Last update:
Fri Feb 21 11:03:55 MST 2025
G. S. Maharana and P. K. Meher Parallel Algorithms and Systolic Architectures for $1$- and $2$-D Interpolation Using Discrete Hartley Transform . . . . . . . . . . . . . . . 1--7 F. S. Al-Anzi and K. M. Al-Zamel Improved Parallel Cell Placement Algorithm Using Bounded Edge-Width Routing Model . . . . . . . . . . . . . 8--12 Hojung Cha and Jaehak Oh A Real-Time Resource Management System for Video Server . . . . . . . . . . . . 13--22 M. Farimani and J. A. Robinson Multipoint Activity Sharing Services for Fast Prototyping of Groupware Applications . . . . . . . . . . . . . . 23--28 Jie Wu and V. Rancov Implementing Context-Driven Parallel Computations . . . . . . . . . . . . . . 29--37 F. Arcelli and M. De Santo Distributed Agents for Problem Solving 38--45 Anonymous Call for Papers --- IMSA 2000 . . . . . 48--49
E. B. Fernandez and Jie Wu and Haifeng Qian A Combined Functional and Object-Oriented Approach to Software Design . . . . . . . . . . . . . . . . . 51--61 S. Tanterdtid and W. Benjapolakul and W. Steanputtanagul Optimizing a Single-Hop Virtual Path System Using a Genetic Algorithm . . . . 62--72 Chen Zhenyu and J. B. Mbede and Zhou Yan and Li Dehua and Hu Hanping Application of a Genetic Algorithm in Triangulation of a $3$-D Object Surface 73--77 L. S. K. Chong and S. C. Hui and C. K. Yeo Faxportal: Distributed FAX Transportation for Internet FAX Services 78--88 Sang H. Oh and Won S. Lee Parallel Evaluation of a Deductive Query with a Breadth-First Search Strategy . . 89--99 A. S. Mohamed and A. Galal and I. Khalil and K. Sobh and M. Selim Dispo: Distributed Multi-Threaded Execution of Prolog Programs . . . . . . 100--108 S. Valenti and A. Cucchiarelli and M. Panti A Communication Paradigm for Voluntary Collaboration . . . . . . . . . . . . . 109--117
O. M. Al-Jarah and T. A. Al-khdour Slackness-Based Co-Scheduling Hardware and Software Pipelines with Multiple Latency Sequences . . . . . . . . . . . 121--128 M. Kobayashi and M. Ohta Basic Study of Sound Localization for an Acoustic Visual aid System . . . . . . . 129--133 Hai Jin and Kai Hwang Efficient LRU Algorithm for Cache Scheduling in a Disk Array System . . . 134--139 J. M. Huang and T. C. Yang Multidimensional Fault Tolerance in Cube-Connected Cycles Architecture . . . 140--150 J. C. Lin and I. Ho Generating Real-Time Software Test Cases by Time Petri Nets . . . . . . . . . . . 151--158 M. P. Saltouros and E. A. Verentziotis and M. E. Markaki and M. E. Theologou and I. S. Venieris An Efficient Hybrid Genetic Algorithm for Finding (Near-) Optimal Steiner Trees: an Approach to Routing of Multipoint Connections . . . . . . . . . 159--165 B. Bhasker Optimizing Queries in Distributed Database Systems on a Broadcast Local Area Network . . . . . . . . . . . . . . 166--173 Shinfeng D. Lin and Shih-Chieh Shie Image Coding Using Adaptive Classified Side-Match Finite-State Vector Quantization . . . . . . . . . . . . . . 174--180 Anonymous Call for Papers Special Issue on Computational Intelligence Techniques in Co-Operative Robots . . . . . . . . . . 185--185
R. Logeswaran and C. Eswaran Performance Survey of Several Lossless Compression Algorithms for Telemetry Applications . . . . . . . . . . . . . . 1--9 J. R. Hu and Y. W. Bai Power Efficiency and Latency for a Semi-Batch Power Management Model in a Palmtop Multimedia Terminal . . . . . . 10--16 Ming-Chi Lee Dynamic Updates of Inheritance Hierarchy for Object-Oriented Database Schema . . 17--24 R. Goularte and E. D. S. Moreira Managing Access to a Video Server Through a Metadata Base . . . . . . . . 25--29 Han-Chieh Chao and Jenn-Yuh Hong and Jiann-Liang Chen Channel Assignment Schemes for WDM-Based Personal Communications Networks . . . . 30--34 C. Bouras and V. Kapoulas Basic Internet Services Environment for the Education Society . . . . . . . . . 35--44 A. I. Vakali and E. D. Terzi A Java-Based Model for I/O Scheduling in Tertiary Storage Subsystems . . . . . . 45--50 Jiann-Liang Chen and Jian-Hong Gong and Han-Chieh Chao Resource Reservation for Cellular Data Services Using Fuzzy Matrices . . . . . 51--59 Kai Jin and Chai Kiat Yeo and Siu Cheung Hui and Ing Yann Soon A FAX Adapter for Internet FAX-to-FAX Communication . . . . . . . . . . . . . 60--67 Wei-Chou Chen and Tzung-Pei Hong and Wen-Yang Lin Three Maintenance Algorithms for Compressed Object-Oriented Data Warehousing . . . . . . . . . . . . . . 68--75 Simon X. Yang and Max Meng Call for Papers . . . . . . . . . . . . 77--77
M. Maierhofer and C. Bailey and R. Sotudeh ``Affordable Scalability'': An Analysis of Modular Multimedia Server Architectures with Shared Local Memory 79--89 T. Chambel and N. Correia and N. Guimarães Hypervideo on the Web: Models and Techniques for Video Integration . . . . 90--98 J. Kim Hybrid Filtering of Web Pages for a Recommendation Agent . . . . . . . . . . 99--105 A. Marshall and S. Sezer The Influence of Cumulative Switch Delay in Multiple Service Class Networks . . . 106--114 S. Kota and M. Goyal and R. Goyal and R. Jain Multimedia Satellite Networks and TCP/IP Traffic Transport . . . . . . . . . . . 115--128 G. Falkemeier and G. R. Joubert and O. Kao Internet Supported Analysis and Presentation of MPEG Compressed Newsfeeds . . . . . . . . . . . . . . . 129--136
G. Babin and F. Lustman Application of Formal Methods to Scenario-Based Requirements Engineering 141--151 B. A. Malloy and J. D. McGregor and S. R. Hughes Exploiting Iostreams to Integrate a GUI Into a Command Driven Application . . . 152--158 P. H. Welch and G. H. Hilderink and A. W. P. Bakkers and G. S. Stiles Safe and Verifiable Design of Concurrent Java Programs . . . . . . . . . . . . . 159--165 Kazunori Iwata and Nobuhiro Ito and Xiaoyong Du and Naohiro Ishii Agent Model for Dynamically Changing Plan in $ \pi $-Calculus . . . . . . . . 166--172 E. Althammer and W. Pree Design and Implementation of an MVC-Based Architecture for E-Commerce Applications . . . . . . . . . . . . . . 173--185 L. S. Oquendo and A. Attoui Deterministic CORBA ORB (DORB) for Distributed Real-Time Applications . . . 186--190
A. E. Al-Ayyoub and A. Yazici Data Dependence Analysis on Trapezoidal Regions . . . . . . . . . . . . . . . . 1--7 Y. Park and L. Wu Software Component Retrieval by Composition Using Semantic Properties 8--13 R. Logeswaran and C. Eswaran Radial Basis Neural Network for Lossless Data Compression . . . . . . . . . . . . 14--19 G. Succi and W. Pedrycz and R. Wong Dynamic Composition of Components Using WebCODS . . . . . . . . . . . . . . . . 20--27 E. A. Lotfy and A. S. Mohamed Applying Neural Networks in Case-Based Reasoning Adaptation for Cost Assessment of Steel Buildings . . . . . . . . . . . 28--38 Anonymous Erratum . . . . . . . . . . . . . . . . 39--39
I. D. D. Curcio Mobile Video QoS Metrics . . . . . . . . 41--51 T. Okamoto and K. Seki and M. Kayama and A. I. Cristea Rapsody: a Self/Collaborative-Learning Multimedia Based Teacher Training Distance Support Model . . . . . . . . . 52--57 Andrew Tokmakoff and Daan Velthausz and Mark Van Setten and Erik Oltmans and Ernst-Jan Goedvolk and René Bal and Paul Porskamp Content Engineering for the Next-Generation Internet . . . . . . . . 58--69 M. Villanova and N. Belkhatir and H. Martin A Process Environment Supporting Web Multimedia Information Systems . . . . . 70--76 O. Javed and S. Khan and Z. Rasheed and M. Shah Visual Content-Based Segmentation of Talk and Game Shows . . . . . . . . . . 77--82 C.-R. Shyu and J. Harnsomburana and Y. Sethi and R. Singh and J. C. Reid A Hybrid Query Approach for Radiology Education: Integrating Content-Based Medical Image Retrieval and Text-Based Information Retrieval . . . . . . . . . 83--92 G. S. Shin and S. I. Jin and P. S. Mah and C. S. Oho Greedy Request Scheduling to Reduce Initial Latency for VOD Systems . . . . 93--99
H. Wang and D. Mamora and L. N. Bhuyan Ppctsi: a Software Package for Rapid Analysis of CT Scan Images . . . . . . . 103--111 M. S. Loffler and N. P. Costescu and E. Zergeroglu and D. M. Dawson Telerobotic Decontamination and Decommissioning with Qrobot, a PC-based Robot Control System . . . . . . . . . . 112--121 E. Keramopoulos and P. Pouyioutas and T. Ptohos The Goql Graphical Query Language . . . 122--128 J. Aguilar and M. Hernandez A Fault-Tolerant Mechanism for Distributed/Parallel System Based on Task Replication Techniques . . . . . . 129--135 S. Muknahallipatna and A. Kadkol and J. Hamann Monitoring Tool for Performance Measurements of Windows Nt-Based Lans 136--143 G. A. Aderounmu and E. R. Adagunodo and A. D. Akinde Performance Comparison of Data-Link Control Protocol for Wireless Asynchronous Transfer Mode Network . . . 144--152 Shundong Xia and Jinyuan You A Coordination Model for Network Computing Environments . . . . . . . . . 153--159 Anonymous Call for Papers for Special Issue on Cluster/Grid Computing . . . . . . . . . 161--162
W. Chen and B. Wasson Coordinating Collaborative Knowledge Building . . . . . . . . . . . . . . . . 1--10 N. Klever and M. Jeckle Proposal for XML Schema V 1.1 as a Basis for \tt XMLrepository.Org . . . . . . . 11--16 A. Harrer Software Engineering Methods for RE-USE of Components and Design in Educational Systems . . . . . . . . . . . . . . . . 17--23 C. E. Palau and V. Manso and J. M. Raga and R. Romero and J. C. Guerri and M. Esteve An XML Approach for Assessment in Education . . . . . . . . . . . . . . . 24--37 F. Ramos and A. Conde and L. Neves and A. Moreira Management of E-Learning Environments: some Issues and Research Clues . . . . . 38--41 J. Kuljis and D. Y. Lees Supporting Organizational E-Learning with a Distributed, Virtual, Collaborative Learning Environment . . . 42--49 N. Manouselis and D. Sampson Agent-Based E-Learning Course Recommendation: Matching Learner Characteristics with Content Attributes 50--64 V. Devedzic and V. Pocajt What Does Current Web-Based Education Lack? . . . . . . . . . . . . . . . . . 65--71 P. Kommers Experiential Learning Through Constructivist Learning Tools . . . . . 72--83 J. Smid Interactive Tutoring Model Using Information Cycling on the WWW . . . . . 84--90
S. J. Choi and W. Scacchi Formal Analysis of the Structural Correctness of Slc Descriptions . . . . 91--97 J.-S. Lee and W.-K. Hong and S.-D. Kim Adaptive Methods to Minimize Decompression Overhead for Compressed On-Chip Caches . . . . . . . . . . . . . 98--105 Y.-M. Cheung and L. Xu A New Information-Theoretic Based ICA Algorithm For Blind Signal Separation 106--110 H. Haga Development of Hypermedia Computer-Mediated Learning System and its Evaluation . . . . . . . . . . . . . 111--118 H. A. Ali and A. I. El-Dousky and A. A. A. Ali Exploitation of Intelligent Agent For Building Expandable and Flexible Computerized Tutoring System . . . . . . 119--129 S. D. Lin and S. C. Shie and C. F. Chen A DCT-Based Image Watermarking With Threshold Embedding . . . . . . . . . . 130--135 X L. Li and B. Veeravalli and C. C. Ko Distributed Image Processing On a Network Of Workstations . . . . . . . . 136--145 S. Bataineh and A. Younis An Optimal Manhattan Street Network-Routing Algorithm . . . . . . . 146--153
K. Henke and H. D. Wuttke and S. Hellbach Laboratory Via Internet --- New Ways In Education And Research . . . . . . . . . 157--163 M. Karweit A Web-Based Laboratory For Distance-Learning Engineering Students 164--169 L. Sheremetov and R. Peredo Valderrama Development of Reusable Learning Materials For WBE Using Intelligent Components And Agents . . . . . . . . . 170--178 D. Dicheva and L. Aroyo and A. Cristea Cooperative Courseware-Authoring Support 179--187 V. Uskov and M. Uskova Reusable Learning And Information Atoms Approach To Web-Based Education . . . . 188--197 J. Vargo and J. C. Nesbit and K. Belfer and A. Archambault Learning Object Evaluation: Computer-Mediated Collaboration And Inter-Rater Reliability . . . . . . . . 198--205 F. Tajariol and J.-M. Adam and M. Dubois A Study on The Effect of Communication And Monitoring Tools In Web-Based Tutoring . . . . . . . . . . . . . . . . 206--211 R. M. de Moraes and L. S. Machado Hidden Markov Models For Learning Evaluation In Virtual-Reality Simulators 212--215
C. Li and L. Li A Hybrid Agent Platform Composed of Cooperating Intelligent Agents And Mobile Agents . . . . . . . . . . . . . 217--224 G. Sivaradje and P. Dananjayan A Novel Dynamic Guard Channel Scheme For Channel Allocation In Cellular Mobile Networks . . . . . . . . . . . . . . . . 225--235 A. Azadmanesh and L. Zhou and D. Peak Egophobic Voting Algorithms . . . . . . 236--246 S. D. Bruda and S. G. Akl Real-Time Computation: a Formal Definition And Its Applications . . . . 247--257 N. H. Salman and C.-Q. Liu Image Segmentation And Edge Detection Based On Watershed Techniques . . . . . 258--263 S. Q. Zheng and M. Yang and F. Masetti Constructing Schedulers For High-Speed, High-Capacity Switches/Routers . . . . . 264--271 D. K. Lowenthal and R. Subramanian Hyfi: Architecture-Independent Parallelism On Networks of Multiprocessors . . . . . . . . . . . . 272--282
C. I. Fan and C. L. Lei Divisible Blind Signatures Based on Hash Chains . . . . . . . . . . . . . . . . . 1--9 C.-H. Yang and L.-Y. Chuang and C.-H. Yang and C.-H. Luo Internet Access for Disabled Persons Using Morse Code . . . . . . . . . . . . 10--16 A. P. Pons An Object-Oriented Language for Real-Time Systems . . . . . . . . . . . 1--7 P. K. Panigrahi and A. Goswami Algebra for Fuzzy Object Oriented Database Language . . . . . . . . . . . 1--9 M. Azizi and X. Song and E.-M. Aboulhamid A Case Study On The Verification of Cache Coherence Protocols . . . . . . . 1--10 C. M. Wee and M. S. Beg and B. Vaillant Secure Setrequest and Getresponse for SNMP: APSSNMP . . . . . . . . . . . . . 1--7 D. X. Liu and Y. C. Bai Cross-Tree: a Data Structure for Analysis of Security Protocols . . . . . 1--7 T. Taibi and D. C. L. Ngo Towards a Balanced Specification Language for Distributed Object Computing Patterns . . . . . . . . . . . 1--8 G. Radhamani and M. U. Siddiqi A WAP-Enabled Transaction Model for Mobile Multidatabases . . . . . . . . . 1--6
S. C. Hui and M. K. H. Leung and F. Wang Eleview: Remote Intelligent Elevator Monitoring System . . . . . . . . . . . 1--8 G. K. Adam and V. G. Pappas Geographical Image Processing Using GisTool . . . . . . . . . . . . . . . . 1--6 C.-Y. Chen and J. Tang and D.-L. Lee and J.-F. Tu Exploiting Instruct Recognized Scheme to Improve Processor Performance . . . . . 1--9 C. W. Cheong Web Server Workload Prediction: Fuzzy Markovian Approach . . . . . . . . . . . 1--6 S. H. Oh and W. S. Lee Deductive Query Processing with an Object-Oriented Semantic Network in a Massively Parallel Environment . . . . . 1--11 G. Montejano and D. Riesco and R. Uzal Software Configuration Management in a Parallel Development Environment . . . . 1--10 G. Kaefer and J. Haid and K. Voit and R. Weiss Architectural Software Power Estimation Support for Power Aware Remote Processing . . . . . . . . . . . . . . . 1--6 A. Salhieh and L. Schwiebert Power-Aware Metrics for Wireless Sensor Networks . . . . . . . . . . . . . . . . 1--7
B. Li and W. Yao and J. You An Effort to Formal Model of Trust Management in Grids . . . . . . . . . . 1--6 J. T. Hung and T. G. Robertazzi Scalable Scheduling for Clusters and Grids Using Cut Through Switching . . . 1--10 B. Hong and V. K. Prasanna Simulation of Adaptive Applications in Heterogeneous Computing Environments . . 1--8 K.-L. Park and H.-J. Lee and O.-Y. Kwon and S.-Y. Park and H.-W. Park and S.-D. Kim Design and Implementation of a Dynamic Communication MPI Library for the Grid 1--8 F. Zara and F. Faure and J.-M. Vincent Parallel Simulation of Large Dynamic System on a PC Cluster: Application to Cloth Simulation . . . . . . . . . . . . 1--8 C. H. Ding and R. Buyya Guided Google: a Meta Search Engine and its Implementation Using the Google Distributed Web Services . . . . . . . . 1--7
C. K. Yeo and S. C. Hui and B. S. Lee Java-Based, WAP-Enabled Unified Messaging System . . . . . . . . . . . . 1--8 D. Desrochers and Y. Jin and Z. Qu and A. Saengdeejing Algorithms to Generate Partially Damaged characters and Readability Study for OCR Readers in Semiconductor Manufacturing 1--6 A. Loo Sensitivity Analysis of Database Operations: a Case Study of Parallel Partition/Sorting Algorithm . . . . . . 1--8 C.-H. Lien and Y.-W. Bai Energy Efficiency and Performance of a Controlled Model for Scalable Computing Systems . . . . . . . . . . . . . . . . 1--9 F. S. Al-Anzi and A. Allahverdi A Hybrid Simulated Annealing Heuristic for Multimedia Object Requests Scheduling Problem . . . . . . . . . . . 1--6 H. Aljifri and A. P. Pons Reducing Overhead of Secure E-Commerce Transactions . . . . . . . . . . . . . . 1--6 M. A. Radaideh A Distributed and Parallel Model for High-Performance Indexing of Database Content . . . . . . . . . . . . . . . . 1--6 E. M. Garzón and I. García Solving Eigenproblems on Multicomputers: Two Different Approaches . . . . . . . . 1--10 M. Daoui and M. Lalam and B. Djamah and A. Bilami Hardware Cache Coherence Protocol . . . 1--13
Anonymous Editors' Note . . . . . . . . . . . . . ?? A. K. Sharma and A. Goel Moment-to-Moment Node Transition Awareness Protocol (MOMENTAP) . . . . . 1--9 B. Zhen and M. Kobayashi and M. Shimizu The Reading of Transmission-Only Active RFID Tags . . . . . . . . . . . . . . . 10--19 D. Deville and Y. Hodique and I. Simplot-Ryl Safe Collaboration in Extensible Operating Systems: A Study on Real-Time Extensions . . . . . . . . . . . . . . . 20--26 G. Thomas and F. Ogel and A. Galland and B. Folliot and I. Piumarta Building a Flexible Java Runtime Upon a Flexible Compiler . . . . . . . . . . . 27--34 A. L. M. dos Santos and M. E. Torrey and A. El Sheshai Supporting National Public Key Infrastructures Using Smart Cards . . . 35--40
M. A. Hamza and I. F. Awad and G. M. B. Awad Enhancing Mobile Agent Communication Performance . . . . . . . . . . . . . . 45--50 D. Grosu and H. Gâlmeanu MPEG-2 Motion Estimation Using a PC Cluster . . . . . . . . . . . . . . . . 51--56 R. Santos and J. Santos and J. Orozco Hard Real-Time Systems with Stochastic Execution Times: Deterministic and Probabilistic Guarantees . . . . . . . . 57--62 T. Horie and K. Yamasaki and T. Tsuji and T. Hochin and K. Higuchi A Distributed Object-Oriented Programming System with Dynamic Reconfiguration Capability . . . . . . . 63--71 T. A. El-Ghazawi and J. Le Moigne Performance of the Wavelet Decomposition on Massively Parallel Architectures . . 72--81 P. A. Laplante Criteria and an Objective Approach to Selecting Commercial Real-Time Operating Systems Based on Published Information 82--96 B. Veeravalli Design and Performance Analysis of Heuristic Load-Balancing Strategies for Processing Divisible Loads on Ethernet Clusters . . . . . . . . . . . . . . . . 97--107 G. Dini and G. Lettieri and L. Lopriore Design Framework for a Distributed, Single-Address-Space System . . . . . . 108--118
J. M. Liang and J. Q. Liang and Q. L. Ren A Framework for Generic Object Recognition with Bayesian Networks . . . 123--138 A. P. Pons Enhancement of Web Object Speculative Retrieval . . . . . . . . . . . . . . . 139--146 C. Popescu A Secure Key Agreement Protocol Using Elliptic Curves . . . . . . . . . . . . 147--152 J. O. Dada and H.-D. Kochs XML-Based Open Electricity Market Information Exchange Network Using Object-Oriented Methods . . . . . . . . 153--160 T. Sari and M. Sellami Cursive Arabic Script Segmentation and Recognition System . . . . . . . . . . . 161--168 T.-P. Hong and T.-N. Chuang Fuzzy Gupta Scheduling for Flow Shops with More than two Machines . . . . . . 169--177 R. A. Haraty and H. M. El-Zabadani Abjad Hawwaz: An Offline Arabic Handwriting Recognition System . . . . . 178--189 S. Chalasani and R. V. Boppana Software Architectures for E-Commerce Computing Systems with External Hosting 190--198 G. Edwards and R. Jayne Location Tracking Using Differential Range Measurements . . . . . . . . . . . 199--205
A. C. M. Fong and S. C. Hui A Web-Based System for B2B E-Commerce 209--217 M. Younis and S. Ponnusamy Efficient and Predictable Approach for Supporting Spatial Partitioning of Real-Time Applications . . . . . . . . . 218--227 R. A. Shatnawi and L. H. Etzkorn and W. E. Hughes, Jr. Comparing Object-Oriented Languages Using Design Patterns . . . . . . . . . 228--236 Z. Wang and J. Zhang Routing with Virtual Transmission Range in Mobile AD HOC Networks . . . . . . . 237--243 J. Al-Sadi and A. M. Awwad A New Fault-Tolerant Routing Algorithm for OTIS-Cube Using Unsafety Vectors . . 244--251 D. Magoni Network Topology Analysis and Internet Modelling with \em NEM . . . . . . . . . 252--259 M. M. El-Awad A Vectorized Conjugate-Gradient Solver for Sparse Systems of Algebraic Equations . . . . . . . . . . . . . . . 260--265 S.-Y. Wu and S.-J. Leu and R.-S. Chang An Agent-Based Architecture for Resource Reservation in Mobile IP Networks . . . 266--273 M. Al-Rousan Webchair: a Web-Based Wireless Navigation Wheelchair System for People with Motor Disabilities . . . . . . . . 274--284
