. 7347-7358 - Huanglu Wen

, Liejun Wang:
No projection in the residual network. 7359-7368 - Le Sun:

An influence diagram based cloud service selection approach in dynamic cloud marketplaces. 7369-7378 - Yuan Hong, Li Chen, Lianguang Mo:

Optimization of cluster resource indexing of Internet of Things based on improved ant colony algorithm. 7379-7387 - Haitao Yu, Liejun Wang:

A security-enhanced mutual authentication scheme with privacy protected in wireless sensor networks. 7389-7399 - Wanli Feng, Quanyin Zhu, Jun Zhuang, Shimin Yu:

An expert recommendation algorithm based on Pearson correlation coefficient and FP-growth. 7401-7412 - Xuefeng Dai, Laihao Jiang, Dahui Li:

Integrating predicate reasoning and reactive behaviors for coordination of multi-robot systems. 7413-7421 - Guodong Li

, Yue Pu, Bing Yang, Jing Zhao:
Synchronization between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption. 7423-7434 - Yuantao Chen

, Jie Xiong, Weihong Xu, Jingwen Zuo:
A novel online incremental and decremental learning algorithm based on variable support vector machine. 7435-7445 - Cong Zhai, Weitiao Wu

:
An extended multi-phase lattice model with consideration of optimal current changes with memory. 7447-7457 - Zhongda Lu, Fengbin Zhang, Jia Yang, Guoliang Zhang, Guangtao Ran:

Research on networked control system based on T-S model. 7459-7470 - Fengxia Xu, Xiaohui Song, Hongliang Ren, Shanshan Wang:

Sliding mode control based on U model for nonlinear discrete system with modeling uncertainties. 7471-7480 - Kun Zhang

, Chong Shen, Haifeng Wang, Zhuang Li, Qian Gao, Xiaoyan Chen:
Cluster computing data mining based on massive intrusion interference constraints in hybrid networks. 7481-7489 - Juling Zhang, Guowu Yang, William N. N. Hung, Yan Zhang

, Jinzhao Wu:
An efficient NPN Boolean matching algorithm based on structural signature and Shannon expansion. 7491-7506 - Xi Chen

, Tao Wu:
Region segmentation model for wireless sensor networks considering optimal energy conservation constraints. 7507-7514 - Bo Su, Junhan Yang, Lijuan Li, Yu Wang:

Secondary parallel automatic parking of endpoint regionalization based on genetic algorithm. 7515-7523 - Mingzhu Tang, Steven X. Ding, Chunhua Yang

, Fanyong Cheng, Yuri A. W. Shardt
, Wen Long
, Daifei Liu:
Cost-sensitive large margin distribution machine for fault detection of wind turbines. 7525-7537 - Xiaozhong Geng, Yingshuang Mao, Mingyuan Xiong, Yang Liu:

An improved task scheduling algorithm for scientific workflow in cloud computing environment. 7539-7548 - Wenpeng Lu

:
Word sense disambiguation based on dependency constraint knowledge. 7549-7557 - Hongbin Wang, Tong Wang, Yucai Zhou, Lianke Zhou, Huafeng Li:

Information classification algorithm based on decision tree optimization. 7559-7568 - Kun Zhang

, Chong Shen, Mengxing Huang, Haifeng Wang, Hanwen Li, Qian Gao:
Interrupt protection control of anti-interference nodes in network based on band sampling decision filter modulation. 7569-7576 - Jing Wei, Xinfa Zeng:

Optimal computing resource allocation algorithm in cloud computing based on hybrid differential parallel scheduling. 7577-7583 - Jian Xu, Yongzhi Liu, Yanyu Meng:

Analysis and simulation of reliability of wireless sensor network based on node optimization deployment model. 7585-7591 - Jiangchun Mo, Yucai Zhou:

The research of image inpainting algorithm using self-adaptive group structure and sparse representation. 7593-7601 - Yong Zhang, Zhanzheng Wei:

Dynamic weight-based multi-features fuzzy fusion for recovery-decision of waste lubrication oil. 7603-7610 - Mingju Chen, Hua Zhang, Guojun Lin, Qiang Han:

A new local and nonlocal total variation regularization model for image denoising. 7611-7627 - Feng Gao, Wancheng Luo, Xinqiang Ma:

Energy constrained clustering routing method based on particle swarm optimization. 7629-7635 - HaiLin Kui, Cuizhu Bao, Mingda Li, Xueshan Dou, Xiangyu Liu:

An improved Markov model for idle time prediction based on spatiotemporal learning. 7637-7647 - Zhi-gang Mo, Zheng Xie:

Communication scheduling method of big data in Internet of Things based on decision feedback equalization and spread spectrum modulation technology. 7649-7656 - Jian Gao, Honghai Li, Sheng Yin, Lin Wang:

Intelligent acquisition algorithm of dynamic traffic data based on Internet of Things. 7657-7664 - Yuantao Chen

, Weihong Xu, Jingwen Zuo, Kai Yang:
The fire recognition algorithm using dynamic feature fusion and IV-SVM classifier. 7665-7675 - Zhaohui Zhang, Sanyang Liu, Yi-Guang Bai, Yalin Zheng:

M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks. 7677-7685 - Zhaohui Zhang, Sanyang Liu, Yanqi Yang, Yi-Guang Bai:

A link-adding strategy for improving robustness and traffic capacity in large-scale wireless sensor networks. 7687-7694
Volume 22, Number Supplement 4, July 2019
- Kuttathati Srinivasan Vishvaksenan, R. Rajmohan:

Performance analysis of multi-carrier IDMA system for co-operative networks. 7695-7703 - B. Rammyaa, K. S. Vishvaksenan, Sumathi Poobal:

Performance of spectrum sharing cognitive radio network based on MIMO MC-CDMA system for medical image transmission. 7705-7712 - Syed Moinuddin Bokhari

, Marcharla Anjaneyulu Bhagyaveni:
Dual QR decomposition in K-best sphere detection for Internet of Things networks. 7713-7722 - S. Leela, Kuttathati Srinivasan Vishvaksenan:

Performance of adaptive MIMO switching for cognitive MC-CDMA system. 7723-7731 - (Withdrawn) Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things. 7733-7744

- R. Rajesh, Chinnamuthu Annadurai

, K. Nirmaladevi
:
Performance enhancement of IPv6 low power wireless personal area networks (6LoWPAN) by Lamport's algorithm. 7745-7750 - S. Leela, K. S. Vishvaksenan:

Error-rate analysis of MIMO MC-IDMA system for frequency-selective channels. 7751-7760 - V. Baby Shalini, V. Vasudevan:

Achieving energy efficient wireless sensor network by choosing effective cluster head. 7761-7768 - Jaisingh Thangaraj, Banoth Ravi

, Sunaina Kumari:
Performance analysis of collision avoidance routing protocol for inter-vehicular communication. 7769-7775 - D. Ramkumar, Chinnamuthu Annadurai

, K. Nirmaladevi
:
Continuous authentication consoles in mobile ad hoc network (MANET). 7777-7786 - (Withdrawn) Electronic commerce commodity entity identities based on hierarchical probability model. 7787-7794

- Lu Zhang, Yili Zheng, Gangliang Zhong, Qiang Wang:

Research on leaf species identification based on principal component and linear discriminant analysis. 7795-7804 - (Withdrawn) Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring. 7805-7814

- Meng Nie

, Hengshan Yang, Yunhan Xia:
A pressure sensor with electrostatic self-detecting structure. 7815-7820 - Lili Li, Liangliang Zhang, Gang Liu

, Qing Li
, Xing An:
Sensor fault localization with accumulated residual contribution rate for bridge SHM. 7821-7829 - Weixing Su, Fang Liu, Jianjun Zhao, Maowei He, Hanning Chen:

An on-line detection method for outliers of dynamic unstable measurement data. 7831-7839 - Qi Na, Jianyu Zhao:

Optimization design and computer simulation of enterprise R&D decision model under resource allocation. 7841-7860 - Denghui Zhang, Zhengxu Zhao, Yiqi Zhou, Yang Guo:

A novel complex network-based modeling method for heterogeneous product design. 7861-7872 - Jian Zhao

, Weiwen Su, Jian Jia, Chao Zhang, Tingting Lu:
Research on depression detection algorithm combine acoustic rhythm with sparse face recognition. 7873-7884 - Duan Xie, Jian Zhao

:
The precision of Mach-Zehnder interferometer in the presence of bit-phase flip. 7885-7894 - Dong Wang, Jingkuang Liu

, Xuetong Wang
, Yujing Chen:
Cost-effectiveness analysis and evaluation of a 'three-old' reconstruction project based on smart system. 7895-7905 - Wei He, Cheng Zhong, Miguel Ángel Sotelo, Xiumin Chu, Xinglong Liu, Zhixiong Li:

Short-term vessel traffic flow forecasting by using an improved Kalman model. 7907-7916 - Biao Wang, Feng Chen, Yingchun Chen, Shiqi Mo:

Energy DOA estimation of MUSIC symmetrical compressed spectrum on vector sensors array. 7917-7924 - Nali Shen:

Incentive mechanism on customer knowledge collaborative acquisition with relational contract under double-sided moral hazard in big data context. 7925-7932 - Hao He, Xiuguo Liu, Yonglin Shen:

Relative radiometric correction of high-resolution remote sensing images based on feature category. 7933-7941 - P. T. Vasanth Raj

, K. S. Vishvaksenan:
Performance of image transmission over MC-CDMA based on super resolution technique. 7943-7951 - Wei Cui

, Ke Wang, Qiang Zhang
, Peng Zhang:
Intelligent evaluation algorithm for the structural integrity testing of pipe welds defects. 7953-7963 - Xiaohui Lu

, Song Mengen, Peifang Wang:
Numerical simulation of the composite foundation of cement soil mixing piles using FLAC3D. 7965-7974 - Zhiyu Shao, Shunshan Feng:

Research on discontinuous guidance and hardware-in-the-loop simulation for unmanned underwater vehicle. 7975-7982 - Jieru Chi

:
Hybrid control of 2-DOF joint robot based on Port-Controlled Hamiltonian and PD algorithm. 7983-7989 - Jiayan Fang, Qiao Liu

, Zhiguang Qin:
Fixed-point twin support vector machine. 7991-8005 - Ruo Hu, Huimin Zhao, Yantai Wu:

The methods of big data fusion and semantic collision detection in Internet of Thing. 8007-8015 - (Withdrawn) A big data intelligence analysis expression method based on machine learning. 8017-8024

- Houtian Wang, Guoli Wen, Naijin Liu, Jun Zhang, Ying Tao:

A load balanced routing algorithm based on congestion prediction for LEO satellite networks. 8025-8033 - Jiayan Fang, Qiao Liu

, Zhiguang Qin:
Iterative tighter nonparallel hyperplane support vector clustering with simultaneous feature selection. 8035-8049 - Jia Xingli, Dai Qingmiao, Yang Hongzhi:

Susceptibility zoning of karst geological hazards using machine learning and cloud model. 8051-8058 - Xiaoming Zhou, Anlong Su, Aimin Liu, Wanli Cui, Wei Liu

:
Cooperative approach to artificial bee colony algorithm for optimal power flow. 8059-8067 - Yujing Chen, Dong Wang

, Gongbing Bi:
An image edge recognition approach based on multi-operator dynamic weight detection in virtual reality scenario. 8069-8077 - Chengfeng Jian

, Miao Li, Xiang Kuang:
Edge cloud computing service composition based on modified bird swarm optimization in the internet of things. 8079-8087 - Maozhu Jin

, Hua Wang, Qian Zhang:
Association rules redundancy processing algorithm based on hypergraph in data mining. 8089-8098 - Hua Wang, Maozhu Jin

, Peiyu Ren:
Intuitionistic fuzzy social network position and role analysis. 8099-8108 - Xiaoying He, Li Chen, Xiaogang Li, Hua Fu:

Brain image feature recognition method for Alzheimer's disease. 8109-8117 - Xiaoping Pang

, Haoyu Wang
, Jin Chen:
Intelligence algorithm for optimization design of the low wind speed airfoil for wind turbine. 8119-8129 - Kai Qu, Jiawei Xuan, Ning Wang

, Mengdi Zhang:
The simulation by using bivariate splines for solving two dimensional non-classical diffusion problem. 8131-8139 - Yiming Tian, Xitai Wang, Wei Chen, Zuojun Liu, Lifeng Li:

Adaptive multiple classifiers fusion for inertial sensor based human activity recognition. 8141-8154 - Qi-Lin Mao, Ming-Yue Zhai

:
A new grid frequency estimation algorithm based on the fractional FFT for IoT nodes time stamps. 8155-8160 - Zaoli Yang

, Jida Zhu:
Online product purchasing decision through IoT platform: based on normal stochastic multi-criteria decision method and vertical projection distance. 8161-8169 - Yan Cao, Liang Huang, Yu Bai:

A tooth surface section lofting method of exact spur face gear model based on complex tooth surface grid planning principle. 8171-8179 - Yunhua Yin

, Huifang Li:
Multi-view CSPMPR-ELM feature learning and classifying for RGB-D object recognition. 8181-8191 - Chunmei Li

, Yuming Wang, Tian Fang, Xinke Zhou, Peng Cui:
A neural network decision expert system for alpine meadow degradation in the Sanjiangyuan region. 8193-8198 - Liqian Zhou

, Ming Yin, Xi Xu, Xinpan Yuan, Xiaojun Liu:
Non-contact detection of human heart rate with Kinect. 8199-8206 - Pengxiang Wang, Chang Liu, Yunkai Li

:
Estimation method for ET0 with PSO-LSSVM based on the HHT in cold and arid data-sparse area. 8207-8216 - Meng Nie

, Yunhan Xia, Hengshan Yang:
A flexible and highly sensitive graphene-based strain sensor for structural health monitoring. 8217-8224 - Changquan He, Chaofeng Wang:

Development model simulation of airport transport corridor based on system dynamics algorithm. 8225-8239 - Zheng Hongfeng:

Dynamic economic dispatch based on improved differential evolution algorithm. 8241-8248 - Ting Wang, Ran Fan, Yanjie Peng, Xin Wang:

Optimization on mixed-flow assembly u-line balancing problem. 8249-8257 - Yulin Ma, Zhixiong Li

, Yicheng Li, Honghai Li, Reza Malekian:
Driving style estimation by fusing multiple driving behaviors: a case study of freeway in China. 8259-8269 - Junhua Xiong, Tingling Wang, Ruisheng Li:

Research on a hybrid LSSVM intelligent algorithm in short term load forecasting. 8271-8278 - (Withdrawn) Research on the system of smart city park based on cloud computing. 8279-8290

- (Withdrawn) Research on intelligent city energy management based on Internet of things. 8291-8300

- Xingdong Wang

, Zhankai Wu, Xinwu Li:
Near-surface snowmelt detection on the Greenland ice sheet from FengYun-3 MWRI data. 8301-8308 - Chen Yang:

Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. 8309-8317 - Mohamed Abdel-Basset

, Laila Abdel-Fatah, Arun Kumar Sangaiah
:
An improved Lévy based whale optimization algorithm for bandwidth-efficient virtual machine placement in cloud computing environment. 8319-8334 - B. Vidhya

, R. Vidhyapriya:
Image compression and reconstruction by examplar based inpainting using wavelet transform on textural regions. 8335-8343 - Lei Lei Deng:

Network communication load state recognition model based on correlation vector machine. 8345-8349 - Enwen Hu, Zhongliang Deng, Qingqing Xu, Lu Yin

, Wen Liu:
Relative entropy-based Kalman filter for seamless indoor/outdoor multi-source fusion positioning with INS/TC-OFDM/GNSS. 8351-8361 - Liwei Zhang, Jian Zhai:

Fault diagnosis for oil-filled transformers using voting based extreme learning machine. 8363-8370 - B. Rammyaa, K. S. Vishvaksenan, Sumathi Poobal, M. Mohana Mouli Krishnan:

Coded downlink MIMO MC-CDMA system for cognitive radio network: performance results. 8371-8378 - Dali Liu

, Lei Li, Xinhong Chen:
Pattern synthesis of a practical conformal hydrophone array via second-order cone programming. 8379-8386 - Yingzhi Nie

, Xueping Han:
Research on consumers' protection in advantageous operation of big data brokers. 8387-8400 - Jun Liu

, Mengting Wu, Mingqing Wang, Yuntao Zou
, Zhenglin Tan
, Donghai Wang, Xiuzhi Susan Sun:
Predicting the content of camelina protein using FT-IR spectroscopy coupled with SVM model. 8401-8406 - Bing Xu, Xiaoping Zhang, Xianjun Wu:

Super-resolution compressed sensing imaging algorithm based on sub-pixel shift. 8407-8413 - Liu Ang, Fu Shanna:

Study on the dynamic process of RKT in MNEs from the aspect of network evolutionary game. 8415-8427 - (Withdrawn) Application and research of clustering fusion algorithm in communication network prediction. 8429-8436

- Ye Wen:

Remote sensing image land type data mining based on QUEST decision tree. 8437-8443 - Meiwen Guo

:
Design and realization of bank history data management system based on Hadoop 2.0. 8445-8451 - Yuefeng Zhao

, Nannan Hu, Yunuan Wang, Yonglei Liu, Xiaofei Li, Jingjing Wang:
The application of near-infrared reflectance hyperspectral imaging for the detection and extraction of bloodstains. 8453-8461 - Cui Zhang, Xia Lei, Yannan Yuan, Lijun Song:

A learning approach to link adaptation based on multi-entities Bayesian network. 8463-8473 - Chunmao Jiang, Junwei Wu, Zhicong Li:

Adaptive thresholds determination for saving cloud energy using three-way decisions. 8475-8482 - Jianting Li, Xiao Ma:

Research on hot news discovery model based on user interest and topic discovery. 8483-8491 - Jian Zhao

, Yuan Shi, Shunli Zhang, Duan Xie:
A DSP-based blind deconvolution algorithm for motion image restoration. 8493-8500 - Lijun Song, Feng Yu, Xia Lei, Jiang Du:

Optimal power allocation analysis for simulation system based on the N-continuous precoded SM-OFDM system with imperfect channel estimation. 8501-8511 - Xuan Zhao

, Shiwei Xu, Yiming Ye
, Man Yu, Guiping Wang:
Composite braking AMT shift strategy for extended-range heavy commercial electric vehicle based on LHMM/ANFIS braking intention identification. 8513-8528 - Wei Zhong, Tao Yang

, Na He
, Tom Cosgrove:
Load-computational methods of anti-slide piles. 8529-8539 - (Withdrawn) Supply chain production and delivery scheduling based on data mining. 8541-8552

- Ze Cheng, Yuhan Xing, Silu Cheng, Peiyao Guo:

Power prediction method of lithium-ion battery for unmanned vehicles based on combined constraint intelligence algorithm. 8553-8560 - R. Dhilip Kumar, K. S. Vishvaksenan, K. Mithra

:
Cognitive radio network based DSTTD-CDMA system. 8561-8567 - Lanyong Zhang, Lei Zhang, Sheng Liu, Jiajia Zhou, Christos Papavassiliou:

Low-level control technology of micro autonomous underwater vehicle based on intelligent computing. 8569-8580 - Yang Wang, Jianbiao He, Bo Zou:

Interference management based on power control and MU-MIMO. 8581-8588 - Wengen Gao, Qigong Chen, Yuan Ge, YiQing Huang:

The probabilistic model and forecasting of power load based on JMAP-ML and Gaussian process. 8589-8596 - Yang Wang, Jie Zhao, Sunan Wang:

Analysis and optimization of beamforming methods for high frequency mobile broadband communication system. 8597-8604 - Yanxiao Liu

, Qindong Sun, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Efficient group authentication in RFID using secret sharing scheme. 8605-8611 - Rui Fu, Mingfang Zhang, Chang Wang:

Behavior analysis of distant vehicles using LIDAR point cloud. 8613-8622 - Xinxin Li, Shaofei Wu, Mingqing Wang, Yuntao Zou

:
The software system design model based on digital PCR fluorescence detector. 8623-8627 - Yaning Wang, Zhaofeng Wang:

Routing algorithm of energy efficient wireless sensor network based on partial energy level. 8629-8638 - Haibo Yi

, Zhe Nie:
Towards data storage in cryptographic systems: an efficient hardware architecture based on multivariate scheme for secure storage applications. 8639-8646 - (Withdrawn) Design and implementation of intelligent manufacturing project management system based on bill of material. 8647-8655

- Rui Zhang, Zhichao Zhang, Zhiwei Guan, Yifei Li, Zhixiong Li:

Autonomous lane changing control for intelligent vehicles. 8657-8667 - Yang Chi, Jinchao Zhu, Lan Huag, Hao Xu:

Concepts recommendation for searching scientific papers. 8669-8675 - Xiaoping Zhou, Xun Liang

, Jichao Zhao, Aakas Zhiyuli, Haiyan Zhang:
An unsupervised user identification algorithm using network embedding and scalable nearest neighbour. 8677-8687 - Jiaqi Li

, Wei Cao, Xiaolin Tian:
Topographic surface roughness analysis based on image processing of terrestrial planet. 8689-8702 - Pawan Kumar Verma, Rajesh Verma

, Mohammed Meftah Alrayes, Arun Prakash
, Rajeev Tripathi
, Kshirasagar Naik:
A novel energy efficient and scalable hybrid-mac protocol for massive M2M networks. 8703-8724 - Yangkun Xia

, Zhuo Fu
:
Improved tabu search algorithm for the open vehicle routing problem with soft time windows and satisfaction rate. 8725-8733 - (Withdrawn) Numerical simulation of twin-barge float-over installation on AQWA software. 8735-8746

- Qiang Meng

, Jianjun Zhang:
Optimization and application of artificial intelligence routing algorithm. 8747-8755 - Guozhong Huang, Nan Wang, Siheng Sun, Xiao Yang:

Research of mobile power pack security verification based on scenario simulation. 8757-8767 - Monan Wang

, Zhiyong Mao, Yuzheng Ma, Jiaqi Cao:
Stable and efficient collision detection scheme for hip-surgery training system. 8769-8781 - Yong Li:

Design a management information system for financial risk control. 8783-8791 - Dayong Shen

, Tianyu Liu, Longfei Zhang, Jie Wang, Yumeng Liu:
A novel accelerated degradation test design considering stress optimization. 8793-8802 - Yibin Xiang:

Set self-service sales and online customization in one of the product network marketing system construction and management research. 8803-8809 - Yulin Cao, Wenli Li, Dongxia Zheng:

A hybrid recommendation approach using LDA and probabilistic matrix factorization. 8811-8821 - Juan Yang

, Yuantao Xie
, Yabo Guo:
Panel data clustering analysis based on composite PCC: a parametric approach. 8823-8833 - Xizheng Zhang

, Liang Zheng:
Coordinated dispatch of the wind-thermal power system by optimizing electric vehicle charging. 8835-8845 - Xin Jin, Mingyong Li, Kaixuan Zhao, Jiangtao Ji, Hao Ma, Zhaomei Qiu:

Development of vegetable intelligent farming device based on mobile APP. 8847-8857 - Chengming Qi, Jianjun Fang, Lianying Sun:

Implementation of emergency logistics distribution decision support system based on GIS. 8859-8867 - Qing Yang, Ling He, Xingxing Liu, Zhichao Yang:

Computer-aided industrial development path optimization: a case from "Optics Valley of China". 8869-8878 - Wei Tian, Junming Zhang, Li Wang, Jing Cao, Jinrong Fan, Kataoka Takaki:

Dispersion analysis and calculation on Cherenkov radiation of an accelerated electron beam in poloidal magnetized plasma. 8879-8886 - Yan Zhou, Heming Zhao, Jie Chen, Xinyu Pan

:
Research on speech separation technology based on deep learning. 8887-8897 - Nafei Zhu, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li, Zhao Li:

Management of access privileges for dynamic access control. 8899-8917 - (Withdrawn) Research on agricultural products supply chain inspection system based on internet of things. 8919-8927

- (Withdrawn) Agricultural product monitoring system supported by cloud computing. 8929-8938

- Cheng Luo, Ying Peng, Tingting Zhu, Ling Li:

An optimization framework of video advertising: using deep learning algorithm based on global image information. 8939-8951 - D. Venkata Vara Prasad, Suresh Jaganathan

:
Designing towards an efficient job aware scheduling algorithm for IaaS cloud. 8953-8964 - Xiaoling Luo, Xueliang Fu:

Configuration optimization method of Hadoop system performance based on genetic simulated annealing algorithm. 8965-8973 - Faping Li, Fabing Li, Haizhu Chen:

Dynamic locally connected layer for person re-identification. 8975-8984 - Dunnan Liu, Shaojie Ouyang, Rui Ge, Mo Yang, Xiaochun Zhang, Fanghui Tan:

Multi-stage generation and transmission coordinated planning method with a modified fireworks algorithm facing to energy internet. 8985-8997 - Bing Han, Yonggang Li:

Power flow optimization for DC distribution grid with distributed energy access based on Newton-Raphson method through upper level control. 8999-9006 - Zhanfang Chen, Xin Zhang, Xin Feng, Zhengang Jiang, Cheng Han:

A CAVE-based stereoscopic displaying approach of reconstructing simulated endoscope scene. 9007-9011 - (Withdrawn) Smart city information acquisition system based on internet of things. 9013-9025

- Lian-suo Wei, Hongbin Wang, Xiancheng Hu:

Research on the single anchor node moving strategy based on the weighted virtual force mode. 9027-9036 - Caichang Ding, Lin Chen, Baorong Zhong:

Exploration of intelligent computing based on improved hybrid genetic algorithm. 9037-9045 - (Withdrawn) RETRACTED ARTICLE: Computer electromagnetic radiation carcinogenic doses based on Monte Carlo algorithm. 9047

- Fangcheng He, Pengcheng Wei:

Research on comprehensive point of interest (POI) recommendation based on spark. 9049-9057 - Guifeng Bai, YunQiang Sun:

Application and research of MEMS sensor in gait recognition algorithm. 9059-9067 - Hua Li

, Huamin Yang, Chao Xu, Jianping Zhao:
Fast global illumination of dynamic water surface based on two stage rendering. 9069-9080 - Xuefei Han, Liming Zhao:

Innovation and entrepreneurship guidance system based on clustering algorithm. 9081-9088 - Dongbing Zhang:

Analysis and research on the images of drivers and passengers wearing seat belt in traffic inspection. 9089-9095 - Yuan Gao, Qing Li:

A new framework for the complex system's simulation and analysis. 9097-9104 - Pan Wang, Qibing Lu, Zhun Fan

:
Evolutionary design optimization of MEMS: a review of its history and state-of-the-art. 9105-9111 - Xu Song, Hongyu Zhou, Guoying Liu:

Human behavior recognition based on multi-feature fusion of image. 9113-9121 - Shanhui Sun, Meihua Zhou:

Analysis of farmers' land transfer willingness and satisfaction based on SPSS analysis of computer software. 9123-9131 - Mo Zhang, Yunzhou Zhang, Gang Xie, Gang Zhang

:
A scheme of GA acceleration based on domain generic IC. 9133-9144 - Hui-Qin Li, Pan Ding, Li Ding, Jing-bo Li, Xiaojuan Liu, Hui Tian, Jun-yu Duan:

Research on precision of modular machine tool based on computer aided multi-body system method. 9145-9150 - Guoxun Jing, Fei Zhou, Zhiyang Gao, Shaoshuai Guo:

Study on safety early warning system of miner's physiological indexes. 9151-9157 - Xin Sui, Chunyang Liu, Jishun Li, Yujun Xue, Yongjian Yu, Yong Cui:

Laser-based measurement for micro-unbalance of cylindrical rollers of the high-speed precision rolling bearings. 9159-9167 - Dingju Zhu:

Humor robot and humor generation method based on big data search through IOT. 9169-9175 - Yonggang Ding, Shijun Li, Wei Yu, Jun Wang, Mengjun Liu:

A unified neural model for review-based rating prediction by leveraging multi-criteria ratings and review text. 9177-9185 - Zheng Wan

, Jun Li, Wenqiang Duan, Yuechi Chen, Naixue Xiong:
Lightweight and universal intelligent service platform in indoor environment. 9187-9198 - Xiaoling Ding, Lixin Zhao, Tian-Tian Zhou, Yi-Bin Li, Xi-Mei Huang, Ya-Li Zhao:

Research on wheat leaf water content based on machine vision. 9199-9208 - Jianyu Zhao, Luan Dong, Xi Xi:

Research on the strategic alliance innovation system evolution mechanism: the perspective of knowledge flow. 9209-9227 - Jun Wang, Limin Xia

:
Abnormal behavior detection in videos using deep learning. 9229-9239 - Lili Wei:

Study on the application of cloud computing and speech recognition technology in English teaching. 9241-9249 - Gao Ren, Juebo Wu

, Frederik Versonnen:
Bee-based reliable data collection for mobile wireless sensor network. 9251-9260 - Feng Chen:

Research on physical health data mining of university students oriented to PE teaching reform. 9261-9267 - Yan Yan, Xiaohong Hao, Lianxiu Zhang:

Hierarchical differential privacy hybrid decomposition algorithm for location big data. 9269-9280 - Tao Xie, Gaojun Luo:

More constructions of semi-bent and plateaued functions in polynomial forms. 9281-9291 - Qi Jia, Xu Liang Lv, Wei Dong Xu, Jiang Hua Hu:

Intelligent design of gradual disruptive pattern painting and comparison of camouflage effectiveness. 9293-9301 - Jihui Xie, Dongliang Wu

