


default search action
Cluster Computing, Volume 22
Volume 22, Number Supplement 1, January 2019
- Natarajan Yuvaraj
, K. R. SriPreethaa:
Diabetes prediction in healthcare systems using machine learning algorithms on Hadoop cluster. 1-9 - M. Annalakshmi, S. Mohamed Mansoor Roomi, Sheik Naveedh A:
A hybrid technique for gender classification with SLBP and HOG features. 11-20 - D. Sathiya, B. Gomathy
:
Improved security and routing path learning in MANETs using Beer-Quiche game theoritical model in cloud computing. 21-31 - T. Kumaresan
, S. Saravanakumar, Balamurugan Rengeswaran
:
Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine. 33-46 - Suganya Ramamoorthy
, S. Rajaram
:
An efficient categorization of liver cirrhosis using convolution neural networks for health informatics. 47-56 - B. Santhosh Kumar
, S. Karthik, V. P. Arunachalam
:
Upkeeping secrecy in information extraction using 'k' division graph based postulates. 57-63 - S. Sathees Babu
, K. Balasubadra:
Revamping data access privacy preservation method against inside attacks in wireless sensor networks. 65-75 - R. Jayanthi, M. Lilly Florence
:
Software defect prediction techniques using metrics based on neural network classifier. 77-88 - M. Suganthi, V. Karunakaran:
Instance selection and feature extraction using cuttlefish optimization algorithm and principal component analysis using decision tree. 89-101 - S. Ilankumaran
, Deisy Chelliah
:
Multi-biometric authentication system using finger vein and iris in cloud computing. 103-117 - N. Rajesh, A. Arul Lawrence Selvakumar
:
Association rules and deep learning for cryptographic algorithm in privacy preserving data mining. 119-131 - C. Viji, N. Rajkumar
, S. Duraisamy:
Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithm. 133-143 - T. Tamilselvi
, G. Tholkappia Arasu
:
Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree construction. 145-155 - P. Supraja
, V. M. Gayathri, R. Pitchai:
Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networks. 157-163 - V. M. Gayathri
, R. Nedunchelian:
Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation. 165-176 - S. Anantha Padmanabhan, N. J. Krishna Kumar:
An effective pose invariant face recognition system with the aid of ABC optimized ANFIS. 177-187 - S. Chidambaram
, K. G. Srinivasagan:
Performance evaluation of support vector machine classification approaches in data mining. 189-196 - Renuka Devi Rajagopal, Saravanan Murugan
, Kottilingam Kottursamy
, V. Raju:
Cluster based effective prediction approach for improving the curable rate of lymphatic filariasis affected patients. 197-205 - Eswaran Saravana Kumar
, K. Vengatesan:
Trust based resource selection with optimization technique. 207-213 - J. Raja
, K. Gunasekaran, R. Pitchai:
Prognostic evaluation of multimodal biometric traits recognition based human face, finger print and iris images using ensembled SVM classifier. 215-228 - V. Priya
, K. Umamaheswari
:
Enhanced continuous and discrete multi objective particle swarm optimization for text summarization. 229-240 - K. Sasi Kala Rani
, S. N. Deepa
:
Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networks. 241-254 - T. R. Vedhavathy
, M. S. K. Manikandan:
Triple referee incentive mechanism for secure mobile adhoc networks. 255-264 - P. Bharathisindhu
, S. Selva Brunda:
An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network. 265-275 - K. N. Anjan Kumar, S. Chitra, T. Satish Kumar
:
Probabilistic classification techniques to perform geographical labeling of web objects. 277-285 - V. M. Arul Xavier
, S. Annadurai:
Chaotic social spider algorithm for load balance aware task scheduling in cloud computing. 287-297 - (Withdrawn) Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment. 299-310
- D. Muthusankar, B. Kalaavathi, P. Kaladevi
:
High performance feature selection algorithms using filter method for cloud-based recommendation system. 311-322 - Natesan Jayanthi
, K. R. Valluvan
:
Hybrid routing algorithm for improving path selection in sustainable network. 323-334 - K. Ilamathi, P. Rangarajan:
Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chip. 335-346 - R. Mohan Das, E. Chandira Sekaran:
A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motor. 347-360 - Y. Arockia Raj, P. Alli:
Turtle edge encoding and flood fill based image compression scheme. 361-377 - V. Ranganayaki, S. N. Deepa
:
Linear and non-linear proximal support vector machine classifiers for wind speed prediction. 379-390 - Xiaoping Jiang, Jing Sun, Hao Ding, Chenghua Li:
A silhouette based novel algorithm for object detection and tracking using information fusion of video frames. 391-398 - K. Kalai Arasan, P. Anandhakumar:
A new GLoSM embedded virtual machine model for big data services in cloud storage systems. 399-405 - Valliyammai Chinnaiah
, Bhuvaneswari Anbalagan
:
Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks. 407-422 - Rakesh Rajendran
, Sripathi Venkata Naga Santhosh Kumar
, Yogesh Palanichamy, Kannan Arputharaj
:
Detection of DoS attacks in cloud networks using intelligent rule based classification system. 423-434 - C. Mageshkumar, S. Karthik, V. P. Arunachalam
:
Hybrid metaheuristic algorithm for improving the efficiency of data clustering. 435-442 - Archana Nandibewoor
, Ravindra S. Hegadi
:
A novel SMLR-PSO model to estimate the chlorophyll content in the crops using hyperspectral satellite images. 443-450 - (Withdrawn) Information security model of block chain based on intrusion sensing in the IoT environment. 451-468
- R. Aruna, R. Subramanian, P. Sengottuvelan, J. Shanthini:
Optimized energy efficient route assigning method using related node discovery algorithm in MANET. 469-479 - Haibo Liang, Guoliang Li, Wenlong Liang:
Intelligent early warning model of early-stage overflow based on dynamic clustering. 481-492 - Ke Wang
, Huiqin Wang, Zhan Wang, Qinghua Gu, Ying Yin, Li Mao, Ying Lu:
Study of spectral reflectance reconstruction based on regularization matrix R method. 493-502 - Bei Li, Ying Sun, Gongfa Li, Jianyi Kong, Guozhang Jiang, Du Jiang, Bo Tao, Shuang Xu, Honghai Liu
:
Gesture recognition based on modified adaptive orthogonal matching pursuit algorithm. 503-512 - Yong Lu
, Na Sun:
An effective task scheduling algorithm based on dynamic energy management and efficient resource utilization in green cloud computing environment. 513-520 - Guiliang Zhou, Mengru Lv, Tianwen Bao, Lina Mao, Kai Huang:
Design of intelligent carpooling program based on big data analysis and multi-information perception. 521-532 - Pengbo Hu, Yue Ma, Huifeng Xue, Feng Zhang:
Application of low impact development technology in rainwater drainage system reconstruction project. 533-543 - Yun Jing, Yingke Liu, Mingkai Bi:
Quantum-inspired immune clonal algorithm for railway empty cars optimization based on revenue management and time efficiency. 545-554 - ChunYu Zhang, Lei Chen, Rui Bin Gou:
High-speed vision extraction based on the CamShift algorithm. 555-564 - Bin Zhao
, Chuangbai Xiao, Yu Zhang, Peng Zhai, Zhi Wang:
Assessment of recommendation trust for access control in open networks. 565-571 - Lingling Tian, Juncheng Jiang, L. Tian:
Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithm. 573-582 - Zhi Xiong
, Ting Guo, Zhongliang Xue, Weihong Cai, Lingru Cai, Nanfu Luo:
Online energy-efficient deployment based on equivalent continuous DFS for large-scale web cluster. 583-596 - (Withdrawn) Maximum data collection rate routing for data gather trees with data aggregation in rechargeable wireless sensor networks. 597-607
- Yegang Chen
, Hongxiang Wang:
Evolutionary energy balanced ant colony algorithm based on WSNs. 609-621 - Hao Bu, Rong Zhu, Shihong Chen, Xiaoqiong Tan:
Research on concurrency comparison modeling based on $$\uppi $$ π calculus in future computer technology. 623-634 - E. Thangaselvi, K. Meena alias Jeyanthi:
Implementation of flexible denim nickel copper rip stop textile antenna for medical application. 635-645 - (Withdrawn) Splicing image forgery identification based on artificial neural network approach and texture features. 647-660
- Sivakumar Venu
, A. M. J. Md. Zubair Rahman:
Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks. 661-671 - M. V. Ranjith Kumar
, N. Bhalaji
, Swathi Singh
:
An augmented approach for pseudo-free groups in smart cyber-physical system. 673-692 - Shengjun Xue, Yue Peng, Xiaolong Xu
, Jie Zhang, Chao Shen, Feng Ruan:
DSM: a dynamic scheduling method for concurrent workflows in cloud environment. 693-706 - Yajun Liu, Junying Zhang, Aimin Li
, Yuanyuan Zhang
, Yaoyao Li, Xiguo Yuan, Zhongzhen He, Zhaowen Liu, Shouheng Tuo:
Identification of PIWI-interacting RNA modules by weighted correlation network analysis. 707-717 - Zeyun Xiao, Bin Tian, Xiaochun Lu:
Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithm. 719-729 - Yanwei Xu:
Scalable top-k keyword search in relational databases. 731-747 - Jihui Liu, Zhijun He, Junhong Zhang:
The dynamic model of pulverized coal and waste plastic bonded together in flight combustion process. 749-757 - Yonghui Huang
, Ze-ling Mao, Zhi-yu Zhang
, Xin-han Li, Lei Yan:
Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rock. 759-768 - Jin Zhang, Shulin Wang, Yijun Zhou:
Analysis on key dimension's measurement error in high speed computing. 769-779 - Huixian Duan, Yihong Wu, Lei Song, Jun Wang, Na Liu:
Fitting a cluster of line images under central catadioptric camera. 781-793 - Qiming Fu, Wen Hu, Quan Liu, Heng Luo, Lingyao Hu, Jianping Chen:
Residual Sarsa algorithm with function approximation. 795-807 - Ming Wei, Bo Sun, Rong Sun:
Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithm. 809-818 - Zheyuan Liu, Xiaoteng Zhang, Lei Song, Zhengyan Ding, Huixian Duan:
More efficient and effective tricks for deep action recognition. 819-826 - Boping Zhang
:
Distributed SVM face recognition based on Hadoop. 827-834 - (Withdrawn) Assembly sequence planning method based on particle swarm algorithm. 835-846
- Shengli Song
, Wen Huang, Yulong Sun:
Semantic query graph based SPARQL generation from natural language questions. 847-858 - Xiang Pan:
Layered constraint united scheduling model of multi-line lock. 859-870 - Jun Zhang, Yanxiang He, Fanfan Shen, Qing'an Li, Hai Tan:
Memory-aware TLP throttling and cache bypassing for GPUs. 871-883 - Haibo Liu
:
Resource recommendation via user tagging behavior analysis. 885-894 - Yong Zhang, Liyi Zhang, Jianfeng Han, Zhe Ban, Yi Yang:
A new DOA estimation algorithm based on compressed sensing. 895-903 - Zhuosheng Lin, Christophe Guyeux
, Simin Yu, Qianxue Wang, Shuting Cai:
On the use of chaotic iterations to design keyed hash function. 905-919 - Hyunjoo Kim, Jonghyun Kim, Youngsoo Kim
