


default search action
Intelligent Automation & Soft Computing, Volume 34
Volume 34, Number 1, 2022
- Hyun Yoo, Kyungyong Chung:
Classification of Multi-Frame Human Motion Using CNN-based Skeleton Extraction. 1-13 - S. Parvathi, S. Umamaheswari:
Discrete Firefly Algorithm for Optimizing Topology Generation and Core Mapping of Network-on-Chip. 15-32 - S. K. Janarthanan, C. Kathirvel:
Optimized CUK Converter Based 1Φ Grid Tied Photovoltaic System. 33-50 - Debasis Mohapatra, Sourav Kumar Bhoi, Kalyan Kumar Jena, Chittaranjan Mallick, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud:
Core-based Approach to Measure Pairwise Layer Similarity in Multiplex Network. 51-64 - K. C. Rajeswari, R. S. Mohana, S. Manikandan, S. Beski Prabaharan:
Speech Quality Enhancement Using Phoneme with Cepstrum Variation Features. 65-86 - Saydul Akbar Murad, Apurba Adhikary, Abu Jafar Md Muzahid, Md. Murad Hossain Sarker, Md. Ashikur Rahman Khan, Md. Bipul Hossain, Anupam Kumar Bairagi, Mehedi Masud, Md. Kowsher:
AI Powered Asthma Prediction Towards Treatment Formulation: An Android App Approach. 87-103 - Valliappan Raman, Khaled ELKarazle, Patrick H. H. Then:
Gender-specific Facial Age Group Classification Using Deep Learning. 105-118 - Sandeep Kumar, Arpit Jain, Shilpa Rani, Hammam A. Alshazly, Sahar Ahmed Idris, Sami Bourouis:
Deep Neural Network Based Vehicle Detection and Classification of Aerial Images. 119-131 - J. Arravinth, D. Manjula:
Multi-Agent with Multi Objective-Based Optimized Resource Allocation on Inter-Cloud. 133-147 - Rongrong Ni, Xiaofeng Liu, Yizhou Chen, Xu Zhou, Huili Cai, Chu Kiong Loo:
Negative Emotions Sensitive Humanoid Robot with Attention-Enhanced Facial Expression Recognition Network. 149-164 - V. Ravindra Krishna Chandar, M. Thangamani:
False Alarm Reduction in ICU Using Ensemble Classifier Approach. 165-181 - S. Manikandan, P. Dhanalakshmi, K. C. Rajeswari, A. Delphin Carolina Rani:
Deep Sentiment Learning for Measuring Similarity Recommendations in Twitter Data. 183-192 - V. P. Ajay, M. Nesasudha:
Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks. 193-204 - K. Aruna, G. Pradeep:
Ant Colony Optimization-based Light Weight Container (ACO-LWC) Algorithm for Efficient Load Balancing. 205-219 - Ling Wang, Shan Ji, Zhaokang Wang, Xiaowan Wang, Ghulam Mohiuddin, Yongjun Ren:
Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data. 221-234 - Ali G. Alkhathami:
A Stacked Ensemble-Based Classifier for Breast Invasive Ductal Carcinoma Detection on Histopathology Images. 235-247 - G. R. Sreekanth, Adel Fahad Alrasheedi, K. Venkatachalam, Mohamed Abouhawwash, Sameh S. Askar:
Extreme Learning Bat Algorithm in Brain Tumor Classification. 249-265 - Mani Deepak Choudhry, B. Aruna Devi, M. Sundarrajan:
Novel Optimized Framework for Video Processing in IoRT Driven Hospitals. 267-278 - Mahdi Souzanchi-K, Mohammad R. Akbarzadeh-Totonchi, Nadia Naghavi, Ali Sharifnezhad, Vahab Khoshdel:
Adaptive Fuzzy Robust Tracking Control Using Human Electromyogram Signals for Elastic Joint Robots. 279-294 - Xinyao Liu, Baojiang Cui, Lantao Xing:
Generating Synthetic Trajectory Data Using GRU. 295-305 - R. Anand Babu, S. Kannan:
Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method. 307-323 - A. Backia Abinaya, G. Karthikeyan:
Data Offloading in the Internet of Vehicles Using a Hybrid Optimization Technique. 325-338 - Jenson Jose, Therattil Jose P:
Novel L2CL-LCL Topology for Wireless Power Transmission PMSM Powered Electrical Vehicle. 339-355 - Divya Sharma, Sanjay Jain, Vivek Maik:
Energy Efficient Clustering and Optimized LOADng Protocol for IoT. 357-370 - Yintong Wang, Yingjie Yang, Haiyan Chen, Hao Zheng, Heyou Chang:
End-to-end Handwritten Chinese Paragraph Text Recognition Using Residual Attention Networks. 371-388 - M. Murugesan, S. Thilagamani:
Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos. 389-405 - S. Hariharan, R. Venkatesan:
Background Subtraction in Surveillance Systems Using Local Spectral Histograms and Linear Regression. 407-422 - Gurram Sunitha, M. N. Pushpalatha, Anbusubramanian Parkavi, Prasanthi Boyapati, Ranjan Walia, Rachna Kohar, Kashif Qureshi:
Modeling of Chaotic Political Optimizer for Crop Yield Prediction. 423-437 - S. Karthic, S. Manoj Kumar:
Wireless Intrusion Detection Based on Optimized LSTM with Stacked Auto Encoder Network. 439-453 - Min Rao, Yufeng Li, Hongye Liu, Isabel Wang, Yongjun Ren:
Influencing Factors Analysis of Rehabilitation for Patients with Spinal Cord Injury. 455-466 - K. Naveen Durai, R. Subha, Anandakumar Haldorai:
Hybrid Invasive Weed Improved Grasshopper Optimization Algorithm for Cloud Load Balancing. 467-483 - M. L. Ramamoorthy, S. Selvaperumal, G. Prabhakar:
Self-Balancing Vehicle Based on Adaptive Neuro-Fuzzy Inference System. 485-497 - Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab:
A Secure E-commerce Environment Using Multi-agent System. 499-514 - B. Chinthamani, N. S. Bhuvaneswari, R. Senthil Kumar, N. R. Shanker:
Motor Torque Measurement Using Dual-Function Radar Polarized Signals of Flux. 515-530 - Gang Xu, Fan Yun, Xiu-Bo Chen, Shiyuan Xu, Jingzhong Wang, Tao Shang, Yan Chang, Mianxiong Dong:
Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption. 531-541 - Kanagaraj Prathibanandhi, R. Ramesh, C. Yaashuwanth:
Analysis of Brushless DC Motor Using Enhanced Fopid Controller with ALO Algorithm. 543-557 - R. Punithavathi, K. Venkatachalam, Mehedi Masud, Mohammed A. Alzain, Mohamed Abouhawwash:
Crypto Hash Based Malware Detection in IoMT Framework. 559-574 - Vishnu Kumar Kaliappan, Tuan Anh Nguyen, Dugki Min, Jae-Woo Lee, U. Sakthi:
Steering Behavior-based Multiple RUAV Obstacle Avoidance Control. 575-591 - Honggeun Ji, Jina Kim, Syjung Hwang, Eunil Park:
Automated Crack Detection via Semantic Segmentation Approaches Using Advanced U-Net Architecture. 593-607 - Wei Fang, Yu Sha, Meihan Qi, Victor S. Sheng:
Movie Recommendation Algorithm Based on Ensemble Learning. 609-622 - Niraj Kumar, Vishnu Mohan Mishra, Adesh Kumar:
Smart Grid Security by Embedding S-Box Advanced Encryption Standard. 623-638 - S. Deivanayagi, P. S. Periasamy:
Computer Aided Coronary Atherosclerosis Plaque Detection and Classification. 639-653 - D. Kothandaraman, M. Manickam, Ananthakrishnan Balasundaram, D. Pradeep, A. Arulmurugan, Arun Kumar Sivaraman, Sita Rani, Barnali Dey, R. Balakrishna:
Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things. 655-666 - D. Banumathy, Osamah Ibrahim Khalaf, Carlos Andrés Tavera Romero, J. Indra, Dilip Kumar Sharma:
CAD of BCD from Thermal Mammogram Images Using Machine Learning. 667-685 - Siti Nurul Aqmariah Mohd Kanafiah, Mohd. Yusoff Mashor, Zeehaida Mohamed, Yap Chun Way, Shazmin Aniza Abdul Shukor, Yessi Jusman:
An Intelligent Classification System for Trophozoite Stages in Malaria Species. 687-697
Volume 34, Number 2, 2022
- T. Manojpraphakar, A. Soundarrajan:
Deep Contextual Learning for Event-Based Potential User Recommendation in Online Social Networks. 699-713 - Tamara Al Shloul, Usman Azmat, Suliman A. Alsuhibany, Yazeed Yasin Ghadi, Ahmad Jalal, Jeongmin Park:
Smartphone Sensors Based Physical Life-Routine for Health Education. 715-732 - Yurananatul Mangalmurti, Naruemon Wattanapongsakorn:
Practical Machine Learning Techniques for COVID-19 Detection Using Chest X-Ray Images. 733-752 - A. Herald, C. Vennila:
Errorless Underwater Channel Selection Scheme Using Forward Error Rectification and Modulation. 753-768 - Samirah Alzahrani, A. I. EL-Maghrabi, M. S. Badr:
Another View of Weakly Open Sets Via DNA Recombination. 769-783 - Pankaj Jood, Sanjeev Kumar Aggarwal, Vikram Chopra:
Adaptive Neuro-Fuzzy Based Load Frequency Control in Presence of Energy Storage Devices. 785-804 - Sriramulu Bojjagani, D. R. Denslin Brabin, K. Saravanan:
Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment. 805-819 - P. Kavitha, P. Subha Karuvelam:
A Novel Controller for Microgrid Interactive Hybrid Renewable Power Sources. 821-836 - K. Lavanya, K. Vimala Devi, B. R. Tapas Bapu:
Deep Reinforcement Extreme Learning Machines for Secured Routing in Internet of Things (IoT) Applications. 837-848 - Vinay Gautam, Jyoti Rani:
Mango Leaf Stress Identification Using Deep Neural Network. 849-864 - R. S. Jothilakshmi, S. Chitra Selvi:
Control and Automation of Hybrid Renewable Energy Harvesting System. 865-876 - P. Indra, G. Kavithaa:
Adaptive Resource Allocation Neural Network-Based Mammogram Image Segmentation and Classification. 877-893 - S. Kirubadevi, S. Sutha:
PMSG Based Wind Energy Conversion System Using Intelligent MPPT with HGRSC Converter. 895-910 - R. Vidhya, T. T. Mirnalinee:
Hybrid Optimized Learning for Lung Cancer Classification. 911-925 - Jun Wang, Tingjuan Zhang, Yong Cheng, Prof Mingshun Jiang:
Dynamic Selection of Optional Feature for Object Detection. 927-940 - Ahtsham Alam, Syed Ahmed Abdullah, Israr Akhter, Suliman A. Alsuhibany, Yazeed Yasin Ghadi, Tamara Al Shloul, Ahmad Jalal:
Object Detection Learning for Intelligent Self Automated Vehicles. 941-955 - U. Hari, A. Ruhan Bevi:
Dark and Bright Channel Priors for Haze Removal in Day and Night Images. 957-967 - S. Aiswarya, R. Gomathi:
Secured Medical Data Transfer Using Reverse Data Hiding System Through Steganography. 969-982 - R. Saveeth, S. Uma Maheswari:
Crack Detection in Composite Materials Using McrowDNN. 983-1000 - Yingnan Zhao, Peiyuan Ji, Fei Chen, Guanlan Ji, Sunil Kumar Jha:
Spatio-temporal Model Combining VMD and AM for Wind Speed Prediction. 1001-1016 - M. Manicka Raja, S. Manoj Kumar:
Aggregated PSO for Secure Data Transmission in WSN Using Fog Server. 1017-1032 - C. Ajitha, T. Jaya:
Field Programmable Gate Arrays (FPGA) Based Computational Complexity Analysis of Multicarrier Waveforms. 1033-1048 - J. Rajalakshmi, S. Siva Ranjani:
Optimal and Energy Effective Power Allocation Using Multi-Scale Resource GOA-DC-EM in DAS. 1049-1063 - Anjani Kumar Singh, Nitish Pathak, Neelam Sharma, Abhishek Gandhar, Shabana Urooj, Swaleha Zubair, Jabeen Sultana, Guthikonda Nagalaxmi:
An Experimental Approach to Diagnose Covid-19 Using Optimized CNN. 1065-1080 - Chunhua Pan, Yi Cao, Jinglong Ren:
Research on the Identification of Hand-Painted and Machine-Printed Thangka Using CBIR. 1081-1091 - S. Velmurugan, P. Ezhumalai, E. A. Mary Anita:
A Neuro Fuzzy with Improved GA for Collaborative Spectrum Sensing in CRN. 1093-1108 - V. Manimaran, K. G. Srinivasagan:
Person Re-Identification Using LBPH and K-Reciprocal Encoding. 1109-1121 - S. Jeevitha, K. Valarmathi:
A Novel Deep Learning Framework for Pulmonary Embolism Detection for Covid-19 Management. 1123-1139 - M. E. Shajini Sheeba, P. Jagatheeswari:
Hybrid Renewable Energy System Using Cuckoo Firefly Optimization. 1141-1156 - Yuping Deng, Tao Wu, Xi Chen, Amir Homayoon Ashrafzadeh:
Multi-Classification and Distributed Reinforcement Learning-Based Inspection Swarm Offloading Strategy. 1157-1174 - Mukhsar, Ansari Saleh Ahmar, M. A. El Safty, Hamed El-Khawaga, M. El Sayed:
Bayesian Convolution for Stochastic Epidemic Model. 1175-1186 - P. L. Joseph Raj, Krishnan Kalimuthu, Sabitha Gauni, C. T. Manimegalai:
Extended Speckle Reduction Anisotropic Diffusion Filter to Despeckle Ultrasound Images. 1187-1196 - Subaselvi Sundarraj, Gunaseelan Konganathan:
Energy Efficient Mobile Harvesting Scheme for Clustered SDWSN with Beamforming Technique. 1197-1213 - R. Gopi, S. Veena, S. Balasubramanian, D. Ramya, P. Ilanchezhian, A. Harshavardhan, Zatin Gupta:
IoT Based Disease Prediction Using Mapreduce and LSQN3 Techniques. 1215-1230 - E. Gothai, Surbhi Bhatia, Aliaa M. Alabdali, Dilip Kumar Sharma, Bhavana Raj Kondamudi, Pankaj Dadheech:
Design Features of Grocery Product Recognition Using Deep Learning. 1231-1246 - Nabila Mansouri, Khalid Sultan, Aakash Ahmad, Ibrahim Alseadoon, Adal Alkhalil:
A Deep Learning Framework for COVID-19 Diagnosis from Computed Tomography. 1247-1264 - T. Tamilvizhi, R. Surendran, Carlos Andrés Tavera Romero, Sadish Sendil Murugaraj:
Privacy Preserving Reliable Data Transmission in Cluster Based Vehicular Adhoc Networks. 1265-1279 - J. Noorul Ameen, S. Jabeen Begum:
Evolutionary Algorithm Based Adaptive Load Balancing (EA-ALB) in Cloud Computing Framework. 1281-1294 - Alaa Khalid Alduraibi:
A Hybrid Deep Features PSO-ReliefF Based Classification of Brain Tumor. 1295-1309 - Badriya Murdhi Alenzi, Muhammad Badruddin Khan, Mozaherul Hoque Abul Hasanat, Abdul Khader Jilani Saudagar, Mohammed Alkhathami, Abdullah AlTameem:
Automatic Annotation Performance of TextBlob and VADER on Covid Vaccination Dataset. 1311-1331 - Che-Chern Lin, Chien-Chun Pan:
Generating Intelligent Remedial Materials with Genetic Algorithms and Concept Maps. 1333-1349 - T. Ragupathi, M. Govindarajan, T. Priyaradhikadevi:
Class Imbalance Handling with Deep Learning Enabled IoT Healthcare Diagnosis Model. 1351-1366 - Himanshu Sharma, Nidhi Gour, Sumit Chakravarty, Fahad Alraddady, Mehedi Masud, Rajneesh Pareek, Arun Kumar:
Performance Analysis of PTS PAPR Reduction Method for NOMA Waveform. 1367-1375 - P. Anitha, K. Karthik Kumar, M. Ravindran, A. Saravanaselvan:
Evolutionary Algorithm Based Z-Source DC-DC Boost Converter for Charging EV Battery. 1377-1397 - M. Nisha, M. Germin Nisha:
Optimum Tuning of Photovoltaic System Via Hybrid Maximum Power Point Tracking Technique. 1399-1413
Volume 34, Number 3, 2022
- Huiyu Sun, Ralph Grishman:
Employing Lexicalized Dependency Paths for Active Learning of Relation Extraction. 1415-1423 - Hariprasad Siddharthan, Thangavel Deepa, N. Bharathiraja:
Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM. 1425-1440 - D. Karthik Prabhu, R. V. Maheswari, B. Vigneshwaran:
Deep Learning Based Power Transformer Monitoring Using Partial Discharge Patterns. 1441-1454 - Yazeed Yasin Ghadi, Israr Akhter, Suliman A. Alsuhibany, Tamara Al Shloul, Ahmad Jalal, Kibum Kim:
Multiple Events Detection Using Context-Intelligence Features. 1455-1471 - Wei Zhou, Hao Wang, Ghulam Mohiuddin, Dan Chen, Yongjun Ren:
Consensus Mechanism of Blockchain Based on PoR with Data Deduplication. 1473-1488 - Joddat Fatima, Amina Jameel, Muhammad Usman Akram, Adeel Muzaffar Syed, Malaika Mushtaq:
Automatic Localization and Segmentation of Vertebrae for Cobb Estimation and Curvature Deformity. 1489-1504 - D. Yuvaraj, S. Shanmuga Priya, M. Braveen, S. Navaneetha Krishnan, S. Nachiyappan, Abolfazl Mehbodniya, A. Mohamed Uvaze Ahamed, M. Sivaram:
Novel DoS Attack Detection Based on Trust Mode Authentication for IoT. 1505-1522 - May A. Al-Otaibi, Hesham Alhumyani, Saleh Ibrahim, Alaa M. Abbas:
Efficient Medical Image Encryption Framework against Occlusion Attack. 1523-1536 - T. Vetriselvi, J. Albert Mayan, K. V. Priyadharshini, K. Sathyamoorthy, S. Venkata Lakshmi, P. Vishnu Raja:
Latent Semantic Based Fuzzy Kernel Support Vector Machine for Automatic Content Summarization. 1537-1551 - Daqing Wu, Jiye Cui, Dan Li, Romany Fouad Mansour:
A New Route Optimization Approach of Fresh Agricultural Logistics Distribution. 1553-1569 - M. Kavitha, B. Sankara Babu, B. Sumathy, T. Jackulin, N. Ramkumar, A. Manimaran, Ranjan Walia, S. Neelakandan:
Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins. 1571-1586 - M. Sangeetha, S. Malathi:
Modeling Metaheuristic Optimization with Deep Learning Software Bug Prediction Model. 1587-1601 - B. Venkatesan, S. Chitra:
Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage. 1603-1615 - M. Vanitha, C. T. Kalaivani, J. Kirubakaran, R. Praveena:
Effective Channel Allocation for Hybrid Network Usage Between Wi-Fi and Cellular Network. 1617-1627 - Jiaqi Wang, Jie Zhang, Genlin Ji, Bo Sheng:
Criss-Cross Attention Based Auto Encoder for Video Anomaly Event Detection. 1629-1642 - R. Meena, V. Thulasi Bai:
Depression Detection on COVID 19 Tweets Using Chimp Optimization Algorithm. 1643-1658 - Ashit Kumar Dutta, Yasser Albagory, Farhan M. Obesat, Anas Waleed Abulfaraj:
Chaotic Krill Herd with Fuzzy Based Routing Protocol for Wireless Networks. 1659-1674 - E. P. Kannan, S. S. Vinsley, T. V. Chithra:
Medical Image Demosaicing Based Design of Newton Gregory Interpolation Algorithm. 1675-1691 - A. Jameer Basha, N. Rajkumar, Mohammed A. Alzain, Mehedi Masud, Mohamed Abouhawwash:
Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data. 1693-1706 - Jianquan Ouyang, Jing Zhang, Tianming Liu:
Attention Weight is Indispensable in Joint Entity and Relation Extraction. 1707-1723 - Vijaya Krishna Sonthi, Nagarajan S, N. Krishnaraj:
Deep Learning Based Residual Network Features for Telugu Printed Character Recognition. 1725-1736 - Wen-Tsai Sung, Sung-Jung Hsiao:
Intelligent Measurement and Monitoring by Integrating Fieldbus and Robotic Arm. 1737-1753 - Maganti Srinivas, M. Ramesh Patnaik:
Energy-Efficient Secure Adaptive Neuro Fuzzy Based Clustering Technique for Mobile Adhoc Networks. 1755-1767 - K. Sudharson, S. Arun:
Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm. 1769-1784 - Liutao Zhao, Jiawan Zhang, Hairong Jing:
Blockchain-Enabled Digital Rights Management for Museum-Digital Property Rights. 1785-1801 - R. S. Latha, K. Venkatachalam, Jehad F. Al-Amri, Mohamed Abouhawwash:
Shrinkage Linear with Quadratic Gaussian Discriminant Analysis for Big Data Classification. 1803-1818 - Henry Ugochukwu Ukwu, Kamil Yurtkan:
4D Facial Expression Recognition Using Geometric Landmark-based Axes-angle Feature Extraction. 1819-1838 - J. Praveenchandar, A. Tamilarasi:
Resource Allocation Using Phase Change Hyper Switching Algorithm in the Cloud Environment. 1839-1850 - B. Gomathi, S. T. Suganthi, T. N. Prabhu, Andriy Kovalenko:
Multi-Objective Immune Algorithm for Internet of Vehicles for Data Offloading. 1851-1860 - Weijian Zhang, Hao Wang, Hao Hua, Qirun Wang:
Selfish Mining and Defending Strategies in the Bitcoin. 1861-1875 - Kavitha Chinniyan, Thamil Vani Samiyappan, Aishvarya Gopu, Narmatha Ramasamy:
Image Steganography Using Deep Neural Networks. 1877-1891 - N. Sureka, K. Gunaseelan:
Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm. 1893-1906 - Sakorn Mekruksavanich, Anuchit Jitpattanakul:
Sport-Related Activity Recognition from Wearable Sensors Using Bidirectional GRU Network. 1907-1925 - S. Rajagopal, T. Ramakrishnan, S. Vairaprakash:
Anatomical Region Detection Scheme Using Deep Learning Model in Video Capsule Endoscope. 1927-1941 - Wenwu Tan, Jianjun Zhang, Jiang Wu, Hao Lan, Xing Liu, Ke Xiao, Li Wang, Haijun Lin, Guang Sun, Peng Guo:
Application of CNN and Long Short-Term Memory Network in Water Quality Predicting. 1943-1958 - S. Rajeswari, S. A. Arunmozhi, Y. Venkataramani:
Optimized Reinforcement Learning Based Multipath Transfer Protocol in Wireless Mesh Network. 1959-1970 - Wen-Tsai Sung, Ching-Hao Weng, Sung-Jung Hsiao:
Smart Greenhouse Control via NB-IoT. 1971-1988 - Anil Sharma, Suresh Kumar:
Shallow Neural Network and Ontology-Based Novel Semantic Document Indexing for Information Retrieval. 1989-2005 - Arpit Jain, Adesh Kumar, Anand Prakash Shukla, Hammam Alshazly, Hela Elmannai, Abeer D. Algarni, Roushan Kumar, Jitendra Yadav:
Smart Communication Using 2D and 3D Mesh Network-on-Chip. 2007-2021 - Chenxi Yu, Xin Li:
SSAG-Net: Syntactic and Semantic Attention-Guided Machine Reading Comprehension. 2023-2034 - P. Thilagavathi, S. Karthikeyan:
Adaptive Multicale Transformation Run-Length Code-Based Test Data Compression in Benchmark Circuits. 2035-2050 - Hani A. Albalawi, Ahmed M. Kassem, Sherif A. Zaid, Abderrahim Lakhouit, Muhammed A. Arshad:
Energy Management of an Isolated Wind/Photovoltaic Microgrid Using Cuckoo Search Algorithm. 2051-2066 - P. Ramadevi, K. N. Baluprithviraj, V. Ayyem Pillai, Kamalraj Subramaniam:
Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems. 2067-2081 - K. Muthulakshmi, N. Krishnaraj, R. S. Ravi Sankar, A. Balakumar, S. Kanimozhi, B. Kiruthika:
A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems. 2083-2096 - Ashit Kumar Dutta, Basit Qureshi, Yasser Albagory, Majed Alsanea, Anas Waleed Abulfaraj, Abdul Rahaman Wahab Sait:
Glowworm Optimization with Deep Learning Enabled Cybersecurity in Social Networks. 2097-2110

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.