, Jing Wang, Chang Liu:
The analysis of additive noise of thermal test low-frequency cable fault detection based on M sequence correlation algorithm. 9303-9312 - Yandong Hou, Ruirui Huang, Qianshuai Cheng, Liyang Hou, Xiaonan Wang:

Fault detection and isolation for output feedback system based on space geometry method. 9313-9321 - Wei Feng, Xiaohua Shi

, Wenru Wang:
Eliminating object reference checks by escape analysis on real-time Java virtual machine. 9323-9334 - Zhuoqian Liang

, Ding Pan, Ruijing Xu:
Knowledge representation framework of accounting event in corpus-based financial report text. 9335-9346 - Zengquan Lu, Lilun Zhang, Dezhi Wang:

Differential evolution with improved elite archive mutation and dynamic parameter adjustment. 9347-9356 - Dong Wang, Jingkuang Liu

, Yujing Chen:
Distinguishing investment changes in metro construction project based on a factor space algorithm. 9357-9370 - Xiaoning Zhu

, Qingyue Meng, Bojian Ding, Lize Gu, Yixian Yang:
Weighted pooling for image recognition of deep convolutional neural networks. 9371-9383 - Yuan Deng, Congdong Li, Dong Wang

:
An integrated approach for knowledge management in the context of product innovation. 9385-9396 - D. Venkata Vara Prasad, Suresh Jaganathan

:
Null-space based facial classifier using linear regression and discriminant analysis method. 9397-9406 - Jiao Feng, Dongshun Hu, Peng Li, Johnson Zhang:

An enhanced MMSE detection with constellation distance correction for the Internet of things with multiple antennas. 9407-9414 - Yumei Wu, Jingxiu Yao, Bin Liu:

A reliability analysis method of network structure reconfiguration for phased mission system. 9415-9423 - Junchai Gao, Keding Yan, Bing Han:

SLAM estimation method for uncertain model noise parameters. 9425-9434 - Yu Li, Fengyuan Yu, Qian Cai, Kun Yuan, Renzhuo Wan, Xiaoying Li, Meiyu Qian, Pengfeng Liu, Junwen Guo, Juan Yu, Tian Zheng, Huan Yan, Peng Hou, Yiming Feng, Siyuan Wang, Lei Ding:

Image fusion of fault detection in power system based on deep learning. 9435-9443 - (Withdrawn) Research on smart city service system based on adaptive algorithm. 9445-9453

- Wen-Tsao Pan, Shi-Zhuan Han, Hui-Ling Yang, Xue-Ying Chen:

Prediction of mutual fund net value based on data mining model. 9455-9460 - Man Ding, Zhonghang Bai

, Mei Li:
Image-based tablet form design. 9461-9468 - R. Kesavamoorthy

, K. Ruba Soundar
:
Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system. 9469-9476 - D. Venkata Vara Prasad

, Suresh Jaganathan:
A quick survey of Artificial Neural Network based face classification algorithms. 9477-9488 - D. Venkata Vara Prasad

, N. Venkatesvara Rao, M. Sugumaran:
Sequential mining of real time moving object by using fast frequence pattern algorithm. 9489-9494 - D. Venkata Vara Prasad

, Suresh Jaganathan
:
Improving the performance of Smith-Waterman sequence algorithm on GPU using shared memory for biological protein sequences. 9495-9504 - W. Jino Hans, N. Venkateswaran

:
Selfie image super-resolution using an implicit prior learned from self-examples. 9505-9513 - Yu Li, Meiyu Qian, Pengfeng Liu, Qian Cai, Xiaoying Li, Junwen Guo, Huan Yan, Fengyuan Yu, Kun Yuan, Juan Yu, Luman Qin, Hongxin Liu, Wan Wu, Peiyun Xiao, Ziwei Zhou:

The recognition of rice images by UAV based on capsule network. 9515-9524 - Guolong Shi

, Yigang He, Bing Li, Qiwu Luo, Chaolong Zhang
:
Construction and analysis of multi-path propagation model for indoor short range Ultra-wideband signal based on time domain ray tracing method. 9525-9542 - Selvam Paranche Damodaran

, Kuttathati Srinivasan Vishvaksenan:
Mutual information of massive MIMO systems on block Rayleigh-faded channels. 9543-9550 - Chao Li, Xiaohua Shi

, Xinghai Lu:
Restructuring AMS to reduce synchronization overheads on android system. 9551-9559 - G. Prabu Kanna, V. Vasudevan:

A fully homomorphic-elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. 9561-9569 - Qing Li

, Jiang Zhong, Yongqin Tao, Lili Li, Xiaolong Miao:
Research of the processing technology for time complex event based on LSTM. 9571-9579 - R. Sabin Begum

, R. Sugumar:
Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. 9581-9588 - C. Thirumalaiselvan, V. Venkatachalam

:
A strategic performance of virtual task scheduling in multi cloud environment. 9589-9597 - Karthika Sundaran, Velappa Ganapathy, Priyanka Sudhakara

:
Energy minimization in wireless sensor networks by incorporating unequal clusters in multi-sector environment. 9599-9613 - V. Brindha, T. Karthikeyan

, P. Manimegalai
:
Fuzzy enhanced secure multicast routing for improving authentication in MANET. 9615-9623 - S. Radhakrishnan

, S. Neduncheliyan, K. K. Thyagharajan
:
A novel fuzzy scheduler for cell-edge users in LTE-advanced networks using Voronoi algorithm. 9625-9635 - J. Mani Kandan, A. Sabari:

Fuzzy hierarchical ant colony optimization routing for weighted cluster in MANET. 9637-9649 - (Withdrawn) Pattern mining model based on improved neural network and modified genetic algorithm for cloud mobile networks. 9651-9660

- (Withdrawn) Multimedia and multi-feature cluster fusion model based on saliency for mobile network applications. 9661-9676

- J. Leelavathy, S. Selvabrundha:

A novel approach to classify users based on keystroke behavior. 9677-9685 - Rajkumar Krishnan

, Ganeshkumar Perumal:
H2B2H protocol for addressing link failure in WSN. 9687-9696 - (Withdrawn) A novel construction paradigm of multimedia awareness system for mobile network. 9697-9713

- P. Ramya

, V. Gopalakrishnan:
Proficient algorithms for enhancing topology control for dynamic clusters in MANET. 9715-9726 - Vijay Kumar Burugari

, P. S. Periasamy:
Multi QoS constrained data sharing using hybridized pareto-glowworm swarm optimization. 9727-9735 - K. M. Karthick Raghunath

, N. Rengarajan:
Response time optimization with enhanced fault-tolerant wireless sensor network design for on-board rapid transit applications. 9737-9753 - R. Lakshminarayanan, P. Rajendran:

Efficient data collection in wireless sensor networks with block-wise compressive path constrained sensing in mobile sinks. 9755-9766 - S. Anbuchelian, C. M. Sowmya, C. Ramesh:

Efficient and secure auditing scheme for privacy preserving data storage in cloud. 9767-9775 - Budati Anil Kumar

, Polipalli Trinatha Rao:
Optimized design and analysis approach of user detection by non cooperative detection computing methods in CR networks. 9777-9785 - Neelamadhab Padhy

, R. P. Singh, Suresh Chandra Satapathy:
Enhanced evolutionary computing based artificial intelligence model for web-solutions software reusability estimation. 9787-9804 - K. Lakshmi Joshitha

, S. Jayashri:
Performance analysis for lifetime improvement of a regression based clustered network through cluster member allocation and secondary cluster head selection in a distributed WSN. 9805-9814 - Saravanan Murugan

, M. Aramudhan, S. Sundara Pandiyan, T. Avudaiappan:
Priority based prediction mechanism for ranking providers in federated cloud architecture. 9815-9823 - K. V. Rukmani, N. Nagarajan:

Enhanced channel allocation scheme for cross layer management in wireless network based on interference management. 9825-9835 - M. Kanthimathi

, R. Amutha, K. Senthil Kumar
:
Energy efficiency analysis of differential cooperative algorithm in wireless sensor network. 9837-9845 - C. Manjula, Lilly Florence

:
Deep neural network based hybrid approach for software defect prediction using software metrics. 9847-9863 - I. S. Akila, R. Venkatesan:

An energy balanced geo-cluster head set based multi-hop routing for wireless sensor networks. 9865-9874 - R. Suganya

, L. S. Jayashree:
Fuzzy Rough Set Inspired Rate Adaptation and resource allocation using Hidden Markov Model (FRSIRA-HMM) in mobile ad hoc networks. 9875-9888 - (Withdrawn) Mobile network intrusion detection for IoT system based on transfer learning algorithm. 9889-9904

- K. Pushpalatha, M. Karthikeyan:

A generalized framework for disruption tolerant secure opportunistic routing during emergency situations using MANETs. 9905-9913 - Durga S.

, S. Mohan, J. Dinesh Peter
, S. Surya:
Context-aware adaptive resource provisioning for mobile clients in intra-cloud environment. 9915-9928 - N. Yuvaraj

, P. Thangaraj:
Machine learning based adaptive congestion window adjustment for Congestion Aware Routing in Cross Layer Approach Handling of Wireless Mesh Network. 9929-9939 - Ajin Zou, Rui Deng, Qixiang Mei, Lang Zou

:
Fault diagnosis of a transformer based on polynomial neural networks. 9941-9949 - Shulei Wu, Yong Bai, Huandong Chen:

Change detection methods based on low-rank sparse representation for multi-temporal remote sensing imagery. 9951-9966 - Jianliang Wei, Fei Meng:

Is collective intelligence helps more in polysemy tag optimazed algorithm than commonsense tool. 9967-9976 - Guixian Xu, Changzhi Wang, Haishen Yao, Qi Qi:

Research on Tibetan hot words, sensitive words tracking and public opinion classification. 9977-9990 - Deling Zou, Haibin Cong

:
Data driven based coordinated development pattern and influencing factor analysis using spatial and temporal data. 9991-10007 - Xiaole Wan, Tingting Hao, Xiaoxia Rong, Qingchun Meng

:
The robust analysis of supply chain based on uncertainty computation: insight from open innovation. 10009-10018 - Hai-jun Li, Hong-chang Zhou, Jian-rong Feng, Xiao-hong Chen, Wei Zhang:

Railway passengers travel behavior based on bounded rationality by rough set weight. 10019-10029 - Gang Sheng, Chunming Tang, Hongyan Han, Wei Gao, Xing Hu:

Authentication of outsourced linear function query with efficient updates. 10031-10039 - Wen-wen Xiao, Lili Wang, Zhi-ying Zhang, Cheng-wei Wang:

Identify and analyze key industries and basic economic structures using interregional industry network. 10041-10051 - Shuwei Jing, Rui Li

, Junai Yan, Fudong Yang, Cheng-Chung Chen:
Research on optimization of product development value stream. 10053-10061 - Dong-Hui Cao

, Guanfa Li, Wensheng Zhu, Qiyuan Liu, Shuping Bai, Xiaokang Li:
Virtual reality technology applied in digitalization of cultural heritage. 10063-10074 - Xuan Hong, Jianhua Gao, Jianguo Pan, Bo Zhang:

Universally composable secure proxy re-signature scheme with effective calculation. 10075-10084 - Hsin-I Chen

:
A conceptual model of profitability determinants in online deal promotions for online-to-offline restaurant merchants. 10085-10093 - Wei Wang

, Yi Ji, Defu Lin, Zhongjiao Shi
, Shiyao Lin:
A novel approximate finite-time convergent guidance law with actuator fault. 10095-10107 - Zhi-xiu Ding:

A general Cyber-Physical framework for academic library. 10109-10117 - Wen Qi

:
Algorithms benchmarking for removing EOG artifacts in brain computer interface. 10119-10132 - Tingshun Li, Wen Tan, Xiaojie Li:

Data mining algorithm for correlation analysis of industrial alarms. 10133-10143 - Zhuo Hu, Congjun Rao, Chongyuan Tao, Peter R. N. Childs

, Yong Zhao:
A case-based decision theory based process model to aid product conceptual design. 10145-10162 - Jingsheng Lei, Ting Jin, Jiawei Hao

, Fengyong Li:
Short-term load forecasting with clustering-regression model in distributed cluster. 10163-10173 - Yexian Wang:

Simulation of body extension motion based on dynamics virtualization. 10175-10184 - Wei Fu, Simon X. Yang

, Chuanteng Huang, Guoquan Liu:
Predictive triggered control for networked control systems with event-triggered mechanism. 10185-10195 - Le Yang, Guozhang Jiang, Xi Chen, Gongfa Li, Tingting Li, Xiaowu Chen:

Design of integrated steel production scheduling knowledge network system. 10197-10206 - Baoli Wang, Yubi Gao, Zhenxing Su, Jing Li:

The structural equation analysis of perceived product innovativeness upon brand loyalty based on the computation of reliability and validity analysis. 10207-10217 - Jun Liu, Chunyan Zhu:

No user left behind: dynamic bottleneck-aware allocation of multiple resources. 10219-10227 - Wenguang Luo, Guolu Yang, Jing Lu, Senlin Zhu:

Data analysis on safety factors of physical modeling structures based on the computation of incident impact. 10229-10240 - Xun Liu:

Evolution and simulation analysis of co-opetition behavior of E-business internet platform based on evolutionary game theory. 10241-10250 - Xun Liu:

The network analysis of enterprise credit based on the simulation of impact credit spread model. 10251-10261 - Guixian Xu, Haishen Yao, Dongming Wu, Yuan Li, Deguang Ouyang, Gaofeng Chen:

Public opinion classification and text alignment based on Chinese and Tibetan corpus. 10263-10274 - Tie-Jun Cui, Sha-Sha Li:

Study on the relationship between system reliability and influencing factors under big data and multi-factors. 10275-10297 - Xiao-Feng Xie, Yang Yang, Yi-mao Zhou, Zongfang Zhou:

The clustering analysis on data and lending strategy of supply chain with information asymmetry method. 10299-10307 - Wei Gao, Muhammad Shoaib Sardar

, Sohail Zafar, Zohaib Zahid:
Coordinate descent based ontology sparse vector computing strategy and its applications. 10309-10323 - Chih-Ching Yang:

An evaluation of the FRWMA chart for dependent interval-valued data. 10325-10332 - (Withdrawn) Data mining and visualization of data-driven news in the era of big data. 10333-10346

- Jie Wan, Jinfu Liu, Guorui Ren

, Yufeng Guo, Wenbo Hao, Jilai Yu, Daren Yu
:
A universal power-law model for wind speed uncertainty. 10347-10359 - Sun Xingrong:

Research on time series data mining algorithm based on Bayesian node incremental decision tree. 10361-10370 - Wen Qi

:
Evaluating algorithms of removing EOG artifacts with experimental data in brain computer interface. 10371-10384 - Qiangfeng Wang, Yan Cao, Yu Bai, Yujia Wu, Qingyun Wu:

The data analysis of roughness extraction of target topography using minimum median plane fitting method. 10385-10395 - Retraction Note to: The model for improving big data sub-image retrieval performance using scalable vocabulary tree based on predictive clustering. 10397