, Ikkyun Kim, Kuinam J. Kim, Hyuncheol Kim:
Improvement of malware detection and classification using API call sequence alignment and visualization. 921-929 - Nakhoon Baek
, Kuinam J. Kim:
Design and implementation of OpenGL SC 2.0 rendering pipeline. 931-936 - Kuinam J. Kim, Nakhoon Baek
:
Providing profiling information for OpenGL ES application programs. 937-941 - Nakhoon Baek
, Kuinam J. Kim:
Prototype implementation of the OpenGL ES 2.0 shading language offline compiler. 943-948 - Donghwoon Kwon, Hyunjoo Kim
, Jinoh Kim, Sang C. Suh, Ikkyun Kim, Kuinam J. Kim:
A survey of deep learning-based network anomaly detection. 949-961 - Miroslav Bures
, Tomás Cerný
, Karel Frajták, Bestoun S. Ahmed
:
Testing the consistency of business data objects using extended static testing of CRUD matrices. 963-976 - Dong Chun Lee
, Do Hyeon Lee:
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks. 977-988 - Yuji Tamura, Doan Truong Thi, Takahiro Chiba, Myungryun Yoo, Takanori Yokoyama
:
A real-time operating system supporting distributed shared memory for embedded control systems. 989-998 - Hyojin Park, Jinhong Yang, Hyuncheol Kim
, Jun Kyun Choi:
Customized video service system design and implementation: from taste to image-based consuming method. 999-1009 - Cong Viet-Ngu Huynh, Jun-Ho Huh
:
B+-tree construction on massive data with Hadoop. 1011-1021 - Tsung-Han Lee, Lin-Huang Chang
, Yan-Wei Liu, Jiun-Jian Liaw, Hung-Chi Chu:
Priority-based scheduling using best channel in 6TiSCH networks. 1023-1033 - Hye-Young Kim, Kuinam J. Kim:
Optimized state update for mobile games in cloud networks. 1035-1041 - Linh Van Ma, Jaehyung Park, Jiseung Nam, Jonghyun Jang, Jinsul Kim:
An efficient scheduling multimedia transcoding method for DASH streaming in cloud environment. 1043-1053 - Nguyen Tan Cam
, Van-Hau Pham, Tuan A. Nguyen
:
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique. 1055-1064 - Sanja Lazarova-Molnar
, Nader Mohamed:
Collaborative data analytics for smart buildings: opportunities and models. 1065-1077 - Ly Hoang Tuan, Nguyen Tan Cam, Van-Hau Pham:
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis. 1079-1085 - Karnam Sreenu, Sreelatha Malempati
:
W-Scheduler: whale optimization for task scheduling in cloud computing. 1087-1098 - Vijayakumar Polepally
, K. Shahu Chatrapati:
Dragonfly optimization and constraint measure-based load balancing in cloud computing. 1099-1111 - Ahamed Ali Samsu Aliar
, M. Ramakrishnan:
Secure provable data possession scheme with replication support in the cloud using Tweaks. 1113-1123 - (Withdrawn) Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system. 1125-1135
- S. Bhaskaran
, Santhi Balachandran
:
An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computing. 1137-1149 - Xiang Li
, Zhijian Wang:
A new recommendation algorithm combined with spectral clustering and transfer learning. 1151-1167 - Qiang Yu, Qi Liu:
Accurate detection of user interest data in cloud computing environment. 1169-1178 - (Withdrawn) A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing. 1179-1188
- (Withdrawn) Cluster and cloud computing framework for scientific metrology in flow control. 1189-1198
- (Withdrawn) Classification of sentence level sentiment analysis using cloud machine learning techniques. 1199-1209
- A. Kethsy Prabavathy, J. Devi Shree
:
Histogram difference with Fuzzy rule base modeling for gradual shot boundary detection in video cloud applications. 1211-1218 - (Withdrawn) A FCM cluster: cloud networking model for intelligent transportation in the city of Macau. 1219-1228
- Xindong Duan:
Research on abnormal data detection method of web browser in cloud computing environment. 1229-1238 - M. Madhankumar, C. Suresh Gnana Dhas:
Improved continuous query plan with cluster weighted dominant querying in synthetic datasets. 1239-1246 - Esther Daniel
, N. A. Vasanthi:
LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. 1247-1258 - M. R. M. VeeraManickam, Mohanapriya M.
, Bishwajeet K. Pandey
, Sushma Akhade, S. A. Kale
, Reshma Patil, M. Vigneshwar:
Map-Reduce framework based cluster architecture for academic student's performance prediction using cumulative dragonfly based neural network. 1259-1275 - Ashok George, A. Sumathi:
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud. 1277-1288 - Sagenela Vijaya Kumar
, C. Nagaraju
:
FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale images. 1289-1311 - Deepak C. Mehetre, SusaiMichael Emalda Roslin, Sanjeev J. Wagh
:
Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. 1313-1328 - Lakshmanan Ramanathan
, G. Parthasarathy
, K. Vijayakumar, L. Lakshmanan, S. Ramani:
Cluster-based distributed architecture for prediction of student's performance in higher education. 1329-1344 - Poonam Yadav:
Cluster based-image descriptors and fractional hybrid optimization for medical image retrieval. 1345-1359 - Praveen Kumar Reddy Maddikunta
, Madda Rajasekhara Babu:
Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things. 1361-1372 - Arvind Madhukar Jagtap, N. Gomathi:
Minimizing movement for network connectivity in mobile sensor networks: an adaptive approach. 1373-1383 - J. Devagnanam, N. M. Elango:
Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud. 1385-1400 - C. Ashok Kumar
, R. Vimala
, K. R. Aravind Britto
, S. Sathya Devi:
FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud model. 1401-1414 - Venkatesh Munagala
, K. Satya Prasad:
Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systems. 1429-1441 - Dingyou Lei, Peng Zhang, Yinggui Zhang, Yangkun Xia, Shuo Zhao:
Research on coordinated scheduling of multiple systems and single jobs based on improved particle swarm optimization. 1443-1458 - Yongjun Liu
, Yangjie Wei, Wang Yi:
Depth from defocus (DFD) based on VFISTA optimization algorithm in micro/nanometer vision. 1459-1467 - Xiaofei Li
, Di He, Jun-Yi Li:
Parallel image search application based on online hashing hierarchical ranking. 1469-1478 - Sheng Liu, Dongye Sun, Ensi Wu, Datong Qin:
Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmission. 1479-1493 - Yao yu-feng:
Semantic feature hierarchical clustering algorithm based on improved regional merging strategy. 1495-1503 - Yong-qiang Yang:
Research on the single image super-resolution method based on sparse Bayesian estimation. 1505-1513 - Kai-Jian Xia
, Hong-Sheng Yin, Jiangqiang Wang:
A novel improved deep convolutional neural network model for medical image fusion. 1515-1527 - Yan Zhou, Yu Wang, Xu-hui Wang:
Face recognition algorithm based on wavelet transform and local linear embedding. 1529-1540 - Xiang-dong Yin:
Dynamic data driven big data cooperative control scheme with virtual visualization for mobile multimedia communication. 1541-1548 - Xiangong Li, Xufeng Wang, Yu Fang:
Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network model. 1549-1557 - Liu Liu, Jin Xu, Zheng Liu:
Automatic segmentation of coronary lumen based on minimum path and image fusion from cardiac computed tomography images. 1559-1568 - Sheng Liu, Dongye Sun, Ensi Wu, Yong Luo, Datong Qin:
Application of computerized numerical modeling in multi-state wet wheel hub heat simulations. 1569-1580 - Ye Li, Zoe Lin Jiang, Lin Yao, Xuan Wang, Siu-Ming Yiu, Zhengan Huang:
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties. 1581-1593 - Shehzad Ashraf Chaudhry
, I Luk Kim, Seungmin Rho, Mohammad Sabzinejad Farash
, Taeshik Shon:
An improved anonymous authentication scheme for distributed mobile cloud computing services. 1595-1609 - Ahmed M. Elmisery
, Seungmin Rho, Mohamed Aborizka:
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services. 1611-1638 - Ahmad M. Manasrah
, Ala'a Aldomi, Brij B. Gupta
:
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment. 1639-1653 - Chong-zhi Gao, Qiong Cheng, Xuan Li, Shi-bing Xia:
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. 1655-1663 - Mahendra Kumar Murmu, Awadhesh Kumar Singh:
A bio-inspired leader election protocol for cognitive radio networks. 1665-1678 - Fan Zhao, Wenqi Shi, Yong Gan, Ziru Peng, Xiangyang Luo:
A localization and tracking scheme for target gangs based on big data of Wi-Fi locations. 1679-1690 - Li Yang, Xiaoyan Jin, Qi Jiang
:
Online handwritten signature verification based on the most stable feature and partition. 1691-1701 - Malik Najmus Saqib
, Junaid Kiani, Basit Shahzad, Adeel Anjum
, Saif Ur Rehman Malik
, Naveed Ahmad, Atta ur Rehman Khan
:
Anonymous and formally verified dual signature based online e-voting protocol. 1703-1716 - Zhengjun Jing
, Chunsheng Gu, Zhimin Yu, Peizhong Shi, Chongzhi Gao:
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. 1717-1727 - Chunyong Yin, Sun Zhang
, Zhichao Yin, Jin Wang
:
Anomaly detection model based on data stream clustering. 1729-1738 - Mariusz Gajewski
, Jordi Mongay Batalla
, George Mastorakis, Constandinos X. Mavromoustakis:
A distributed IDS architecture model for Smart Home systems. 1739-1749 - Fadi Al-Turjman:
A rational data delivery framework for disaster-inspired internet of nano-things (IoNT) in practice. 1751-1763 - Minsu Chae, HwaMin Lee
, Kiyeol Lee:
A performance comparison of linux containers and virtual machines using Docker and KVM. 1765-1775 - Daeyong Jung, Heeseok Jeong, Jaesung Kim, DaeWon Lee, Myungil Kim
:
The resource running time manager for integrated environment. 1777-1786 - Jin Wang
, Chunwei Ju, Hye-Jin Kim, R. Simon Sherratt, Sungyoung Lee:
A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs. 1787-1795 - Yan Li, Gangman Yi, Byeong-Seok Shin
:
Spatial task management method for location privacy aware crowdsourcing. 1797-1803 - Yongjun Ren
, Jin Wang
, Xiujuan Feng, Geumran Youn, Jeong-Uk Kim:
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment. 1805-1814 - Cheol Shim, Kwangho Cha
, Min Choi:
Design and implementation of initial OpenSHMEM on PCIe NTB based cloud computing. 1815-1826 - Duhoe Kim, Yong-Hyun Kim, Dongil Shin, Dongkyoo Shin:
Fast attack detection system using log analysis and attack tree generation. 1827-1835 - Hanjo Jeong, Byeonghwa Park, Minwoo Park, Ki-Bong Kim, Kiseok Choi:
Big data and rule-based recommendation system in Internet of Things. 1837-1846 - (Withdrawn) Development of healthcare service model using physical information data based on cluster sensing technology. 1847-1859
- Boyeon Song
, Jangwon Choi, Sang-Soo Choi, Jungsuk Song:
Visualization of security event logs across multiple networks and its application to a CSOC. 1861-1872 - Seong-Taek Park, Myeong-Ryoon Oh
:
An empirical study on the influential factors affecting continuous usage of mobile cloud service. 1873-1887 - Seungdo Jeong, Jungwon Cho
:
The supporting system for disabled person with the artificial hand controlled by muscle sensor. 1889-1898 - Seok-Woo Jang