C. Koutsikas and N. Malevris A New Script Language Applicable To Symbolic Execution Systems . . . . . . . 1--11 J. Aguilar and E. L. Leiss A Coherence-Replacement Protocol For Web Proxy Cache Systems . . . . . . . . . . 12--18 W. Haque Concurrent Deadlock Detection In Parallel Programs . . . . . . . . . . . 19--25 W. J. Lin and B. Veeravalli A Dynamic Object Allocation And Replication Algorithm For Distributed Systems With Centralized Control . . . . 26--34 T. Fergany and Sarhan Amany Efficient Allocation of Distributed Object-Oriented Tasks To a Pre-Defined Scheduled System . . . . . . . . . . . . 35--42 S Juhasz Modelling Asynchronous Message Passing In Small Cluster Environments . . . . . 43--49 D. K. Sharma and R. K. Sharma and D. Ghosh A Spatial Decision Support System For Land Management . . . . . . . . . . . . 50--58 R. Beghdad A Flows-Based QoS Routing Protocol For Multicast Communication Networks . . . . 59--64 Y. M. Asem and A. Kara A Computationally Efficient Key-Hiding Based Group Re-Keying Scheme For Secure Multicasting . . . . . . . . . . . . . . 65--73 M. Radaideh and S. Horani and M. Raseen WBSGA: a Web-Based Tool For Course Timetabling And Scheduling . . . . . . . 74--83
W. H. Hsu and J. Chen and S.-T. Sheu and C.-F. Chao SBMT--Steiner Backup Multicast Tree . . 87--98 G. Licea Supporting Reusability in Fixed And Mobile Groupware Applications . . . . . 99--111 H. Arafat Ali and M. F. Ared and A. I. El-Desouky An IP Packet Forwarding Technique Based on a New Structure of Lookup Table . . . 112--121 X. Zhang and X. L. Xiao and J. W. Tian and J. Liu and G. Y. Xu Application of Support Vector Machines in Classification of Magnetic Resonance Images . . . . . . . . . . . . . . . . . 122--128 A. Amin and N. Al-Darwish Structural Description to Recognizing Hand-Printed Arabic Characters Using Decision Tree Learning Techniques . . . 129--134 K. Y. Lam and E. Chan and D. Hung and K. Ramamritham Processing of Location-Dependent Continuous Queries on Real-Time Spatial Data: the View From Retina . . . . . . . 135--143 D. J. Russomanno Prolog Query Interface: a Set-Of-Mappings Approach With Optional Segmentation . . . . . . . . . . . . . . 144--153 B. Fox and L. S. Jennings and A. Y. Zomaya On the Modelling and Computation of Nonlinear Multibody Cable Systems . . . 154--161 K. Salah and K. El-Badawi On Modelling and Analysis of Receive Livelock and CPU Utilization in High-Speed Networks . . . . . . . . . . 162--169 H. Hussein Karam and F. F. M. Ghaleb and Y. M. Abd El-Latif Towards Fast and Smooth Subdivision Surface Reconstruction . . . . . . . . . 170--176
V. Kannoth and B. Suk Lee and J. Buzas Statistical Cost-Modelling of Financial Time Series Functions . . . . . . . . . 181--188 S. Faizullah and I. Marsic Measuring and Pricing QoS . . . . . . . 189--209 A. Singh and A. L. Mora dos Santos and O. Nordstrom and C. Lu Stateless Model For The Prevention of Malicious Communication Channels . . . . 285--297 X. Zhu and J. Liao and J. Chen Improved Protocol Conversion Methodology And Its Application . . . . . . . . . . 210--221 G. K. Winley and J. P.-O. Fan Admissible Heuristic Functions For Flow-Shop Problems . . . . . . . . . . . 222--226 Y. Kanamori and S.-M. Yoo and W. D. Pan and F. T. Sheldon A Short Survey On Quantum Computers . . 227--233 A. Bilami and M. Lalam and M. Daoui and B. Djamah A Cell Selection Policy For An Input-Buffered Packet Switch . . . . . . 234--242 M. H. Mickle and M. Mi and J. T. Cain and T. Minor A Circuit Model For Passive RF Autonomous Devices With Protocol Considerations . . . . . . . . . . . . . 243--250 D. Roy and A. Chatterjee and N. Jasapara and N. Jadhav A New Transport Layer Protocol Offering Variable Reliability In Bidirectional Communication: Application For Robotic Systems . . . . . . . . . . . . . . . . 251--258 B.-F. Wu and Y.-L. Chen and C.-C. Chiu Efficient Implementation of Several Multilevel Thresholding Algorithms Using a Combinatorial Scheme . . . . . . . . . 259--269 M. Crocker and J. Baranski and G. Y. Lazarou Fault-Tolerant Reconfigurable Ethernet-Based IP Network Proxy . . . . 270--277 M. Youssef and A. Agrawala Location-Clustering Techniques For WLAN Location Determination Systems . . . . . 278--284
D. Prakash Vidyarthi and A. Kumar Tripathi and B. Kumer Sarker Cluster-Based Load Partitioning and Allocation In Distributed Computing Systems . . . . . . . . . . . . . . . . 301--307 C. S. Wang An Efficient Content-Based Retrieval System For $3$D Objects . . . . . . . . 308--313 J. Ge and R. He Buffer Efficiency In Wormhole Routers 314--320 A. Amoroso and G. Casciola Fast Bivariate Function Rendering For Small Devices . . . . . . . . . . . . . 321--328 J.-C. Chuang and C.-C. Chang Using a Simple and Fast Image Compression Algorithm To Hide Secret Information . . . . . . . . . . . . . . 329--333 M. V. N. K. Prasad and K. K. Shukla Parallel Implementation of Domain Decomposition Based Image Compression Algorithm . . . . . . . . . . . . . . . 334--341 R. F. DeMara and Y. Tseng and K. Drake and A. Ejnioui Capability Classes of Multiprocessor Synchronization Techniques . . . . . . . 342--349 H. Yu and L. Wang and J. Zhang and J. Barksdale and X. Yuan Developing a Secure Geospatial Visualization and Collaboration System Using Software Engineering Technology 350--358 C. Yuan and C. Tang and Y. Wen and J. Zuo and J. Peng and J. Hu Convergency of Genetic Regression In Data Mining Based On Gene Expression Programming and Optimized Solution . . . 359--366 M. Yang and J. Wang and S. Q. Zheng and Y. Jiang Code Optimization of Polynomial Approximation Functions on Clustered Instruction-Level Parallelism Processors 367--378 S. Sharafeddine and A. Riedl Dimensioning Token Bucket Policers For Various Voiceover IP Applications Using Real-Scenario Measurements . . . . . . . 379--387 A. R. Al-Ali Wireless Distributed Energy Billing System . . . . . . . . . . . . . . . . . 388--393
Y. Park and B. S. Kim Web Search Using Dynamic Keyword Suggestion . . . . . . . . . . . . . . . 1--9 L. Kuzniarz and M. Staron Two Techniques for UML Model Transformations . . . . . . . . . . . . 10--17 S. Lian and Z. Liu and Z. Ren and Z. Wang Multimedia Data Encryption in Block-Based Codecs . . . . . . . . . . . 18--24 H. M. Ammari Discovery and Selection Protocols for Multi-Hop Wireless Internet Access . . . 25--32 S. Ferretti and M. Roccetti and C. E. Palazzi An Optimistic Obsolescence-Based Approach to Event Synchronization for Massively Multiplayer Online Games . . . 33--43 R. Steele and W. Gardner and T. S. Dillon XML Repository Searcher-Browser Supporting Fine-Grained Access Control 44--50 E. El-Qawasmeh and M. Strauss and M. Mack and S. Berkovich Increasing the Efficiency of Bit-Counting . . . . . . . . . . . . . . 51--58 B. Roussev and J. Wu Transforming Use Case Models to Class Models and OCL-Specifications . . . . . 59--69 D. Sarkar and U. K. Sarkar and G. Peng Bandwidth Requirement of Links in a Hierarchical Caching Network: a Graph-Based Formulation, An Algorithm and Its Performance Evaluation . . . . . 70--78 Y. W. Bai and Y. C. Wu Web Delay Analysis and Reduction By Using Load Balancing of a DNS-Based Web Server Cluster . . . . . . . . . . . . . 79--88 D. N. B. Ta and S. Zhou Client Assignment Problem in Distributed Virtual Environments . . . . . . . . . . 89--95 T. Klostermann and E. O. K. Zhan Control Based Optimization of Collaborative Technical Customer Service 96--102
D. Williams and H. Lutfiyya Fault-Tolerant Authentication Services 107--114 H. Rahaman and D. K. Das and B. B. Bhattacharya Testable Design of Digital Summation Threshold Logic Array for Synthesis of Symmetric Functions . . . . . . . . . . 115--123 W.-P. Lee Personalizing Internet Information Services: Passive Filtering and Active Retrieval . . . . . . . . . . . . . . . 124--131 H. M. Harmanani and A. M. K. Hajar Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms . . 132--142 S. A. Selouani and D. O'Shaughnessy and J. Caelen Incorporating Phonetic Knowledge Into an Evolutionary Subspace Approach for Robust Speech Recognition . . . . . . . 143--154 J. Sum and J. Wu and C.-S. Leung On Profit Density Based Greedy Algorithm for a Resource Allocation Problem in Web Services . . . . . . . . . . . . . . . . 155--163 Y. G. Li and W. D. Zhang and G. L. Wang Prune Support Vector Machines by an Iterative Process . . . . . . . . . . . 164--169 J. L. Kennington and V. S. S. Nair and G. Spiride A Decomposition Approach for Spare Capacity Assignment for Path Restorable Mesh Networks . . . . . . . . . . . . . 170--179 R. A. Namneh and W. D. Pan and S.-M. Yoo Parallel Implementations of $1$-D Fast Fourier Transform Without Interprocessor Communication . . . . . . . . . . . . . 180--186 A. V. Babu and L. Jacob Service Differentiation Schemes in IEEE 802.11 Wireless LANs with Variable Frame Size . . . . . . . . . . . . . . . . . . 187--195 C. Hu and J. Wang and J. Li Language Support for Multi-Paradigm and Multi-Grain Parallelism on SMP-Cluster 196--203 M. Furini MCDL: a Reduced But Extensible Multimedia Contents Description Language 204--210
M. Zhang and S. Xu and J. Fulcher Anser: Adaptive Neuron Artificial Neural Network System for Estimating Rainfall 215--222 L. Linsen and B. Hamann and K. I. Joy Wavelets for Adaptively Refined $ \sqrt [3]{2}$-Subdivision Meshes . . . . . . . 223--231 A. Mittal and L.-F. Cheong Detecting Establishment Shots Using Camera Motion . . . . . . . . . . . . . 232--238 S.-N. Chen A New Trace-Driven Shared-Memory Multiprocessors Machine Simulator . . . 239--244 L. Chunlin and L. Layuan A Multi-QoS Guaranteed Dynamic Grid Resource Scheduling Algorithm . . . . . 245--252 F. W. Yang and H. J. Lin and S. H. Yen An Improved Unsupervised Clustering Algorithm Based on Population Markov Chain . . . . . . . . . . . . . . . . . 253--258 H. A. Ali and A. I. El-Desouky and A. I. Saleh A Novel Strategy for a Vertical Web Page Classifier Based on Continuous Learning Na\"\ive Bayes Algorithm . . . . . . . . 259--277 F. Li and X. Xin and Y. Hu A Pairing-Based Signcryption Scheme Using Self-Certified Public Keys . . . . 278--282 Q. Duan Resource Allocation for Quality of Service Provision in Buffered Crossbar Switches With Traffic Aggregation . . . 283--290 Y. Tsujita Remote MPI-I/O on a Parallel Virtual File System Using a Circular Buffer for High Throughput . . . . . . . . . . . . 291--299 J.-H. Huang and S. Mishra Mykil: a Secure and Highly Available Key Management System For large Group Multicast . . . . . . . . . . . . . . . 300--308 S. B. Mohammad and M. O. Khaoua and L. M. Mackenzie and I. Ababneh Processor Allocation and Job Scheduling on $3$D Mesh Interconnection Networks 309--317
G. H. Liu and S. Zhang Development of a New Virtual Reality System . . . . . . . . . . . . . . . . . 321--326 S. D. Bruda and S. G. Akl Size Matters: Logarithmic Space is Real Time . . . . . . . . . . . . . . . . . . 327--336 C.-Y. Lee and C. W. Chiou Low-Complexity Bit-Parallel Multipliers for a Class of $ {\rm GF}(2^m) $ Based on Modified Booth's Algorithm . . . . . 337--345 A. Kurkovsky Hierarchy of Formal Descriptions for Architectural Analysis and Design of Complex CS . . . . . . . . . . . . . . . 346--352 V. A. Chouliaras and T. R. Jacobs and J. L. Núñez-Yanez and K. Manolopoulos and K. Nakos and D. Reisis Thread-Parallel MPEG-2 and MPEG-4 Encoders for Shared-Memory System-On-Chip Multiprocessors . . . . . 353--361 Z. Zheng and T. K. Y. Chan A Client--Server Based View-Dependent Multiresolution Mesh Hierarchy . . . . . 362--371 Y.-H. Wang and C.-H. Tsai and H.-Z. Lin and C.-A. Wang Interference-Aware QoS Multipath Routing for \em Ad Hoc Wireless Networks . . . . 372--378 Q. Wang and J. Vincent and G. King Prediction Based Link State Update . . . 379--393 I. Sygkouna and M. Anagnostou and E. Sykas Searching for Information in a P2P System . . . . . . . . . . . . . . . . . 394--401 A. H. Kattoush An $N$-Dimensional Recurrent Noisy Phase Unwrapping Algorithm . . . . . . . . . . 402--407 Y. Li and Z. Lan Current Research and Practice in Proactive Fault Management . . . . . . . 408--413 D. T. Ahmed and N. M. M. K. Chowdhury and M. M. Akbar Admission Control Algorithm for Multimedia Server: A Hybrid Approach . . 414--419
L. Wang and S. Piao and Y. Jiang and L. Zhang On a Web-Graph-Based Micronetwork Architecture for SoCs . . . . . . . . . 1--8 Y. Jiao and Y. Yang and M. Yang and Y. Jiang A Multi-Path Routing Scheme for Torus-Based NOCs . . . . . . . . . . . . 9--16 R. K. Jena and G. K. Sharma Application Mapping of Mesh Based-NoC Using Multi-Objective Genetic Algorithm 17--22 L. Zhang and Y. Jiang and E. E. Regentova Fault Tolerance Routing for Wavelength Routed Optical Networks in ONoC . . . . 23--35 Y. Dong and Y. Dou and M. Liu A Design Space Exploration Algorithm In Compiling Window Operation onto Reconfigurable Hardware . . . . . . . . 36--43 E. Lu and M. Yang and B. Yang and X. Feng and S. Q. Zheng A Novel Design of Self-Routing Strictly Nonblocking Switching Networks . . . . . 44--50 Hazem M. Bahig and Hatem M. Bahig Merging on PRAM . . . . . . . . . . . . 51--55 Y. Yang and X. Yang and C. Zhou Lmcgrid: a Low Management Cost Grid Computation Model . . . . . . . . . . . 56--61 M. Yang and L. Wang Preface: Special Issue on High-Performance Computing Architectures 62--63
J. A. Zhang and S. F. Jones and A. S. Helal Mobile Network Adaptation in the Ubidata Mobile File System . . . . . . . . . . . 65--72 K. Papazis and N. K. Chilamkurti and B. Soh A New Adaptive Layered Multicast Protocol . . . . . . . . . . . . . . . . 73--79 R. P. Gupta and S. C. Srivastava and R. K. Varma Remote Terminal Units for Distribution Automation: Development and Commissioning Experience . . . . . . . . 80--91 M. Li and C.-S. Liao and J.-K. Hwang Rapid Calculation of Time Deviation and Modified Allan Deviation for Characterizing Telecommunications Clock Stability . . . . . . . . . . . . . . . 92--96 J.-Z. Sun and J. Riekki and M. Jurmu and J. Sauvola Java-Based HTTP Input Channel for Heterogeneous Wireless Networks . . . . 97--104 M. Selvaraj and G. Y. Lazarou and R. Hu Simultaneous and Proportional Bandwidth, Delay, and Loss Differentiation . . . . 105--116 S. P. Zhou and S.-P. Ting and Z. Q. Shen and L. B. Luo Twilight City --- a Virtual Environment for MOUT . . . . . . . . . . . . . . . . 117--123 A. A. Raj and M. Suganthi Hardware Implementation of an Efficient Internet Protocol Routing Filter Design 124--128 F. Li and X. Xin and Y. Hu Efficient Certificate-Based Signcryption Scheme from Bilinear Pairings . . . . . 129--133 V. S. Vyas and P. P. Rege Real Coded Genetic Algorithm for Optimal Parameters Selection in Circular Mellin Feature Extractors . . . . . . . . . . . 134--141 C. Hota and S. Jha and G. Raghurama Adaptive Bandwidth Management and QoS Provisioning in IPVPNs . . . . . . . . . 142--150 R. Benlamri and H. Barada and A. Al-Raqabani Analysis of Coordinated Load Sharing for Large Distributed Systems . . . . . . . 151--162
M. A. Otair and W. A. Salameh Efficient Training of Neural Networks Using Optical Backpropagation with Momentum Factor . . . . . . . . . . . . 167--172 M. Ishihara and M. Tanaka and K. Kuriyama A Cubic Systolic Array and its Properties . . . . . . . . . . . . . . . 173--182 J. Peng and C.-J. Tang and C. Li and J.-J. Hu A New Evolutionary Algorithm Based on Chromosome Hierarchy Network . . . . . . 183--191 J.-Y. Zheng and X. Wang Streaming Route Panorama for Seamless City Guidance . . . . . . . . . . . . . 192--200 W. J. Liu and J. Gong and W. Ding Using Heavy-Tailed Feature to Estimate Flow Length Distributions . . . . . . . 201--206 Y. C. Eu and S. Khatun and B. M. Ali and M. Othman Multicast, Hierarchical and Fast Handover in Mobile IPv6 Wireless Network: a Test-Bed Experience . . . . . 207--212 W. Liu and L. Gao and Y. Ding and J. Xu and Y. Ji PC-based CAN-Bus Experimental Platform for Autonomous Underwater Vehicles . . . 213--219 S. K. Abd-El-Hafiz and D. M. Shawky and A. L. El-Sedeek Recovery of Object-Oriented Design Patterns Using Static and Dynamic . . . 220--233 Z. Trabelsi and K. Shuaib A Novel Man-in-the-Middle Intrusion Detection Scheme for Switched Lans . . . 234--243 O. M. Al-Jarrah and B. H. Sababha Parma: a Power Aware Reliable Multicasting Algorithm for Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . 244--250 T. Brothers and N. Mandagere and S. Muknahallipatna and J. C. Hamann and H. Johnson Microsoft Exchange Implementation on a Distributed Storage Area Network . . . . 251--264 H. Sato Construction of Object Migration Behaviour Models from Temporal Constraints . . . . . . . . . . . . . . 265--275
J. Sum and J. Wu and C. S. Leung and K. I. J. Ho Analysis on a Simulated Model for Gnutella Topology: Connectedness and Extension . . . . . . . . . . . . . . . 279--288 B. Thiongane and D. L. Truong Shared Path Protection for Bandwidth Guaranteed Connections in Multi-Domain Networks . . . . . . . . . . . . . . . . 289--297 M. Z. Zhang and H. T. Ngo and A. R. Livingston and V. K. Asari A High Performance Architecture for Implementation of $2$-D Convolution with Quadrant Symmetric Kernels . . . . . . . 298--308 Z. D. Wu Modelling for a Federated Peer-to-Peer MMOG Architecture . . . . . . . . . . . 309--318 H. Y. Chien Efficient and Practical Approach to Authenticating Public Terminals . . . . 319--324 G. Garani and G. K. Adam Qualitative Modelling at the Design of Concrete Manufacturing Machinery . . . . 325--330 X. Zou and L. Bai A New Class of Key Management Scheme for Access Control in Dynamic Hierarchies 331--337 S. M. Mansoor Roomi and V. Abhaikumar and S. Baskar and N. S. Balaji A No-Reference Edge Preserving Genetic Weight Adaptation Filter for Impulse Noise Removal . . . . . . . . . . . . . 338--344 F. Li and C. Xu and S. Zhou Improvement of a proactive Threshold Signcryption Scheme . . . . . . . . . . 345--347 N. Parimala and S. R. N. Reddy Processor Selection for Embedded System Design . . . . . . . . . . . . . . . . . 348--353
N. Werghi Robust $3$D Object Registration Based On Pairwise Matching of Geometric Distributions . . . . . . . . . . . . . 1--8 G. O. Abada and E. A. Onibere The Effect of Rehearsed Computer Use on Icon Recognition . . . . . . . . . . . . 9--15 Chin-Chen Chang and Ching-Lin Kuo and Chang-Chu Chen Three Improved Codebook Searching Algorithms for Image Compression Using Vector Quantizer . . . . . . . . . . . . 16--22 A. Al-Naamany and H. Bourdoucen Design and Simulation of a Fuzzy Logic Bandwidth Controller for Users Classification and Priorities Allocations . . . . . . . . . . . . . . 23--29 N. Mittal and T. R. Belagodu On Maximum Key Pool Size for a Key Pre-Distribution Scheme in Wireless Sensor Networks . . . . . . . . . . . . 30--35 L. Jiang and D. Wang and Z. Cai and S. Jiang and X. Yan Scaling Up the Accuracy of $K$-Nearest-Neighbour Classifiers: a Naive-Bayes Hybrid . . . . . . . . . . . 36--43 M. Khemakhem and A. Belghith A P2P Grid Architecture for Distributed Arabic OCR Based on the DTW Algorithm 44--49 S. Krishnamurthy and N. Mittal and R. Chandrasekaran and S. Venkatesan Neighbour Discovery in Multi-Receiver Cognitive Radio Networks* . . . . . . . 50--57 M. R. M. Rizk and M. I. Dessouky and S. A. El-Dolil and M. Abd-Elnaby Fairness and Throughput Enhancement-Based Random Access Using Fuzzy Controlled Backoff Interval . . . 58--64
A. I. Al-Shoshan Audio Signal Discrimination Using Evolutionary Spectrum . . . . . . . . . 69--73 A. Al-Badarneh and M. Tawil Linear R-Tree Revisited . . . . . . . . 74--83 K. I.-J. Ho and J. Wu and J. Sum On Unbounded Zero--One Knapsack With Discrete-Sized Objects . . . . . . . . . 84--89 J. Monterde and H. Ugail A Comparative Study Between Biharmonic Bézier Surfaces and Biharmonic Extremal Surfaces . . . . . . . . . . . . . . . . 90--96 S. S. Beauchemin and H. O. Hamshari and M. A. Bauer Passive Atmospheric Diffusion With Gaussian Fragmentation . . . . . . . . . 97--108 M. Crocker and G. Y. Lazarou and J. Baca and J. Picone A Bandwidth Determination Method for IPv6-Based Networks . . . . . . . . . . 109--118 C. Pradabpet and S. Yoshizawa and Y. Miyanaga and K. Dejhan New PAPR Reduction in OFDM Systems By Hybrid Algorithm of PTS and APPR Methods 119--127 M. Darehmiraki A Parallel Algorithm for Solving Sat Problem Based on DNA Computing . . . . . 128--131 H. Xu and L. Xing and R. Robidoux Drbd: Dynamic Reliability Block Diagrams for System Reliability Modelling . . . . 132--141
F. Fasano and R. Oliveto Supporting Project Management with Fine-Grained Artefact Managementin Adams 145--152 S. Di Martino and C. Gravino Estimating Web Application Development Effort Using COSMIC-FFP Method . . . . . 153--158 I. D. Coman and A. Sillitti Automated Segmentation of Development Sessions Into Task-Related Subsections 159--166 E. Aranha and P. Borba Estimating Manual Test Execution Effort and Capacity Based On Execution Points 167--172 V. Deufemia and C. Gravino and M. Risi Automatically Generated Case Workbenches: A Preliminary Case Study 173--182 M. Benerecetti and N. Cuomo and A. Peron An Environment for the Specification And Verification of Time-Dependent Security Protocols . . . . . . . . . . . . . . . 183--192 C. Hardebolle and F. Boulanger Multi-Formalism Modelling and Model Execution . . . . . . . . . . . . . . . 193--203 C. Vecchiola and A. Grosso and A. Passadore and A. Boccalatte Agentservice: a Framework for Distributed Multiagent System Development . . . . . . . . . . . . . . 204--210 A. De Lucia and F. Ferrucci Preface: Special Issue On Software Engineering . . . . . . . . . . . . . . 211--212