- Zhichao Li, Siyun Gan, Ru Jia, Jun Fang:

Retraction Note to: Capture-removal model sampling estimation based on big data. 10399
Volume 22, Number 5, September 2019
- P. Shobha Rani, R. M. Suresh, R. Sethukarasi

:
Multi-level semantic annotation and unified data integration using semantic web ontology in big data processing. 10401-10413 - Chao Tong, Jun Li, Jinming Wen:

A polynomial time algorithm for a variant of shortest vector problem with applications in compute-and-forward design. 10415-10424 - T. Tamilvizhi

, B. Parvathavarthini
:
A novel method for adaptive fault tolerance during load balancing in cloud computing. 10425-10438 - G. Kiruthiga

, Mohanapriya M.
:
An adaptive signal strength based localization approach for wireless sensor networks. 10439-10448 - C. Deepa

, B. Latha
:
HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks. 10449-10465 - S. Beulah

, F. Ramesh Dhanaseelan:
Detection of duplicated data with minimum overhead and secure data transmission for sensor big data. 10467-10479 - D. Anandhi, M. S. Irfan Ahmed:

Prediction of user's type and navigation pattern using clustering and classification algorithms. 10481-10490 - S. Vimal

, L. Kalaivani, Madasamy Kaliappan
:
Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks. 10491-10501 - M. R. Sumalatha

, M. Ananthi
:
Efficient data retrieval using adaptive clustered indexing for continuous queries over streaming data. 10503-10517 - K. Saravanan

, A. Celine Kavida
, M. Anto Bennet:
Design of efficient wireless communication system with improved SER using different relay environment. 10519-10527 - N. Magadevi

, V. Jawahar Senthil Kumar:
Energy efficient, obstacle avoidance path planning trajectory for localization in wireless sensor network. 10529-10535 - D. Ruby, M. Vijayalakshmi, Arputharaj Kannan

:
Intelligent relay selection and spectrum sharing techniques for cognitive radio networks. 10537-10548 - Shadi A. Aljawarneh

, Muneer O. Bani Yassein
, Mohammed Aljundi:
An enhanced J48 classification algorithm for the anomaly intrusion detection systems. 10549-10565 - R. Manjula

, A. Chilambuchelvan:
An novel approach to extract the content retrieval with the image perception using collaborative community oriented sifting (CCOS). 10567-10575 - K. P. Sanal Kumar

, R. Bhavani:
Human activity recognition in egocentric video using PNN, SVM, kNN and SVM+kNN classifiers. 10577-10586 - D. Srikanth, S. Sakthivel

:
Vantage Point Latent Semantic Indexing for multimedia web document search. 10587-10594 - S. Sengole Merlin, A. Chandrasekar:

Towards mobile cloud authentication and gait based security using time warping technique. 10595-10604 - R. Dhanalakshmi

, T. Sethukarasi
:
A hybrid approach for mismatch data reduction in datasets and guide data mining. 10605-10614 - S. Velliangiri

, J. Premalatha
:
Intrusion detection of distributed denial of service attack in cloud. 10615-10623 - D. Thiyagarajan, N. Shanthi

:
A modified multi objective heuristic for effective feature selection in text classification. 10625-10635 - Ayush Sogani, Aman Jain:

Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks. 10637-10648 - Haibo Liang, Jialing Zou

, Wenlong Liang:
An early intelligent diagnosis model for drilling overflow based on GA-BP algorithm. 10649-10668 - L. Vigneash

, C. N. Marimuthu
:
Optimization of motion estimation hardware using charged system optimization with low power multipliers for H.264 encoders. 10669-10677 - V. Samuthira Pandi

, J. Martin Leo Manickam:
A novel of multi-hop transmission in integrated network of WLAN IEEE 802.11n and IEEE 802.11g using Riverbed Modeler 17.5. 10679-10686 - M. Ashwin

, Kamalraj Subramaniam, Mubarakali Azath:
Multi objective trust optimization for efficient communication in wireless M learning applications. 10687-10695 - R. Thilagavathy

, R. Sabitha:
Using cloud effectively in concept based text mining using grey wolf self organizing feature map. 10697-10707 - R. Nirmaladevi

, R. Seshasayanan:
Energy efficient parallel hybrid adder architecture for 3X generation in radix-8 booth encoding. 10709-10716 - Shihong Yao, Tao Wang, Qingfeng Guan

, Xiao Xie:
Noisy image reconstruction based on low-rank in UAV wireless transmission. 10717-10728 - L. Balaji

, K. K. Thyagharajan
:
Manifold scalable video conveyance for m-wellbeing crisis relevance. 10729-10741 - E. A. Neeba

, S. Koteeswaran
:
Bacterial foraging information swarm optimizer for detecting affective and informative content in medical blogs. 10743-10756 - J. Vijaya, E. Sivasankar:

An efficient system for customer churn prediction through particle swarm optimization based feature selection model with simulated annealing. 10757-10768 - B. Muthulakshmi

, Krishnan Somasundaram
:
A hybrid ABC-SA based optimized scheduling and resource allocation for cloud environment. 10769-10777 - M. G. Kavitha

, S. SendhilNathan:
Body area network with mobile anchor based localization. 10779-10788 - K. Vijayakumar

, Arun Chokkalingam
:
Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC. 10789-10800 - A. Franklin Alex Joseph

, C. Govindaraju
:
Channel selection using glow swarm optimization and its application in line of sight secure communication. 10801-10808 - Dodda Sunitha

, Aitha Nagaraju, Gugulothu Narsimha
:
Cross-layer based routing protocol and solution to packet reordering for TCP in MANET. 10809-10816 - A. S. Anakath, S. Rajakumar, S. Ambika:

Privacy preserving multi factor authentication using trust management. 10817-10823 - (Withdrawn) Feature selection using fish swarm optimization in big data. 10825-10837

- Munuswamy Selvi, Palani Velvizhy

, Sannasi Ganapathy
, H. Khanna Nehemiah, Arputharaj Kannan
:
A rule based delay constrained energy efficient routing technique for wireless sensor networks. 10839-10848 - S. Satheeshkumar, N. Sengottaiyan:

Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. 10849-10860 - (Withdrawn) Node discovery with development of routing tree in wireless networks. 10861-10871

- M. Aruna

, D. Bhanu, S. Karthik:
An improved load balanced metaheuristic scheduling in cloud. 10873-10881 - Guixian Xu

, Haishen Yao, Changzhi Wang:
Research on multi-feature fusion algorithm for subject words extraction and summary generation of text. 10883-10895 - K. Kanthi Kumar, Adimulam Yesu Babu, Battula Tirumala Krishna

:
Regressive group phase weighting in PTS combined with SLM approach for PAPR reduction in OFDM systems. 10897-10903 - M. Roshni Thanka

, P. Uma Maheswari
, E. Bijolin Edwin
:
An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment. 10905-10913 - R. J. Kavitha

, B. Elizabeth Caroline
:
Secured and reliable data transmission on multi-hop wireless sensor network. 10915-10924 - M. Anbu, G. S. Anandha Mala:

Feature selection using firefly algorithm in software defect prediction. 10925-10934 - Yang He, Gongfa Li, Yajie Liao, Ying Sun, Jianyi Kong, Guozhang Jiang, Du Jiang, Bo Tao, Shuang Xu, Honghai Liu

:
Gesture recognition based on an improved local sparse representation classification algorithm. 10935-10946 - G. B. S. R. Naidu, V. Malleswara Rao:

Simulation and analysis of SC-FDMA based cellular systems for LTE uplink transmission. 10947-10954 - P. M. Dinesh

, R. S. Sabenian:
Comparative analysis of zoning approaches for recognition of Indo Aryan language using SVM classifier. 10955-10962 - V. Vijeya Kaveri, V. Maheswari

:
A framework for recommending health-related topics based on topic modeling in conversational data (Twitter). 10963-10968 - Kai-Jian Xia

, Jian-qiang Wang, Jian Cai:
A novel medical image enhancement algorithm based on improvement correction strategy in wavelet transform domain. 10969-10977 - V. Murugappan, R. S. Sabeenian

:
Texture based medical image classification by using multi-scale gabor rotation-invariant local binary pattern (MGRLBP). 10979-10992 - Keming Wang, Mengchih Chang, Wencheng Wang, Gang Wang, Wentsao Pan:

Predictions models of Taiwan dollar to US dollar and RMB exchange rate based on modified PSO and GRNN. 10993-11004 - (Withdrawn) Resource allocation algorithm design of high quality of service based on chaotic neural network in wireless communication technology. 11005-11017

- M. Narendran, Periasamy Prakasam

:
An energy aware competition based clustering for cluster head selection in wireless sensor network with mobility. 11019-11028 - Venkat Vignesh

, K. Premalatha
:
Multi path interference aware reliable route path establishment in mobile adhoc network environment. 11029-11037 - Annamalai Suresh

, R. Varatharajan:
Competent resource provisioning and distribution techniques for cloud computing environment. 11039-11046 - Guangzhi Zhang

, Shaobin Cai:
Secure error-correcting (SEC) schemes for network coding through McEliece cryptosystem. 11047-11055 - Lei Wang

, Junyan Qi, Wanwan Xie, Zhizhong Liu, Zong-pu Jia:
An enhanced energy optimization routing protocol using double cluster heads for wireless sensor network. 11057-11068 - Wei Zhang

, Xinchang Zhang, Huiling Shi, Longquan Zhou:
RDDSACCGA: a reliable data distribution solution assisted by cloud computing based on genetic algorithm. 11069-11077 - M. Srividya

, M. S. Irfan Ahmed:
A filtering of message in online social network using hybrid classifier. 11079-11086 - Sudha Rajesh

, A. Chandrasekar:
Esteemed software patterns for banking system. 11087-11099 - A. Chithra, R. Shantha Selva Kumari

:
A novel 3- level energy heterogeneity clustering protocol with hybrid routing for a concentric circular wireless sensor network. 11101-11108 - (Withdrawn) Classical energy detection method for spectrum detecting in cognitive radio networks by using robust augmented threshold technique. 11109-11118

- E. Bijolin Edwin

, P. Uma Maheswari
, M. Roshni Thanka
:
An efficient and improved multi-objective optimized replication management with dynamic and cost aware strategies in cloud computing data center. 11119-11128 - Huan Wang, Min Ouyang, Zhibing Wang

, Ruishi Liang, Xin Zhou:
The power load's signal analysis and short-term prediction based on wavelet decomposition. 11129-11141 - Feijiang Huang, Junjun Zhang, Qingxiao Shan, Chenglin Cai, Huafu Liu:

The research of the plant leaves identification method based on 3-layers BP neutral network. 11143-11152 - Shuzhi Nie

:
A novel trust model of dynamic optimization based on entropy method in wireless sensor networks. 11153-11162 - Yu Zhou

, Qinchai Ren:
Fuzzy c-means clustering algorithm for performance improvement of ENN. 11163-11174 - P. Senthilraja

, B. G. Geetha:
Avoiding fuel theft in multifleet vehicles using vehicular adhoc network. 11175-11181 - C. Kanmani Pappa

, M. Vijayaraj, M. Subbulakshmi:
An optimal approach for watermarking using MRC4 encryption scheme. 11183-11191 - Harijana Devanna, Gandluru Arthur Edwin Satish Kumar, Mahendhra Nanjappa Giri Prasad:

A spatio-frequency orientational energy based medical image fusion using non-sub sampled contourlet transform. 11193-11205 - Yingwei Li

, Wen Zhao, Jiliang Chen, Weihang Kong, Xingbin Liu, Ronghua Xie:
Modeling and optimal design of fiber-optic probe for medium detection based on computer simulation. 11207-11226 - V. Karthik

, S. Suja:
Optimized multiple existence for pedestrian evacuation using geographic map-based path discovery. 11227-11236 - L. Jubairahmed, S. Satheeskumaran

, C. Venkatesan
:
Contourlet transform based adaptive nonlinear diffusion filtering for speckle noise removal in ultrasound images. 11237-11246 - Subramaniam Bharathi, Muthusamy Suganthi, Gowrison Gengavel:

Modified weighted code with bit invert approach to minimize crosstalk in network on chip links. 11247-11257 - (Withdrawn) IoT based industrial safety measures monitoring and reporting system using accident reduction model (ARM) control algorithm. 11259-11269

- S. Suresh Kumar

, H. Mangalam
:
Quantization based wavelet transformation technique for digital image compression with removal of multiple artifacts and noises. 11271-11284 - Kaliram Perumal, Suganthi Muthusamy, Gowrison Gengavel:

Robust multitier spatial domain secured color image steganography in server environment. 11285-11293 - Appasamy Sumathi

, Ranganathan Vidhyapriya
, C. Vivekanandan, Arun Kumar Sangaiah
:
Enhancing 4G Co-existence with Wi-Fi/IoT using cognitive radio. 11295-11305 - V. G. Ravindhren, S. Ravimaran:

CCMA - cloud critical metric assessment framework for scientific computing. 11307-11317 - M. Saravanan, Rajakani Kalidoss, B. Partibane, R. Karthipan:

Mitigation of mutual exclusion problem in 5G new radio standards by token and non token based algorithms. 11319-11327 - V. Resmi

, S. Vijayalakshmi
, R. Subash Chandra Boss:
An effective software project effort estimation system using optimal firefly algorithm. 11329-11338 - Sivasankari Narasimhan

, Muthukumar Arunachalam
, Rampriya Kaniram:
Reconfigurable unique key generation using variable duty cycle PUF. 11339-11349 - D. Chandirasekaran, T. Jayabarathi

:
Cat swarm algorithm in wireless sensor networks for optimized cluster head selection: a real time approach. 11351-11361 - Mandeep Kaur, Savita Gupta

:
A fusion framework based on fuzzy integrals for passive-blind image tamper detection. 11363-11378 - S. Koteeswaran

, Malarvizhi N
, E. Kannan, S. Sasikala, S. Geetha
:
Data mining application on aviation accident data for predicting topmost causes for accidents. 11379-11399 - P. Tamilselvi

, C. Ganesh Babu
:
An efficient approach to circumvent black hole nodes in manets. 11401-11409 - D. Palanivel Rajan

, S. John Alexis, S. Gunasekaran
:
Dynamic multi-keyword based search algorithm using modified based fully homomorphic encryption and Prim's algorithm. 11411-11424 - S. K. Harikarthik, V. Palanisamy, P. Ramanathan

:
Optimal test suite selection in regression testing with testcase prioritization using modified Ann and Whale optimization algorithm. 11425-11434 - Fansheng Kong

, Xiaola Lin:
The method and application of big data mining for mobile trajectory of taxi based on MapReduce. 11435-11442 - A. Vivek Yoganand, A. Celine Kavida

, D. Rukmani Devi
:
An efficient PCA based pose and occlusion invariant face recognition system for video surveillance. 11443-11456 - (Withdrawn) The application of target tracking method in power load analysis based on computer vision in complex scenes. 11457-11465

