


default search action
Cluster Computing, Volume 22
Volume 22, Number Supplement 1, January 2019
- Natarajan Yuvaraj

, K. R. SriPreethaa:
Diabetes prediction in healthcare systems using machine learning algorithms on Hadoop cluster. 1-9 - M. Annalakshmi, S. Mohamed Mansoor Roomi, Sheik Naveedh A:

A hybrid technique for gender classification with SLBP and HOG features. 11-20 - D. Sathiya, B. Gomathy

:
Improved security and routing path learning in MANETs using Beer-Quiche game theoritical model in cloud computing. 21-31 - T. Kumaresan

, S. Saravanakumar, Balamurugan Rengeswaran
:
Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine. 33-46 - Suganya Ramamoorthy

, S. Rajaram
:
An efficient categorization of liver cirrhosis using convolution neural networks for health informatics. 47-56 - B. Santhosh Kumar

, S. Karthik, V. P. Arunachalam
:
Upkeeping secrecy in information extraction using 'k' division graph based postulates. 57-63 - S. Sathees Babu

, K. Balasubadra:
Revamping data access privacy preservation method against inside attacks in wireless sensor networks. 65-75 - R. Jayanthi, M. Lilly Florence

:
Software defect prediction techniques using metrics based on neural network classifier. 77-88 - M. Suganthi, V. Karunakaran:

Instance selection and feature extraction using cuttlefish optimization algorithm and principal component analysis using decision tree. 89-101 - S. Ilankumaran

, Deisy Chelliah
:
Multi-biometric authentication system using finger vein and iris in cloud computing. 103-117 - N. Rajesh, A. Arul Lawrence Selvakumar

:
Association rules and deep learning for cryptographic algorithm in privacy preserving data mining. 119-131 - C. Viji, N. Rajkumar

, S. Duraisamy:
Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithm. 133-143 - T. Tamilselvi

, G. Tholkappia Arasu
:
Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree construction. 145-155 - P. Supraja

, V. M. Gayathri, R. Pitchai:
Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networks. 157-163 - V. M. Gayathri

, R. Nedunchelian:
Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation. 165-176 - S. Anantha Padmanabhan, N. J. Krishna Kumar:

An effective pose invariant face recognition system with the aid of ABC optimized ANFIS. 177-187 - S. Chidambaram

, K. G. Srinivasagan:
Performance evaluation of support vector machine classification approaches in data mining. 189-196 - Renuka Devi Rajagopal, Saravanan Murugan

, Kottilingam Kottursamy
, V. Raju:
Cluster based effective prediction approach for improving the curable rate of lymphatic filariasis affected patients. 197-205 - Eswaran Saravana Kumar

, K. Vengatesan:
Trust based resource selection with optimization technique. 207-213 - J. Raja

, K. Gunasekaran, R. Pitchai:
Prognostic evaluation of multimodal biometric traits recognition based human face, finger print and iris images using ensembled SVM classifier. 215-228 - V. Priya

, K. Umamaheswari
:
Enhanced continuous and discrete multi objective particle swarm optimization for text summarization. 229-240 - K. Sasi Kala Rani

, S. N. Deepa
:
Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networks. 241-254 - T. R. Vedhavathy

, M. S. K. Manikandan:
Triple referee incentive mechanism for secure mobile adhoc networks. 255-264 - P. Bharathisindhu

, S. Selva Brunda:
An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network. 265-275 - K. N. Anjan Kumar, S. Chitra, T. Satish Kumar

:
Probabilistic classification techniques to perform geographical labeling of web objects. 277-285 - V. M. Arul Xavier

, S. Annadurai:
Chaotic social spider algorithm for load balance aware task scheduling in cloud computing. 287-297 - (Withdrawn) Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment. 299-310

- D. Muthusankar, B. Kalaavathi, P. Kaladevi

:
High performance feature selection algorithms using filter method for cloud-based recommendation system. 311-322 - Natesan Jayanthi

, K. R. Valluvan
:
Hybrid routing algorithm for improving path selection in sustainable network. 323-334 - K. Ilamathi, P. Rangarajan:

Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chip. 335-346 - R. Mohan Das, E. Chandira Sekaran:

A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motor. 347-360 - Y. Arockia Raj, P. Alli:

Turtle edge encoding and flood fill based image compression scheme. 361-377 - V. Ranganayaki, S. N. Deepa

:
Linear and non-linear proximal support vector machine classifiers for wind speed prediction. 379-390 - Xiaoping Jiang, Jing Sun, Hao Ding, Chenghua Li:

A silhouette based novel algorithm for object detection and tracking using information fusion of video frames. 391-398 - K. Kalai Arasan, P. Anandhakumar:

A new GLoSM embedded virtual machine model for big data services in cloud storage systems. 399-405 - Valliyammai Chinnaiah

, Bhuvaneswari Anbalagan
:
Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks. 407-422 - Rakesh Rajendran

, Sripathi Venkata Naga Santhosh Kumar
, Yogesh Palanichamy, Kannan Arputharaj
:
Detection of DoS attacks in cloud networks using intelligent rule based classification system. 423-434 - C. Mageshkumar, S. Karthik, V. P. Arunachalam

:
Hybrid metaheuristic algorithm for improving the efficiency of data clustering. 435-442 - Archana Nandibewoor

, Ravindra S. Hegadi
:
A novel SMLR-PSO model to estimate the chlorophyll content in the crops using hyperspectral satellite images. 443-450 - (Withdrawn) Information security model of block chain based on intrusion sensing in the IoT environment. 451-468

- R. Aruna, R. Subramanian, P. Sengottuvelan, J. Shanthini:

Optimized energy efficient route assigning method using related node discovery algorithm in MANET. 469-479 - Haibo Liang, Guoliang Li, Wenlong Liang:

Intelligent early warning model of early-stage overflow based on dynamic clustering. 481-492 - Ke Wang

, Huiqin Wang, Zhan Wang, Qinghua Gu, Ying Yin, Li Mao, Ying Lu:
Study of spectral reflectance reconstruction based on regularization matrix R method. 493-502 - Bei Li, Ying Sun, Gongfa Li, Jianyi Kong, Guozhang Jiang, Du Jiang, Bo Tao, Shuang Xu, Honghai Liu

:
Gesture recognition based on modified adaptive orthogonal matching pursuit algorithm. 503-512 - Yong Lu

, Na Sun:
An effective task scheduling algorithm based on dynamic energy management and efficient resource utilization in green cloud computing environment. 513-520 - Guiliang Zhou, Mengru Lv, Tianwen Bao, Lina Mao, Kai Huang:

Design of intelligent carpooling program based on big data analysis and multi-information perception. 521-532 - Pengbo Hu, Yue Ma, Huifeng Xue, Feng Zhang:

Application of low impact development technology in rainwater drainage system reconstruction project. 533-543 - Yun Jing, Yingke Liu, Mingkai Bi:

Quantum-inspired immune clonal algorithm for railway empty cars optimization based on revenue management and time efficiency. 545-554 - ChunYu Zhang, Lei Chen, Rui Bin Gou:

High-speed vision extraction based on the CamShift algorithm. 555-564 - Bin Zhao

, Chuangbai Xiao, Yu Zhang, Peng Zhai, Zhi Wang:
Assessment of recommendation trust for access control in open networks. 565-571 - Lingling Tian, Juncheng Jiang, L. Tian:

Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithm. 573-582 - Zhi Xiong

, Ting Guo, Zhongliang Xue, Weihong Cai, Lingru Cai, Nanfu Luo:
Online energy-efficient deployment based on equivalent continuous DFS for large-scale web cluster. 583-596 - (Withdrawn) Maximum data collection rate routing for data gather trees with data aggregation in rechargeable wireless sensor networks. 597-607

- Yegang Chen

, Hongxiang Wang:
Evolutionary energy balanced ant colony algorithm based on WSNs. 609-621 - Hao Bu, Rong Zhu, Shihong Chen, Xiaoqiong Tan:

Research on concurrency comparison modeling based on $$\uppi $$ π calculus in future computer technology. 623-634 - E. Thangaselvi, K. Meena alias Jeyanthi:

Implementation of flexible denim nickel copper rip stop textile antenna for medical application. 635-645 - (Withdrawn) Splicing image forgery identification based on artificial neural network approach and texture features. 647-660

- Sivakumar Venu

, A. M. J. Md. Zubair Rahman:
Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks. 661-671 - M. V. Ranjith Kumar

, N. Bhalaji
, Swathi Singh
:
An augmented approach for pseudo-free groups in smart cyber-physical system. 673-692 - Shengjun Xue, Yue Peng, Xiaolong Xu

, Jie Zhang, Chao Shen, Feng Ruan:
DSM: a dynamic scheduling method for concurrent workflows in cloud environment. 693-706 - Yajun Liu, Junying Zhang, Aimin Li

, Yuanyuan Zhang
, Yaoyao Li, Xiguo Yuan, Zhongzhen He, Zhaowen Liu, Shouheng Tuo:
Identification of PIWI-interacting RNA modules by weighted correlation network analysis. 707-717 - Zeyun Xiao, Bin Tian, Xiaochun Lu:

Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithm. 719-729 - Yanwei Xu:

Scalable top-k keyword search in relational databases. 731-747 - Jihui Liu, Zhijun He, Junhong Zhang:

The dynamic model of pulverized coal and waste plastic bonded together in flight combustion process. 749-757 - Yonghui Huang

, Zeling Mao, Zhiyu Zhang
, Xinhan Li, Lei Yan:
Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rock. 759-768 - Jin Zhang, Shulin Wang, Yijun Zhou:

Analysis on key dimension's measurement error in high speed computing. 769-779 - Huixian Duan, Yihong Wu, Lei Song, Jun Wang, Na Liu:

Fitting a cluster of line images under central catadioptric camera. 781-793 - Qiming Fu, Wen Hu, Quan Liu, Heng Luo, Lingyao Hu, Jianping Chen:

Residual Sarsa algorithm with function approximation. 795-807 - Ming Wei, Bo Sun, Rong Sun:

Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithm. 809-818 - Zheyuan Liu, Xiaoteng Zhang, Lei Song, Zhengyan Ding, Huixian Duan:

More efficient and effective tricks for deep action recognition. 819-826 - Boping Zhang

:
Distributed SVM face recognition based on Hadoop. 827-834 - (Withdrawn) Assembly sequence planning method based on particle swarm algorithm. 835-846

- Shengli Song

, Wen Huang, Yulong Sun:
Semantic query graph based SPARQL generation from natural language questions. 847-858 - Xiang Pan:

Layered constraint united scheduling model of multi-line lock. 859-870 - Jun Zhang, Yanxiang He, Fanfan Shen, Qing'an Li, Hai Tan:

Memory-aware TLP throttling and cache bypassing for GPUs. 871-883 - Haibo Liu

:
Resource recommendation via user tagging behavior analysis. 885-894 - Yong Zhang, Liyi Zhang, Jianfeng Han, Zhe Ban, Yi Yang:

A new DOA estimation algorithm based on compressed sensing. 895-903 - Zhuosheng Lin, Christophe Guyeux

, Simin Yu, Qianxue Wang, Shuting Cai:
On the use of chaotic iterations to design keyed hash function. 905-919 - Hyunjoo Kim, Jonghyun Kim, Youngsoo Kim

, Ikkyun Kim, Kuinam J. Kim, Hyuncheol Kim:
Improvement of malware detection and classification using API call sequence alignment and visualization. 921-929 - Nakhoon Baek

, Kuinam J. Kim:
Design and implementation of OpenGL SC 2.0 rendering pipeline. 931-936 - Kuinam J. Kim, Nakhoon Baek

:
Providing profiling information for OpenGL ES application programs. 937-941 - Nakhoon Baek