M. Jou and J.-K. Shiau and H.-W. Zhang Application of Web Technologies in Automation Technology Education . . . . 215--221 R. Gupta and A. Trivedi A Comparative Study of Different Rayleigh Fading Channel Simulators . . . 222--229 P. M. Khilar and S. Mahapatra Time-Constrained Fault Tolerant X-By-Wire Systems . . . . . . . . . . . 230--238 T. Marwala and M. Lagazio and T. Tettey An Integrated Human--Computer System for Controlling Interstate Disputes . . . . 239--246 C. Liu and E. Ye and D. J. Richardson Software Library Usage Pattern Extraction Using a software Model Checker . . . . . . . . . . . . . . . . 247--259 P. M. Khilar and S. Mahapatra A Novel Hierarchical Clustering Approach for Diagnosing Large Scale Wireless Adhoc Systems . . . . . . . . . . . . . 260--267 A. Satheesh and S. Krishnaveni and S. Ponkarthick Self-Configurable Environment for the Intel Ixp2400 Network Processor . . . . 268--273 S. Kumar and R. B. Mishra Towards a framework for Classification and Recommendation of Semantic Web Service Composition Approaches . . . . . 274--281 E. M. Saad and M. H. Awadalla and R. R. Darwish Adaptive and Energy-Efficient Clustering Architecture for Dynamic Sensor Networks 282--289 H. Xiong and F. Li and Z. Qin Provably Secure Identity Based Threshold Signature Without Random Oracles . . . . 290--295
N. Alzeidi and M. O. Khaoua and A. Khonsari Performance Modelling of Torus Interconnection Networks with Deep Buffers . . . . . . . . . . . . . . . . 1--8 L. Bai A Reliable $ (K, N) $ Image Secret Sharing Scheme with Low Information Overhead . . . . . . . . . . . . . . . . 9--14 A. H. Al-Badi and K. Ellithy and S. Al-Alawi Prediction of Voltages on Mitigated Pipelines Paralleling Electric Transmission Lines Using ANN . . . . . . 15--22 A. S. Nargunam and M. P. Sebastian Self-Organized QoS Aware Multicast Routing Scheme for Ad Hoc Networks . . . 23--31 I. A. Ismail and S. F. El-Zoghdy and A. A. Abdo A Novel Technique for Datahiding . . . . 32--37 A. S. Nargunam and M. P. Sebastian Cluster-Based MANET Multicast Routing Scheme . . . . . . . . . . . . . . . . . 38--46 G. T. Jay and R. K. Smith and M. Hudnall and B. Bonds Semi-Structured Information: An Architecture Improving Search Results Using Domain Guidance1 . . . . . . . . . 47--55 A. Sudarsanam and T. Hauser and A. Dasu and S. Young A Power Efficient Linear Equation Solver on A Multi-FPGA accelerator . . . . . . 56--72 S. Bhattacharya and A. Basu Design of a Word to Sentence Generator for Augmentative . . . . . . . . . . . . 73--83 S. Merniz and M. Benmohammed Modelling and Verification of Pipelined Micro-Architectures: Functional Approach 84--92 A. Sajjanhar and G. Lu and D. S. Zhang and W. Zhou Connectivity-Based Shape Descriptors . . 93--98 J. Kumar and A. Bansal Application of Neural Network for Estimating Properties of Diesel--Biodiesel blends . . . . . . . . 99--103 H. Nemmour and Y. Chibani Handwritten Digit Recognition Based on a Neural--SVM Combination . . . . . . . . 104--109 D. Adami and C. Callegari and S. Giordano and M. Pagano Mtens: a New Simulator for the Design of MPLS Networks with Traffic Engineering Support . . . . . . . . . . . . . . . . 110--118 T. Pan and K. Fang An Effective Information Support System for Medical Management: Indicator Based Intelligence System . . . . . . . . . . 119--124
J. Shen and D. Yoon and D. Zhao and Y. Song Denoising of Two-Dimensional Geometric Discontinuities . . . . . . . . . . . . 129--140 S. Dey and D. Samanta An Efficient and Accurate Pupil Detection Method for Iris Biometric Processing . . . . . . . . . . . . . . . 141--148 B. F. Wu and C.-T. Lin and C.-J. Chen Real-Time Lane and Vehicle Detection Based on a Single Camera Model . . . . . 149--159 A. Nyamapfene A Hypermap Approach to Multiple Sequence Processing . . . . . . . . . . . . . . . 160--166 S. Muknahallipatna and J. Miles and J. C. Hamann and H. L. Johnson Large Fabric Storage Area Networks: Fabric Simulator Development and Preliminary Performance Analysis . . . . 167--180 M. Sarma and R. Mall State-Based Approach to System Testing 181--187 J. Ngubiri and M. van Vliet Characteristics of Fairness Metrics and their Effect on Perceived Scheduler Effectiveness . . . . . . . . . . . . . 188--196 S. Agrawal and R. S. Yadav and R. Vijay A Speed Fine Tuning Technique for System Energy Minimization of Weakly Hard Real-Time System . . . . . . . . . . . . 197--205 P. Hiranvanichchakorn and S. Lertvorratham Using Regression Analysis for Improving Multipath Ad Hoc Network Performance . . 206--214 H. Sneed and S. Huang Value-Driven Software Maintenance . . . 215--221 A. Sleit and S. Al-Adaileh and N. Al-Omari and H. Hurani Extending the Cluster Map Algorithm using Automated Cluster Identifier . . . 222--225 D. Song and W. Ru-Chuan and F. Xiong and Y. Le-Chan Gene Expression Programming for Attribution Reduction in Rough Set . . . 226--231 S. K. Jha and P. K. Jana and R. Yadav and B. Sinha and S. Srivastava Improved Algorithms for Balanced Ring Formation for Fault Tolerance in a $2$D Mesh . . . . . . . . . . . . . . . . . . 232--237 J. Chen and T. S. Chen and C. N. Lin and C. Y. Cheng A Bitrate Controlled Data Hiding Scheme for Jpeg2000 . . . . . . . . . . . . . . 238--241 R. Sammouda Data-Dependent Weight Initialization in the Hopfield Neural Network Classifier: Application to Natural Colour Images . . 242--249
D. S. Saini and N. Sharma OVSF Code Assignment Schemes at the Forward Link of WCDMA Systems . . . . . 253--260 L. Xiangdong and Z. Yuelong and C. Songqiao and Y. Xiaoli A Multiversion Optimistic Concurrency Control Protocol in Mobile Broadcast Environments . . . . . . . . . . . . . . 261--266 C. Y. Chou and C. J. Lin and J. L. Lu and T. W. Chan Supporting Variable Dyad Learning Activities in an Instructional Game System . . . . . . . . . . . . . . . . . 267--274 K. L. Hsieh Value Expansion Expert System (CVE-ES) in Taiwanese Leisure Farming . . . . . . 275--281 L. Chunlin and L. Layuan Multiple Granularity Control Scheme for System Utility Optimization in Grid Environments . . . . . . . . . . . . . . 282--289 S. Bhattacharya and D. Samanta and A. Basu Model-Based Design of Scanning Input Communication Aids: State of the Art and Research Issues . . . . . . . . . . . . 290--296 S. Sharafeddine On Network Planning for Video Services Over IP Networks . . . . . . . . . . . . 297--308 H. Yuan and Y. Ye and J. Deng Iterative Sib Algorithm Based On Simulated Annealing . . . . . . . . . . 309--317 I. S. Moskowitz and F. Ahmed and P. A. Lafferty Information Theoretic Effects of JPEG Compression on Image Steganography . . . 318--327 L. Jiang and Z. Cai and D. Wang Improving Naive Bayes for Classification 328--332 J. L. Kuo and K. L. Chao Data-Dependency Decomposition of Colour Space Transformation for Microprocessor By Using Parallel Sa-C Programming . . . 333--340 C. Jin Adaptive Digital Watermark System Using Soft Computation . . . . . . . . . . . . 341--346 R. Leela and S. Selvakumar Dynamic Multi Constraint Multi Path QOS Routing Algorithm (DMCMPRA) . . . . . . 347--354 H. Al-Bahadili and A. Rababa'a A Bit-Level Text Compression Scheme Based on the HCDC Algorithm . . . . . . 355--361 A. Sarkar and S. Choudhury and N. Chaki and S. Bhattacharya Quality Evaluation of Conceptual Level Object-Oriented Multidimensional Data Model . . . . . . . . . . . . . . . . . 362--371 F. Wang and H. Li and R. Li Non-Parametric Generalized Cross Entropy Estimator for BSS Algorithm . . . . . . 372--380 I. A. Ismail and M. Amin and H. Diab An Efficient Adaptive Ergodic Matrix and Chaotic System for Image Encryption . . 381--388
Tick H. Oh JPEG2000 and JPEG: Image Quality Comparison of Compressed Medical Modalities . . . . . . . . . . . . . . . 393--398 Tianjie Cao and Dongdai Lin and Rui Xue Universal Designated-Verifier Partially Blind Signatures for E-Commerce . . . . 399--403 Tissa Chandesa and Michael Hartley Automated Sketcher Using Edge Detection Techniques . . . . . . . . . . . . . . . 404--411 Chi-Chou Kao Performance-Driven Methods for Fine Granularity Scalable Video Coding . . . 412--419 Yung-Gi Wu Image Enlargement by Lagrange Interpolation . . . . . . . . . . . . . 420--427 Padmanabhan Sankar and Chinnagounder Chellamuthu Study and Simulation of Video Streaming 428--434 Kostas Pentikousis and Hussein Badr and Asha Andrade A Comparative Study of Aggregate TCP Retransmission Rates . . . . . . . . . . 435--441 Balachandra Muniyal and Prema K. Venkat Reddy An Efficient Method to Merge Hierarchical Public Key Infrastructures 442--446 Perumal Ganeshkumar and Kuppusamy Thyagarajah Balancing Throughput and Fairness for Concurrent Flows Based on Per Flow Scheduling in Ad Hoc Networks . . . . . 447--454 Shashikant U. Ghumbre and Ashok A. Ghatol An Intelligent System for Hepatitis B Disease Diagnosis . . . . . . . . . . . 455--460 Hassan Y. Ahmed and Ibrahima Faye and Naufal bin M. Saad and Syed A. Aljunid OCDM a System: New Detection Scheme and Encoder--Decoder Structure Based on Fibre Bragg Gratings (FBGs) for VCC Code 461--468 Jia Yu and Rong Hao and Fanyu Kong and Xiangguo Cheng and Huawei Zhao and Chen Yangkui Identity-Based Forward Secure Threshold Signature Scheme Based on Mediated RSA 469--475 Jia Yu and Rong Hao and Fanyu Kong and Xiangguo Cheng and Huawei Zhao and Yangkui Chen Cryptanalysis of a Type of Forward Secure Signatures and Multi-Signatures 476--481 Weiyi Zhang and Jun Kong and Kendall Nygard and Ming Li Adaptive Design of Pervasive Computing System Under QoS Constraints1 . . . . . 482--492
Patrik Österberg and Tingting Zhang Multicast-Favourable Max-Min Fairness --- The Definition and How to Comply . . 1--8 Chi-Chou Kao and Chia-Nan Yeh and Yen-Tai Lai Low-Energy Cluster Head Selection for Clustering Communication Protocols in Wireless Sensor Network . . . . . . . . 9--14 Anchare V. Babu On Selection of Optimal Physical Layer Parameters for Wireless Sensor Networks Over Rayleigh Fading Channels . . . . . 15--21 Ritesh Parikh and Santanu Chattopadhyay Power-Aware Multi-Level AND-XOR Network Synthesis . . . . . . . . . . . . . . . 22--28 Ioannis Legakis and Michalis A. Savelonas and Dimitris Maroulis and Dimitris K. Iakovidis Computer-Based Nodule Malignancy Risk Assessment in Thyroid Ultrasound Images 29--35 Ghanshyam Singh and Rajendra P. Yadav and Vijay Janyani Design of Symmetric and Asymmetric $ 2 \times 2 $ all Optical Ti:LiNbO$_3$ Machzehnder Interferometric Switches . . 36--40 Omaima Nomir Iris Biometrics: Human Identification Using Force Field . . . . . . . . . . . 41--48 Michael VanHilst and Shihong Huang and Hugh Lindsay Process Analysis of a Waterfall Project Using Repository Data . . . . . . . . . 49--56 Li Chunlin and Li Layuan Device Resource Allocation in Context-Aware Mobile Grid . . . . . . . 57--63 Li-Feng Liu and Yan-Yun Qu and Cui-Hua Li and Yuan Xie Multi-Class Spectral Clustering Based on Particle Swarm Optimization . . . . . . 64--69 Chantana Phongpensri (Chantrapornchai) and Saran Keinprapai and Opas Wongtaveesap and Kanok Hournkumnuard and Sergei Gorlatch Parallel Algorithm and Visualization of High Gradient Magnetic Separation of Nanoparticles . . . . . . . . . . . . . 70--82 Ismail Shahin Speaker Identification in Each of the Neutral and Shouted Talking Environments Based on Gender-Dependent Approach Using SPHMMS . . . . . . . . . . . . . . . . . 83--91 Mohammad K. Ayoubloo and Hazi Md. Azamathulla and Zulfequar Ahmad and Aminuddin Ab. Ghani and Javad Mahjoobi and Amin Rasekh Prediction of Scour Depth in Downstream of Ski-Jump Spillways Using Soft Computing Techniques . . . . . . . . . . 92--97
Yaodong Cui and Tianlong Gu and Wei Hu Recursive Algorithms for the Optimum Cutting of Equal Rectangles . . . . . . 103--107 Sandanam Domnic and Karuppanagounder Somasundaram Fast and Low Bit-Rate AMBTC Image Compression Scheme . . . . . . . . . . . 108--115 Ing-Jr Ding Improvement of Map-VFS Adaptation Performance by Fuzzy Control . . . . . . 116--123 Bindu Goel and Yogesh Singh An Empirical Analysis of Metrics to Predict the Software Defect Fix-Effort 124--131 Zuowen Tan Comments on a Threshold Authenticated Encryption Scheme . . . . . . . . . . . 132--136 Michael E. Sone and Ndeh N. Ningo A Simple FPGA-Based Wireless Transmitter/Receiver Convolutional Cryptosystem . . . . . . . . . . . . . . 137--143 Zouheir Trabelsi and Khaled Shuaib Implementation of an Effective and Secure Biometrics-Based Student Attendance System . . . . . . . . . . . 144--153 Lu Hong and Feng Hong and Zhongwen Guo and Ying Guo HCR: a Hybrid MAC Protocol for Underwater Sensor Networks Using Channel Reservation . . . . . . . . . . . . . . 154--159 Yaser M. A. Hamid and Daya K. Lobiyal COMPOW-Based PCM Protocol for Multi-Hop Manet . . . . . . . . . . . . . . . . . 160--166 Takao Shimomura and Kenji Ikeda and Muneo Takahashi Functional Web Component Generation for Visual Web Application Programming . . . 167--174
Carlos Almeida Timely and Dependable QoS Adaptation in Quasi-Synchronous Systems . . . . . . . 179--188 Anuja Meetoo and Kavi K. Khedo Saisense: a Novel Scalable, Adaptive and Intelligent Context-Aware Architecture 189--201 Masaru Fujieda and Takahiro Murakami and Yoshihisa Ishida An Approach to Multi-Pitch Estimation Using a Support Vector Machine . . . . . 202--210 Dakshina R. Kisku and Hunny Mehrotra and Phalguni Gupta and Jamuna K. Sing Robust Multi-Camera View Face Recognition . . . . . . . . . . . . . . 211--219 Kun-Ching Wang Voice Activity Detector for Noise Spectrum Estimation Using a Dynamic Band-Splitting Entropy Estimate . . . . 220--228 Maria Kalavathy Gnanamani and Seethalakshmi Pandian Designing Dynamic Composite Media Service and Monitoring Its Run-Time Performance . . . . . . . . . . . . . . 229--237 Hui-Min Huang and Jia-Lin Chang Novel Handoff Method for the Integrated $3$G and Nemo Network . . . . . . . . . 238--244 Ashutosh Gupta and Suneeta Agarwal A Novel Approach for Compressing DNA Sequences Using Semi-Statistical Compressor . . . . . . . . . . . . . . . 245--251 Li Chunlin and Li Layuan A Market-Based Resource Allocation Policy in Ad Hoc Grid . . . . . . . . . 252--257 Chaoqun Li and Hongwei Li Learning Random Model Trees for Regression . . . . . . . . . . . . . . . 258--265
Tarek Guesmi and Salem Hasnaoui and Houria Rezig and Ouajdi Korbaa Design and Implementation of a Global Scheduling Strategy for Data Distribution Over CAN-Based Networks . . 271--283 Smriti H. Bhandari and Sunil M. Deshpande Analysis of Engineered Surfaces for Product Quality Monitoring . . . . . . . 284--292 Wei-Po Lee and Li-Jen Liu and Jeng-An Chiou A Component-Based Framework for Rapidly Developing Online Board Games . . . . . 293--302 Jyhjong Lin Enhancing Customer Relationships with Customer Knowledge Management and P2P (Peer-To-Peer) Technology . . . . . . . 303--315 Arun Manoharan and Ammasi Krishnan Power Analysis of Multiple Hashing Bloom Filter Architecture for Network Applications . . . . . . . . . . . . . . 316--322 Ritsuya Ikeda and Kensuke Narita and Shin-ya Nishizaki Cooperation of Model Checking and Network Simulation for Cost Analyses of Distributed Systems . . . . . . . . . . 323--329 Rong Hao and Jia Yu and Zhiling Song A Note On a Threshold Verifiable Multi-Secret Sharing Scheme . . . . . . 330--334 Mohamed Abd-ElRahman Abdou A Fuzzy Wavelet-Based Approach to a Novel Image Denoising Engine . . . . . . 335--340 Chaoqun Li and Hongwei Li Correlation Weighted Heterogeneous Euclidean-Overlap Metric . . . . . . . . 341--346 Natheer Khasawneh and Maisa M. Al-Khudair and Mohammad Fraiwan On Using Classification Techniques for Corpus Reduction in Arabic Text-To-Speech Systems . . . . . . . . . 347--354 Phichhang Ou and Hengshan Wang Forecasting Volatility Switching ARCH by treed Gaussian process with Jumps to the Limiting Linear Model . . . . . . . . . 355--361
Lalit K. Awasthi and Manoj Misra and Ramesh C. Joshi An Efficient Coordinated Checkpointing Approach for Distributed Computing Systems with Reliable Channels . . . . . 1--10 Kuo-Ming Hung and Yen-Liang Chen and Ching-Tang Hsieh Image Inpainting Based On Geometric Similarity . . . . . . . . . . . . . . . 11--18 Zdravko Karakehayov Zeta: Zero Energy Transmissions Algebra for Wireless Sensor Networks . . . . . . 19--24 Blanca T. Abraham and Jose L. Aguilar Middleware for Improving Performance in a Component-Based Software Architecture 25--28 Subba Reddy Basappa and Udaya Kumar Simulation of Surface and Volume Stress for High Voltage Transmission Insulators 29--35 Sethuraman Santhoshbaboo and Balakrishnan Narasimhan A QoS Backbone Based Minimum Delay Routing Protocol for Mobile \em Ad Hoc Networks . . . . . . . . . . . . . . . . 36--41 Nikos Papadakis and Pavlos Kefalas and Antonis Delidakis and Kostas Papadakis An Approach of a Logic Resolver in a Distributed Peer-To-Peer System . . . . 42--47 Yanlong Wang and Jinhua Liu and Ting Zhang and Jin Zhang $3$-D Porous Media Reconstruction using a $2$-D Micro-CT Image and MPS . . . . . 48--54 Hu Xiong and Zhi Guan and Zhong Chen On the Security of a Pairing-Based Signcryption Scheme using Self-Certified Public Keys . . . . . . . . . . . . . . 55--57 Layale Bassil and Iyad Ouaiss Optimizing Functional Unit Binding During High-Level Synthesis . . . . . . 58--65
Thenkarai N. Janakiraman and John Janet L. Rani Double Star Embedded Clustering Algorithm for Wireless \em Ad Hoc Networks Using Ranking . . . . . . . . . 71--80 Omaima Nomir Human Identification: a new X-Ray Dental Radiographs Segmentation Algorithm using Graphcut . . . . . . . . . . . . . . . . 81--89 Kalavathy Sundarrajan and Ramalingam Suresh An Efficient Neighbourhood Pixel Filtering Algorithm for Wavelet-Based Image Denoising . . . . . . . . . . . . 90--97 Rong Hao and Jia Yu and Jing Li and Zhiling Song Forward Secure Threshold Signature Scheme in the Standard Model . . . . . . 98--104 Amany Sarhan and Rasha Mahmoud and Mohamed Faheem Spatio-Temporal Error Concealment Algorithms for Encoded Video Streams for Real-Time Applications . . . . . . . . . 105--118 Takao Shimomura Automated Server-Side Regression Testing for Web Applications . . . . . . . . . . 119--126 Jemi Florinabel Deva and Ebenezer Juliet Selwyn and Sadasivam Velayuthum Fast Orientation-Driven Multi-Structure Morphological Inpainting . . . . . . . . 127--134 Gurusamy Jeyakumar and Chinthamani Nathan S. Velayutham Differential Evolution and Dynamic Differential Evolution Variants --- An Empirical Comparative Performance Analysis . . . . . . . . . . . . . . . . 135--144
John B. Oladosu and Justice O. Emuoyibofarhe A Yoruba--English Language Translator for Doctor--Patient Mobile Chat Application . . . . . . . . . . . . . . 149--156 Raj K. Samanta and Partha Bhattacharjee and Goutam Sanyal Analysis of Cellular Wireless Networks with Non-Classical Traffic and Channel Reservation . . . . . . . . . . . . . . 157--165 Joseph Michael M. Mathana and Parthasarathy Rangarajan Reconfigurable Architecture For High Performance Turbo Decoder . . . . . . . 166--173 Supachote Lertvorratham and Pipat Hiranvanichakorn Integrating Secure Multipath Mobile Ad Hoc Network With Self-Authentication Strategy . . . . . . . . . . . . . . . . 174--184 Seonho Choi and Hyeonsang Eom and Edward Jung Securing Wireless Sensor Networks Against Broadcast Service Attacks . . . 185--191 Takao Shimomura Command Tag-Based Automatic Diagnosis For Computer System Troubles . . . . . . 192--199 Bo-Jhih Chen and Shen-Chuan Tai and Yung-Gi Wu A Gaussian Rate-Distortion Method For Detecting Zero-Quantized Blocks . . . . 200--212
Qing Liu and Lu-Ping Xu and Yi-De Ma and Yong Wang and Qiang Xie Bilateral Filtering for Image Processing Based on Pulse Coupled Neural Networks 217--222 Hailiang Shi and Xiangjun Xin Fusion of Panchromatic and Multispectral Image Based On PCA and NSCT . . . . . . 223--228 Tianyi Li and Minghui Wang and Zujian Huang An Improved Wavelet-Based Approach for Estimating the Variance of Noise in Images . . . . . . . . . . . . . . . . . 229--234 Li Chunlin and Chen Gang and Li Layuan Sensor Data Integration With The Grid: Model and Algorithm . . . . . . . . . . 235--240 Ashish K. Sharma and Jitendra Sharma and Ilesh C. Mehta A Novel Fuzzy Integrated Technical Requirements Prioritization Software System for Quality Function Deployment 241--248 Kelsey A. Ramirez-Gutierrez and Mariko Nakano-Miyatake and Hector M. Perez-Meana Improvement of Radon Transform-Based Perceptual Hashing using Image Normalization . . . . . . . . . . . . . 249--259 Monickaraj Vigilson Prem and Sankaranarayanan Swamynathan Code and Itinerary Security for Mobile Agents . . . . . . . . . . . . . . . . . 260--266
Xiangguo Cheng and Lifeng Guo and Jia Yu and Huiran Ma and Yuexiu Wu A New Identity-Based Group Signature Scheme . . . . . . . . . . . . . . . . . 1--5 Sikamony S. Kumar and Rama S. Moni and Jayapathy Rajeesh Automatic Segmentation of Liver Tumour using a Possibilistic Alternative Fuzzy C-Means Clustering . . . . . . . . . . . 6--12 Sriraman A. Padmanabhan and Soundarrajan Chandramathi A Wavelet-Based Video Compression using Adaptive Rood Search with Spatio-Temporal Correlation and LSK . . 13--21 Gouri S. Maharana and Pramod K. Meher and Basant K. Mohanty Efficient Systolic Architecture for VLSI Realization of $2$-D Hartley-Like Transform . . . . . . . . . . . . . . . 22--28 Yuet M. Lam Solution Space Reduction in Task Scheduling for Heterogeneous Computing Systems . . . . . . . . . . . . . . . . 29--35 Ahmed Louchene and Ammar Dahmani Watermarking Method Resilient to RST and Compression Based on DWT, LPM and Phase Correlation . . . . . . . . . . . . . . 36--43 Hu Xiong and Yanan Chen and Zhong Chen and Fagen Li Simple Three-Party Password-Based Key Exchange Protocol with Provable Security 44--50 Liang Zhiwei and Chen Yanyan and Zhu Songhao Resource Service Access Mechanism for Service Robots . . . . . . . . . . . . . 51--57