- S. Sivakumar, T. Chellatamilan

, R. Sathiyaseelan:
Discovery of optimal multicast routes in MANETs using cross-layer approach and fuzzy logic support system. 11467-11476 - S. T. Sadish Kumar, N. Kasthuri:

EEG seizure classification based on exploiting phase space reconstruction and extreme learning. 11477-11487 - K. Nirmaladevi, J. Sundararajan:

Low power NoC architecture based dynamic reconfigurable system. 11489-11500 - L. B. Xu

, X. S. Li, Y. Guo:
Gauss-core extension dependent prediction algorithm for collaborative filtering recommendation. 11501-11511 - G. Venkata Swaroop, Murugaboopathi Gurusamy

:
Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation. 11513-11525 - Guoyin Zhang, Liang Kou, Ye Yuan, Jianguo Sun, Yun Lin

, Qingan Da, Wenshan Wang:
An intelligent method of cancer prediction based on mobile cloud computing. 11527-11535 - (Withdrawn) A novel semi supervised learning algorithm for thyroid and ulcer classification in tongue image. 11537-11549

- Tang Bin

, Chunmao Jiang:
A cost-sensitive method for wireless sensor network min beacon node set construction. 11551-11559 - Guohui Zhang

, Lingjie Zhang, Xiaohui Song, Yongcheng Wang, Chi Zhou:
A variable neighborhood search based genetic algorithm for flexible job shop scheduling problem. 11561-11572 - Guohui Zhang

, Lingjie Zhang, Xiaohui Song, Yongcheng Wang, Chi Zhou:
Correction to: A variable neighborhood search based genetic algorithm for flexible job shop scheduling problem. 11573 - Yanan Li

, Peng Yang, Huajun Wang:
Short-term wind speed forecasting based on improved ant colony algorithm for LSSVM. 11575-11581 - Chuang Ma, Yongjian Yang, C. Ma:

Mobility-based sinknode-aided routing in disaster network under the background of big data. 11583-11590 - Rudra Kumar Madapuri, P. C. Senthil Mahesh:

HBS-CRA: scaling impact of change request towards fault proneness: defining a heuristic and biases scale (HBS) of change request artifacts (CRA). 11591-11599 - Hamed Vahdat-Nejad, Shaghayegh Izadpanah, Shaghayegh Ostadi Eilaki:

Context-aware cloud-based systems: design aspects. 11601-11617 - Ao Zhou, Shangguang Wang

, Ching-Hsien Hsu, Myung Ho Kim
, Kok-Seng Wong
:
Virtual machine placement with (m, n)-fault tolerance in cloud data center. 11619-11631 - Honghui Fan, Hongjin Zhu

:
Motion vector detection based on local autocorrelation coefficient. 11633-11639 - Xi Fei, Sun Youfu, Ruan Xuejun:

A rough set data prediction method based on neural network evaluation and least squares fusion. 11641-11646 - (Withdrawn) Optimal route selection in MANET based on particle swarm optimization utilizing expected transmission count. 11647-11658

- Jeeva Selvaraj

, M. Sivabalakrishnan:
Twin background model for foreground detection in video sequence. 11659-11668 - S. Lokesh

, M. Ramya Devi:
Speech recognition system using enhanced mel frequency cepstral coefficient with windowing and framing method. 11669-11679 - A. Thilagavathy, A. Chilambuchelvan:

Fuzzy based edge enhanced text detection algorithm using MSER. 11681-11687 - P. Sindhuja

, P. Ramamoorthy:
An improved fuzzy enabled optimal multipath routing for wireless sensor network. 11689-11697 - B. Umi Salma

, A. Arul Lawrence:
Improved group key management region based cluster protocol in cloud. 11699-11711 - Li Wang, Tianrui Zhang, Jiping Xu, Jiabin Yu, Xiaoyi Wang, Huiyan Zhang, Zhiyao Zhao:

An approach of improved dynamic deep belief nets modeling for algae bloom prediction. 11713-11721 - Saad Ali Amin, Mohammad Hijji, Rahat Iqbal

, Wayne Harrop, Victor Chang
:
Fuzzy expert system-based framework for flood management in Saudi Arabia. 11723-11740 - P. S. Ramesh

, S. Letitia:
An evaluation framework for auto-conversion of 2D to 3D video streaming using depth profile and pipelining technique in handheld cellular devices. 11741-11753 - Suganthi K., S. Malarvizhi:

Millimeter wave CMOS minimum noise amplifier for automotive radars in the frequency band (60-66 GHZ). 11755-11764 - N. Priya

, S. Vasantha, C. R. Ranganathan:
Defining the threshold bounds for effective modelling of aggregated IDS. 11765-11771 - L. C. Manikandan, S. Anu H. Nair

, K. P. Sanal Kumar, R. K. Selvakumar
:
A study and analysis on block matching algorithms for motion estimation in video coding. 11773-11780 - Sathyaprakash Palaniappan

, Prakasam Periasamy
:
Enhanced approach for wireless sensor network based on localization, time synchronization and quality of service routing. 11781-11790 - S. Gayathri Devi

, M. Sabrigiriraj
:
Swarm intelligent based online feature selection (OFS) and weighted entropy frequent pattern mining (WEFPM) algorithm for big data analysis. 11791-11803 - A. Christy Jeba Malar

, G. Kousalya
, Maode Ma:
Markovian model based indoor location tracking for Internet of Things (IoT) applications. 11805-11812 - S. Nirmalraj

, T. Vigneswaran:
Analog to information convertor using cascaded transform and Gaussian random matrix. 11813-11820 - J. Hemalatha

, M. K. Kavitha Devi, S. Geetha
:
Improving image steganalyser performance through curvelet transform denoising. 11821-11839 - S. Tamilarasi, J. Sundararajan:

FPGA based seizure detection and control for brain computer interface. 11841-11848 - Weiping Zhang

, Mohit Kumar, Yunfeng Zhou, Jingzhi Yang, Yihua Mao:
Analytically derived fuzzy membership functions. 11849-11876 - K. Chidambarathanu

, K. L. Shunmuganathan:
Predicting user preferences on changing trends and innovations using SVM based sentiment analysis. 11877-11881 - K. Selvakumar, R. Madonna Arieth

:
Contrast for QOS based clustered energy efficient protocol with PSO and multi-hop gateways in wireless sensor network. 11883-11890 - (Withdrawn) Edge detection of satellite image using fuzzy logic. 11891-11898

- M. Pachhaiammal@Priya, S. P. Rajagopalan

:
An efficient FMRI classification technique in cloud using multiple parallel feature selection algorithm. 11899-11907 - R. Balamurali

, A. Chandrasekar:
Multiple parameter algorithm approach for adult image identification. 11909-11917 - M. Udhayavani

, M. Chandrasekaran:
Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks. 11919-11927 - S. Madhusudhanan, M. Moorthi

:
Optimized fuzzy technique for enhancing sentiment analysis. 11929-11939 - P. Chandra Sekar

, H. Mangalam
:
Third generation memetic optimization technique for energy efficient routing stability and load balancing in MANET. 11941-11948 - K. Selvakumar, G. Revathy

:
Escalating quality of services with channel assignment and traffic scheduling in wireless mesh networks. 11949-11955 - S. Prakash, K. Sangeetha

, N. Ramkumar:
An optimal criterion feature selection method for prediction and effective analysis of heart disease. 11957-11963 - P. Sridevi:

Identification of suitable membership and kernel function for FCM based FSVM classifier model. 11965-11974 - R. Valarmathi

, T. Sheela:
Ranging and tuning based particle swarm optimization with bat algorithm for task scheduling in cloud computing. 11975-11988 - K. Selvakumar, N. Seethalakshmi:

Secure group key management protocol for mobile ad hoc networks. 11989-11995 - G. Kalaiarasi

, K. K. Thyagharajan
:
Clustering of near duplicate images using bundled features. 11997-12007 - Jian Sun, Yijing Zhang, Dan Liao, Gang Sun

, Victor Chang
:
AI-based survivable design for hybrid virtual networks for single regional failures in cloud data centers. 12009-12019 - Sathish Kumar Kannaiah

, R. Sukumar:
Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments. 12021-12028 - M. S. Gowtham

, Kamalraj Subramaniam
:
Congestion control and packet recovery for cross layer approach in MANET. 12029-12036 - S. Kalpana

, S. Chandramathi:
Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks. 12037-12047 - A. Pushpalatha, G. Kousalya

:
A prolonged network life time and reliable data transmission aware optimal sink relocation mechanism. 12049-12058 - Yang Qing

:
Selection and optimization of cooperative advertising strategies in supply chain based on stackelberg game method. 12059-12068 - A. Raja

, V. Thulasi Bai, B. Senthil
:
An enhanced channel estimation technique for CDD OFDM system over time varying channels. 12069-12075 - G. P. Raja, S. Mangai

:
Firefly load balancing based energy optimized routing for multimedia data delivery in wireless mesh network. 12077-12090 - Bin Huang, Sen Wu, Song Huang, Xiang Fu, Yunyun Yang:

Clutch control of a hybrid electrical vehicle based on neuron-adaptive PID algorithm. 12091-12099 - L. Srinivasan

, C. Nalini
:
An improved framework for authorship identification in online messages. 12101-12110 - P. Jayarajan

, R. Maheswar
, G. R. Kanagachidambaresan:
Modified energy minimization scheme using queue threshold based on priority queueing model. 12111-12118 - P. Srinivasa Ragavan

, K. Ramasamy
:
Optimized routing in wireless sensor networks by establishing dynamic topologies based on genetic algorithm. 12119-12125 - R. Palanikumar

, K. Ramasamy
:
Effective failure nodes detection using matrix calculus algorithm in wireless sensor networks. 12127-12136 - O. Vignesh

, H. Mangalam
, S. Gayathri:
FPGA architecture for text extraction from images. 12137-12146 - R. Ramya, T. Sasikala

:
A comparative analysis of similarity distance measure functions for biocryptic authentication in cloud databases. 12147-12155 - G. Shanthi, M. Sundarambal:

FSO-PSO based multihop clustering in WSN for efficient Medical Building Management System. 12157-12168 - S. Sudhakar Ilango

, S. Vimal
, Madasamy Kaliappan
, P. Subbulakshmi
:
Optimization using Artificial Bee Colony based clustering approach for big data. 12169-12177 - R. Karthika Devi, Arumugam Banumathi, Ulaganathan Gurunathan:

An automated and hybrid method for cyst segmentation in dental X-ray images. 12179-12191 - (Withdrawn) Efficient analysis of water quality measurement reporting system using IOT based system in WSN. 12193-12201

- K. Balamurugan, A. Subramani, P. Balamurugan

:
Power alert newscast planning for guaranteeing reliability in mobile wireless sensing element networks. 12203-12217 - P. Sivakumar, B. Muthu Kumar:

A novel method to detect bleeding frame and region in wireless capsule endoscopy video. 12219-12225 - T. Premakumari, M. Chandrasekaran:

Soft computing approach based malicious peers detection using geometric and trust features in P2P networks. 12227-12232 - C. Venkatesan

, P. Karthigaikumar
, R. Varatharajan:
FPGA implementation of modified error normalized LMS adaptive filter for ECG noise removal. 12233-12241 - D. Nageswari

, R. Maheswar
, G. R. Kanagachidambaresan:
Performance analysis of cluster based homogeneous sensor network using energy efficient N-policy (EENP) model. 12243-12250 - K. Chandraprabha, B. G. Geetha:

Wireless network confidence level improvement via fusion adaptive resonance theory. 12251-12261 - S. Raju, M. Chandrasekaran:

An improved neighbor cooperation using adjacent node cooperation in peer to peer networks. 12263-12274 - K. Vijayalakshmi

, P. Anandan:
A multi objective Tabu particle swarm optimization for effective cluster head selection in WSN. 12275-12282 - Xiurong Sun, Shimin Dong, Weicheng Li, Weiwei Zhang:

The numerical simulation of entire sucker rod string buckling with couplings in vertical wells. 12283-12295 - M. Nithya

, T. Sheela:
Predictive delimiter for multiple sensitive attribute publishing. 12297-12304 - C. Senthil Kumar

, R. K. Gnanamurthy
:
A Fuzzy clustering based MRI brain image segmentation using back propagation neural networks. 12305-12312 - R. Rajkumar

, A. Vasuki
:
Reversible and robust image watermarking based on histogram shifting. 12313-12323 - M. Maheswari, S. Geetha

, S. Selvakumar:
Adaptable and proficient Hellinger Coefficient Based Collaborative Filtering for recommendation system. 12325-12338 - T. Kavitha

, Rajappa Muthaiah
:
A light weight FFT based enciphering system for extending the lifetime of mobile ad hoc networks. 12339-12349 - M. Mythily

, M. L. Valarmathi
, C. Anand Deva Durai
:
Model transformation using logical prediction from sequence diagram: an experimental approach. 12351-12362 - A. Alice Nithya

, C. Lakshmi:
Enhancing iris recognition framework using feature selection and BPNN. 12363-12372 - S. Uma, P. Sarasu:

Power orient efficient multi attribute data rate maintenance scheme for QoS development of wireless networks. 12373-12379 - V. Saveetha

, S. Sophia, P. D. R. Vijayakumar:
Appliance of effective clustering technique for gene expression datasets using GPU. 12381-12388 - S. K. B. Sangeetha

, R. Dhaya
, R. Kanthavel:
Improving performance of cooperative communication in heterogeneous manet environment. 12389-12395 - N. Prasath

, J. Sreemathy:
Optimized dynamic source routing protocol for MANETs. 12397-12409 - Mohan Kowsigan

, P. Balasubramanie
:
An efficient performance evaluation model for the resource clusters in cloud environment using continuous time Markov chain and Poisson process. 12411-12419 - G. Bhuvaneswari, G. Manikandan:

An intelligent intrusion detection system for secure wireless communication using IPSO and negative selection classifier. 12429-12441 - Jianhua Zhang

, Qiang Zhu, Jinrong Zhang, Song Lin, Jilong Wang:
A novel algorithm for threshold image denoising based on wavelet construction. 12443-12450 - Hui Liu

, Shaohua Xu, Xinmin Ge, Jianyu Liu, Muhammad Aleem Zahid
:
Automatic sedimentary microfacies identification from logging curves based on deep process neural network. 12451-12457 - Absa Stephen

, Shajulin Benedict
, R. P. Anto Kumar
:
Monitoring IaaS using various cloud monitors. 12459-12471 - Xin Feng

, Xin Zhang, Jing Zhang, Ali Ahmed Muhdhar:
A coverage hole detection and repair algorithm in wireless sensor networks. 12473-12480 - S. Selvi, M. Chandrasekaran:

Performance evaluation of mathematical predictive modeling for air quality forecasting. 12481-12493 - A. Vaniprabha