, Myunghee Jung
:
Exposed body component-based harmful image detection in ubiquitous sensor data. 1899-1910 - Keon-Myung Lee
, Chan Sik Han, Kwang-Il Kim, Sang Ho Lee:
Word recommendation for English composition using big corpus data processing. 1911-1924 - Kyungyong Chung, Roy C. Park:
Chatbot-based heathcare service with a knowledge base for cloud computing. 1925-1937 - Suhyeon Yoo, O Young Kwon, Dae-hyun Jeong:
Research trend analysis on convergence and joint research of Korea using scientific papers. 1939-1948 - (Withdrawn) Development of a medical big-data mining process using topic modeling. 1949-1958
- Kyung Mi Lee, Yoon-Su Jeong, Sang Ho Lee, Keon-Myung Lee
:
Bucket-size balancing locality sensitive hashing using the map reduce paradigm. 1959-1971 - Gang Hee Jung, Yoon Young Park, Se Yeob Kim, Young Wook Cho:
The study on how to remove the shadow area for WSN based indoor disaster monitoring system. 1973-1984 - Woo-Sik Bae:
Verifying a secure authentication protocol for IoT medical devices. 1985-1990 - Cheol-Joo Chae, Ki-Bong Kim, Han-Jin Cho:
A study on secure user authentication and authorization in OAuth protocol. 1991-1999 - (Withdrawn) Cloud based u-healthcare network with QoS guarantee for mobile health service. 2001-2015
- Hyeok Kang, Keun-Ho Lee, Gui-Jung Kim
:
Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication. 2017-2026 - T. Prasanth
, M. Gunasekaran:
A mutual refinement technique for big data retrieval using hash tag graph. 2027-2037 - Suyi Kim
, So-Yeun Kim
, Kyungmee Choi
:
Modeling and analysis for stock return movements along with exchange rates and interest rates in Markov regime-switching models. 2039-2048 - Hyun-Kyo Oh, Jin-Woo Kim, Sang-Wook Kim, Kichun Lee:
A unified framework of trust prediction based on message passing. 2049-2061 - Suan Lee
, Seok Kang, Jinho Kim, Eun Jung Yu:
Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark cluster. 2063-2087 - Gaoyang Guo, Chaokun Wang, Jun Chen, Pengcheng Ge, Weijun Chen:
Who is answering whom? Finding "Reply-To" relations in group chats with deep bidirectional LSTM networks. 2089-2100 - Seung-Hee Kim
, Woo-Je Kim
:
Evaluation of software quality-in-use attributes based on analysis network process. 2101-2114 - Jooyoung Kim, Dongsoo Kim
:
Analyzing and visualizing comprehensive and personalized online product reviews. 2115-2128 - Xiong Wei, Ming Hu, Tao Peng, Minghua Jiang, Zhiying Wang, Xiao Qin:
PRODA: improving parallel programs on GPUs through dependency analysis. 2129-2144 - Awais Mahmood
, Ghulam Muhammad
, Mansour Alsulaiman, Habib Dhahri, Esam Othman
, Mohammed Faisal
:
Moving average multi directional local features for speaker recognition. 2145-2157 - Wei She, Dingfang Li, Yongbo Xia, Shasha Tian:
Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanism. 2159-2167 - P. Kuppusamy
, R. Kalpana, P. V. Venkateswara Rao:
Optimized traffic control and data processing using IoT. 2169-2178 - A. M. Senthil Kumar, M. Venkatesan:
Task scheduling in a cloud computing environment using HGPSO algorithm. 2179-2185 - Shigeru Imai, Sida Chen, Wennan Zhu, Carlos A. Varela:
Dynamic data-driven learning for self-healing avionics. 2187-2210 - Elias David Niño Ruiz
, Adrian Sandu:
Efficient parallel implementation of DDDAS inference using an ensemble Kalman filter with shrinkage covariance matrix estimation. 2211-2221 - Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen, Swapna S. Gokhale:
Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform. 2223-2237 - Fangzhou Sun
, Abhishek Dubey
, Jules White, Aniruddha Gokhale
:
Transit-hub: a smart public transportation decision support system with multi-timescale analytical services. 2239-2254 - Xi Fei, Sun Youfu, Ruan Xuejun:
A simulation analysis method based on PSO-RBF model and its application. 2255-2261 - Lu Xin:
Apriori semantic processing orienting at the business English parallel corpus characteristics in business contract. 2263-2271 - Haoliang Lv, Xiaojun Zhou:
Anti load disturbance method for AC servo motor power system. 2273-2283 - Wang Min, Cheng Wen, Ren Jie-Hui, Meng Ting, Wan Tian:
Intelligent distribution characteristic analysis of heavy metals in reservoir sediments. 2285-2292 - Li Li, M. Shamim Hossain, Ahmed A. Abd El-Latif
, Mohammed F. Alhamid:
Distortion less secret image sharing scheme for Internet of Things system. 2293-2307 - (Withdrawn) An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology. 2309-2316
- Md. Abdur Rahman
, M. Shamim Hossain:
A cloud-based virtual caregiver for elderly people in a cyber physical IoT system. 2317-2330 - Hyuncheol Kim
:
Performance evaluation of revised virtual resources allocation scheme in network function virtualization (NFV) networks. 2331-2339 - Hyunjoo Kim
, Jonghyun Kim, Youngsoo Kim
, Ikkyun Kim, Kuinam J. Kim:
Design of network threat detection and classification based on machine learning on cloud computing. 2341-2350 - Sunyoung Kang, Seungae Kang:
The study on the application of virtual reality in adapted physical education. 2351-2355 - Tao Yu, Le Li, Lajiao Chen, Weijing Song:
Low-quality multivariate spatio-temporal serial data preprocessing. 2357-2370 - Yuzhu Wang
, Huiqun Hao
, Junqiang Zhang
, Jinrong Jiang, Juanxiong He, Yan Ma:
Performance optimization and evaluation for parallel processing of big data in earth system models. 2371-2381 - Shengtao Sun
, Jibing Gong, Albert Y. Zomaya
, Aizhi Wu:
A distributed incremental information acquisition model for large-scale text data. 2383-2394 - Dingding Li, Mianxiong Dong
, Yong Tang, Kaoru Ota
:
A novel disk I/O scheduling framework of virtualized storage system. 2395-2405 - Zhuowei Wang, Naixue Xiong, Hao Wang
, Lianglun Cheng, Wuqing Zhao:
Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-level. 2407-2423 - Ahmed A. Abd El-Latif
, M. Shamim Hossain, Ning Wang:
Score level multibiometrics fusion approach for healthcare. 2425-2436 - Samir Elmougy
, M. Shamim Hossain, Ahmed S. Tolba, Mohammed F. Alhamid, Ghulam Muhammad
:
A parameter based growing ensemble of self-organizing maps for outlier detection in healthcare. 2437-2460 - Hyun Seung Son, Young B. Park, Robert Young Chul Kim:
MCCFG: an MOF-based multiple condition control flow graph for automatic test case generation. 2461-2470 - Zhiqiang Zhang
, Jianghua Hu, Xiaoqin Xie, Haiwei Pan, Xiaoning Feng:
An iterative sampling method for online aggregation. 2471-2484 - Alexander Thomasian
:
Mirrored and hybrid disk arrays and their reliability. 2485-2494 - M. Vardhana
, Arunkumar N.
, Enas W. Abdulhay, P. V. Vishnuprasad:
Iot based real time trafic control using cloud computing. 2495-2504 - Chundong Wang
, Honglei Yao
, Zheli Liu:
An efficient DDoS detection based on SU-Genetic feature selection. 2505-2515 - I. Chandra, N. Sivakumar, Gokulnath Chandra Babu
, Parthasarathy Panchatcharam
:
IoT based fall detection and ambient assisted system for the elderly. 2517-2525 - Cao Ngoc Nguyen, Jaehwan Lee, Soonwook Hwang, Jik-Soo Kim
:
On the role of message broker middleware for many-task computing on a big-data platform. 2527-2540 - Ahmed Barnawi, Ahmed Awad, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise
, Sherif Sakr:
Correction to: Runtime self-monitoring approach of business process compliance in cloud environments. 2541
Volume 22, Number 1, March 2019
- Sheng-Yao Su, Wenbin Yao, Xiaoyong Li
:
SORD: a new strategy of online replica deduplication in Cloud-P2P. 1-23 - Ronnie Mativenga
, Joon-Young Paik, Youngjae Kim, Junghee Lee
, Tae-Sun Chung:
RFTL: improving performance of selective caching-based page-level FTL through replication. 25-41 - Sanket Desai
, Rabei Alhadad
, Naveen K. Chilamkurti
, Abdun Naser Mahmood:
A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure. 43-69 - Sugam Sharma, Victor Chang
, U. Sunday Tim, Johnny Wong, Shashi K. Gadia:
Cloud and IoT-based emerging services systems. 71-91 - S Sivaprakash
, M. Venkatesan:
A design and development of an intelligent jammer and jamming detection methodologies using machine learning approach. 93-101 - Natalia G. Miloslavskaya
, Alexander I. Tolstoy:
Internet of Things: information security challenges and solutions. 103-119 - Geunchul Park, Seungwoo Rho, Jik-Soo Kim, Dukyun Nam
:
Towards optimal scheduling policy for heterogeneous memory architecture in many-core system. 121-133 - Woong Sul
, Heon Y. Yeom, Hyungsoo Jung:
Towards Sustainable High-Performance Transaction Processing in Cloud-based DBMS - Design considerations and optimization for transaction processing performance in service-oriented DBMS organization. 135-145 - Jin Ma, Sik Lee, Kumwon Cho, Young-Kyoon Suh:
A simulation provenance data management system for efficient job execution on an online computational science engineering platform. 147-159 - Hanul Sung, Jeesoo Min, Sujin Ha, Hyeonsang Eom:
OMBM: optimized memory bandwidth management for ensuring QoS and high server utilization. 161-174 - Yoori Oh, Yoonhee Kim
:
A resource recommendation method based on dynamic cluster analysis of application characteristics. 175-184 - Javier Prades
, Carlos Reaño
, Federico Silla
:
On the effect of using rCUDA to provide CUDA acceleration to Xen virtual machines. 185-204 - André Felipe Monteiro, Orlando Loques:
Quantum virtual machine: power and performance management in virtualized web servers clusters. 205-221 - P. Muthi Reddy
, Ansaf Ahmed, S. H. Manjula, K. R. Venugopal:
Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers. 223-239 - Asmaa H. Rabie, Shereen H. Ali
, Hesham A. Ali, Ahmed I. Saleh:
A fog based load forecasting strategy for smart grids using big electrical data. 241-270 - Shunfu Jin
, Haixing Wu, Wuyi Yue:
Pricing policy for a cloud registration service with a novel cloud architecture. 271-283 - Yang Lu
, Jiguo Li:
Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. 285-299 - Syed Hamid Hussain Madni
, Muhammad Shafie Abdul Latif, Shafii Muhammad Abdulhamid
, Javed Ali
:
Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment. 301-334
Volume 22, Number 2, June 2019
- Uiseok Song, Bodon Jeong, Sungyong Park
, Kwongyong Lee:
Optimizing communication performance in scale-out storage system. 335-346 - Jangwoong Kim, Youngjae Kim, Awais Khan
, Sungyong Park
:
Understanding the performance of storage class memory file systems in the NUMA architecture. 347-360 - Qichen Chen, Hyojeong Lee, Yoonhee Kim
, Heon Young Yeom, Yongseok Son
:
Design and implementation of skiplist-based key-value store on non-volatile memory. 361-371 - Bodon Jeong, Awais Khan
, Sungyong Park
:
Async-LCAM: a lock contention aware messenger for Ceph distributed storage system. 373-384 - Sangkeun Lee, Hyogi Sim
, Youngjae Kim, Sudharshan S. Vazhkudai:
A programmable shared-memory system for an array of processing-in-memory devices. 385-398 - Ruxia Sun, Sun Zhang
, Chunyong Yin, Jin Wang
, Seungwook Min:
Strategies for data stream mining method applied in anomaly detection. 399-408 - Jianping Zhang, Hong Zhou
, Huimin Gao:
Approximation guarantees of evolutionary optimization on the minimum crossing spanning tree problem. 409-417 - Ammar Almomani
, Mohammad Alauthman
, Mohammed Alweshah
, Osama M. Dorgham
, Firas AlBalas
:
A comparative study on spiking neural network encoding schema: implemented with cloud computing. 419-433 - Xiang Zou, Jinghua Cao, Wei Sun, Quan Guo, Tao Wen:
Flow data processing paradigm and its application in smart city using a cluster analysis approach. 435-444 - Mehdi Pirahandeh
, Deok-Hwan Kim:
Energy-aware RAID scheduling methods in distributed storage applications. 445-454 - Mahmood Hosseini, Constantinos Marios Angelopoulos
, Wei Koong Chai, Stéphane Kuendig
:
Crowdcloud: a crowdsourced system for cloud infrastructure. 455-470 - Bashir Mohammed
, Irfan Awan, Hassan Ugail, Muhammad Younas:
Failure prediction using machine learning in a virtualised HPC system and application. 471-485 - Bozena Malysiak-Mrozek, Tomasz Baron, Dariusz Mrozek
:
Spark-IDPP: high-throughput and scalable prediction of intrinsically disordered protein regions with Spark clusters on the Cloud. 487-508 - Sanjaya K. Panda
, Prasanta K. Jana:
An energy-efficient task scheduling algorithm for heterogeneous cloud computing systems. 509-527 - Rajat Saxena
, Somnath Dey:
A generic approach for integrity verification of big data. 529-540 - Wei Luo
, Wenping Ma:
Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing. 541-551 - Divya Pandove
, Shivani Goel, Rinkle Rani:
General correlation coefficient based agglomerative clustering. 553-583 - Yuling Fang, Qingkui Chen:
A real-time and reliable dynamic migration model for concurrent taskflow in a GPU cluster. 585-599 - Aida A. Nasr
, Anthony T. Chronopoulos
, Nirmeen A. El-Bahnasawy, Gamal Attiya
, Ayman El-Sayed
:
A novel water pressure change optimization technique for solving scheduling problem in cloud computing. 601-617 - Parminder Singh
, Pooja Gupta
, Kiran Jyoti:
TASM: technocrat ARIMA and SVR model for workload prediction of web applications in cloud. 619-633 - Motassem Al-Tarazi
, J. Morris Chang:
Network-aware energy saving multi-objective optimization in virtualized data centers. 635-647 - Je Sen Teh
, Kaijun Tan, Moatsum Alawida:
A chaos-based keyed hash function based on fixed point representation. 649-660
Volume 22, Number Supplement 2, March 2019
- Haibin Cai, Hao Wu:
An improved formalization analysis approach to determine schedulability of global multiprocessor scheduling based on symbolic safety analysis and statistical model checking in smartphone systems. 2543-2554 - Fang-Ju Ai
:
Research on a large-scale community detection algorithm based on non-weighted graph. 2555-2562 - Ya Gao
, Ying Xiao:
Frame based multicast scheduling for buffered Clos-network switches. 2563-2570 - Hejun Zhu, Liehuang Zhu:
Encrypted network behaviors identification based on dynamic time warping and k-nearest neighbor. 2571-2580 - Xiuqin Pan
, Yong Lu, Na Sun, Sumin Li:
A hybrid artificial bee colony algorithm with modified search model for numerical optimization. 2581-2588 - Weifeng Pan
, Chunlai Chai:
Measuring software stability based on complex networks in software. 2589-2598 - Guangzhi Zhang
, Shaobin Cai:
Universal secure error-correcting (SEC) schemes for network coding via McEliece cryptosystem based on QC-LDPC codes. 2599-2610 - Li Cheng, Gongping Wu:
Obstacles detection and depth estimation from monocular vision for inspection robot of high voltage transmission line. 2611-2627 - Shuang Fu
, Guoyin Zhang, Tingyi Shang:
Cross-layer parallel cooperative spectrum sensing for heterogeneous channels based on iterative KM algorithm. 2629-2637 - Ting You
, Yueli Hu:
Design of the linear controller of a class of time-delay chaos. 2639-2644 - Denghui Zhang
, Yiqi Zhou, Yang Guo:
A modeling and optimization method for heterogeneous objects based on complex networks theory. 2645-2654 - Xiaofei Li
, Di He:
HSBCS framework based performance detection for DS-UWB Systems. 2655-2665 - Shuang Fu
, Guoyin Zhang, Li Yang:
Spectrum sensing defending against PUE attack based on fractal dimension. 2667-2675 - Lei Wang, Xuhui Xia, Jianhua Cao, Xiang Liu:
Modeling and predicting remanufacturing time of equipment using deep belief networks. 2677-2688 - Liu Ang, Fu Shan-na, Zhen-Hong Xiao:
Study on risk assessment of overseas merger and acquisition knowledge integration based on character-weighted set pair. 2689-2700 - Na Zhao
, Yong Yu, Jian Wang, Zhongwen Xie, Zhendi Yang, Lei Cheng:
An extended object-oriented petri net supporting the description and evolution of components: EOOPN. 2701-2708 - Guanchun Li
, Xin Wang, Peng Cui, Jie Li:
Analysis of superconducting linear synchronous motor for electromagnetic propulsion. 2709-2717 - Gongfa Li, Heng Tang, Ying Sun, Jianyi Kong, Guozhang Jiang, Du Jiang, Bo Tao, Shuang Xu, Honghai Liu
:
Hand gesture recognition based on convolution neural network. 2719-2729 - Qingzhen Xu, Miao Li:
A new cluster computing technique for social media data analysis. 2731-2738 - Tao Wang, Zhengquan Xu, Dong Wang, Hao Wang:
Influence of data errors on differential privacy. 2739-2746 - Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang:
A competitive model of popularity prediction using correlation matrix. 2747-2759 - Xuan Chen
, Dan Long:
Task scheduling of cloud computing using integrated particle swarm algorithm and ant colony algorithm. 2761-2769 - Hui Du, Dacheng Liu:
Research and implementation of management information system for Engineering Training Center in university. 2771-2779 - Yanlan Mei, Kefan Xie:
An improved TOPSIS method for metro station evacuation strategy selection in interval type-2 fuzzy environment. 2781-2792 - Lihui Sun
:
A new method for sensorless control of brushless DC motor. 2793-2800 - Zhibo Guo, Kejun Lin
, Jian Huang, Ying Zhang
, Zhengda Cui:
Online object tracking by sparse and structural model. 2801-2808 - Wei Cui
, Ke Wang, Qiang Zhang
, KaiYu Wang:
Simulation on the weld crack growth in the surface of oil/gas pipes by using a magnetic-structural coupling algorithm. 2809-2822 - Xiuju Liu:
A collaborative filtering recommendation algorithm based on the influence sets of e-learning group's behavior. 2823-2833 - Qi Na, Jianyu Zhao, Yonghong Ma:
The optimization and simulation analysis of the enterprise's decision making system with the interference of the consumption strategy. 2835-2850 - Chun-Hong Huang, Yungho Leu
:
Multi-level dataset decomposition for parallel frequent itemset mining on a cluster of personal computers. 2851-2863 - Li Ni
, Manman Peng, Wenjun Jiang, Kenli Li:
A community detection algorithm based on multi-similarity method. 2865-2874 - Lu Liu, Yanqing Guo
, Yongling Fu, Chuangchuang Li
, Liang Guo:
A segmentation scheme with SVR-based prediction in stroke-sensing cylinder. 2875-2887 - S. Hameed Ibrahim
, S. Duraisamy, U. K. Sridevi
:
Flexible and reliable ERP project customization framework to improve user satisfaction level. 2889-2895 - Yunfei Zhou, Xiaocui Hui:
Fault diagnosis method of large-scale complex electromechanical system based on extension neural network. 2897-2906 - Xiang Wu
, Yuyang Wei, Yaqing Mao, Liang Wang
:
A differential privacy DNA motif finding method based on closed frequent patterns. 2907-2919 - Shiyuan Zhou, Yinglin Wang
:
Service ranking in service networks using parameters in complex networks: a comparative study. 2921-2930 - Tao Wang, Minghui Wang:
Distributed collaborative filtering recommendation algorithm based on DHT. 2931-2941 - (Withdrawn) Research on the selection model of technology-based intellectual property evaluation method based on analytic hierarchy process. 2943-2953
- Y. Song:
Load-deflection model for T-section rail press straightening process under lateral loads. 2955-2961 - Xuanqi Ou, Tingjie Lv, Xia Chen:
Research on telecom service providers' network charge strategy based on two-sided market theory. 2963-2969 - Kai Wang, Zhichun Gan, Jingzhi Liu, Wei He, Shun Xu:
Deterministic compressed sensing based channel estimation for MIMO OFDM systems. 2971-2980 - Wenjuan Wang, Yuwang Yang:
Sensor network based radiation detection for emergency system. 2981-2992 - (Withdrawn) An effiecient human tracking system using Haar-like and hog feature extraction. 2993-3000
- Cuifen Zhang
, Lina Hao, Li Fan:
Optimization and improvement of data mining algorithm based on efficient incremental kernel fuzzy clustering for large data. 3001-3010 - Yongcun Cao, Yong Lu, Xiuqin Pan, Na Sun:
An improved global best guided artificial bee colony algorithm for continuous optimization problems. 3011-3019 - Gelan Yang, Wei Tan
, Huixia Jin, Tuo Zhao, Li Tu:
Review wearable sensing system for gait recognition. 3021-3029 - Yong Wang, Changzhao Liu, Yinghua Liao:
Electromechanical dynamic simulation and experiment for multi-stage gear transmission system with planetary gears. 3031-3041 - Jiafeng Huang, Yun Xue, Xiaohui Hu, Huixia Jin, Xin Lu, Zhihuang Liu:
Sentiment analysis of Chinese online reviews using ensemble learning framework. 3043-3058 - Haijun Chen, Guanzheng Tan:
Adaptive iteration localization algorithm based on RSSI in wireless sensor networks. 3059-3067 - Ting Gao, Lina Hu, Zhizhen Jia, Tianna Xia, Chao Fang, Hongzhi Li, Li Hong Hu
, Yinghua Lu, Hui Li:
SPXYE: an improved method for partitioning training and validation sets. 3069-3078 - Xiaokan Wang
, Hairong Dong
, Qiong Wang:
Research of manipulator trajectory tracking based on adaptive robust iterative learning control. 3079-3086 - S. Bhama, G. R. Karpagam:
Application of multivariate Gaussian model for discovery of healthcare services in cloud. 3087-3094 - K. Kumaresan, P. Ganeshkumar:
Software reliability modeling using increased failure interval with ANN. 3095-3102 - Qiangliang Guo
, Jin Xiao
, Xiaoguang Hu, Baochang Zhang:
Local convolutional features and metric learning for SAR image registration. 3103-3114 - T. Rajendran
, T. Gnanasekaran
:
Multi level object relational similarity based image mining for improved image search using semantic ontology. 3115-3122 - Jinsheng Xing, Jianguo Ju
:
On the sub-low contact velocity control of rendezvous docking for smart world. 3123-3130 - R. Thanuja
, A. Umamakeswari
:
Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. 3131-3143 - P. J. A. Alphonse, Venkatramana Reddy Y
:
A method for obtaining authenticated scalable and efficient group key agreement for wireless ad-hoc networks. 3145-3151 - A. Amali Angel Punitha, G. Indumathi:
Centralized cloud information accountability with bat key generation algorithm (CCIA-BKGA) framework in cloud computing environment. 3153-3164 - S. Kayalvili
, M. Selvam:
Hybrid SFLA-GA algorithm for an optimal resource allocation in cloud. 3165-3173 - (Withdrawn) A novel approach for ranking customer reviews using a modified PSO-based aspect ranking algorithm. 3175-3181
- Amr Tolba
, Elsayed Elashkar
:
Soft computing approaches based bookmark selection and clustering techniques for social tagging systems. 3183-3189 - R. Sheeba
, G. Jiji
, T. Ajith Bosco Raj:
WFCM based big sensor data error detection and correction in wireless sensor network. 3191-3200 - (Withdrawn) Hybrid aggregated signcryption scheme using multi-constraints differential evolution algorithm for security. 3201-3211
- R. Sandhiya
, M. Sundarambal:
Clustering of biomedical documents using ontology-based TF-IGM enriched semantic smoothing model for telemedicine applications. 3213-3230 - T. J. Nikose, Ranjan S. Sonparote:
Dynamic along wind response of tall buildings using Artificial Neural Network. 3231-3246 - Mohammed Amoon
, Tarek E. El. Tobely:
A Green energy-efficient scheduler for cloud data centers. 3247-3259 - S. Savitha, P. Thangam
, L. Latha:
An enhancement to SePeCloud with improved security and efficient data management. 3261-3269 - Ke Huang, Hao Lan Zhang
, Gelan Yang:
An optimized IS-APCPSO algorithm for large scale complex traffic network. 3271-3284 - T. Yuvaraja
, R. S. Sabeenian
:
Performance analysis of medical image security using steganography based on fuzzy logic. 3285-3291 - Jingxian Yang:
A novel short-term multi-input-multi-output prediction model of wind speed and wind power with LSSVM based on improved ant colony algorithm optimization. 3293-3300 - A. Saravanaselvan, B. Paramasivan:
Design and implementation of an efficient attack resilient computation algorithm in WSN nodes. 3301-3311 - S. Madhurikkha, R. Sabitha:
A smart power saving protocol for IoT with wireless energy harvesting technique. 3313-3324 - K. Kannan, M. Devaraju:
QoS supported adaptive and multichannel MAC protocol in vehicular ad-hoc network. 3325-3337 - R. Yuvaraj, A. Chandrasekar, S. Jothi
:
Time orient LEAD based polling point selection algorithm for efficient data aggregation in wireless sensor networks. 3339-3346 - R. Kumuthaveni
, E. Chandra:
Iterative Conditional Entropy Kalman filter (ICEKF) for noise reduction and Neuro Optimized Emotional Classifier (NOEC). 3347-3363 - (Withdrawn) The relationship analysis between online reviews and online shopping based on B2C platform technology. 3365-3373
- (Withdrawn) Research on innovation path of school ideological and political work based on large data. 3375-3383
- Xuhua Yuan:
Image multi-target detection and segmentation algorithm based on regional proposed fast intelligent network. 3385-3393 - (Withdrawn) Discussion on new media communication strategy of sports events based on large data technology. 3395-3403
- Pingming Huang, Feng Hu, Fenghui Dong:
Parameter estimation of Gumbel distribution and its application to pitting corrosion depth of concrete girder bridges. 3405-3411 - (Withdrawn) Fuzzy neural network model construction based on shortest path parallel algorithm. 3413-3418
- Gaoxiang Lou, Zongyan Cai
:
Improved hybrid immune clonal selection genetic algorithm and its application in hybrid shop scheduling. 3419-3429 - Yanyu Chen
, Huaqi Chai, Yimiao Huang:
Research on risk assessment in the early development of state-level new areas based on the improved fuzzy comprehensive evaluation model. 3431-3444 - Jun Li Cao:
Algorithm research based on multi period fuzzy portfolio optimization model. 3445-3452 - Jing Gao, Jia-jia Zhang, Xu-liang Guang:
An improved routing algorithm for advanced metering infrastructure in smart grid. 3453-3462 - Yao Ying:
Research on college students' information literacy based on big data. 3463-3470 - (Withdrawn) Urban public art and interaction design strategy based on digital technology. 3471-3478
- Chunjiang Liu:
Optimal design of high-rise building wiring based on ant colony optimization. 3479-3486 - Xiumei Zhang, Chi Ma, Xinmiao Yu:
A neural network model for financial trend predicting. 3487-3494 - Wenjun Xiong, Qi Erna:
Research on brand crisis identify index model based on cluster analysis. 3495-3504 - (Withdrawn) Analysis of image processing algorithm based on bionic intelligent optimization. 3505-3512
- (Withdrawn) Research on semi supervised K-means clustering algorithm in data mining. 3513-3520
- S. Thanga Revathi, N. Ramaraj, Chithra Selvaraj
:
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing. 3521-3530 - (Withdrawn) Research on religious management based on big data. 3531-3542
- (Withdrawn) Researches on hybrid algorithm for moving target detection and tracking in sports video. 3543-3552
- Yun He, Quancheng Zhang:
Automatic generation algorithm analysis of dance movements based on music-action association. 3553-3561 - (Withdrawn) The big data impact and application study on the like ecosystem construction of open internet of things. 3563-3572
- (Withdrawn) Big data analysis and research on consumption demand of sports fitness leisure activities. 3573-3582
- Jie Xu, Yang Liu:
CET-4 score analysis based on data mining technology. 3583-3593 - Li Zhu, Heng Li, Yuxuan Feng:
Research on big data mining based on improved parallel collaborative filtering algorithm. 3595-3604 - (Withdrawn) Research on computer technical assistance tools for special children for music therapy. 3605-3612
- Jiangke Cheng, Xiaodong Mai, Shengnan Wang:
Research on abnormal data mining algorithm based on ICA. 3613-3619 - (Withdrawn) A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem. 3621-3641
- Junfeng Xin, Wang Lei, Shixin Li, Yongbo Zhang:
Improved eigensystem realization algorithm and its application on ocean platforms. 3643-3650 - Ye Zhang:
Multi scenario simulation analysis of environmental carrying capacity in western region based on fusion support vector machine regression prediction algorithm. 3651-3656 - Yangqin Wang:
Research on College English curriculum algorithm based on hierarchical model. 3657-3664 - Yi Liu, Jian Wang, Sabina Shahbazzade:
The improved AFSA algorithm for the berth allocation and quay crane assignment problem. 3665-3672 - Xiangming Mao:
Study on ant colony optimization algorithm for "one-day tour" traffic line. 3673-3680 - (Withdrawn) Research on Chinese and English language information retrieval algorithm based on bilingual theme model. 3681-3688
- (Withdrawn) Research on early warning and monitoring algorithm of financial crisis based on fuzzy cognitive map. 3689-3697
- Bo Liang, Jiatong Liu:
Design and development of sports training system based on image processing technology. 3699-3706 - Bo Wang:
Data analysis of the turning technique process of swimming athletes assisted by computer technology. 3707-3714 - N. Thamaraikannan, S. Kamalraj:
Utilization of compact genetic algorithm for optimal shortest path selection to improve the throughput in mobile Ad-Hoc networks. 3715-3726 - Balamanigandan Ramachandran
, Kamalraj Subramaniam
:
Secure and efficient data forwarding in untrusted cloud environment. 3727-3735 - M. Jamunarani
, C. Vasanthanayaki:
Shape adaptive DCT compression for high quality surveillance using wireless sensor networks. 3737-3747 - J. Vijayalakshmi
, Chinnanadar Ramachandran Rene Robin
:
An exponent based error detection mechanism against DXDOS attack for improving the security in cloud. 3749-3758 - R. Kingsly Stephen
, A. Chandrasekar, K. Dinakaran:
Sectional Transmission analysis approach for improved reliable transmission and secure routing in wireless sensor networks. 3759-3770 - Janani Arthanari, R. Baskaran:
Enhancement of video streaming analysis using cluster-computing framework. 3771-3781 - A. Kalaivani, B. Ananthi, S. Sangeetha:
Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology. 3783-3790 - V. Kavitha, P. Balamurugan:
A smart sensor network localization for electric grids. 3791-3799 - J. Arun, M. Karthikeyan:
Optimized cognitive radio network (CRN) using genetic algorithm and artificial bee colony algorithm. 3801-3810 - R. Adaline Suji
, D. Bright Anand, R. Lenin Babu:
Polar ice image segmentation using improved estimation and normalization of illumination. 3811-3819 - Zhihua Li:
An adaptive overload threshold selection process using Markov decision processes of virtual machine in cloud data center. 3821-3833 - K. Murugan, V. P. Arunachalam
, S. Karthik:
A hybird filtering approach for mri image with multiresolution. 3835-3840 - Xiaoping Zhou, Xun Liang
, Jichao Zhao, Aakas Zhiyuli, Haiyan Zhang:
Exploration of polygons in online social networks. 3841-3848 - Chaolong Zhang
, Yigang He, Lifen Yuan, Sheng Xiang:
A multiple heterogeneous kernel RVM approach for analog circuit fault prognostic. 3849-3861 - G. Shanmugaraj
, N. Kalaiarasi:
Hearing aid speech signal enhancement via N-parallel FIR-multiplying polynomials for Tamil language dialect syllable ripple and transition variation. 3863-3874 - M. Suganthy
, S. Manjula
:
Enhancement of SNR in fetal ECG signal extraction using combined SWT and WLSR in parallel EKF. 3875-3881 - (Withdrawn) A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud. 3883-3892
- S. J. Pradeeba, K. Sampath
, A. Ramadevi:
Photo-catalytic degradations of methylene blue, malachite green and Bismarck brown using poly(azomethine)/TiO2 nanocomposite. 3893-3909 - (Withdrawn) Improved image compression using effective lossless compression technique. 3911-3916
- C. Amuthadevi
, J. Sathya Priya
, B. Madhusudhanan:
Validation of multicast routing in cyber physical systems monitoring air quality. 3917-3923 - (Withdrawn) Research on fine grained software radio communication algorithm based on GPU parallel processing technology. 3925-3934
- (Withdrawn) Solving algorithm for inverse problem of partial differential equation parameter identification based on IGEP. 3935-3941
- (Withdrawn) Optimal design of transportation distance in logistics supply chain model based on data mining algorithm. 3943-3952
- R. Joseph Manoj, M. D. Anto Praveena
, K. Vijayakumar
:
An ACO-ANN based feature selection algorithm for big data. 3953-3960 - (Withdrawn) A hybrid multi-layer intrusion detection system in cloud. 3961-3969
- Wen Liu, Tuqian Zhang, Yan Liu, Ningning Zhang, Hongyu Tao, Guoqing Fu:
Improved artificial bee colony algorithm based on self-adaptive random optimization strategy. 3971-3980 - Yu Jiang
, Aiqun Hu, Jie Huang:
Importance-based entropy measures of complex networks' robustness to attacks. 3981-3988 - (Withdrawn) The application of particle swarm optimization for the training of neural network in English teaching. 3989-3998