Goutam Sarker An Optimal Backpropagation Network for Face Identification and Localization . . 63--69 Takao Shimomura Semantic Program Visualization with Attachable Display Classes . . . . . . . 70--78 Fella Charif and Noureddine Djedi and Abderrazak Benchabane On Parallel Implementation of Horn and Schunck Motion Estimation Method . . . . 79--85 Hiroyoshi Jutori and Kanemitsu Ootsu and Takashi Yokota and Takanobu Baba Dynamic Selection of Speculative Paths in Two-Path Limited Speculation Method 86--95
Rohilah Sahak and Wahidah Mansor and Khuan Y. Lee and Azlee Zabidi and Ahmad I. M. Yassin Optimization of Principal Component Analysis and Support Vector Machine for the Recognition of Infant Cry with Asphyxia . . . . . . . . . . . . . . . . 99--107 Da Li and Yibin Hou Multiprocessor Systems Auto-Design for Multiple Use-Case Applications on FPGA 108--113 Li Ding and Dana Steil and Brandon Dixon and Nicholas A. Kraft and David B. Brown and Allen Parrish First: Framework to Integrate Relationship Search Tools . . . . . . . 114--124 Shanker Keshavdas and Geert-Jan M. Kruijff Functional Mapping for Human--Robot Collaborative Exploration . . . . . . . 125--135 Yuanwei Wei and Yali Xue and Jiongyu Yin and Weidou Ni Prediction of Municipal Solid Waste Generation in China by Multiple Linear Regression Method . . . . . . . . . . . 136--140
Soumalya Ghosh and Debasis Samanta Analysis on User Errors in Virtual Keyboards . . . . . . . . . . . . . . . 145--151 Basilis Mamalis and Grammati Pantziou and Georgios Dimitropoulos and Dimitris Kremmydas Highly Scalable Parallelization of Standard Simplex Method on a Myrinet-Connected Cluster Platform . . . 152--161 Chia-Ying Chang and Shen-Chuan Tai Image Enhancement Algorithm Based on Zone System and Dual-Exposure Techniques 162--172 Guoming Chen and Qiang Chen and Dong Zhang and Yiqun Chen A Watermarking Scheme Based on Compressive Sensing and Bregman Iteration . . . . . . . . . . . . . . . 173--180 Nida S. Khan and Asma S. Larik and Quratulain Rajput and Sajjad Haider A Bayesian Approach for Suspicious Financial Activity Reporting . . . . . . 181--187
Kundu Anirban Efficient Bandwidth Utilization for Downloading Web Pages . . . . . . . . . 1--6 Daniel V. de Macedo and Maria Andréia F. Rodrigues and João J. V. P. Furtado and Elizabeth S. Furtado and Daniel A. Chagas Using and Evaluating Augmented Reality for Mobile Data Visualization in Real Estate Classified Ads . . . . . . . . . 7--14 Yuet M. Lam and Wayne Luk A Many-Core Based Parallel Tabu Search 15--22 Shen-Chuan Tai and Chia-Ying Chang and Bo-Jhih Chen and Yu-Yi Liao and Yung-Gi Wu Early Termination for Residual Quadtree Decision-Making in HEVC . . . . . . . . 23--33 Mamdouh Alenezi and Kenneth Magel Empirical Evaluation of a New Coupling Metric: Combining Structural and Semantic Coupling . . . . . . . . . . . 34--44
Kamaraj Arunachalam and Marichamy Perumalsamy and C. Kalyana Sundaram and J. Senthil Kumar Design and Implementation of a Reversible Logic Based $8$-Bit Arithmetic and Logic Unit . . . . . . . 49--55 Coimbatore K. Shyamala and Tattamangalam R. Padmanabhan A Trust--Reputation Model Offering Data Retrievability and Correctness in Distributed Storages . . . . . . . . . . 56--63 Guermoui Mawloud and Melaab Djame Modified Local Binary Pattern for Human Face Recognition Based on Sparse Representation . . . . . . . . . . . . . 64--71 Kun Ma and Fusen Dong and Bo Yang Incremental Object Matching Approach of Schema-Free Data with Mapreduce . . . . 72--77 Parul Pandey and Maheshwari Tripathi The Wheel Quorum Protocol: An Efficient Approach for Reading Replicated Data . . 78--83
Seyedeh B. Ayati and Kaddour Bouazza-Marouf and David Kerr and Michael O'Toole Haematoma Detection Using EIT in a Sheep Model . . . . . . . . . . . . . . . . . 87--92 Abubaker Wahaballa and Osman Wahballa and Fagen Li and Mohammed Ramadan and Zhiguang Qin Multiple-Layered Securities Using Steganography and Cryptography . . . . . 93--100 Abba Suganda Girsang and Chun-Wei Tsai and Chu-Sing Yang Multi-Objective Particle Swarm Optimization for Repairing Inconsistent Comparison Matrices . . . . . . . . . . 101--109 Walid Emar and Sofyan Hayajneh and Musbah J. Aqel A Computer Based Sliding Mode Controller Topology for Nonlinear Voltage Regulating Chopper . . . . . . . . . . . 110--114 Ganasigamony W. Jiji and Peter Raj J. D. Savariraj Retrieval in Dermatology using Intelligent Techniques . . . . . . . . . 115--124
Shang Gao and Hualong Yu and Ling Qiu and Cungen Cao The Wading Across Stream Algorithm . . . 127--132 Chakrapani Venkataramanan and Selvaraj M. Girirajkumar Markov Fuzzy Based MAC Protocol for Life Time Maximization of Wireless Sensor Network . . . . . . . . . . . . . . . . 133--139 Sai P. Kadiyala and Debasis Samanta Clock-Gating Approach to Low Power Domino Circuit Synthesis . . . . . . . . 140--147 Junqiang Zhang and Chonglong Wu and Junqi Liu and Haihua Hu The Research of Three-Dimensional Integrated Framework of Landslide Disaster Monitoring Data . . . . . . . . 148--154 Samia Belkacem and Zohir Dibi and Ahmed Bouridane DCT Coefficients Modelling for Image Watermarking . . . . . . . . . . . . . . 155--163
John O'Farrell and Sanjeev Baskiyar Enhanced real-time performance using a secondary bus for cache write-backs . . 1--9 G. Ravi and K. R. Kashwan Performance analysis of an energy aware zone routing protocol using span . . . . 10--16 Jeevan M. Meruga and Carly Fountain and Jon Kellar and Grant Crawford and Aravind Baride and P. Stanley May and William Cross and Randy Hoover Multi-layered covert QR codes for increased capacity and security . . . . 17--27 Abubaker Wahaballa and Zhen Qin and Hu Xiong and Zhiguang Qin and Mohammed Ramadan A taxonomy of secure electronic English auction protocols . . . . . . . . . . . 28--36 Zih-Siou Chen and Shen-Chuan Tai Corrected center-surround retinex: application to tone reproduction for high dynamic range images . . . . . . . 37--51
\vZeljka Mihajlovi\'c and Sini\vsa Popovi\'c and Kre\vsimir \'Cosi\'c Interactive scenario control in virtual environments . . . . . . . . . . . . . . 53--59 Yung-Gi Wu and Sheng-Lun Tsai Fall event detection by gyroscopic and accelerometer sensors in smart phone . . 60--66 Kai Chain and Wen-Chung Kuo and Kuei-Hu Chang Enhancement key agreement scheme based on chaotic maps . . . . . . . . . . . . 67--72 Parag Kumar Guha Thakurta and Sujoy Sett Joint routing in mobile networks: a weighted optimization approach . . . . . 73--81
Shen-Chuan Tai and Ting-Chou Tsai and Jui-Chiang Wen Single image dehazing based on vector quantization . . . . . . . . . . . . . . 83--93 Zhi Liu and Sanya Liu and Lin Liu and Meng Wang and Jianwen Sun and Xian Peng A discriminative random sampling strategy with individual-author feature selection for writeprint recognition of Chinese texts . . . . . . . . . . . . . 94--101 Alagumani Selvaraj and Subashini Sundararajan Survey on public auditability to ensure data integrity in cloud storage . . . . 102--110 Yin Yang and Wenyi Li and Manning Zhang and Xiaomei Ding and Jing Dai Disk failure prediction model for storage systems based on disk SMART technology . . . . . . . . . . . . . . . 111--119 Zhu Zhu and Julang Jiang and Xiaoguo Zhang Edge-preserving regularized filter with visual perception outlier measurement 120--126 Romany F. Mansour Using adaptive mutation to accelerate the convergence of immune algorithms for prediction of $3$D molecular structure 127--133 Amira Yahi and Kamel Messaoudi and Salah Toumi and El-bay Bourennane Real-time hardware implementation of a speed FSBMA used in H.264/AVC . . . . . 134--142 Beulah David and Dorai Rangasamy Spatial-contextual texture and edge analysis approach for unsupervised change detection of faces in counterfeit images . . . . . . . . . . . . . . . . . 143--159 Chi-Chou Kao and Yen-Tai Lai and Chao-Feng Tseng Improved edge-directed super resolution 160--167 G. Wiselin Jiji Analysis of functionality of left ventricle . . . . . . . . . . . . . . . 168--180 Chunhua Jin and Chunxiang Xu and Fagen Li and Xiaojun Zhang A novel certificateless deniable authentication protocol . . . . . . . . 181--192
Ju-Yuan Hsiao and Shu-Ju Chuang and Po-Yueh Chen A hybrid face recognition system based on multiple facial features . . . . . . 1--8 Ibrahim El-Henawy and Kareem Ahmed Accelerating convergence of backpropagation for multilayer perceptron neural networks: a case study on character bit-mapped pixel image to ASCII conversion . . . . . . . . . . . . 9--18 Kun Ma and Bo Yang and Ajith Abraham Asynchronous data translation framework for converting relational tables to document stores . . . . . . . . . . . . 19--28 Hema Banati and Nidhi Arora Detecting communities in complex networks --- a discrete hybrid evolutionary approach . . . . . . . . . 29--40 Issam Dagher and Rima Antoun Different PCA scenarios for email filtering . . . . . . . . . . . . . . . 41--54 V. Ramachandran and C. Sekar $ (1, N) $-arithmetic graphs . . . . . . 55--59
B. Pakkiraiah and G. Durga Sukumar A new modified MPPT controller for improved performance of an asynchronous motor drive under variable irradiance and variable temperature . . . . . . . . 61--74 Manish Kashyap and Mahua Bhattacharya Detectors and descriptors for registration of illumination varying, globally distorted images . . . . . . . 75--81 Mili Ghosh and Debarka Mukhopadhyay and Paramartha Dutta A study on 2 dimensional 2 Dot 1 Electron quantum dot cellular automata based reversible 2:1 MUX design: an energy analytical approach . . . . . . . 82--95 Dipankar Santra and Krishna Sarker and Anirban Mukherjee and Arindam Mondal Hybrid PSO-ACO technique to solve multi-constraint economic load dispatch problems for 6-generator system . . . . 96--115 Nanda Dulal Jana and Jaya Sil Interleaving of particle swarm optimization and differential evolution algorithm for global optimization . . . 116--133 Sujit Kumar Das and Bibhas Chandra Dhara Arithmetic coding based secret image sharing with inverted pattern LSB substitution for share hiding to achieve better quality stego images . . . . . . 134--143 Parul Agarwal and Shikha Mehta Enhanced flower pollination algorithm on data clustering . . . . . . . . . . . . 144--155 Utpal Nandi and Jyotsna Kumar Mandal Efficiency of adaptive fractal image compression with archetype classification and its modifications . . 156--163 Pankaj Pal and Siddhartha Bhattacharyya and Ashish Mani Pure color object extraction from a noisy state using quantum version parallel self organizing neural network 164--186
Ahmed Abdulateef Mohammed and Atul Sajjanhar Experimental comparison of approaches for feature extraction of facial attributes . . . . . . . . . . . . . . . 187--198 Ashutosh Sharma and Manish Kumar Goyal Bayesian network for monthly rainfall forecast: a comparison of K2 and MCMC algorithm . . . . . . . . . . . . . . . 199--206 Zeeshan Ali Siddiqui and Kirti Tyagi A critical review on effort estimation techniques for service-oriented-architecture-based applications . . . . . . . . . . . . . . 207--216
Xu Huang and Raul Fernandez Rojas and Allan C. Madoc and Dua'a Ahmad Evidentiary assessment for protecting WSNs from internal attacks in real-time 1--8 Arran Stewart and Rachel Cardell-Oliver and Rowan Davies A fine-grained framework for quantifying secure management of state in object-oriented programs . . . . . . . . 9--16 A. Mani Probabilities, dependence and rough membership functions . . . . . . . . . . 17--35 Saswati Ghosh Design and testing of rectifying antenna for RF energy scavenging in GSM 900 band 36--44 K. K. Soundra Pandian and K. C. Ray An algorithm and architecture for non-recursive pseudorandom sequence generation using sequence folding technique . . . . . . . . . . . . . . . 45--56 Anonymous Corrigendum . . . . . . . . . . . . . . 57--57
Srilekha Mukherjee and Goutam Sanyal Enhanced Position Power First Mapping (PPFM) based image steganography . . . . 59--68 Vishank Bhatia and V. Kalaichelvi and R. Karthikeyan Comparison of GA tuned fuzzy logic and NARMA-L2 controllers for motion control in $5$-DOF robot . . . . . . . . . . . . 69--78 Nikki Robins and Patricia A. H. Williams and Krishnun Sansurooah An investigation into remnant data on USB storage devices sold in Australia creating alarming concerns . . . . . . . 79--90 Kareem Ahmed and Ibrahim El-Henawy Increasing robustness of Data Encryption Standard by integrating DNA cryptography 91--105 Masood Mansoori and Ian Welch and Kim-Kwang Raymond Choo and Roy A. Maxion and Seyed Ebrahim Hashemi Real-world IP and network tracking measurement study of malicious websites with HAZOP . . . . . . . . . . . . . . . 106--121
E. A. Zanaty and S. F. El-Zoghdy A novel approach for color image segmentation based on region growing . . 123--139 S. Sivanaga Malleswara Rao and K. Venkata Rao and K. Hemachandra Reddy and Ch. V. S. Parameswara Rao Prediction and optimization of process parameters in wire cut electric discharge machining for high-speed steel (HSS) . . . . . . . . . . . . . . . . . 140--147 Ismat Beg and Tabasam Rashid A fuzzy similarity measure based on equivalence relation with application in cluster analysis . . . . . . . . . . . . 148--154 Qasim Ali Arain and Hina Memon and Imran Memon and Muhammad Hammad Memon and Riaz Ahmed Shaikh and Farman Ali Mangi Intelligent travel information platform based on location base services to predict user travel behavior from user-generated GPS traces . . . . . . . 155--168 Kalyani Krishnan and Reshmy Krishnan and Ayyakannu Muthumari A semantic-based ontology mapping --- information retrieval for mobile learning resources . . . . . . . . . . . 169--178
K. Sehil and M. Darwish Critical analysis of power conversion topologies for stand-alone PV systems with super-capacitor . . . . . . . . . . 179--188 Chi-Chou Kao Improved feature extraction and classification methods for electroencephalographic signal based brain--computer interfaces . . . . . . . 189--197 Matthew Russell and Jeremy Straub Characterization of command software for an autonomous attitude determination and control system for spacecraft . . . . . 198--209 Xia Chen and Chang Lu and Qiaoyu Tan and Guoxian Yu Semi-supervised classification based on clustering adjusted similarity . . . . . 210--219 Yi Lu and Cuicui Bi and Nijia Ye and Hu Bo Auto-establishing simulation parallel manipulators with linear legs and auto-solving their workspaces by utilizing CAD variation geometry . . . . 220--233 Anonymous Editorial Board . . . . . . . . . . . . (ei)
Thekra Aldouri and Mhand Hifi A hybrid reactive search for solving the max-min knapsack problem with multi-scenarios . . . . . . . . . . . . 1--13 Amid Khatibi Bardsiri A new combinatorial framework for software services development effort estimation . . . . . . . . . . . . . . . 14--24 Jeng Feng Chin and Joshua Prakash and Shahrul Kamaruddin and Melissa Chea Ling Tan Automating computer simulation and statistical analysis in production planning and control research . . . . . 25--41 Ali Belhocine and Wan Zaidi Wan Omar A numerical parametric study of mechanical behavior of dry contacts slipping on the disc-pads interface . . 42--60
Al-Sakib Khan Pathan and Zubair Md Fadlullah Foreword from the Editors-in-Chief . . . 61--62 Rumpa Hazra and Shouvik Dey and Jayashree Singha Modeling, analysis and verification of real-time resource access control protocols: a formal approach . . . . . . 63--72 Rahul Desai and B. P. Patil Adaptive routing based on predictive reinforcement learning . . . . . . . . . 73--81 Guodong Li and Qian Liu and Shuo Bai A novel model to improve network performance . . . . . . . . . . . . . . 82--87 R. R. Bhavani and G. Wiselin Jiji Image registration for varicose ulcer classification using KNN classifier . . 88--97 Laxman Singh and Zainul Abdin Jaffery Computerized detection of breast cancer in digital mammograms . . . . . . . . . 98--109 Abhinav Dayal Improving adaptive frameless rendering 110--120
Anonymous Preface . . . . . . . . . . . . . . . . 1--1 Ruihong Zhou and Qiaoming Liu and Xuming Han and Limin Wang Density Peak Clustering algorithm using knowledge learning-based fruit fly optimization . . . . . . . . . . . . . . 1--10 Limin Wang and Mingyang Li and Xuming Han and Kaiyue Zheng An improved density-based spatial clustering of application with noise . . 1--7 Cao Yong and Mu Yongmin and Shen Meie Data change analysis based on function call path . . . . . . . . . . . . . . . 1--10 Feng Li and Yawen Wang and Yunzhan Gong Test input generation of bitwise operation based on four-valued logic . . 1--8 Honglei Zhu and Dahai Jin and Yunzhan Gong False positive elimination in suspected code fault automatic confirmation . . . 1--9 Limin Wang and Kaiyue Zheng and Xing Tao and Xuming Han Affinity propagation clustering algorithm based on large-scale data-set 1--6 Limin Wang and Nianbo Wang and Xuming Han and Yizhang Wang Semi-supervised hierarchical optimization-based affinity propagation algorithm and its applications . . . . . 1--10 Hao Chen and Dongmei Zhao and Kan Liu and Wen Wu and Li Wang Improving reliability of cloud computing services for next generation mobile communication networks . . . . . . . . . 1--7
Al-Sakib Khan Pathan Technological advancements and innovations are often detrimental for concerned technology companies . . . . . 189--191 Yue Shen and Fida Hussain and Hui Liu and Destaw Addis Power quality disturbances classification based on curvelet transform . . . . . . . . . . . . . . . 192--201 Harish Radhappa and Lei Pan and James Xi Zheng and Sheng Wen Practical overview of security issues in wireless sensor network applications . . 202--213 Somayeh Saraf Esmaili and Keivan Maghooli and Ali Motie Nasrabadi A new model for face detection in cluttered backgrounds using saliency map and C$_2$ texture features . . . . . . . 214--222 Ebtsam Adel and Shaker El-Sappagh and Sherif Barakat and Mohammed Elmogy Distributed electronic health record based on semantic interoperability using fuzzy ontology: a survey . . . . . . . . 223--241
Sandeep Joshi and Monika Jain and Rahul Saxena Recent trends in communication and computational intelligence . . . . . . . 1--1 Hargeet Kaur and Atul Kumar Analyzing the efficiency of partially entangled states in Vaidman's-type games and its applications in Quantum Secret Sharing . . . . . . . . . . . . . . . . 2--13 Suman Bhakar and Devershi Pallavi Bhatt Optimizing latency time of the AR system through glyph detection . . . . . . . . 14--30 Bhoopendra Pachauri and Ajay Kumar and Joydip Dhar Reliability analysis of open source software systems considering the effect of previously released version . . . . . 31--38 Sophiya Sheikh and Aitha Nagaraju and Mohammad Shahid A Parallelized Dynamic Task Scheduling for Batch of Task in a computational grid . . . . . . . . . . . . . . . . . . 39--53 Anjali Ahuja and Anamika Jain and Madhu Jain Finite population multi-server retrial queueing system with an optional service and balking . . . . . . . . . . . . . . 54--61 Partho Mallick and Priyanka Seth and Anupam Ghosh Entropy-based fuzzy hybrid framework for gene prediction network --- an application to identify and rank the biomarkers for human lung adenocarcinoma 62--77 Inderdeep Kaur and Parminder Kaur and Hardeep Singh An empirical evaluation of an advanced version control tool in conflict detection and resolution . . . . . . . . 78--87
Bingyang Wei and Harry S. Delugach and Yi Wang From state diagrams to sequence diagrams: a requirements acquisition approach . . . . . . . . . . . . . . . . 89--111 R. R. Darwish and Abdullah Elewi A green proactive orchestration architecture for cloud resources . . . . 112--128 Fahd Alqasemi and Amira Abdelwahab and Hatem Abdelkader Constructing automatic domain-specific sentiment lexicon using KNN search via terms discrimination vectors . . . . . . 129--139 Zhiqiang (John) Wu and Sampson Gholston and Letha Etzkorn An approach to finding good anchor nodes in ontologies . . . . . . . . . . . . . 140--148 Felix Obite and Geoffrey Ijeomah and Joseph Stephen Bassi Carbon nanotube field effect transistors: toward future nanoscale electronics . . . . . . . . . . . . . . 149--164
Frederic Nzanywayingoma and Yang Yang Efficient resource management techniques in cloud computing environment: a review and discussion . . . . . . . . . . . . . 165--182 K. V. Rama Satish and N. P. Kavya A framework for big data pre-processing and search optimization using HMGA-ACO: a hierarchical optimization approach . . 183--194 Ranjit Kumar Behera and K. Hemant Kumar Reddy and Diptendu Sinha Roy Modeling and assessing reliability of service-oriented internet of things . . 195--206 Ziaur Rahman and Yi-Fei Pu and Muhammad Aamir and Farhan Ullah A framework for fast automatic image cropping based on deep saliency map detection and Gaussian filter . . . . . 207--217 Partha Chowdhuri and Pabitra Pal and Biswapati Jana Improved data hiding capacity through repeated embedding using modified weighted matrix for color image . . . . 218--232 Sharmin Jahan and Mozammel Chowdhury and Rafiqul Islam Robust user authentication model for securing electronic healthcare system using fingerprint biometrics . . . . . . 233--242