, P. Poongodi:
Augmented lightweight security scheme with access control model for wireless medical sensor networks. 12495-12505 - (Withdrawn) Registry service selection based secured Internet of Things with imperative control for industrial applications. 12507-12519

- P. Radhika

, T. Vigneswaran, J. Selvakumar:
Design of high performance filter bank multi-carrier transmitter. 12521-12527 - Yingmin Zhang

, Yujing Chen, Wenquan Luo, Jing Zhang, Dong Wang:
Game analysis of XBRL taxonomy extension. 12529-12538 - (Withdrawn) Research on the access control protocol Priccess design of network privacy protection. 12539-12550

- Lu Tong

, Lei Nie, Gen-cai Guo, Nuannuan Leng
, Ruo-xi Xu:
Layout scheme of high-speed railway transfer hubs: bi-level modeling and hybrid genetic algorithm approach. 12551-12566 - Shuo Wang, Jing Li, Qiqi Wang, Hongjie Zhang

:
Nxt-Max: for supporting VDC-based maximum redundant bandwidth allocation in cloud datacenter. 12567-12580 - (Withdrawn) Research on the intelligent judgment of traffic congestion in intelligent traffic based on pattern recognition technology. 12581-12588

- Kun Lang, Mingyuan Zhang, Yongbo Yuan, Xijian Yue:

Short-term load forecasting based on multivariate time series prediction and weighted neural network with random weights and kernels. 12589-12597 - Haibo Liang

, Wang Zhi:
Application of an intelligent early-warning method based on DBSCAN clustering for drilling overflow accident. 12599-12608 - Qingqing Fu, Mehmet Celenk

, Aiping Wu
:
An improved algorithm based on CLAHE for ultrasonic well logging image enhancement. 12609-12618 - Wei Zhang, Sui-xi Kong, Yanchun Zhu, Xiao-le Wang:

Sentiment classification and computing for online reviews by a hybrid SVM and LSA based approach. 12619-12632 - Mingdong Sun, Xuyong Li, Gwangseob Kim:

Precipitation analysis and forecasting using singular spectrum analysis with artificial neural networks. 12633-12640 - Guangxing Wei

, Binta Bary, Yanhong Qin:
Sorted or pooled? Optimal tournament design for heterogeneous contestants. 12641-12648 - Chaochun Yuan

, Hanning Chen, Jie Shen, Na Lin, Weixing Su, Fang Liu, Xiaodan Liang:
Indicator-based multi-objective adaptive bacterial foraging algorithm for RFID network planning. 12649-12657 - Ke Zheng

, Dunyao Zhu:
A novel clustering algorithm of extracting road network from low-frequency floating car data. 12659-12668 - Zhixiang Zhang, Zining Zhao, Yongling Fu:

Dynamics analysis and simulation of six DOF parafoil system. 12669-12680 - M. Anand, T. Sasikala

:
Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol. 12681-12687 - R. Bhuvaneswari

, R. Ramachandran:
Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. 12689-12699 - C. J. Raman

, Visumathi James
:
FCC: Fast congestion control scheme for wireless sensor networks using hybrid optimal routing algorithm. 12701-12711 - Nafeena Rahamathullah, M. Willjuice Iruthayarajan:

Redundant placement of phasor measurement unit using multi objective evolutionary algorithms based on modified spectral clustering. 12713-12725 - (Withdrawn) A cluster based mobile data gathering using SDMA and PSO techniques in WSN. 12727-12736

- A. Vishnu Kumar

, V. Krishnakumar, A. Nirmal Kumar:
Efficient performance upsurge in live migration with downturn in the migration time and downtime. 12737-12747 - L. Sudha, P. Thangaraj:

Improving energy utilization using multi hop data aggregation with node switching in wireless sensor network. 12749-12757 - ATA Kishore Kumar, R. Seshasayanan:

Optimization of logarithmic converter for LNS based SOC. 12759-12766 - M. Jaganathan, A. Sabari:

An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy. 12767-12776 - N. Manikanda Devarajan

, M. Chandrasekaran:
An efficient and low power impulsive noise suppressor architecture for OFDM system. 12777-12783 - Rajarathinam Senthilkumar

, Ramasamy Kannan Gnanamurthy
:
A robust wavelet based decomposition of facial images to improve recognition accuracy in standard appearance based statistical face recognition methods. 12785-12794 - Ambayiram Chinnasamy

, B. Sivakumar
, PrabathKumar Selvakumari
, A. Suresh:
Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET. 12795-12804 - M. A. P. Manimekalai, N. A. Vasanthi

:
Hybrid Lempel-Ziv-Welch and clipped histogram equalization based medical image compression. 12805-12816 - D. Chitra, V. Sujitha

:
Security analysis of prealigned fingerprint template using fuzzy vault scheme. 12817-12825 - S. Nalini

, P. Balasubramanie
:
Socia media opinions aware adverse drug effect prediction and prevention system for the secured health care medical environment. 12827-12837 - T. Senthilnathan, P. Prabu

, R. Sivakumar, S. Sakthivel
:
An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment. 12839-12847 - Kalaiselvi Kaliannan

, G. R. Suresh
, V. Ravi:
Genetic algorithm based sensor node classifications in wireless body area networks (WBAN). 12849-12855 - G. Sahaya Stalin Jose

, C. Seldev Christopher
:
Secure cloud data storage approach in e-learning systems. 12857-12862 - (Withdrawn) Qos improvement based security enhancement for link activity monitoring service in mobile ad hoc network. 12863-12869

- B. Selvalakshmi, M. Subramaniam:

Intelligent ontology based semantic information retrieval using feature selection and classification. 12871-12881 - (Withdrawn) Maximizing quality of multimedia streaming services in heterogeneous wireless networks using optimal multi-server technique. 12883-12895

- (Withdrawn) Classification of malignant melanoma and benign skin lesion by using back propagation neural network and ABCD rule. 12897-12907

- G. Venkatesh

, K. Arunesh
:
Map Reduce for big data processing based on traffic aware partition and aggregation. 12909-12915 - K. M. Baalamurugan

, S. Vijay Bhanu:
An efficient clustering scheme for cloud computing problems using metaheuristic algorithms. 12917-12927 - C. Peter Devadoss

, B. Sankaragomathi
:
Near lossless medical image compression using block BWT-MTF and hybrid fractal compression techniques. 12929-12937 - R. Swathika, T. Sree Sharmila

:
Image fusion for MODIS and Landsat images using top hat based moving technique with FIS. 12939-12947 - Wei Liu

:
Oil pipeline leak signal image recognition based on improved data field theory. 12949-12957 - (Withdrawn) Continuous user authentication based score level fusion with hybrid optimization. 12959-12969

- Yu Jiang

, Aiqun Hu, Jie Huang:
A lightweight physical-layer based security strategy for Internet of things. 12971-12983 - Bing He

, Jiangtao Cui:
Weighted spherical Bessel-Fourier image moments. 12985-12996 - Xiaoling Xu, Mei Liu, Jianbin Xiong, Gaowei Lei:

Key technology and application of millimeter wave communications for 5G: a survey. 12997-13009 - (Withdrawn) Development trend of sharing economy in big data era based on duplication dynamic evolution game theory. 13011-13019

Volume 22, Number 6, November 2019
- M. Sabrigiriraj

, R. Karthik
:
Wide-sense nonblocking multicast in optical WDM networks. 13021-13026 - V. Balamurugan

, R. Saravanan:
Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. 13027-13039 - Chao Wang, Yanbin Peng, Dongfang Li, Zhenhua Pan, Hongbin Deng, Dongguang Li, Bin Li:

Turning strategy of snake-like robot based on serpenoid curve under cloud assisted smart conditions. 13041-13053 - Ramkumar Jayaraman

, Gunasekaran Raja
:
Channel assignment based coding mechanism for reliable transmission for smart cities. 13055-13065 - Xuebiao Zhu, Kuisheng Chen, Yanan Wang, Huasheng Zheng:

Adaptive PID controller for cloud smart city system stability control based on chaotic neural network. 13067-13075 - Wenzhun Huang, Haoxiang Wang, Yucheng Zhang, Shanwen Zhang:

A novel cluster computing technique based on signal clustering and analytic hierarchy model using hadoop. 13077-13084 - S. Thanga Ramya, Bhuvaneshwari Arunagiri

, P. Rangarajan:
Novel effective X-path particle swarm optimization based deprived video data retrieval for smart city. 13085-13094 - Praveen Kumar Reddy Maddikunta

, Madda Rajasekhara Babu:
A hybrid cluster head selection model for Internet of Things. 13095-13107 - Yan-tian Zhang, Haoxiang Wang, Yan-zhao Xie:

An intelligent hybrid model for power flow optimization in the cloud-IOT electrical distribution network. 13109-13118 - M. Lilly Florence

, Dhina Suresh
:
Enhanced secure sharing of PHR's in cloud using user usage based attribute based encryption and signature with keyword search. 13119-13130 - M. Kavitha, B. G. Geetha:

An efficient city energy management system with secure routing communication using WSN. 13131-13142 - Rajeev Kumar Bedi, Jaswinder Singh

, Sunil Kumar Gupta:
Design and implementation of an efficient multi cloud storage approach for resource constrained mobile devices. 13143-13157 - S. Kumar Chandar:

Stock market prediction using subtractive clustering for a neuro fuzzy hybrid approach. 13159-13166 - Li Liu, Xiuguang Bai, Zhide Jiang:

The generic technology identification of saline-alkali land management and improvement based on social network analysis. 13167-13176 - (Withdrawn) A scheme for detecting outliers using sequential adjacency among entities. 13177-13183

- N. Thangarasu

, A. Arul Lawrence Selvakumar
:
Improved elliptical curve cryptography and Abelian group theory to resolve linear system problem in sensor-cloud cluster computing. 13185-13194 - T. Maragatham

, S. Karthik, Reddipalayam Murugeshan Bhavadharini
:
TCACWCA: transmission and collusion aware clustering with enhanced weight clustering algorithm for mobile ad hoc networks. 13195-13208 - Abida Sharif

, Jian Ping Li, Muhammad Irfan Sharif
:
Internet of Things network cognition and traffic management system. 13209-13217 - Shengchao Su, Shuguang Zhao:

A novel virtual force-based data aggregation mechanism with mobile sink in wireless sensor networks. 13219-13234 - FengJun Hu

:
Simulation and analysis of airbag parameter variation under different gas flows. 13235-13245 - Yimin Zheng, Guoli Ji, Zhuo-Yun Nie, Jiangyin Huang:

Research on a reduced order closed-loop identification algorithms based on AIC for process with time delay. 13247-13260 - Du Jiang

, Zujia Zheng, Gongfa Li, Ying Sun, Jianyi Kong, Guozhang Jiang, Hegen Xiong, Bo Tao, Shuang Xu, Hui Yu
, Honghai Liu, Zhaojie Ju
:
Gesture recognition based on binocular vision. 13261-13271 - Ya Bi, Mei Xiang, Florian Schäfer, Alan Lebwohl, Cunfa Wang:

A simplified and efficient particle swarm optimization algorithm considering particle diversity. 13273-13282 - Biao Wang

, Kelei Feng, Wenzhong Yang, Zhiyu Zhu:
Study on multiple targets tracking algorithm based on multiple sensors. 13283-13291 - (Withdrawn) Visualization model of big data based on self-organizing feature map neural network and graphic theory for smart cities. 13293-13305

- K. Rama Abirami

, M. G. Sumithra:
Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection. 13307-13316 - J. Deepa, J. Sutha

:
A new energy based power aware routing method for MANETs. 13317-13324 - Yong Wang, Changzhao Liu, Yinghua Liao:

Electromechanical dynamic analysis for the DTC induction motor driving system of the unmanned long-wall shearer drum. 13325-13336 - Chao Wang, Qingzhen Xu, Xiuli Lin, Shouqiang Liu:

Research on data mining of permissions mode for Android malware detection. 13337-13350 - Kanta Prasad Sharma

, Ramesh Chandra Poonia, Surendra Sunda
:
Map matching algorithm: curve simplification for Frechet distance computing and precise navigation on road network using RTKLIB. 13351-13359 - K. Veena, K. Meena

:
Implementing file and real time based intrusion detections in secure direct method using advanced honeypot. 13361-13368 - S. U. Aswathy, G. Glan Devadhas, S. S. Kumar:

Brain tumor detection and segmentation using a wrapper based genetic algorithm for optimized feature set. 13369-13380 - S. Dhanasekaran, V. Vasudevan:

A Cognizant agent system for optimizing cloud service searching strategy. 13381-13386 - K. P. Sai Pradeep

, S. Suresh Kumar
:
Design and development of high performance MOS current mode logic (MCML) processor for fast and power efficient computing. 13387-13395 - V. Sarada

, T. Vigneswaran, J. Selvakumar:
Low-power and high-throughput 128-point feedforward FFT processor. 13397-13404 - Aiying Guo, Meihua Xu, Feng Ran, Haiyong Wang:

A novel medical internet of things perception system based on visual image encryption and intrusion detection. 13405-13413 - T. Gayathri Devi

, P. Neelamegam:
Image processing based rice plant leaves diseases in Thanjavur, Tamilnadu. 13415-13428 - S. Velmurugan, S. Selvarajan:

A multimodal authentication for biometric recognition system using hybrid fusion techniques. 13429-13436 - P. Y. Muhammed Anshad, S. S. Kumar, Shajeem Shahudheen:

Segmentation of chondroblastoma from medical images using modified region growing algorithm. 13437-13444 - A. Kumaravel, M. Chandrasekaran:

Performance analysis of malicious node detection in MANET using ANFIS classification approach. 13445-13452 - K. Vanitha

, A. M. J. Zubair Rahaman:
Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol. 13453-13461 - H. Nazini, T. Sasikala

:
Simulating aircraft landing and take off scheduling in distributed framework environment using Hadoop file system. 13463-13471 - S. Sudhakar Ilango

, V. Seenivasagam, R. Madhumitha:
Hybrid two-dimensional dual tree - biorthogonal wavelet transform and discrete wavelet transform with fuzzy inference filter for robust remote sensing image compression. 13473-13486 - P. Manivannan

, Chenniangirivalasu Sadhasivam Kanimozhi Selvi
:
Pairwise relative ranking technique for efficient opinion mining using sentiment analysis. 13487-13497 - Madhumitha Ramamurthy

, Ilango Krishnamurthi, S. Sudhakar Ilango
, Shanthi Palaniappan
:
Discrete model based answer script evaluation using decision tree rule classifier. 13499-13510 - Anbalagan Karthikeyan

, Prabhakaran K. K.
, Chilakapati Nagamani:
FPGA based direct torque control with speed loop Pseudo derivative controller for PMSM drive. 13511-13519 - M. Ravi Kumar, Y. Srinivasa Rao:

Epileptic seizures classification in EEG signal based on semantic features and variational mode decomposition. 13521-13531 - S. Arun Jees

