Issue 3/2023
Content (43 Articles)
Intelligent quotient estimation from MRI images using optimal light gradient boosting machine
P. Thilakavathy, B. Diwan
A dynamic energy conservation scheme with dual-rate adjustment and semi-sleep mode in cloud system
Yu Cui, Yang Zhang, Xia Li, Shunfu Jin
A novel approach towards high-performance image compression using multilevel wavelet transformation for heterogeneous datasets
V. Gowthami, K. Bhoopathy Bagan, S. Ewins Pon Pushpa
Certificateless network coding scheme from certificateless public auditing protocol
Genqing Bian, Mingxuan Song, Bilin Shao
Fault tolerance and quality of service aware virtual machine scheduling algorithm in cloud data centers
Heyang Xu, Sen Xu, Wei Wei, Naixuan Guo
Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks
Mohammed Albishari, Mingchu Li, Runfa Zhang, Esmail Almosharea
A grey wolf optimizer-based chaotic gravitational search algorithm for global optimization
Xianrui Yu, Qiuhong Zhao, Qi Lin, Tongyu Wang
Anti-aliasing convolution neural network of finger vein recognition for virtual reality (VR) human–robot equipment of metaverse
Nghi C. Tran, Jian‑Hong Wang, Toan H. Vu, Tzu-Chiang Tai, Jia-Ching Wang
Characterization of interval graphs that are paired 2-disjoint path coverable
Jung-Heum Park, Hyeong-Seok Lim
ReNo: novel switch architecture for reliability improvement of NoCs
Zahra Shirmohammadi, Yassin Allivand, Fereshte Mozafari, Ahmad Patooghy, Mona Jalal, Sanaz Kazemi Abharian
DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning
Zizhen Liu, Si Chen, Jing Ye, Junfeng Fan, Huawei Li, Xiaowei Li
How much BiGAN and CycleGAN-learned hidden features are effective for COVID-19 detection from CT images? A comparative study
Sima Sarv Ahrabi, Alireza Momenzadeh, Enzo Baccarelli, Michele Scarpiniti, Lorenzo Piazzo
Leveraging temporal-aware fine-grained features for robust multiple object tracking
Han Wu, Jiahao Nie, Ziming Zhu, Zhiwei He, Mingyu Gao
ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems
Ling Xiao, Beiji Zou, Chengzhang Zhu, Fanbo Nie
Wasserstein generative adversarial networks for modeling marked events
S. Haleh S. Dizaji, Saeid Pashazadeh, Javad Musevi Niya
Design of an efficient QCA-based median filter with energy dissipation analysis
Vasudeva Bevara, Syed Alihussain, P. N. S. B. S. V. Prasad, Pradyut K. Sanki
Privacy-preserving edge computing offloading scheme based on whale optimization algorithm
Zhenpeng Liu, Jingyi Wang, Zilin Gao, Jianhang Wei
Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata
P. Rajasekar, H. Mangalam, C. S. Subash Kumar
A pricing approach for optimal use of computing resources in cloud federation
Bijan Pourghorbani Dinachali, Sam Jabbehdari, Hamid Haj Seyyed Javadi
Blockchain technology applications in the health domain: a multivocal literature review
Merve Vildan Baysal, Özden Özcan-Top, Aysu Betin-Can
A new improved maximal relevance and minimal redundancy method based on feature subset
Shanshan Xie, Yan Zhang, Danjv Lv, Xu Chen, Jing Lu, Jiang Liu
HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment
P. Hari Kumar, G. S. AnandhaMala
A power line loss analysis method based on boost clustering
Junde Chen, Adnan Zeb, Yuandong Sun, Defu Zhang
Noise-insensitive image representation via multiple extended LDB and class supervised intelligent coordination feature selection
Xi Zhang, Yongxiong Liu, Ting Chen, Tao Gao
Star-structure connectivity of folded hypercubes and augmented cubes
Lina Ba, Hailun Wu, Heping Zhang
An effective hybrid genetic algorithm and tabu search for maximizing network lifetime using coverage sets scheduling in wireless sensor networks
Nemat allah Mottaki, Homayun Motameni, Hosein Mohamadi
VALKYRIE: a suite of topology-aware clustering approaches for cloud-based virtual network services
Imane El Mansoum, Laaziz Lahlou, Fawaz A. Khasawneh, Nadjia Kara, Claes Edstrom
Community detection in complex networks using stacked autoencoders and crow search algorithm
Sanjay Kumar, Abhishek Mallik, Sandeep Singh Sengar
Hardware-accuracy trade-offs for error-resilient applications using an ultra-efficient hybrid approximate multiplier
Sudeh Shirkavand Saleh Abad, Mohammad Hossein Moaiyeri
Exploring interval implicitization in real-valued time series classification and its applications
Zhifu Tao, Bingxin Yao, Jiaming Zhu
An improved anomaly detection model for IoT security using decision tree and gradient boosting
Maryam Douiba, Said Benkirane, Azidine Guezzaz, Mourade Azrour
A multistep forecasting method for online car-hailing demand based on wavelet decomposition and deep Gaussian process regression
Wenbing Chang, Ruowen Li, Yu Fu, Yiyong Xiao, Shenghan Zhou
Multivariate workload and resource prediction in cloud computing using CNN and GRU by attention mechanism
Javad Dogani, Farshad Khunjush, Mohammad Reza Mahmoudi, Mehdi Seydali
Distribution of DDS-cerberus authenticated facial recognition streams
Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry
Instance segmentation-based review photo validation scheme
Sungwoo Park, Jaeuk Moon, Seongkuk Cho, Eenjun Hwang
Ladybug Beetle Optimization algorithm: application for real-world problems
Saadat Safiri, Amirhossein Nikoofard