, Kuinam J. Kim:
Prototype implementation of the OpenGL ES 2.0 shading language offline compiler. 943-948 - Donghwoon Kwon, Hyunjoo Kim

, Jinoh Kim, Sang C. Suh, Ikkyun Kim, Kuinam J. Kim:
A survey of deep learning-based network anomaly detection. 949-961 - Miroslav Bures

, Tomás Cerný
, Karel Frajták, Bestoun S. Ahmed
:
Testing the consistency of business data objects using extended static testing of CRUD matrices. 963-976 - Dong Chun Lee

, Do Hyeon Lee:
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks. 977-988 - Yuji Tamura, Doan Truong Thi, Takahiro Chiba, Myungryun Yoo, Takanori Yokoyama

:
A real-time operating system supporting distributed shared memory for embedded control systems. 989-998 - Hyojin Park, Jinhong Yang, Hyuncheol Kim

, Jun Kyun Choi:
Customized video service system design and implementation: from taste to image-based consuming method. 999-1009 - Cong Viet-Ngu Huynh, Jun-Ho Huh

:
B+-tree construction on massive data with Hadoop. 1011-1021 - Tsung-Han Lee, Lin-Huang Chang

, Yan-Wei Liu, Jiun-Jian Liaw, Hung-Chi Chu:
Priority-based scheduling using best channel in 6TiSCH networks. 1023-1033 - Hye-Young Kim, Kuinam J. Kim:

Optimized state update for mobile games in cloud networks. 1035-1041 - Linh Van Ma, Jaehyung Park, Jiseung Nam, Jonghyun Jang, Jinsul Kim:

An efficient scheduling multimedia transcoding method for DASH streaming in cloud environment. 1043-1053 - Nguyen Tan Cam

, Van-Hau Pham, Tuan A. Nguyen
:
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique. 1055-1064 - Sanja Lazarova-Molnar

, Nader Mohamed:
Collaborative data analytics for smart buildings: opportunities and models. 1065-1077 - Ly Hoang Tuan, Nguyen Tan Cam, Van-Hau Pham:

Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis. 1079-1085 - Karnam Sreenu

, Sreelatha Malempati
:
W-Scheduler: whale optimization for task scheduling in cloud computing. 1087-1098 - Vijayakumar Polepally

, K. Shahu Chatrapati:
Dragonfly optimization and constraint measure-based load balancing in cloud computing. 1099-1111 - Ahamed Ali Samsu Aliar

, M. Ramakrishnan:
Secure provable data possession scheme with replication support in the cloud using Tweaks. 1113-1123 - (Withdrawn) Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system. 1125-1135

- S. Bhaskaran

, Santhi Balachandran
:
An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computing. 1137-1149 - Xiang Li

, Zhijian Wang:
A new recommendation algorithm combined with spectral clustering and transfer learning. 1151-1167 - Qiang Yu, Qi Liu:

Accurate detection of user interest data in cloud computing environment. 1169-1178 - (Withdrawn) A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing. 1179-1188

- (Withdrawn) Cluster and cloud computing framework for scientific metrology in flow control. 1189-1198

- (Withdrawn) Classification of sentence level sentiment analysis using cloud machine learning techniques. 1199-1209

- A. Kethsy Prabavathy, J. Devi Shree

:
Histogram difference with Fuzzy rule base modeling for gradual shot boundary detection in video cloud applications. 1211-1218 - (Withdrawn) A FCM cluster: cloud networking model for intelligent transportation in the city of Macau. 1219-1228

- Xindong Duan:

Research on abnormal data detection method of web browser in cloud computing environment. 1229-1238 - M. Madhankumar, C. Suresh Gnana Dhas:

Improved continuous query plan with cluster weighted dominant querying in synthetic datasets. 1239-1246 - Esther Daniel

, N. A. Vasanthi:
LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. 1247-1258 - M. R. M. VeeraManickam, Mohanapriya M.

, Bishwajeet K. Pandey
, Sushma Akhade, S. A. Kale
, Reshma Patil, M. Vigneshwar:
Map-Reduce framework based cluster architecture for academic student's performance prediction using cumulative dragonfly based neural network. 1259-1275 - Ashok George, A. Sumathi:

Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud. 1277-1288 - Sagenela Vijaya Kumar

, C. Nagaraju
:
FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale images. 1289-1311 - Deepak C. Mehetre, SusaiMichael Emalda Roslin, Sanjeev J. Wagh

:
Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. 1313-1328 - Lakshmanan Ramanathan

, G. Parthasarathy
, K. Vijayakumar, L. Lakshmanan, S. Ramani:
Cluster-based distributed architecture for prediction of student's performance in higher education. 1329-1344 - Poonam Yadav:

Cluster based-image descriptors and fractional hybrid optimization for medical image retrieval. 1345-1359 - Praveen Kumar Reddy Maddikunta

, Madda Rajasekhara Babu:
Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things. 1361-1372 - Arvind Madhukar Jagtap, N. Gomathi:

Minimizing movement for network connectivity in mobile sensor networks: an adaptive approach. 1373-1383 - J. Devagnanam, N. M. Elango:

Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloud. 1385-1400 - C. Ashok Kumar

, R. Vimala
, K. R. Aravind Britto
, S. Sathya Devi:
FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud model. 1401-1414 - Venkatesh Munagala

, K. Satya Prasad:
Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systems. 1429-1441 - Dingyou Lei, Peng Zhang, Yinggui Zhang, Yangkun Xia, Shuo Zhao:

Research on coordinated scheduling of multiple systems and single jobs based on improved particle swarm optimization. 1443-1458 - Yongjun Liu

, Yangjie Wei, Wang Yi:
Depth from defocus (DFD) based on VFISTA optimization algorithm in micro/nanometer vision. 1459-1467 - Xiaofei Li

, Di He, Jun-Yi Li:
Parallel image search application based on online hashing hierarchical ranking. 1469-1478 - Sheng Liu, Dongye Sun, Ensi Wu, Datong Qin:

Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmission. 1479-1493 - Yao yu-feng:

Semantic feature hierarchical clustering algorithm based on improved regional merging strategy. 1495-1503 - Yong-qiang Yang:

Research on the single image super-resolution method based on sparse Bayesian estimation. 1505-1513 - Kai-Jian Xia

, Hong-Sheng Yin, Jiangqiang Wang:
A novel improved deep convolutional neural network model for medical image fusion. 1515-1527 - Yan Zhou, Yu Wang, Xu-hui Wang:

Face recognition algorithm based on wavelet transform and local linear embedding. 1529-1540 - Xiang-dong Yin:

Dynamic data driven big data cooperative control scheme with virtual visualization for mobile multimedia communication. 1541-1548 - Xiangong Li, Xufeng Wang, Yu Fang:

Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network model. 1549-1557 - Liu Liu, Jin Xu, Zheng Liu:

Automatic segmentation of coronary lumen based on minimum path and image fusion from cardiac computed tomography images. 1559-1568 - Sheng Liu, Dongye Sun, Ensi Wu, Yong Luo, Datong Qin:

Application of computerized numerical modeling in multi-state wet wheel hub heat simulations. 1569-1580 - Ye Li, Zoe Lin Jiang, Lin Yao, Xuan Wang, Siu-Ming Yiu, Zhengan Huang:

Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties. 1581-1593 - Shehzad Ashraf Chaudhry

, I Luk Kim, Seungmin Rho, Mohammad Sabzinejad Farash
, Taeshik Shon:
An improved anonymous authentication scheme for distributed mobile cloud computing services. 1595-1609 - Ahmed M. Elmisery

, Seungmin Rho, Mohamed Aborizka:
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services. 1611-1638 - Ahmad M. Manasrah

, Ala'a Aldomi, Brij B. Gupta
:
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment. 1639-1653 - Chong-zhi Gao, Qiong Cheng, Xuan Li, Shi-bing Xia:

Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. 1655-1663 - Mahendra Kumar Murmu, Awadhesh Kumar Singh:

A bio-inspired leader election protocol for cognitive radio networks. 1665-1678 - Fan Zhao, Wenqi Shi, Yong Gan, Ziru Peng, Xiangyang Luo:

A localization and tracking scheme for target gangs based on big data of Wi-Fi locations. 1679-1690 - Li Yang, Xiaoyan Jin, Qi Jiang

:
Online handwritten signature verification based on the most stable feature and partition. 1691-1701 - Malik Najmus Saqib

, Junaid Kiani, Basit Shahzad, Adeel Anjum
, Saif Ur Rehman Malik
, Naveed Ahmad, Atta ur Rehman Khan
:
Anonymous and formally verified dual signature based online e-voting protocol. 1703-1716 - Zhengjun Jing

, Chunsheng Gu, Zhimin Yu, Peizhong Shi, Chongzhi Gao:
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. 1717-1727 - Chunyong Yin, Sun Zhang

, Zhichao Yin, Jin Wang
:
Anomaly detection model based on data stream clustering. 1729-1738 - Mariusz Gajewski

, Jordi Mongay Batalla
, George Mastorakis, Constandinos X. Mavromoustakis:
A distributed IDS architecture model for Smart Home systems. 1739-1749 - Fadi Al-Turjman:

A rational data delivery framework for disaster-inspired internet of nano-things (IoNT) in practice. 1751-1763 - Minsu Chae, HwaMin Lee

, Kiyeol Lee:
A performance comparison of linux containers and virtual machines using Docker and KVM. 1765-1775 - Daeyong Jung, Heeseok Jeong, Jaesung Kim, DaeWon Lee, Myungil Kim

:
The resource running time manager for integrated environment. 1777-1786 - Jin Wang

, Chunwei Ju, Hye-Jin Kim, R. Simon Sherratt, Sungyoung Lee:
A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs. 1787-1795 - Yan Li, Gangman Yi, Byeong-Seok Shin

:
Spatial task management method for location privacy aware crowdsourcing. 1797-1803 - Yongjun Ren

, Jin Wang
, Xiujuan Feng, Geumran Youn, Jeong-Uk Kim:
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment. 1805-1814 - Cheol Shim, Kwangho Cha

, Min Choi:
Design and implementation of initial OpenSHMEM on PCIe NTB based cloud computing. 1815-1826 - Duhoe Kim, Yong-Hyun Kim, Dongil Shin, Dongkyoo Shin:

Fast attack detection system using log analysis and attack tree generation. 1827-1835 - Hanjo Jeong, Byeonghwa Park, Minwoo Park, Ki-Bong Kim, Kiseok Choi:

Big data and rule-based recommendation system in Internet of Things. 1837-1846 - (Withdrawn) Development of healthcare service model using physical information data based on cluster sensing technology. 1847-1859

- Boyeon Song

, Jangwon Choi, Sang-Soo Choi, Jungsuk Song:
Visualization of security event logs across multiple networks and its application to a CSOC. 1861-1872 - Seong-Taek Park, Myeong-Ryoon Oh

:
An empirical study on the influential factors affecting continuous usage of mobile cloud service. 1873-1887 - Seungdo Jeong, Jungwon Cho

:
The supporting system for disabled person with the artificial hand controlled by muscle sensor. 1889-1898 - Seok-Woo Jang

, Myunghee Jung
:
Exposed body component-based harmful image detection in ubiquitous sensor data. 1899-1910 - Keon-Myung Lee

, Chan Sik Han, Kwang-Il Kim, Sang Ho Lee:
Word recommendation for English composition using big corpus data processing. 1911-1924 - Kyungyong Chung, Roy C. Park:

Chatbot-based heathcare service with a knowledge base for cloud computing. 1925-1937 - Suhyeon Yoo, O Young Kwon, Dae-hyun Jeong:

Research trend analysis on convergence and joint research of Korea using scientific papers. 1939-1948 - (Withdrawn) Development of a medical big-data mining process using topic modeling. 1949-1958