G. Ranganathan and Hui-Ming Wee and Pavel Lafata Editorial on IoT in Social, Mobility, Analytics & Cloud [ISMAC] . . . . . . . . 243--244 Hima Bindu Valiveti and Trinatha Rao Polipalli Performance analysis of SLTC-D2D handover mechanism in software-defined networks . . . . . . . . . . . . . . . . 245--254 Anil Kumar Budati and Trinatha Rao Polipalli Performance analysis of HFDI computing algorithm in intelligent networks . . . 255--261 Yan Zhang Classified scheduling algorithm of big data under cloud computing . . . . . . . 262--267 Hongtao Li Estimation of stadium construction schedule based on big data analysis . . 268--275 Mingyuan Hu Logistics vehicle tracking method based on intelligent vision . . . . . . . . . 276--282 Fengqiong Zhang Research on reliability analysis of computer network based on intelligent cloud computing method . . . . . . . . . 283--288 Jia Zhu Research on data mining of electric power system based on Hadoop cloud computing platform . . . . . . . . . . . 289--295 K. Koteswara Rao and G. S. V. P. Raju Reducing interactive fault proneness in software application using genetic algorithm based optimal directed random testing . . . . . . . . . . . . . . . . 296--305 Shiqi Yang Analysis for the reliability of computer network by using intelligent cloud computing method . . . . . . . . . . . . 306--311 Geeta Sharma and Sheetal Kalra Advanced multi-factor user authentication scheme for E-governance applications in smart cities . . . . . . 312--327
S. Ramasamy and K. Nirmala Disease prediction in data mining using association rule mining and keyword based clustering algorithms . . . . . . 1--8 D. Jayaprabha and K. Nirmala Efficiency stress prediction in BPO industries using hybrid $k$-means and artificial bee colony algorithm . . . . 9--16 M. P. A. Buhari and S. K. Mohideen A combination of fuzzy positioned dental X-ray analysis model to presume the peculiar images . . . . . . . . . . . . 17--22 A. Krishnamoorthy and V. Vijayarajan Energy aware routing technique based on Markov model in wireless sensor network 23--29 Zhang Hao Design of WSN traffic forecasting system with delayed self-sensing . . . . . . . 30--35 Min Hu and Wei Cai Evacuation simulation and layout optimization of cruise ship based on cellular automata . . . . . . . . . . . 36--44 ShuRen Liu and ChangNing Cai and QiWei Zhu and N. Arunkumar A study of software pools for seismogeology-related software based on the Docker technique . . . . . . . . . . 45--51 Wang Ya and Zhou Meng-Ran and Niu Lei and Zhao Jia Trust analysis of WSN nodes based on fuzzy theory . . . . . . . . . . . . . . 52--56 Wang Lin Quantitative analysis of spatial--temporal variation and relation of LST and relevant ecological elements 57--66 Huang Changhai and Hu Shenping and Kong Fancun and Xuan Shaoyong Vulnerability analysis of inland waterways network base on complex network theory . . . . . . . . . . . . . 67--75 Liao Wenguo and Liao Guangping Incremental semantic web retrieval model based on web service . . . . . . . . . . 76--83 Zhang Yong-xiong and Wang Liang-ming and Yi Lu-xia A network attack discovery algorithm based on unbalanced sampling vehicle evolution strategy for intrusion detection . . . . . . . . . . . . . . . 84--92 Liangchen Chen and Shu Gao and Xiufeng Cao Research on real-time outlier detection over big data streams . . . . . . . . . 93--101 Tao Ye Internet of Things financial data capture technology based on improved particle swarm optimization FLFNN . . . 102--107 Mohit Kumar and S. C. Sharma Dynamic load balancing algorithm to minimize the makespan time and utilize the resources effectively in cloud environment . . . . . . . . . . . . . . 108--117
Limiao Li and Zhihong Zhang and Zhixiong Liu and Hui Ye and Keke He Social big data oriented trust situation risk model based on individual behavior 119--126 Alexander Agathos and Philip Azariadis 3D reconstruction of skeletal mesh models and human foot biomodel generation using semantic parametric-based deformation . . . . . . 127--140 Dan Ren Research and analysis on precise matching method for multi-feature of fuzzy digital image . . . . . . . . . . 141--149 Yan Hou Chaos sequence data classification mining research under network visualization analysis . . . . . . . . . 150--156 Hongben Huang Research on feature classification method of network text data based on association rules . . . . . . . . . . . 157--163 A. Suruliandi and J. C. Kavitha and D. Nagarajan An empirical evaluation of recent texture features for the classification of natural images . . . . . . . . . . . 164--173 Xiangfei Meng Complex network anomaly recognition integrating multi-source and large data 174--178 Taibo He Optimization of the large data spatial information decision support service system dependent on the solution of the information entropy equation . . . . . . 179--186 Yukun Dong Detecting all potential null dereferences based on points-to property sound analysis . . . . . . . . . . . . . 187--195 Sunday Oyinlola Ogundoyin An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks . . . . . . . . . . . . 196--211
Mohammad Shojafar and Mehdi Sookhak Internet of Everything, Networks, Applications, and Computing Systems (IoENACS) . . . . . . . . . . . . . . . 213--215 Weihua Yao Application of computer digital simulation technology in action structure image research on martial art 216--221 P. Parthasarathy and S. Vivekanandan A typical IoT architecture-based regular monitoring of arthritis disease using time wrapping algorithm . . . . . . . . 222--232 Sanju Mishra and Sarika Jain Ontologies as a semantic model in IoT 233--243 Samaher Al Janabi Smart system to create an optimal higher education environment using IDA and IOTs 244--259 Song Tao and Zhuang Lei and Jing Chenkai Multi-frame moving video detection algorithm for IOT based on Gauss Monte Carlo particle filter . . . . . . . . . 260--265 Ambarish G. Mohapatra and Bright Keswani and Shivani Nanda and Abhishek Ray and Ashish Khanna and Deepak Gupta and Poonam Keswani Precision local positioning mechanism in underground mining using IoT-enabled WiFi platform . . . . . . . . . . . . . 266--277 Zhu Qianqian and Wang Dongliang A SVM recommendation IoT model based on similarity evaluation and collaborative filtering of multi-angle knowledge units 278--281 Van Luong Nguyen and Ying Xia IoT based user trajectory retrieval and discovery algorithm based on spatial--temporal correlation analysis 282--289 Mahammad Shareef Mekala and P. Viswanathan A survey: energy-efficient sensor and VM selection approaches in green computing for X-IoT applications . . . . . . . . . 290--305 G. Kalyani and Shilpa Chaudhari An efficient approach for enhancing security in Internet of Things using the optimum authentication key . . . . . . . 306--314 Sunday Oyinlola Ogundoyin A lightweight privacy-preserving data aggregation scheme with provable security for Internet-of-Things . . . . 315--327
Armin Anvari and Lei Pan and Xi Zheng Generating security questions for better protection of user privacy . . . . . . . 329--350 Xiaofei Xu and Zeyu Zhang and Yanbin Chen and Li Li HMM-based predictive model for enhancing data quality in WSN . . . . . . . . . . 351--359 Mahesh Goyani and Narendra Patel Template matching and machine learning-based robust facial expression recognition system using multi-level Haar wavelet . . . . . . . . . . . . . . 360--371 Akalanka Karunarathne Mudiyanselage and Lei Pan Security test MOODLE: a penetration testing case study . . . . . . . . . . . 372--382 R. Nandakumar and K. Nirmala Anonymity-based intra--inter and multiple layer service dependent security-aware packet scheduling algorithm (AIIMLSDSPS) . . . . . . . . . 383--391 Cheng-Yu Fei and Zhong Su and Qing Li A method of heading estimation for pedestrian navigation based on information compression MDL criteria . . 392--398 Biswajit Biswas and Biplab Kanti Sen Medical image fusion using type-2 fuzzy and near-fuzzy set approach . . . . . . 399--414 Zhou Tao-Yun and Lian Bao-wang and Zhang Yi High precision nodes localization algorithm based on optimal dual-frequency comparison ranging . . . 415--421 Wenzhun Huang and Peng Wang and Lintao Lv and Liping Wang and Harry Haoxiang Wang An inventive high-performance computing electronic information system for professional postgraduate training . . . 422--428
Chunhua Jin and Guanhua Chen and Changhui Yu and Jianyang Zhao Deniable authenticated encryption for e-mail applications . . . . . . . . . . 429--438 Wanglong Chen and Lifeng Zhu and Xiaorui Zhang Modeling deformable objects using local rigid body simulation . . . . . . . . . 439--448 Khadidja Bentlemsan and Djamal Bennouar and Dalila Tamzalit and Khaled Walid Hidouci A hybrid re-composition based on components and web services . . . . . . 449--462 Mohammed Elsaid Moussa and Ensaf Hussein Mohamed and Mohamed Hassan Haggag A generic lexicon-based framework for sentiment analysis . . . . . . . . . . . 463--473 Sheeraz Arif and Tehseen Ul-Hassan and Fida Hussain and Jing Wang and Zesong Fei Video representation by dense trajectories motion map applied to human activity recognition . . . . . . . . . . 474--484 Ahmad Al-Jarrah and Enrico Pontelli The collaborative virtual affinity group model: principles, design, implementation, and evaluation . . . . . 485--513 Zohra Bouzidi and Labib Sadek Terrissa and Noureddine Zerhouni and Soheyb Ayad An efficient cloud prognostic approach for aircraft engines fleet trending . . 514--529 Anonymous RETRACTED ARTICLE: Retraction . . . . . 530--530
Al-Sakib Khan Pathan Access to information vs blocking of information during COVID-19 pandemic: a governance dilemma in the era of crowdsourcing based on ICT . . . . . . . 531--532 Zhongliang Liu and Lili Huang and Xiaoliang Zong Clustering analysis method and implementation in the MapReduce model for solving data-intensive problems . . 533--543 Tong Yi and Chun Fang A complexity metric for object-oriented software . . . . . . . . . . . . . . . . 544--549 Jian Ma and Runtong Zhang and Xiaomin Zhu and Runqi Cao Process ontology technology in modeling clinical pathway information system . . 550--557 Xuming Han and Qiaoming Liu and Limin Wang and Huimin Lu and Liyuan Zhou and Junhua Wang An improved fruit fly optimization algorithm based on knowledge memory . . 558--568 Hong Liang and Yuan Gao and Yunlei Sun and Xiao Sun CEP: calories estimation from food photos . . . . . . . . . . . . . . . . . 569--577 Aiping Zhou and Hongbing Li A QoS guarantee approach for multimedia software system . . . . . . . . . . . . 578--588 Manmeet Mahinderjit Singh and Ke Wan Ching and Asrulnizam Abd Manaf A novel out-of-band biometrics authentication scheme for wearable devices . . . . . . . . . . . . . . . . 589--601 Hui Yang and Peter A. Bath Predicting loneliness in older age using two measures of loneliness . . . . . . . 602--615 Yi-Ju Tseng and Yu-Lien Shih Developing epidemic forecasting models to assist disease surveillance for influenza with electronic health records 616--621 S. Sapna and A. Renuka Computer-aided system for Leukocyte nucleus segmentation and Leukocyte classification based on nucleus characteristics . . . . . . . . . . . . 622--633
M. Anbarasi and M. A. Saleem Durai Prediction of protein folding kinetics states using hybrid brainstorm optimization . . . . . . . . . . . . . . 635--643 Hu Xinxin and Liang Fengshou Keyword search method of distributed file in large data environment . . . . . 644--648 Wei Xiaoqiong and Yin E. Zhang Image segmentation algorithm based on dynamic particle swarm optimization and $K$-means clustering . . . . . . . . . . 649--654 Jia Ru-Da and Chen Yong-Gao and Zhang Yin E. Fusion algorithm of infrared and visible images based on frame difference detection technology and area feature 655--660 Manal Abdullah and Muna AlMasawa and Ibtihal Makki and Maha Alsolmi and Samar Mahrous Emotions extraction from Arabic tweets 661--675 Rubina Parveen and Subhash Kulkarni and V. D. Mytri Automated extraction and discrimination of open land areas from IRS-1C LISS III imagery . . . . . . . . . . . . . . . . 676--685 Anil Garg and O. P. Sahu A hybrid approach for speech enhancement using Bionic wavelet transform and Butterworth filter . . . . . . . . . . . 686--696 Rafik Menassel and Idriss Gaba and Khalil Titi Introducing BAT inspired algorithm to improve fractal image compression . . . 697--704 Miloud Khaldi and Mohammed Rebbah and Boudjelal Meftah and Omar Smail Fault tolerance for a scientific workflow system in a Cloud computing environment . . . . . . . . . . . . . . 705--714 Honey Jindal and Neetu Sardana and Raghav Mehta Efficient web navigation prediction using hybrid models based on multiple evidence combinations . . . . . . . . . 715--728
Gerard Deepak and B. N. Shwetha and C. N. Pushpa and J. Thriveni and K. R. Venugopal A hybridized semantic trust-based framework for personalized web page recommendation . . . . . . . . . . . . . 729--739 Xuexin Gao and Yongmin Mu and Meie Shen The research of endless loop detection method based on the basic path . . . . . 740--747 Abejide Ade-Ibijola Synthesis of regular expression problems and solutions . . . . . . . . . . . . . 748--764 E. A. Zanaty and Ashraf Afifi Generalized Hermite kernel function for support vector machine classifications 765--773 Wenjun Wang and Wei-Ming Lin System performance enhancement with thread suspension for simultaneous multi-threading processors . . . . . . . 774--786 Ghazi Al-Naymat and Mouhammd Al-Kasassbeh and Zyad Sober Pairs trading strategy: a recommendation system . . . . . . . . . . . . . . . . . 787--797 Mozammel Chowdhury and Junbin Gao and Rafiqul Islam Extracting depth information from stereo images using a fast correlation matching algorithm . . . . . . . . . . . . . . . 798--803
Hasan Jafari and Mousa Nazari and Shahaboddin Shamshirband Optimization of energy consumption in wireless sensor networks using density-based clustering algorithm . . . 1--10 Wolali Ametepe and Changda Wang and Selasi Kwame Ocansey and Xiaowei Li and Fida Hussain Data provenance collection and security in a distributed environment: a survey 11--25 Khuram Shahzad and Zeng Jianqiu and Muhammad Azam Zia and Aliya Shaheen and Taiba Sardar Essential factors for adopting hospital information system: a case study from Pakistan . . . . . . . . . . . . . . . . 26--37 Partha Chowdhuri and Biswapati Jana and Debasis Giri Secured steganographic scheme for highly compressed color image using weighted matrix through DCT . . . . . . . . . . . 38--49 Afnan Salem Babrahem and Muhammad Mostafa Monowar Preserving confidentiality and privacy of the patient's EHR using the OrBAC and AES in cloud environment* . . . . . . . 50--61 Shahaboddin Shamshirband and Hossein Soleimani LAAPS: an efficient file-based search in unstructured peer-to-peer networks using reinforcement algorithm . . . . . . . . 62--69 Amira Hadj Fredj and Jihene Malek A fast and robust OSRAD filter for telemedicine applications . . . . . . . 70--79 C. B. David Joel Kishore and T. Bhaskara Reddy An efficient approach for land record classification and information retrieval in data warehouse . . . . . . . . . . . 80--89
K. C. Okafor and G. C. Ononiwu and Sam Goundar and V. C. Chijindu and C. C. Udeze Towards complex dynamic fog network orchestration using embedded neural switch . . . . . . . . . . . . . . . . . 91--108 Sanju Mishra and Rafid Sagban and Ali Yakoob and Niketa Gandhi Swarm intelligence in anomaly detection systems: an overview . . . . . . . . . . 109--118 N. Venkatesvara Rao and D. Venkatavara Prasad and M. Sugumaran Real-time video object detection and classification using hybrid texture feature extraction . . . . . . . . . . . 119--126 Syed Muhammad Mohsin and Imran Ali Khan and Syed Muhammad Abrar Akber and Shahaboddin Shamshirband and Anthony T. Chronopoulos Exploring the RFID mutual authentication domain . . . . . . . . . . . . . . . . . 127--141 Fan Rong and Zhang Juan and Zhao ShuoFeng Surgical navigation technology based on computer vision and VR towards IoT . . . 142--146 Duan Dagao and Gao Yang Preprocessing technology of consuming big data based on user interest with Internet of Location Mining . . . . . . 147--152 Wang Ying Positioning algorithm based on linear embedding optimization in internet of sensor network . . . . . . . . . . . . . 153--158 Siyang Liu and Cheng Zhang Personalized file data query matching method based on SOA . . . . . . . . . . 159--164 Yang Fan Key web search algorithm based on service ontology . . . . . . . . . . . . 165--170 Zhang Di Online traffic flow assignment method based on structure matching selection of multilevel road network . . . . . . . . 171--175 Mao Dianhui and Song Zihao A prediction model of micro-blog affective hotspots based on SVM collaborative filtering recommendation model . . . . . . . . . . . . . . . . . 176--180 Ze Wu Local-global iterative linear embedding optimization-based positioning algorithm in sensor network . . . . . . . . . . . 181--185 Xu Li and Lan Ling Internet of target perception event driven based on machine vision using a fast extraction algorithm . . . . . . . 186--192 Li Hongli and Ma Yaofeng Internet of moving target detection method based on nonparametric background model . . . . . . . . . . . . . . . . . 193--198
Sankhanil Dey and Ranjan Ghosh A smart review and two new techniques using 4-bit Boolean functions for cryptanalysis of 4-bit crypto S-boxes 199--217 Ankita Jiyani and Mehul Mahrishi and Yogesh Meena and Girdhari Singh NAM: a nearest acquaintance modeling approach for VM allocation using R-Tree 218--225 Mansoor Fateh and Mohsen Rezvani An email-based high capacity text steganography using repeating characters 226--232 Yassir Samadi and Mostapha Zbakh and Claude Tadonki DT-MG: many-to-one matching game for tasks scheduling towards resources optimization in cloud computing . . . . 233--245 B. S. Premananda and Nupur K. Neti and K. P. Ashwin and Shreya V. Basu An energy-efficient, coalition game theory based hierarchical routing protocol for WSNs . . . . . . . . . . . 246--256 Amin Mansouri and Babak Majidi and Abdolah Shamisa Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures . . . . . . . 257--266 Shabina Sayed and Rakesh Poonia Probability-weighted ensemble classifier using holoentropy-enabled decision tree for data stream classification . . . . . 267--281 Ju-Yuan Hsiao and Ai-Chieh Pan and Po-Yueh Chen An adaptive reversible data hiding scheme using dual stego-image . . . . . 282--291 S. Adhirai and Paramjit Singh and Rajendra Prasad Mahapatra Circular interpolation and chronological-whale optimization based privacy preservation in cloud . . . . . 292--304
Kou Xiaoming Analysis on the Internet public opinions in the era of We media based on fast dual-cycle level set . . . . . . . . . . 305--309 Fan Yang Model of network video retrieval of dynamic Bayesian network optimization for the mobile terminal . . . . . . . . 310--314 Wang Tiancheng Online student achievement prediction model based on Data Envelopment Analysis (DEA) for multidimensional educational internet of data mining . . . . . . . . 315--319 Zhang Duo and Guo Rui-Fang An adaptive Bayesian tracking algorithm for Internet of motion parameters based on explicit formulation and integral contour model . . . . . . . . . . . . . 320--325 K. Venkata Vara Prasad and P. Trinatha Rao Performance of blind detection frame work using energy detection approach for local sensing in intelligent networks 326--332 M. Mehfooza and V. Pattabiraman SP-DDPT: a simple prescriptive-based domain data preprocessing technique to support multilabel-multicriteria learning with expert information . . . . 333--339 Xiao Bayi Real-time visual transmission mechanism of graphics diversity based on mobile 3D graphics matching algorithm . . . . . . 340--345 Junjun Huang Smart plant project scheduling optimization based on hidden Markov algorithm . . . . . . . . . . . . . . . 346--351 Li Cheng-Bing and Mao Xi-hao Array sensors online pattern recognition based on FCM and ANFIS . . . . . . . . . 352--359 Lu Yuting A $3$-D geographic location routing protocol based on forward region adaptive . . . . . . . . . . . . . . . . 360--366 V. Navya and P. Deepalakshmi Threshold-based energy-efficient routing for transmission of critical physiological parameters in a wireless body area network under emergency scenarios . . . . . . . . . . . . . . . 367--376 Dong Yindi Multi-classification analysis of large data based on knowledge element in micro-blog short text . . . . . . . . . 377--382 Li Pei Community discovery method based on complex network of data fusion based on the super network perspective . . . . . 383--390 Li Chen Neighborhood optimization of intelligent wireless mobile network based on big data technology . . . . . . . . . . . . 391--400