, Gomathi Venugopal:
Load forecasting for smart grid using non-linear model in Hadoop distributed file system. 13533-13545 - Ahsan Hussain

, Bettahally N. Keshavamurthy:
An enhanced communication mechanism for partitioned social overlay networks using modified multi-dimensional routing. 13547-13558 - A. Pugazhenthi, D. Chitra:

Secured and memory overhead controlled data authentication mechanism in cloud computing. 13559-13567 - V. Shenbaga Priya, D. Ramyachitra:

Modified Genetic Algorithm (MGA) based feature selection with Mean Weighted Least Squares Twin Support Vector Machine (MW-LSTSVM) approach for vegetation classification. 13569-13581 - G. Anitha

, S. Baghavathi Priya:
Posture based health monitoring and unusual behavior recognition system for elderly using dynamic Bayesian network. 13583-13590 - E. Punarselvam

, Ponnan Suresh:
Investigation on human lumbar spine MRI image using finite element method and soft computing techniques. 13591-13607 - S. Gopinath

, K. Vinoth Kumar, T. Jaya Sankar
:
Secure location aware routing protocol with authentication for data integrity. 13609-13618 - Junyang Zhang, Yang Guo, Xiao Hu:

Research on image tagging algorithm on internet. 13619-13625 - Jing Chen, Wei Zhao

:
Logistics automation management based on the Internet of things. 13627-13634 - B. Suresh Chander Kapali, S. Muttan:

Diagnosis of thyroid dysfunction in human blood using non-invasive method: infra red light emitting diode technique. 13635-13644 - D. Subitha

, J. Magdalene Mathana:
A novel low complexity downlink linear precoding algorithm for massive MIMO systems. 13645-13652 - S. Ayshwarya Lakshmi

, S. A. Sahaaya Arul Mary
:
Multi-agent learning technique inspired from software engineering model for permutation coded GA. 13653-13667 - S. Umadevi, T. Vigneswaran:

Reliability improved, high performance FIR filter design using new computation sharing multiplier: suitable for signal processing applications. 13669-13681 - Fan Yao:

Damaged region filling by improved criminisi image inpainting algorithm for thangka. 13683-13691 - Junmin Hu:

E-commerce big data computing platform system based on distributed computing logistics information. 13693-13702 - (Withdrawn) Investigation on application of association rule algorithm in English teaching logistics information. 13703-13709

- Shenghong Ding, Yuefan Ma, Hongxia Zhou:

Implementation of dynamic credit rating method based on clustering and classification technology. 13711-13721 - Ye Bai:

Research on the effect of psychological stress intervention in music students based on Diffie-Hellman key exchange algorithm. 13723-13729 - Huping Wang, Zhichao Wang, Sanqing Ding:

Optimization of teaching management in colleges and universities based on dynamic programming. 13731-13738 - Qing Tian, Xinxing Duan:

Teaching expansion analysis based on computer assisted diversified teaching. 13739-13744 - (Withdrawn) Interior design and pattern innovation design study based on generic algorithm logistics information. 13745-13751

- Jing Yan, Liguo Li:

Research on semantic association vector MSAV feature selection based on Sal-F algorithm. 13753-13759 - Joel Josephson Pottipadu

, R. Ramesh:
A novel algorithm for real time task scheduling in multiprocessor environment. 13761-13771 - S. Subathradevi, C. Vennila

:
Systolic array multiplier for augmenting data center networks communication link. 13773-13783 - (Withdrawn) A wrapper based feature selection in bone marrow plasma cell gene expression data. 13785-13796

- ZhiChao Wang, Qing Tian, Xinxing Duan:

Research on the evaluation index system of college students' class teaching quality based on association algorithm. 13797-13803 - Ximei Li:

The design of financial risk control system platform for private lending logistics information. 13805-13811 - Hao Liu:

The research of theoretical construction and effect of preschool wisdom education system in the background of big data. 13813-13819 - (Withdrawn) Analysis of intelligent evaluation algorithm based on english diagnostic system. 13821-13826

- Quan Guo:

Logistics supply chain management based on business ecology theory. 13827-13833 - Zhixiang Jin:

Research on evaluation of public sports service in stadiums based on FNN algorithm. 13835-13842 - Tao Yang, Dongmei Fu, Xiaogang Li

, Kamil Ríha:
Manifold regularized multiple kernel learning with Hellinger distance. 13843-13851 - T. Rajesh

, R. Suja Mani Malar, Murugesan Rangabai Geetha:
Brain tumor detection using optimisation classification based on rough set theory. 13853-13859 - Chunhua Wang, Dong Han:

Credit card fraud forecasting model based on clustering analysis and integrated support vector machine. 13861-13866 - (Withdrawn) Research on art innovation teaching platform based on data mining algorithm. 13867-13872

- (Withdrawn) Research on the mechanism and influence factors of urban style building based on cloud computing logistics information. 13873-13880

- Fang Wang:

Computer art design based on artificial intelligence. 13881-13887 - (Withdrawn) Dynamic game model analysis of marketing resources allocation optimization. 13889-13896

- Dan Liao, Yulong Wu, Ziyang Wu, Zeyuan Zhu, Wanting Zhang, Gang Sun

, Victor Chang
:
AI-based software-defined virtual network function scheduling with delay optimization. 13897-13909 - Xiangxiao Lei

, Honglin Ouyang:
Image segmentation algorithm based on improved fuzzy clustering. 13911-13921 - B. Monica Jenefer, Velanganny Cyril Raj:

An innovative hybrid mathematical hierarchical regression model for breast cancer diseases analysis. 13923-13936 - (Withdrawn) Application of the slicing technique to extract the contour feature line. 13937-13943

- D. Kirubha, K. Ramar

:
MCCA scheduling for enhancing QoS based video streaming for video surveillance applications. 13945-13955 - S. Sathish Kumar

, P. Manimegalai
, S. Karthik:
A rough set calibration scheme for energy effective routing protocol in mobile ad hoc networks. 13957-13963 - Senthil Murugan Nagarajan

, Usha Devi Gandhi
:
Feature extraction using LR-PCA hybridization on twitter data and classification accuracy using machine learning algorithms. 13965-13974 - T. V. Padmavathy, M. N. Vimalkumar

, D. S. Bhargava:
Adaptive clustering based breast cancer detection with ANFIS classifier using mammographic images. 13975-13984 - T. V. Padmavathy, P. Venkatesh, D. S. Bhargava, Nagarajan Sivakumar

:
Design of I-shaped dual C-slotted rectangular microstrip patch antenna (I-DCSRMPA) for breast cancer tumor detection. 13985-13993 - Jie Tang

, Xin Bian:
A novel low complexity lattice reduction algorithm for MIMO detection. 13995-14001 - Xiaomo Yu, Xiaoping Liao, Wenjing Li, Xinquan Liu, Tao Zhang:

Logistics automation control based on machine learning algorithm. 14003-14011 - Fei Chen, Zhongguang Fu, Zhiling Yang:

Wind power generation fault diagnosis based on deep learning model in internet of things (IoT) with clusters. 14013-14025 - A. Umamaheswari, B. Kalaavathi:

Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model. 14027-14034 - (Withdrawn) Enhanced firefly algorithm (EFA) based gene selection and adaptive neuro neutrosophic inference system (ANNIS) prediction model for detection of circulating tumor cells (CTCs) in breast cancer analysis. 14035-14047

- Zhilin Zhu, Xiaojian Liu:

A formal framework for software faults and permissions based on unified theory of programming. 14049-14059 - Ramakrishnan Ramanathan

, B. Latha
:
Towards optimal resource provisioning for Hadoop-MapReduce jobs using scale-out strategy and its performance analysis in private cloud environment. 14061-14071 - (Withdrawn) Energy efficient scheduling for cloud data centers using heuristic based migration. 14073-14080

- (Withdrawn) A voxel based morphometry approach for identifying Alzheimer from MRI images. 14081-14089

- M. Rajani Devi, K. Ramanjaneyulu, Battula Tirumala Krishna

:
Performance analysis of sub-interleaver based turbo codes. 14091-14097 - V. Velmurugan, J. Martin Leo Manickam:

A efficient and reliable communication to reduce broadcast storms in VANET protocol. 14099-14105 - Weiping Zhang, Mohit Kumar, Jingzhi Yang, Yunfeng Zhou, Yihua Mao:

An adaptive fuzzy filter for image denoising. 14107-14124 - (Withdrawn) Improved swarm intelligence algorithm for protein folding prediction. 14125-14134

- Yuan Cao, Lianchuan Ma

, Yuzhuo Zhang:
Application of fuzzy predictive control technology in automatic train operation. 14135-14144 - Shuo Xiao, Tianxu Li, Yan Yan, Jiayu Zhuang

:
Compressed sensing in wireless sensor networks under complex conditions of Internet of things. 14145-14155 - (Withdrawn) Cloud platform wireless sensor network detection system based on data sharing. 14157-14168

- Shruti Aggarwal

, Paramvir Singh:
Cuckoo, Bat and Krill Herd based k-means++ clustering algorithms. 14169-14180 - Xuesong Zhai

, Yan Dong, Shengfen Wang, Li Wang, Jing Yuan:
Exploring eye-tracking analyses of EFL learners' cognitive processing of reduced relative clause. 14181-14192 - Ruishan Du, Fuhua Shang, Nan Ma:

Automatic mutation feature identification from well logging curves based on sliding t test algorithm. 14193-14200 - Fei Shao

, Wei Zhao
, ZiNan Chang:
Suppress traffic-driven epidemic spreading in weighted network. 14201-14206 - Yupei Yan

, Sengfat Wong:
A navigation algorithm of the mobile robot in the indoor and dynamic environment based on the PF-SLAM algorithm. 14207-14218 - S. Velmurugan, A. Mahabub Basha, M. Vijayakumar:

Gabor wavelet multi-linear discriminant analysis for data extraction in ECG signals. 14219-14229 - N. Anithadevi

, M. Sundarambal:
A design of intelligent QoS aware web service recommendation system. 14231-14240 - Kandala Kalyana Srinivas

, Teppala Venkata Ramana:
Diligent inquiry of lower level atmospheric clouds attenuation on earth space path links for certain Indian localities. 14241-14251 - Mohd. Sherfuddin Khan

, E. G. Rajan, Vijay H. Mankar:
Novel algorithm for generating basis convex hexagonal polygons and polyhedrons. 14253-14267 - Shuaiqi Liu, Wei Cui, Long Zhang

:
Research on enterprise bidding mode selection and control strategy. 14269-14276 - Kulothungan Vedavalli, Narayanan Muruganantham:

Defended data transmission scheme based reliable metering for smart grid applications. 14277-14285 - L. Maria Michael Visuwasam

, D. Paul Raj:
NMA: integrating big data into a novel mobile application using knowledge extraction for big data analytics. 14287-14298 - R. Saranya, S. Senthamarai Kannan, S. Meenakshi Sundaram

:
Integrated quantum flow and hidden Markov chain approach for resisting DDoS attack and C-Worm. 14299-14310 - Siyu Bai, Wei Cui, Long Zhang

:
The Granger causality analysis of stocks based on clustering. 14311-14316 - Mei Li, Jiasheng Song, Gaofei Wang, Peiyou Chen:

A complex contract negotiation model based on hybrid intelligent algorithm. 14317-14325 - Zhongshan Wang

, Yang Xia:
Model establishment of body attitude adjustment system based on Backstepping control algorithm and automatic leveling technology. 14327-14337 - Zhenhu Ning, Yongli Yang

, Yahao Zhang:
Research on the trusted protection technology of internet of things. 14339-14348 - (Withdrawn) Application of ARIMA and SVM mixed model in agricultural management under the background of intellectual agriculture. 14349-14358

- Ye Chen, Xiaoping Yuan, Xiaohui Cang

:
Two hypotheses and test assumptions based on Quantum-behaved Particle Swarm Optimization (QPSO). 14359-14366 - Xin Li, Chunyang Wang

, Hui Yuan, Junpeng Shi:
Smeared spectrum jamming suppression based on time unit analysis and polarization cancellation. 14367-14375 - Xijun Ye, Zhuo Sun, Bingcong Chen:

Research on modal parameters identification of bridge structure based on adaptive signal de-noising method. 14377-14387 - Xuhong Wang

, Yiming Zhang, Junxia Gao:
Research on a novel variable-frequency and phase-shift control method based on a high-voltage and high-power full-bridge converter. 14389-14400 - Jialin Zhang, Yiming Zhang, Xinyue Feng, Junxia Gao:

Research on a new type of electromagnetic transmitter based on PWM technology. 14401-14410 - Jui-Pei Hsu, Cherng-Shing Lin:

Numerical analysis of fire consequences and effective solutions in a corn starch explosion fire based on computational fire dynamics simulator. 14411-14418 - Yonggang Ding, Shijun Li, Wei Yu:

Multi-criteria recommendation schemes based on factorization machines. 14419-14426 - Yanhong Dai:

Design of interactive intelligent assistant translation platform based on multi-strategies. 14427-14433 - Pengzhen Cai, Qijie Jiang:

GIS spatial information sharing of smart city based on cloud computing. 14435-14443 - Hui Wang:

Feasibility study of China's foreign trade transformation and upgrading mode based on maximum flow algorithm. 14445-14450 - Weida Zhan, Ziqiang Hao, Rui Li, Yanfeng Tang, Yijun Wang:

Influence mechanism of repetition frequency on pulse position modulation in deep space laser communication. 14451-14460 - Valliyammai Chinnaiah

, Devakunchari Ramalingam:
Distributed and scalable Sybil identification based on nearest neighbour approximation using big data analysis techniques. 14461-14476 - Zhongbao Zhou, Xianghui Liu, Helu Xiao, Shijian Wu, Yueyue Liu

:
A DEA-based MOEA/D algorithm for portfolio optimization. 14477-14486 - Haozhe Cao, Yanxuan Wu, Zhengjie Wang:

Consensus disturbance rejection with channel uncertainties in directed leader-following network system. 14487-14493 - S. B. Mohan, T. A. Raghavendiran, R. Rajavel:

Patch based fast noise level estimation using DCT and standard deviation. 14495-14504 - M. Dhamodaran, Subramani Jegadeesan

, R. Praveen Kumar:
Computation of the fluid flow and the temperature field by finite element modeling. 14505-14511 - N. Shankar, S. Sathish Babu, C. Viswanathan

:
Bone trabecular analysis of proximal femur radiographs for the detection of osteoporosis using anisotropic Morlet wavelet transform. 14513-14523 - (Withdrawn) Application of Monte Carlo calculation method based on special graph in medical imaging. 14525-14539

- B. Madhusudhanan, P. Sumathi, N. Shunmuga Karpagam, A. Mahesh

, P. Anlet Pamila Suhi:
An hybrid metaheuristic approach for efficient feature selection. 14541-14549 - S. Venkatraman

, P. Arun Raj Kumar
:
Improving Adhoc wireless sensor networks security using distributed automaton. 14551-14557 - Neelamadhab Padhy