- Kyung Mi Lee, Yoon-Su Jeong, Sang Ho Lee, Keon-Myung Lee

:
Bucket-size balancing locality sensitive hashing using the map reduce paradigm. 1959-1971 - Gang Hee Jung, Yoon Young Park, Se Yeob Kim, Young Wook Cho:

The study on how to remove the shadow area for WSN based indoor disaster monitoring system. 1973-1984 - Woo-Sik Bae:

Verifying a secure authentication protocol for IoT medical devices. 1985-1990 - Cheol-Joo Chae, Ki-Bong Kim, Han-Jin Cho:

A study on secure user authentication and authorization in OAuth protocol. 1991-1999 - (Withdrawn) Cloud based u-healthcare network with QoS guarantee for mobile health service. 2001-2015

- Hyeok Kang, Keun-Ho Lee, Gui-Jung Kim

:
Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication. 2017-2026 - T. Prasanth

, M. Gunasekaran:
A mutual refinement technique for big data retrieval using hash tag graph. 2027-2037 - Suyi Kim

, So-Yeun Kim
, Kyungmee Choi
:
Modeling and analysis for stock return movements along with exchange rates and interest rates in Markov regime-switching models. 2039-2048 - Hyun-Kyo Oh, Jin-Woo Kim, Sang-Wook Kim, Kichun Lee:

A unified framework of trust prediction based on message passing. 2049-2061 - Suan Lee

, Seok Kang, Jinho Kim, Eun Jung Yu:
Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark cluster. 2063-2087 - Gaoyang Guo, Chaokun Wang, Jun Chen, Pengcheng Ge, Weijun Chen:

Who is answering whom? Finding "Reply-To" relations in group chats with deep bidirectional LSTM networks. 2089-2100 - Seung-Hee Kim

, Woo-Je Kim
:
Evaluation of software quality-in-use attributes based on analysis network process. 2101-2114 - Jooyoung Kim, Dongsoo Kim

:
Analyzing and visualizing comprehensive and personalized online product reviews. 2115-2128 - Xiong Wei, Ming Hu, Tao Peng, Minghua Jiang, Zhiying Wang, Xiao Qin

:
PRODA: improving parallel programs on GPUs through dependency analysis. 2129-2144 - Awais Mahmood

, Ghulam Muhammad
, Mansour Alsulaiman, Habib Dhahri, Esam Othman
, Mohammed Faisal
:
Moving average multi directional local features for speaker recognition. 2145-2157 - Wei She, Dingfang Li, Yongbo Xia, Shasha Tian:

Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanism. 2159-2167 - P. Kuppusamy

, R. Kalpana, P. V. Venkateswara Rao:
Optimized traffic control and data processing using IoT. 2169-2178 - A. M. Senthil Kumar, M. Venkatesan:

Task scheduling in a cloud computing environment using HGPSO algorithm. 2179-2185 - Shigeru Imai, Sida Chen, Wennan Zhu, Carlos A. Varela:

Dynamic data-driven learning for self-healing avionics. 2187-2210 - Elias David Niño Ruiz

, Adrian Sandu:
Efficient parallel implementation of DDDAS inference using an ensemble Kalman filter with shrinkage covariance matrix estimation. 2211-2221 - Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen, Swapna S. Gokhale:

Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform. 2223-2237 - Fangzhou Sun

, Abhishek Dubey
, Jules White, Aniruddha Gokhale
:
Transit-hub: a smart public transportation decision support system with multi-timescale analytical services. 2239-2254 - Xi Fei, Sun Youfu, Ruan Xuejun:

A simulation analysis method based on PSO-RBF model and its application. 2255-2261 - Lu Xin:

Apriori semantic processing orienting at the business English parallel corpus characteristics in business contract. 2263-2271 - Haoliang Lv, Xiaojun Zhou:

Anti load disturbance method for AC servo motor power system. 2273-2283 - Wang Min, Cheng Wen, Ren Jie-Hui, Meng Ting, Wan Tian:

Intelligent distribution characteristic analysis of heavy metals in reservoir sediments. 2285-2292 - Li Li, M. Shamim Hossain, Ahmed A. Abd El-Latif

, Mohammed F. Alhamid:
Distortion less secret image sharing scheme for Internet of Things system. 2293-2307 - (Withdrawn) An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology. 2309-2316

- Md. Abdur Rahman

, M. Shamim Hossain:
A cloud-based virtual caregiver for elderly people in a cyber physical IoT system. 2317-2330 - Hyuncheol Kim

:
Performance evaluation of revised virtual resources allocation scheme in network function virtualization (NFV) networks. 2331-2339 - Hyunjoo Kim

, Jonghyun Kim, Youngsoo Kim
, Ikkyun Kim, Kuinam J. Kim:
Design of network threat detection and classification based on machine learning on cloud computing. 2341-2350 - Sunyoung Kang, Seungae Kang:

The study on the application of virtual reality in adapted physical education. 2351-2355 - Tao Yu, Le Li, Lajiao Chen, Weijing Song:

Low-quality multivariate spatio-temporal serial data preprocessing. 2357-2370 - Yuzhu Wang

, Huiqun Hao
, Junqiang Zhang
, Jinrong Jiang, Juanxiong He, Yan Ma:
Performance optimization and evaluation for parallel processing of big data in earth system models. 2371-2381 - Shengtao Sun

, Jibing Gong, Albert Y. Zomaya
, Aizhi Wu:
A distributed incremental information acquisition model for large-scale text data. 2383-2394 - Dingding Li, Mianxiong Dong

, Yong Tang, Kaoru Ota
:
A novel disk I/O scheduling framework of virtualized storage system. 2395-2405 - Zhuowei Wang, Naixue Xiong, Hao Wang

, Lianglun Cheng, Wuqing Zhao:
Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-level. 2407-2423 - Ahmed A. Abd El-Latif

, M. Shamim Hossain, Ning Wang:
Score level multibiometrics fusion approach for healthcare. 2425-2436 - Samir Elmougy

, M. Shamim Hossain, Ahmed S. Tolba, Mohammed F. Alhamid, Ghulam Muhammad
:
A parameter based growing ensemble of self-organizing maps for outlier detection in healthcare. 2437-2460 - Hyun Seung Son, Young B. Park, Robert Young Chul Kim:

MCCFG: an MOF-based multiple condition control flow graph for automatic test case generation. 2461-2470 - Zhiqiang Zhang

, Jianghua Hu, Xiaoqin Xie, Haiwei Pan, Xiaoning Feng:
An iterative sampling method for online aggregation. 2471-2484 - Alexander Thomasian

:
Mirrored and hybrid disk arrays and their reliability. 2485-2494 - M. Vardhana

, Arunkumar N.
, Enas W. Abdulhay, P. V. Vishnuprasad:
Iot based real time trafic control using cloud computing. 2495-2504 - Chundong Wang

, Honglei Yao
, Zheli Liu:
An efficient DDoS detection based on SU-Genetic feature selection. 2505-2515 - I. Chandra, N. Sivakumar, Gokulnath Chandra Babu

, Parthasarathy Panchatcharam
:
IoT based fall detection and ambient assisted system for the elderly. 2517-2525 - Cao Ngoc Nguyen, Jaehwan Lee, Soonwook Hwang, Jik-Soo Kim

:
On the role of message broker middleware for many-task computing on a big-data platform. 2527-2540 - Ahmed Barnawi, Ahmed Awad, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise

, Sherif Sakr:
Correction to: Runtime self-monitoring approach of business process compliance in cloud environments. 2541
Volume 22, Number 1, March 2019
- Sheng-Yao Su, Wenbin Yao, Xiaoyong Li

:
SORD: a new strategy of online replica deduplication in Cloud-P2P. 1-23 - Ronnie Mativenga

, Joon-Young Paik, Youngjae Kim, Junghee Lee
, Tae-Sun Chung:
RFTL: improving performance of selective caching-based page-level FTL through replication. 25-41 - Sanket Desai

, Rabei Alhadad
, Naveen K. Chilamkurti
, Abdun Naser Mahmood:
A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure. 43-69 - Sugam Sharma, Victor Chang

, U. Sunday Tim, Johnny Wong, Shashi K. Gadia:
Cloud and IoT-based emerging services systems. 71-91 - S Sivaprakash

, M. Venkatesan:
A design and development of an intelligent jammer and jamming detection methodologies using machine learning approach. 93-101 - Natalia G. Miloslavskaya

, Alexander I. Tolstoy:
Internet of Things: information security challenges and solutions. 103-119 - Geunchul Park, Seungwoo Rho, Jik-Soo Kim, Dukyun Nam

:
Towards optimal scheduling policy for heterogeneous memory architecture in many-core system. 121-133 - Woong Sul

, Heon Y. Yeom, Hyungsoo Jung:
Towards Sustainable High-Performance Transaction Processing in Cloud-based DBMS - Design considerations and optimization for transaction processing performance in service-oriented DBMS organization. 135-145 - Jin Ma, Sik Lee, Kumwon Cho, Young-Kyoon Suh:

A simulation provenance data management system for efficient job execution on an online computational science engineering platform. 147-159 - Hanul Sung, Jeesoo Min, Sujin Ha, Hyeonsang Eom:

OMBM: optimized memory bandwidth management for ensuring QoS and high server utilization. 161-174 - Yoori Oh, Yoonhee Kim

:
A resource recommendation method based on dynamic cluster analysis of application characteristics. 175-184 - Javier Prades

, Carlos Reaño
, Federico Silla
:
On the effect of using rCUDA to provide CUDA acceleration to Xen virtual machines. 185-204 - André Felipe Monteiro, Orlando Loques:

Quantum virtual machine: power and performance management in virtualized web servers clusters. 205-221 - P. Muthi Reddy

, Ansaf Ahmed, S. H. Manjula, K. R. Venugopal:
Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers. 223-239 - Asmaa H. Rabie, Shereen H. Ali

, Hesham A. Ali, Ahmed I. Saleh:
A fog based load forecasting strategy for smart grids using big electrical data. 241-270 - Shunfu Jin

, Haixing Wu, Wuyi Yue:
Pricing policy for a cloud registration service with a novel cloud architecture. 271-283 - Yang Lu

, Jiguo Li:
Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. 285-299 - Syed Hamid Hussain Madni

, Muhammad Shafie Abdul Latif, Shafii Muhammad Abdulhamid
, Javed Ali
:
Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment. 301-334
Volume 22, Number 2, June 2019
- Uiseok Song, Bodon Jeong, Sungyong Park

, Kwongyong Lee:
Optimizing communication performance in scale-out storage system. 335-346 - Jangwoong Kim, Youngjae Kim, Awais Khan

, Sungyong Park
:
Understanding the performance of storage class memory file systems in the NUMA architecture. 347-360 - Qichen Chen, Hyojeong Lee, Yoonhee Kim

, Heon Young Yeom, Yongseok Son
:
Design and implementation of skiplist-based key-value store on non-volatile memory. 361-371 - Bodon Jeong, Awais Khan

, Sungyong Park
:
Async-LCAM: a lock contention aware messenger for Ceph distributed storage system. 373-384 - Sangkeun Lee, Hyogi Sim

, Youngjae Kim, Sudharshan S. Vazhkudai:
A programmable shared-memory system for an array of processing-in-memory devices. 385-398 - Ruxia Sun, Sun Zhang

, Chunyong Yin, Jin Wang
, Seungwook Min:
Strategies for data stream mining method applied in anomaly detection. 399-408 - Jianping Zhang, Hong Zhou

, Huimin Gao:
Approximation guarantees of evolutionary optimization on the minimum crossing spanning tree problem. 409-417 - Ammar Almomani