Dhiren P. Bhagat and Himanshukumar Soni Target tracking in a wireless sensor network using a multi-step KF-PSO model 401--412 Archana Patel and Sarika Jain Present and future of semantic web technologies: a research statement . . . 413--422 J. V. Anand and P. Sivanesan Certain investigations of underwater wireless sensors synchronization and funneling effect . . . . . . . . . . . . 423--430 Selvaraj Kesavan and E. Saravana Kumar and Abhishek Kumar and K. Vengatesan An investigation on adaptive HTTP media streaming Quality-of-Experience (QoE) and agility using cloud media services 431--444 V. T. Venkateswarlu and P. V. Naganjaneyulu and D. N. Rao Delay sensitive data routing optimization using rendezvous agents in wireless sensor networks with mobile sink . . . . . . . . . . . . . . . . . . 445--452 Zhi Yuan and Weiqing Wang and Shan He Application of sustainable computing based advanced intelligent power electronic technology for smart grid systems . . . . . . . . . . . . . . . . 453--461 M. Dharani and G. Sreenivasulu Land use and land cover change detection by using principal component analysis and morphological operations in remote sensing applications . . . . . . . . . . 462--471 Rajeev Kumar Bedi and Jaswinder Singh and Sunil Kumar Gupta An efficient and secure privacy preserving multi-cloud storage framework for mobile devices . . . . . . . . . . . 472--482 Sonia Mehla and Sarika Jain Development and evaluation of knowledge treasure for emergency situation awareness . . . . . . . . . . . . . . . 483--493 G. S. S. S. S. V. Krishna Mohan and Yarravarapu Srinivasa Rao An efficient design of fractional order differentiator using hybrid Shuffled frog leaping algorithm for handling noisy electrocardiograms . . . . . . . . 494--500
Amanpreet Kaur and Jagroop Singh Sidhu and Jaskarn Singh Bhullar Adaptive deblocking technique based on separate modes for removing compression effects in JPEG coded images . . . . . . 501--513 Anil B. Gavade and Vijay S. Rajpurohit Systematic analysis of satellite image-based land cover classification techniques: literature review and challenges . . . . . . . . . . . . . . . 514--523 Divya Jain and Vijendra Singh A two-phase hybrid approach using feature selection and Adaptive SVM for chronic disease classification . . . . . 524--536 Naveen Kumar and Ashutosh Kumar Singh and Shashank Srivastava Feature selection for interest flooding attack in named data networking . . . . 537--546 Poulami Das and Sudip Kumar Naskar and Sankar Narayan Patra Fast Converging Cuckoo Search Algorithm to design symmetric FIR filters . . . . 547--565 Oscar Karnalim Source code plagiarism detection with low-level structural representation and information retrieval . . . . . . . . . 566--576 Xuming Han and Li Zheng and Limin Wang and Hong Zheng and Xin Wang Fireworks algorithm based on dynamic search and tournament selection . . . . 577--588 Rakcinpha Hatibaruah and Vijay Kumar Nath and Deepika Hazarika An effective texture descriptor for retrieval of biomedical and face images based on co-occurrence of similar center-symmetric local binary edges . . 589--600
K. Maheswari and M. Ramakrishnan Kernelized Spectral Clustering based Conditional MapReduce function with big data . . . . . . . . . . . . . . . . . . 601--611 K. C. Okafor Dynamic reliability modeling of cyber-physical edge computing network 612--622 Ravi Kumar Poluru and Lokesh Kumar R. An Improved Fruit Fly Optimization (IFFOA) based Cluster Head Selection Algorithm for Internet of Things . . . . 623--631 S. Maheswari and Justus Selwyn State behavior analysis in validating the web service framework . . . . . . . 632--642 Muddada Murali Krishna and G. Lavanya Devi Method of optimizing the dimensional features in sentiment analysis . . . . . 643--652 Susant Kumar Panigrahi and Supratim Gupta and S. Vamsee Krishna Quantitative evaluation of different thresholding methods using automatic reference image creation via PCA . . . . 653--662 SatyaJaswanth Badri A novel Map-Scan-Reduce based density peaks clustering and privacy protection approach for large datasets . . . . . . 663--673 D. Ferlin Deva Shahila and S. H. Krishnaveni and Valantina Stephen Soft computing-based non-linear discriminate classifier for multimedia image quality enhancement . . . . . . . 674--683 Chunhua Guo The application of fractional wavelet transform in image enhancement . . . . . 684--690 Somula Ramasubbareddy and R. Sasikala RTTSMCE: a response time aware task scheduling in multi-cloudlet environment 691--696 Tahar Mekhaznia and Akram Bennour New approach for attack of permutation-based image encryption schemes . . . . . . . . . . . . . . . . 697--705 Yuesheng Lou Detection of trace elements in metallurgical products under complex background based on visual saliency . . 706--714 Desheng Wu and Yuhui Guan Artificial intelligence retrieval algorithm for text data from multiple data sources . . . . . . . . . . . . . . 715--719 Lei Wang and Shanlin Yang and Aizhu Zhou and Rongjing Huang and Shuai Ding and Hao Wang and Juncheng Hu An intelligent gastric cancer screening method based on convolutional neural network and support vector machine . . . 720--725
M. M. Hafizur Rahman HMMN: a cost-effective derivative of midimew-connected mesh network . . . . . 727--732 Krishna Kumar and Md. Tanwir Uddin Haider Blended computation of machine learning with the recurrent neural network for intra-day stock market movement prediction using a multi-level classifier . . . . . . . . . . . . . . . 733--749 Dalila Iabbassen and Samira Moussaoui Cooperative and hybrid energy efficient schemE for wireless sensor networks . . 750--763 Urvashi Sharma and Meenakshi Sood and Emjee Puthooran A novel resolution independent gradient edge predictor for lossless compression of medical image sequences . . . . . . . 764--774 Bodrunnessa Badhon and Mir Md. Jahangir Kabir and Shuxiang Xu and Monika Kabir A survey on association rule mining based on evolutionary algorithms . . . . 775--785 Mohammed Elsaid Moussa and Ensaf Hussein Mohamed and Mohamed Hassan Haggag Opinion mining: a hybrid framework based on lexicon and machine learning approaches . . . . . . . . . . . . . . . 786--794 Neha Gupta and Arun Sharma and Manoj Kumar Pachariya A novel approach for mutant diversity-based fault localization: DAM-FL . . . . . . . . . . . . . . . . . 795--804 Raja Muthalagu and Subeen Jain A novel modified KASUMI block cipher for global system for mobile communications 805--811 Renae Aurisch and Mohiuddin Ahmed and Abu Barkat An outlook at Agile methodologies for the independent games developer . . . . 812--818 Conrado Ruiz Jr. Multi-feature 3D model retrieval using view-based techniques . . . . . . . . . 819--829 K. Pankaja and V. Suma A hybrid approach combining CUR matrix decomposition and weighted kernel sparse representation for plant leaf recognition . . . . . . . . . . . . . . 830--840 A. Nishad and Sajimon Abraham SemTraClus: an algorithm for clustering and prioritizing semantic regions of spatio-temporal trajectories . . . . . . 841--850
Purbanka Pahari and Piyali Basak and Anasua Sarkar Ensemble based biomarker identification on pancreatic ductal adenocarcinoma gene expressions . . . . . . . . . . . . . . 851--857 K. S. Gautam and Senthil Kumar Thangavel Video analytics-based facial emotion recognition system for smart buildings 858--867 Wei Wang An algorithm for rationality estimation of movement trend based on big data analysis . . . . . . . . . . . . . . . . 868--873 P. V. Venkateswaramma and I. Ravi Prakash Reddy Node pattern state and trust-rate base route selection for reliable data transmission in mobile ad hoc networks 874--880 Shaofu He and Xiaochang Zheng Accurate identification technique of access path information for hierarchical geographic traffic network under big data construction . . . . . . . . . . . 881--888 Min Zeng and Fenjuan Li and Huiping Feng Prediction model of key customer loss in e-commerce combined with Cemo real time streaming data framework . . . . . . . . 889--896 Guixian Tian and Jian Wang Recommendation algorithm for mobile E-commerce based on cone depth learning 897--902 Ya-Wen Li Multiple collaborative filtering recommendation algorithms for electronic commerce information . . . . . . . . . . 903--909 Chun-yu Zhang The optimization of bibliographic information resource integration of digital library . . . . . . . . . . . . 910--915 Fei-fei Wang and Hai-feng Hu Multi-path data fusion method based on routing algorithm for wireless sensor networks . . . . . . . . . . . . . . . . 916--923 Sachinkumar Veerashetty and Nagaraj B. Patil Manhattan distance-based histogram of oriented gradients for content-based medical image retrieval . . . . . . . . 924--930 Sujay Angadi and Venkata Siva Reddy Multimodal sentiment analysis using reliefF feature selection and random forest classifier . . . . . . . . . . . 931--939 Sachinkumar Veerashetty and Nagaraj B. Patil Design of rotation, illumination, and scale invariant Gabor texture descriptor for image texture analysis and retrieval 940--948 Hyunkyoung Choi and Yong-Hyeon Shin and Hyokyung Bahn Improving storage performance of high-performance computing systems by using the non-volatile buffer cache . . 949--953 Rajkumar Rajasekaran and Jolly Masih and K. Govinda An analysis of mobile pass-codes in case of criminal investigations through social network data . . . . . . . . . . 954--959 Jannatul Ferdush and Greetashree Mondol and Amrita Pritom Prapti and Mahbuba Begum and Mohammad Nowsin Amin Sheikh and Syed Md. Galib An enhanced image encryption technique combining genetic algorithm and particle swarm optimization with chaotic function 960--967 H. Haritha and Senthil Kumar Thangavel A modified deep learning architecture for vehicle detection in traffic monitoring system . . . . . . . . . . . 968--977
Gamage Kokila Kasuni Perera and Champi Thusangi Wannige A hybrid algorithm for identifying partially conserved regions in multiple sequence alignment . . . . . . . . . . . 979--986 Raza Abbas Haidri and Chittaranjan Padmanabh Katti and Prem Chandra Saxena Capacity based deadline aware dynamic load balancing (CPDALB) model in cloud computing environment . . . . . . . . . 987--1001 Sunil Kumar Patel and Chandran Saravanan and Vikash Kumar Patel Cloud-based Reversible Dynamic Secure Steganography Model for embedding pathological report in medical images 1002--1010 Monika Kabir and Mir Md. Jahangir Kabir and Shuxiang Xu and Bodrunnessa Badhon An empirical research on sentiment analysis using machine learning approaches . . . . . . . . . . . . . . . 1011--1019 Md. Alamgir Hossain and Jannatul Ferdush and Marjia Khatun A study and implementation of large-scale log-determinant computation to cloud . . . . . . . . . . . . . . . . 1020--1028 Rubina Parveen and Subhash Kulkarni Urban land use dynamics and change implication by using low-resolution LISS III imagery . . . . . . . . . . . . . . 1029--1034 B. P. Santosh Kumar and K. Venkata Ramanaiah Region of interest-based adaptive segmentation for image compression using hybrid Jaya--Lion mathematical approach 1035--1046 Vijay M. Sardar and S. D. Shirbahadurkar Timbre features for speaker identification of whispering speech: selection of optimal audio descriptors 1047--1053 Malige Gangappa and C. Kiran Mai and P. Sammulal Classification of land cover images using modified water wave Optimization-based hybrid classifier . . 1054--1064 Anamika Sharma and Siddhartha Chauhan Target coverage computation protocols in wireless sensor networks: a comprehensive review . . . . . . . . . . 1065--1087 Haval I. Hussein and Wafaa M. Abduallah An efficient ElGamal cryptosystem scheme 1088--1094 Dharminder Dharminder and Pratik Gupta Security analysis and application of Chebyshev Chaotic map in the authentication protocols . . . . . . . . 1095--1103
Al-Sakib Khan Pathan COVID-19 pandemic, information and communications technology (ICT), and the \em Digital Divide . . . . . . . . . . . 1--2 Manel Elleuchi and Manel Boujeleben and Mohamed Abid Energy-efficient routing model for water pipeline monitoring based on wireless sensor networks . . . . . . . . . . . . 3--11 Wael A. Awad and Noha E. El-Attar Adaptive SLA mechanism based on fuzzy system for dynamic cloud environment . . 12--22 Shreya Banerjee and Anirban Sarkar Domain-specific requirements analysis framework: ontology-driven approach . . 23--47 Birane Abdelkader and Hamami Latifa An efficient level set method based on global statistical information for image segmentation . . . . . . . . . . . . . . 48--56 Ashish Kumar and N. S. Raghava Chaos-based steganography technique to secure information and integrity preservation of smart grid readings using wavelet . . . . . . . . . . . . . 57--63 Rishabh Dudheria Assessing password practices of mobile apps . . . . . . . . . . . . . . . . . . 64--82 Priti Maratha and Kapil Gupta A comprehensive and systematized review of energy-efficient routing protocols in wireless sensor networks . . . . . . . . 83--100
Myung-Joong Jeon and Hyun-Kyu Park and Batselem Jagvaral and Hyung-Sik Yoon and Yun-Geun Kim and Young-Tack Park Relationship between UAVs and Ambient objects with threat situational awareness through grid map-based ontology reasoning . . . . . . . . . . . 101--116 Abdallah Almutawakel and Okba Kazar and Mouadh Bali and Houcine Belouaar and Abdelbasset Barkat Smart and fuzzy approach based on CSP for cloud resources allocation . . . . . 117--129 Padipat Sitkrongwong and Saranya Maneeroj and Atsuhiro Takasu Multi-criteria rating conversion without relation loss for recommender systems 130--138 Amin Rezaeipanah and Musa Mojarad and Ahad Fakhari Providing a new approach to increase fault tolerance in cloud computing using fuzzy logic . . . . . . . . . . . . . . 139--147 Pooja and R. K. Chauhan Triple phase hybrid cryptography technique in a wireless sensor network 148--153 Ouahiba Djama and Zizette Boufaida Instantiation of the multi-viewpoints ontology from a resource . . . . . . . . 154--165 Brahmaleen Kaur Sidhu and Kawaljeet Singh and Neeraj Sharma A machine learning approach to software model refactoring . . . . . . . . . . . 166--177 Samira Chebbout and Hayet Farida Merouani A hybrid codebook model for object categorization using two-way clustering based codebook generation method . . . . 178--186 Zhu Zhu and Xiaoguo Zhang A random-valued impulse noise removal algorithm via just noticeable difference threshold detector and weighted variation method . . . . . . . . . . . . 187--200
Wei Li and William W. Guo and Michael Li The impact factors on the competence of big data processing . . . . . . . . . . 201--218 Shubhra Dwivedi and Manu Vardhan and Sarsij Tripathi Defense against distributed DoS attack detection by using intelligent evolutionary algorithm . . . . . . . . . 219--229 Sarveshwar Bharti and Hardeep Singh Proactively managing clones inside an IDE: a systematic literature review . . 230--249 Sikha Bagui and Xingang Fang and Subhash Bagui and Jeremy Wyatt and Patrick Houghton and Joe Nguyen and John Schneider and Tyler Guthrie An improved step counting algorithm using classification and double autocorrelation . . . . . . . . . . . . 250--259 Ehsan Shirzad and Hamid Saadatfar Job failure prediction in Hadoop based on log file analysis . . . . . . . . . . 260--269 Jagsir Singh and Jaswinder Singh Assessment of supervised machine learning algorithms using dynamic API calls for malware detection . . . . . . 270--277 Subrata Chowdhury and P. Mayilvahanan and Ramya Govindaraj Optimal feature extraction and classification-oriented medical insurance prediction model: machine learning integrated with the internet of things . . . . . . . . . . . . . . . . . 278--290 D. Mustafi and A. Mustafi and G. Sahoo A novel approach to text clustering using genetic algorithm based on the nearest neighbour heuristic . . . . . . 291--303
Amina Guendouz and Djamal Bennouar AMPL: aspect multiple product lines . . 305--315 Yogita Yogita and Vipin Pal and Anju Yadav DDC protocol to protract network lifetime of wireless sensor networks . . 316--323 R. R. Darwish A congestion-aware decision-driven architecture for information-centric Internet-of-Things applications . . . . 324--337 Nan Sun and Guanjun Lin and Junyang Qiu and Paul Rimba Near real-time Twitter spam detection with machine learning techniques . . . . 338--348 Maryam Jallouli and Sonia Lajmi and Ikram Amous When contextual information meets recommender systems: extended SVD++ models . . . . . . . . . . . . . . . . . 349--356 Sigit Adinugroho and Randy C. Wihandika and Putra P. Adikara Newsgroup topic extraction using term-cluster weighting and Pillar $K$-Means clustering . . . . . . . . . . 357--364 Mohammad Ahsan and T. P. Sharma Spams classification and their diffusibility prediction on Twitter through sentiment and topic models . . . 365--375 Thiago Rateke and Aldo von Wangenheim Passive vision road obstacle detection: a literature mapping . . . . . . . . . . 376--395 Sanchay Gupta and Siddharth Chandra and N. Maheswari and M. Sivagami A model for screening eye diseases using optical coherence tomography images . . 396--400
Baoshan Sun and Mengying Ge and Peng Zhao and Chunqing Li Systematic framework for short text classification based on improved TWE and supervised MCFS topic merging strategy 401--413 Ibrahim Gad and Doreswamy Hosahalli A comparative study of prediction and classification models on NCDC weather data . . . . . . . . . . . . . . . . . . 414--425 Shinq-Jen Wu and Van-hung Pham Speeding up multi-SVMs through modified working set selection . . . . . . . . . 426--432 R. Prasath and T. Kumanan Enhanced artificial bee colony approach for the enhancement and classification of underwater images . . . . . . . . . . 433--443 Rebiha Souadih and Fouzi Semchedine Energy-efficient coverage and connectivity of wireless sensor network in the framework of hybrid sensor and vehicular network . . . . . . . . . . . 444--454 Md. Alamgir Hossain and Md. Abdullah Al Hasan Improving cloud data security through hybrid verification technique based on biometrics and encryption system . . . . 455--464 Samia Noureddine and Baarir Zineeddine and Abida Toumi and Abir Betka and A\"\icha-Nabila Benharkat A new predictive medical approach based on data mining and Symbiotic Organisms Search algorithm . . . . . . . . . . . . 465--479 A. K. Fabi and Sabu M. Thampi A psychology-inspired trust model for emergency message transmission on the Internet of Vehicles (IoV) . . . . . . . 480--490 Adesh Kumari and Vinod Kumar and M. Yahya Abbasi EAAF: ECC-based anonymous authentication framework for cloud-medical system . . . 491--500
Anandakumar Haldorai and Muhammad Sharif and Sri Devi Ravana Artificial intelligence for sustainable internet research . . . . . . . . . . . 501--502 Mohd. Sadiq and Shadab Khan and Chaudhary Wali Mohammad Selection of software requirements using TOPSIS under fuzzy environment . . . . . 503--512 Majdi Abdellatief and Abu Bakar Md Sultan and Abdul Azim Abdul Ghani and Abubaker Wahaballa Assessing the changeability of component-based system design: a controlled experiment . . . . . . . . . 513--520 Devender Kumar and Sai Kishore Pachigolla and Shubham Singh Manhas and Karan Rawat Cryptanalysis and improvement of mutual authentication protocol for real-time data access in industrial wireless sensor networks . . . . . . . . . . . . 521--534 Saeed Hosseinabadi and Manoochehr Kelarestaghi and Farshad Eshghi ISSE: a new iterative sentence scoring and extraction scheme for automatic text summarization . . . . . . . . . . . . . 535--540 Deepika Saxena and Ashutosh Kumar Singh Auto-adaptive learning-based workload forecasting in dynamic cloud environment 541--551 Raviraja Holla and Nikhil C. Mhala and Alwyn R. Pais GPGPU-based randomized visual secret sharing (GRVSS) for grayscale and colour images . . . . . . . . . . . . . . . . . 552--560 Vilas K. Patil and P. P. Nagrale Effective analysis of noise levels due to vehicular traffic in urban area using deep learning with OALO model . . . . . 561--570 Sophal Chan and Kwankamon Dittakan and Subhieh El Salhi Osteoarthritis detection by applying quadtree analysis to human joint knee X-ray imagery . . . . . . . . . . . . . 571--578 Dmitrii Dikii and Aleksey Tikhomirov Detection of DoS attacks exploiting SUBSCRIBE messages of the MQTT protocol 579--585 Souad Amghar and Safae Cherdal and Salma Mouline Storing, preprocessing and analyzing tweets: finding the suitable noSQL system . . . . . . . . . . . . . . . . . 586--595 Anonymous RETRACTED ARTICLE: Statement of retraction: traffic prediction and transmission scheduling of artificial intelligence-driven cognitive wireless networks . . . . . . . . . . . . . . . . 596--596 Anonymous RETRACTED ARTICLE: Statement of retraction: research on digital image wavelet transform filtering optimization processing method based on DSP Internet of Things . . . . . . . . . . . . . . . 597--597 Anonymous RETRACTED ARTICLE: Statement of retraction: a wireless network remote monitoring method driven by artificial intelligence . . . . . . . . . . . . . . 598--598 Anonymous RETRACTED ARTICLE: Statement of retraction: collaborative correlation space big data clustering algorithm for abnormal flow monitoring . . . . . . . . 599--599 Anonymous RETRACTED ARTICLE: Statement of retraction: track recognition algorithm based on neural network for rail transit 600--600 Anonymous RETRACTED ARTICLE: Statement of retraction: based on deep learning in traffic remote sensing image processing to recognize target vehicle . . . . . . 601--601 Anonymous RETRACTED ARTICLE: Statement of retraction: development of computer-based agricultural remote intelligent information monitoring system . . . . . . . . . . . . . . . . . 602--602 Anonymous RETRACTED ARTICLE: Statement of retraction: the role of computer security management in preventing financial technology risks . . . . . . . 603--603 Anonymous RETRACTED ARTICLE: Statement of retraction: key technologies of massive concurrent data processing in smart city based on cloud computing . . . . . . . . 604--604 Anonymous RETRACTED ARTICLE: Statement of Retraction: Key technologies of cloud computing-based IoT data mining . . . . 605--605