- Yajie Li
, Yan Zhang, Mingxiao Yu, Xiaofei Li:
Drawing and studying on histogram. 3999-4006 - P. Selvarani, Annamalai Suresh
, Malarvizhi N
:
Secure and optimal authentication framework for cloud management using HGAPSO algorithm. 4007-4016 - N. Sridevi, Velmurugan Nagarajan
:
A curve based cryptography for wireless security in MANET. 4017-4025 - (Withdrawn) A new localization technique for node positioning in wireless sensor networks. 4027-4034
- A. N. Arularasan
, Annamalai Suresh
, Koteeswaran Seerangan
:
Identification and classification of best spreader in the domain of interest over the social networks. 4035-4045 - M. Jayekumar, Velmurugan Nagarajan
:
A novel DEA-OR algorithm for route failure recovery in dense wireless sensor networks. 4047-4055 - S. Balu, C. Nelson Kennedy Babu
, K. Amudha
:
Secure and efficient data transmission by video steganography in medical imaging system. 4057-4063 - (Withdrawn) A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks. 4065-4074
- Jiang Lanxiang, Honglei Wang, Zhijun Hu, Zhao Wei:
Repeated game analysis of power suppliers based on dynamic coopetition process and slightly altruistic factor. 4075-4084 - Jingyu Li, Ming Zhou, Gengyin Li:
Intelligent optimization of active power output of wind farm during fault recovery with wake effect. 4085-4090 - Xiao Chen, Liang Pang, Pengze Guo, Xingping Sun, Zhi Xue, N. Arunkumar
:
New upper degree of freedom in transmission system based on wireless G-MIMO communication channel. 4091-4099 - Xiaoqin Li, Qian-Jun Chen
, Zude Ding:
Structural damage diagnosis and fine scale finite element intelligence simulation of long span cable stayed bridges. 4101-4107 - Nan Jiang, Xuefeng Zhao, Jinlong Zhang:
An empirical study on the impact of information system absorption on the performance of troops' logistics organization. 4109-4118 - Wen Aihong, Yan Nan, Xu Caocao:
Multi-classification cluster analysis of large data based on knowledge element in microblogging short text. 4119-4127 - T. Joby Titus
, V. Vijayakumari:
Clock node capacity minimization using lookup table based controller for ultrasound and medical imaging processor. 4129-4134 - Wei Bai:
Hierarchical cluster based evaluation system for computer courses. 4135-4140 - Feifei Sun
, Pinghua Xu
, Xuemei Ding:
Multi-core SVM optimized visual word package model for garment style classification. 4141-4147 - Xinke Leng, Huijun Jiang, Zuo Xin:
Human action tracking design of neural network algorithm based on GA-PSO in physical training. 4149-4155 - Hongwang Zhao, Aicheng Zou:
Eigen vector buckling based boundary analysis method for free vibration of rectangular thin plates. 4157-4163 - Xue Wang, Yue Jin Wu, Ru Jing Wang, Yuan Yuan Wei, Yuanmiao Gui:
Gray BP neural network based prediction of rice protein interaction network. 4165-4171 - Mingze Xia, Xinming Zhang, Yong Zhu:
Real time localization algorithm based on local linear embedding optimization in sensor networks. 4173-4178 - S. Syed Jamaesha
, S. Bhavani:
A secure and efficient cluster based location aware routing protocol in MANET. 4179-4186 - R. Rani Saritha
, Varghese Paul, P. Ganesh Kumar:
Content based image retrieval using deep learning process. 4187-4200 - K. Praghash
, R. Ravi:
Physical-traffic attentive vigorous routing (P-TAVR) and hot-spot detection to reduce the bottleneck in WSN. 4201-4212 - S. Diwakaran
, Balasubramani Perumal
, K. Vimala Devi
:
An intelligent data aware and energy censoring scheme for wireless sensor networks. 4213-4220 - J. K. Mohan Kumar
, H. Abdul Rauf, R. Umamaheswari:
An improved design for grid based PV control systems using modified fuzzy logic with an improved switched capacitor DC-DC converter. 4221-4230 - He Xiao:
BIRCH algorithm and data management in financial enterprises based on dynamic panel GMM test. 4231-4237 - Pei Wang, Xiaodong Zhang, Boling Han, Maoxiang Lang:
Prediction model for railway freight volume with GCA-genetic algorithm-generalized neural network: empirical analysis of China. 4239-4248 - Wei Zhu, Yingsan Wei, Huan Xiao:
Fault diagnosis of neural network classified signal fractal feature based on SVM. 4249-4254 - Liuyi Wang, Wei Zhang:
Pilot multiplexing OFDM system frequency offset estimation method. 4255-4261 - Mao Jun:
Target detection and recognition algorithm for moving UAV based on machine vision. 4263-4269 - Shi Lei:
A novel WSNs routing algorithm based on game theory and energy consumption balance. 4271-4276 - Wendai Lv:
Method and application of data defect analysis based on linear discriminant regression of far subspace. 4277-4282 - Jiao Lei, Rui Manuel Campilho Pereira de Menezes:
Fairness evaluation method of resource allocation based on BPSO multidimensional perspective. 4283-4290 - Yuan-Qiang Lian:
Analysis method of competitive advantage of new industrial innovation alliance based on contraction factor particle swarm optimization (PSO). 4291-4297 - Ding Lei:
Black-Litterman asset allocation model based on principal component analysis (PCA) under uncertainty. 4299-4306 - Chang Liu, N. Arunkumar
:
Risk prediction and evaluation of transnational transmission of financial crisis based on complex network. 4307-4313 - Zhengyang Zhang:
Matrix decomposition model for robust based on M estimate and its application. 4315-4322 - Zhengyang Zhang, Zengyu Mi:
Preference risk assessment method based on grey multi index kernel support vector machine model. 4323-4329 - Liangcai Dong, Yang Yang, Siyun Sun:
QCs scheduling scheme of genetic algorithm (GA) and improved firefly algorithm (FA). 4331-4348 - Hui Wang, Shengnan Liu, Ao Kong:
Theoretical and empirical research on investment behavior strategy based on fuzzy probability. 4349-4359 - Ding Lei:
GARCH model prediction method based on Hessian matrix dynamic programming deep neural network. 4361-4366 - Lina Song:
Analysis of factors affecting investment efficiency based on analytic hierarchy process and support vector machine (SVM) model. 4367-4374 - C. Kavitha, S. Sakthivel
:
An effective mechanism for medical images authentication using quick response code. 4375-4382 - Wang Jue:
Prediction model of pulmonary tuberculosis based on gray kernel AR-SVM model. 4383-4387 - Li Mei:
Productivity prediction method based on analysis model of principal component neural network. 4389-4395 - Xiaobing Yang, Hongyun Liu, Yongmei Peng:
Enhanced perceptual psychopathology correlation mechanism model based on rough set and neural network. 4397-4403 - Zhongfu Wang, Yanhong Feng:
Evaluation model of economic competitiveness based on multi-layer fuzzy neural network. 4405-4412 - Yuan Wei, Dai Xu, Longbin Liu, Xiaodong Miao, Weihua Zhang:
Optimal design of honeycomb sandwich structure cover with multi-objective ant colony algorithm. 4413-4419 - V. Radhika
, K. Baskaran
:
High resolution DPWM clustered architecture for digitally controlled DC-DC converter using FPGA. 4421-4430 - K. Balasamy
, S. Ramakrishnan
:
An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. 4431-4442 - R. Vinu
, Paul Varghese:
Performance analysis of artificial intelligent controllers in PEM fuel cell voltage tracking. 4443-4455 - K. Sakthidasan Sankaran
, S. Prabha, P. M. Rubesh Anand
:
Optimized gradient histogram preservation with block wise SURE shrinkage for noise free image restoration. 4457-4478 - K. Kathiravan
, N. Rathina Prabha
:
Assessment of ramping cost for independent power producers using firefly algorithm and gray wolf optimization. 4479-4490 - Xiaoyu Chen, Jianyong Zheng, Jun Mei:
Grid Connected Photovoltaic Power Generation Control Method Based on Swarm Intelligence Algorithm. 4491-4501 - S. Mahaboob Basha
, M. Kannan:
Novel architecture and implementation of low power oriented full search block motion estimation. 4503-4509 - N. Nagaraju
, S. M. Ramesh:
Implementation of high speed and area efficient MAC unit for industrial applications. 4511-4517 - Yefei Han, Guangwei Bai, Gongxuan Zhang:
Power allocation algorithm based on mixed integer nonlinear programming in WSN. 4519-4525 - Zhuang Xu, Baojun Ge, Dajun Tao:
Multivariable bilinear subspace recursive likelihood identification for pumped storage motor. 4527-4533 - Arun Kumar Sangaiah
, Ahmed Fakhry, Mohamed Abdel-Basset
, Ibrahim M. El-Henawy:
Arabic text clustering using improved clustering algorithms with dimensionality reduction. 4535-4549 - Changhai Huang
, Shenping Hu:
Factors correlation mining on maritime accidents database using association rule learning algorithm. 4551-4559 - Bhalchandra M. Hardas
, Sanjay B. Pokle:
Analysis of OFDM system using DCT-PTS-SLM based approach for multimedia applications. 4561-4569 - Hu Yu, Rui Lv, Zhikun Wei, Zuo Jie, Tingshan Zhang, Chen Ran, Yiqiao Xu:
Potential and trend prediction of unconventional oil and gas resources based on combination forecasting model of variable weight for multi-factor. 4571-4577 - Wang Lei, Jia Zhen Yuan, Zhang Li:
Design of multi-functional simulation platform based on mining speed-regulating magnetic coupling. 4579-4588 - Yafei Wu:
Evaluation system construction of health policy based on system dynamics and complex network. 4589-4596 - Huiming Dai, Xin Zhang, Dacheng Yang:
Research on multichannel transmission of security information in MAC layer based on zoom and forward in VANETs. 4597-4602 - Li Futou, Liu Liang:
Decision making based on grey model and support vector machine. 4603-4609 - Sarosh Dastoor
, Upena Dalal, Jignesh N. Sarvaiya:
Cellular planning for next generation wireless mobile network using novel energy efficient CoMP. 4611-4623 - Yuqiang Tu:
Benefit evaluation for ocean engineering based on grey Euclid model of game compromise. 4625-4630 - Xinke Leng, Huijun Jiang, Xunhao Zou, Xiaoling Zeng:
Motion feature quantization of athletic sports training based on fuzzy neural network theory. 4631-4638 - Rui Shi:
Analysis and strategy of related factors in patients with sudden cardiac death in Department of Cardiology. 4639-4645 - Kawther Ahmed, Belal Al-Khateeb
, Maher Mahmood
:
Application of chaos discrete particle swarm optimization algorithm on pavement maintenance scheduling problem. 4647-4657 - Yang Yun-xing, Huichang Zhao, Si Chen, Shuning Zhang:
Analysis and design of proximity fuze based on waveguide discontinuity. 4659-4664 - Guo Meng:
Construction of employee training program evaluation system of three exponential forecast based on sliding window. 4665-4671 - S. Karthik
, K. Srikanta Murthy:
Deep belief network based approach to recognize handwritten Kannada characters using distributed average of gradients. 4673-4681 - Moein Sarvaghad-Moghaddam, Ali A. Orouji
, Zeinab Ramezani, Mohamed Elhoseny
, Ahmed Farouk
, Arunkumar N.