, Mohammad Alauthman
, Mohammed Alweshah
, Osama M. Dorgham
, Firas AlBalas
:
A comparative study on spiking neural network encoding schema: implemented with cloud computing. 419-433 - Xiang Zou, Jinghua Cao, Wei Sun, Quan Guo, Tao Wen:

Flow data processing paradigm and its application in smart city using a cluster analysis approach. 435-444 - Mehdi Pirahandeh

, Deok-Hwan Kim:
Energy-aware RAID scheduling methods in distributed storage applications. 445-454 - Mahmood Hosseini, Constantinos Marios Angelopoulos

, Wei Koong Chai, Stéphane Kuendig
:
Crowdcloud: a crowdsourced system for cloud infrastructure. 455-470 - Bashir Mohammed

, Irfan Awan, Hassan Ugail, Muhammad Younas:
Failure prediction using machine learning in a virtualised HPC system and application. 471-485 - Bozena Malysiak-Mrozek, Tomasz Baron, Dariusz Mrozek

:
Spark-IDPP: high-throughput and scalable prediction of intrinsically disordered protein regions with Spark clusters on the Cloud. 487-508 - Sanjaya K. Panda

, Prasanta K. Jana:
An energy-efficient task scheduling algorithm for heterogeneous cloud computing systems. 509-527 - Rajat Saxena

, Somnath Dey:
A generic approach for integrity verification of big data. 529-540 - Wei Luo

, Wenping Ma:
Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing. 541-551 - Divya Pandove

, Shivani Goel, Rinkle Rani:
General correlation coefficient based agglomerative clustering. 553-583 - Yuling Fang, Qingkui Chen:

A real-time and reliable dynamic migration model for concurrent taskflow in a GPU cluster. 585-599 - Aida A. Nasr

, Anthony T. Chronopoulos
, Nirmeen A. El-Bahnasawy, Gamal Attiya
, Ayman El-Sayed
:
A novel water pressure change optimization technique for solving scheduling problem in cloud computing. 601-617 - Parminder Singh

, Pooja Gupta
, Kiran Jyoti
:
TASM: technocrat ARIMA and SVR model for workload prediction of web applications in cloud. 619-633 - Motassem Al-Tarazi

, J. Morris Chang:
Network-aware energy saving multi-objective optimization in virtualized data centers. 635-647 - Je Sen Teh

, Kaijun Tan, Moatsum Alawida:
A chaos-based keyed hash function based on fixed point representation. 649-660
Volume 22, Number Supplement 2, March 2019
- Haibin Cai, Hao Wu:

An improved formalization analysis approach to determine schedulability of global multiprocessor scheduling based on symbolic safety analysis and statistical model checking in smartphone systems. 2543-2554 - Fang-Ju Ai

:
Research on a large-scale community detection algorithm based on non-weighted graph. 2555-2562 - Ya Gao

, Ying Xiao:
Frame based multicast scheduling for buffered Clos-network switches. 2563-2570 - Hejun Zhu, Liehuang Zhu:

Encrypted network behaviors identification based on dynamic time warping and k-nearest neighbor. 2571-2580 - Xiuqin Pan

, Yong Lu, Na Sun, Sumin Li:
A hybrid artificial bee colony algorithm with modified search model for numerical optimization. 2581-2588 - Weifeng Pan

, Chunlai Chai:
Measuring software stability based on complex networks in software. 2589-2598 - Guangzhi Zhang

, Shaobin Cai:
Universal secure error-correcting (SEC) schemes for network coding via McEliece cryptosystem based on QC-LDPC codes. 2599-2610 - Li Cheng, Gongping Wu:

Obstacles detection and depth estimation from monocular vision for inspection robot of high voltage transmission line. 2611-2627 - Shuang Fu

, Guoyin Zhang, Tingyi Shang:
Cross-layer parallel cooperative spectrum sensing for heterogeneous channels based on iterative KM algorithm. 2629-2637 - Ting You

, Yueli Hu:
Design of the linear controller of a class of time-delay chaos. 2639-2644 - Denghui Zhang

, Yiqi Zhou, Yang Guo:
A modeling and optimization method for heterogeneous objects based on complex networks theory. 2645-2654 - Xiaofei Li

, Di He:
HSBCS framework based performance detection for DS-UWB Systems. 2655-2665 - Shuang Fu

, Guoyin Zhang, Li Yang:
Spectrum sensing defending against PUE attack based on fractal dimension. 2667-2675 - Lei Wang, Xuhui Xia, Jianhua Cao, Xiang Liu:

Modeling and predicting remanufacturing time of equipment using deep belief networks. 2677-2688 - Liu Ang, Fu Shan-na, Zhen-Hong Xiao:

Study on risk assessment of overseas merger and acquisition knowledge integration based on character-weighted set pair. 2689-2700 - Na Zhao

, Yong Yu, Jian Wang, Zhongwen Xie, Zhendi Yang, Lei Cheng:
An extended object-oriented petri net supporting the description and evolution of components: EOOPN. 2701-2708 - Guanchun Li

, Xin Wang, Peng Cui, Jie Li:
Analysis of superconducting linear synchronous motor for electromagnetic propulsion. 2709-2717 - Gongfa Li, Heng Tang, Ying Sun, Jianyi Kong, Guozhang Jiang, Du Jiang, Bo Tao, Shuang Xu, Honghai Liu

:
Hand gesture recognition based on convolution neural network. 2719-2729 - Qingzhen Xu, Miao Li:

A new cluster computing technique for social media data analysis. 2731-2738 - Tao Wang, Zhengquan Xu, Dong Wang, Hao Wang:

Influence of data errors on differential privacy. 2739-2746 - Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang:

A competitive model of popularity prediction using correlation matrix. 2747-2759 - Xuan Chen

, Dan Long:
Task scheduling of cloud computing using integrated particle swarm algorithm and ant colony algorithm. 2761-2769 - Hui Du, Dacheng Liu:

Research and implementation of management information system for Engineering Training Center in university. 2771-2779 - Yanlan Mei, Kefan Xie:

An improved TOPSIS method for metro station evacuation strategy selection in interval type-2 fuzzy environment. 2781-2792 - Lihui Sun

:
A new method for sensorless control of brushless DC motor. 2793-2800 - Zhibo Guo, Kejun Lin

, Jian Huang, Ying Zhang
, Zhengda Cui:
Online object tracking by sparse and structural model. 2801-2808 - Wei Cui

, Ke Wang, Qiang Zhang
, KaiYu Wang:
Simulation on the weld crack growth in the surface of oil/gas pipes by using a magnetic-structural coupling algorithm. 2809-2822 - Xiuju Liu:

A collaborative filtering recommendation algorithm based on the influence sets of e-learning group's behavior. 2823-2833 - Qi Na, Jianyu Zhao, Yonghong Ma:

The optimization and simulation analysis of the enterprise's decision making system with the interference of the consumption strategy. 2835-2850 - Chun-Hong Huang, Yungho Leu

:
Multi-level dataset decomposition for parallel frequent itemset mining on a cluster of personal computers. 2851-2863 - Li Ni

, Manman Peng, Wenjun Jiang, Kenli Li:
A community detection algorithm based on multi-similarity method. 2865-2874 - Lu Liu, Yanqing Guo

, Yongling Fu, Chuangchuang Li
, Liang Guo:
A segmentation scheme with SVR-based prediction in stroke-sensing cylinder. 2875-2887 - S. Hameed Ibrahim

, S. Duraisamy, U. K. Sridevi
:
Flexible and reliable ERP project customization framework to improve user satisfaction level. 2889-2895 - Yunfei Zhou, Xiaocui Hui:

Fault diagnosis method of large-scale complex electromechanical system based on extension neural network. 2897-2906 - Xiang Wu

, Yuyang Wei, Yaqing Mao, Liang Wang
:
A differential privacy DNA motif finding method based on closed frequent patterns. 2907-2919 - Shiyuan Zhou, Yinglin Wang

:
Service ranking in service networks using parameters in complex networks: a comparative study. 2921-2930 - Tao Wang, Minghui Wang:

Distributed collaborative filtering recommendation algorithm based on DHT. 2931-2941 - (Withdrawn) Research on the selection model of technology-based intellectual property evaluation method based on analytic hierarchy process. 2943-2953

- Y. Song:

Load-deflection model for T-section rail press straightening process under lateral loads. 2955-2961 - Xuanqi Ou, Tingjie Lv, Xia Chen:

Research on telecom service providers' network charge strategy based on two-sided market theory. 2963-2969 - Kai Wang, Zhichun Gan, Jingzhi Liu, Wei He, Shun Xu:

Deterministic compressed sensing based channel estimation for MIMO OFDM systems. 2971-2980 - Wenjuan Wang, Yuwang Yang:

Sensor network based radiation detection for emergency system. 2981-2992 - (Withdrawn) An effiecient human tracking system using Haar-like and hog feature extraction. 2993-3000

- Cuifen Zhang

, Lina Hao, Li Fan:
Optimization and improvement of data mining algorithm based on efficient incremental kernel fuzzy clustering for large data. 3001-3010 - Yongcun Cao, Yong Lu, Xiuqin Pan, Na Sun:

An improved global best guided artificial bee colony algorithm for continuous optimization problems. 3011-3019 - Gelan Yang, Wei Tan

, Huixia Jin, Tuo Zhao, Li Tu:
Review wearable sensing system for gait recognition. 3021-3029 - Yong Wang, Changzhao Liu, Yinghua Liao:

Electromechanical dynamic simulation and experiment for multi-stage gear transmission system with planetary gears. 3031-3041 - Jiafeng Huang, Yun Xue, Xiaohui Hu, Huixia Jin, Xin Lu, Zhihuang Liu:

Sentiment analysis of Chinese online reviews using ensemble learning framework. 3043-3058 - Haijun Chen, Guanzheng Tan:

Adaptive iteration localization algorithm based on RSSI in wireless sensor networks. 3059-3067 - Ting Gao, Lina Hu, Zhizhen Jia, Tianna Xia, Chao Fang, Hongzhi Li, Li Hong Hu

, Yinghua Lu, Hui Li:
SPXYE: an improved method for partitioning training and validation sets. 3069-3078 - Xiaokan Wang

, Hairong Dong
, Qiong Wang:
Research of manipulator trajectory tracking based on adaptive robust iterative learning control. 3079-3086 - S. Bhama, G. R. Karpagam:

Application of multivariate Gaussian model for discovery of healthcare services in cloud. 3087-3094 - K. Kumaresan, P. Ganeshkumar:

Software reliability modeling using increased failure interval with ANN. 3095-3102 - Qiangliang Guo

, Jin Xiao
, Xiaoguang Hu, Baochang Zhang:
Local convolutional features and metric learning for SAR image registration. 3103-3114 - T. Rajendran

, T. Gnanasekaran
:
Multi level object relational similarity based image mining for improved image search using semantic ontology. 3115-3122 - Jinsheng Xing, Jianguo Ju

:
On the sub-low contact velocity control of rendezvous docking for smart world. 3123-3130 - R. Thanuja

, A. Umamakeswari
:
Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. 3131-3143 - P. J. A. Alphonse, Venkatramana Reddy Y

:
A method for obtaining authenticated scalable and efficient group key agreement for wireless ad-hoc networks. 3145-3151 - A. Amali Angel Punitha, G. Indumathi:

Centralized cloud information accountability with bat key generation algorithm (CCIA-BKGA) framework in cloud computing environment. 3153-3164 - S. Kayalvili

, M. Selvam:
Hybrid SFLA-GA algorithm for an optimal resource allocation in cloud. 3165-3173 - (Withdrawn) A novel approach for ranking customer reviews using a modified PSO-based aspect ranking algorithm. 3175-3181

- Amr Tolba

, Elsayed Elashkar
:
Soft computing approaches based bookmark selection and clustering techniques for social tagging systems. 3183-3189 - R. Sheeba

