Ausgabe 1/2024
Inhalt (51 Artikel)
Lifelong iris presentation attack detection without forgetting
Zhiyong Zhou, Yuanning Liu, Xiaodong Zhu, Shuai Liu, Shaoqiang Zhang, Yuanfeng Li, Zhen Liu
An adaptive stochastic ranking-based tournament selection method for differential evolution
Dahai Xia, Xinyun Wu, Meng Yan, Caiquan Xiong
ECSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p)
Khalid Javeed, Ali El-Moursy, David Gregg
A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic
Chandan Kumar, Sudhanshu Kumar Jha, Dilip Kumar Yadav, Shiv Prakash, Mukesh Prasad
Energy optimized container placement for cloud data centers: a meta-heuristic approach
Avita Katal, Tanupriya Choudhury, Susheela Dahiya
An effective chaotic maps image encryption based on metaheuristic optimizers
Sally Mohamed Sameh, Hossam El-Din Moustafa, Ehab H. AbdelHay, Mohamed Maher Ata
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors
Huafeng Wu, Feng Wang, Xiaojun Mei, Linian Liang, Bing Han, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li
White blood cell classification based on a novel ensemble convolutional neural network framework
Na Dong, Qingyue Feng, Jianfang Chang, Xiaoming Mai
A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism
R. Rajalakshmi, P. Sivakumar, L. Krishna Kumari, M. Chengathir Selvi
The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration
Rebecca H. K. Emanuel, Paul D. Docherty, Helen Lunt, Knut Möller
Component edge connectivity and extra edge connectivity of alternating group networks
Yonghao Lai, Xiaohui Hua
Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer
Jin Yang, Wangdong Yang, Ruixuan Qi, Qinyun Tsai, Shengle Lin, Fengkun Dong, Kenli Li, Keqin Li
JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP
Chih-Yung Chang, Syu-Jhih Jhang, Shih-Jung Wu, Diptendu Sinha Roy
A nano-scale arithmetic and logic unit using a reversible logic and quantum-dots
Nima Jafari Navimipour, Seyed-Sajad Ahmadpour, Senay Yalcin
Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data
Emmanuel Ahishakiye, Waweru Mwangi, Petronilla Muriithi, Fredrick Kanobe, Godliver Owomugisha, Danison Taremwa, Lenard Nkalubo
Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach
Beste Ustubioglu, Gul Tahaoglu, Guzin Ulutas, Arda Ustubioglu, Muhammed Kilic
Parallel program testing based on critical communication and branch transformation
Tian Tian, Anshi Wang, Xiuting Yang, Dunwei Gong, Tie Hou, Xiangjuan Yao
Carbon emission-aware job scheduling for Kubernetes deployments
Tobias Piontek, Kawsar Haghshenas, Marco Aiello
SOS-FCI: a secure offloading scheme in fog–cloud-based IoT
Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali
User satisfaction-based energy-saving computation offloading in fog computing networks
Qun Li, Bei Tang, Jianxin Li, Siguang Chen
Hybrid graph transformer networks for multivariate time series anomaly detection
Rong Gao, Wei He, Lingyu Yan, Donghua Liu, Yonghong Yu, Zhiwei Ye
Proof of location based delivery system using multi-party virtual state channel: a blockchain model
Sujit Sangram Sahoo, Vijay Kumar Chaurasiya
Dynamic weight-based connectivity recovery in wireless sensor and actor networks
Mao-Lun Chiang, Hui-Ching Hsieh, Tzu-Ling Lin, Tsui-Ping Chang, Hong-Wei Chen
Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization
Elham Dalirinia, Mehrdad Jalali, Mahdi Yaghoobi, Hamid Tabatabaee
A new improved KNN-based recommender system
Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee, Ahmad Keshavarz
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor
Namrata Singh, Ayan Kumar Das
An approximation algorithm for virtual machine placement in cloud data centers
Zahra Mahmoodabadi, Mostafa Nouri-Baygi
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks
Rakesh Kumar, Sunil K. Singh, D. K. Lobiyal
Per-user network access control kernel module with secure multifactor authentication
Sheng-Tzong Cheng, Gwo-Jiun Horng, Chih-Wei Hsu, Z.-Yu Su
FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method
Maedeh Khalifavi, Zahra Shirmohammadi, Sahar Kianian
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset
Mehmet Bozdal, Kadir Ileri, Ali Ozkahraman
A novel Blockchain-based authentication scheme for telecare medical information system
M. Indushree, Manish Raj
A scalable and flexible platform for service placement in multi-fog and multi-cloud environments
Sadoon Azizi, Pedram Farzin, Mohammad Shojafar, Omer Rana
Research on load-balancing scheduling optimization for wafer surface defect detection
Tundong Liu, Fengqiang Gao, Xin Chen, Guifang Shao, Chenhan Wang
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning
Jihene Latrech, Zahra Kodia, Nadia Ben Azzouna
Hierarchical search algorithm for error detection in floating-point arithmetic expressions
Zuoyan Zhang, Jinchen Xu, Jiangwei Hao, Yang Qu, Haotian He, Bei Zhou
Deploying warehouse robots with confidence: the BRAIN-IoT framework’s functional assurance
Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaznava, Enrico Ferrera
An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers
Sibo Qi, Juan Chen, Peng Chen, Peian Wen, Xianhua Niu, Lei Xu
Path planning for intelligent vehicles based on improved D* Lite
Xiaomei Li, Ye Lu, Xiaoyu Zhao, Xiong Deng, Zhijiang Xie
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data
Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien‑Hsiung Weng, Kuan‑Ching Li
Correction to: The position-based compression techniques for DNN model
Minghua Tang, Enrico Russo, Maurizio Palesi
Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path
Yifei Wang, Mert Pilanci