, R. P. Singh, Suresh Chandra Satapathy:
Cost-effective and fault-resilient reusability prediction model by using adaptive genetic algorithm based neural network for web-of-service applications. 14559-14581 - R. Uma

, B. Latha
:
Noise elimination from web pages for efficacious information retrieval. 14583-14602 - Rama Devi Boddu

:
Load factor optimization using intelligent shifting algorithms in a smart grid tree network. 14603-14614 - Tong Wang, Ziqiang Hao, Hongzuo Li, Weida Zhan, Rui Li:

Error rate performance of differential multi-pulse position modulation. 14615-14623 - A. Christiyana Arulselvi

, Sendhilkumar Selvaraju
, G. S. Mahalakshmi:
Identifying trusted similar users using stochastic model and next-closure based knowledge model in online social networks. 14625-14635 - Sathya Chinnathambi, Agilan Santhanam, Rajarathinam Jeyarani, M. Senthilkumar:

Scheduling and checkpointing optimization algorithm for Byzantine fault tolerance in cloud clusters. 14637-14650 - Zhiping Wan, Shaojiang Liu, Weichuan Ni, Zhiming Xu

:
An energy-efficient multi-level adaptive clustering routing algorithm for underwater wireless sensor networks. 14651-14660 - (Withdrawn) Establishment of feature set prediction model based on image processing technology. 14661-14668

- Jin Zhu, Jiansong Li, Zilong Jiang

:
Spatial-temporal correlation dimension reduction and unsteady granger driving factor in regional varied earth surface in GIS. 14669-14677 - Yan Xia, Jianxiao Zou, Kai Li

, Zesheng Min, Lang Du:
Optimized virtual space vector modulation for three-phase three-level T-type converter. 14679-14687 - Jianting Fu, Zhen Zhang, Dan Lyu:

Research and application of information service platform for agricultural economic cooperation organization based on Hadoop cloud computing platform environment: taking agricultural and fresh products as an example. 14689-14700 - Xinyu Pan, Jing-zhong Ma, Daozhi Zhao:

Study on pricing behaviour and capacity allocation of cloud manufacturing service platform. 14701-14707 - Nattar Kannan

, S. Sivasubramanian, Madasamy Kaliappan
, S. Vimal
, Annamalai Suresh
:
Predictive big data analytic on demonetization data using support vector machine. 14709-14720 - Lulu Gao, Fei Li, Xiang Xu, Yong Liu:

Intrusion detection system using SOEKS and deep learning for in-vehicle security. 14721-14729 - Pon. Partheeban

, V. Kavitha:
Dynamic key dependent AES S-box generation with optimized quality analysis. 14731-14741 - M. Niranjanamurthy

, B. N. Nithya
, S. Jagannatha:
Analysis of Blockchain technology: pros, cons and SWOT. 14743-14757 - Yongkang Wang, Chunxia Chen, Qijie Jiang:

Security algorithm of Internet of Things based on ZigBee protocol. 14759-14766 - Feng Xiong, Peisong Gong, Peng Jin, J. F. Fan:

Supply chain scheduling optimization based on genetic particle swarm optimization algorithm. 14767-14775 - Gokulnath Chandra Babu

, Shantharajah S. Periyasamy:
An optimized feature selection based on genetic approach and support vector machine for heart disease. 14777-14787 - Shankar Nayak Bhukya

, Suresh Pabboju
:
Software engineering: risk features in requirement engineering. 14789-14801 - Nguyen Thi Hong Yen

, Hongkun Chen, Giang Le-Thach:
Study on VSC-HVDC grid topology of offshore wind farms. 14803-14810 - Shuling Zhu:

Research on data mining of education technical ability training for physical education students based on Apriori algorithm. 14811-14818 - Shan Wang, YueXing Wang, Huiling Shang, Chunxiang Shi:

Multimodal computer image recognition based on depth neural network. 14819-14825 - (Withdrawn) The application researches of visualized data mining technique in urban underground space based on GIS. 14827-14833

- Yuping Zeng:

Parameter optimization of plug-in hybrid electric vehicle based on quantum genetic algorithm. 14835-14843 - Weibin Wang, Xiaolong Chen, Chengfu Wang, Henry Ren He:

An improved preference method for the FAST TCP protocol parameter. 14845-14853 - Yajun Wang, Fuming Sun

, Dongjuan Li:
On-line modeling and monitoring for multi-operation batch processes with infinite data types. 14855-14866 - Xuejun Yu, Jing Wang:

A preliminary study of automatic generation of credibility test cases based on immune algorithm. 14867-14875 - Rambabu Pemula

, C. Naga Raju:
Hash based manifold learning technique to generating random fields for image segmentation. 14877-14888 - Chaoqun Niu:

Study of enterprise management training based on cluster computing. 14889-14895 - Bo Huang, Xijun Lan:

English corpus and literary analysis based on statistical language model. 14897-14903 - Yifan Huang, Bo Chen, Xiaoyan Ma:

Research on the status and problems of psychological teaching in colleges and universities based on Diffie-Hellman key exchange algorithm. 14905-14911 - Yi Xu:

Design and research of bank Internet financial product pricing model. 14913-14918 - Fanyong Zhang, Qiansheng Gong:

Application of industry linkage path algorithm in western energy development. 14919-14926 - (Withdrawn) Research on emotional model of sports arena based on artificial intelligence emotion calculation. 14927-14933

- (Withdrawn) Analysis and study on the key factors of regional tourism development based on discrete differential algorithm. 14935-14941

- Yinjiao Long:

Research on art innovation teaching platform based on data mining algorithm. 14943-14949 - Limin Chen, Zhuohang Li:

Research on the price analysis and prediction method of agricultural products based on logistics information. 14951-14957 - (Withdrawn) Application effect analysis of the test system of track and field web course based on software programming method. 14959-14971

- Cherng-Shing Lin, Jui-Pei Hsu:

Modeling and analysis of a bus fire accident for evaluation of fire safety door using the fire dynamics simulator. 14973-14981 - Qianqian Ge:

IoT coverage based on intelligent algorithm. 14983-14989 - U. Palani

, K. C. Suresh, Alamelu Nachiappan:
Mobility prediction in mobile ad hoc networks using eye of coverage approach. 14991-14998 - M. Ramanan

, P. Vivekanandan
:
Efficient data integrity and data replication in cloud using stochastic diffusion method. 14999-15006 - J. Satheesh Kumar

, G. Saravana Kumar
, A. Ahilan:
High performance decoding aware FPGA bit-stream compression using RG codes. 15007-15013 - Xian Tan, Fasheng Yu, Xifeng Zhao:

Support vector machine algorithm for artificial intelligence optimization. 15015-15021 - Weiliang Lin:

Analysis on the effect of assignment system of track and field web course based on software programming method. 15023-15036 - Weiliang Lin:

Research on the teaching management of track and field web course based on software programming method. 15037-15048 - Rajasekhar Reddy Manyam

, K. S. Ravichandran, Balasubramaniam Venkatraman, K. R. Sekar, Manikandan Ramachandran
:
Improved pharma education system in the field of medical images using compression techniques. 15049-15057 - Feng Zeng, Nan Zhao, Wenjia Li

:
Joint interference optimization and user satisfaction improvement for multicast routing and channel assignment in wireless mesh networks. 15059-15072 - K. Ananthajothi

, M. Subramaniam:
Multi level incremental influence measure based classification of medical data for improved classification. 15073-15080 - Xianghao Zeng, Haichuan Zhang, Jiyan Zou, Zhihui Huang

:
The study on limited asynchronous breaking based on the adjustment of breaking time. 15081-15089 - Bao-Zhu Zhao, Jing He, Shiting Zhai:

How does local government's information affect farmers' agricultural investment: based on theoretical and empirical analysis. 15091-15102 - Yifan Duan, Zhixun Xia, Likun Ma, Zhenbing Luo:

Numerical simulation of the Sandia Flame D using the ESF method coupled with FGM model. 15103-15110 - N. Shankar, S. Sathish Babu, C. Viswanathan

:
Morphometric analysis of X-ray and CT images for evaluating osteoporosis. 15111-15119 - S. Balaji, T. Sasilatha:

Detection of denial of service attacks by domination graph application in wireless sensor networks. 15121-15126 - Xunyi Ren, Pan Zhang, Yu-qi Zhou:

Distinct model on privacy protection of dynamic data publication. 15127-15136 - Raja Krishnamoorthy, S. Saravanan:

A novel flip-flop based error free, area efficient and low power pipeline architecture for finite impulse recursive system. 15137-15147 - Bing Cao, Xuchao Pan, Chenglong Liu, Maolei Zhang, Wencan Jiang:

Simulation research on shielding effect of computerized boxes with electromagnetic pulse hole based on finite element analysis. 15149-15158 - Xun He

, Yong He, Xuchao Pan, Lei Guo:
Approach to generation of random aggregate model and gradient optimization of background grid based on SolidWorks platform. 15159-15168 - Cheng Zhou

, Youqian Feng, Zhonghai Yin:
An algebraic complex event processing method for cyber-physical system. 15169-15177 - Bin Wang:

Design of innovation and entrepreneurial repository system based on personalized recommendations. 15179-15185 - Priyanka Kokil, C. G. Parthipan

, Srinivasulu Jogi
, Haranath Kar
:
Criterion for realizing state-delayed digital filters subjected to external interference employing saturation arithmetic. 15187-15194 - Shunli Zhang, Guohua Geng, Zhan Li, Yuhe Zhang:

Fast implementation of area integral model SART algorithm based on look-up table. 15195-15203 - K. Bala, Jothi Soundaram

, A. Chandrasekar:
An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis. 15205-15212 - M. Thilagaraj

, M. Pallikonda Rajasekaran
, N. Arun Kumar:
Tsallis entropy: as a new single feature with the least computation time for classification of epileptic seizures. 15213-15221 - I. Manimozhi, S. Janakiraman

:
Defect detection in pattern texture analysis using improved support vector machine. 15223-15230 - G. Naveen Balaji

, S. Chenthur Pandian
:
Design of test pattern generator (TPG) by an optimized low power design for testability (DFT) for scan BIST circuits using transmission gates. 15231-15244 - (Withdrawn) Research on process customization technology for intelligent transportation cloud service platform. 15245-15254

- Li Zhang, Qifeng Wei, Yuan Yuan, Yuxue Li:

Knowledge diffusion simulation of knowledge networks: based on complex network evolutionary algorithms. 15255-15265 - Chengjun Guo

, Jiahan Yan, Zhong Tian:
Analysis and design of an attitude calculation algorithm based on elman neural network for SINS. 15267-15272 - K. Arthi, A. Singara Rajiva Lochana:

Zone-based dual sub sink for network lifetime maximization in wireless sensor network. 15273-15283 - Zhengwei Huang, Yin Luo, Dong Wang

:
Online customer service quality of online shopping: evidence from Dangdang.com. 15285-15293 - (Withdrawn) Study on the design and application of the user information resources of track and field web course based on software programming method. 15295-15303

- Xuejun Zhang, Xiaomin Tan, Xin Gao, Dongbo Wu, Xiangrong Zhou, Hiroshi Fujita:

Non-rigid registration of multi-phase liver CT data using fully automated landmark detection and TPS deformation. 15305-15319 - Bing Cao, Xuchao Pan, Maolei Zhang, Chenglong Liu, Wencan Jiang:

A method of evaluating the three-dimensional damage effect of strong electromagnetic pulse on the box based on the triangular-element FDTD method. 15321-15327 - Chenghua Fan, Qunjing Wang:

Research on image segmentation method using a structure-preserving region model-based MRF. 15329-15334 - Minjing Peng, Fei Yang:

Effect of carbon emission policy on fresh aquatic product carriers in augmented reality respective: a parallel simulation research based on genetic algorithm. 15335-15345 - Wei Zhang, Shiming Qin, Baolin Yi, Peng Tian:

Study on learning effect prediction models based on principal component analysis in MOOCs. 15347-15356 - Wenxu Zhang

, Lei Ma
, Xiaonan Li
:
Multi-agent reinforcement learning based on local communication. 15357-15366 - Wei Gao, Shengqiang Yang, Jianyan Tian

, Amit Banerjee, Fei Yang:
Construction and application of barrel finishing underlying database platform. 15367-15378 - Xinyu Pan, Jing-zhong Ma, Cheng-xia Wu:

Product pricing considering the consumer preference based on Internet of Things. 15379-15385 - U. Arul

, S. Prakash
:
A unified algorithm to automatic semantic composition using multilevel workflow orchestration. 15387-15408 - Changhua Yao, Lei Wang

, Xiaohan Yu:
Experience data excavating based distributed occasional communication establishing for swarm in remote region. 15409-15416 - Changwei Tan, Qing Zhang, Jian Zhou, Ying Du, Dunliang Wang, Ming Luo, Haidong Zhang, Wenshan Guo:

Remotely assessing above-ground fresh biomass weight of wheat based on the combinations of pair vegetation indexes from HJ-CCD images. 15417-15427 - Yong Tian

, Lili Wan, Bojia Ye
:
Multi-objective optimization of high altitude sector operation based on environmental protection. 15429-15437 - (Withdrawn) Application of optimized genetic algorithm based on big data in bus dynamic scheduling. 15439-15446

- Yangkun Xia

, Zhuo Fu
:
A tabu search algorithm for distribution network optimization with discrete split deliveries and soft time windows. 15447-15457 - Yan Sun, Danzhu Wang, Maoxiang Lang

, Xuesong Zhou:
Solving the time-dependent multi-trip vehicle routing problem with time windows and an improved travel speed model by a hybrid solution algorithm. 15459-15470 - Ping Kuang, Dingli Luo, Haoshuang Wang:

Masked 3D conditional generative adversarial network for rock mesh generation. 15471-15481 - Yutao Zhang

, Lei Wang, Xiaohan Yu
, Changhua Yao:
A new concept of Cosine similarity measures based on dual hesitant fuzzy sets and its possible applications. 15483-15492 - Yuantao Xie

, Huijuan Lv
, Xiaoke Sun, Yu Mao, Juan Yang
:
Study on the transform method of estimating discrete frequency from continuous variable: ratemaking for car repair insurance based on SAS system coding. 15493-15503 - Ping Kuang, Dingli Luo, Haoshuang Wang, Lixue Zhang:

An improved calculation system for phase-functioned neural network and implementation in unreal engine. 15505-15516 - Jianchao Yang, Feng Guo, Li Luo, Xiaoming Ye:

Bilevel mixed-integer nonlinear programming for integrated scheduling in a supply chain network. 15517-15532 - Yongping Li, Ning Xu, Qiang Lyu:

Construction of a knee osteoarthritis diagnostic system based on X-ray image processing. 15533-15540 - P. Balaji Srikaanth

, Velmurugan Nagarajan
:
Semi-Markov chain-based grey prediction-based mitigation scheme for vampire attacks in MANETs. 15541-15549

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