Kun Shang Semantic service composition model based on cloud computing . . . . . . . . . . . 597--603 Hoda Ahmed Galal Elsayed and Soumaya Chaffar and Samir Brahim Belhaouari and Hafsa Raissouli A two-level deep learning approach for emotion recognition in Arabic news headlines . . . . . . . . . . . . . . . 604--613 Abeer Hamdy and Gloria Ezzat Deep mining of open source software bug repositories . . . . . . . . . . . . . . 614--622 Dyala R. Ibrahim and Rosni Abdullah and Je Sen Teh An enhanced color visual cryptography scheme based on the binary dragonfly algorithm . . . . . . . . . . . . . . . 623--632 Falah Al-akashi SAMA: a real-time Web search architecture . . . . . . . . . . . . . . 633--640 Sandeep Kaur and Kuljit Kaur Chahal Prediction of Chikungunya disease using PSO-based adaptive neuro-fuzzy inference system model . . . . . . . . . . . . . . 641--649 Zhongxian Bai Variable incremental adaptive learning model based on knowledge graph and its application in online learning system 650--658 Geeta Singh and Neelu Khare A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques . . . . . . 659--669 Yeganeh Madadi and Vahid Seydi and Reshad Hosseini Multi-source domain adaptation-based low-rank representation and correlation alignment . . . . . . . . . . . . . . . 670--677 Huazheng Zhu and Jinglong Du and LuLu Wang and Baoru Han and Yuanyuan Jia A vision-based fall detection framework for the elderly in a room environment using motion features and DAG-SVM . . . 678--686 Arkan Mulla and H. T. Jadhav Optimal scheduling of vehicle-to-grid power exchange using particle swarm optimization technique . . . . . . . . . 687--704
Jie Zhang and Haibo Pu Fast data acquisition algorithm for remote monitoring system of smart home 705--712 Jia Yu Missing data filling algorithm in OA (office automation) cooperative office system . . . . . . . . . . . . . . . . . 713--720 Xiuzhen Dai Multilevel CLOS data stream exchange algorithm based on smoothed round-robin fair scheduling . . . . . . . . . . . . 721--728 D. Suganya and K. Thirunadana Sikamani and J. Sasikala Copy--move forgery detection of medical images using golden ball optimization 729--737 Shiliang Yan and Xiaofeng Zhang PCNet: partial convolution attention mechanism for image inpainting . . . . . 738--745 Vivek Srivastava and Ravi Shankar Pandey Load balancing for software-defined network: a review . . . . . . . . . . . 746--759 Moustafa Sadek Kahil and Abdelkrim Bouramoul and Makhlouf Derdour GreedyBigVis --- A greedy approach for preparing large datasets to multidimensional visualization . . . . . 760--769 Ally S. Nyamawe and Khadidja Bakhti and Sulis Sandiwarno Identifying rename refactoring opportunities based on feature requests 770--778 Noran AboDoma and Eman Shaaban and Ahmad Mostafa Adaptive time-bound access control for internet of things in fog computing architecture . . . . . . . . . . . . . . 779--790 Shymalagowri Selvaganapathy and Sudha Sadasivam Anti-malware engines under adversarial attacks . . . . . . . . . . . . . . . . 791--804
Al-Sakib Khan Pathan On the scale of Cyberspace and Cybersecurity . . . . . . . . . . . . . 805--806 Xiaochang Zheng Feature selection algorithm of network attack big data under the interference of fading noise . . . . . . . . . . . . 807--813 Omar Al-Debagy and Péter Martinek Dependencies-based microservices decomposition method . . . . . . . . . . 814--821 Mahdi Mallaki and Babak Majidi and Amirhossein Peyvandi and Ali Movaghar Off-chain management and state-tracking of smart programs on blockchain for secure and efficient decentralized computation . . . . . . . . . . . . . . 822--829 Manvi Breja and Sanjay Kumar Jain A survey on non-factoid question answering systems . . . . . . . . . . . 830--837 Kumar Abhishek and Vaibhav Pratihar and Shishir Kumar Shandilya and Sanju Tiwari and Vinay Kumar Ranjan and Sudhakar Tripathi An intelligent approach for mining knowledge graphs of online news . . . . 838--846 Subhadra Perumalla and Santanu Chatterjee and A. P. Siva Kumar Block chain-based access control protocol in Internet of Drones . . . . . 847--862 Radhia Bouziane and Labib Sadek Terrissa and Soheyb Ayad and Jean-François Brethé Towards an architecture for cloud robotic services . . . . . . . . . . . . 863--874 Daniel Mesafint Belete and Manjaiah D. Huchaiah Grid search in hyperparameter optimization of machine learning models for prediction of HIV/AIDS test results 875--886 Rintu Nath and A. Nagaraju Genetic algorithm based on-arrival task scheduling on distributed computing platform . . . . . . . . . . . . . . . . 887--896 Mohamed Younes Kaci and Malika Bessedik and Amina Lammari A novel variable neighborhood search for the offloading and resource allocation in Mobile-Edge Computing . . . . . . . . 897--905
Bhavya Joshi and Akhilesh Kumar Sharma and Narendra Singh Yadav and Shamik Tiwari DNN based approach to classify Covid'19 using convolutional neural network and transfer learning . . . . . . . . . . . 907--919 Albenzio Cirillo and Vito Dalena and Antonio Mauro and Francesco Mogavero and Diego Pennino and Maurizio Pizzonia and Andrea Vitaletti and Marco Zecchini Empowering citizens by a blockchain-based Robinson list . . . . . 920--928 Yani-Athmane Bennai and Samira Yessad and Louiza Bouallouche-Medjkoune A flexible and adaptive medium access control protocol for improving quality of service in vehicular ad-hoc networks 929--938 Lakhdar Kanouni and Fouzi Semchedine A new paradigm for multi-path routing protocol for data delivery in wireless sensor networks . . . . . . . . . . . . 939--952 S. Sangeetha and G. Sudha Sadasivam and Ayush Srikanth Differentially private model release for healthcare applications . . . . . . . . 953--958 Md Mobin Akhtar and Danish Ahamad and Abdallah Saleh Ali Shatat and Alameen Eltoum M. Abdalrahman Enhanced heuristic algorithm-based energy-aware resource optimization for cooperative IoT . . . . . . . . . . . . 959--970 Karim Benhocine and Adel Hansali and Leila Zemmouchi-Ghomari and Abdessamed Reda Ghomari Towards an automatic SPARQL query generation from ontology competency questions . . . . . . . . . . . . . . . 971--980 Nivea Kesav and M. G. Jibukumar Multi-Channel CNN based image classification using SKIP connection and MSVM . . . . . . . . . . . . . . . . . . 981--990 M. Dhilsath Fathima and S. Justin Samuel and R. Natchadalingam and V. Vijeya Kaveri Majority voting ensembled feature selection and customized deep neural network for the enhanced clinical decision support system . . . . . . . . 991--1001 Anonymous Statement of Retraction: Real-time image recognition algorithm and system design of Android mobile devices . . . . . . . 1002--1002 Anonymous Statement of Retraction: An Intelligent model to reduce the energy consumption of sensor network nodes . . . . . . . . 1003--1003
Ranjit Biswas and Sudipta Roy and Abhijit Biswas MRI and CT image indexing and retrieval using steerable pyramid transform and local neighborhood difference pattern 1005--1014 V. Lakshmi Chetana and Hari Seetha CF-AMVRGO: Collaborative Filtering based Adaptive Moment Variance Reduction Gradient Optimizer for Movie Recommendations . . . . . . . . . . . . 1015--1023 Rukhsar Sultana and Jyoti Grover and Jitesh Meghwal and Meenakshi Tripathi Exploiting machine learning and deep learning models for misbehavior detection in VANET . . . . . . . . . . . 1024--1038 Nilam Pradhan and Bharat S. Chaudhari Traffic-aware autonomous scheduling for 6TiSCH networks . . . . . . . . . . . . 1039--1046 D. Prabhu and S. Vijay Bhanu and S. Suthir Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment . . . . . . . . . . . 1047--1055 Naveen Kumar and Hare Krishna and Shashi Shubham and Prabhu Padarbind Rout Automated categorization of student's query . . . . . . . . . . . . . . . . . 1056--1064 Ilhem Souissi and Nadia Ben Azzouna and Rihab Abidi and Tahar Berradia and Lamjed Ben Said SP-TRUST: a trust management model for speed trust in vehicular networks . . . 1065--1073 Minh Duc Nguyen and Cuong H. Nguyen-Dinh and Le Anh Phuong BOCA: A novel semantic blockchain-based authentication system of educational certificates . . . . . . . . . . . . . . 1074--1082 Yandong Han and Lijuan Feng and Jian Gao A new end-to-end framework based on non-local network structure and spatial attention mechanism for image rain removal . . . . . . . . . . . . . . . . 1083--1091 Navjeet Kaur and Ashok Kumar and Rajesh Kumar PROMO: PROactive MObility-support model for task scheduling in fog computing . . 1092--1101
A. Nageswara Rao and P. Vijayapriya A robust neural network model for monitoring online voltage stability . . 1103--1112 M. Suriya and V. Chandran and M. G. Sumithra Enhanced deep convolutional neural network for malarial parasite classification . . . . . . . . . . . . . 1113--1122 P. R. Joe Dhanith and B. Surendiran An ontology learning based approach for focused web crawling using combined normalized pointwise mutual information and Resnik algorithm . . . . . . . . . . 1123--1129 Shashidhar Virupaksha and D. Venkatesulu Subspace-based aggregation for enhancing utility, information measures, and cluster identification in privacy preserved data mining on high-dimensional continuous data . . . . 1130--1139 Ambika and Rajkumar L. Biradar and Vishwanath Burkpalli Encryption-based steganography of images by multiobjective whale optimal pixel selection . . . . . . . . . . . . . . . 1140--1149 K. Krishna Jyothi and Shilpa Chaudhari A secure cluster-based authentication and key management protocol for machine-type communication in the LTE network . . . . . . . . . . . . . . . . 1150--1160 S. Shanthi and N. Rajkumar Non-small-cell lung cancer prediction using radiomic features and machine learning methods . . . . . . . . . . . . 1161--1169 A. Christy Jeba Malar and M. Deva Priya and J. Sengathir and N. Kiruthiga and R. Anitha and T. Sangeetha An intelligent multi-floor indoor positioning system for cloud-based environment . . . . . . . . . . . . . . 1170--1177 M. R. Pavan Kumar and Prabhu Jayagopal A preprocessing method combined with an ensemble framework for the multiclass imbalanced data classification . . . . . 1178--1185 M. Kalpana Devi and K. Umamaheswari Intelligent process of spectrum handoff for dynamic spectrum access in cognitive radio network using swarm intelligence 1186--1192 Kalli Srinivasa Nageswara Prasad and Annaluri Sreenivasa Rao and Attili Venkata Ramana Ensemble framework for concept-drift detection in multidimensional streaming data . . . . . . . . . . . . . . . . . . 1193--1200
Mohammed Debakla and Mohammed Salem and Rochdi Bachir Bouiadjra and Mohammed Rebbah CMA-ES based fuzzy clustering approach for MRI images segmentation . . . . . . 1--7 Vilas H. Gaidhane and Nand Kumar and Ravi Kant Mittal and J. Rajevenceltha An efficient approach for cement strength prediction . . . . . . . . . . 8--18 Jagtap D. Chaya and Rani N. Usha Predictive analysis by ensemble classifier with machine learning models 19--26 K. Gaffour and M. K. Benhaoua and A. H. Benyamina and H. E. Zahaf A new congestion-aware routing algorithm in network-on-chip: 2D and 3D comparison 27--35 Alok Kumar Shukla and Sanjeev Kumar Pippal and Sansar Singh Chauhan An empirical evaluation of teaching--learning-based optimization, genetic algorithm and particle swarm optimization . . . . . . . . . . . . . . 36--50 Sunita Jalal and Dharmendra Kumar Yadav and Chetan Singh Negi Web service discovery with incorporation of web services clustering . . . . . . . 51--62 S. Vaithyasubramanian and D. Lalitha and C. K. Kirubhashankar Enhancing website security against bots, spam and web attacks using $l$ CAPTCHA 63--69 Ge Yang Network node grouping algorithm and evaluation model based on clustering and Bayesian classifier . . . . . . . . . . 70--76 Dahai Yu and Juan Zhu Retracted Article: Research on digital image wavelet transform filtering optimization processing method based on DSP Internet of Things . . . . . . . . . 77--87 Yong Liu and Jiabao Jiang and Yun Liu and Yong Zhang and Qilin Wu Network resource optimization configuration in edge computing environment . . . . . . . . . . . . . . 88--95 Bin Geng Retracted Article: Traffic prediction and transmission scheduling of artificial intelligence-driven cognitive wireless networks . . . . . . . . . . . 96--104 Jiewen Zhao and Jiaojie Yuan Retracted Article: An Intelligent model to reduce the energy consumption of sensor network nodes . . . . . . . . . . 105--113
Lei Zhao and Huang Yu Retracted Article: A wireless network remote monitoring method driven by artificial intelligence . . . . . . . . 115--123 Amit Singh and Aitha Nagaraju Heuristic-based opportunistic network coding at potential relays in multi-hop wireless networks . . . . . . . . . . . 124--135 Ting Fu and Hong Chen and Fei Wu and YunDong Su and Li Zhuang Retracted Article: Collaborative correlation space big data clustering algorithm for abnormal flow monitoring 136--143 Pengcheng Li and HuiQin Cheng Retracted Article: Track recognition algorithm based on neural network for rail transit . . . . . . . . . . . . . . 144--150 Hongxiang Zhang and Shaojie Shi and Yongkai Wu and Tong Feng Retracted Article: Development of computer-based agricultural remote intelligent information monitoring system . . . . . . . . . . . . . . . . . 151--160 Juan Li Retracted Article: Real-time image recognition algorithm and system design of Android mobile devices . . . . . . . 161--169 Jingfu Li IOT security analysis of BDT-SVM multi-classification algorithm . . . . . 170--179 Dan Wang and Kai Zhao and Yi Wang Retracted Article: Based on deep learning in traffic remote sensing image processing to recognize target vehicle 180--186 Caixia Chen and Sheng Zhou and Qingqing Chang Retracted Article: The role of computer security management in preventing financial technology risks . . . . . . . 187--195 Rongqing Zhuo and Zhongxian Bai Retracted Article: Key technologies of cloud computing-based IoT data mining 196--203 Yongqiang He and Xuyang Zhang Retracted Article: Key technologies of massive concurrent data processing in smart city based on cloud computing . . 204--211 Ajay Kumar Dubey and Vimal Mishra Crowd review and attribute-based credit computation for an access control mechanism in cloud data centers . . . . 212--219
Aafaq Mohi ud din and Shaima Qureshi A review of challenges and solutions in the design and implementation of deep graph neural networks . . . . . . . . . 221--230 Touseef Iqbal and Shaima Qureshi Reconstruction probability-based anomaly detection using variational auto-encoders . . . . . . . . . . . . . 231--237 Ritu Garg and R. K. Singh SBCDetector: a hybrid approach to detect second-order similarity or change . . . 238--247 Aarthi Paramasivam and S. Jaya Nirmala Exploring question generation in medical intelligent system using entailment . . 248--253 Amina Kchaou and Sonda Ammar Bouhamed Two image quality assessment methods based on evidential modeling and uncertainty: application to automatic iris identification systems . . . . . . 254--268 Febina Ikbal and Rajamma Gopikakumari Block SMRT and knapsack optimization-based sequency selector for robust, imperceptible, and payload-efficient color image watermarking for binary watermark . . . 269--283
Al-Sakib Khan Pathan Why do some IT freelancers in certain countries prefer digital payment with cryptocurrency despite it being illegal? 285--287 Lucy Sumi and Shouvik Dey YOLOv5-based weapon detection systems with data augmentation . . . . . . . . . 288--296 Tertsegha J. Anande and Sami Al-Saadi and Mark S. Leeson Generative adversarial networks for network traffic feature generation . . . 297--305 Ali Akram Abdul-Kareem and Waleed Ameen Mahmoud Al-Jawher Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain . . . . . . . . . . 306--322 Rafik Djemili and Merouane Zamouche An efficient deep learning-based approach for human activity recognition using smartphone inertial sensors . . . 323--336 Mani Deep Karumanchi and J. I. Sheeba and S. Pradeep Devaneyan An efficient integrity based multi-user blockchain framework for heterogeneous supply chain management applications . . 337--351
B. N. Madhukar and S. H. Bharathi and Ashwin M. Polnaya Multi-scale convolution based breast cancer image segmentation with attention mechanism in conjunction with war search optimization . . . . . . . . . . . . . . 353--366 Nadia Ahmed and Sadik Kamel Gharghan and Ammar Hussein Mutlag IoT-based child tracking using RFID and GPS . . . . . . . . . . . . . . . . . . 367--378 J. Liu and H. J. Shao and X. Deng and Y. T. Jiang Exploiting similarity-induced redundancies in correlation topology for channel pruning in deep convolutional neural networks . . . . . . . . . . . . 379--390 Mohamed Raouf Kanfoud and Abdelkrim Bouramoul Tackling the multilingual and heterogeneous documents with the pre-trained language identifiers . . . . 391--402 Youcef Benkhedda and Faical Azouaou Optimizing user profile matching: a text-based approach . . . . . . . . . . 403--412 Smail Ait El Asri and Ismail Negabi and Samir El Adib and Naoufal Raissouni Enhancing building extraction from remote sensing images through UNet and transfer learning . . . . . . . . . . . 413--419
Jing Cai and Jiawei Jiang and Yibing Wang and Jianwei Zheng and Honghui Xu Image inpainting via Smooth Tucker decomposition and Low-rank Hankel constraint . . . . . . . . . . . . . . . 421--432 Bidyapati Thiyam and Shouvik Dey Statistical methods for feature selection: unlocking the key to improved accuracy . . . . . . . . . . . . . . . . 433--443 Abderezak Touzene and Manar Al Moqbali User satisfaction-based genetic algorithm for load shifting in smart grid . . . . . . . . . . . . . . . . . . 444--451 Fang Duan Multi-scale residual aggregation feature network based on multi-time division for motion behavior recognition . . . . . . 452--459 Tanu Gupta and Ela Kumar Fusion of Bi-GRU and temporal CNN for biomedical question classification . . . 460--470 Manabendra Nath and Pinaki Mitra and Deepak Kumar A novel residual learning-based deep learning model integrated with attention mechanism and SVM for identifying tea plant diseases . . . . . . . . . . . . . 471--484
Fjolla Berisha and Eliot Bytyçi Addressing cold start in recommender systems with neural networks: a literature survey . . . . . . . . . . . 485--496 Chigurupati Ravi Swaroop and K. Raja CGSA optimized LSTM auto encoder for outlier detection . . . . . . . . . . . 497--507 Vianney Kengne Tchendji and Joëlle Kabdjou and Yannick Florian Yankam Traffic predictive-based flow splitting rerouting scheme for link failures in software-defined networks . . . . . . . 508--515 Shinzeer C. K. Avinash Bhagat and Ajay Shriram Kushwaha Secure medical data storage in DPOS-hyper ledger fabric block chain using PM-ECC and L2-DWT . . . . . . . . 516--522 Shobha Chawla and Neha Gupta A cloud based enhanced CPABE framework for efficient user and attribute-level revocation . . . . . . . . . . . . . . . 523--533 Farid Feyzi and Arman Daneshdoost Studying the effectiveness of deep active learning in software defect prediction . . . . . . . . . . . . . . . 534--552
Samar Bouazizi and Emna Benmohamed and Hela Ltifi PSO-K2PC: Bayesian structure learning using optimized K2 algorithm for parents-children detection . . . . . . . 553--563 Justice Odoom and Xiaofang Huang and Zuhong Zhou and Samuel Danso and Benedicta Nana Esi Nyarko and Jinan Zheng and Yanjie Xiang Blockchain-assisted sharing of electronic health records: a feasible privacy-centric constant-size ring signature framework . . . . . . . . . . 564--578 Sylvia W. Azumah and Nelly Elsayed and Zag ElSayed and Murat Ozer Cyberbullying in text content detection: an analytical review . . . . . . . . . . 579--586 Subhajit Das and Sourav Mandal and Rohini Basak Spam email detection using a novel multilayer classification-based decision technique . . . . . . . . . . . . . . . 587--599 Vishruth B. Gowda and M. T. Gopalakrishna and J. Megha and Shilpa Mohankumar Background initialization in video data using singular value decomposition and robust principal component analysis . . 600--609
Koppula Geeta and V. Kamakshi Prasad Multi-objective cloud load-balancing with hybrid optimization . . . . . . . . 611--625 Taha Etem and Turgay Kaya Fast image encryption algorithm with random structures . . . . . . . . . . . 626--637 Amal Shaheen and Mustafa Hammad and Wael Elmedany and Riadh Ksantini and Saeed Sharif Machine failure prediction using joint reserve intelligence with feature selection technique . . . . . . . . . . 638--646 N. J. Subashini and K. Venkatesh Multimodal deep learning for chronic kidney disease prediction: leveraging feature selection algorithms and ensemble models . . . . . . . . . . . . 647--659 Xinyu Zhang and Hang Dong and Liang Gong and Xin Cheng and Zhenghui Ge and Liangchao Guo Multiple paddy disease recognition methods based on deformable transformer attention mechanism in complex scenarios 660--672
Sridevi Malipatil and T. Hanumantha Reddy Discovery of interesting frequent item sets in an uncertain database using ant colony optimization . . . . . . . . . . 673--679 Megha Gupta and Laxmi Ahuja and Ashish Seth Security enhancement in a cloud environment using a hybrid chaotic algorithm with multifactor verification for user authentication . . . . . . . . 680--696 D. Rambabu and A. Govardhan Task scheduling and data replication in cloud with improved correlation strategy 697--708 Santosh Kumar Majhi and Abhipsa Panda and Suresh Kumar Srichandan and Usha Desai and Biswaranjan Acharya Malware image classification: comparative analysis of a fine-tuned CNN and pre-trained models . . . . . . . . . 709--721 Amina Bouhadja and Abdelkrim Bouramoul Beyond cocaine and heroin use: a stacking ensemble-based framework for predicting the likelihood of subsequent substance use disorder using demographics and personality traits . . 722--733
Chigurupati Ravi Swaroop and K. Raja AT-densenet with salp swarm optimization for outlier prediction . . . . . . . . . 735--747 Neelam Rawat and Vikas Somani and Arun Kr. Tripathi Prioritizing software regression testing using reinforcement learning and hidden Markov model . . . . . . . . . . . . . . 748--754 Wathiq Laftah Al-Yaseen and Ali Kadhum Idrees MuDeLA: multi-level deep learning approach for intrusion detection systems 755--763 Muhammad Sam'an and Muhammad Munsarif and Safuan and Yahya Nur Ifriza Feature selection in P2P lending based on hybrid genetic algorithm with machine learning . . . . . . . . . . . . . . . . 764--775 Vishal Kumar and Sumit Kushwaha Hybrid metaheuristic model based performance-aware optimization for map reduce scheduling . . . . . . . . . . . 776--788
Laila Bouhouch and Mostapha Zbakh and Claude Tadonki DFMCloudsim: an extension of Cloudsim for modeling and simulation of data fragments migration over distributed data centers . . . . . . . . . . . . . . 1--20 S. Regilan and L. K. Hema Optimizing environmental monitoring in IoT: integrating DBSCAN with genetic algorithms for enhanced clustering . . . 21--31 Sembati Yassine and Naja Najib and Jamali Abdellah Routing approaches in named data network: a survey and emerging research challenges . . . . . . . . . . . . . . . 32--45 Amrithkala M. Shetty and Mohammed Fadhel Aljunid and D. H. Manjaiah Unleashing the power of 2D CNN with attention and pre-trained embeddings for enhanced online review analysis . . . . 46--57 Yuanhan Du and Ling Wang and Yebo Tao Server node video processing based on feature depth analysis algorithm . . . . 58--65
Ahmed Aljabri and Farah Jemili and Ouajdi Korbaa Convolutional neural network for intrusion detection using blockchain technology . . . . . . . . . . . . . . . 67--77 K. Sakkaravarthy Iyyappan and S. R. Balasundaram A novel multi document summarization with document-elements augmentation for learning materials using concept based ILP and clustering methods . . . . . . . 78--89 Shakti Kinger and Vrushali Kulkarni Demystifying the black box: an overview of explainability methods in machine learning . . . . . . . . . . . . . . . . 90--100 S. Renu Deepti and P. C. Karthik Survey on age-related macular degeneration detection in OCT image . . 101--112 Fatemeh Arvaneh and Faraneh Zarafshan and Abbas Karimi Using fog computing (FC) and optimization techniques for tasks migration and resource allocation in the internet of things (IoT) . . . . . . . . 113--121 Yang Cao and Junhai Zhai and Wei Zhang and Xuesong Zhou and Feng Zhang MTTF: a multimodal transformer for temperature forecasting . . . . . . . . 122--135
Akhil Nair and Varad Patil and Rohan Nair and Adithi Shetty and Mimi Cherian A review on recent driver safety systems and its emerging solutions . . . . . . . 137--151 Hartik Suhagiya and Hrithik Mistry and Aryan Trivedi and Ramchandra Mangrulkar and Pallavi Chavan TokenLink: a secure loyalty point exchange system powered by smart contracts . . . . . . . . . . . . . . . 152--166 Neethu Subash and B. Nithya Dynamic adaptation of contention window boundaries using deep Q networks in UAV swarms . . . . . . . . . . . . . . . . . 167--174 Mohammad Mehdi Pourhashem Kallehbasti and Jamshid Pirgazi and Ali Ghanbari Sorkhi and Ali Kermani An efficient weighted partial MaxSAT encoding for scheduling in overloaded real-time systems . . . . . . . . . . . 175--183 Ch. Jnana Ramakrishna and D. Bharath Kalyan Reddy and P. P. Amritha and K. V. Lakshmy and Vasily Sachnev A secure authenticated image encryption scheme based on elliptic curve cryptography . . . . . . . . . . . . . . 184--193
Yang Xu and Yongjie Ma Evolutionary neural architecture search based on group whitening residual ConvNet and large kernel subspace attention module . . . . . . . . . . . . 195--207 Peraphon Sophatsathit A biological-like synthesis framework for software engineering environments 208--217 Abhishek Goyal and Rakesh Garg and Komal Kumar Bhatia An improved task scheduling algorithm for conflict resolution in cloud environment . . . . . . . . . . . . . . 218--226 Mirsaeid Hosseini Shirvani and Amir Akbarifar and Amir Salar Nazokkar Reliability non-functional requirement evaluation in mission-critical systems with an architectural strategy for future systems . . . . . . . . . . . . . 227--251 Eirene Barua and Mala Dutta Privacy-preserving association rule mining: a survey of techniques for sensitive rule identification and enhanced data protection . . . . . . . . 252--265 Bankapalli Swathi and M. Sunil Prakash and B. T. Krishna and M. Satyanarayana A novel hybrid heuristic-based network parameter optimization for spectral and energy efficiency in dynamic spectrum access on wireless mesh network system 266--279
Nail Adeeb Ali Abdu and Khaled Omer Basulaim Machine learning in concept drift detection using statistical measures . . 281--291 Lan Chen and Rui Xiong and Yifan Ji Application of SVM model based on collaborative filtering hybrid algorithm in e-commerce recommendation . . . . . . 292--300 Rajeev Ranjan and Prabhat Kumar Towards optimal path planning for sustainable data collection in real-time wireless sensor networks . . . . . . . . 301--309 Mangalagowri Gorbal and Ramesh D. Shelke and Manuj Joshi An image watermarking scheme: combining the transform domain and deep learning modality with an improved scrambling process . . . . . . . . . . . . . . . . 310--323 Ali Akram Abdul-Kareem and Waleed Ameen Mahmoud Al-Jawher An image encryption algorithm using hybrid sea lion optimization and chaos theory in the Hartley domain . . . . . . 324--337 Chun Huang and Shudan Liu Securing the future of industrial operations: a blockchain-enhanced trust mechanism for digital twins in the industrial Internet of Things . . . . . 338--347 Pinki Rani and Sukhdip Singh and Karanbir Singh Cloud computing security: a taxonomy, threat detection and mitigation techniques . . . . . . . . . . . . . . . 348--361
Gurudatta Verma and Tirath Prasad Sahu TOPSIS-ACO based feature selection for multi-label classification . . . . . . . 363--380 Xiaohan Yu and Haixia Wang and Keming Dong and Chao Chen A novel LDVP-based anomaly detection method for data streams . . . . . . . . 381--389 Shahzad Ali Performance of geographically restricted flooding for emergency alert applications . . . . . . . . . . . . . . 390--396 Rohit Vashisht and Abhinav Juneja and Gagan Thakral and Sonam Gupta An empirical study of just-in-time-defect prediction using various machine learning techniques . . 397--406 Raghavendra Varma Cherukuri and Golagani Lavanya Devi and Neelapu Ramesh Federated learning with blockchain-based model aggregation and incentives . . . . 407--417 Xuan Zhang and Mengqi Fan and Mo Hou Mobilenet V3-transformer, a lightweight model for image caption . . . . . . . . 418--426 Himani Trivedi and Mahesh Goyani Adapting face recognition to the masked world: leveraging deep attention networks with a custom dataset . . . . . 427--441
Al-Sakib Khan Pathan Editor-in-chief's foreword . . . . . . . 443--444 Linjuan Li and Haoxue Zhang and Gang Xie and Yanhong Bai Adjustable patch and feature prior token-based transformer for weakly supervised semantic segmentation . . . . 445--454 HanFan Liu and Pei Tian and HaiFang Yao and Cong Shen and FengYang Hu Research on fastDTW and isolation forest-based lightweight gesture authentication . . . . . . . . . . . . . 455--466 Alina Dash and Kshiramani Naik and Priyanka Priyadarshini Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system . . . . . . . . . . . . . . . . . 467--480 Abdelali Elkouay and Najem Moussa and Abdallah Madani Graph-based phishing detection: URLGBM model driven by machine learning . . . . 481--495 Bhushan Inje and Kapil Kumar Nagwanshi and Radhakrishna Rambola Document retrieval using clustering-based Aquila hash-Q optimization with query expansion based on pseudo relevance feedback . . . . . . 496--507 Mahbubun Nahar and A. H. M. Kamal DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks . . . . . . . . . . . . . . . . 508--525 S. Regilan and L. K. Hema and J. Jenitha ReLeC-based clustering and multi-objective optimization for efficient energy optimization in IoT networks . . . . . . . . . . . . . . . . 526--538 Md Rabiul Hasan and A. B. M. Aowlad Hossain and Shah Muhammad Azmat Ullah Ensemble ResDenseNet: Alzheimer's disease staging from brain MRI using deep weighted ensemble transfer learning 539--554
Nafis Sajid and Md. Rashidul Hasan and Muhammad Ibrahim Feature engineering in learning-to-rank for community question answering task 555--566 Sneha Chinivar and M. S. Roopa and J. S. Arunalatha and K. R. Venugopal Online aggression detection using ensemble techniques on fine-tuned transformer-based language models . . . 567--579 Priyanka Priyadarshini and Kshiramani Naik Robust image tamper detection and recovery with self-embedding watermarking using SPIHT and LDPC . . . 580--603 Pillai Praveen Thulasidharan and Keshab Nath A novel binary quantizer for variational autoencoder-based image compressor . . . 604--620 Bhawna Mallick Enhancing cyber security: a comprehensive approach to the classification and prediction of significant cyber incidents (SCI) through data mining and variational neural network with fox optimization algorithm . . . . . . . . . . . . . . . 621--627 Oussama Senouci Enhancing routing and quality of service using AI-driven technique for Internet of Vehicles contexts . . . . . . . . . . 628--640 Wided Oueslati and Siwar Mejri and Jalel Akaichi A comprehensive study on social networks analysis and mining to detect opinion leaders . . . . . . . . . . . . . . . . 641--650 Supriya Manna and Krishna Siva Prasad Mudigonda Revitalizing the single batch environment: a `Quest' to achieve fairness and efficiency . . . . . . . . 651--665 Aron Benedek Szabo and Jozsef Katona A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML . . . . . . . . . . . . . 666--685
Imran Qadir and V. Devendran and Fasel Qadir Performance comparison of decision-based median filtering for brain MR images with high multiplicative noise . . . . . 687--701 Ayat M. Al-Rjoob and Ahmad A. Ababnah and Mamoun F. Al-Mistarihi and Khalid A. Darabkh Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users . . . . . . . . . . . . 702--714 Rasmita Kumari Mohanty and Satya Prakash Sahoo and Manas Ranjan Kabat Thermal-energy-efficient-secured-link reliable and delay-aware routing protocol (TESLDAR) for wireless body area networks . . . . . . . . . . . . . 715--727 Tunirani Nayak and Nilamani Bhoi Self-sparse fuzzy clustering with automatic region merging approach for image segmentation . . . . . . . . . . . 728--742 Yuvika Gautam and Piyush Gupta and Deepika Kumar and Bhavya Kalra and Abhinav Kumar and Jude D. Hemanth FusionEXNet: an interpretable fused deep learning model for skin cancer detection 743--753 Hela Malouche Weight assignment in cloud service selection based on FAHP and rough sets 754--768 Gaurav Tyagi and Rahul Kumar Understanding the security failures of four user authentication schemes for wireless sensor networks in IoT environment . . . . . . . . . . . . . . 769--784 Hanyu Zhang and Hao Xu Manifold learning localization based on local tangent space alignment for wireless sensor networks . . . . . . . . 785--794 Oualid Mecili and Hadj Barkat and Farid Nouioua and Abdelouahab Attia and Samir Akhrouf An efficient explainable deep neural network classifier for diabetic retinopathy detection . . . . . . . . . 795--810
Urmila Bhanja and Ankit Majhi and Smrutirekha Sahu and Debapriya Parida Detection of Sybil & DDoS attacks in VANET using intelligent technique . . . 811--829 M. Raviraja Holla and D. Suma Adaptive random-grid and progressive color secret sharing with CNN super-resolution on a many-core system 830--839 Samuel Luna Martins and Felipe Mendes da Cruz and Rogério Pontes de Araújo and Carlo Marcelo Revoredo da Silva Systematic literature review on security misconfigurations in web applications 840--852 Beatriz M. Reichert and Rafael R. Obelheiro Software supply chain security: a systematic literature review . . . . . . 853--867 Oussama Harkati and Lemnouar Noui and Assia Beloucif A lossless probabilistic image encryption algorithm based on QSD decomposition and matrix transformations 868--879 Vaibhav Bhogade and B. Nithya Time series forecasting using transformer neural network . . . . . . . 880--888 Roisan Wahlang and K. Chandrasekaran Dimensionality reduction using neural networks for lattice-based cryptographic keys . . . . . . . . . . . . . . . . . . 889--910 Sandeep Singh Rana and Gaurav Verma and O. P. Sahu Energy-efficient resource allocation for NOMA-MEC system under imperfect successive interference cancellation . . 911--920 S. A. Norton Stanley and Shoney Sebastian Elastic circuit de-constructor: a pattern to enhance resiliency in microservices . . . . . . . . . . . . . 921--932
Nadia Bali and Zied Jaoua and Olfa Bzeouich and Imed Abbassi Intrusion detection systems for the internet of things: a probabilistic anomaly detection approach . . . . . . . 933--944 Mathew Nicho and Brian Cusack and Shini Girija and Nalin Arachchilage Evaluating the cost of classifier discrimination choices for IoT sensor attack detection . . . . . . . . . . . . 945--956 Krishna Siva Prasad Mudigonda and Nikitha Lingineni and Y. Manisai and Manoj Pennada and Mallesh Gadde and Revanth Sai Aluri Extractive text summarization on medical insights using fine-tuned transformers 957--973 Shamama Anwar and Anshuman Srivastava A threefold chaotic image encryption technique for efficacious image data protection . . . . . . . . . . . . . . . 974--982 Shakti Kinger and Vrushali Kulkarni A review of explainable AI in medical imaging: implications and applications 983--997 Mohsen Alambardar Meybodi and Mahdi Safari and Ensieh Davoodijam Domination based graph neural networks 998--1005 Maithri Bairy and Balachandra Muniyal and Nisha P. Shetty Enhancing healthcare data integrity: fraud detection using unsupervised learning techniques . . . . . . . . . . 1006--1019 Bibek Ranjan Ghosh and Jyotsna Kumar Mandal and Swarnadeep Das and Ayantanu Laha and Rajarshi Saha and Siddhartha Banerjee Blind image authentication using singular value decomposition with enhanced robustness by augmenting Hamming code . . . . . . . . . . . . . . 1020--1044 Wafia Abada and Abdelkrim Bouramoul and Moustafa Sadek Kahil How machine learning algorithms can examine patterns in multiple substance addictions: predicting the effects and interactions of psychoactive substances 1045--1055
Liwei Zheng and Yan Wang and Zhanqi Cui Modeling contextual goals and detecting context conflicts from BDD-based user stories . . . . . . . . . . . . . . . . 1057--1068 Haya A. Alubaidan and Sumayh S. Aljameel A prediction model for improving virtual machine live migration performance in cloud computing using artificial intelligence techniques . . . . . . . . 1069--1087 K. A. Bhat and S. A. Sofi From shallows to depths: unveiling hybrid synthetic data modeling for enhanced learning with privacy considerations in naturally imbalanced datasets . . . . . . . . . . . . . . . . 1088--1103 Noureddine El-haryqy and Zhour Madini and Younes Zouine A review of deep learning techniques for enhancing spectrum sensing and prediction in cognitive radio systems: approaches, datasets, and challenges . . 1104--1128 Abdul Ghofar Alhasyim and Nabila Husna Shabrina A novel hybrid CNN-GRU model for website-based user interface code generator . . . . . . . . . . . . . . . 1129--1142 Poonam Mangwani and Vrinda Tokekar An efficient test case selection framework for multitenant SaaS applications using RTS4MTS . . . . . . . 1143--1151 Nirmal Varghese Babu and E. Grace Mary Kanaga Advanced functional connectivity analysis with integrated EEG signal enhancement and GTW-EEG-GAN for emotion detection . . . . . . . . . . . . . . . 1152--1165 Krishna Siva Prasad Mudigonda and Karthik Bulusu and Yashmitha Sri and Adithi Damera and Vignesh Kode Capturing multiple emotions from conversational data using fine tuned transformers . . . . . . . . . . . . . . 1166--1178 Ambika Annavarapu and Surekha Borra Figure-ground segmentation based medical image denoising using deep convolutional neural networks . . . . . . . . . . . . 1179--1205 Adla Sanober and Shamama Anwar A secure and privacy preserving model for healthcare applications based on blockchain-layered architecture . . . . 1206--1218 Manoj Kumar Sain and Rabul Laskar and Joyeeta Singha and Sandeep Saini Patient activity recognition for robust performance under varied illumination and cluttered background in indoor environment . . . . . . . . . . . . . . 1219--1245
Majid Sepahvand and Maytham N. Meqdad and Fardin Abdali-Mohammadi State-of-the-art in human activity recognition based on inertial measurement unit sensors: survey and applications . . . . . . . . . . . . . . 1--16 Jianfeng Jiang and Shen Xu and Ying Gao A uniformed adaptive early termination model through probabilistic feature to speed up quantization-based search . . . 17--28 Sajad Balali Dehkordi and Saeed Nasri and Sina Dami Unveiling anomalies: transformative insights from transformer-based autoencoder models . . . . . . . . . . . 29--44 Mohammad Izadi and Mehran Safayani and Abdolreza Mirzaei Knowledge distillation on spatial-temporal graph convolutional network for traffic prediction . . . . . 45--56 Zeina Swilam and Abeer Hamdy and Andreas Pester Improving code semantics learning using enhanced Abstract Syntax Tree . . . . . 57--69 Hassan I. Abdalla and Aneela Altaf and Ali A. Hamzah A threefold-ensemble $k$-nearest neighbor algorithm . . . . . . . . . . . 70--83 Ellie Small and Javier Cabrera Principal phrase mining: an automated method for extracting meaningful phrases from text . . . . . . . . . . . . . . . 84--92 Sumit Sharma and Sarika Jain and Mukesh Kumar Tiwari and Sohan lal Classifying the state of knowledge-based question answering: patterns, progress, and prospects . . . . . . . . . . . . . 93--105 Reno C. Alencar and Bruno J. T. Fernandes and Paulo H. E. S. Lima and Carlo M. R. da Silva AI techniques for automated penetration testing in MQTT networks: a literature investigation . . . . . . . . . . . . . 106--121
Tarun Jain and Dinesh Gopalani and Yogesh Kumar Meena Informative task classification with concatenated embeddings using deep learning on crisisMMD . . . . . . . . . 123--140 Amit Paul and Narayan Changder and Animesh Dutta DSF-GAM: a location inference model in social network Twitter . . . . . . . . . 141--161 Rohit Lohar and Meenakshi Tripathi and Hossein Shirazi Free-Phish: detecting phishing websites hosted on free Web hosting domains . . . 162--168 Mahjabeen Tahir and Azizol Abdullah and Nur Izura Udzir and Khairul Azhar Kasmiran A systematic review of machine learning and deep learning techniques for anomaly detection in data mining . . . . . . . . 169--187 Neha Kaushik and Harish Kumar and Vinay Raj Maintainability improvement of microservices based applications using micro frontend . . . . . . . . . . . . . 188--196 Deepali Bassi and Hardeep Singh The empirical analysis of multi-objective hyperparameter optimization in software vulnerability prediction . . . . . . . . . . . . . . . 197--215 Xiaobao Fu Application of perceptual graph neural network intelligent algorithm in software testing platform . . . . . . . 216--225 Y. C. A. Padmanabha Reddy and Sai Sathwik Kosuru and Nageswara Rao Sirisalla and G. N. Vivekananda and Venkata Akanksha Perala Empirical techniques for effort estimation in designing effective ML models . . . . . . . . . . . . . . . . . 226--234