, G. Jiji
, T. Ajith Bosco Raj:
WFCM based big sensor data error detection and correction in wireless sensor network. 3191-3200 - (Withdrawn) Hybrid aggregated signcryption scheme using multi-constraints differential evolution algorithm for security. 3201-3211

- R. Sandhiya

, M. Sundarambal:
Clustering of biomedical documents using ontology-based TF-IGM enriched semantic smoothing model for telemedicine applications. 3213-3230 - T. J. Nikose, Ranjan S. Sonparote:

Dynamic along wind response of tall buildings using Artificial Neural Network. 3231-3246 - Mohammed Amoon

, Tarek E. El. Tobely:
A Green energy-efficient scheduler for cloud data centers. 3247-3259 - S. Savitha, P. Thangam

, L. Latha:
An enhancement to SePeCloud with improved security and efficient data management. 3261-3269 - Ke Huang, Hao Lan Zhang

, Gelan Yang:
An optimized IS-APCPSO algorithm for large scale complex traffic network. 3271-3284 - T. Yuvaraja

, R. S. Sabeenian
:
Performance analysis of medical image security using steganography based on fuzzy logic. 3285-3291 - Jingxian Yang:

A novel short-term multi-input-multi-output prediction model of wind speed and wind power with LSSVM based on improved ant colony algorithm optimization. 3293-3300 - A. Saravanaselvan, B. Paramasivan:

Design and implementation of an efficient attack resilient computation algorithm in WSN nodes. 3301-3311 - S. Madhurikkha, R. Sabitha:

A smart power saving protocol for IoT with wireless energy harvesting technique. 3313-3324 - K. Kannan, M. Devaraju:

QoS supported adaptive and multichannel MAC protocol in vehicular ad-hoc network. 3325-3337 - R. Yuvaraj, A. Chandrasekar, S. Jothi

:
Time orient LEAD based polling point selection algorithm for efficient data aggregation in wireless sensor networks. 3339-3346 - R. Kumuthaveni

, E. Chandra:
Iterative Conditional Entropy Kalman filter (ICEKF) for noise reduction and Neuro Optimized Emotional Classifier (NOEC). 3347-3363 - (Withdrawn) The relationship analysis between online reviews and online shopping based on B2C platform technology. 3365-3373

- (Withdrawn) Research on innovation path of school ideological and political work based on large data. 3375-3383

- Xuhua Yuan:

Image multi-target detection and segmentation algorithm based on regional proposed fast intelligent network. 3385-3393 - (Withdrawn) Discussion on new media communication strategy of sports events based on large data technology. 3395-3403

- Pingming Huang, Feng Hu, Fenghui Dong:

Parameter estimation of Gumbel distribution and its application to pitting corrosion depth of concrete girder bridges. 3405-3411 - (Withdrawn) Fuzzy neural network model construction based on shortest path parallel algorithm. 3413-3418

- Gaoxiang Lou, Zongyan Cai

:
Improved hybrid immune clonal selection genetic algorithm and its application in hybrid shop scheduling. 3419-3429 - Yanyu Chen

, Huaqi Chai, Yimiao Huang:
Research on risk assessment in the early development of state-level new areas based on the improved fuzzy comprehensive evaluation model. 3431-3444 - Jun Li Cao:

Algorithm research based on multi period fuzzy portfolio optimization model. 3445-3452 - Jing Gao, Jia-jia Zhang, Xu-liang Guang:

An improved routing algorithm for advanced metering infrastructure in smart grid. 3453-3462 - Yao Ying:

Research on college students' information literacy based on big data. 3463-3470 - (Withdrawn) Urban public art and interaction design strategy based on digital technology. 3471-3478

- Chunjiang Liu:

Optimal design of high-rise building wiring based on ant colony optimization. 3479-3486 - Xiumei Zhang, Chi Ma, Xinmiao Yu:

A neural network model for financial trend predicting. 3487-3494 - Wenjun Xiong, Qi Erna:

Research on brand crisis identify index model based on cluster analysis. 3495-3504 - (Withdrawn) Analysis of image processing algorithm based on bionic intelligent optimization. 3505-3512

- (Withdrawn) Research on semi supervised K-means clustering algorithm in data mining. 3513-3520

- S. Thanga Revathi, N. Ramaraj, Chithra Selvaraj

:
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing. 3521-3530 - (Withdrawn) Research on religious management based on big data. 3531-3542

- (Withdrawn) Researches on hybrid algorithm for moving target detection and tracking in sports video. 3543-3552

- Yun He, Quancheng Zhang:

Automatic generation algorithm analysis of dance movements based on music-action association. 3553-3561 - (Withdrawn) The big data impact and application study on the like ecosystem construction of open internet of things. 3563-3572

- (Withdrawn) Big data analysis and research on consumption demand of sports fitness leisure activities. 3573-3582

- Jie Xu, Yang Liu:

CET-4 score analysis based on data mining technology. 3583-3593 - Li Zhu, Heng Li, Yuxuan Feng:

Research on big data mining based on improved parallel collaborative filtering algorithm. 3595-3604 - (Withdrawn) Research on computer technical assistance tools for special children for music therapy. 3605-3612

- Jiangke Cheng, Xiaodong Mai, Shengnan Wang:

Research on abnormal data mining algorithm based on ICA. 3613-3619 - (Withdrawn) A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem. 3621-3641

- Junfeng Xin, Wang Lei, Shixin Li, Yongbo Zhang:

Improved eigensystem realization algorithm and its application on ocean platforms. 3643-3650 - Ye Zhang:

Multi scenario simulation analysis of environmental carrying capacity in western region based on fusion support vector machine regression prediction algorithm. 3651-3656 - Yangqin Wang:

Research on College English curriculum algorithm based on hierarchical model. 3657-3664 - Yi Liu, Jian Wang, Sabina Shahbazzade:

The improved AFSA algorithm for the berth allocation and quay crane assignment problem. 3665-3672 - Xiangming Mao:

Study on ant colony optimization algorithm for "one-day tour" traffic line. 3673-3680 - (Withdrawn) Research on Chinese and English language information retrieval algorithm based on bilingual theme model. 3681-3688

- (Withdrawn) Research on early warning and monitoring algorithm of financial crisis based on fuzzy cognitive map. 3689-3697

- Bo Liang, Jiatong Liu:

Design and development of sports training system based on image processing technology. 3699-3706 - Bo Wang:

Data analysis of the turning technique process of swimming athletes assisted by computer technology. 3707-3714 - N. Thamaraikannan, S. Kamalraj:

Utilization of compact genetic algorithm for optimal shortest path selection to improve the throughput in mobile Ad-Hoc networks. 3715-3726 - Balamanigandan Ramachandran

, Kamalraj Subramaniam
:
Secure and efficient data forwarding in untrusted cloud environment. 3727-3735 - M. Jamunarani

, C. Vasanthanayaki:
Shape adaptive DCT compression for high quality surveillance using wireless sensor networks. 3737-3747 - J. Vijayalakshmi

, Chinnanadar Ramachandran Rene Robin
:
An exponent based error detection mechanism against DXDOS attack for improving the security in cloud. 3749-3758 - R. Kingsly Stephen

, A. Chandrasekar, K. Dinakaran:
Sectional Transmission analysis approach for improved reliable transmission and secure routing in wireless sensor networks. 3759-3770 - Janani Arthanari

, R. Baskaran:
Enhancement of video streaming analysis using cluster-computing framework. 3771-3781 - A. Kalaivani, B. Ananthi, S. Sangeetha:

Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology. 3783-3790 - V. Kavitha, P. Balamurugan:

A smart sensor network localization for electric grids. 3791-3799 - J. Arun, M. Karthikeyan:

Optimized cognitive radio network (CRN) using genetic algorithm and artificial bee colony algorithm. 3801-3810 - R. Adaline Suji

, D. Bright Anand, R. Lenin Babu:
Polar ice image segmentation using improved estimation and normalization of illumination. 3811-3819 - Zhihua Li:

An adaptive overload threshold selection process using Markov decision processes of virtual machine in cloud data center. 3821-3833 - K. Murugan, V. P. Arunachalam

, S. Karthik:
A hybird filtering approach for mri image with multiresolution. 3835-3840 - Xiaoping Zhou, Xun Liang

, Jichao Zhao, Aakas Zhiyuli, Haiyan Zhang:
Exploration of polygons in online social networks. 3841-3848 - Chaolong Zhang

, Yigang He, Lifen Yuan, Sheng Xiang:
A multiple heterogeneous kernel RVM approach for analog circuit fault prognostic. 3849-3861 - G. Shanmugaraj

, N. Kalaiarasi:
Hearing aid speech signal enhancement via N-parallel FIR-multiplying polynomials for Tamil language dialect syllable ripple and transition variation. 3863-3874 - M. Suganthy

, S. Manjula
:
Enhancement of SNR in fetal ECG signal extraction using combined SWT and WLSR in parallel EKF. 3875-3881 - (Withdrawn) A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud. 3883-3892

- S. J. Pradeeba, K. Sampath

, A. Ramadevi:
Photo-catalytic degradations of methylene blue, malachite green and Bismarck brown using poly(azomethine)/TiO2 nanocomposite. 3893-3909 - (Withdrawn) Improved image compression using effective lossless compression technique. 3911-3916

- C. Amuthadevi

, J. Sathya Priya
, B. Madhusudhanan:
Validation of multicast routing in cyber physical systems monitoring air quality. 3917-3923 - (Withdrawn) Research on fine grained software radio communication algorithm based on GPU parallel processing technology. 3925-3934

- (Withdrawn) Solving algorithm for inverse problem of partial differential equation parameter identification based on IGEP. 3935-3941

- (Withdrawn) Optimal design of transportation distance in logistics supply chain model based on data mining algorithm. 3943-3952

- R. Joseph Manoj, M. D. Anto Praveena

, K. Vijayakumar
:
An ACO-ANN based feature selection algorithm for big data. 3953-3960 - (Withdrawn) A hybrid multi-layer intrusion detection system in cloud. 3961-3969

- Wen Liu, Tuqian Zhang, Yan Liu, Ningning Zhang, Hongyu Tao, Guoqing Fu:

Improved artificial bee colony algorithm based on self-adaptive random optimization strategy. 3971-3980 - Yu Jiang

, Aiqun Hu, Jie Huang:
Importance-based entropy measures of complex networks' robustness to attacks. 3981-3988 - (Withdrawn) The application of particle swarm optimization for the training of neural network in English teaching. 3989-3998

- Yajie Li

, Yan Zhang, Mingxiao Yu, Xiaofei Li:
Drawing and studying on histogram. 3999-4006 - P. Selvarani, Annamalai Suresh

, Malarvizhi N
:
Secure and optimal authentication framework for cloud management using HGAPSO algorithm. 4007-4016 - N. Sridevi, Velmurugan Nagarajan

:
A curve based cryptography for wireless security in MANET. 4017-4025 - (Withdrawn) A new localization technique for node positioning in wireless sensor networks. 4027-4034

- A. N. Arularasan

, Annamalai Suresh
, Koteeswaran Seerangan
:
Identification and classification of best spreader in the domain of interest over the social networks. 4035-4045 - M. Jayekumar, Velmurugan Nagarajan

:
A novel DEA-OR algorithm for route failure recovery in dense wireless sensor networks. 4047-4055 - S. Balu, C. Nelson Kennedy Babu

, K. Amudha
:
Secure and efficient data transmission by video steganography in medical imaging system. 4057-4063 - (Withdrawn) A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks. 4065-4074

- Jiang Lanxiang, Honglei Wang, Zhijun Hu, Zhao Wei:

Repeated game analysis of power suppliers based on dynamic coopetition process and slightly altruistic factor. 4075-4084 - Jingyu Li, Ming Zhou, Gengyin Li:

Intelligent optimization of active power output of wind farm during fault recovery with wake effect. 4085-4090 - Xiao Chen, Liang Pang, Pengze Guo, Xingping Sun, Zhi Xue, N. Arunkumar

:
New upper degree of freedom in transmission system based on wireless G-MIMO communication channel. 4091-4099 - Xiaoqin Li, Qian-Jun Chen

, Zude Ding:
Structural damage diagnosis and fine scale finite element intelligence simulation of long span cable stayed bridges. 4101-4107 - Nan Jiang, Xuefeng Zhao, Jinlong Zhang:

An empirical study on the impact of information system absorption on the performance of troops' logistics organization. 4109-4118 - Wen Aihong, Yan Nan, Xu Caocao:

Multi-classification cluster analysis of large data based on knowledge element in microblogging short text. 4119-4127 - T. Joby Titus

, V. Vijayakumari:
Clock node capacity minimization using lookup table based controller for ultrasound and medical imaging processor. 4129-4134 - Wei Bai:

Hierarchical cluster based evaluation system for computer courses. 4135-4140 - Feifei Sun

, Pinghua Xu
, Xuemei Ding:
Multi-core SVM optimized visual word package model for garment style classification. 4141-4147 - Xinke Leng, Huijun Jiang, Zuo Xin:

Human action tracking design of neural network algorithm based on GA-PSO in physical training. 4149-4155 - Hongwang Zhao, Aicheng Zou:

Eigen vector buckling based boundary analysis method for free vibration of rectangular thin plates. 4157-4163 - Xue Wang, Yue Jin Wu, Ru Jing Wang, Yuan Yuan Wei, Yuanmiao Gui:

Gray BP neural network based prediction of rice protein interaction network. 4165-4171 - Mingze Xia, Xinming Zhang, Yong Zhu:

Real time localization algorithm based on local linear embedding optimization in sensor networks. 4173-4178 - S. Syed Jamaesha

, S. Bhavani:
A secure and efficient cluster based location aware routing protocol in MANET. 4179-4186 - R. Rani Saritha

, Varghese Paul, P. Ganesh Kumar:
Content based image retrieval using deep learning process. 4187-4200 - K. Praghash

, R. Ravi:
Physical-traffic attentive vigorous routing (P-TAVR) and hot-spot detection to reduce the bottleneck in WSN. 4201-4212 - S. Diwakaran

, Balasubramani Perumal
, K. Vimala Devi
:
An intelligent data aware and energy censoring scheme for wireless sensor networks. 4213-4220 - J. K. Mohan Kumar

, H. Abdul Rauf, R. Umamaheswari:
An improved design for grid based PV control systems using modified fuzzy logic with an improved switched capacitor DC-DC converter. 4221-4230 - He Xiao:

BIRCH algorithm and data management in financial enterprises based on dynamic panel GMM test. 4231-4237 - Pei Wang, Xiaodong Zhang, Boling Han, Maoxiang Lang:

Prediction model for railway freight volume with GCA-genetic algorithm-generalized neural network: empirical analysis of China. 4239-4248 - Wei Zhu, Yingsan Wei, Huan Xiao:

Fault diagnosis of neural network classified signal fractal feature based on SVM. 4249-4254 - Liuyi Wang, Wei Zhang:

Pilot multiplexing OFDM system frequency offset estimation method. 4255-4261 - Mao Jun:

Target detection and recognition algorithm for moving UAV based on machine vision. 4263-4269 - Shi Lei:

A novel WSNs routing algorithm based on game theory and energy consumption balance. 4271-4276 - Wendai Lv:

Method and application of data defect analysis based on linear discriminant regression of far subspace. 4277-4282 - Jiao Lei, Rui Manuel Campilho Pereira de Menezes:

Fairness evaluation method of resource allocation based on BPSO multidimensional perspective. 4283-4290 - Yuan-Qiang Lian:

Analysis method of competitive advantage of new industrial innovation alliance based on contraction factor particle swarm optimization (PSO). 4291-4297 - Ding Lei:

Black-Litterman asset allocation model based on principal component analysis (PCA) under uncertainty. 4299-4306 - Chang Liu, N. Arunkumar

:
Risk prediction and evaluation of transnational transmission of financial crisis based on complex network. 4307-4313 - Zhengyang Zhang:

Matrix decomposition model for robust based on M estimate and its application. 4315-4322 - Zhengyang Zhang, Zengyu Mi:

Preference risk assessment method based on grey multi index kernel support vector machine model. 4323-4329 - Liangcai Dong, Yang Yang, Siyun Sun:

QCs scheduling scheme of genetic algorithm (GA) and improved firefly algorithm (FA). 4331-4348 - Hui Wang, Shengnan Liu, Ao Kong:

Theoretical and empirical research on investment behavior strategy based on fuzzy probability. 4349-4359 - Ding Lei:

GARCH model prediction method based on Hessian matrix dynamic programming deep neural network. 4361-4366 - Lina Song:

Analysis of factors affecting investment efficiency based on analytic hierarchy process and support vector machine (SVM) model. 4367-4374 - C. Kavitha, S. Sakthivel

:
An effective mechanism for medical images authentication using quick response code. 4375-4382 - Wang Jue:

Prediction model of pulmonary tuberculosis based on gray kernel AR-SVM model. 4383-4387 - Li Mei:

Productivity prediction method based on analysis model of principal component neural network. 4389-4395 - Xiaobing Yang, Hongyun Liu, Yongmei Peng:

Enhanced perceptual psychopathology correlation mechanism model based on rough set and neural network. 4397-4403 - Zhongfu Wang, Yanhong Feng:

Evaluation model of economic competitiveness based on multi-layer fuzzy neural network. 4405-4412 - Yuan Wei, Dai Xu, Longbin Liu, Xiaodong Miao, Weihua Zhang:

Optimal design of honeycomb sandwich structure cover with multi-objective ant colony algorithm. 4413-4419 - V. Radhika

, K. Baskaran
:
High resolution DPWM clustered architecture for digitally controlled DC-DC converter using FPGA. 4421-4430 - K. Balasamy

, S. Ramakrishnan
:
An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. 4431-4442 - R. Vinu

, Paul Varghese:
Performance analysis of artificial intelligent controllers in PEM fuel cell voltage tracking. 4443-4455 - K. Sakthidasan Sankaran

, S. Prabha, P. M. Rubesh Anand
:
Optimized gradient histogram preservation with block wise SURE shrinkage for noise free image restoration. 4457-4478 - K. Kathiravan

, N. Rathina Prabha
:
Assessment of ramping cost for independent power producers using firefly algorithm and gray wolf optimization. 4479-4490 - Xiaoyu Chen, Jianyong Zheng, Jun Mei:

Grid Connected Photovoltaic Power Generation Control Method Based on Swarm Intelligence Algorithm. 4491-4501 - S. Mahaboob Basha

, M. Kannan:
Novel architecture and implementation of low power oriented full search block motion estimation. 4503-4509 - N. Nagaraju

, S. M. Ramesh:
Implementation of high speed and area efficient MAC unit for industrial applications. 4511-4517 - Yefei Han, Guangwei Bai, Gongxuan Zhang:

Power allocation algorithm based on mixed integer nonlinear programming in WSN. 4519-4525 - Zhuang Xu, Baojun Ge, Dajun Tao:

Multivariable bilinear subspace recursive likelihood identification for pumped storage motor. 4527-4533 - Arun Kumar Sangaiah

, Ahmed Fakhry, Mohamed Abdel-Basset
, Ibrahim M. El-Henawy:
Arabic text clustering using improved clustering algorithms with dimensionality reduction. 4535-4549 - Changhai Huang

, Shenping Hu:
Factors correlation mining on maritime accidents database using association rule learning algorithm. 4551-4559 - Bhalchandra M. Hardas

, Sanjay B. Pokle:
Analysis of OFDM system using DCT-PTS-SLM based approach for multimedia applications. 4561-4569 - Hu Yu, Rui Lv, Zhikun Wei, Zuo Jie, Tingshan Zhang, Chen Ran, Yiqiao Xu:

Potential and trend prediction of unconventional oil and gas resources based on combination forecasting model of variable weight for multi-factor. 4571-4577 - Wang Lei, Jia Zhen Yuan, Zhang Li:

Design of multi-functional simulation platform based on mining speed-regulating magnetic coupling. 4579-4588 - Yafei Wu:

Evaluation system construction of health policy based on system dynamics and complex network. 4589-4596 - Huiming Dai, Xin Zhang, Dacheng Yang:

Research on multichannel transmission of security information in MAC layer based on zoom and forward in VANETs. 4597-4602 - Li Futou, Liu Liang

:
Decision making based on grey model and support vector machine. 4603-4609 - Sarosh Dastoor

, Upena Dalal, Jignesh N. Sarvaiya:
Cellular planning for next generation wireless mobile network using novel energy efficient CoMP. 4611-4623 - Yuqiang Tu:

Benefit evaluation for ocean engineering based on grey Euclid model of game compromise. 4625-4630 - Xinke Leng, Huijun Jiang, Xunhao Zou, Xiaoling Zeng:

Motion feature quantization of athletic sports training based on fuzzy neural network theory. 4631-4638 - Rui Shi:

Analysis and strategy of related factors in patients with sudden cardiac death in Department of Cardiology. 4639-4645 - Kawther Ahmed, Belal Al-Khateeb

, Maher Mahmood
:
Application of chaos discrete particle swarm optimization algorithm on pavement maintenance scheduling problem. 4647-4657 - Yang Yun-xing, Huichang Zhao, Si Chen, Shuning Zhang:

Analysis and design of proximity fuze based on waveguide discontinuity. 4659-4664 - Guo Meng:

Construction of employee training program evaluation system of three exponential forecast based on sliding window. 4665-4671 - S. Karthik

, K. Srikanta Murthy:
Deep belief network based approach to recognize handwritten Kannada characters using distributed average of gradients. 4673-4681 - Moein Sarvaghad-Moghaddam, Ali A. Orouji

, Zeinab Ramezani, Mohamed Elhoseny
, Ahmed Farouk
, Arunkumar N.
:
Modelling the spice parameters of SOI MOSFET using a combinational algorithm. 4683-4692 - Yijiu Zhao, Shuangman Xiao:

Sparse multiband signal spectrum sensing with asynchronous coprime sampling. 4693-4702 - Yingchao Zhang, Yun Mao:

The mechanism of active respiratory circulation in patients with chronic respiratory failure COPD. 4703-4709 - Junting Chen, N. Arunkumar

:
Quantified comparative analysis of innovation and innovation based on multi orientation from the perspective of education and culture. 4711-4718 - Yanhong Wang:

Fuzzy TOPSIS analytic hierarchy process based cooperative development of cultural soft power. 4719-4727 - Mei Ze:

Local weighted regression statistical analysis based mathematical education evaluation. 4729-4735 - Jing Xu, Jian Guo:

Markov chain based simulation analysis of bone mineral density and changes in the level of biochemical markers of bone transformation in postmenopausal women. 4737-4744 - Alaa Tharwat, Mohamed Elhoseny

, Aboul Ella Hassanien
, Thomas Gabel, Arun Kumar Sangaiah:
Intelligent Bézier curve-based path planning model using Chaotic Particle Swarm Optimization algorithm. 4745-4766 - Miao Quan:

Finite element analysis based construction of foundation and foundation evaluation system of underground tunnel. 4767-4773 - Chun Fang, Manfeng Dou, Bo Tan, Jianwei Yang:

Parameter estimation for BLDCM in rescue hoist drive and reduction of torque ripple and winding loss using conditional extremum current model. 4775-4784 - Zhiying Chen, Dinghua Xu, Zhongyi Xiao:

Hybrid intelligent algorithm based option pricing method. 4785-4791 - Deng Yuan:

Intelligent innovative knowledge management integration method based on user generated content. 4793-4803 - Li Yongming, Ying Wang, Haohao Song:

Coordinated development model of E-sports based on three party game. 4805-4812 - Xi Ke, Huiyu Luo, He Xiaohua, Wu Meihua, Wu Guangfeng, Zhu Fang, Gao Fengping, Zeng Guihua:

Fuzzy regression model clustering algorithm based assessment, analysis and acceptance of palliative care and psychological behaviors of elderly patients with cancer pain. 4813-4820 - Liu Manqing, Wan Jin, Jing Chuya, Yanyan Wang, Hong Ganji, Ma qilin, Bi Min, Lu Congxia:

Simulation analysis of the pathogenesis of Parkinson's disease based on multiple factors leading to mitochondrial damage. 4821-4828 - Xiong Jiaxuan:

Research progress on non-fullerene receptor in organic solar cell. 4829-4835 - Yang Ning, Liu Chun Wah, Luo Erdan

:
Stock price prediction based on error correction model and Granger causality test. 4849-4858 - Zhouyu Tian, Guangsheng Zhang

, Jinqi Jiang, Mi Zhou, Xiaoli Yang, Zhenhua Wang:
Grey three index prediction method based on data assimilation preprocessing. 4859-4867 - Jiang Li:

Evaluation method based on neural network differential evolution. 4869-4875 - Yao Jun, Zhijin Wang:

A location algorithm based on Stiefel manifold particle filtering. 4877-4882 - Teng-Fei Wei, Xiaolan Wang:

Analysis and elimination of the return power of the pulse width modulation of the bidirectional full bridge DC-DC converter. 4883-4892 - Dan Li, Fanglei Xue:

Research on the influence of tea culture on tea product innovation based on the natural user interface (NUI) method. 4893-4899 - Li-jun Li, Xiao-guang Zhang:

Discrimination method of wire rope fault signal based on Holzer sensor for multi array weak magnetic detection. 4901-4906 - Minghong She, Baocang Ding:

Closed-loop subspace identification of multivariable dynamic errors-in-variables models based on ORT. 4907-4915 - Hao Shi, Yan Yu:

Discrete element analysis of particles flow in convex arc section of large corrugated sidewall belt conveyor. 4917-4925 - Pei Wang, Xiaodong Zhang, Boling Han, Maoxiang Lang:

Carrying capacity and efficiency optimization model for freight train segment train. 4927-4940 - LingXiao Hu:

A resource management method based on organizational behavior theory and hidden Markov algorithm. 4941-4948 - Tiantian Tang, Pei Hu:

Quantitative standard of promotion strategy and analysis on the influence of consumer purchase behavior. 4949-4955 - Lv Jing, Fangyuan Zhou, Peng Jing:

The longitudinal analysis of the genetic effects on craniofacial morphology in posterior-anterior and lateral cephalograms of female twins aged from 6 to 12 years. 4957-4969 - Fu Tian:

Autoregressive moving average model based relationship identification between exchange rate and export trade. 4971-4977 - He Qin:

The method of mutual influence object getting along with two parties based on repetitive game control. 4979-4987 - Zhiqiang Cao, Zheng Yang, Fang Liu, Ziyu Ye:

Buyback and stockout penalty newsvendor model based on reference point prospect theory. 4989-4999 - Du Chunyu, Wang Li:

High building layout design based on emotional differential evolution algorithm. 5001-5007 - Mingtao Fan, Jun Li, Gong-hui Liu:

Study on the sealing integrity of cement sheath during volume fracturing of shale gas of horizontal well. 5009-5016 - Sun Qiang:

Formulation of physical education and training program based on multidimensional education data mining. 5017-5023 - Yanping Gong, Peng Fan:

Research on the dynamic incentive mechanism of information sharing in social network services based on reputation mechanism. 5025-5031 - Yan-ning Wang, Qiang Zhang, Bin-song Jiang:

Method for analyzing the strength of sandstone with three intermittent fractures based on discrete fracture model as an approximation. 5033-5039 - Shasha Deng, Huoming Shen, Lang Liu, Huaiping Tang:

Numerical investigation of the drag force for cross-sea bridge based on the two-way fluid-structure interaction. 5041-5053 - Zhi-Xiang Liu, Chun-Xue Xie, Miao Xie, Jun Mao:

Mobile robot positioning method based on multi-sensor information fusion laser SLAM. 5055-5061 - Tiancheng Wang:

Research on the optimal cluster number of energy efficiency based on the block model of opportunistic signal. 5063-5069 - Yanyan Jiang:

Competition and the stepping-stone theory in the broadband access market. 5071-5087 - Yawei Cai

, Hui Zhao, Mudong Li, Hanqiao Huang:
3D real-time path planning based on cognitive behavior optimization algorithm for UAV with TLP model. 5089-5098 - Ting Wang

:
Aligning the large-scale ontologies on schema-level for weaving Chinese linked open data. 5099-5114 - Ke Zhang, Liru Guo, Ce Gao, Zhenbing Zhao:

Pyramidal RoR for image classification. 5115-5125
Volume 22, Number 3, September 2019
- Pradeeban Kathiravelu

, Peter Van Roy, Luís Veiga
:
SD-CPS: software-defined cyber-physical systems. Taming the challenges of CPS with workflows at the edge. 661-677 - Santiago Felici-Castell

, Jaume Segura-Garcia
, Miguel García-Pineda
:
Adaptive QoE-based architecture on cloud mobile media for live streaming. 679-692 - Carlos Galdamez, Raj Pamula, Zilong Ye

:
On efficient virtual network function chaining in NFV-based telecommunications networks. 693-703 - Albert Rego

, Sandra Sendra, José Miguel Jiménez
, Jaime Lloret:
Dynamic metric OSPF-based routing protocol for Software Defined Networks. 705-720 - Mona S. Kashkoush, Mohamed Azab, Gamal Attiya

, Amr S. Abed:
Online Smart Disguise: real-time diversification evading coresidency-based cloud attacks. 721-736 - Gabor Kecskemeti

, Zsolt Németh, Attila Kertész
, Rajiv Ranjan:
Cloud workload prediction based on workflow execution time discrepancies. 737-755 - Amir Hossein Borhani, Terence Hung, Bu-Sung Lee, Zheng Qin:

Power-network aware VM migration heuristics for multi-tier web applications. 757-782 - Rahma Djiroun, Kamel Boukhalfa

, Zaia Alimazighi:
Designing data cubes in OLAP systems: a decision makers' requirements-based approach. 783-803 - Ahmed Aboud

, Haifa Touati
, Brahim Hnich
:
Efficient forwarding strategy in a NDN-based internet of things. 805-818 - Ali M. Shatnawi

, Yathrip AlZahouri, Mohammed A. Shehab
, Yaser Jararweh, Mahmoud Al-Ayyoub:
Toward a new approach for sorting extremely large data files in the big data era. 819-828 - Sebastian Laskawiec

, Michal Choras, Rafal Kozik
:
New solutions for exposing clustered applications deployed in the cloud. 829-838 - Jonathan Muraña

, Sergio Nesmachnow, Fermin-Alberto Armenta-Cano, Andrei Tchernykh
:
Characterization, modeling and scheduling of power consumption of scientific computing applications in multicores. 839-859 - Xianhao Xu, Xiaozhen Zhao, Bipan Zou

, Mingze Li:
Optimal dimensions for multi-deep storage systems under class-based storage policies. 861-875 - Jordi Mateo

, Lluís M. Plà-Aragonés
, Francesc Solsona
, Adela Pagès
:
A scalable parallel implementation of the Cluster Benders Decomposition algorithm. 877-886 - Jens Haussmann

, Wolfgang Blochinger, Wolfgang Küchlin:
Cost-efficient parallel processing of irregularly structured problems in cloud computing environments. 887-909 - Bo Wang

, Ying Song, Yuzhong Sun, Jun Liu:
Analysis model for server consolidation of virtualized heterogeneous data centers providing internet services. 911-928 - A. S. Xie

:
Benchmarking based search framework. 929-951 - Ying Xie, Jinzhao Wu:

Multi-objective constraint task scheduling algorithm for multi-core processors. 953-964 - Haifeng Wang

, Yunpeng Cao:
Event driven power consumption optimization control model of GPU clusters. 965-979 - Anwar Kalghoum

, Leïla Azouz Saïdane:
FCR-NS: a novel caching and forwarding strategy for Named Data Networking based on Software Defined Networking. 981-994 - Emiliano Casalicchio

:
A study on performance measures for auto-scaling CPU-intensive containerized applications. 995-1006 - Haohao Zhou

, Guanghan Bai, Su Deng:
Optimal interval scheduling with nonidentical given machines. 1007-1015 - Stefan Bosse

, Dirk Lehmhus:
Material-integrated cluster computing in self-adaptive robotic materials using mobile multi-agent systems. 1017-1037
Volume 22, Number 4, December 2019
- Joo-Chang Kim, Kyungyong Chung:

Sequential-index pattern mining for lifecare telecommunication platform. 1039-1048 - Young Sung Cho, Won Shik Na, Song Chul Moon:

Periodicity analysis using weighted sequential pattern in recommending service. 1049-1056 - Youngjun Moon, Seokhoon Kim

, Intae Ryoo
:
High-performance internet file system based on multi-download for convergence computing in mobile communication systems. 1057-1071 - Lili He, Jin Wang

, Hongtao Bai, Yu Jiang, Tonglin Li:
A novel parallel and distributed magnetotelluric inversion algorithm on multi-threads workloads cluster. 1073-1083 - Aref M. Abdullah, Hesham A. Ali, Amira Y. Haikal:

A reliable, TOPSIS-based multi-criteria, and hierarchical load balancing method for computational grid. 1085-1106 - Ala Darabseh, Nikolaos M. Freris

:
A software-defined architecture for control of IoT cyberphysical systems. 1107-1122 - Guillaume Ruty

, Jean-Louis Rougier, Andre Surcouf, Aloÿs Augustin:
An initial evaluation of 6Stor, a dynamically scalable IPv6-centric distributed object storage system - Precise architecture description and first benchmark results. 1123-1142 - Kallol Krishna Karmakar

, Vijay Varadharajan
, Udaya Kiran Tupakula
:
Mitigating attacks in software defined networks. 1143-1157 - Vasily Tarasov, Lukas Rupprecht, Dimitris Skourtis, Wenji Li, Raju Rangaswami

, Ming Zhao:
Evaluating Docker storage performance: from workloads to graph drivers. 1159-1172 - Andrei Tchernykh

, Vanessa Miranda-López
, Mikhail G. Babenko
, Fermin-Alberto Armenta-Cano
, Gleb I. Radchenko
, Alexander Yu. Drozdov
, Arutyun Avetisyan
:
Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. 1173-1185 - Manuel Aurelio Rodriguez Pascual, José A. Moríñigo

, Rafael Mayo-García
:
Effect of MPI tasks location on cluster throughput using NAS. 1187-1198 - Said Limam

, Riad Mokadem
, Ghalem Belalem
:
Data replication strategy with satisfaction of availability, performance and tenant budget requirements. 1199-1210 - Ünal Çavusoglu, Sezgin Kaçar:

A novel parallel image encryption algorithm based on chaos. 1211-1223 - Pavithra Latha Kumaresan

, T. Sree Sharmila
:
An efficient seed points selection approach in dominant color descriptors (DCD). 1225-1240 - P. M. Rekha

, M. Dakshayini:
Efficient task allocation approach using genetic algorithm for cloud environment. 1241-1251 - Zahra Ghanbari

