Ausgabe 18/2022
Inhalt (15 Artikel)
A convolutional neural network intrusion detection method based on data imbalance
Baiqiang Gan, Yuqiang Chen, Qiuping Dong, Jianlan Guo, Rongxia Wang
A popularity-aware and energy-efficient offloading mechanism in fog computing
Yung-Ting Chuang, Chiu-Shun Hsiang
Pleasure–arousal–outlier model for quantitative evaluation of game experiences
Shinjin Kang, Soo Kyun Kim
Immune optimization inspired artificial natural killer cell earthquake prediction method
Wen Zhou, Kaixin Zhang, Zhe Ming, Jingliang Chen, Yiwen Liang
Land consolidation through parcel exchange among landowners using a distributed Spark-based genetic algorithm
Diego Teijeiro, Margarita Amor, Ramón Doallo, Eduardo Corbelle, Juan Porta, Jorge Parapar
A time sequence location method of long video violence based on improved C3D network
Wen Qu, Ting Zhu, Jie Liu, Jianxin Li
An efficient DBSCAN optimized by arithmetic optimization algorithm with opposition-based learning
Yang Yang, Chen Qian, Haomiao Li, Yuchao Gao, Jinran Wu, Chan-Juan Liu, Shangrui Zhao
An extensible architecture of 32-bit ALU for high-speed computing in QCA technology
Nilesh Patidar, Namit Gupta
Improving heuristics miners for healthcare applications by discovering optimal dependency graphs
Maryam Tavakoli-Zaniani, Mohammad Reza Gholamian, Seyyed Alireza Hashemi-Golpayegani
Particle swarm optimization-based empirical mode decomposition predictive technique for nonstationary data
Cry Kuranga, Njodzi Ranganai, Tendai S. Muwani
Team robot identification theory (TRIT): robot attractiveness and team identification on performance and viability in human–robot teams
Sangseok You, Lionel P. Robert Jr.
Scalable multiscale modeling of platelets with 100 million particles
Changnian Han, Peng Zhang, Yicong Zhu, Guojing Cong, James R. Kozloski, Chih Chieh Yang, Leili Zhang, Yuefan Deng
Hybrid feature selection based on SLI and genetic algorithm for microarray datasets
Sedighe Abasabadi, Hossein Nematzadeh, Homayun Motameni, Ebrahim Akbari
Correction to: Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining
D. Dhinakaran, P. M. Joe Prathap