:
Modelling the spice parameters of SOI MOSFET using a combinational algorithm. 4683-4692 - Yijiu Zhao, Shuangman Xiao:
Sparse multiband signal spectrum sensing with asynchronous coprime sampling. 4693-4702 - Yingchao Zhang, Yun Mao:
The mechanism of active respiratory circulation in patients with chronic respiratory failure COPD. 4703-4709 - Junting Chen, N. Arunkumar
:
Quantified comparative analysis of innovation and innovation based on multi orientation from the perspective of education and culture. 4711-4718 - Yanhong Wang:
Fuzzy TOPSIS analytic hierarchy process based cooperative development of cultural soft power. 4719-4727 - Mei Ze:
Local weighted regression statistical analysis based mathematical education evaluation. 4729-4735 - Jing Xu, Jian Guo:
Markov chain based simulation analysis of bone mineral density and changes in the level of biochemical markers of bone transformation in postmenopausal women. 4737-4744 - Alaa Tharwat, Mohamed Elhoseny
, Aboul Ella Hassanien
, Thomas Gabel, Arun Kumar Sangaiah:
Intelligent Bézier curve-based path planning model using Chaotic Particle Swarm Optimization algorithm. 4745-4766 - Miao Quan:
Finite element analysis based construction of foundation and foundation evaluation system of underground tunnel. 4767-4773 - Chun Fang, Manfeng Dou, Bo Tan, Jianwei Yang:
Parameter estimation for BLDCM in rescue hoist drive and reduction of torque ripple and winding loss using conditional extremum current model. 4775-4784 - Zhiying Chen, Dinghua Xu, Zhongyi Xiao:
Hybrid intelligent algorithm based option pricing method. 4785-4791 - Deng Yuan:
Intelligent innovative knowledge management integration method based on user generated content. 4793-4803 - Li Yongming, Ying Wang, Haohao Song:
Coordinated development model of E-sports based on three party game. 4805-4812 - Xi Ke, Huiyu Luo, He Xiaohua, Wu Meihua, Wu Guangfeng, Zhu Fang, Gao Fengping, Zeng Guihua:
Fuzzy regression model clustering algorithm based assessment, analysis and acceptance of palliative care and psychological behaviors of elderly patients with cancer pain. 4813-4820 - Liu Manqing, Wan Jin, Jing Chuya, Yanyan Wang, Hong Ganji, Ma qilin, Bi Min, Lu Congxia:
Simulation analysis of the pathogenesis of Parkinson's disease based on multiple factors leading to mitochondrial damage. 4821-4828 - Xiong Jiaxuan:
Research progress on non-fullerene receptor in organic solar cell. 4829-4835 - Yang Ning, Liu Chun Wah, Luo Erdan
:
Stock price prediction based on error correction model and Granger causality test. 4849-4858 - Zhouyu Tian, Guangsheng Zhang
, Jinqi Jiang, Mi Zhou, Xiaoli Yang, Zhenhua Wang:
Grey three index prediction method based on data assimilation preprocessing. 4859-4867 - Jiang Li:
Evaluation method based on neural network differential evolution. 4869-4875 - Yao Jun, Zhijin Wang:
A location algorithm based on Stiefel manifold particle filtering. 4877-4882 - Teng-Fei Wei, Xiaolan Wang:
Analysis and elimination of the return power of the pulse width modulation of the bidirectional full bridge DC-DC converter. 4883-4892 - Dan Li, Fanglei Xue:
Research on the influence of tea culture on tea product innovation based on the natural user interface (NUI) method. 4893-4899 - Li-jun Li, Xiao-guang Zhang:
Discrimination method of wire rope fault signal based on Holzer sensor for multi array weak magnetic detection. 4901-4906 - Minghong She, Baocang Ding:
Closed-loop subspace identification of multivariable dynamic errors-in-variables models based on ORT. 4907-4915 - Hao Shi, Yan Yu:
Discrete element analysis of particles flow in convex arc section of large corrugated sidewall belt conveyor. 4917-4925 - Pei Wang, Xiaodong Zhang, Boling Han, Maoxiang Lang:
Carrying capacity and efficiency optimization model for freight train segment train. 4927-4940 - LingXiao Hu:
A resource management method based on organizational behavior theory and hidden Markov algorithm. 4941-4948 - Tiantian Tang, Pei Hu:
Quantitative standard of promotion strategy and analysis on the influence of consumer purchase behavior. 4949-4955 - Lv Jing, Fangyuan Zhou, Peng Jing:
The longitudinal analysis of the genetic effects on craniofacial morphology in posterior-anterior and lateral cephalograms of female twins aged from 6 to 12 years. 4957-4969 - Fu Tian:
Autoregressive moving average model based relationship identification between exchange rate and export trade. 4971-4977 - He Qin:
The method of mutual influence object getting along with two parties based on repetitive game control. 4979-4987 - Zhiqiang Cao, Zheng Yang, Fang Liu, Ziyu Ye:
Buyback and stockout penalty newsvendor model based on reference point prospect theory. 4989-4999 - Du Chunyu, Wang Li:
High building layout design based on emotional differential evolution algorithm. 5001-5007 - Mingtao Fan, Jun Li, Gong-hui Liu:
Study on the sealing integrity of cement sheath during volume fracturing of shale gas of horizontal well. 5009-5016 - Sun Qiang:
Formulation of physical education and training program based on multidimensional education data mining. 5017-5023 - Yanping Gong, Peng Fan:
Research on the dynamic incentive mechanism of information sharing in social network services based on reputation mechanism. 5025-5031 - Yan-ning Wang, Qiang Zhang, Bin-song Jiang:
Method for analyzing the strength of sandstone with three intermittent fractures based on discrete fracture model as an approximation. 5033-5039 - Shasha Deng, Huoming Shen, Lang Liu, Huaiping Tang:
Numerical investigation of the drag force for cross-sea bridge based on the two-way fluid-structure interaction. 5041-5053 - Zhi-Xiang Liu, Chun-Xue Xie, Miao Xie, Jun Mao:
Mobile robot positioning method based on multi-sensor information fusion laser SLAM. 5055-5061 - Tiancheng Wang:
Research on the optimal cluster number of energy efficiency based on the block model of opportunistic signal. 5063-5069 - Yanyan Jiang:
Competition and the stepping-stone theory in the broadband access market. 5071-5087 - Yawei Cai
, Hui Zhao, Mudong Li, Hanqiao Huang:
3D real-time path planning based on cognitive behavior optimization algorithm for UAV with TLP model. 5089-5098 - Ting Wang
:
Aligning the large-scale ontologies on schema-level for weaving Chinese linked open data. 5099-5114 - Ke Zhang, Liru Guo, Ce Gao, Zhenbing Zhao:
Pyramidal RoR for image classification. 5115-5125
Volume 22, Number 3, September 2019
- Pradeeban Kathiravelu
, Peter Van Roy, Luís Veiga
:
SD-CPS: software-defined cyber-physical systems. Taming the challenges of CPS with workflows at the edge. 661-677 - Santiago Felici-Castell
, Jaume Segura-Garcia
, Miguel García-Pineda
:
Adaptive QoE-based architecture on cloud mobile media for live streaming. 679-692 - Carlos Galdamez, Raj Pamula, Zilong Ye
:
On efficient virtual network function chaining in NFV-based telecommunications networks. 693-703 - Albert Rego
, Sandra Sendra, José Miguel Jiménez
, Jaime Lloret:
Dynamic metric OSPF-based routing protocol for Software Defined Networks. 705-720 - Mona S. Kashkoush, Mohamed Azab, Gamal Attiya
, Amr S. Abed:
Online Smart Disguise: real-time diversification evading coresidency-based cloud attacks. 721-736 - Gabor Kecskemeti
, Zsolt Németh, Attila Kertész
, Rajiv Ranjan:
Cloud workload prediction based on workflow execution time discrepancies. 737-755 - Amir Hossein Borhani, Terence Hung, Bu-Sung Lee, Zheng Qin:
Power-network aware VM migration heuristics for multi-tier web applications. 757-782 - Rahma Djiroun, Kamel Boukhalfa
, Zaia Alimazighi:
Designing data cubes in OLAP systems: a decision makers' requirements-based approach. 783-803 - Ahmed Aboud
, Haifa Touati
, Brahim Hnich
:
Efficient forwarding strategy in a NDN-based internet of things. 805-818 - Ali M. Shatnawi
, Yathrip AlZahouri, Mohammed A. Shehab
, Yaser Jararweh, Mahmoud Al-Ayyoub:
Toward a new approach for sorting extremely large data files in the big data era. 819-828 - Sebastian Laskawiec
, Michal Choras, Rafal Kozik
:
New solutions for exposing clustered applications deployed in the cloud. 829-838 - Jonathan Muraña
, Sergio Nesmachnow, Fermin-Alberto Armenta-Cano, Andrei Tchernykh
:
Characterization, modeling and scheduling of power consumption of scientific computing applications in multicores. 839-859 - Xianhao Xu, Xiaozhen Zhao, Bipan Zou
, Mingze Li:
Optimal dimensions for multi-deep storage systems under class-based storage policies. 861-875 - Jordi Mateo
, Lluís M. Plà-Aragonés
, Francesc Solsona
, Adela Pagès
:
A scalable parallel implementation of the Cluster Benders Decomposition algorithm. 877-886 - Jens Haussmann
, Wolfgang Blochinger, Wolfgang Küchlin:
Cost-efficient parallel processing of irregularly structured problems in cloud computing environments. 887-909 - Bo Wang
, Ying Song, Yuzhong Sun, Jun Liu:
Analysis model for server consolidation of virtualized heterogeneous data centers providing internet services. 911-928 - A. S. Xie
:
Benchmarking based search framework. 929-951 - Ying Xie, Jinzhao Wu:
Multi-objective constraint task scheduling algorithm for multi-core processors. 953-964 - Haifeng Wang
, Yunpeng Cao:
Event driven power consumption optimization control model of GPU clusters. 965-979 - Anwar Kalghoum
, Leïla Azouz Saïdane:
FCR-NS: a novel caching and forwarding strategy for Named Data Networking based on Software Defined Networking. 981-994 - Emiliano Casalicchio
:
A study on performance measures for auto-scaling CPU-intensive containerized applications. 995-1006 - Haohao Zhou
, Guanghan Bai, Su Deng:
Optimal interval scheduling with nonidentical given machines. 1007-1015 - Stefan Bosse
, Dirk Lehmhus:
Material-integrated cluster computing in self-adaptive robotic materials using mobile multi-agent systems. 1017-1037
Volume 22, Number 4, December 2019
- Joo-Chang Kim, Kyungyong Chung:
Sequential-index pattern mining for lifecare telecommunication platform. 1039-1048 - Young Sung Cho, Won Shik Na, Song Chul Moon:
Periodicity analysis using weighted sequential pattern in recommending service. 1049-1056 - Youngjun Moon, Seokhoon Kim
, Intae Ryoo
:
High-performance internet file system based on multi-download for convergence computing in mobile communication systems. 1057-1071 - Lili He, Jin Wang
, Hongtao Bai, Yu Jiang, Tonglin Li:
A novel parallel and distributed magnetotelluric inversion algorithm on multi-threads workloads cluster. 1073-1083 - Aref M. Abdullah, Hesham A. Ali, Amira Y. Haikal:
A reliable, TOPSIS-based multi-criteria, and hierarchical load balancing method for computational grid. 1085-1106 - Ala Darabseh, Nikolaos M. Freris
:
A software-defined architecture for control of IoT cyberphysical systems. 1107-1122 - Guillaume Ruty
, Jean-Louis Rougier, Andre Surcouf, Aloÿs Augustin:
An initial evaluation of 6Stor, a dynamically scalable IPv6-centric distributed object storage system - Precise architecture description and first benchmark results. 1123-1142 - Kallol Krishna Karmakar
, Vijay Varadharajan
, Udaya Kiran Tupakula
:
Mitigating attacks in software defined networks. 1143-1157 - Vasily Tarasov, Lukas Rupprecht, Dimitris Skourtis, Wenji Li, Raju Rangaswami
, Ming Zhao:
Evaluating Docker storage performance: from workloads to graph drivers. 1159-1172 - Andrei Tchernykh
, Vanessa Miranda-López
, Mikhail G. Babenko
, Fermin-Alberto Armenta-Cano