, Nima Jafari Navimipour
, Mehdi Hosseinzadeh
, Aso Mohammad Darwesh:
Resource allocation mechanisms and approaches on the Internet of Things. 1253-1282 - Ritu Garg

, Mamta Mittal
, Le Hoang Son:
Reliability and energy efficient workflow scheduling in cloud environment. 1283-1297 - Ta Nguyen Binh Duong

:
FC2 : cloud-based cluster provisioning for distributed machine learning. 1299-1315 - Ibrahim Aljarah

, Hossam Faris, Seyedali Mirjalili
, Nailah Al-Madi
, Alaa F. Sheta, Majdi M. Mafarja
:
Evolving neural networks using bird swarm algorithm for data classification and regression applications. 1317-1345 - Victor Aluko, Sherif Sakr

:
Big SQL systems: an experimental evaluation. 1347-1377 - Neelam Panwar

, Sarita Negi
, Man Mohan Singh Rauthan
, Kunwar Singh Vaisla
:
TOPSIS-PSO inspired non-preemptive tasks scheduling algorithm in cloud environment. 1379-1396 - Sima Jeddi, Saeed Sharifian

:
A water cycle optimized wavelet neural network algorithm for demand prediction in cloud computing. 1397-1412 - Zijian Cao

, Lei Wang:
An active learning brain storm optimization algorithm with a dynamically changing cluster cycle for global optimization. 1413-1429 - Pan Zhou, Hongfang Yu, Gang Sun

, Long Luo, Shouxi Luo, Zilong Ye:
Flow-aware explicit congestion notification for datacenter networks. 1431-1446
Volume 22, Number Supplement 3, May 2019
- Zhaoqiang Wang, Jian Yang, Mingen Wu, Gan He, Qilei Wang:

The performance simulation analysis of material tribological behavior based on the machine sensing algorithm. 5127-5134 - Qun Yin, Jianbo Zhang, Xinkai Wang, Si Liu:

The video intelligent car based on wireless sensor. 5135-5150 - Youquan Chen, Xinhui Liu, Xin Wang, Yanhong Song:

Control strategies and optimization analyses of front-mounted parallel system. 5151-5163 - Xuepeng Liu, Xiaohong Hao, Dongsheng Zhang:

The computation on compressor model of DC inverter based on the intelligent sensing algorithm of water heater system performance. 5165-5173 - Yan Cao, Wanyu Wei, Yu Bai, Hu Qiao:

Multi-base multi-UAV cooperative reconnaissance path planning with genetic algorithm. 5175-5184 - Zhen Guo, Hui Li, Chunjie Cao, Zhengxi Wei:

Verifiable algorithm for outsourced database with updating. 5185-5193 - Shengli Song, Nan Zhang, Haitao Huang:

Named entity recognition based on conditional random fields. 5195-5206 - Xuehua Sun:

Multi-attribute intelligent queueing method for onboard call centers. 5207-5215 - Lei Guo, Wei Zhang, Jialei Zhang:

Neural information coding on small-world spiking neuronal networks modulated by spike-timing-dependent plasticity under external noise stimulation. 5217-5231 - Wei Fang

, Xuezhi Wen, Jiang Xu, Jiezhong Zhu:
CSDA: a novel cluster-based secure data aggregation scheme for WSNs. 5233-5244 - Chang Chen, Shaohui Su, Zhangming Peng, Guojin Chen, Haiqiang Liu, Youping Gong:

A novel simulation strategy for equation-based models of cyber-physical systems. 5245-5255 - Zhizhou Zhang:

Adaptive notch filter design for levitation sensing system based on vibration computation. 5257-5267 - Haijun Xiong, Qi Zhang:

Simulation and real time analysis of network protection tripping strategy based on behavior trees. 5269-5278 - Quanhua Hou, Siliang Yang, Yinnan Fang, Lingda Zhang:

Research on the application of AVC theory in data analysis of urban affairs and planning method. 5279-5292 - Hongbin Sun, Yong Zhang, Bin Hu:

Self-healing reconfiguration scheme for distribution network with distributed generations based on multi-agent systems. 5293-5303 - Yameng Wang, Huanfang Liu:

The characteristic coefficient analysis of the pressure curve type based on the classification method. 5305-5313 - Xiaojie Xu, Juan Shi:

Research on the factors affecting safety behavior based on interpretative structural modeling. 5315-5322 - Wang Quan-wei, Xu Ge-ning, Wen Hao:

Research on health monitoring and sensing technology based on vulnerability analysis. 5323-5332 - Jing Ji

, Wenfu Zhang, Chaoqing Yuan, Yingchun Liu, Zhichao Xu
, Yang Wang, Xiaokun Chen
:
Finite element model based test and analysis on ACHC short columns and hoop coefficient. 5333-5345 - Zhoufeng Wang, Yujun Wang, Lei Wang, Tingshan Zhang, Zhangying Tang:

Research on the comprehensive evaluation system of eco-geological environmental carrying capacity based on the analytic hierarchy process. 5347-5356 - Tingshun Li, Li Xiong, Aiqiang Dong, Ze-San Liu, Wen Tan:

Optimization method based on big data in business process management. 5357-5365 - Mengyuan Chen:

Bionic SLAM based on MEMS pose measurement module and RTAB-Map closed loop detection algorithm. 5367-5378 - Quanfeng Qiu, Yuanhua Lin, Qiugui Shu, Xiangjun Xie:

Optimal evaluation of time step size in numerical simulation for two-dimensional flow sensing. 5379-5396 - Sitong Lv, Zhihong Qian, Yuxi Liu:

Outage probability of SSTS for distributed antenna systems over Rayleigh fading channels in multi-cell environment. 5397-5406 - Shanxiong Chen, Maoling Pen, Hailing Xiong, Sheng Wu:

An anomaly detection method based on Lasso. 5407-5419 - Qinglu Ma, Zheng Zou

, Saleem Ullah
:
An approach to urban traffic condition estimation by aggregating GPS data. 5421-5434 - Lerong Ma, Dandan Song, Lejian Liao, Yao Ni:

A joint deep model of entities and documents for cumulative citation recommendation. 5435-5446 - Kai Cui, Shupeng Fan:

Indoor direct shear and uniaxial compression testing of polymer-modified silt. 5447-5455 - Yongbin Zhu

, Jun-sheng Li:
Collective behavior simulation based on agent with artificial emotion. 5457-5465 - Jianliang Wei, Fei Meng:

Personalized information recommendation based on synonymy tag optimization. 5467-5478 - Qi Li, Chengze Li, Guangyu Gao, Yanyi Huang:

A novel method to find important apps base on the analysis of components relationship. 5479-5489 - Li Yang, Xiedong Cao, Xinyu Geng:

A novel intelligent assessment method for SCADA information security risk based on causality analysis. 5491-5503 - Hui Zhang, Tianming Fei, Wei Guan, Shengwen Zhang, Zhipeng Jin, Weikang Tang:

Research on visual 3D assembly process design and simulation for marine diesel engine. 5505-5519 - Zhisong Wang:

Research on subgraph distribution algorithm based on label null model. 5521-5533 - Qinglu Ma, Jianting Zhou, Saleem Ullah

, Qi Wang:
Operational modal analysis of rigid frame bridge with data from navigation satellite system measurements. 5535-5545 - Yanhong Qin, Guangxing Wei

, Jing-Xin Dong
:
The signaling game model under asymmetric fairness-concern information. 5547-5562 - Fanqi Meng

, Xiaohong Su:
WCET optimization strategy based on source code refactoring. 5563-5572 - Huan Wang

, Jian Gu, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui:
Research on classification and recognition of attacking factors based on radial basis function neural network. 5573-5585 - Jiaguo Lv, Bin Yang, Zhen Yang, Wei Zhang:

A community-based algorithm for influence blocking maximization in social networks. 5587-5602 - Yun Li, Sumit Chakravarty, Shanlin Sun, Zhicheng Tan, Lili Sheng, Ming Yang, Xintong Wu:

A passive detection and tracking divers method based on energy detection and EKF algorithm. 5603-5612 - Sha-Sha Li, Tie-Jun Cui, Jian Liu

:
Study on the construction and application of Cloudization Space Fault Tree. 5613-5633 - Datong Zhou, Huajiao Li

, Zhiping Li, Jinsheng Zhou, Donglong Lin:
Structure Characteristics Analysis of Diesel Sales in Complex Network Method. 5635-5645 - Chengli Zhang, Wenping Ma, Hefeng Chen, Feifei Zhao:

Lossy trapdoor functions based on the PLWE. 5647-5654 - Yifeng Jiang, Ranran Liu

, Enxing Zheng:
Mobile sink discovery mechanism in wireless sensor networks with duty cycles. 5655-5662 - Wei Zhang, Sheng Gao, Xu He:

An improved LLE-based cluster security approach for nonlinear system fault diagnosis. 5663-5673 - Qing Su, Yihao Tang, Zhanyi Li

, Kai Liu, Tianyi Cheng:
Analysis of the structure of hive files and the implementation of pivotal operations for distributed computing environment. 5675-5689 - Xiulian Gao, Changyou Guo, Xiuling Yin, Xuedou Yu:

The computation on $$\alpha $$ α -connectedness index of uncertain graph. 5691-5701 - (Withdrawn) A dynamic clustering based method in community detection. 5703-5717

- Yang Gao, Yu Song:

Research on the interactive relationship between information communication technology and manufacturing industry. 5719-5729 - Dong Cui, Qiang Zhang

:
The RFID data clustering algorithm for improving indoor network positioning based on LANDMARC technology. 5731-5738 - Yongliang Ma

:
An object tracking algorithm based on optical flow and temporal-spatial context. 5739-5747 - Xin He, Yin Bo, Jie Du, Keguo Li, Hongcheng Wang, Zhongbao Zhao:

Landscape pattern analysis based on GIS technology and index analysis. 5749-5762 - Jun Hong, Tao Wen, Quan Guo, Zhengwang Ye, Ying Yin:

Privacy protection and integrity verification of aggregate queries in cloud computing. 5763-5773 - Yinqing Tang, Feng Du

:
A delay compensation approach based on internal model control for two-input two-output networked control systems. 5775-5786 - Debao Liu, Xiaofeng Zhao, Yanyan Wang:

Items assignment optimization for complex automated picking Systems. 5787-5797 - Fei Wang, Zhiqiang Chao, Lian-bing Huang, Huaying Li, Chuanqing Zhang:

Trajectory tracking control of robot manipulator based on RBF neural network and fuzzy sliding mode. 5799-5809 - Zhongxun Wang, Min Zhang, Xinglong Gao, Wenqi Wang, Xiaolin Li:

A clustering WSN routing protocol based on node energy and multipath. 5811-5823 - Fei Zhang:

Research for service flow module granularity design based on fuzzy spaces quotient theory. 5825-5837 - Jinzhan Feng, Shuqin Cai, Xiaomeng Ma:

Enhanced sentiment labeling and implicit aspect identification by integration of deep convolution neural network and sequential algorithm. 5839-5857 - Xiaohong Qin, Jingfeng Zhao:

The cognitive computation method of environment changes based on the assessment indicator system. 5859-5867 - Zhan Xu, Xiaoli Xu:

Research and implementation of synchronization for ultra-wide bandwidth receiver within enclosed metal cabin. 5869-5880 - Jingfeng Zhao, Han Zhao'an:

Research on coupling relationship between environmental quality and regional economic growth based on VAR model. 5881-5891 - Haiyan Li:

Dynamic trust game model between venture capitalists and entrepreneurs based on reinforcement learning theory. 5893-5904 - Youxi Wu, Yuehua Wang, Jingyu Liu, Ming Yu, Jing Liu, Yan Li:

Mining distinguishing subsequence patterns with nonove


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID