Ausgabe 13/2024
Inhalt (59 Artikel)
A federated learning approach to network intrusion detection using residual networks in industrial IoT networks
- Open Access
Nisha Chaurasia, Munna Ram, Priyanka Verma, Nakul Mehta, Nitesh Bharot
An ultra efficient 2:1 multiplexer using bar-shaped pattern in atomic silicon dangling bond technology
Hadi Rasmi, Mohammad Mosleh, Nima Jafari Navimipour, Mohammad Kheyrandish
Low-light image enhancement using transformer with color fusion and channel attention
Yinbang Sun, Jing Sun, Fuming Sun, Fasheng Wang, Haojie Li
A survey of appearance-based approaches for human gait recognition: techniques, challenges, and future directions
- Open Access
Pınar Güner Şahan, Suhap Şahin, Fidan Kaya Gülağız
A hybrid recursive direct system for multi-step mortality rate forecasting
Filipe Coelho de Lima Duarte, Paulo S. G. de Mattos Neto, Paulo Renato Alves Firmino
DGCQN: a RL and GCN combined method for DAG scheduling in edge computing
Bin Qin, Qinyang Lei, Xin Wang
Distributed edge to cloud ensemble deep learning architecture to diagnose Covid-19 from lung image in IoT based e-Health system
Mohammadreza Zamani, Saeed Sharifian
Community detection based on improved user interaction degree, weighted quasi-local path-based similarity and frequent pattern mining
Somaye Sayari, Ali Harounabadi, Touraj Banirostam
Data-free adaptive structured pruning for federated learning
Wei Fan, Keke Yang, Yifan Wang, Cong Chen, Jing Li
Personality-driven experience storage and retrieval for sentiment classification
Yu Ji, Wen Wu, Yi Hu, Xi Chen, Wenxin Hu, Liang He
Prudent carving: a progressively refining algorithm for shape reconstruction from dot patterns
Farnaz Sheikhi, Behnam Zeraatkar, Fatemeh Amereh, Seyedeh Sarah Firouzabadi, Elahe Rasooli Ghalehjoughi
Ocean observing time-series anomaly detection based on DTW-TRSAX method
Yi Wang, Xiaoying Lyu, Shujia Yang
Incorporating multivariate semantic association graphs into multimodal networks for information extraction from documents
Shun Luo, Juan Yu, Yunjiang Xi
Timestamp system for causal broadcast communication
Isabel Muñoz-Fernández, Sergio Arévalo-Viñuales, Pedro de-las-Heras-Quirós
A deep reinforcement learning approach for dynamic task scheduling of flight tests
Bei Tian, Gang Xiao, Yu Shen
A guided genetic algorithm-based ensemble voting of polynomial regression and LSTM (GGA-PolReg-LSTM) for congestion prediction using IoT and air quality data in sustainable cities
Boutheina Jlifi, Mahdi Medini, Claude Duvallet
Allok: a machine learning approach for efficient graph execution on CPU–GPU clusters
Marcelo Koji Moori, Hiago Mayk G. de A. Rocha, Arthur F. Lorenzon, Antonio Carlos S. Beck
Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks
K. Yesodha, M. Krishnamurthy, K. Thangaramya, A. Kannan
MMC: efficient and effective closed high-utility itemset mining
Amir Hossein Mofid, Negin Daneshpour, Zeinab Torabi
Steel surface defect detection based on MobileViTv2 and YOLOv8
Zhongliang Lv, Zhiqiang Zhao, Kewen Xia, Guojun Gu, Kang Liu, Xuanlin Chen
Dependency-position relation graph convolutional network with hierarchical attention mechanism for relation extraction
Nan Li, Ying Wang, Tianxu Liu
Graph-based domain adversarial learning framework for video anomaly detection domain generalization
Xue Mei, Yachuan Wei, Haoyang Chen
Evaluating the latest trends of Industry 4.0 based on LDA topic model
- Open Access
Ozcan Ozyurt, Hakan Özköse, Ahmet Ayaz
ICLB: intelligent controllers load balancing for software-defined based optical data center networks
Kassahun Geresu, Huaxi Gu, Meaad Fadhel, Wenting Wei, Xiaoshan Yu
Improved YOLOv5s combining enhanced backbone network and optimized self-attention for PCB defect detection
Yongfa Zhang, Ming Xu, Qing Zhu, Shuo Liu, Guojin Chen
Identifying influential users using homophily-based approach in location-based social networks
Zohreh Sadat Akhavan-Hejazi, Mahdi Esmaeili, Mostafa Ghobaei-Arani, Behrouz Minaei-Bidgoli
Controller placement issue in software-defined networks with different goals: a comprehensive survey
Hadi Mojez, Hamed Kamel, Roshanak Zanjani, Amir Massoud Bidgoli
Iterative construction of energy and quality-efficient approximate multipliers utilizing lower bit-length counterparts
Samaneh Khosravi, Arezoo Kamran
Hybrid Snake Optimizer Algorithm for Solving Economic Load Dispatch Problem with Valve Point Effect
Noor Aldeen Alawad, Bilal H. Abed-alguni, Misaa El-ibini
QoS-aware edge server placement for collaborative predictive maintenance in industrial internet of things
Aman Mehta, Rahul Kumar Verma
LGCANet: lightweight hand pose estimation network based on HRNet
Xiaoying Pan, Shoukun Li, Hao Wang, Beibei Wang, Haoyi Wang
Quantifying response latency in video surveillance systems using object detection techniques
Jia Miao, Li Zhu, Hongli Zhao, Sen Lin, Xinjun Gao
Fast tridiagonalization of (p, q)-pentadiagonal matrices and its applications
Ji-Teng Jia, Rong Xie, Fatih Yılmaz
A novel target item-based similarity function in privacy-preserving collaborative filtering
- Open Access
Emre Yalcin, Alper Bilge
A novel hybrid deep learning model for early stage diabetes risk prediction
- Open Access
Mehmet Akif Bülbül
MDVR: a novel multicast routing protocol for unmanned mine detection vehicle (UMDV) communication in VANET
Waqar Farooq, Saif ul Islam, Usman Ali Gulzari, Abdullah Gani
An integrated AGV control system using preemptive and non-preemptive mixed RTOS
Daozheng Chen, Jun Gao, Maoting Gao, Hongchen Guo
An efficient graph embedding clustering approach for heterogeneous network
Zahra Sadat Sajjadi, Mahdi Esmaeili, Mostafa Ghobaei-Arani, Behrouz Minaei-Bidgoli
Identifying top-k influential nodes in social networks: a discrete hybrid optimizer by integrating butterfly optimization algorithm with differential evolution
Jianxin Tang, Hongyu Zhu, Lihong Han, Shihui Song
Double firefly based efficient clustering for large-scale wireless sensor networks
Mohamed Sahraoui, Saad Harous
Intelligent quantitative safety monitoring approach for ATP system by neural computing and probabilistic model checking
Yu Cheng, Jinzhao Liu, Xinliang Jiang, Xinyu Du, Ruijun Cheng
SDEGNN: Signed graph neural network for link sign prediction enhanced by signed distance encoding
Jing Chen, Xinyu Yang, Mingxin Liu, Miaomiao Liu
Assessing edge importance in social networks: an importance indicator based on the -sup structure
Mengyao Zhao, Yanhui Zhai, Deyu Li
DICEguard: enhancing DICE security for IoT devices with periodic memory forensics
- Open Access
Yusuf Yamak, Suleyman Tosun, Murat Aydos
FONIC: an energy-conscious fuzzy-based optimized nature-inspired clustering technique for IoT networks
Suha Abdulhussein Abdulzahra, Ali Kadhum M. Al-Qurabat
Influence maximization in community-structured social networks: a centrality-based approach
Maitreyee Ganguly, Paramita Dey, Sarbani Roy
Correction to: Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach
- Correction
Harraz Sajede, Wang Yueyan, Shuang Cong
Correction: A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing
- Correction
Bahman Arasteh, Ali Ghaffari
Retraction Note: DAVmS: Distance Aware Virtual Machine Scheduling approach for reducing the response time in cloud computing
- Retraction Note
G. Justy Mirobi, L. Arockiam
Retraction Note: Sparse low-rank correction scalable video coding based on interactive region of interest viewpoint
- Retraction Note
Li Ang, Zheng Bao-Yu