, Gleb I. Radchenko
, Alexander Yu. Drozdov
, Arutyun Avetisyan
:
Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. 1173-1185 - Manuel Aurelio Rodriguez Pascual, José A. Moríñigo
, Rafael Mayo-García
:
Effect of MPI tasks location on cluster throughput using NAS. 1187-1198 - Said Limam
, Riad Mokadem
, Ghalem Belalem
:
Data replication strategy with satisfaction of availability, performance and tenant budget requirements. 1199-1210 - Ünal Çavusoglu, Sezgin Kaçar:
A novel parallel image encryption algorithm based on chaos. 1211-1223 - Pavithra Latha Kumaresan
, T. Sree Sharmila
:
An efficient seed points selection approach in dominant color descriptors (DCD). 1225-1240 - P. M. Rekha
, M. Dakshayini:
Efficient task allocation approach using genetic algorithm for cloud environment. 1241-1251 - Zahra Ghanbari
, Nima Jafari Navimipour
, Mehdi Hosseinzadeh
, Aso Mohammad Darwesh:
Resource allocation mechanisms and approaches on the Internet of Things. 1253-1282 - Ritu Garg
, Mamta Mittal
, Le Hoang Son:
Reliability and energy efficient workflow scheduling in cloud environment. 1283-1297 - Ta Nguyen Binh Duong
:
FC2 : cloud-based cluster provisioning for distributed machine learning. 1299-1315 - Ibrahim Aljarah
, Hossam Faris, Seyedali Mirjalili
, Nailah Al-Madi
, Alaa F. Sheta, Majdi M. Mafarja
:
Evolving neural networks using bird swarm algorithm for data classification and regression applications. 1317-1345 - Victor Aluko, Sherif Sakr
:
Big SQL systems: an experimental evaluation. 1347-1377 - Neelam Panwar
, Sarita Negi
, Man Mohan Singh Rauthan
, Kunwar Singh Vaisla
:
TOPSIS-PSO inspired non-preemptive tasks scheduling algorithm in cloud environment. 1379-1396 - Sima Jeddi, Saeed Sharifian
:
A water cycle optimized wavelet neural network algorithm for demand prediction in cloud computing. 1397-1412 - Zijian Cao
, Lei Wang:
An active learning brain storm optimization algorithm with a dynamically changing cluster cycle for global optimization. 1413-1429 - Pan Zhou, Hongfang Yu, Gang Sun, Long Luo, Shouxi Luo, Zilong Ye:
Flow-aware explicit congestion notification for datacenter networks. 1431-1446
Volume 22, Number Supplement 3, May 2019
- Zhaoqiang Wang, Jian Yang, Mingen Wu, Gan He, Qilei Wang:
The performance simulation analysis of material tribological behavior based on the machine sensing algorithm. 5127-5134 - Qun Yin, Jianbo Zhang, Xinkai Wang, Si Liu:
The video intelligent car based on wireless sensor. 5135-5150 - Youquan Chen, Xinhui Liu, Xin Wang, Yanhong Song:
Control strategies and optimization analyses of front-mounted parallel system. 5151-5163 - Xuepeng Liu, Xiaohong Hao, Dongsheng Zhang:
The computation on compressor model of DC inverter based on the intelligent sensing algorithm of water heater system performance. 5165-5173 - Yan Cao, Wanyu Wei, Yu Bai, Hu Qiao:
Multi-base multi-UAV cooperative reconnaissance path planning with genetic algorithm. 5175-5184 - Zhen Guo, Hui Li, Chunjie Cao, Zhengxi Wei:
Verifiable algorithm for outsourced database with updating. 5185-5193 - Shengli Song, Nan Zhang, Haitao Huang:
Named entity recognition based on conditional random fields. 5195-5206 - Xuehua Sun:
Multi-attribute intelligent queueing method for onboard call centers. 5207-5215 - Lei Guo, Wei Zhang, Jialei Zhang:
Neural information coding on small-world spiking neuronal networks modulated by spike-timing-dependent plasticity under external noise stimulation. 5217-5231 - Wei Fang
, Xuezhi Wen, Jiang Xu, Jiezhong Zhu:
CSDA: a novel cluster-based secure data aggregation scheme for WSNs. 5233-5244 - Chang Chen, Shaohui Su, Zhangming Peng, Guojin Chen, Haiqiang Liu, Youping Gong:
A novel simulation strategy for equation-based models of cyber-physical systems. 5245-5255 - Zhizhou Zhang:
Adaptive notch filter design for levitation sensing system based on vibration computation. 5257-5267 - Haijun Xiong, Qi Zhang:
Simulation and real time analysis of network protection tripping strategy based on behavior trees. 5269-5278 - Quanhua Hou, Siliang Yang, Yinnan Fang, Lingda Zhang:
Research on the application of AVC theory in data analysis of urban affairs and planning method. 5279-5292 - Hongbin Sun, Yong Zhang, Bin Hu:
Self-healing reconfiguration scheme for distribution network with distributed generations based on multi-agent systems. 5293-5303 - Yameng Wang, Huanfang Liu:
The characteristic coefficient analysis of the pressure curve type based on the classification method. 5305-5313 - Xiaojie Xu, Juan Shi:
Research on the factors affecting safety behavior based on interpretative structural modeling. 5315-5322 - Wang Quan-wei, Xu Ge-ning, Wen Hao:
Research on health monitoring and sensing technology based on vulnerability analysis. 5323-5332 - Jing Ji
, Wenfu Zhang, Chaoqing Yuan, Yingchun Liu, Zhichao Xu
, Yang Wang, Xiaokun Chen
:
Finite element model based test and analysis on ACHC short columns and hoop coefficient. 5333-5345 - Zhoufeng Wang, Yujun Wang, Lei Wang, Tingshan Zhang, Zhangying Tang:
Research on the comprehensive evaluation system of eco-geological environmental carrying capacity based on the analytic hierarchy process. 5347-5356 - Tingshun Li, Li Xiong, Aiqiang Dong, Ze-San Liu, Wen Tan:
Optimization method based on big data in business process management. 5357-5365 - Mengyuan Chen:
Bionic SLAM based on MEMS pose measurement module and RTAB-Map closed loop detection algorithm. 5367-5378 - Quanfeng Qiu, Yuanhua Lin, Qiugui Shu, Xiangjun Xie:
Optimal evaluation of time step size in numerical simulation for two-dimensional flow sensing. 5379-5396 - Sitong Lv, Zhihong Qian, Yuxi Liu:
Outage probability of SSTS for distributed antenna systems over Rayleigh fading channels in multi-cell environment. 5397-5406 - Shanxiong Chen, Maoling Pen, Hailing Xiong, Sheng Wu:
An anomaly detection method based on Lasso. 5407-5419 - Qinglu Ma, Zheng Zou
, Saleem Ullah
:
An approach to urban traffic condition estimation by aggregating GPS data. 5421-5434 - Lerong Ma, Dandan Song, Lejian Liao, Yao Ni:
A joint deep model of entities and documents for cumulative citation recommendation. 5435-5446 - Kai Cui, Shupeng Fan:
Indoor direct shear and uniaxial compression testing of polymer-modified silt. 5447-5455 - Yongbin Zhu
, Jun-sheng Li:
Collective behavior simulation based on agent with artificial emotion. 5457-5465 - Jianliang Wei, Fei Meng:
Personalized information recommendation based on synonymy tag optimization. 5467-5478 - Qi Li, Chengze Li, Guangyu Gao, Yanyi Huang:
A novel method to find important apps base on the analysis of components relationship. 5479-5489 - Li Yang, Xiedong Cao, Xinyu Geng:
A novel intelligent assessment method for SCADA information security risk based on causality analysis. 5491-5503 - Hui Zhang, Tianming Fei, Wei Guan, Shengwen Zhang, Zhipeng Jin, Weikang Tang:
Research on visual 3D assembly process design and simulation for marine diesel engine. 5505-5519 - Zhisong Wang:
Research on subgraph distribution algorithm based on label null model. 5521-5533 - Qinglu Ma, Jianting Zhou, Saleem Ullah
, Qi Wang:
Operational modal analysis of rigid frame bridge with data from navigation satellite system measurements. 5535-5545 - Yanhong Qin, Guangxing Wei
, Jing-Xin Dong
:
The signaling game model under asymmetric fairness-concern information. 5547-5562 - Fanqi Meng
, Xiaohong Su:
WCET optimization strategy based on source code refactoring. 5563-5572 - Huan Wang
, Jian Gu, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui:
Research on classification and recognition of attacking factors based on radial basis function neural network. 5573-5585 - Jiaguo Lv, Bin Yang, Zhen Yang, Wei Zhang:
A community-based algorithm for influence blocking maximization in social networks. 5587-5602 - Yun Li, Sumit Chakravarty, Shanlin Sun, Zhicheng Tan, Lili Sheng, Ming Yang, Xintong Wu:
A passive detection and tracking divers method based on energy detection and EKF algorithm. 5603-5612 - Sha-Sha Li, Tie-Jun Cui, Jian Liu
:
Study on the construction and application of Cloudization Space Fault Tree. 5613-5633 - Datong Zhou, Huajiao Li
, Zhiping Li, Jinsheng Zhou, Donglong Lin:
Structure Characteristics Analysis of Diesel Sales in Complex Network Method. 5635-5645 - Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao:
Lossy trapdoor functions based on the PLWE. 5647-5654 - Yifeng Jiang, Ranran Liu
, Enxing Zheng:
Mobile sink discovery mechanism in wireless sensor networks with duty cycles. 5655-5662 - Wei Zhang, Sheng Gao, Xu He:
An improved LLE-based cluster security approach for nonlinear system fault diagnosis. 5663-5673 - Qing Su, Yihao Tang, Zhanyi Li
, Kai Liu, Tianyi Cheng:
Analysis of the structure of hive files and the implementation of pivotal operations for distributed computing environment. 5675-5689 - Xiulian Gao, Changyou Guo, Xiuling Yin, Xuedou Yu:
The computation on $$\alpha $$ α -connectedness index of uncertain graph. 5691-5701 - (Withdrawn) A dynamic clustering based method in community detection. 5703-5717
- Yang Gao, Yu Song:
Research on the interactive relationship between information communication technology and manufacturing industry. 5719-5729 - Dong Cui, Qiang Zhang
:
The RFID data clustering algorithm for improving indoor network positioning based on LANDMARC technology. 5731-5738 - Yongliang Ma
:
An object tracking algorithm based on optical flow and temporal-spatial context. 5739-5747 - Xin He, Yin Bo, Jie Du, Keguo Li, Hongcheng Wang, Zhongbao Zhao:
Landscape pattern analysis based on GIS technology and index analysis. 5749-5762 - Jun Hong, Tao Wen, Quan Guo, Zhengwang Ye, Ying Yin:
Privacy protection and integrity verification of aggregate queries in cloud computing. 5763-5773 - Yinqing Tang, Feng Du
:
A delay compensation approach based on internal model control for two-input two-output networked control systems. 5775-5786 - Debao Liu, Xiaofeng Zhao, Yanyan Wang:
Items assignment optimization for complex automated picking Systems. 5787-5797 - Fei Wang, Zhiqiang Chao, Lian-bing Huang, Huaying Li, Chuanqing Zhang:
Trajectory tracking control of robot manipulator based on RBF neural network and fuzzy sliding mode. 5799-5809 - Zhongxun Wang, Min Zhang, Xinglong Gao, Wenqi Wang, Xiaolin Li:
A clustering WSN routing protocol based on node energy and multipath. 5811-5823 - Fei Zhang:
Research for service flow module granularity design based on fuzzy spaces quotient theory. 5825-5837 - Jinzhan Feng, Shuqin Cai, Xiaomeng Ma:
Enhanced sentiment labeling and implicit aspect identification by integration of deep convolution neural network and sequential algorithm. 5839-5857 - Xiaohong Qin, Jingfeng Zhao:
The cognitive computation method of environment changes based on the assessment indicator system. 5859-5867 - Zhan Xu, Xiaoli Xu:
Research and implementation of synchronization for ultra-wide bandwidth receiver within enclosed metal cabin. 5869-5880 - Jingfeng Zhao, Han Zhao'an:
Research on coupling relationship between environmental quality and regional economic growth based on VAR model. 5881-5891 - Haiyan Li:
Dynamic trust game model between venture capitalists and entrepreneurs based on reinforcement learning theory. 5893-5904 - Youxi Wu, Yuehua Wang, Jingyu Liu, Ming Yu, Jing Liu, Yan Li:
Mining distinguishing subsequence patterns with nonoverlapping condition. 5905-5917