Last update:
Fri Feb 21 11:03:55 MST 2025
G. S. Maharana and
P. K. Meher Parallel Algorithms and Systolic
Architectures for $1$- and $2$-D
Interpolation Using Discrete Hartley
Transform . . . . . . . . . . . . . . . 1--7
F. S. Al-Anzi and
K. M. Al-Zamel Improved Parallel Cell Placement
Algorithm Using Bounded Edge-Width
Routing Model . . . . . . . . . . . . . 8--12
Hojung Cha and
Jaehak Oh A Real-Time Resource Management System
for Video Server . . . . . . . . . . . . 13--22
M. Farimani and
J. A. Robinson Multipoint Activity Sharing Services for
Fast Prototyping of Groupware
Applications . . . . . . . . . . . . . . 23--28
Jie Wu and
V. Rancov Implementing Context-Driven Parallel
Computations . . . . . . . . . . . . . . 29--37
F. Arcelli and
M. De Santo Distributed Agents for Problem Solving 38--45
Anonymous Call for Papers --- IMSA 2000 . . . . . 48--49
E. B. Fernandez and
Jie Wu and
Haifeng Qian A Combined Functional and
Object-Oriented Approach to Software
Design . . . . . . . . . . . . . . . . . 51--61
S. Tanterdtid and
W. Benjapolakul and
W. Steanputtanagul Optimizing a Single-Hop Virtual Path
System Using a Genetic Algorithm . . . . 62--72
Chen Zhenyu and
J. B. Mbede and
Zhou Yan and
Li Dehua and
Hu Hanping Application of a Genetic Algorithm in
Triangulation of a $3$-D Object Surface 73--77
L. S. K. Chong and
S. C. Hui and
C. K. Yeo Faxportal: Distributed FAX
Transportation for Internet FAX Services 78--88
Sang H. Oh and
Won S. Lee Parallel Evaluation of a Deductive Query
with a Breadth-First Search Strategy . . 89--99
A. S. Mohamed and
A. Galal and
I. Khalil and
K. Sobh and
M. Selim Dispo: Distributed Multi-Threaded
Execution of Prolog Programs . . . . . . 100--108
S. Valenti and
A. Cucchiarelli and
M. Panti A Communication Paradigm for Voluntary
Collaboration . . . . . . . . . . . . . 109--117
O. M. Al-Jarah and
T. A. Al-khdour Slackness-Based Co-Scheduling Hardware
and Software Pipelines with Multiple
Latency Sequences . . . . . . . . . . . 121--128
M. Kobayashi and
M. Ohta Basic Study of Sound Localization for an
Acoustic Visual aid System . . . . . . . 129--133
Hai Jin and
Kai Hwang Efficient LRU Algorithm for Cache
Scheduling in a Disk Array System . . . 134--139
J. M. Huang and
T. C. Yang Multidimensional Fault Tolerance in
Cube-Connected Cycles Architecture . . . 140--150
J. C. Lin and
I. Ho Generating Real-Time Software Test Cases
by Time Petri Nets . . . . . . . . . . . 151--158
M. P. Saltouros and
E. A. Verentziotis and
M. E. Markaki and
M. E. Theologou and
I. S. Venieris An Efficient Hybrid Genetic Algorithm
for Finding (Near-) Optimal Steiner
Trees: an Approach to Routing of
Multipoint Connections . . . . . . . . . 159--165
B. Bhasker Optimizing Queries in Distributed
Database Systems on a Broadcast Local
Area Network . . . . . . . . . . . . . . 166--173
Shinfeng D. Lin and
Shih-Chieh Shie Image Coding Using Adaptive Classified
Side-Match Finite-State Vector
Quantization . . . . . . . . . . . . . . 174--180
Anonymous Call for Papers Special Issue on
Computational Intelligence Techniques in
Co-Operative Robots . . . . . . . . . . 185--185
R. Logeswaran and
C. Eswaran Performance Survey of Several Lossless
Compression Algorithms for Telemetry
Applications . . . . . . . . . . . . . . 1--9
J. R. Hu and
Y. W. Bai Power Efficiency and Latency for a
Semi-Batch Power Management Model in a
Palmtop Multimedia Terminal . . . . . . 10--16
Ming-Chi Lee Dynamic Updates of Inheritance Hierarchy
for Object-Oriented Database Schema . . 17--24
R. Goularte and
E. D. S. Moreira Managing Access to a Video Server
Through a Metadata Base . . . . . . . . 25--29
Han-Chieh Chao and
Jenn-Yuh Hong and
Jiann-Liang Chen Channel Assignment Schemes for WDM-Based
Personal Communications Networks . . . . 30--34
C. Bouras and
V. Kapoulas Basic Internet Services Environment for
the Education Society . . . . . . . . . 35--44
A. I. Vakali and
E. D. Terzi A Java-Based Model for I/O Scheduling in
Tertiary Storage Subsystems . . . . . . 45--50
Jiann-Liang Chen and
Jian-Hong Gong and
Han-Chieh Chao Resource Reservation for Cellular Data
Services Using Fuzzy Matrices . . . . . 51--59
Kai Jin and
Chai Kiat Yeo and
Siu Cheung Hui and
Ing Yann Soon A FAX Adapter for Internet FAX-to-FAX
Communication . . . . . . . . . . . . . 60--67
Wei-Chou Chen and
Tzung-Pei Hong and
Wen-Yang Lin Three Maintenance Algorithms for
Compressed Object-Oriented Data
Warehousing . . . . . . . . . . . . . . 68--75
Simon X. Yang and
Max Meng Call for Papers . . . . . . . . . . . . 77--77
M. Maierhofer and
C. Bailey and
R. Sotudeh ``Affordable Scalability'': An Analysis
of Modular Multimedia Server
Architectures with Shared Local Memory 79--89
T. Chambel and
N. Correia and
N. Guimarães Hypervideo on the Web: Models and
Techniques for Video Integration . . . . 90--98
J. Kim Hybrid Filtering of Web Pages for a
Recommendation Agent . . . . . . . . . . 99--105
A. Marshall and
S. Sezer The Influence of Cumulative Switch Delay
in Multiple Service Class Networks . . . 106--114
S. Kota and
M. Goyal and
R. Goyal and
R. Jain Multimedia Satellite Networks and TCP/IP
Traffic Transport . . . . . . . . . . . 115--128
G. Falkemeier and
G. R. Joubert and
O. Kao Internet Supported Analysis and
Presentation of MPEG Compressed
Newsfeeds . . . . . . . . . . . . . . . 129--136
G. Babin and
F. Lustman Application of Formal Methods to
Scenario-Based Requirements Engineering 141--151
B. A. Malloy and
J. D. McGregor and
S. R. Hughes Exploiting Iostreams to Integrate a GUI
Into a Command Driven Application . . . 152--158
P. H. Welch and
G. H. Hilderink and
A. W. P. Bakkers and
G. S. Stiles Safe and Verifiable Design of Concurrent
Java Programs . . . . . . . . . . . . . 159--165
Kazunori Iwata and
Nobuhiro Ito and
Xiaoyong Du and
Naohiro Ishii Agent Model for Dynamically Changing
Plan in $ \pi $-Calculus . . . . . . . . 166--172
E. Althammer and
W. Pree Design and Implementation of an
MVC-Based Architecture for E-Commerce
Applications . . . . . . . . . . . . . . 173--185
L. S. Oquendo and
A. Attoui Deterministic CORBA ORB (DORB) for
Distributed Real-Time Applications . . . 186--190
A. E. Al-Ayyoub and
A. Yazici Data Dependence Analysis on Trapezoidal
Regions . . . . . . . . . . . . . . . . 1--7
Y. Park and
L. Wu Software Component Retrieval by
Composition Using Semantic Properties 8--13
R. Logeswaran and
C. Eswaran Radial Basis Neural Network for Lossless
Data Compression . . . . . . . . . . . . 14--19
G. Succi and
W. Pedrycz and
R. Wong Dynamic Composition of Components Using
WebCODS . . . . . . . . . . . . . . . . 20--27
E. A. Lotfy and
A. S. Mohamed Applying Neural Networks in Case-Based
Reasoning Adaptation for Cost Assessment
of Steel Buildings . . . . . . . . . . . 28--38
Anonymous Erratum . . . . . . . . . . . . . . . . 39--39
I. D. D. Curcio Mobile Video QoS Metrics . . . . . . . . 41--51
T. Okamoto and
K. Seki and
M. Kayama and
A. I. Cristea Rapsody: a Self/Collaborative-Learning
Multimedia Based Teacher Training
Distance Support Model . . . . . . . . . 52--57
Andrew Tokmakoff and
Daan Velthausz and
Mark Van Setten and
Erik Oltmans and
Ernst-Jan Goedvolk and
René Bal and
Paul Porskamp Content Engineering for the
Next-Generation Internet . . . . . . . . 58--69
M. Villanova and
N. Belkhatir and
H. Martin A Process Environment Supporting Web
Multimedia Information Systems . . . . . 70--76
O. Javed and
S. Khan and
Z. Rasheed and
M. Shah Visual Content-Based Segmentation of
Talk and Game Shows . . . . . . . . . . 77--82
C.-R. Shyu and
J. Harnsomburana and
Y. Sethi and
R. Singh and
J. C. Reid A Hybrid Query Approach for Radiology
Education: Integrating Content-Based
Medical Image Retrieval and Text-Based
Information Retrieval . . . . . . . . . 83--92
G. S. Shin and
S. I. Jin and
P. S. Mah and
C. S. Oho Greedy Request Scheduling to Reduce
Initial Latency for VOD Systems . . . . 93--99
H. Wang and
D. Mamora and
L. N. Bhuyan Ppctsi: a Software Package for Rapid
Analysis of CT Scan Images . . . . . . . 103--111
M. S. Loffler and
N. P. Costescu and
E. Zergeroglu and
D. M. Dawson Telerobotic Decontamination and
Decommissioning with Qrobot, a PC-based
Robot Control System . . . . . . . . . . 112--121
E. Keramopoulos and
P. Pouyioutas and
T. Ptohos The Goql Graphical Query Language . . . 122--128
J. Aguilar and
M. Hernandez A Fault-Tolerant Mechanism for
Distributed/Parallel System Based on
Task Replication Techniques . . . . . . 129--135
S. Muknahallipatna and
A. Kadkol and
J. Hamann Monitoring Tool for Performance
Measurements of Windows Nt-Based Lans 136--143
G. A. Aderounmu and
E. R. Adagunodo and
A. D. Akinde Performance Comparison of Data-Link
Control Protocol for Wireless
Asynchronous Transfer Mode Network . . . 144--152
Shundong Xia and
Jinyuan You A Coordination Model for Network
Computing Environments . . . . . . . . . 153--159
Anonymous Call for Papers for Special Issue on
Cluster/Grid Computing . . . . . . . . . 161--162
W. Chen and
B. Wasson Coordinating Collaborative Knowledge
Building . . . . . . . . . . . . . . . . 1--10
N. Klever and
M. Jeckle Proposal for XML Schema V 1.1 as a Basis
for \tt XMLrepository.Org . . . . . . . 11--16
A. Harrer Software Engineering Methods for RE-USE
of Components and Design in Educational
Systems . . . . . . . . . . . . . . . . 17--23
C. E. Palau and
V. Manso and
J. M. Raga and
R. Romero and
J. C. Guerri and
M. Esteve An XML Approach for Assessment in
Education . . . . . . . . . . . . . . . 24--37
F. Ramos and
A. Conde and
L. Neves and
A. Moreira Management of E-Learning Environments:
some Issues and Research Clues . . . . . 38--41
J. Kuljis and
D. Y. Lees Supporting Organizational E-Learning
with a Distributed, Virtual,
Collaborative Learning Environment . . . 42--49
N. Manouselis and
D. Sampson Agent-Based E-Learning Course
Recommendation: Matching Learner
Characteristics with Content Attributes 50--64
V. Devedzic and
V. Pocajt What Does Current Web-Based Education
Lack? . . . . . . . . . . . . . . . . . 65--71
P. Kommers Experiential Learning Through
Constructivist Learning Tools . . . . . 72--83
J. Smid Interactive Tutoring Model Using
Information Cycling on the WWW . . . . . 84--90
S. J. Choi and
W. Scacchi Formal Analysis of the Structural
Correctness of Slc Descriptions . . . . 91--97
J.-S. Lee and
W.-K. Hong and
S.-D. Kim Adaptive Methods to Minimize
Decompression Overhead for Compressed
On-Chip Caches . . . . . . . . . . . . . 98--105
Y.-M. Cheung and
L. Xu A New Information-Theoretic Based ICA
Algorithm For Blind Signal Separation 106--110
H. Haga Development of Hypermedia
Computer-Mediated Learning System and
its Evaluation . . . . . . . . . . . . . 111--118
H. A. Ali and
A. I. El-Dousky and
A. A. A. Ali Exploitation of Intelligent Agent For
Building Expandable and Flexible
Computerized Tutoring System . . . . . . 119--129
S. D. Lin and
S. C. Shie and
C. F. Chen A DCT-Based Image Watermarking With
Threshold Embedding . . . . . . . . . . 130--135
X L. Li and
B. Veeravalli and
C. C. Ko Distributed Image Processing On a
Network Of Workstations . . . . . . . . 136--145
S. Bataineh and
A. Younis An Optimal Manhattan Street
Network-Routing Algorithm . . . . . . . 146--153
K. Henke and
H. D. Wuttke and
S. Hellbach Laboratory Via Internet --- New Ways In
Education And Research . . . . . . . . . 157--163
M. Karweit A Web-Based Laboratory For
Distance-Learning Engineering Students 164--169
L. Sheremetov and
R. Peredo Valderrama Development of Reusable Learning
Materials For WBE Using Intelligent
Components And Agents . . . . . . . . . 170--178
D. Dicheva and
L. Aroyo and
A. Cristea Cooperative Courseware-Authoring Support 179--187
V. Uskov and
M. Uskova Reusable Learning And Information Atoms
Approach To Web-Based Education . . . . 188--197
J. Vargo and
J. C. Nesbit and
K. Belfer and
A. Archambault Learning Object Evaluation:
Computer-Mediated Collaboration And
Inter-Rater Reliability . . . . . . . . 198--205
F. Tajariol and
J.-M. Adam and
M. Dubois A Study on The Effect of Communication
And Monitoring Tools In Web-Based
Tutoring . . . . . . . . . . . . . . . . 206--211
R. M. de Moraes and
L. S. Machado Hidden Markov Models For Learning
Evaluation In Virtual-Reality Simulators 212--215
C. Li and
L. Li A Hybrid Agent Platform Composed of
Cooperating Intelligent Agents And
Mobile Agents . . . . . . . . . . . . . 217--224
G. Sivaradje and
P. Dananjayan A Novel Dynamic Guard Channel Scheme For
Channel Allocation In Cellular Mobile
Networks . . . . . . . . . . . . . . . . 225--235
A. Azadmanesh and
L. Zhou and
D. Peak Egophobic Voting Algorithms . . . . . . 236--246
S. D. Bruda and
S. G. Akl Real-Time Computation: a Formal
Definition And Its Applications . . . . 247--257
N. H. Salman and
C.-Q. Liu Image Segmentation And Edge Detection
Based On Watershed Techniques . . . . . 258--263
S. Q. Zheng and
M. Yang and
F. Masetti Constructing Schedulers For High-Speed,
High-Capacity Switches/Routers . . . . . 264--271
D. K. Lowenthal and
R. Subramanian Hyfi: Architecture-Independent
Parallelism On Networks of
Multiprocessors . . . . . . . . . . . . 272--282
C. I. Fan and
C. L. Lei Divisible Blind Signatures Based on Hash
Chains . . . . . . . . . . . . . . . . . 1--9
C.-H. Yang and
L.-Y. Chuang and
C.-H. Yang and
C.-H. Luo Internet Access for Disabled Persons
Using Morse Code . . . . . . . . . . . . 10--16
A. P. Pons An Object-Oriented Language for
Real-Time Systems . . . . . . . . . . . 1--7
P. K. Panigrahi and
A. Goswami Algebra for Fuzzy Object Oriented
Database Language . . . . . . . . . . . 1--9
M. Azizi and
X. Song and
E.-M. Aboulhamid A Case Study On The Verification of
Cache Coherence Protocols . . . . . . . 1--10
C. M. Wee and
M. S. Beg and
B. Vaillant Secure Setrequest and Getresponse for
SNMP: APSSNMP . . . . . . . . . . . . . 1--7
D. X. Liu and
Y. C. Bai Cross-Tree: a Data Structure for
Analysis of Security Protocols . . . . . 1--7
T. Taibi and
D. C. L. Ngo Towards a Balanced Specification
Language for Distributed Object
Computing Patterns . . . . . . . . . . . 1--8
G. Radhamani and
M. U. Siddiqi A WAP-Enabled Transaction Model for
Mobile Multidatabases . . . . . . . . . 1--6
S. C. Hui and
M. K. H. Leung and
F. Wang Eleview: Remote Intelligent Elevator
Monitoring System . . . . . . . . . . . 1--8
G. K. Adam and
V. G. Pappas Geographical Image Processing Using
GisTool . . . . . . . . . . . . . . . . 1--6
C.-Y. Chen and
J. Tang and
D.-L. Lee and
J.-F. Tu Exploiting Instruct Recognized Scheme to
Improve Processor Performance . . . . . 1--9
C. W. Cheong Web Server Workload Prediction: Fuzzy
Markovian Approach . . . . . . . . . . . 1--6
S. H. Oh and
W. S. Lee Deductive Query Processing with an
Object-Oriented Semantic Network in a
Massively Parallel Environment . . . . . 1--11
G. Montejano and
D. Riesco and
R. Uzal Software Configuration Management in a
Parallel Development Environment . . . . 1--10
G. Kaefer and
J. Haid and
K. Voit and
R. Weiss Architectural Software Power Estimation
Support for Power Aware Remote
Processing . . . . . . . . . . . . . . . 1--6
A. Salhieh and
L. Schwiebert Power-Aware Metrics for Wireless Sensor
Networks . . . . . . . . . . . . . . . . 1--7
B. Li and
W. Yao and
J. You An Effort to Formal Model of Trust
Management in Grids . . . . . . . . . . 1--6
J. T. Hung and
T. G. Robertazzi Scalable Scheduling for Clusters and
Grids Using Cut Through Switching . . . 1--10
B. Hong and
V. K. Prasanna Simulation of Adaptive Applications in
Heterogeneous Computing Environments . . 1--8
K.-L. Park and
H.-J. Lee and
O.-Y. Kwon and
S.-Y. Park and
H.-W. Park and
S.-D. Kim Design and Implementation of a Dynamic
Communication MPI Library for the Grid 1--8
F. Zara and
F. Faure and
J.-M. Vincent Parallel Simulation of Large Dynamic
System on a PC Cluster: Application to
Cloth Simulation . . . . . . . . . . . . 1--8
C. H. Ding and
R. Buyya Guided Google: a Meta Search Engine and
its Implementation Using the Google
Distributed Web Services . . . . . . . . 1--7
C. K. Yeo and
S. C. Hui and
B. S. Lee Java-Based, WAP-Enabled Unified
Messaging System . . . . . . . . . . . . 1--8
D. Desrochers and
Y. Jin and
Z. Qu and
A. Saengdeejing Algorithms to Generate Partially Damaged
characters and Readability Study for OCR
Readers in Semiconductor Manufacturing 1--6
A. Loo Sensitivity Analysis of Database
Operations: a Case Study of Parallel
Partition/Sorting Algorithm . . . . . . 1--8
C.-H. Lien and
Y.-W. Bai Energy Efficiency and Performance of a
Controlled Model for Scalable Computing
Systems . . . . . . . . . . . . . . . . 1--9
F. S. Al-Anzi and
A. Allahverdi A Hybrid Simulated Annealing Heuristic
for Multimedia Object Requests
Scheduling Problem . . . . . . . . . . . 1--6
H. Aljifri and
A. P. Pons Reducing Overhead of Secure E-Commerce
Transactions . . . . . . . . . . . . . . 1--6
M. A. Radaideh A Distributed and Parallel Model for
High-Performance Indexing of Database
Content . . . . . . . . . . . . . . . . 1--6
E. M. Garzón and
I. García Solving Eigenproblems on Multicomputers:
Two Different Approaches . . . . . . . . 1--10
M. Daoui and
M. Lalam and
B. Djamah and
A. Bilami Hardware Cache Coherence Protocol . . . 1--13
Anonymous Editors' Note . . . . . . . . . . . . . ??
A. K. Sharma and
A. Goel Moment-to-Moment Node Transition
Awareness Protocol (MOMENTAP) . . . . . 1--9
B. Zhen and
M. Kobayashi and
M. Shimizu The Reading of Transmission-Only Active
RFID Tags . . . . . . . . . . . . . . . 10--19
D. Deville and
Y. Hodique and
I. Simplot-Ryl Safe Collaboration in Extensible
Operating Systems: A Study on Real-Time
Extensions . . . . . . . . . . . . . . . 20--26
G. Thomas and
F. Ogel and
A. Galland and
B. Folliot and
I. Piumarta Building a Flexible Java Runtime Upon a
Flexible Compiler . . . . . . . . . . . 27--34
A. L. M. dos Santos and
M. E. Torrey and
A. El Sheshai Supporting National Public Key
Infrastructures Using Smart Cards . . . 35--40
M. A. Hamza and
I. F. Awad and
G. M. B. Awad Enhancing Mobile Agent Communication
Performance . . . . . . . . . . . . . . 45--50
D. Grosu and
H. Gâlmeanu MPEG-2 Motion Estimation Using a PC
Cluster . . . . . . . . . . . . . . . . 51--56
R. Santos and
J. Santos and
J. Orozco Hard Real-Time Systems with Stochastic
Execution Times: Deterministic and
Probabilistic Guarantees . . . . . . . . 57--62
T. Horie and
K. Yamasaki and
T. Tsuji and
T. Hochin and
K. Higuchi A Distributed Object-Oriented
Programming System with Dynamic
Reconfiguration Capability . . . . . . . 63--71
T. A. El-Ghazawi and
J. Le Moigne Performance of the Wavelet Decomposition
on Massively Parallel Architectures . . 72--81
P. A. Laplante Criteria and an Objective Approach to
Selecting Commercial Real-Time Operating
Systems Based on Published Information 82--96
B. Veeravalli Design and Performance Analysis of
Heuristic Load-Balancing Strategies for
Processing Divisible Loads on Ethernet
Clusters . . . . . . . . . . . . . . . . 97--107
G. Dini and
G. Lettieri and
L. Lopriore Design Framework for a Distributed,
Single-Address-Space System . . . . . . 108--118
J. M. Liang and
J. Q. Liang and
Q. L. Ren A Framework for Generic Object
Recognition with Bayesian Networks . . . 123--138
A. P. Pons Enhancement of Web Object Speculative
Retrieval . . . . . . . . . . . . . . . 139--146
C. Popescu A Secure Key Agreement Protocol Using
Elliptic Curves . . . . . . . . . . . . 147--152
J. O. Dada and
H.-D. Kochs XML-Based Open Electricity Market
Information Exchange Network Using
Object-Oriented Methods . . . . . . . . 153--160
T. Sari and
M. Sellami Cursive Arabic Script Segmentation and
Recognition System . . . . . . . . . . . 161--168
T.-P. Hong and
T.-N. Chuang Fuzzy Gupta Scheduling for Flow Shops
with More than two Machines . . . . . . 169--177
R. A. Haraty and
H. M. El-Zabadani Abjad Hawwaz: An Offline Arabic
Handwriting Recognition System . . . . . 178--189
S. Chalasani and
R. V. Boppana Software Architectures for E-Commerce
Computing Systems with External Hosting 190--198
G. Edwards and
R. Jayne Location Tracking Using Differential
Range Measurements . . . . . . . . . . . 199--205
A. C. M. Fong and
S. C. Hui A Web-Based System for B2B E-Commerce 209--217
M. Younis and
S. Ponnusamy Efficient and Predictable Approach for
Supporting Spatial Partitioning of
Real-Time Applications . . . . . . . . . 218--227
R. A. Shatnawi and
L. H. Etzkorn and
W. E. Hughes, Jr. Comparing Object-Oriented Languages
Using Design Patterns . . . . . . . . . 228--236
Z. Wang and
J. Zhang Routing with Virtual Transmission Range
in Mobile AD HOC Networks . . . . . . . 237--243
J. Al-Sadi and
A. M. Awwad A New Fault-Tolerant Routing Algorithm
for OTIS-Cube Using Unsafety Vectors . . 244--251
D. Magoni Network Topology Analysis and Internet
Modelling with \em NEM . . . . . . . . . 252--259
M. M. El-Awad A Vectorized Conjugate-Gradient Solver
for Sparse Systems of Algebraic
Equations . . . . . . . . . . . . . . . 260--265
S.-Y. Wu and
S.-J. Leu and
R.-S. Chang An Agent-Based Architecture for Resource
Reservation in Mobile IP Networks . . . 266--273
M. Al-Rousan Webchair: a Web-Based Wireless
Navigation Wheelchair System for People
with Motor Disabilities . . . . . . . . 274--284
C. Koutsikas and
N. Malevris A New Script Language Applicable To
Symbolic Execution Systems . . . . . . . 1--11
J. Aguilar and
E. L. Leiss A Coherence-Replacement Protocol For Web
Proxy Cache Systems . . . . . . . . . . 12--18
W. Haque Concurrent Deadlock Detection In
Parallel Programs . . . . . . . . . . . 19--25
W. J. Lin and
B. Veeravalli A Dynamic Object Allocation And
Replication Algorithm For Distributed
Systems With Centralized Control . . . . 26--34
T. Fergany and
Sarhan Amany Efficient Allocation of Distributed
Object-Oriented Tasks To a Pre-Defined
Scheduled System . . . . . . . . . . . . 35--42
S Juhasz Modelling Asynchronous Message Passing
In Small Cluster Environments . . . . . 43--49
D. K. Sharma and
R. K. Sharma and
D. Ghosh A Spatial Decision Support System For
Land Management . . . . . . . . . . . . 50--58
R. Beghdad A Flows-Based QoS Routing Protocol For
Multicast Communication Networks . . . . 59--64
Y. M. Asem and
A. Kara A Computationally Efficient Key-Hiding
Based Group Re-Keying Scheme For Secure
Multicasting . . . . . . . . . . . . . . 65--73
M. Radaideh and
S. Horani and
M. Raseen WBSGA: a Web-Based Tool For Course
Timetabling And Scheduling . . . . . . . 74--83
W. H. Hsu and
J. Chen and
S.-T. Sheu and
C.-F. Chao SBMT--Steiner Backup Multicast Tree . . 87--98
G. Licea Supporting Reusability in Fixed And
Mobile Groupware Applications . . . . . 99--111
H. Arafat Ali and
M. F. Ared and
A. I. El-Desouky An IP Packet Forwarding Technique Based
on a New Structure of Lookup Table . . . 112--121
X. Zhang and
X. L. Xiao and
J. W. Tian and
J. Liu and
G. Y. Xu Application of Support Vector Machines
in Classification of Magnetic Resonance
Images . . . . . . . . . . . . . . . . . 122--128
A. Amin and
N. Al-Darwish Structural Description to Recognizing
Hand-Printed Arabic Characters Using
Decision Tree Learning Techniques . . . 129--134
K. Y. Lam and
E. Chan and
D. Hung and
K. Ramamritham Processing of Location-Dependent
Continuous Queries on Real-Time Spatial
Data: the View From Retina . . . . . . . 135--143
D. J. Russomanno Prolog Query Interface: a
Set-Of-Mappings Approach With Optional
Segmentation . . . . . . . . . . . . . . 144--153
B. Fox and
L. S. Jennings and
A. Y. Zomaya On the Modelling and Computation of
Nonlinear Multibody Cable Systems . . . 154--161
K. Salah and
K. El-Badawi On Modelling and Analysis of Receive
Livelock and CPU Utilization in
High-Speed Networks . . . . . . . . . . 162--169
H. Hussein Karam and
F. F. M. Ghaleb and
Y. M. Abd El-Latif Towards Fast and Smooth Subdivision
Surface Reconstruction . . . . . . . . . 170--176
V. Kannoth and
B. Suk Lee and
J. Buzas Statistical Cost-Modelling of Financial
Time Series Functions . . . . . . . . . 181--188
S. Faizullah and
I. Marsic Measuring and Pricing QoS . . . . . . . 189--209
A. Singh and
A. L. Mora dos Santos and
O. Nordstrom and
C. Lu Stateless Model For The Prevention of
Malicious Communication Channels . . . . 285--297
X. Zhu and
J. Liao and
J. Chen Improved Protocol Conversion Methodology
And Its Application . . . . . . . . . . 210--221
G. K. Winley and
J. P.-O. Fan Admissible Heuristic Functions For
Flow-Shop Problems . . . . . . . . . . . 222--226
Y. Kanamori and
S.-M. Yoo and
W. D. Pan and
F. T. Sheldon A Short Survey On Quantum Computers . . 227--233
A. Bilami and
M. Lalam and
M. Daoui and
B. Djamah A Cell Selection Policy For An
Input-Buffered Packet Switch . . . . . . 234--242
M. H. Mickle and
M. Mi and
J. T. Cain and
T. Minor A Circuit Model For Passive RF
Autonomous Devices With Protocol
Considerations . . . . . . . . . . . . . 243--250
D. Roy and
A. Chatterjee and
N. Jasapara and
N. Jadhav A New Transport Layer Protocol Offering
Variable Reliability In Bidirectional
Communication: Application For Robotic
Systems . . . . . . . . . . . . . . . . 251--258
B.-F. Wu and
Y.-L. Chen and
C.-C. Chiu Efficient Implementation of Several
Multilevel Thresholding Algorithms Using
a Combinatorial Scheme . . . . . . . . . 259--269
M. Crocker and
J. Baranski and
G. Y. Lazarou Fault-Tolerant Reconfigurable
Ethernet-Based IP Network Proxy . . . . 270--277
M. Youssef and
A. Agrawala Location-Clustering Techniques For WLAN
Location Determination Systems . . . . . 278--284
D. Prakash Vidyarthi and
A. Kumar Tripathi and
B. Kumer Sarker Cluster-Based Load Partitioning and
Allocation In Distributed Computing
Systems . . . . . . . . . . . . . . . . 301--307
C. S. Wang An Efficient Content-Based Retrieval
System For $3$D Objects . . . . . . . . 308--313
J. Ge and
R. He Buffer Efficiency In Wormhole Routers 314--320
A. Amoroso and
G. Casciola Fast Bivariate Function Rendering For
Small Devices . . . . . . . . . . . . . 321--328
J.-C. Chuang and
C.-C. Chang Using a Simple and Fast Image
Compression Algorithm To Hide Secret
Information . . . . . . . . . . . . . . 329--333
M. V. N. K. Prasad and
K. K. Shukla Parallel Implementation of Domain
Decomposition Based Image Compression
Algorithm . . . . . . . . . . . . . . . 334--341
R. F. DeMara and
Y. Tseng and
K. Drake and
A. Ejnioui Capability Classes of Multiprocessor
Synchronization Techniques . . . . . . . 342--349
H. Yu and
L. Wang and
J. Zhang and
J. Barksdale and
X. Yuan Developing a Secure Geospatial
Visualization and Collaboration System
Using Software Engineering Technology 350--358
C. Yuan and
C. Tang and
Y. Wen and
J. Zuo and
J. Peng and
J. Hu Convergency of Genetic Regression In
Data Mining Based On Gene Expression
Programming and Optimized Solution . . . 359--366
M. Yang and
J. Wang and
S. Q. Zheng and
Y. Jiang Code Optimization of Polynomial
Approximation Functions on Clustered
Instruction-Level Parallelism Processors 367--378
S. Sharafeddine and
A. Riedl Dimensioning Token Bucket Policers For
Various Voiceover IP Applications Using
Real-Scenario Measurements . . . . . . . 379--387
A. R. Al-Ali Wireless Distributed Energy Billing
System . . . . . . . . . . . . . . . . . 388--393
Y. Park and
B. S. Kim Web Search Using Dynamic Keyword
Suggestion . . . . . . . . . . . . . . . 1--9
L. Kuzniarz and
M. Staron Two Techniques for UML Model
Transformations . . . . . . . . . . . . 10--17
S. Lian and
Z. Liu and
Z. Ren and
Z. Wang Multimedia Data Encryption in
Block-Based Codecs . . . . . . . . . . . 18--24
H. M. Ammari Discovery and Selection Protocols for
Multi-Hop Wireless Internet Access . . . 25--32
S. Ferretti and
M. Roccetti and
C. E. Palazzi An Optimistic Obsolescence-Based
Approach to Event Synchronization for
Massively Multiplayer Online Games . . . 33--43
R. Steele and
W. Gardner and
T. S. Dillon XML Repository Searcher-Browser
Supporting Fine-Grained Access Control 44--50
E. El-Qawasmeh and
M. Strauss and
M. Mack and
S. Berkovich Increasing the Efficiency of
Bit-Counting . . . . . . . . . . . . . . 51--58
B. Roussev and
J. Wu Transforming Use Case Models to Class
Models and OCL-Specifications . . . . . 59--69
D. Sarkar and
U. K. Sarkar and
G. Peng Bandwidth Requirement of Links in a
Hierarchical Caching Network: a
Graph-Based Formulation, An Algorithm
and Its Performance Evaluation . . . . . 70--78
Y. W. Bai and
Y. C. Wu Web Delay Analysis and Reduction By
Using Load Balancing of a DNS-Based Web
Server Cluster . . . . . . . . . . . . . 79--88
D. N. B. Ta and
S. Zhou Client Assignment Problem in Distributed
Virtual Environments . . . . . . . . . . 89--95
T. Klostermann and
E. O. K. Zhan Control Based Optimization of
Collaborative Technical Customer Service 96--102
D. Williams and
H. Lutfiyya Fault-Tolerant Authentication Services 107--114
H. Rahaman and
D. K. Das and
B. B. Bhattacharya Testable Design of Digital Summation
Threshold Logic Array for Synthesis of
Symmetric Functions . . . . . . . . . . 115--123
W.-P. Lee Personalizing Internet Information
Services: Passive Filtering and Active
Retrieval . . . . . . . . . . . . . . . 124--131
H. M. Harmanani and
A. M. K. Hajar Concurrent BIST Synthesis and Test
Scheduling Using Genetic Algorithms . . 132--142
S. A. Selouani and
D. O'Shaughnessy and
J. Caelen Incorporating Phonetic Knowledge Into an
Evolutionary Subspace Approach for
Robust Speech Recognition . . . . . . . 143--154
J. Sum and
J. Wu and
C.-S. Leung On Profit Density Based Greedy Algorithm
for a Resource Allocation Problem in Web
Services . . . . . . . . . . . . . . . . 155--163
Y. G. Li and
W. D. Zhang and
G. L. Wang Prune Support Vector Machines by an
Iterative Process . . . . . . . . . . . 164--169
J. L. Kennington and
V. S. S. Nair and
G. Spiride A Decomposition Approach for Spare
Capacity Assignment for Path Restorable
Mesh Networks . . . . . . . . . . . . . 170--179
R. A. Namneh and
W. D. Pan and
S.-M. Yoo Parallel Implementations of $1$-D Fast
Fourier Transform Without Interprocessor
Communication . . . . . . . . . . . . . 180--186
A. V. Babu and
L. Jacob Service Differentiation Schemes in IEEE
802.11 Wireless LANs with Variable Frame
Size . . . . . . . . . . . . . . . . . . 187--195
C. Hu and
J. Wang and
J. Li Language Support for Multi-Paradigm and
Multi-Grain Parallelism on SMP-Cluster 196--203
M. Furini MCDL: a Reduced But Extensible
Multimedia Contents Description Language 204--210
M. Zhang and
S. Xu and
J. Fulcher Anser: Adaptive Neuron Artificial Neural
Network System for Estimating Rainfall 215--222
L. Linsen and
B. Hamann and
K. I. Joy Wavelets for Adaptively Refined $ \sqrt
[3]{2}$-Subdivision Meshes . . . . . . . 223--231
A. Mittal and
L.-F. Cheong Detecting Establishment Shots Using
Camera Motion . . . . . . . . . . . . . 232--238
S.-N. Chen A New Trace-Driven Shared-Memory
Multiprocessors Machine Simulator . . . 239--244
L. Chunlin and
L. Layuan A Multi-QoS Guaranteed Dynamic Grid
Resource Scheduling Algorithm . . . . . 245--252
F. W. Yang and
H. J. Lin and
S. H. Yen An Improved Unsupervised Clustering
Algorithm Based on Population Markov
Chain . . . . . . . . . . . . . . . . . 253--258
H. A. Ali and
A. I. El-Desouky and
A. I. Saleh A Novel Strategy for a Vertical Web Page
Classifier Based on Continuous Learning
Na\"\ive Bayes Algorithm . . . . . . . . 259--277
F. Li and
X. Xin and
Y. Hu A Pairing-Based Signcryption Scheme
Using Self-Certified Public Keys . . . . 278--282
Q. Duan Resource Allocation for Quality of
Service Provision in Buffered Crossbar
Switches With Traffic Aggregation . . . 283--290
Y. Tsujita Remote MPI-I/O on a Parallel Virtual
File System Using a Circular Buffer for
High Throughput . . . . . . . . . . . . 291--299
J.-H. Huang and
S. Mishra Mykil: a Secure and Highly Available Key
Management System For large Group
Multicast . . . . . . . . . . . . . . . 300--308
S. B. Mohammad and
M. O. Khaoua and
L. M. Mackenzie and
I. Ababneh Processor Allocation and Job Scheduling
on $3$D Mesh Interconnection Networks 309--317
G. H. Liu and
S. Zhang Development of a New Virtual Reality
System . . . . . . . . . . . . . . . . . 321--326
S. D. Bruda and
S. G. Akl Size Matters: Logarithmic Space is Real
Time . . . . . . . . . . . . . . . . . . 327--336
C.-Y. Lee and
C. W. Chiou Low-Complexity Bit-Parallel Multipliers
for a Class of $ {\rm GF}(2^m) $ Based
on Modified Booth's Algorithm . . . . . 337--345
A. Kurkovsky Hierarchy of Formal Descriptions for
Architectural Analysis and Design of
Complex CS . . . . . . . . . . . . . . . 346--352
V. A. Chouliaras and
T. R. Jacobs and
J. L. Núñez-Yanez and
K. Manolopoulos and
K. Nakos and
D. Reisis Thread-Parallel MPEG-2 and MPEG-4
Encoders for Shared-Memory
System-On-Chip Multiprocessors . . . . . 353--361
Z. Zheng and
T. K. Y. Chan A Client--Server Based View-Dependent
Multiresolution Mesh Hierarchy . . . . . 362--371
Y.-H. Wang and
C.-H. Tsai and
H.-Z. Lin and
C.-A. Wang Interference-Aware QoS Multipath Routing
for \em Ad Hoc Wireless Networks . . . . 372--378
Q. Wang and
J. Vincent and
G. King Prediction Based Link State Update . . . 379--393
I. Sygkouna and
M. Anagnostou and
E. Sykas Searching for Information in a P2P
System . . . . . . . . . . . . . . . . . 394--401
A. H. Kattoush An $N$-Dimensional Recurrent Noisy Phase
Unwrapping Algorithm . . . . . . . . . . 402--407
Y. Li and
Z. Lan Current Research and Practice in
Proactive Fault Management . . . . . . . 408--413
D. T. Ahmed and
N. M. M. K. Chowdhury and
M. M. Akbar Admission Control Algorithm for
Multimedia Server: A Hybrid Approach . . 414--419
L. Wang and
S. Piao and
Y. Jiang and
L. Zhang On a Web-Graph-Based Micronetwork
Architecture for SoCs . . . . . . . . . 1--8
Y. Jiao and
Y. Yang and
M. Yang and
Y. Jiang A Multi-Path Routing Scheme for
Torus-Based NOCs . . . . . . . . . . . . 9--16
R. K. Jena and
G. K. Sharma Application Mapping of Mesh Based-NoC
Using Multi-Objective Genetic Algorithm 17--22
L. Zhang and
Y. Jiang and
E. E. Regentova Fault Tolerance Routing for Wavelength
Routed Optical Networks in ONoC . . . . 23--35
Y. Dong and
Y. Dou and
M. Liu A Design Space Exploration Algorithm In
Compiling Window Operation onto
Reconfigurable Hardware . . . . . . . . 36--43
E. Lu and
M. Yang and
B. Yang and
X. Feng and
S. Q. Zheng A Novel Design of Self-Routing Strictly
Nonblocking Switching Networks . . . . . 44--50
Hazem M. Bahig and
Hatem M. Bahig Merging on PRAM . . . . . . . . . . . . 51--55
Y. Yang and
X. Yang and
C. Zhou Lmcgrid: a Low Management Cost Grid
Computation Model . . . . . . . . . . . 56--61
M. Yang and
L. Wang Preface: Special Issue on
High-Performance Computing Architectures 62--63
J. A. Zhang and
S. F. Jones and
A. S. Helal Mobile Network Adaptation in the Ubidata
Mobile File System . . . . . . . . . . . 65--72
K. Papazis and
N. K. Chilamkurti and
B. Soh A New Adaptive Layered Multicast
Protocol . . . . . . . . . . . . . . . . 73--79
R. P. Gupta and
S. C. Srivastava and
R. K. Varma Remote Terminal Units for Distribution
Automation: Development and
Commissioning Experience . . . . . . . . 80--91
M. Li and
C.-S. Liao and
J.-K. Hwang Rapid Calculation of Time Deviation and
Modified Allan Deviation for
Characterizing Telecommunications Clock
Stability . . . . . . . . . . . . . . . 92--96
J.-Z. Sun and
J. Riekki and
M. Jurmu and
J. Sauvola Java-Based HTTP Input Channel for
Heterogeneous Wireless Networks . . . . 97--104
M. Selvaraj and
G. Y. Lazarou and
R. Hu Simultaneous and Proportional Bandwidth,
Delay, and Loss Differentiation . . . . 105--116
S. P. Zhou and
S.-P. Ting and
Z. Q. Shen and
L. B. Luo Twilight City --- a Virtual Environment
for MOUT . . . . . . . . . . . . . . . . 117--123
A. A. Raj and
M. Suganthi Hardware Implementation of an Efficient
Internet Protocol Routing Filter Design 124--128
F. Li and
X. Xin and
Y. Hu Efficient Certificate-Based Signcryption
Scheme from Bilinear Pairings . . . . . 129--133
V. S. Vyas and
P. P. Rege Real Coded Genetic Algorithm for Optimal
Parameters Selection in Circular Mellin
Feature Extractors . . . . . . . . . . . 134--141
C. Hota and
S. Jha and
G. Raghurama Adaptive Bandwidth Management and QoS
Provisioning in IPVPNs . . . . . . . . . 142--150
R. Benlamri and
H. Barada and
A. Al-Raqabani Analysis of Coordinated Load Sharing for
Large Distributed Systems . . . . . . . 151--162
M. A. Otair and
W. A. Salameh Efficient Training of Neural Networks
Using Optical Backpropagation with
Momentum Factor . . . . . . . . . . . . 167--172
M. Ishihara and
M. Tanaka and
K. Kuriyama A Cubic Systolic Array and its
Properties . . . . . . . . . . . . . . . 173--182
J. Peng and
C.-J. Tang and
C. Li and
J.-J. Hu A New Evolutionary Algorithm Based on
Chromosome Hierarchy Network . . . . . . 183--191
J.-Y. Zheng and
X. Wang Streaming Route Panorama for Seamless
City Guidance . . . . . . . . . . . . . 192--200
W. J. Liu and
J. Gong and
W. Ding Using Heavy-Tailed Feature to Estimate
Flow Length Distributions . . . . . . . 201--206
Y. C. Eu and
S. Khatun and
B. M. Ali and
M. Othman Multicast, Hierarchical and Fast
Handover in Mobile IPv6 Wireless
Network: a Test-Bed Experience . . . . . 207--212
W. Liu and
L. Gao and
Y. Ding and
J. Xu and
Y. Ji PC-based CAN-Bus Experimental Platform
for Autonomous Underwater Vehicles . . . 213--219
S. K. Abd-El-Hafiz and
D. M. Shawky and
A. L. El-Sedeek Recovery of Object-Oriented Design
Patterns Using Static and Dynamic . . . 220--233
Z. Trabelsi and
K. Shuaib A Novel Man-in-the-Middle Intrusion
Detection Scheme for Switched Lans . . . 234--243
O. M. Al-Jarrah and
B. H. Sababha Parma: a Power Aware Reliable
Multicasting Algorithm for Mobile Ad Hoc
Networks . . . . . . . . . . . . . . . . 244--250
T. Brothers and
N. Mandagere and
S. Muknahallipatna and
J. C. Hamann and
H. Johnson Microsoft Exchange Implementation on a
Distributed Storage Area Network . . . . 251--264
H. Sato Construction of Object Migration
Behaviour Models from Temporal
Constraints . . . . . . . . . . . . . . 265--275
J. Sum and
J. Wu and
C. S. Leung and
K. I. J. Ho Analysis on a Simulated Model for
Gnutella Topology: Connectedness and
Extension . . . . . . . . . . . . . . . 279--288
B. Thiongane and
D. L. Truong Shared Path Protection for Bandwidth
Guaranteed Connections in Multi-Domain
Networks . . . . . . . . . . . . . . . . 289--297
M. Z. Zhang and
H. T. Ngo and
A. R. Livingston and
V. K. Asari A High Performance Architecture for
Implementation of $2$-D Convolution with
Quadrant Symmetric Kernels . . . . . . . 298--308
Z. D. Wu Modelling for a Federated Peer-to-Peer
MMOG Architecture . . . . . . . . . . . 309--318
H. Y. Chien Efficient and Practical Approach to
Authenticating Public Terminals . . . . 319--324
G. Garani and
G. K. Adam Qualitative Modelling at the Design of
Concrete Manufacturing Machinery . . . . 325--330
X. Zou and
L. Bai A New Class of Key Management Scheme for
Access Control in Dynamic Hierarchies 331--337
S. M. Mansoor Roomi and
V. Abhaikumar and
S. Baskar and
N. S. Balaji A No-Reference Edge Preserving Genetic
Weight Adaptation Filter for Impulse
Noise Removal . . . . . . . . . . . . . 338--344
F. Li and
C. Xu and
S. Zhou Improvement of a proactive Threshold
Signcryption Scheme . . . . . . . . . . 345--347
N. Parimala and
S. R. N. Reddy Processor Selection for Embedded System
Design . . . . . . . . . . . . . . . . . 348--353
N. Werghi Robust $3$D Object Registration Based On
Pairwise Matching of Geometric
Distributions . . . . . . . . . . . . . 1--8
G. O. Abada and
E. A. Onibere The Effect of Rehearsed Computer Use on
Icon Recognition . . . . . . . . . . . . 9--15
Chin-Chen Chang and
Ching-Lin Kuo and
Chang-Chu Chen Three Improved Codebook Searching
Algorithms for Image Compression Using
Vector Quantizer . . . . . . . . . . . . 16--22
A. Al-Naamany and
H. Bourdoucen Design and Simulation of a Fuzzy Logic
Bandwidth Controller for Users
Classification and Priorities
Allocations . . . . . . . . . . . . . . 23--29
N. Mittal and
T. R. Belagodu On Maximum Key Pool Size for a Key
Pre-Distribution Scheme in Wireless
Sensor Networks . . . . . . . . . . . . 30--35
L. Jiang and
D. Wang and
Z. Cai and
S. Jiang and
X. Yan Scaling Up the Accuracy of
$K$-Nearest-Neighbour Classifiers: a
Naive-Bayes Hybrid . . . . . . . . . . . 36--43
M. Khemakhem and
A. Belghith A P2P Grid Architecture for Distributed
Arabic OCR Based on the DTW Algorithm 44--49
S. Krishnamurthy and
N. Mittal and
R. Chandrasekaran and
S. Venkatesan Neighbour Discovery in Multi-Receiver
Cognitive Radio Networks* . . . . . . . 50--57
M. R. M. Rizk and
M. I. Dessouky and
S. A. El-Dolil and
M. Abd-Elnaby Fairness and Throughput
Enhancement-Based Random Access Using
Fuzzy Controlled Backoff Interval . . . 58--64
A. I. Al-Shoshan Audio Signal Discrimination Using
Evolutionary Spectrum . . . . . . . . . 69--73
A. Al-Badarneh and
M. Tawil Linear R-Tree Revisited . . . . . . . . 74--83
K. I.-J. Ho and
J. Wu and
J. Sum On Unbounded Zero--One Knapsack With
Discrete-Sized Objects . . . . . . . . . 84--89
J. Monterde and
H. Ugail A Comparative Study Between Biharmonic
Bézier Surfaces and Biharmonic Extremal
Surfaces . . . . . . . . . . . . . . . . 90--96
S. S. Beauchemin and
H. O. Hamshari and
M. A. Bauer Passive Atmospheric Diffusion With
Gaussian Fragmentation . . . . . . . . . 97--108
M. Crocker and
G. Y. Lazarou and
J. Baca and
J. Picone A Bandwidth Determination Method for
IPv6-Based Networks . . . . . . . . . . 109--118
C. Pradabpet and
S. Yoshizawa and
Y. Miyanaga and
K. Dejhan New PAPR Reduction in OFDM Systems By
Hybrid Algorithm of PTS and APPR Methods 119--127
M. Darehmiraki A Parallel Algorithm for Solving Sat
Problem Based on DNA Computing . . . . . 128--131
H. Xu and
L. Xing and
R. Robidoux Drbd: Dynamic Reliability Block Diagrams
for System Reliability Modelling . . . . 132--141
F. Fasano and
R. Oliveto Supporting Project Management with
Fine-Grained Artefact Managementin Adams 145--152
S. Di Martino and
C. Gravino Estimating Web Application Development
Effort Using COSMIC-FFP Method . . . . . 153--158
I. D. Coman and
A. Sillitti Automated Segmentation of Development
Sessions Into Task-Related Subsections 159--166
E. Aranha and
P. Borba Estimating Manual Test Execution Effort
and Capacity Based On Execution Points 167--172
V. Deufemia and
C. Gravino and
M. Risi Automatically Generated Case
Workbenches: A Preliminary Case Study 173--182
M. Benerecetti and
N. Cuomo and
A. Peron An Environment for the Specification And
Verification of Time-Dependent Security
Protocols . . . . . . . . . . . . . . . 183--192
C. Hardebolle and
F. Boulanger Multi-Formalism Modelling and Model
Execution . . . . . . . . . . . . . . . 193--203
C. Vecchiola and
A. Grosso and
A. Passadore and
A. Boccalatte Agentservice: a Framework for
Distributed Multiagent System
Development . . . . . . . . . . . . . . 204--210
A. De Lucia and
F. Ferrucci Preface: Special Issue On Software
Engineering . . . . . . . . . . . . . . 211--212
M. Jou and
J.-K. Shiau and
H.-W. Zhang Application of Web Technologies in
Automation Technology Education . . . . 215--221
R. Gupta and
A. Trivedi A Comparative Study of Different
Rayleigh Fading Channel Simulators . . . 222--229
P. M. Khilar and
S. Mahapatra Time-Constrained Fault Tolerant
X-By-Wire Systems . . . . . . . . . . . 230--238
T. Marwala and
M. Lagazio and
T. Tettey An Integrated Human--Computer System for
Controlling Interstate Disputes . . . . 239--246
C. Liu and
E. Ye and
D. J. Richardson Software Library Usage Pattern
Extraction Using a software Model
Checker . . . . . . . . . . . . . . . . 247--259
P. M. Khilar and
S. Mahapatra A Novel Hierarchical Clustering Approach
for Diagnosing Large Scale Wireless
Adhoc Systems . . . . . . . . . . . . . 260--267
A. Satheesh and
S. Krishnaveni and
S. Ponkarthick Self-Configurable Environment for the
Intel Ixp2400 Network Processor . . . . 268--273
S. Kumar and
R. B. Mishra Towards a framework for Classification
and Recommendation of Semantic Web
Service Composition Approaches . . . . . 274--281
E. M. Saad and
M. H. Awadalla and
R. R. Darwish Adaptive and Energy-Efficient Clustering
Architecture for Dynamic Sensor Networks 282--289
H. Xiong and
F. Li and
Z. Qin Provably Secure Identity Based Threshold
Signature Without Random Oracles . . . . 290--295
N. Alzeidi and
M. O. Khaoua and
A. Khonsari Performance Modelling of Torus
Interconnection Networks with Deep
Buffers . . . . . . . . . . . . . . . . 1--8
L. Bai A Reliable $ (K, N) $ Image Secret
Sharing Scheme with Low Information
Overhead . . . . . . . . . . . . . . . . 9--14
A. H. Al-Badi and
K. Ellithy and
S. Al-Alawi Prediction of Voltages on Mitigated
Pipelines Paralleling Electric
Transmission Lines Using ANN . . . . . . 15--22
A. S. Nargunam and
M. P. Sebastian Self-Organized QoS Aware Multicast
Routing Scheme for Ad Hoc Networks . . . 23--31
I. A. Ismail and
S. F. El-Zoghdy and
A. A. Abdo A Novel Technique for Datahiding . . . . 32--37
A. S. Nargunam and
M. P. Sebastian Cluster-Based MANET Multicast Routing
Scheme . . . . . . . . . . . . . . . . . 38--46
G. T. Jay and
R. K. Smith and
M. Hudnall and
B. Bonds Semi-Structured Information: An
Architecture Improving Search Results
Using Domain Guidance1 . . . . . . . . . 47--55
A. Sudarsanam and
T. Hauser and
A. Dasu and
S. Young A Power Efficient Linear Equation Solver
on A Multi-FPGA accelerator . . . . . . 56--72
S. Bhattacharya and
A. Basu Design of a Word to Sentence Generator
for Augmentative . . . . . . . . . . . . 73--83
S. Merniz and
M. Benmohammed Modelling and Verification of Pipelined
Micro-Architectures: Functional Approach 84--92
A. Sajjanhar and
G. Lu and
D. S. Zhang and
W. Zhou Connectivity-Based Shape Descriptors . . 93--98
J. Kumar and
A. Bansal Application of Neural Network for
Estimating Properties of
Diesel--Biodiesel blends . . . . . . . . 99--103
H. Nemmour and
Y. Chibani Handwritten Digit Recognition Based on a
Neural--SVM Combination . . . . . . . . 104--109
D. Adami and
C. Callegari and
S. Giordano and
M. Pagano Mtens: a New Simulator for the Design of
MPLS Networks with Traffic Engineering
Support . . . . . . . . . . . . . . . . 110--118
T. Pan and
K. Fang An Effective Information Support System
for Medical Management: Indicator Based
Intelligence System . . . . . . . . . . 119--124
J. Shen and
D. Yoon and
D. Zhao and
Y. Song Denoising of Two-Dimensional Geometric
Discontinuities . . . . . . . . . . . . 129--140
S. Dey and
D. Samanta An Efficient and Accurate Pupil
Detection Method for Iris Biometric
Processing . . . . . . . . . . . . . . . 141--148
B. F. Wu and
C.-T. Lin and
C.-J. Chen Real-Time Lane and Vehicle Detection
Based on a Single Camera Model . . . . . 149--159
A. Nyamapfene A Hypermap Approach to Multiple Sequence
Processing . . . . . . . . . . . . . . . 160--166
S. Muknahallipatna and
J. Miles and
J. C. Hamann and
H. L. Johnson Large Fabric Storage Area Networks:
Fabric Simulator Development and
Preliminary Performance Analysis . . . . 167--180
M. Sarma and
R. Mall State-Based Approach to System Testing 181--187
J. Ngubiri and
M. van Vliet Characteristics of Fairness Metrics and
their Effect on Perceived Scheduler
Effectiveness . . . . . . . . . . . . . 188--196
S. Agrawal and
R. S. Yadav and
R. Vijay A Speed Fine Tuning Technique for System
Energy Minimization of Weakly Hard
Real-Time System . . . . . . . . . . . . 197--205
P. Hiranvanichchakorn and
S. Lertvorratham Using Regression Analysis for Improving
Multipath Ad Hoc Network Performance . . 206--214
H. Sneed and
S. Huang Value-Driven Software Maintenance . . . 215--221
A. Sleit and
S. Al-Adaileh and
N. Al-Omari and
H. Hurani Extending the Cluster Map Algorithm
using Automated Cluster Identifier . . . 222--225
D. Song and
W. Ru-Chuan and
F. Xiong and
Y. Le-Chan Gene Expression Programming for
Attribution Reduction in Rough Set . . . 226--231
S. K. Jha and
P. K. Jana and
R. Yadav and
B. Sinha and
S. Srivastava Improved Algorithms for Balanced Ring
Formation for Fault Tolerance in a $2$D
Mesh . . . . . . . . . . . . . . . . . . 232--237
J. Chen and
T. S. Chen and
C. N. Lin and
C. Y. Cheng A Bitrate Controlled Data Hiding Scheme
for Jpeg2000 . . . . . . . . . . . . . . 238--241
R. Sammouda Data-Dependent Weight Initialization in
the Hopfield Neural Network Classifier:
Application to Natural Colour Images . . 242--249
D. S. Saini and
N. Sharma OVSF Code Assignment Schemes at the
Forward Link of WCDMA Systems . . . . . 253--260
L. Xiangdong and
Z. Yuelong and
C. Songqiao and
Y. Xiaoli A Multiversion Optimistic Concurrency
Control Protocol in Mobile Broadcast
Environments . . . . . . . . . . . . . . 261--266
C. Y. Chou and
C. J. Lin and
J. L. Lu and
T. W. Chan Supporting Variable Dyad Learning
Activities in an Instructional Game
System . . . . . . . . . . . . . . . . . 267--274
K. L. Hsieh Value Expansion Expert System (CVE-ES)
in Taiwanese Leisure Farming . . . . . . 275--281
L. Chunlin and
L. Layuan Multiple Granularity Control Scheme for
System Utility Optimization in Grid
Environments . . . . . . . . . . . . . . 282--289
S. Bhattacharya and
D. Samanta and
A. Basu Model-Based Design of Scanning Input
Communication Aids: State of the Art and
Research Issues . . . . . . . . . . . . 290--296
S. Sharafeddine On Network Planning for Video Services
Over IP Networks . . . . . . . . . . . . 297--308
H. Yuan and
Y. Ye and
J. Deng Iterative Sib Algorithm Based On
Simulated Annealing . . . . . . . . . . 309--317
I. S. Moskowitz and
F. Ahmed and
P. A. Lafferty Information Theoretic Effects of JPEG
Compression on Image Steganography . . . 318--327
L. Jiang and
Z. Cai and
D. Wang Improving Naive Bayes for Classification 328--332
J. L. Kuo and
K. L. Chao Data-Dependency Decomposition of Colour
Space Transformation for Microprocessor
By Using Parallel Sa-C Programming . . . 333--340
C. Jin Adaptive Digital Watermark System Using
Soft Computation . . . . . . . . . . . . 341--346
R. Leela and
S. Selvakumar Dynamic Multi Constraint Multi Path QOS
Routing Algorithm (DMCMPRA) . . . . . . 347--354
H. Al-Bahadili and
A. Rababa'a A Bit-Level Text Compression Scheme
Based on the HCDC Algorithm . . . . . . 355--361
A. Sarkar and
S. Choudhury and
N. Chaki and
S. Bhattacharya Quality Evaluation of Conceptual Level
Object-Oriented Multidimensional Data
Model . . . . . . . . . . . . . . . . . 362--371
F. Wang and
H. Li and
R. Li Non-Parametric Generalized Cross Entropy
Estimator for BSS Algorithm . . . . . . 372--380
I. A. Ismail and
M. Amin and
H. Diab An Efficient Adaptive Ergodic Matrix and
Chaotic System for Image Encryption . . 381--388
Tick H. Oh JPEG2000 and JPEG: Image Quality
Comparison of Compressed Medical
Modalities . . . . . . . . . . . . . . . 393--398
Tianjie Cao and
Dongdai Lin and
Rui Xue Universal Designated-Verifier Partially
Blind Signatures for E-Commerce . . . . 399--403
Tissa Chandesa and
Michael Hartley Automated Sketcher Using Edge Detection
Techniques . . . . . . . . . . . . . . . 404--411
Chi-Chou Kao Performance-Driven Methods for Fine
Granularity Scalable Video Coding . . . 412--419
Yung-Gi Wu Image Enlargement by Lagrange
Interpolation . . . . . . . . . . . . . 420--427
Padmanabhan Sankar and
Chinnagounder Chellamuthu Study and Simulation of Video Streaming 428--434
Kostas Pentikousis and
Hussein Badr and
Asha Andrade A Comparative Study of Aggregate TCP
Retransmission Rates . . . . . . . . . . 435--441
Balachandra Muniyal and
Prema K. Venkat Reddy An Efficient Method to Merge
Hierarchical Public Key Infrastructures 442--446
Perumal Ganeshkumar and
Kuppusamy Thyagarajah Balancing Throughput and Fairness for
Concurrent Flows Based on Per Flow
Scheduling in Ad Hoc Networks . . . . . 447--454
Shashikant U. Ghumbre and
Ashok A. Ghatol An Intelligent System for Hepatitis B
Disease Diagnosis . . . . . . . . . . . 455--460
Hassan Y. Ahmed and
Ibrahima Faye and
Naufal bin M. Saad and
Syed A. Aljunid OCDM a System: New Detection Scheme and
Encoder--Decoder Structure Based on
Fibre Bragg Gratings (FBGs) for VCC Code 461--468
Jia Yu and
Rong Hao and
Fanyu Kong and
Xiangguo Cheng and
Huawei Zhao and
Chen Yangkui Identity-Based Forward Secure Threshold
Signature Scheme Based on Mediated RSA 469--475
Jia Yu and
Rong Hao and
Fanyu Kong and
Xiangguo Cheng and
Huawei Zhao and
Yangkui Chen Cryptanalysis of a Type of Forward
Secure Signatures and Multi-Signatures 476--481
Weiyi Zhang and
Jun Kong and
Kendall Nygard and
Ming Li Adaptive Design of Pervasive Computing
System Under QoS Constraints1 . . . . . 482--492
Patrik Österberg and
Tingting Zhang Multicast-Favourable Max-Min Fairness
--- The Definition and How to Comply . . 1--8
Chi-Chou Kao and
Chia-Nan Yeh and
Yen-Tai Lai Low-Energy Cluster Head Selection for
Clustering Communication Protocols in
Wireless Sensor Network . . . . . . . . 9--14
Anchare V. Babu On Selection of Optimal Physical Layer
Parameters for Wireless Sensor Networks
Over Rayleigh Fading Channels . . . . . 15--21
Ritesh Parikh and
Santanu Chattopadhyay Power-Aware Multi-Level AND-XOR Network
Synthesis . . . . . . . . . . . . . . . 22--28
Ioannis Legakis and
Michalis A. Savelonas and
Dimitris Maroulis and
Dimitris K. Iakovidis Computer-Based Nodule Malignancy Risk
Assessment in Thyroid Ultrasound Images 29--35
Ghanshyam Singh and
Rajendra P. Yadav and
Vijay Janyani Design of Symmetric and Asymmetric $ 2
\times 2 $ all Optical Ti:LiNbO$_3$
Machzehnder Interferometric Switches . . 36--40
Omaima Nomir Iris Biometrics: Human Identification
Using Force Field . . . . . . . . . . . 41--48
Michael VanHilst and
Shihong Huang and
Hugh Lindsay Process Analysis of a Waterfall Project
Using Repository Data . . . . . . . . . 49--56
Li Chunlin and
Li Layuan Device Resource Allocation in
Context-Aware Mobile Grid . . . . . . . 57--63
Li-Feng Liu and
Yan-Yun Qu and
Cui-Hua Li and
Yuan Xie Multi-Class Spectral Clustering Based on
Particle Swarm Optimization . . . . . . 64--69
Chantana Phongpensri (Chantrapornchai) and
Saran Keinprapai and
Opas Wongtaveesap and
Kanok Hournkumnuard and
Sergei Gorlatch Parallel Algorithm and Visualization of
High Gradient Magnetic Separation of
Nanoparticles . . . . . . . . . . . . . 70--82
Ismail Shahin Speaker Identification in Each of the
Neutral and Shouted Talking Environments
Based on Gender-Dependent Approach Using
SPHMMS . . . . . . . . . . . . . . . . . 83--91
Mohammad K. Ayoubloo and
Hazi Md. Azamathulla and
Zulfequar Ahmad and
Aminuddin Ab. Ghani and
Javad Mahjoobi and
Amin Rasekh Prediction of Scour Depth in Downstream
of Ski-Jump Spillways Using Soft
Computing Techniques . . . . . . . . . . 92--97
Yaodong Cui and
Tianlong Gu and
Wei Hu Recursive Algorithms for the Optimum
Cutting of Equal Rectangles . . . . . . 103--107
Sandanam Domnic and
Karuppanagounder Somasundaram Fast and Low Bit-Rate AMBTC Image
Compression Scheme . . . . . . . . . . . 108--115
Ing-Jr Ding Improvement of Map-VFS Adaptation
Performance by Fuzzy Control . . . . . . 116--123
Bindu Goel and
Yogesh Singh An Empirical Analysis of Metrics to
Predict the Software Defect Fix-Effort 124--131
Zuowen Tan Comments on a Threshold Authenticated
Encryption Scheme . . . . . . . . . . . 132--136
Michael E. Sone and
Ndeh N. Ningo A Simple FPGA-Based Wireless
Transmitter/Receiver Convolutional
Cryptosystem . . . . . . . . . . . . . . 137--143
Zouheir Trabelsi and
Khaled Shuaib Implementation of an Effective and
Secure Biometrics-Based Student
Attendance System . . . . . . . . . . . 144--153
Lu Hong and
Feng Hong and
Zhongwen Guo and
Ying Guo HCR: a Hybrid MAC Protocol for
Underwater Sensor Networks Using Channel
Reservation . . . . . . . . . . . . . . 154--159
Yaser M. A. Hamid and
Daya K. Lobiyal COMPOW-Based PCM Protocol for Multi-Hop
Manet . . . . . . . . . . . . . . . . . 160--166
Takao Shimomura and
Kenji Ikeda and
Muneo Takahashi Functional Web Component Generation for
Visual Web Application Programming . . . 167--174
Carlos Almeida Timely and Dependable QoS Adaptation in
Quasi-Synchronous Systems . . . . . . . 179--188
Anuja Meetoo and
Kavi K. Khedo Saisense: a Novel Scalable, Adaptive and
Intelligent Context-Aware Architecture 189--201
Masaru Fujieda and
Takahiro Murakami and
Yoshihisa Ishida An Approach to Multi-Pitch Estimation
Using a Support Vector Machine . . . . . 202--210
Dakshina R. Kisku and
Hunny Mehrotra and
Phalguni Gupta and
Jamuna K. Sing Robust Multi-Camera View Face
Recognition . . . . . . . . . . . . . . 211--219
Kun-Ching Wang Voice Activity Detector for Noise
Spectrum Estimation Using a Dynamic
Band-Splitting Entropy Estimate . . . . 220--228
Maria Kalavathy Gnanamani and
Seethalakshmi Pandian Designing Dynamic Composite Media
Service and Monitoring Its Run-Time
Performance . . . . . . . . . . . . . . 229--237
Hui-Min Huang and
Jia-Lin Chang Novel Handoff Method for the Integrated
$3$G and Nemo Network . . . . . . . . . 238--244
Ashutosh Gupta and
Suneeta Agarwal A Novel Approach for Compressing DNA
Sequences Using Semi-Statistical
Compressor . . . . . . . . . . . . . . . 245--251
Li Chunlin and
Li Layuan A Market-Based Resource Allocation
Policy in Ad Hoc Grid . . . . . . . . . 252--257
Chaoqun Li and
Hongwei Li Learning Random Model Trees for
Regression . . . . . . . . . . . . . . . 258--265
Tarek Guesmi and
Salem Hasnaoui and
Houria Rezig and
Ouajdi Korbaa Design and Implementation of a Global
Scheduling Strategy for Data
Distribution Over CAN-Based Networks . . 271--283
Smriti H. Bhandari and
Sunil M. Deshpande Analysis of Engineered Surfaces for
Product Quality Monitoring . . . . . . . 284--292
Wei-Po Lee and
Li-Jen Liu and
Jeng-An Chiou A Component-Based Framework for Rapidly
Developing Online Board Games . . . . . 293--302
Jyhjong Lin Enhancing Customer Relationships with
Customer Knowledge Management and P2P
(Peer-To-Peer) Technology . . . . . . . 303--315
Arun Manoharan and
Ammasi Krishnan Power Analysis of Multiple Hashing Bloom
Filter Architecture for Network
Applications . . . . . . . . . . . . . . 316--322
Ritsuya Ikeda and
Kensuke Narita and
Shin-ya Nishizaki Cooperation of Model Checking and
Network Simulation for Cost Analyses of
Distributed Systems . . . . . . . . . . 323--329
Rong Hao and
Jia Yu and
Zhiling Song A Note On a Threshold Verifiable
Multi-Secret Sharing Scheme . . . . . . 330--334
Mohamed Abd-ElRahman Abdou A Fuzzy Wavelet-Based Approach to a
Novel Image Denoising Engine . . . . . . 335--340
Chaoqun Li and
Hongwei Li Correlation Weighted Heterogeneous
Euclidean-Overlap Metric . . . . . . . . 341--346
Natheer Khasawneh and
Maisa M. Al-Khudair and
Mohammad Fraiwan On Using Classification Techniques for
Corpus Reduction in Arabic
Text-To-Speech Systems . . . . . . . . . 347--354
Phichhang Ou and
Hengshan Wang Forecasting Volatility Switching ARCH by
treed Gaussian process with Jumps to the
Limiting Linear Model . . . . . . . . . 355--361
Lalit K. Awasthi and
Manoj Misra and
Ramesh C. Joshi An Efficient Coordinated Checkpointing
Approach for Distributed Computing
Systems with Reliable Channels . . . . . 1--10
Kuo-Ming Hung and
Yen-Liang Chen and
Ching-Tang Hsieh Image Inpainting Based On Geometric
Similarity . . . . . . . . . . . . . . . 11--18
Zdravko Karakehayov Zeta: Zero Energy Transmissions Algebra
for Wireless Sensor Networks . . . . . . 19--24
Blanca T. Abraham and
Jose L. Aguilar Middleware for Improving Performance in
a Component-Based Software Architecture 25--28
Subba Reddy Basappa and
Udaya Kumar Simulation of Surface and Volume Stress
for High Voltage Transmission Insulators 29--35
Sethuraman Santhoshbaboo and
Balakrishnan Narasimhan A QoS Backbone Based Minimum Delay
Routing Protocol for Mobile \em Ad Hoc
Networks . . . . . . . . . . . . . . . . 36--41
Nikos Papadakis and
Pavlos Kefalas and
Antonis Delidakis and
Kostas Papadakis An Approach of a Logic Resolver in a
Distributed Peer-To-Peer System . . . . 42--47
Yanlong Wang and
Jinhua Liu and
Ting Zhang and
Jin Zhang $3$-D Porous Media Reconstruction using
a $2$-D Micro-CT Image and MPS . . . . . 48--54
Hu Xiong and
Zhi Guan and
Zhong Chen On the Security of a Pairing-Based
Signcryption Scheme using Self-Certified
Public Keys . . . . . . . . . . . . . . 55--57
Layale Bassil and
Iyad Ouaiss Optimizing Functional Unit Binding
During High-Level Synthesis . . . . . . 58--65
Thenkarai N. Janakiraman and
John Janet L. Rani Double Star Embedded Clustering
Algorithm for Wireless \em Ad Hoc
Networks Using Ranking . . . . . . . . . 71--80
Omaima Nomir Human Identification: a new X-Ray Dental
Radiographs Segmentation Algorithm using
Graphcut . . . . . . . . . . . . . . . . 81--89
Kalavathy Sundarrajan and
Ramalingam Suresh An Efficient Neighbourhood Pixel
Filtering Algorithm for Wavelet-Based
Image Denoising . . . . . . . . . . . . 90--97
Rong Hao and
Jia Yu and
Jing Li and
Zhiling Song Forward Secure Threshold Signature
Scheme in the Standard Model . . . . . . 98--104
Amany Sarhan and
Rasha Mahmoud and
Mohamed Faheem Spatio-Temporal Error Concealment
Algorithms for Encoded Video Streams for
Real-Time Applications . . . . . . . . . 105--118
Takao Shimomura Automated Server-Side Regression Testing
for Web Applications . . . . . . . . . . 119--126
Jemi Florinabel Deva and
Ebenezer Juliet Selwyn and
Sadasivam Velayuthum Fast Orientation-Driven Multi-Structure
Morphological Inpainting . . . . . . . . 127--134
Gurusamy Jeyakumar and
Chinthamani Nathan S. Velayutham Differential Evolution and Dynamic
Differential Evolution Variants --- An
Empirical Comparative Performance
Analysis . . . . . . . . . . . . . . . . 135--144
John B. Oladosu and
Justice O. Emuoyibofarhe A Yoruba--English Language Translator
for Doctor--Patient Mobile Chat
Application . . . . . . . . . . . . . . 149--156
Raj K. Samanta and
Partha Bhattacharjee and
Goutam Sanyal Analysis of Cellular Wireless Networks
with Non-Classical Traffic and Channel
Reservation . . . . . . . . . . . . . . 157--165
Joseph Michael M. Mathana and
Parthasarathy Rangarajan Reconfigurable Architecture For High
Performance Turbo Decoder . . . . . . . 166--173
Supachote Lertvorratham and
Pipat Hiranvanichakorn Integrating Secure Multipath Mobile Ad
Hoc Network With Self-Authentication
Strategy . . . . . . . . . . . . . . . . 174--184
Seonho Choi and
Hyeonsang Eom and
Edward Jung Securing Wireless Sensor Networks
Against Broadcast Service Attacks . . . 185--191
Takao Shimomura Command Tag-Based Automatic Diagnosis
For Computer System Troubles . . . . . . 192--199
Bo-Jhih Chen and
Shen-Chuan Tai and
Yung-Gi Wu A Gaussian Rate-Distortion Method For
Detecting Zero-Quantized Blocks . . . . 200--212
Qing Liu and
Lu-Ping Xu and
Yi-De Ma and
Yong Wang and
Qiang Xie Bilateral Filtering for Image Processing
Based on Pulse Coupled Neural Networks 217--222
Hailiang Shi and
Xiangjun Xin Fusion of Panchromatic and Multispectral
Image Based On PCA and NSCT . . . . . . 223--228
Tianyi Li and
Minghui Wang and
Zujian Huang An Improved Wavelet-Based Approach for
Estimating the Variance of Noise in
Images . . . . . . . . . . . . . . . . . 229--234
Li Chunlin and
Chen Gang and
Li Layuan Sensor Data Integration With The Grid:
Model and Algorithm . . . . . . . . . . 235--240
Ashish K. Sharma and
Jitendra Sharma and
Ilesh C. Mehta A Novel Fuzzy Integrated Technical
Requirements Prioritization Software
System for Quality Function Deployment 241--248
Kelsey A. Ramirez-Gutierrez and
Mariko Nakano-Miyatake and
Hector M. Perez-Meana Improvement of Radon Transform-Based
Perceptual Hashing using Image
Normalization . . . . . . . . . . . . . 249--259
Monickaraj Vigilson Prem and
Sankaranarayanan Swamynathan Code and Itinerary Security for Mobile
Agents . . . . . . . . . . . . . . . . . 260--266
Xiangguo Cheng and
Lifeng Guo and
Jia Yu and
Huiran Ma and
Yuexiu Wu A New Identity-Based Group Signature
Scheme . . . . . . . . . . . . . . . . . 1--5
Sikamony S. Kumar and
Rama S. Moni and
Jayapathy Rajeesh Automatic Segmentation of Liver Tumour
using a Possibilistic Alternative Fuzzy
C-Means Clustering . . . . . . . . . . . 6--12
Sriraman A. Padmanabhan and
Soundarrajan Chandramathi A Wavelet-Based Video Compression using
Adaptive Rood Search with
Spatio-Temporal Correlation and LSK . . 13--21
Gouri S. Maharana and
Pramod K. Meher and
Basant K. Mohanty Efficient Systolic Architecture for VLSI
Realization of $2$-D Hartley-Like
Transform . . . . . . . . . . . . . . . 22--28
Yuet M. Lam Solution Space Reduction in Task
Scheduling for Heterogeneous Computing
Systems . . . . . . . . . . . . . . . . 29--35
Ahmed Louchene and
Ammar Dahmani Watermarking Method Resilient to RST and
Compression Based on DWT, LPM and Phase
Correlation . . . . . . . . . . . . . . 36--43
Hu Xiong and
Yanan Chen and
Zhong Chen and
Fagen Li Simple Three-Party Password-Based Key
Exchange Protocol with Provable Security 44--50
Liang Zhiwei and
Chen Yanyan and
Zhu Songhao Resource Service Access Mechanism for
Service Robots . . . . . . . . . . . . . 51--57
Goutam Sarker An Optimal Backpropagation Network for
Face Identification and Localization . . 63--69
Takao Shimomura Semantic Program Visualization with
Attachable Display Classes . . . . . . . 70--78
Fella Charif and
Noureddine Djedi and
Abderrazak Benchabane On Parallel Implementation of Horn and
Schunck Motion Estimation Method . . . . 79--85
Hiroyoshi Jutori and
Kanemitsu Ootsu and
Takashi Yokota and
Takanobu Baba Dynamic Selection of Speculative Paths
in Two-Path Limited Speculation Method 86--95
Rohilah Sahak and
Wahidah Mansor and
Khuan Y. Lee and
Azlee Zabidi and
Ahmad I. M. Yassin Optimization of Principal Component
Analysis and Support Vector Machine for
the Recognition of Infant Cry with
Asphyxia . . . . . . . . . . . . . . . . 99--107
Da Li and
Yibin Hou Multiprocessor Systems Auto-Design for
Multiple Use-Case Applications on FPGA 108--113
Li Ding and
Dana Steil and
Brandon Dixon and
Nicholas A. Kraft and
David B. Brown and
Allen Parrish First: Framework to Integrate
Relationship Search Tools . . . . . . . 114--124
Shanker Keshavdas and
Geert-Jan M. Kruijff Functional Mapping for Human--Robot
Collaborative Exploration . . . . . . . 125--135
Yuanwei Wei and
Yali Xue and
Jiongyu Yin and
Weidou Ni Prediction of Municipal Solid Waste
Generation in China by Multiple Linear
Regression Method . . . . . . . . . . . 136--140
Soumalya Ghosh and
Debasis Samanta Analysis on User Errors in Virtual
Keyboards . . . . . . . . . . . . . . . 145--151
Basilis Mamalis and
Grammati Pantziou and
Georgios Dimitropoulos and
Dimitris Kremmydas Highly Scalable Parallelization of
Standard Simplex Method on a
Myrinet-Connected Cluster Platform . . . 152--161
Chia-Ying Chang and
Shen-Chuan Tai Image Enhancement Algorithm Based on
Zone System and Dual-Exposure Techniques 162--172
Guoming Chen and
Qiang Chen and
Dong Zhang and
Yiqun Chen A Watermarking Scheme Based on
Compressive Sensing and Bregman
Iteration . . . . . . . . . . . . . . . 173--180
Nida S. Khan and
Asma S. Larik and
Quratulain Rajput and
Sajjad Haider A Bayesian Approach for Suspicious
Financial Activity Reporting . . . . . . 181--187
Kundu Anirban Efficient Bandwidth Utilization for
Downloading Web Pages . . . . . . . . . 1--6
Daniel V. de Macedo and
Maria Andréia F. Rodrigues and
João J. V. P. Furtado and
Elizabeth S. Furtado and
Daniel A. Chagas Using and Evaluating Augmented Reality
for Mobile Data Visualization in Real
Estate Classified Ads . . . . . . . . . 7--14
Yuet M. Lam and
Wayne Luk A Many-Core Based Parallel Tabu Search 15--22
Shen-Chuan Tai and
Chia-Ying Chang and
Bo-Jhih Chen and
Yu-Yi Liao and
Yung-Gi Wu Early Termination for Residual Quadtree
Decision-Making in HEVC . . . . . . . . 23--33
Mamdouh Alenezi and
Kenneth Magel Empirical Evaluation of a New Coupling
Metric: Combining Structural and
Semantic Coupling . . . . . . . . . . . 34--44
Kamaraj Arunachalam and
Marichamy Perumalsamy and
C. Kalyana Sundaram and
J. Senthil Kumar Design and Implementation of a
Reversible Logic Based $8$-Bit
Arithmetic and Logic Unit . . . . . . . 49--55
Coimbatore K. Shyamala and
Tattamangalam R. Padmanabhan A Trust--Reputation Model Offering Data
Retrievability and Correctness in
Distributed Storages . . . . . . . . . . 56--63
Guermoui Mawloud and
Melaab Djame Modified Local Binary Pattern for Human
Face Recognition Based on Sparse
Representation . . . . . . . . . . . . . 64--71
Kun Ma and
Fusen Dong and
Bo Yang Incremental Object Matching Approach of
Schema-Free Data with Mapreduce . . . . 72--77
Parul Pandey and
Maheshwari Tripathi The Wheel Quorum Protocol: An Efficient
Approach for Reading Replicated Data . . 78--83
Seyedeh B. Ayati and
Kaddour Bouazza-Marouf and
David Kerr and
Michael O'Toole Haematoma Detection Using EIT in a Sheep
Model . . . . . . . . . . . . . . . . . 87--92
Abubaker Wahaballa and
Osman Wahballa and
Fagen Li and
Mohammed Ramadan and
Zhiguang Qin Multiple-Layered Securities Using
Steganography and Cryptography . . . . . 93--100
Abba Suganda Girsang and
Chun-Wei Tsai and
Chu-Sing Yang Multi-Objective Particle Swarm
Optimization for Repairing Inconsistent
Comparison Matrices . . . . . . . . . . 101--109
Walid Emar and
Sofyan Hayajneh and
Musbah J. Aqel A Computer Based Sliding Mode Controller
Topology for Nonlinear Voltage
Regulating Chopper . . . . . . . . . . . 110--114
Ganasigamony W. Jiji and
Peter Raj J. D. Savariraj Retrieval in Dermatology using
Intelligent Techniques . . . . . . . . . 115--124
Shang Gao and
Hualong Yu and
Ling Qiu and
Cungen Cao The Wading Across Stream Algorithm . . . 127--132
Chakrapani Venkataramanan and
Selvaraj M. Girirajkumar Markov Fuzzy Based MAC Protocol for Life
Time Maximization of Wireless Sensor
Network . . . . . . . . . . . . . . . . 133--139
Sai P. Kadiyala and
Debasis Samanta Clock-Gating Approach to Low Power
Domino Circuit Synthesis . . . . . . . . 140--147
Junqiang Zhang and
Chonglong Wu and
Junqi Liu and
Haihua Hu The Research of Three-Dimensional
Integrated Framework of Landslide
Disaster Monitoring Data . . . . . . . . 148--154
Samia Belkacem and
Zohir Dibi and
Ahmed Bouridane DCT Coefficients Modelling for Image
Watermarking . . . . . . . . . . . . . . 155--163
John O'Farrell and
Sanjeev Baskiyar Enhanced real-time performance using a
secondary bus for cache write-backs . . 1--9
G. Ravi and
K. R. Kashwan Performance analysis of an energy aware
zone routing protocol using span . . . . 10--16
Jeevan M. Meruga and
Carly Fountain and
Jon Kellar and
Grant Crawford and
Aravind Baride and
P. Stanley May and
William Cross and
Randy Hoover Multi-layered covert QR codes for
increased capacity and security . . . . 17--27
Abubaker Wahaballa and
Zhen Qin and
Hu Xiong and
Zhiguang Qin and
Mohammed Ramadan A taxonomy of secure electronic English
auction protocols . . . . . . . . . . . 28--36
Zih-Siou Chen and
Shen-Chuan Tai Corrected center-surround retinex:
application to tone reproduction for
high dynamic range images . . . . . . . 37--51
\vZeljka Mihajlovi\'c and
Sini\vsa Popovi\'c and
Kre\vsimir \'Cosi\'c Interactive scenario control in virtual
environments . . . . . . . . . . . . . . 53--59
Yung-Gi Wu and
Sheng-Lun Tsai Fall event detection by gyroscopic and
accelerometer sensors in smart phone . . 60--66
Kai Chain and
Wen-Chung Kuo and
Kuei-Hu Chang Enhancement key agreement scheme based
on chaotic maps . . . . . . . . . . . . 67--72
Parag Kumar Guha Thakurta and
Sujoy Sett Joint routing in mobile networks: a
weighted optimization approach . . . . . 73--81
Shen-Chuan Tai and
Ting-Chou Tsai and
Jui-Chiang Wen Single image dehazing based on vector
quantization . . . . . . . . . . . . . . 83--93
Zhi Liu and
Sanya Liu and
Lin Liu and
Meng Wang and
Jianwen Sun and
Xian Peng A discriminative random sampling
strategy with individual-author feature
selection for writeprint recognition of
Chinese texts . . . . . . . . . . . . . 94--101
Alagumani Selvaraj and
Subashini Sundararajan Survey on public auditability to ensure
data integrity in cloud storage . . . . 102--110
Yin Yang and
Wenyi Li and
Manning Zhang and
Xiaomei Ding and
Jing Dai Disk failure prediction model for
storage systems based on disk SMART
technology . . . . . . . . . . . . . . . 111--119
Zhu Zhu and
Julang Jiang and
Xiaoguo Zhang Edge-preserving regularized filter with
visual perception outlier measurement 120--126
Romany F. Mansour Using adaptive mutation to accelerate
the convergence of immune algorithms for
prediction of $3$D molecular structure 127--133
Amira Yahi and
Kamel Messaoudi and
Salah Toumi and
El-bay Bourennane Real-time hardware implementation of a
speed FSBMA used in H.264/AVC . . . . . 134--142
Beulah David and
Dorai Rangasamy Spatial-contextual texture and edge
analysis approach for unsupervised
change detection of faces in counterfeit
images . . . . . . . . . . . . . . . . . 143--159
Chi-Chou Kao and
Yen-Tai Lai and
Chao-Feng Tseng Improved edge-directed super resolution 160--167
G. Wiselin Jiji Analysis of functionality of left
ventricle . . . . . . . . . . . . . . . 168--180
Chunhua Jin and
Chunxiang Xu and
Fagen Li and
Xiaojun Zhang A novel certificateless deniable
authentication protocol . . . . . . . . 181--192
Ju-Yuan Hsiao and
Shu-Ju Chuang and
Po-Yueh Chen A hybrid face recognition system based
on multiple facial features . . . . . . 1--8
Ibrahim El-Henawy and
Kareem Ahmed Accelerating convergence of
backpropagation for multilayer
perceptron neural networks: a case study
on character bit-mapped pixel image to
ASCII conversion . . . . . . . . . . . . 9--18
Kun Ma and
Bo Yang and
Ajith Abraham Asynchronous data translation framework
for converting relational tables to
document stores . . . . . . . . . . . . 19--28
Hema Banati and
Nidhi Arora Detecting communities in complex
networks --- a discrete hybrid
evolutionary approach . . . . . . . . . 29--40
Issam Dagher and
Rima Antoun Different PCA scenarios for email
filtering . . . . . . . . . . . . . . . 41--54
V. Ramachandran and
C. Sekar $ (1, N) $-arithmetic graphs . . . . . . 55--59
B. Pakkiraiah and
G. Durga Sukumar A new modified MPPT controller for
improved performance of an asynchronous
motor drive under variable irradiance
and variable temperature . . . . . . . . 61--74
Manish Kashyap and
Mahua Bhattacharya Detectors and descriptors for
registration of illumination varying,
globally distorted images . . . . . . . 75--81
Mili Ghosh and
Debarka Mukhopadhyay and
Paramartha Dutta A study on 2 dimensional 2 Dot 1
Electron quantum dot cellular automata
based reversible 2:1 MUX design: an
energy analytical approach . . . . . . . 82--95
Dipankar Santra and
Krishna Sarker and
Anirban Mukherjee and
Arindam Mondal Hybrid PSO-ACO technique to solve
multi-constraint economic load dispatch
problems for 6-generator system . . . . 96--115
Nanda Dulal Jana and
Jaya Sil Interleaving of particle swarm
optimization and differential evolution
algorithm for global optimization . . . 116--133
Sujit Kumar Das and
Bibhas Chandra Dhara Arithmetic coding based secret image
sharing with inverted pattern LSB
substitution for share hiding to achieve
better quality stego images . . . . . . 134--143
Parul Agarwal and
Shikha Mehta Enhanced flower pollination algorithm on
data clustering . . . . . . . . . . . . 144--155
Utpal Nandi and
Jyotsna Kumar Mandal Efficiency of adaptive fractal image
compression with archetype
classification and its modifications . . 156--163
Pankaj Pal and
Siddhartha Bhattacharyya and
Ashish Mani Pure color object extraction from a
noisy state using quantum version
parallel self organizing neural network 164--186
Ahmed Abdulateef Mohammed and
Atul Sajjanhar Experimental comparison of approaches
for feature extraction of facial
attributes . . . . . . . . . . . . . . . 187--198
Ashutosh Sharma and
Manish Kumar Goyal Bayesian network for monthly rainfall
forecast: a comparison of K2 and MCMC
algorithm . . . . . . . . . . . . . . . 199--206
Zeeshan Ali Siddiqui and
Kirti Tyagi A critical review on effort estimation
techniques for
service-oriented-architecture-based
applications . . . . . . . . . . . . . . 207--216
Xu Huang and
Raul Fernandez Rojas and
Allan C. Madoc and
Dua'a Ahmad Evidentiary assessment for protecting
WSNs from internal attacks in real-time 1--8
Arran Stewart and
Rachel Cardell-Oliver and
Rowan Davies A fine-grained framework for quantifying
secure management of state in
object-oriented programs . . . . . . . . 9--16
A. Mani Probabilities, dependence and rough
membership functions . . . . . . . . . . 17--35
Saswati Ghosh Design and testing of rectifying antenna
for RF energy scavenging in GSM 900 band 36--44
K. K. Soundra Pandian and
K. C. Ray An algorithm and architecture for
non-recursive pseudorandom sequence
generation using sequence folding
technique . . . . . . . . . . . . . . . 45--56
Anonymous Corrigendum . . . . . . . . . . . . . . 57--57
Srilekha Mukherjee and
Goutam Sanyal Enhanced Position Power First Mapping
(PPFM) based image steganography . . . . 59--68
Vishank Bhatia and
V. Kalaichelvi and
R. Karthikeyan Comparison of GA tuned fuzzy logic and
NARMA-L2 controllers for motion control
in $5$-DOF robot . . . . . . . . . . . . 69--78
Nikki Robins and
Patricia A. H. Williams and
Krishnun Sansurooah An investigation into remnant data on
USB storage devices sold in Australia
creating alarming concerns . . . . . . . 79--90
Kareem Ahmed and
Ibrahim El-Henawy Increasing robustness of Data Encryption
Standard by integrating DNA cryptography 91--105
Masood Mansoori and
Ian Welch and
Kim-Kwang Raymond Choo and
Roy A. Maxion and
Seyed Ebrahim Hashemi Real-world IP and network tracking
measurement study of malicious websites
with HAZOP . . . . . . . . . . . . . . . 106--121
E. A. Zanaty and
S. F. El-Zoghdy A novel approach for color image
segmentation based on region growing . . 123--139
S. Sivanaga Malleswara Rao and
K. Venkata Rao and
K. Hemachandra Reddy and
Ch. V. S. Parameswara Rao Prediction and optimization of process
parameters in wire cut electric
discharge machining for high-speed steel
(HSS) . . . . . . . . . . . . . . . . . 140--147
Ismat Beg and
Tabasam Rashid A fuzzy similarity measure based on
equivalence relation with application in
cluster analysis . . . . . . . . . . . . 148--154
Qasim Ali Arain and
Hina Memon and
Imran Memon and
Muhammad Hammad Memon and
Riaz Ahmed Shaikh and
Farman Ali Mangi Intelligent travel information platform
based on location base services to
predict user travel behavior from
user-generated GPS traces . . . . . . . 155--168
Kalyani Krishnan and
Reshmy Krishnan and
Ayyakannu Muthumari A semantic-based ontology mapping ---
information retrieval for mobile
learning resources . . . . . . . . . . . 169--178
K. Sehil and
M. Darwish Critical analysis of power conversion
topologies for stand-alone PV systems
with super-capacitor . . . . . . . . . . 179--188
Chi-Chou Kao Improved feature extraction and
classification methods for
electroencephalographic signal based
brain--computer interfaces . . . . . . . 189--197
Matthew Russell and
Jeremy Straub Characterization of command software for
an autonomous attitude determination and
control system for spacecraft . . . . . 198--209
Xia Chen and
Chang Lu and
Qiaoyu Tan and
Guoxian Yu Semi-supervised classification based on
clustering adjusted similarity . . . . . 210--219
Yi Lu and
Cuicui Bi and
Nijia Ye and
Hu Bo Auto-establishing simulation parallel
manipulators with linear legs and
auto-solving their workspaces by
utilizing CAD variation geometry . . . . 220--233
Anonymous Editorial Board . . . . . . . . . . . . (ei)
Thekra Aldouri and
Mhand Hifi A hybrid reactive search for solving the
max-min knapsack problem with
multi-scenarios . . . . . . . . . . . . 1--13
Amid Khatibi Bardsiri A new combinatorial framework for
software services development effort
estimation . . . . . . . . . . . . . . . 14--24
Jeng Feng Chin and
Joshua Prakash and
Shahrul Kamaruddin and
Melissa Chea Ling Tan Automating computer simulation and
statistical analysis in production
planning and control research . . . . . 25--41
Ali Belhocine and
Wan Zaidi Wan Omar A numerical parametric study of
mechanical behavior of dry contacts
slipping on the disc-pads interface . . 42--60
Al-Sakib Khan Pathan and
Zubair Md Fadlullah Foreword from the Editors-in-Chief . . . 61--62
Rumpa Hazra and
Shouvik Dey and
Jayashree Singha Modeling, analysis and verification of
real-time resource access control
protocols: a formal approach . . . . . . 63--72
Rahul Desai and
B. P. Patil Adaptive routing based on predictive
reinforcement learning . . . . . . . . . 73--81
Guodong Li and
Qian Liu and
Shuo Bai A novel model to improve network
performance . . . . . . . . . . . . . . 82--87
R. R. Bhavani and
G. Wiselin Jiji Image registration for varicose ulcer
classification using KNN classifier . . 88--97
Laxman Singh and
Zainul Abdin Jaffery Computerized detection of breast cancer
in digital mammograms . . . . . . . . . 98--109
Abhinav Dayal Improving adaptive frameless rendering 110--120
Anonymous Preface . . . . . . . . . . . . . . . . 1--1
Ruihong Zhou and
Qiaoming Liu and
Xuming Han and
Limin Wang Density Peak Clustering algorithm using
knowledge learning-based fruit fly
optimization . . . . . . . . . . . . . . 1--10
Limin Wang and
Mingyang Li and
Xuming Han and
Kaiyue Zheng An improved density-based spatial
clustering of application with noise . . 1--7
Cao Yong and
Mu Yongmin and
Shen Meie Data change analysis based on function
call path . . . . . . . . . . . . . . . 1--10
Feng Li and
Yawen Wang and
Yunzhan Gong Test input generation of bitwise
operation based on four-valued logic . . 1--8
Honglei Zhu and
Dahai Jin and
Yunzhan Gong False positive elimination in suspected
code fault automatic confirmation . . . 1--9
Limin Wang and
Kaiyue Zheng and
Xing Tao and
Xuming Han Affinity propagation clustering
algorithm based on large-scale data-set 1--6
Limin Wang and
Nianbo Wang and
Xuming Han and
Yizhang Wang Semi-supervised hierarchical
optimization-based affinity propagation
algorithm and its applications . . . . . 1--10
Hao Chen and
Dongmei Zhao and
Kan Liu and
Wen Wu and
Li Wang Improving reliability of cloud computing
services for next generation mobile
communication networks . . . . . . . . . 1--7
Al-Sakib Khan Pathan Technological advancements and
innovations are often detrimental for
concerned technology companies . . . . . 189--191
Yue Shen and
Fida Hussain and
Hui Liu and
Destaw Addis Power quality disturbances
classification based on curvelet
transform . . . . . . . . . . . . . . . 192--201
Harish Radhappa and
Lei Pan and
James Xi Zheng and
Sheng Wen Practical overview of security issues in
wireless sensor network applications . . 202--213
Somayeh Saraf Esmaili and
Keivan Maghooli and
Ali Motie Nasrabadi A new model for face detection in
cluttered backgrounds using saliency map
and C$_2$ texture features . . . . . . . 214--222
Ebtsam Adel and
Shaker El-Sappagh and
Sherif Barakat and
Mohammed Elmogy Distributed electronic health record
based on semantic interoperability using
fuzzy ontology: a survey . . . . . . . . 223--241
Sandeep Joshi and
Monika Jain and
Rahul Saxena Recent trends in communication and
computational intelligence . . . . . . . 1--1
Hargeet Kaur and
Atul Kumar Analyzing the efficiency of partially
entangled states in Vaidman's-type games
and its applications in Quantum Secret
Sharing . . . . . . . . . . . . . . . . 2--13
Suman Bhakar and
Devershi Pallavi Bhatt Optimizing latency time of the AR system
through glyph detection . . . . . . . . 14--30
Bhoopendra Pachauri and
Ajay Kumar and
Joydip Dhar Reliability analysis of open source
software systems considering the effect
of previously released version . . . . . 31--38
Sophiya Sheikh and
Aitha Nagaraju and
Mohammad Shahid A Parallelized Dynamic Task Scheduling
for Batch of Task in a computational
grid . . . . . . . . . . . . . . . . . . 39--53
Anjali Ahuja and
Anamika Jain and
Madhu Jain Finite population multi-server retrial
queueing system with an optional service
and balking . . . . . . . . . . . . . . 54--61
Partho Mallick and
Priyanka Seth and
Anupam Ghosh Entropy-based fuzzy hybrid framework for
gene prediction network --- an
application to identify and rank the
biomarkers for human lung adenocarcinoma 62--77
Inderdeep Kaur and
Parminder Kaur and
Hardeep Singh An empirical evaluation of an advanced
version control tool in conflict
detection and resolution . . . . . . . . 78--87
Bingyang Wei and
Harry S. Delugach and
Yi Wang From state diagrams to sequence
diagrams: a requirements acquisition
approach . . . . . . . . . . . . . . . . 89--111
R. R. Darwish and
Abdullah Elewi A green proactive orchestration
architecture for cloud resources . . . . 112--128
Fahd Alqasemi and
Amira Abdelwahab and
Hatem Abdelkader Constructing automatic domain-specific
sentiment lexicon using KNN search via
terms discrimination vectors . . . . . . 129--139
Zhiqiang (John) Wu and
Sampson Gholston and
Letha Etzkorn An approach to finding good anchor nodes
in ontologies . . . . . . . . . . . . . 140--148
Felix Obite and
Geoffrey Ijeomah and
Joseph Stephen Bassi Carbon nanotube field effect
transistors: toward future nanoscale
electronics . . . . . . . . . . . . . . 149--164
Frederic Nzanywayingoma and
Yang Yang Efficient resource management techniques
in cloud computing environment: a review
and discussion . . . . . . . . . . . . . 165--182
K. V. Rama Satish and
N. P. Kavya A framework for big data pre-processing
and search optimization using HMGA-ACO:
a hierarchical optimization approach . . 183--194
Ranjit Kumar Behera and
K. Hemant Kumar Reddy and
Diptendu Sinha Roy Modeling and assessing reliability of
service-oriented internet of things . . 195--206
Ziaur Rahman and
Yi-Fei Pu and
Muhammad Aamir and
Farhan Ullah A framework for fast automatic image
cropping based on deep saliency map
detection and Gaussian filter . . . . . 207--217
Partha Chowdhuri and
Pabitra Pal and
Biswapati Jana Improved data hiding capacity through
repeated embedding using modified
weighted matrix for color image . . . . 218--232
Sharmin Jahan and
Mozammel Chowdhury and
Rafiqul Islam Robust user authentication model for
securing electronic healthcare system
using fingerprint biometrics . . . . . . 233--242
G. Ranganathan and
Hui-Ming Wee and
Pavel Lafata Editorial on IoT in Social, Mobility,
Analytics & Cloud [ISMAC] . . . . . . . . 243--244
Hima Bindu Valiveti and
Trinatha Rao Polipalli Performance analysis of SLTC-D2D
handover mechanism in software-defined
networks . . . . . . . . . . . . . . . . 245--254
Anil Kumar Budati and
Trinatha Rao Polipalli Performance analysis of HFDI computing
algorithm in intelligent networks . . . 255--261
Yan Zhang Classified scheduling algorithm of big
data under cloud computing . . . . . . . 262--267
Hongtao Li Estimation of stadium construction
schedule based on big data analysis . . 268--275
Mingyuan Hu Logistics vehicle tracking method based
on intelligent vision . . . . . . . . . 276--282
Fengqiong Zhang Research on reliability analysis of
computer network based on intelligent
cloud computing method . . . . . . . . . 283--288
Jia Zhu Research on data mining of electric
power system based on Hadoop cloud
computing platform . . . . . . . . . . . 289--295
K. Koteswara Rao and
G. S. V. P. Raju Reducing interactive fault proneness in
software application using genetic
algorithm based optimal directed random
testing . . . . . . . . . . . . . . . . 296--305
Shiqi Yang Analysis for the reliability of computer
network by using intelligent cloud
computing method . . . . . . . . . . . . 306--311
Geeta Sharma and
Sheetal Kalra Advanced multi-factor user
authentication scheme for E-governance
applications in smart cities . . . . . . 312--327
S. Ramasamy and
K. Nirmala Disease prediction in data mining using
association rule mining and keyword
based clustering algorithms . . . . . . 1--8
D. Jayaprabha and
K. Nirmala Efficiency stress prediction in BPO
industries using hybrid $k$-means and
artificial bee colony algorithm . . . . 9--16
M. P. A. Buhari and
S. K. Mohideen A combination of fuzzy positioned dental
X-ray analysis model to presume the
peculiar images . . . . . . . . . . . . 17--22
A. Krishnamoorthy and
V. Vijayarajan Energy aware routing technique based on
Markov model in wireless sensor network 23--29
Zhang Hao Design of WSN traffic forecasting system
with delayed self-sensing . . . . . . . 30--35
Min Hu and
Wei Cai Evacuation simulation and layout
optimization of cruise ship based on
cellular automata . . . . . . . . . . . 36--44
ShuRen Liu and
ChangNing Cai and
QiWei Zhu and
N. Arunkumar A study of software pools for
seismogeology-related software based on
the Docker technique . . . . . . . . . . 45--51
Wang Ya and
Zhou Meng-Ran and
Niu Lei and
Zhao Jia Trust analysis of WSN nodes based on
fuzzy theory . . . . . . . . . . . . . . 52--56
Wang Lin Quantitative analysis of
spatial--temporal variation and relation
of LST and relevant ecological elements 57--66
Huang Changhai and
Hu Shenping and
Kong Fancun and
Xuan Shaoyong Vulnerability analysis of inland
waterways network base on complex
network theory . . . . . . . . . . . . . 67--75
Liao Wenguo and
Liao Guangping Incremental semantic web retrieval model
based on web service . . . . . . . . . . 76--83
Zhang Yong-xiong and
Wang Liang-ming and
Yi Lu-xia A network attack discovery algorithm
based on unbalanced sampling vehicle
evolution strategy for intrusion
detection . . . . . . . . . . . . . . . 84--92
Liangchen Chen and
Shu Gao and
Xiufeng Cao Research on real-time outlier detection
over big data streams . . . . . . . . . 93--101
Tao Ye Internet of Things financial data
capture technology based on improved
particle swarm optimization FLFNN . . . 102--107
Mohit Kumar and
S. C. Sharma Dynamic load balancing algorithm to
minimize the makespan time and utilize
the resources effectively in cloud
environment . . . . . . . . . . . . . . 108--117
Limiao Li and
Zhihong Zhang and
Zhixiong Liu and
Hui Ye and
Keke He Social big data oriented trust situation
risk model based on individual behavior 119--126
Alexander Agathos and
Philip Azariadis 3D reconstruction of skeletal mesh
models and human foot biomodel
generation using semantic
parametric-based deformation . . . . . . 127--140
Dan Ren Research and analysis on precise
matching method for multi-feature of
fuzzy digital image . . . . . . . . . . 141--149
Yan Hou Chaos sequence data classification
mining research under network
visualization analysis . . . . . . . . . 150--156
Hongben Huang Research on feature classification
method of network text data based on
association rules . . . . . . . . . . . 157--163
A. Suruliandi and
J. C. Kavitha and
D. Nagarajan An empirical evaluation of recent
texture features for the classification
of natural images . . . . . . . . . . . 164--173
Xiangfei Meng Complex network anomaly recognition
integrating multi-source and large data 174--178
Taibo He Optimization of the large data spatial
information decision support service
system dependent on the solution of the
information entropy equation . . . . . . 179--186
Yukun Dong Detecting all potential null
dereferences based on points-to property
sound analysis . . . . . . . . . . . . . 187--195
Sunday Oyinlola Ogundoyin An autonomous lightweight conditional
privacy-preserving authentication scheme
with provable security for vehicular
ad-hoc networks . . . . . . . . . . . . 196--211
Mohammad Shojafar and
Mehdi Sookhak Internet of Everything, Networks,
Applications, and Computing Systems
(IoENACS) . . . . . . . . . . . . . . . 213--215
Weihua Yao Application of computer digital
simulation technology in action
structure image research on martial art 216--221
P. Parthasarathy and
S. Vivekanandan A typical IoT architecture-based regular
monitoring of arthritis disease using
time wrapping algorithm . . . . . . . . 222--232
Sanju Mishra and
Sarika Jain Ontologies as a semantic model in IoT 233--243
Samaher Al Janabi Smart system to create an optimal higher
education environment using IDA and IOTs 244--259
Song Tao and
Zhuang Lei and
Jing Chenkai Multi-frame moving video detection
algorithm for IOT based on Gauss Monte
Carlo particle filter . . . . . . . . . 260--265
Ambarish G. Mohapatra and
Bright Keswani and
Shivani Nanda and
Abhishek Ray and
Ashish Khanna and
Deepak Gupta and
Poonam Keswani Precision local positioning mechanism in
underground mining using IoT-enabled
WiFi platform . . . . . . . . . . . . . 266--277
Zhu Qianqian and
Wang Dongliang A SVM recommendation IoT model based on
similarity evaluation and collaborative
filtering of multi-angle knowledge units 278--281
Van Luong Nguyen and
Ying Xia IoT based user trajectory retrieval and
discovery algorithm based on
spatial--temporal correlation analysis 282--289
Mahammad Shareef Mekala and
P. Viswanathan A survey: energy-efficient sensor and VM
selection approaches in green computing
for X-IoT applications . . . . . . . . . 290--305
G. Kalyani and
Shilpa Chaudhari An efficient approach for enhancing
security in Internet of Things using the
optimum authentication key . . . . . . . 306--314
Sunday Oyinlola Ogundoyin A lightweight privacy-preserving data
aggregation scheme with provable
security for Internet-of-Things . . . . 315--327
Armin Anvari and
Lei Pan and
Xi Zheng Generating security questions for better
protection of user privacy . . . . . . . 329--350
Xiaofei Xu and
Zeyu Zhang and
Yanbin Chen and
Li Li HMM-based predictive model for enhancing
data quality in WSN . . . . . . . . . . 351--359
Mahesh Goyani and
Narendra Patel Template matching and machine
learning-based robust facial expression
recognition system using multi-level
Haar wavelet . . . . . . . . . . . . . . 360--371
Akalanka Karunarathne Mudiyanselage and
Lei Pan Security test MOODLE: a penetration
testing case study . . . . . . . . . . . 372--382
R. Nandakumar and
K. Nirmala Anonymity-based intra--inter and
multiple layer service dependent
security-aware packet scheduling
algorithm (AIIMLSDSPS) . . . . . . . . . 383--391
Cheng-Yu Fei and
Zhong Su and
Qing Li A method of heading estimation for
pedestrian navigation based on
information compression MDL criteria . . 392--398
Biswajit Biswas and
Biplab Kanti Sen Medical image fusion using type-2 fuzzy
and near-fuzzy set approach . . . . . . 399--414
Zhou Tao-Yun and
Lian Bao-wang and
Zhang Yi High precision nodes localization
algorithm based on optimal
dual-frequency comparison ranging . . . 415--421
Wenzhun Huang and
Peng Wang and
Lintao Lv and
Liping Wang and
Harry Haoxiang Wang An inventive high-performance computing
electronic information system for
professional postgraduate training . . . 422--428
Chunhua Jin and
Guanhua Chen and
Changhui Yu and
Jianyang Zhao Deniable authenticated encryption for
e-mail applications . . . . . . . . . . 429--438
Wanglong Chen and
Lifeng Zhu and
Xiaorui Zhang Modeling deformable objects using local
rigid body simulation . . . . . . . . . 439--448
Khadidja Bentlemsan and
Djamal Bennouar and
Dalila Tamzalit and
Khaled Walid Hidouci A hybrid re-composition based on
components and web services . . . . . . 449--462
Mohammed Elsaid Moussa and
Ensaf Hussein Mohamed and
Mohamed Hassan Haggag A generic lexicon-based framework for
sentiment analysis . . . . . . . . . . . 463--473
Sheeraz Arif and
Tehseen Ul-Hassan and
Fida Hussain and
Jing Wang and
Zesong Fei Video representation by dense
trajectories motion map applied to human
activity recognition . . . . . . . . . . 474--484
Ahmad Al-Jarrah and
Enrico Pontelli The collaborative virtual affinity group
model: principles, design,
implementation, and evaluation . . . . . 485--513
Zohra Bouzidi and
Labib Sadek Terrissa and
Noureddine Zerhouni and
Soheyb Ayad An efficient cloud prognostic approach
for aircraft engines fleet trending . . 514--529
Anonymous RETRACTED ARTICLE: Retraction . . . . . 530--530
Al-Sakib Khan Pathan Access to information vs blocking of
information during COVID-19 pandemic: a
governance dilemma in the era of
crowdsourcing based on ICT . . . . . . . 531--532
Zhongliang Liu and
Lili Huang and
Xiaoliang Zong Clustering analysis method and
implementation in the MapReduce model
for solving data-intensive problems . . 533--543
Tong Yi and
Chun Fang A complexity metric for object-oriented
software . . . . . . . . . . . . . . . . 544--549
Jian Ma and
Runtong Zhang and
Xiaomin Zhu and
Runqi Cao Process ontology technology in modeling
clinical pathway information system . . 550--557
Xuming Han and
Qiaoming Liu and
Limin Wang and
Huimin Lu and
Liyuan Zhou and
Junhua Wang An improved fruit fly optimization
algorithm based on knowledge memory . . 558--568
Hong Liang and
Yuan Gao and
Yunlei Sun and
Xiao Sun CEP: calories estimation from food
photos . . . . . . . . . . . . . . . . . 569--577
Aiping Zhou and
Hongbing Li A QoS guarantee approach for multimedia
software system . . . . . . . . . . . . 578--588
Manmeet Mahinderjit Singh and
Ke Wan Ching and
Asrulnizam Abd Manaf A novel out-of-band biometrics
authentication scheme for wearable
devices . . . . . . . . . . . . . . . . 589--601
Hui Yang and
Peter A. Bath Predicting loneliness in older age using
two measures of loneliness . . . . . . . 602--615
Yi-Ju Tseng and
Yu-Lien Shih Developing epidemic forecasting models
to assist disease surveillance for
influenza with electronic health records 616--621
S. Sapna and
A. Renuka Computer-aided system for Leukocyte
nucleus segmentation and Leukocyte
classification based on nucleus
characteristics . . . . . . . . . . . . 622--633
M. Anbarasi and
M. A. Saleem Durai Prediction of protein folding kinetics
states using hybrid brainstorm
optimization . . . . . . . . . . . . . . 635--643
Hu Xinxin and
Liang Fengshou Keyword search method of distributed
file in large data environment . . . . . 644--648
Wei Xiaoqiong and
Yin E. Zhang Image segmentation algorithm based on
dynamic particle swarm optimization and
$K$-means clustering . . . . . . . . . . 649--654
Jia Ru-Da and
Chen Yong-Gao and
Zhang Yin E. Fusion algorithm of infrared and visible
images based on frame difference
detection technology and area feature 655--660
Manal Abdullah and
Muna AlMasawa and
Ibtihal Makki and
Maha Alsolmi and
Samar Mahrous Emotions extraction from Arabic tweets 661--675
Rubina Parveen and
Subhash Kulkarni and
V. D. Mytri Automated extraction and discrimination
of open land areas from IRS-1C LISS III
imagery . . . . . . . . . . . . . . . . 676--685
Anil Garg and
O. P. Sahu A hybrid approach for speech enhancement
using Bionic wavelet transform and
Butterworth filter . . . . . . . . . . . 686--696
Rafik Menassel and
Idriss Gaba and
Khalil Titi Introducing BAT inspired algorithm to
improve fractal image compression . . . 697--704
Miloud Khaldi and
Mohammed Rebbah and
Boudjelal Meftah and
Omar Smail Fault tolerance for a scientific
workflow system in a Cloud computing
environment . . . . . . . . . . . . . . 705--714
Honey Jindal and
Neetu Sardana and
Raghav Mehta Efficient web navigation prediction
using hybrid models based on multiple
evidence combinations . . . . . . . . . 715--728
Gerard Deepak and
B. N. Shwetha and
C. N. Pushpa and
J. Thriveni and
K. R. Venugopal A hybridized semantic trust-based
framework for personalized web page
recommendation . . . . . . . . . . . . . 729--739
Xuexin Gao and
Yongmin Mu and
Meie Shen The research of endless loop detection
method based on the basic path . . . . . 740--747
Abejide Ade-Ibijola Synthesis of regular expression problems
and solutions . . . . . . . . . . . . . 748--764
E. A. Zanaty and
Ashraf Afifi Generalized Hermite kernel function for
support vector machine classifications 765--773
Wenjun Wang and
Wei-Ming Lin System performance enhancement with
thread suspension for simultaneous
multi-threading processors . . . . . . . 774--786
Ghazi Al-Naymat and
Mouhammd Al-Kasassbeh and
Zyad Sober Pairs trading strategy: a recommendation
system . . . . . . . . . . . . . . . . . 787--797
Mozammel Chowdhury and
Junbin Gao and
Rafiqul Islam Extracting depth information from stereo
images using a fast correlation matching
algorithm . . . . . . . . . . . . . . . 798--803
Hasan Jafari and
Mousa Nazari and
Shahaboddin Shamshirband Optimization of energy consumption in
wireless sensor networks using
density-based clustering algorithm . . . 1--10
Wolali Ametepe and
Changda Wang and
Selasi Kwame Ocansey and
Xiaowei Li and
Fida Hussain Data provenance collection and security
in a distributed environment: a survey 11--25
Khuram Shahzad and
Zeng Jianqiu and
Muhammad Azam Zia and
Aliya Shaheen and
Taiba Sardar Essential factors for adopting hospital
information system: a case study from
Pakistan . . . . . . . . . . . . . . . . 26--37
Partha Chowdhuri and
Biswapati Jana and
Debasis Giri Secured steganographic scheme for highly
compressed color image using weighted
matrix through DCT . . . . . . . . . . . 38--49
Afnan Salem Babrahem and
Muhammad Mostafa Monowar Preserving confidentiality and privacy
of the patient's EHR using the OrBAC and
AES in cloud environment* . . . . . . . 50--61
Shahaboddin Shamshirband and
Hossein Soleimani LAAPS: an efficient file-based search in
unstructured peer-to-peer networks using
reinforcement algorithm . . . . . . . . 62--69
Amira Hadj Fredj and
Jihene Malek A fast and robust OSRAD filter for
telemedicine applications . . . . . . . 70--79
C. B. David Joel Kishore and
T. Bhaskara Reddy An efficient approach for land record
classification and information retrieval
in data warehouse . . . . . . . . . . . 80--89
K. C. Okafor and
G. C. Ononiwu and
Sam Goundar and
V. C. Chijindu and
C. C. Udeze Towards complex dynamic fog network
orchestration using embedded neural
switch . . . . . . . . . . . . . . . . . 91--108
Sanju Mishra and
Rafid Sagban and
Ali Yakoob and
Niketa Gandhi Swarm intelligence in anomaly detection
systems: an overview . . . . . . . . . . 109--118
N. Venkatesvara Rao and
D. Venkatavara Prasad and
M. Sugumaran Real-time video object detection and
classification using hybrid texture
feature extraction . . . . . . . . . . . 119--126
Syed Muhammad Mohsin and
Imran Ali Khan and
Syed Muhammad Abrar Akber and
Shahaboddin Shamshirband and
Anthony T. Chronopoulos Exploring the RFID mutual authentication
domain . . . . . . . . . . . . . . . . . 127--141
Fan Rong and
Zhang Juan and
Zhao ShuoFeng Surgical navigation technology based on
computer vision and VR towards IoT . . . 142--146
Duan Dagao and
Gao Yang Preprocessing technology of consuming
big data based on user interest with
Internet of Location Mining . . . . . . 147--152
Wang Ying Positioning algorithm based on linear
embedding optimization in internet of
sensor network . . . . . . . . . . . . . 153--158
Siyang Liu and
Cheng Zhang Personalized file data query matching
method based on SOA . . . . . . . . . . 159--164
Yang Fan Key web search algorithm based on
service ontology . . . . . . . . . . . . 165--170
Zhang Di Online traffic flow assignment method
based on structure matching selection of
multilevel road network . . . . . . . . 171--175
Mao Dianhui and
Song Zihao A prediction model of micro-blog
affective hotspots based on SVM
collaborative filtering recommendation
model . . . . . . . . . . . . . . . . . 176--180
Ze Wu Local-global iterative linear embedding
optimization-based positioning algorithm
in sensor network . . . . . . . . . . . 181--185
Xu Li and
Lan Ling Internet of target perception event
driven based on machine vision using a
fast extraction algorithm . . . . . . . 186--192
Li Hongli and
Ma Yaofeng Internet of moving target detection
method based on nonparametric background
model . . . . . . . . . . . . . . . . . 193--198
Sankhanil Dey and
Ranjan Ghosh A smart review and two new techniques
using 4-bit Boolean functions for
cryptanalysis of 4-bit crypto S-boxes 199--217
Ankita Jiyani and
Mehul Mahrishi and
Yogesh Meena and
Girdhari Singh NAM: a nearest acquaintance modeling
approach for VM allocation using R-Tree 218--225
Mansoor Fateh and
Mohsen Rezvani An email-based high capacity text
steganography using repeating characters 226--232
Yassir Samadi and
Mostapha Zbakh and
Claude Tadonki DT-MG: many-to-one matching game for
tasks scheduling towards resources
optimization in cloud computing . . . . 233--245
B. S. Premananda and
Nupur K. Neti and
K. P. Ashwin and
Shreya V. Basu An energy-efficient, coalition game
theory based hierarchical routing
protocol for WSNs . . . . . . . . . . . 246--256
Amin Mansouri and
Babak Majidi and
Abdolah Shamisa Metaheuristic neural networks for
anomaly recognition in industrial sensor
networks with packet latency and jitter
for smart infrastructures . . . . . . . 257--266
Shabina Sayed and
Rakesh Poonia Probability-weighted ensemble classifier
using holoentropy-enabled decision tree
for data stream classification . . . . . 267--281
Ju-Yuan Hsiao and
Ai-Chieh Pan and
Po-Yueh Chen An adaptive reversible data hiding
scheme using dual stego-image . . . . . 282--291
S. Adhirai and
Paramjit Singh and
Rajendra Prasad Mahapatra Circular interpolation and
chronological-whale optimization based
privacy preservation in cloud . . . . . 292--304
Kou Xiaoming Analysis on the Internet public opinions
in the era of We media based on fast
dual-cycle level set . . . . . . . . . . 305--309
Fan Yang Model of network video retrieval of
dynamic Bayesian network optimization
for the mobile terminal . . . . . . . . 310--314
Wang Tiancheng Online student achievement prediction
model based on Data Envelopment Analysis
(DEA) for multidimensional educational
internet of data mining . . . . . . . . 315--319
Zhang Duo and
Guo Rui-Fang An adaptive Bayesian tracking algorithm
for Internet of motion parameters based
on explicit formulation and integral
contour model . . . . . . . . . . . . . 320--325
K. Venkata Vara Prasad and
P. Trinatha Rao Performance of blind detection frame
work using energy detection approach for
local sensing in intelligent networks 326--332
M. Mehfooza and
V. Pattabiraman SP-DDPT: a simple prescriptive-based
domain data preprocessing technique to
support multilabel-multicriteria
learning with expert information . . . . 333--339
Xiao Bayi Real-time visual transmission mechanism
of graphics diversity based on mobile 3D
graphics matching algorithm . . . . . . 340--345
Junjun Huang Smart plant project scheduling
optimization based on hidden Markov
algorithm . . . . . . . . . . . . . . . 346--351
Li Cheng-Bing and
Mao Xi-hao Array sensors online pattern recognition
based on FCM and ANFIS . . . . . . . . . 352--359
Lu Yuting A $3$-D geographic location routing
protocol based on forward region
adaptive . . . . . . . . . . . . . . . . 360--366
V. Navya and
P. Deepalakshmi Threshold-based energy-efficient routing
for transmission of critical
physiological parameters in a wireless
body area network under emergency
scenarios . . . . . . . . . . . . . . . 367--376
Dong Yindi Multi-classification analysis of large
data based on knowledge element in
micro-blog short text . . . . . . . . . 377--382
Li Pei Community discovery method based on
complex network of data fusion based on
the super network perspective . . . . . 383--390
Li Chen Neighborhood optimization of intelligent
wireless mobile network based on big
data technology . . . . . . . . . . . . 391--400
Dhiren P. Bhagat and
Himanshukumar Soni Target tracking in a wireless sensor
network using a multi-step KF-PSO model 401--412
Archana Patel and
Sarika Jain Present and future of semantic web
technologies: a research statement . . . 413--422
J. V. Anand and
P. Sivanesan Certain investigations of underwater
wireless sensors synchronization and
funneling effect . . . . . . . . . . . . 423--430
Selvaraj Kesavan and
E. Saravana Kumar and
Abhishek Kumar and
K. Vengatesan An investigation on adaptive HTTP media
streaming Quality-of-Experience (QoE)
and agility using cloud media services 431--444
V. T. Venkateswarlu and
P. V. Naganjaneyulu and
D. N. Rao Delay sensitive data routing
optimization using rendezvous agents in
wireless sensor networks with mobile
sink . . . . . . . . . . . . . . . . . . 445--452
Zhi Yuan and
Weiqing Wang and
Shan He Application of sustainable computing
based advanced intelligent power
electronic technology for smart grid
systems . . . . . . . . . . . . . . . . 453--461
M. Dharani and
G. Sreenivasulu Land use and land cover change detection
by using principal component analysis
and morphological operations in remote
sensing applications . . . . . . . . . . 462--471
Rajeev Kumar Bedi and
Jaswinder Singh and
Sunil Kumar Gupta An efficient and secure privacy
preserving multi-cloud storage framework
for mobile devices . . . . . . . . . . . 472--482
Sonia Mehla and
Sarika Jain Development and evaluation of knowledge
treasure for emergency situation
awareness . . . . . . . . . . . . . . . 483--493
G. S. S. S. S. V. Krishna Mohan and
Yarravarapu Srinivasa Rao An efficient design of fractional order
differentiator using hybrid Shuffled
frog leaping algorithm for handling
noisy electrocardiograms . . . . . . . . 494--500
Amanpreet Kaur and
Jagroop Singh Sidhu and
Jaskarn Singh Bhullar Adaptive deblocking technique based on
separate modes for removing compression
effects in JPEG coded images . . . . . . 501--513
Anil B. Gavade and
Vijay S. Rajpurohit Systematic analysis of satellite
image-based land cover classification
techniques: literature review and
challenges . . . . . . . . . . . . . . . 514--523
Divya Jain and
Vijendra Singh A two-phase hybrid approach using
feature selection and Adaptive SVM for
chronic disease classification . . . . . 524--536
Naveen Kumar and
Ashutosh Kumar Singh and
Shashank Srivastava Feature selection for interest flooding
attack in named data networking . . . . 537--546
Poulami Das and
Sudip Kumar Naskar and
Sankar Narayan Patra Fast Converging Cuckoo Search Algorithm
to design symmetric FIR filters . . . . 547--565
Oscar Karnalim Source code plagiarism detection with
low-level structural representation and
information retrieval . . . . . . . . . 566--576
Xuming Han and
Li Zheng and
Limin Wang and
Hong Zheng and
Xin Wang Fireworks algorithm based on dynamic
search and tournament selection . . . . 577--588
Rakcinpha Hatibaruah and
Vijay Kumar Nath and
Deepika Hazarika An effective texture descriptor for
retrieval of biomedical and face images
based on co-occurrence of similar
center-symmetric local binary edges . . 589--600
K. Maheswari and
M. Ramakrishnan Kernelized Spectral Clustering based
Conditional MapReduce function with big
data . . . . . . . . . . . . . . . . . . 601--611
K. C. Okafor Dynamic reliability modeling of
cyber-physical edge computing network 612--622
Ravi Kumar Poluru and
Lokesh Kumar R. An Improved Fruit Fly Optimization
(IFFOA) based Cluster Head Selection
Algorithm for Internet of Things . . . . 623--631
S. Maheswari and
Justus Selwyn State behavior analysis in validating
the web service framework . . . . . . . 632--642
Muddada Murali Krishna and
G. Lavanya Devi Method of optimizing the dimensional
features in sentiment analysis . . . . . 643--652
Susant Kumar Panigrahi and
Supratim Gupta and
S. Vamsee Krishna Quantitative evaluation of different
thresholding methods using automatic
reference image creation via PCA . . . . 653--662
SatyaJaswanth Badri A novel Map-Scan-Reduce based density
peaks clustering and privacy protection
approach for large datasets . . . . . . 663--673
D. Ferlin Deva Shahila and
S. H. Krishnaveni and
Valantina Stephen Soft computing-based non-linear
discriminate classifier for multimedia
image quality enhancement . . . . . . . 674--683
Chunhua Guo The application of fractional wavelet
transform in image enhancement . . . . . 684--690
Somula Ramasubbareddy and
R. Sasikala RTTSMCE: a response time aware task
scheduling in multi-cloudlet environment 691--696
Tahar Mekhaznia and
Akram Bennour New approach for attack of
permutation-based image encryption
schemes . . . . . . . . . . . . . . . . 697--705
Yuesheng Lou Detection of trace elements in
metallurgical products under complex
background based on visual saliency . . 706--714
Desheng Wu and
Yuhui Guan Artificial intelligence retrieval
algorithm for text data from multiple
data sources . . . . . . . . . . . . . . 715--719
Lei Wang and
Shanlin Yang and
Aizhu Zhou and
Rongjing Huang and
Shuai Ding and
Hao Wang and
Juncheng Hu An intelligent gastric cancer screening
method based on convolutional neural
network and support vector machine . . . 720--725
M. M. Hafizur Rahman HMMN: a cost-effective derivative of
midimew-connected mesh network . . . . . 727--732
Krishna Kumar and
Md. Tanwir Uddin Haider Blended computation of machine learning
with the recurrent neural network for
intra-day stock market movement
prediction using a multi-level
classifier . . . . . . . . . . . . . . . 733--749
Dalila Iabbassen and
Samira Moussaoui Cooperative and hybrid energy efficient
schemE for wireless sensor networks . . 750--763
Urvashi Sharma and
Meenakshi Sood and
Emjee Puthooran A novel resolution independent gradient
edge predictor for lossless compression
of medical image sequences . . . . . . . 764--774
Bodrunnessa Badhon and
Mir Md. Jahangir Kabir and
Shuxiang Xu and
Monika Kabir A survey on association rule mining
based on evolutionary algorithms . . . . 775--785
Mohammed Elsaid Moussa and
Ensaf Hussein Mohamed and
Mohamed Hassan Haggag Opinion mining: a hybrid framework based
on lexicon and machine learning
approaches . . . . . . . . . . . . . . . 786--794
Neha Gupta and
Arun Sharma and
Manoj Kumar Pachariya A novel approach for mutant
diversity-based fault localization:
DAM-FL . . . . . . . . . . . . . . . . . 795--804
Raja Muthalagu and
Subeen Jain A novel modified KASUMI block cipher for
global system for mobile communications 805--811
Renae Aurisch and
Mohiuddin Ahmed and
Abu Barkat An outlook at Agile methodologies for
the independent games developer . . . . 812--818
Conrado Ruiz Jr. Multi-feature 3D model retrieval using
view-based techniques . . . . . . . . . 819--829
K. Pankaja and
V. Suma A hybrid approach combining CUR matrix
decomposition and weighted kernel sparse
representation for plant leaf
recognition . . . . . . . . . . . . . . 830--840
A. Nishad and
Sajimon Abraham SemTraClus: an algorithm for clustering
and prioritizing semantic regions of
spatio-temporal trajectories . . . . . . 841--850
Purbanka Pahari and
Piyali Basak and
Anasua Sarkar Ensemble based biomarker identification
on pancreatic ductal adenocarcinoma gene
expressions . . . . . . . . . . . . . . 851--857
K. S. Gautam and
Senthil Kumar Thangavel Video analytics-based facial emotion
recognition system for smart buildings 858--867
Wei Wang An algorithm for rationality estimation
of movement trend based on big data
analysis . . . . . . . . . . . . . . . . 868--873
P. V. Venkateswaramma and
I. Ravi Prakash Reddy Node pattern state and trust-rate base
route selection for reliable data
transmission in mobile ad hoc networks 874--880
Shaofu He and
Xiaochang Zheng Accurate identification technique of
access path information for hierarchical
geographic traffic network under big
data construction . . . . . . . . . . . 881--888
Min Zeng and
Fenjuan Li and
Huiping Feng Prediction model of key customer loss in
e-commerce combined with Cemo real time
streaming data framework . . . . . . . . 889--896
Guixian Tian and
Jian Wang Recommendation algorithm for mobile
E-commerce based on cone depth learning 897--902
Ya-Wen Li Multiple collaborative filtering
recommendation algorithms for electronic
commerce information . . . . . . . . . . 903--909
Chun-yu Zhang The optimization of bibliographic
information resource integration of
digital library . . . . . . . . . . . . 910--915
Fei-fei Wang and
Hai-feng Hu Multi-path data fusion method based on
routing algorithm for wireless sensor
networks . . . . . . . . . . . . . . . . 916--923
Sachinkumar Veerashetty and
Nagaraj B. Patil Manhattan distance-based histogram of
oriented gradients for content-based
medical image retrieval . . . . . . . . 924--930
Sujay Angadi and
Venkata Siva Reddy Multimodal sentiment analysis using
reliefF feature selection and random
forest classifier . . . . . . . . . . . 931--939
Sachinkumar Veerashetty and
Nagaraj B. Patil Design of rotation, illumination, and
scale invariant Gabor texture descriptor
for image texture analysis and retrieval 940--948
Hyunkyoung Choi and
Yong-Hyeon Shin and
Hyokyung Bahn Improving storage performance of
high-performance computing systems by
using the non-volatile buffer cache . . 949--953
Rajkumar Rajasekaran and
Jolly Masih and
K. Govinda An analysis of mobile pass-codes in case
of criminal investigations through
social network data . . . . . . . . . . 954--959
Jannatul Ferdush and
Greetashree Mondol and
Amrita Pritom Prapti and
Mahbuba Begum and
Mohammad Nowsin Amin Sheikh and
Syed Md. Galib An enhanced image encryption technique
combining genetic algorithm and particle
swarm optimization with chaotic function 960--967
H. Haritha and
Senthil Kumar Thangavel A modified deep learning architecture
for vehicle detection in traffic
monitoring system . . . . . . . . . . . 968--977
Gamage Kokila Kasuni Perera and
Champi Thusangi Wannige A hybrid algorithm for identifying
partially conserved regions in multiple
sequence alignment . . . . . . . . . . . 979--986
Raza Abbas Haidri and
Chittaranjan Padmanabh Katti and
Prem Chandra Saxena Capacity based deadline aware dynamic
load balancing (CPDALB) model in cloud
computing environment . . . . . . . . . 987--1001
Sunil Kumar Patel and
Chandran Saravanan and
Vikash Kumar Patel Cloud-based Reversible Dynamic Secure
Steganography Model for embedding
pathological report in medical images 1002--1010
Monika Kabir and
Mir Md. Jahangir Kabir and
Shuxiang Xu and
Bodrunnessa Badhon An empirical research on sentiment
analysis using machine learning
approaches . . . . . . . . . . . . . . . 1011--1019
Md. Alamgir Hossain and
Jannatul Ferdush and
Marjia Khatun A study and implementation of
large-scale log-determinant computation
to cloud . . . . . . . . . . . . . . . . 1020--1028
Rubina Parveen and
Subhash Kulkarni Urban land use dynamics and change
implication by using low-resolution LISS
III imagery . . . . . . . . . . . . . . 1029--1034
B. P. Santosh Kumar and
K. Venkata Ramanaiah Region of interest-based adaptive
segmentation for image compression using
hybrid Jaya--Lion mathematical approach 1035--1046
Vijay M. Sardar and
S. D. Shirbahadurkar Timbre features for speaker
identification of whispering speech:
selection of optimal audio descriptors 1047--1053
Malige Gangappa and
C. Kiran Mai and
P. Sammulal Classification of land cover images
using modified water wave
Optimization-based hybrid classifier . . 1054--1064
Anamika Sharma and
Siddhartha Chauhan Target coverage computation protocols in
wireless sensor networks: a
comprehensive review . . . . . . . . . . 1065--1087
Haval I. Hussein and
Wafaa M. Abduallah An efficient ElGamal cryptosystem scheme 1088--1094
Dharminder Dharminder and
Pratik Gupta Security analysis and application of
Chebyshev Chaotic map in the
authentication protocols . . . . . . . . 1095--1103
Al-Sakib Khan Pathan COVID-19 pandemic, information and
communications technology (ICT), and the
\em Digital Divide . . . . . . . . . . . 1--2
Manel Elleuchi and
Manel Boujeleben and
Mohamed Abid Energy-efficient routing model for water
pipeline monitoring based on wireless
sensor networks . . . . . . . . . . . . 3--11
Wael A. Awad and
Noha E. El-Attar Adaptive SLA mechanism based on fuzzy
system for dynamic cloud environment . . 12--22
Shreya Banerjee and
Anirban Sarkar Domain-specific requirements analysis
framework: ontology-driven approach . . 23--47
Birane Abdelkader and
Hamami Latifa An efficient level set method based on
global statistical information for image
segmentation . . . . . . . . . . . . . . 48--56
Ashish Kumar and
N. S. Raghava Chaos-based steganography technique to
secure information and integrity
preservation of smart grid readings
using wavelet . . . . . . . . . . . . . 57--63
Rishabh Dudheria Assessing password practices of mobile
apps . . . . . . . . . . . . . . . . . . 64--82
Priti Maratha and
Kapil Gupta A comprehensive and systematized review
of energy-efficient routing protocols in
wireless sensor networks . . . . . . . . 83--100
Myung-Joong Jeon and
Hyun-Kyu Park and
Batselem Jagvaral and
Hyung-Sik Yoon and
Yun-Geun Kim and
Young-Tack Park Relationship between UAVs and Ambient
objects with threat situational
awareness through grid map-based
ontology reasoning . . . . . . . . . . . 101--116
Abdallah Almutawakel and
Okba Kazar and
Mouadh Bali and
Houcine Belouaar and
Abdelbasset Barkat Smart and fuzzy approach based on CSP
for cloud resources allocation . . . . . 117--129
Padipat Sitkrongwong and
Saranya Maneeroj and
Atsuhiro Takasu Multi-criteria rating conversion without
relation loss for recommender systems 130--138
Amin Rezaeipanah and
Musa Mojarad and
Ahad Fakhari Providing a new approach to increase
fault tolerance in cloud computing using
fuzzy logic . . . . . . . . . . . . . . 139--147
Pooja and
R. K. Chauhan Triple phase hybrid cryptography
technique in a wireless sensor network 148--153
Ouahiba Djama and
Zizette Boufaida Instantiation of the multi-viewpoints
ontology from a resource . . . . . . . . 154--165
Brahmaleen Kaur Sidhu and
Kawaljeet Singh and
Neeraj Sharma A machine learning approach to software
model refactoring . . . . . . . . . . . 166--177
Samira Chebbout and
Hayet Farida Merouani A hybrid codebook model for object
categorization using two-way clustering
based codebook generation method . . . . 178--186
Zhu Zhu and
Xiaoguo Zhang A random-valued impulse noise removal
algorithm via just noticeable difference
threshold detector and weighted
variation method . . . . . . . . . . . . 187--200
Wei Li and
William W. Guo and
Michael Li The impact factors on the competence of
big data processing . . . . . . . . . . 201--218
Shubhra Dwivedi and
Manu Vardhan and
Sarsij Tripathi Defense against distributed DoS attack
detection by using intelligent
evolutionary algorithm . . . . . . . . . 219--229
Sarveshwar Bharti and
Hardeep Singh Proactively managing clones inside an
IDE: a systematic literature review . . 230--249
Sikha Bagui and
Xingang Fang and
Subhash Bagui and
Jeremy Wyatt and
Patrick Houghton and
Joe Nguyen and
John Schneider and
Tyler Guthrie An improved step counting algorithm
using classification and double
autocorrelation . . . . . . . . . . . . 250--259
Ehsan Shirzad and
Hamid Saadatfar Job failure prediction in Hadoop based
on log file analysis . . . . . . . . . . 260--269
Jagsir Singh and
Jaswinder Singh Assessment of supervised machine
learning algorithms using dynamic API
calls for malware detection . . . . . . 270--277
Subrata Chowdhury and
P. Mayilvahanan and
Ramya Govindaraj Optimal feature extraction and
classification-oriented medical
insurance prediction model: machine
learning integrated with the internet of
things . . . . . . . . . . . . . . . . . 278--290
D. Mustafi and
A. Mustafi and
G. Sahoo A novel approach to text clustering
using genetic algorithm based on the
nearest neighbour heuristic . . . . . . 291--303
Amina Guendouz and
Djamal Bennouar AMPL: aspect multiple product lines . . 305--315
Yogita Yogita and
Vipin Pal and
Anju Yadav DDC protocol to protract network
lifetime of wireless sensor networks . . 316--323
R. R. Darwish A congestion-aware decision-driven
architecture for information-centric
Internet-of-Things applications . . . . 324--337
Nan Sun and
Guanjun Lin and
Junyang Qiu and
Paul Rimba Near real-time Twitter spam detection
with machine learning techniques . . . . 338--348
Maryam Jallouli and
Sonia Lajmi and
Ikram Amous When contextual information meets
recommender systems: extended SVD++
models . . . . . . . . . . . . . . . . . 349--356
Sigit Adinugroho and
Randy C. Wihandika and
Putra P. Adikara Newsgroup topic extraction using
term-cluster weighting and Pillar
$K$-Means clustering . . . . . . . . . . 357--364
Mohammad Ahsan and
T. P. Sharma Spams classification and their
diffusibility prediction on Twitter
through sentiment and topic models . . . 365--375
Thiago Rateke and
Aldo von Wangenheim Passive vision road obstacle detection:
a literature mapping . . . . . . . . . . 376--395
Sanchay Gupta and
Siddharth Chandra and
N. Maheswari and
M. Sivagami A model for screening eye diseases using
optical coherence tomography images . . 396--400
Baoshan Sun and
Mengying Ge and
Peng Zhao and
Chunqing Li Systematic framework for short text
classification based on improved TWE and
supervised MCFS topic merging strategy 401--413
Ibrahim Gad and
Doreswamy Hosahalli A comparative study of prediction and
classification models on NCDC weather
data . . . . . . . . . . . . . . . . . . 414--425
Shinq-Jen Wu and
Van-hung Pham Speeding up multi-SVMs through modified
working set selection . . . . . . . . . 426--432
R. Prasath and
T. Kumanan Enhanced artificial bee colony approach
for the enhancement and classification
of underwater images . . . . . . . . . . 433--443
Rebiha Souadih and
Fouzi Semchedine Energy-efficient coverage and
connectivity of wireless sensor network
in the framework of hybrid sensor and
vehicular network . . . . . . . . . . . 444--454
Md. Alamgir Hossain and
Md. Abdullah Al Hasan Improving cloud data security through
hybrid verification technique based on
biometrics and encryption system . . . . 455--464
Samia Noureddine and
Baarir Zineeddine and
Abida Toumi and
Abir Betka and
A\"\icha-Nabila Benharkat A new predictive medical approach based
on data mining and Symbiotic Organisms
Search algorithm . . . . . . . . . . . . 465--479
A. K. Fabi and
Sabu M. Thampi A psychology-inspired trust model for
emergency message transmission on the
Internet of Vehicles (IoV) . . . . . . . 480--490
Adesh Kumari and
Vinod Kumar and
M. Yahya Abbasi EAAF: ECC-based anonymous authentication
framework for cloud-medical system . . . 491--500
Anandakumar Haldorai and
Muhammad Sharif and
Sri Devi Ravana Artificial intelligence for sustainable
internet research . . . . . . . . . . . 501--502
Mohd. Sadiq and
Shadab Khan and
Chaudhary Wali Mohammad Selection of software requirements using
TOPSIS under fuzzy environment . . . . . 503--512
Majdi Abdellatief and
Abu Bakar Md Sultan and
Abdul Azim Abdul Ghani and
Abubaker Wahaballa Assessing the changeability of
component-based system design: a
controlled experiment . . . . . . . . . 513--520
Devender Kumar and
Sai Kishore Pachigolla and
Shubham Singh Manhas and
Karan Rawat Cryptanalysis and improvement of mutual
authentication protocol for real-time
data access in industrial wireless
sensor networks . . . . . . . . . . . . 521--534
Saeed Hosseinabadi and
Manoochehr Kelarestaghi and
Farshad Eshghi ISSE: a new iterative sentence scoring
and extraction scheme for automatic text
summarization . . . . . . . . . . . . . 535--540
Deepika Saxena and
Ashutosh Kumar Singh Auto-adaptive learning-based workload
forecasting in dynamic cloud environment 541--551
Raviraja Holla and
Nikhil C. Mhala and
Alwyn R. Pais GPGPU-based randomized visual secret
sharing (GRVSS) for grayscale and colour
images . . . . . . . . . . . . . . . . . 552--560
Vilas K. Patil and
P. P. Nagrale Effective analysis of noise levels due
to vehicular traffic in urban area using
deep learning with OALO model . . . . . 561--570
Sophal Chan and
Kwankamon Dittakan and
Subhieh El Salhi Osteoarthritis detection by applying
quadtree analysis to human joint knee
X-ray imagery . . . . . . . . . . . . . 571--578
Dmitrii Dikii and
Aleksey Tikhomirov Detection of DoS attacks exploiting
SUBSCRIBE messages of the MQTT protocol 579--585
Souad Amghar and
Safae Cherdal and
Salma Mouline Storing, preprocessing and analyzing
tweets: finding the suitable noSQL
system . . . . . . . . . . . . . . . . . 586--595
Anonymous RETRACTED ARTICLE: Statement of
retraction: traffic prediction and
transmission scheduling of artificial
intelligence-driven cognitive wireless
networks . . . . . . . . . . . . . . . . 596--596
Anonymous RETRACTED ARTICLE: Statement of
retraction: research on digital image
wavelet transform filtering optimization
processing method based on DSP Internet
of Things . . . . . . . . . . . . . . . 597--597
Anonymous RETRACTED ARTICLE: Statement of
retraction: a wireless network remote
monitoring method driven by artificial
intelligence . . . . . . . . . . . . . . 598--598
Anonymous RETRACTED ARTICLE: Statement of
retraction: collaborative correlation
space big data clustering algorithm for
abnormal flow monitoring . . . . . . . . 599--599
Anonymous RETRACTED ARTICLE: Statement of
retraction: track recognition algorithm
based on neural network for rail transit 600--600
Anonymous RETRACTED ARTICLE: Statement of
retraction: based on deep learning in
traffic remote sensing image processing
to recognize target vehicle . . . . . . 601--601
Anonymous RETRACTED ARTICLE: Statement of
retraction: development of
computer-based agricultural remote
intelligent information monitoring
system . . . . . . . . . . . . . . . . . 602--602
Anonymous RETRACTED ARTICLE: Statement of
retraction: the role of computer
security management in preventing
financial technology risks . . . . . . . 603--603
Anonymous RETRACTED ARTICLE: Statement of
retraction: key technologies of massive
concurrent data processing in smart city
based on cloud computing . . . . . . . . 604--604
Anonymous RETRACTED ARTICLE: Statement of
Retraction: Key technologies of cloud
computing-based IoT data mining . . . . 605--605
Kun Shang Semantic service composition model based
on cloud computing . . . . . . . . . . . 597--603
Hoda Ahmed Galal Elsayed and
Soumaya Chaffar and
Samir Brahim Belhaouari and
Hafsa Raissouli A two-level deep learning approach for
emotion recognition in Arabic news
headlines . . . . . . . . . . . . . . . 604--613
Abeer Hamdy and
Gloria Ezzat Deep mining of open source software bug
repositories . . . . . . . . . . . . . . 614--622
Dyala R. Ibrahim and
Rosni Abdullah and
Je Sen Teh An enhanced color visual cryptography
scheme based on the binary dragonfly
algorithm . . . . . . . . . . . . . . . 623--632
Falah Al-akashi SAMA: a real-time Web search
architecture . . . . . . . . . . . . . . 633--640
Sandeep Kaur and
Kuljit Kaur Chahal Prediction of Chikungunya disease using
PSO-based adaptive neuro-fuzzy inference
system model . . . . . . . . . . . . . . 641--649
Zhongxian Bai Variable incremental adaptive learning
model based on knowledge graph and its
application in online learning system 650--658
Geeta Singh and
Neelu Khare A survey of intrusion detection from the
perspective of intrusion datasets and
machine learning techniques . . . . . . 659--669
Yeganeh Madadi and
Vahid Seydi and
Reshad Hosseini Multi-source domain adaptation-based
low-rank representation and correlation
alignment . . . . . . . . . . . . . . . 670--677
Huazheng Zhu and
Jinglong Du and
LuLu Wang and
Baoru Han and
Yuanyuan Jia A vision-based fall detection framework
for the elderly in a room environment
using motion features and DAG-SVM . . . 678--686
Arkan Mulla and
H. T. Jadhav Optimal scheduling of vehicle-to-grid
power exchange using particle swarm
optimization technique . . . . . . . . . 687--704
Jie Zhang and
Haibo Pu Fast data acquisition algorithm for
remote monitoring system of smart home 705--712
Jia Yu Missing data filling algorithm in OA
(office automation) cooperative office
system . . . . . . . . . . . . . . . . . 713--720
Xiuzhen Dai Multilevel CLOS data stream exchange
algorithm based on smoothed round-robin
fair scheduling . . . . . . . . . . . . 721--728
D. Suganya and
K. Thirunadana Sikamani and
J. Sasikala Copy--move forgery detection of medical
images using golden ball optimization 729--737
Shiliang Yan and
Xiaofeng Zhang PCNet: partial convolution attention
mechanism for image inpainting . . . . . 738--745
Vivek Srivastava and
Ravi Shankar Pandey Load balancing for software-defined
network: a review . . . . . . . . . . . 746--759
Moustafa Sadek Kahil and
Abdelkrim Bouramoul and
Makhlouf Derdour GreedyBigVis --- A greedy approach for
preparing large datasets to
multidimensional visualization . . . . . 760--769
Ally S. Nyamawe and
Khadidja Bakhti and
Sulis Sandiwarno Identifying rename refactoring
opportunities based on feature requests 770--778
Noran AboDoma and
Eman Shaaban and
Ahmad Mostafa Adaptive time-bound access control for
internet of things in fog computing
architecture . . . . . . . . . . . . . . 779--790
Shymalagowri Selvaganapathy and
Sudha Sadasivam Anti-malware engines under adversarial
attacks . . . . . . . . . . . . . . . . 791--804
Al-Sakib Khan Pathan On the scale of Cyberspace and
Cybersecurity . . . . . . . . . . . . . 805--806
Xiaochang Zheng Feature selection algorithm of network
attack big data under the interference
of fading noise . . . . . . . . . . . . 807--813
Omar Al-Debagy and
Péter Martinek Dependencies-based microservices
decomposition method . . . . . . . . . . 814--821
Mahdi Mallaki and
Babak Majidi and
Amirhossein Peyvandi and
Ali Movaghar Off-chain management and state-tracking
of smart programs on blockchain for
secure and efficient decentralized
computation . . . . . . . . . . . . . . 822--829
Manvi Breja and
Sanjay Kumar Jain A survey on non-factoid question
answering systems . . . . . . . . . . . 830--837
Kumar Abhishek and
Vaibhav Pratihar and
Shishir Kumar Shandilya and
Sanju Tiwari and
Vinay Kumar Ranjan and
Sudhakar Tripathi An intelligent approach for mining
knowledge graphs of online news . . . . 838--846
Subhadra Perumalla and
Santanu Chatterjee and
A. P. Siva Kumar Block chain-based access control
protocol in Internet of Drones . . . . . 847--862
Radhia Bouziane and
Labib Sadek Terrissa and
Soheyb Ayad and
Jean-François Brethé Towards an architecture for cloud
robotic services . . . . . . . . . . . . 863--874
Daniel Mesafint Belete and
Manjaiah D. Huchaiah Grid search in hyperparameter
optimization of machine learning models
for prediction of HIV/AIDS test results 875--886
Rintu Nath and
A. Nagaraju Genetic algorithm based on-arrival task
scheduling on distributed computing
platform . . . . . . . . . . . . . . . . 887--896
Mohamed Younes Kaci and
Malika Bessedik and
Amina Lammari A novel variable neighborhood search for
the offloading and resource allocation
in Mobile-Edge Computing . . . . . . . . 897--905
Bhavya Joshi and
Akhilesh Kumar Sharma and
Narendra Singh Yadav and
Shamik Tiwari DNN based approach to classify Covid'19
using convolutional neural network and
transfer learning . . . . . . . . . . . 907--919
Albenzio Cirillo and
Vito Dalena and
Antonio Mauro and
Francesco Mogavero and
Diego Pennino and
Maurizio Pizzonia and
Andrea Vitaletti and
Marco Zecchini Empowering citizens by a
blockchain-based Robinson list . . . . . 920--928
Yani-Athmane Bennai and
Samira Yessad and
Louiza Bouallouche-Medjkoune A flexible and adaptive medium access
control protocol for improving quality
of service in vehicular ad-hoc networks 929--938
Lakhdar Kanouni and
Fouzi Semchedine A new paradigm for multi-path routing
protocol for data delivery in wireless
sensor networks . . . . . . . . . . . . 939--952
S. Sangeetha and
G. Sudha Sadasivam and
Ayush Srikanth Differentially private model release for
healthcare applications . . . . . . . . 953--958
Md Mobin Akhtar and
Danish Ahamad and
Abdallah Saleh Ali Shatat and
Alameen Eltoum M. Abdalrahman Enhanced heuristic algorithm-based
energy-aware resource optimization for
cooperative IoT . . . . . . . . . . . . 959--970
Karim Benhocine and
Adel Hansali and
Leila Zemmouchi-Ghomari and
Abdessamed Reda Ghomari Towards an automatic SPARQL query
generation from ontology competency
questions . . . . . . . . . . . . . . . 971--980
Nivea Kesav and
M. G. Jibukumar Multi-Channel CNN based image
classification using SKIP connection and
MSVM . . . . . . . . . . . . . . . . . . 981--990
M. Dhilsath Fathima and
S. Justin Samuel and
R. Natchadalingam and
V. Vijeya Kaveri Majority voting ensembled feature
selection and customized deep neural
network for the enhanced clinical
decision support system . . . . . . . . 991--1001
Anonymous Statement of Retraction: Real-time image
recognition algorithm and system design
of Android mobile devices . . . . . . . 1002--1002
Anonymous Statement of Retraction: An Intelligent
model to reduce the energy consumption
of sensor network nodes . . . . . . . . 1003--1003
Ranjit Biswas and
Sudipta Roy and
Abhijit Biswas MRI and CT image indexing and retrieval
using steerable pyramid transform and
local neighborhood difference pattern 1005--1014
V. Lakshmi Chetana and
Hari Seetha CF-AMVRGO: Collaborative Filtering based
Adaptive Moment Variance Reduction
Gradient Optimizer for Movie
Recommendations . . . . . . . . . . . . 1015--1023
Rukhsar Sultana and
Jyoti Grover and
Jitesh Meghwal and
Meenakshi Tripathi Exploiting machine learning and deep
learning models for misbehavior
detection in VANET . . . . . . . . . . . 1024--1038
Nilam Pradhan and
Bharat S. Chaudhari Traffic-aware autonomous scheduling for
6TiSCH networks . . . . . . . . . . . . 1039--1046
D. Prabhu and
S. Vijay Bhanu and
S. Suthir Design of Multiple Share Creation with
Optimal Signcryption based Secure
Biometric Authentication System for
Cloud Environment . . . . . . . . . . . 1047--1055
Naveen Kumar and
Hare Krishna and
Shashi Shubham and
Prabhu Padarbind Rout Automated categorization of student's
query . . . . . . . . . . . . . . . . . 1056--1064
Ilhem Souissi and
Nadia Ben Azzouna and
Rihab Abidi and
Tahar Berradia and
Lamjed Ben Said SP-TRUST: a trust management model for
speed trust in vehicular networks . . . 1065--1073
Minh Duc Nguyen and
Cuong H. Nguyen-Dinh and
Le Anh Phuong BOCA: A novel semantic blockchain-based
authentication system of educational
certificates . . . . . . . . . . . . . . 1074--1082
Yandong Han and
Lijuan Feng and
Jian Gao A new end-to-end framework based on
non-local network structure and spatial
attention mechanism for image rain
removal . . . . . . . . . . . . . . . . 1083--1091
Navjeet Kaur and
Ashok Kumar and
Rajesh Kumar PROMO: PROactive MObility-support model
for task scheduling in fog computing . . 1092--1101
A. Nageswara Rao and
P. Vijayapriya A robust neural network model for
monitoring online voltage stability . . 1103--1112
M. Suriya and
V. Chandran and
M. G. Sumithra Enhanced deep convolutional neural
network for malarial parasite
classification . . . . . . . . . . . . . 1113--1122
P. R. Joe Dhanith and
B. Surendiran An ontology learning based approach for
focused web crawling using combined
normalized pointwise mutual information
and Resnik algorithm . . . . . . . . . . 1123--1129
Shashidhar Virupaksha and
D. Venkatesulu Subspace-based aggregation for enhancing
utility, information measures, and
cluster identification in privacy
preserved data mining on
high-dimensional continuous data . . . . 1130--1139
Ambika and
Rajkumar L. Biradar and
Vishwanath Burkpalli Encryption-based steganography of images
by multiobjective whale optimal pixel
selection . . . . . . . . . . . . . . . 1140--1149
K. Krishna Jyothi and
Shilpa Chaudhari A secure cluster-based authentication
and key management protocol for
machine-type communication in the LTE
network . . . . . . . . . . . . . . . . 1150--1160
S. Shanthi and
N. Rajkumar Non-small-cell lung cancer prediction
using radiomic features and machine
learning methods . . . . . . . . . . . . 1161--1169
A. Christy Jeba Malar and
M. Deva Priya and
J. Sengathir and
N. Kiruthiga and
R. Anitha and
T. Sangeetha An intelligent multi-floor indoor
positioning system for cloud-based
environment . . . . . . . . . . . . . . 1170--1177
M. R. Pavan Kumar and
Prabhu Jayagopal A preprocessing method combined with an
ensemble framework for the multiclass
imbalanced data classification . . . . . 1178--1185
M. Kalpana Devi and
K. Umamaheswari Intelligent process of spectrum handoff
for dynamic spectrum access in cognitive
radio network using swarm intelligence 1186--1192
Kalli Srinivasa Nageswara Prasad and
Annaluri Sreenivasa Rao and
Attili Venkata Ramana Ensemble framework for concept-drift
detection in multidimensional streaming
data . . . . . . . . . . . . . . . . . . 1193--1200
Mohammed Debakla and
Mohammed Salem and
Rochdi Bachir Bouiadjra and
Mohammed Rebbah CMA-ES based fuzzy clustering approach
for MRI images segmentation . . . . . . 1--7
Vilas H. Gaidhane and
Nand Kumar and
Ravi Kant Mittal and
J. Rajevenceltha An efficient approach for cement
strength prediction . . . . . . . . . . 8--18
Jagtap D. Chaya and
Rani N. Usha Predictive analysis by ensemble
classifier with machine learning models 19--26
K. Gaffour and
M. K. Benhaoua and
A. H. Benyamina and
H. E. Zahaf A new congestion-aware routing algorithm
in network-on-chip: 2D and 3D comparison 27--35
Alok Kumar Shukla and
Sanjeev Kumar Pippal and
Sansar Singh Chauhan An empirical evaluation of
teaching--learning-based optimization,
genetic algorithm and particle swarm
optimization . . . . . . . . . . . . . . 36--50
Sunita Jalal and
Dharmendra Kumar Yadav and
Chetan Singh Negi Web service discovery with incorporation
of web services clustering . . . . . . . 51--62
S. Vaithyasubramanian and
D. Lalitha and
C. K. Kirubhashankar Enhancing website security against bots,
spam and web attacks using $l$ CAPTCHA 63--69
Ge Yang Network node grouping algorithm and
evaluation model based on clustering and
Bayesian classifier . . . . . . . . . . 70--76
Dahai Yu and
Juan Zhu Retracted Article: Research on digital
image wavelet transform filtering
optimization processing method based on
DSP Internet of Things . . . . . . . . . 77--87
Yong Liu and
Jiabao Jiang and
Yun Liu and
Yong Zhang and
Qilin Wu Network resource optimization
configuration in edge computing
environment . . . . . . . . . . . . . . 88--95
Bin Geng Retracted Article: Traffic prediction
and transmission scheduling of
artificial intelligence-driven cognitive
wireless networks . . . . . . . . . . . 96--104
Jiewen Zhao and
Jiaojie Yuan Retracted Article: An Intelligent model
to reduce the energy consumption of
sensor network nodes . . . . . . . . . . 105--113
Lei Zhao and
Huang Yu Retracted Article: A wireless network
remote monitoring method driven by
artificial intelligence . . . . . . . . 115--123
Amit Singh and
Aitha Nagaraju Heuristic-based opportunistic network
coding at potential relays in multi-hop
wireless networks . . . . . . . . . . . 124--135
Ting Fu and
Hong Chen and
Fei Wu and
YunDong Su and
Li Zhuang Retracted Article: Collaborative
correlation space big data clustering
algorithm for abnormal flow monitoring 136--143
Pengcheng Li and
HuiQin Cheng Retracted Article: Track recognition
algorithm based on neural network for
rail transit . . . . . . . . . . . . . . 144--150
Hongxiang Zhang and
Shaojie Shi and
Yongkai Wu and
Tong Feng Retracted Article: Development of
computer-based agricultural remote
intelligent information monitoring
system . . . . . . . . . . . . . . . . . 151--160
Juan Li Retracted Article: Real-time image
recognition algorithm and system design
of Android mobile devices . . . . . . . 161--169
Jingfu Li IOT security analysis of BDT-SVM
multi-classification algorithm . . . . . 170--179
Dan Wang and
Kai Zhao and
Yi Wang Retracted Article: Based on deep
learning in traffic remote sensing image
processing to recognize target vehicle 180--186
Caixia Chen and
Sheng Zhou and
Qingqing Chang Retracted Article: The role of computer
security management in preventing
financial technology risks . . . . . . . 187--195
Rongqing Zhuo and
Zhongxian Bai Retracted Article: Key technologies of
cloud computing-based IoT data mining 196--203
Yongqiang He and
Xuyang Zhang Retracted Article: Key technologies of
massive concurrent data processing in
smart city based on cloud computing . . 204--211
Ajay Kumar Dubey and
Vimal Mishra Crowd review and attribute-based credit
computation for an access control
mechanism in cloud data centers . . . . 212--219
Aafaq Mohi ud din and
Shaima Qureshi A review of challenges and solutions in
the design and implementation of deep
graph neural networks . . . . . . . . . 221--230
Touseef Iqbal and
Shaima Qureshi Reconstruction probability-based anomaly
detection using variational
auto-encoders . . . . . . . . . . . . . 231--237
Ritu Garg and
R. K. Singh SBCDetector: a hybrid approach to detect
second-order similarity or change . . . 238--247
Aarthi Paramasivam and
S. Jaya Nirmala Exploring question generation in medical
intelligent system using entailment . . 248--253
Amina Kchaou and
Sonda Ammar Bouhamed Two image quality assessment methods
based on evidential modeling and
uncertainty: application to automatic
iris identification systems . . . . . . 254--268
Febina Ikbal and
Rajamma Gopikakumari Block SMRT and knapsack
optimization-based sequency selector for
robust, imperceptible, and
payload-efficient color image
watermarking for binary watermark . . . 269--283
Al-Sakib Khan Pathan Why do some IT freelancers in certain
countries prefer digital payment with
cryptocurrency despite it being illegal? 285--287
Lucy Sumi and
Shouvik Dey YOLOv5-based weapon detection systems
with data augmentation . . . . . . . . . 288--296
Tertsegha J. Anande and
Sami Al-Saadi and
Mark S. Leeson Generative adversarial networks for
network traffic feature generation . . . 297--305
Ali Akram Abdul-Kareem and
Waleed Ameen Mahmoud Al-Jawher Image Encryption Algorithm Based on
Arnold Transform and Chaos Theory in the
Multi-wavelet Domain . . . . . . . . . . 306--322
Rafik Djemili and
Merouane Zamouche An efficient deep learning-based
approach for human activity recognition
using smartphone inertial sensors . . . 323--336
Mani Deep Karumanchi and
J. I. Sheeba and
S. Pradeep Devaneyan An efficient integrity based multi-user
blockchain framework for heterogeneous
supply chain management applications . . 337--351
B. N. Madhukar and
S. H. Bharathi and
Ashwin M. Polnaya Multi-scale convolution based breast
cancer image segmentation with attention
mechanism in conjunction with war search
optimization . . . . . . . . . . . . . . 353--366
Nadia Ahmed and
Sadik Kamel Gharghan and
Ammar Hussein Mutlag IoT-based child tracking using RFID and
GPS . . . . . . . . . . . . . . . . . . 367--378
J. Liu and
H. J. Shao and
X. Deng and
Y. T. Jiang Exploiting similarity-induced
redundancies in correlation topology for
channel pruning in deep convolutional
neural networks . . . . . . . . . . . . 379--390
Mohamed Raouf Kanfoud and
Abdelkrim Bouramoul Tackling the multilingual and
heterogeneous documents with the
pre-trained language identifiers . . . . 391--402
Youcef Benkhedda and
Faical Azouaou Optimizing user profile matching: a
text-based approach . . . . . . . . . . 403--412
Smail Ait El Asri and
Ismail Negabi and
Samir El Adib and
Naoufal Raissouni Enhancing building extraction from
remote sensing images through UNet and
transfer learning . . . . . . . . . . . 413--419
Jing Cai and
Jiawei Jiang and
Yibing Wang and
Jianwei Zheng and
Honghui Xu Image inpainting via Smooth Tucker
decomposition and Low-rank Hankel
constraint . . . . . . . . . . . . . . . 421--432
Bidyapati Thiyam and
Shouvik Dey Statistical methods for feature
selection: unlocking the key to improved
accuracy . . . . . . . . . . . . . . . . 433--443
Abderezak Touzene and
Manar Al Moqbali User satisfaction-based genetic
algorithm for load shifting in smart
grid . . . . . . . . . . . . . . . . . . 444--451
Fang Duan Multi-scale residual aggregation feature
network based on multi-time division for
motion behavior recognition . . . . . . 452--459
Tanu Gupta and
Ela Kumar Fusion of Bi-GRU and temporal CNN for
biomedical question classification . . . 460--470
Manabendra Nath and
Pinaki Mitra and
Deepak Kumar A novel residual learning-based deep
learning model integrated with attention
mechanism and SVM for identifying tea
plant diseases . . . . . . . . . . . . . 471--484
Fjolla Berisha and
Eliot Bytyçi Addressing cold start in recommender
systems with neural networks: a
literature survey . . . . . . . . . . . 485--496
Chigurupati Ravi Swaroop and
K. Raja CGSA optimized LSTM auto encoder for
outlier detection . . . . . . . . . . . 497--507
Vianney Kengne Tchendji and
Joëlle Kabdjou and
Yannick Florian Yankam Traffic predictive-based flow splitting
rerouting scheme for link failures in
software-defined networks . . . . . . . 508--515
Shinzeer C. K. Avinash Bhagat and
Ajay Shriram Kushwaha Secure medical data storage in
DPOS-hyper ledger fabric block chain
using PM-ECC and L2-DWT . . . . . . . . 516--522
Shobha Chawla and
Neha Gupta A cloud based enhanced CPABE framework
for efficient user and attribute-level
revocation . . . . . . . . . . . . . . . 523--533
Farid Feyzi and
Arman Daneshdoost Studying the effectiveness of deep
active learning in software defect
prediction . . . . . . . . . . . . . . . 534--552
Samar Bouazizi and
Emna Benmohamed and
Hela Ltifi PSO-K2PC: Bayesian structure learning
using optimized K2 algorithm for
parents-children detection . . . . . . . 553--563
Justice Odoom and
Xiaofang Huang and
Zuhong Zhou and
Samuel Danso and
Benedicta Nana Esi Nyarko and
Jinan Zheng and
Yanjie Xiang Blockchain-assisted sharing of
electronic health records: a feasible
privacy-centric constant-size ring
signature framework . . . . . . . . . . 564--578
Sylvia W. Azumah and
Nelly Elsayed and
Zag ElSayed and
Murat Ozer Cyberbullying in text content detection:
an analytical review . . . . . . . . . . 579--586
Subhajit Das and
Sourav Mandal and
Rohini Basak Spam email detection using a novel
multilayer classification-based decision
technique . . . . . . . . . . . . . . . 587--599
Vishruth B. Gowda and
M. T. Gopalakrishna and
J. Megha and
Shilpa Mohankumar Background initialization in video data
using singular value decomposition and
robust principal component analysis . . 600--609
Koppula Geeta and
V. Kamakshi Prasad Multi-objective cloud load-balancing
with hybrid optimization . . . . . . . . 611--625
Taha Etem and
Turgay Kaya Fast image encryption algorithm with
random structures . . . . . . . . . . . 626--637
Amal Shaheen and
Mustafa Hammad and
Wael Elmedany and
Riadh Ksantini and
Saeed Sharif Machine failure prediction using joint
reserve intelligence with feature
selection technique . . . . . . . . . . 638--646
N. J. Subashini and
K. Venkatesh Multimodal deep learning for chronic
kidney disease prediction: leveraging
feature selection algorithms and
ensemble models . . . . . . . . . . . . 647--659
Xinyu Zhang and
Hang Dong and
Liang Gong and
Xin Cheng and
Zhenghui Ge and
Liangchao Guo Multiple paddy disease recognition
methods based on deformable transformer
attention mechanism in complex scenarios 660--672
Sridevi Malipatil and
T. Hanumantha Reddy Discovery of interesting frequent item
sets in an uncertain database using ant
colony optimization . . . . . . . . . . 673--679
Megha Gupta and
Laxmi Ahuja and
Ashish Seth Security enhancement in a cloud
environment using a hybrid chaotic
algorithm with multifactor verification
for user authentication . . . . . . . . 680--696
D. Rambabu and
A. Govardhan Task scheduling and data replication in
cloud with improved correlation strategy 697--708
Santosh Kumar Majhi and
Abhipsa Panda and
Suresh Kumar Srichandan and
Usha Desai and
Biswaranjan Acharya Malware image classification:
comparative analysis of a fine-tuned CNN
and pre-trained models . . . . . . . . . 709--721
Amina Bouhadja and
Abdelkrim Bouramoul Beyond cocaine and heroin use: a
stacking ensemble-based framework for
predicting the likelihood of subsequent
substance use disorder using
demographics and personality traits . . 722--733
Chigurupati Ravi Swaroop and
K. Raja AT-densenet with salp swarm optimization
for outlier prediction . . . . . . . . . 735--747
Neelam Rawat and
Vikas Somani and
Arun Kr. Tripathi Prioritizing software regression testing
using reinforcement learning and hidden
Markov model . . . . . . . . . . . . . . 748--754
Wathiq Laftah Al-Yaseen and
Ali Kadhum Idrees MuDeLA: multi-level deep learning
approach for intrusion detection systems 755--763
Muhammad Sam'an and
Muhammad Munsarif and
Safuan and
Yahya Nur Ifriza Feature selection in P2P lending based
on hybrid genetic algorithm with machine
learning . . . . . . . . . . . . . . . . 764--775
Vishal Kumar and
Sumit Kushwaha Hybrid metaheuristic model based
performance-aware optimization for map
reduce scheduling . . . . . . . . . . . 776--788
Laila Bouhouch and
Mostapha Zbakh and
Claude Tadonki DFMCloudsim: an extension of Cloudsim
for modeling and simulation of data
fragments migration over distributed
data centers . . . . . . . . . . . . . . 1--20
S. Regilan and
L. K. Hema Optimizing environmental monitoring in
IoT: integrating DBSCAN with genetic
algorithms for enhanced clustering . . . 21--31
Sembati Yassine and
Naja Najib and
Jamali Abdellah Routing approaches in named data
network: a survey and emerging research
challenges . . . . . . . . . . . . . . . 32--45
Amrithkala M. Shetty and
Mohammed Fadhel Aljunid and
D. H. Manjaiah Unleashing the power of 2D CNN with
attention and pre-trained embeddings for
enhanced online review analysis . . . . 46--57
Yuanhan Du and
Ling Wang and
Yebo Tao Server node video processing based on
feature depth analysis algorithm . . . . 58--65
Ahmed Aljabri and
Farah Jemili and
Ouajdi Korbaa Convolutional neural network for
intrusion detection using blockchain
technology . . . . . . . . . . . . . . . 67--77
K. Sakkaravarthy Iyyappan and
S. R. Balasundaram A novel multi document summarization
with document-elements augmentation for
learning materials using concept based
ILP and clustering methods . . . . . . . 78--89
Shakti Kinger and
Vrushali Kulkarni Demystifying the black box: an overview
of explainability methods in machine
learning . . . . . . . . . . . . . . . . 90--100
S. Renu Deepti and
P. C. Karthik Survey on age-related macular
degeneration detection in OCT image . . 101--112
Fatemeh Arvaneh and
Faraneh Zarafshan and
Abbas Karimi Using fog computing (FC) and
optimization techniques for tasks
migration and resource allocation in the
internet of things (IoT) . . . . . . . . 113--121
Yang Cao and
Junhai Zhai and
Wei Zhang and
Xuesong Zhou and
Feng Zhang MTTF: a multimodal transformer for
temperature forecasting . . . . . . . . 122--135
Akhil Nair and
Varad Patil and
Rohan Nair and
Adithi Shetty and
Mimi Cherian A review on recent driver safety systems
and its emerging solutions . . . . . . . 137--151
Hartik Suhagiya and
Hrithik Mistry and
Aryan Trivedi and
Ramchandra Mangrulkar and
Pallavi Chavan TokenLink: a secure loyalty point
exchange system powered by smart
contracts . . . . . . . . . . . . . . . 152--166
Neethu Subash and
B. Nithya Dynamic adaptation of contention window
boundaries using deep Q networks in UAV
swarms . . . . . . . . . . . . . . . . . 167--174
Mohammad Mehdi Pourhashem Kallehbasti and
Jamshid Pirgazi and
Ali Ghanbari Sorkhi and
Ali Kermani An efficient weighted partial MaxSAT
encoding for scheduling in overloaded
real-time systems . . . . . . . . . . . 175--183
Ch. Jnana Ramakrishna and
D. Bharath Kalyan Reddy and
P. P. Amritha and
K. V. Lakshmy and
Vasily Sachnev A secure authenticated image encryption
scheme based on elliptic curve
cryptography . . . . . . . . . . . . . . 184--193
Yang Xu and
Yongjie Ma Evolutionary neural architecture search
based on group whitening residual
ConvNet and large kernel subspace
attention module . . . . . . . . . . . . 195--207
Peraphon Sophatsathit A biological-like synthesis framework
for software engineering environments 208--217
Abhishek Goyal and
Rakesh Garg and
Komal Kumar Bhatia An improved task scheduling algorithm
for conflict resolution in cloud
environment . . . . . . . . . . . . . . 218--226
Mirsaeid Hosseini Shirvani and
Amir Akbarifar and
Amir Salar Nazokkar Reliability non-functional requirement
evaluation in mission-critical systems
with an architectural strategy for
future systems . . . . . . . . . . . . . 227--251
Eirene Barua and
Mala Dutta Privacy-preserving association rule
mining: a survey of techniques for
sensitive rule identification and
enhanced data protection . . . . . . . . 252--265
Bankapalli Swathi and
M. Sunil Prakash and
B. T. Krishna and
M. Satyanarayana A novel hybrid heuristic-based network
parameter optimization for spectral and
energy efficiency in dynamic spectrum
access on wireless mesh network system 266--279
Nail Adeeb Ali Abdu and
Khaled Omer Basulaim Machine learning in concept drift
detection using statistical measures . . 281--291
Lan Chen and
Rui Xiong and
Yifan Ji Application of SVM model based on
collaborative filtering hybrid algorithm
in e-commerce recommendation . . . . . . 292--300
Rajeev Ranjan and
Prabhat Kumar Towards optimal path planning for
sustainable data collection in real-time
wireless sensor networks . . . . . . . . 301--309
Mangalagowri Gorbal and
Ramesh D. Shelke and
Manuj Joshi An image watermarking scheme: combining
the transform domain and deep learning
modality with an improved scrambling
process . . . . . . . . . . . . . . . . 310--323
Ali Akram Abdul-Kareem and
Waleed Ameen Mahmoud Al-Jawher An image encryption algorithm using
hybrid sea lion optimization and chaos
theory in the Hartley domain . . . . . . 324--337
Chun Huang and
Shudan Liu Securing the future of industrial
operations: a blockchain-enhanced trust
mechanism for digital twins in the
industrial Internet of Things . . . . . 338--347
Pinki Rani and
Sukhdip Singh and
Karanbir Singh Cloud computing security: a taxonomy,
threat detection and mitigation
techniques . . . . . . . . . . . . . . . 348--361
Gurudatta Verma and
Tirath Prasad Sahu TOPSIS-ACO based feature selection for
multi-label classification . . . . . . . 363--380
Xiaohan Yu and
Haixia Wang and
Keming Dong and
Chao Chen A novel LDVP-based anomaly detection
method for data streams . . . . . . . . 381--389
Shahzad Ali Performance of geographically restricted
flooding for emergency alert
applications . . . . . . . . . . . . . . 390--396
Rohit Vashisht and
Abhinav Juneja and
Gagan Thakral and
Sonam Gupta An empirical study of
just-in-time-defect prediction using
various machine learning techniques . . 397--406
Raghavendra Varma Cherukuri and
Golagani Lavanya Devi and
Neelapu Ramesh Federated learning with blockchain-based
model aggregation and incentives . . . . 407--417
Xuan Zhang and
Mengqi Fan and
Mo Hou Mobilenet V3-transformer, a lightweight
model for image caption . . . . . . . . 418--426
Himani Trivedi and
Mahesh Goyani Adapting face recognition to the masked
world: leveraging deep attention
networks with a custom dataset . . . . . 427--441
Al-Sakib Khan Pathan Editor-in-chief's foreword . . . . . . . 443--444
Linjuan Li and
Haoxue Zhang and
Gang Xie and
Yanhong Bai Adjustable patch and feature prior
token-based transformer for weakly
supervised semantic segmentation . . . . 445--454
HanFan Liu and
Pei Tian and
HaiFang Yao and
Cong Shen and
FengYang Hu Research on fastDTW and isolation
forest-based lightweight gesture
authentication . . . . . . . . . . . . . 455--466
Alina Dash and
Kshiramani Naik and
Priyanka Priyadarshini Enhancing copyright protection with
Hadamard transform-based blind digital
watermarking using the cycling chaos
system . . . . . . . . . . . . . . . . . 467--480
Abdelali Elkouay and
Najem Moussa and
Abdallah Madani Graph-based phishing detection: URLGBM
model driven by machine learning . . . . 481--495
Bhushan Inje and
Kapil Kumar Nagwanshi and
Radhakrishna Rambola Document retrieval using
clustering-based Aquila hash-Q
optimization with query expansion based
on pseudo relevance feedback . . . . . . 496--507
Mahbubun Nahar and
A. H. M. Kamal DNA Steganography: Embedding the Secret
Messages Using Glass Stack Method and
Detecting Errors Made by Different
Attacks . . . . . . . . . . . . . . . . 508--525
S. Regilan and
L. K. Hema and
J. Jenitha ReLeC-based clustering and
multi-objective optimization for
efficient energy optimization in IoT
networks . . . . . . . . . . . . . . . . 526--538
Md Rabiul Hasan and
A. B. M. Aowlad Hossain and
Shah Muhammad Azmat Ullah Ensemble ResDenseNet: Alzheimer's
disease staging from brain MRI using
deep weighted ensemble transfer learning 539--554
Nafis Sajid and
Md. Rashidul Hasan and
Muhammad Ibrahim Feature engineering in learning-to-rank
for community question answering task 555--566
Sneha Chinivar and
M. S. Roopa and
J. S. Arunalatha and
K. R. Venugopal Online aggression detection using
ensemble techniques on fine-tuned
transformer-based language models . . . 567--579
Priyanka Priyadarshini and
Kshiramani Naik Robust image tamper detection and
recovery with self-embedding
watermarking using SPIHT and LDPC . . . 580--603
Pillai Praveen Thulasidharan and
Keshab Nath A novel binary quantizer for variational
autoencoder-based image compressor . . . 604--620
Bhawna Mallick Enhancing cyber security: a
comprehensive approach to the
classification and prediction of
significant cyber incidents (SCI)
through data mining and variational
neural network with fox optimization
algorithm . . . . . . . . . . . . . . . 621--627
Oussama Senouci Enhancing routing and quality of service
using AI-driven technique for Internet
of Vehicles contexts . . . . . . . . . . 628--640
Wided Oueslati and
Siwar Mejri and
Jalel Akaichi A comprehensive study on social networks
analysis and mining to detect opinion
leaders . . . . . . . . . . . . . . . . 641--650
Supriya Manna and
Krishna Siva Prasad Mudigonda Revitalizing the single batch
environment: a `Quest' to achieve
fairness and efficiency . . . . . . . . 651--665
Aron Benedek Szabo and
Jozsef Katona A machine learning approach for skin
lesion classification on iOS:
implementing and optimizing a
convolutional transfer learning model
with Create ML . . . . . . . . . . . . . 666--685
Imran Qadir and
V. Devendran and
Fasel Qadir Performance comparison of decision-based
median filtering for brain MR images
with high multiplicative noise . . . . . 687--701
Ayat M. Al-Rjoob and
Ahmad A. Ababnah and
Mamoun F. Al-Mistarihi and
Khalid A. Darabkh Physical-layer security for primary
users in 5G underlay cognitive radio
system via artificial-noise-aided by
secondary users . . . . . . . . . . . . 702--714
Rasmita Kumari Mohanty and
Satya Prakash Sahoo and
Manas Ranjan Kabat Thermal-energy-efficient-secured-link
reliable and delay-aware routing
protocol (TESLDAR) for wireless body
area networks . . . . . . . . . . . . . 715--727
Tunirani Nayak and
Nilamani Bhoi Self-sparse fuzzy clustering with
automatic region merging approach for
image segmentation . . . . . . . . . . . 728--742
Yuvika Gautam and
Piyush Gupta and
Deepika Kumar and
Bhavya Kalra and
Abhinav Kumar and
Jude D. Hemanth FusionEXNet: an interpretable fused deep
learning model for skin cancer detection 743--753
Hela Malouche Weight assignment in cloud service
selection based on FAHP and rough sets 754--768
Gaurav Tyagi and
Rahul Kumar Understanding the security failures of
four user authentication schemes for
wireless sensor networks in IoT
environment . . . . . . . . . . . . . . 769--784
Hanyu Zhang and
Hao Xu Manifold learning localization based on
local tangent space alignment for
wireless sensor networks . . . . . . . . 785--794
Oualid Mecili and
Hadj Barkat and
Farid Nouioua and
Abdelouahab Attia and
Samir Akhrouf An efficient explainable deep neural
network classifier for diabetic
retinopathy detection . . . . . . . . . 795--810
Urmila Bhanja and
Ankit Majhi and
Smrutirekha Sahu and
Debapriya Parida Detection of Sybil & DDoS attacks in
VANET using intelligent technique . . . 811--829
M. Raviraja Holla and
D. Suma Adaptive random-grid and progressive
color secret sharing with CNN
super-resolution on a many-core system 830--839
Samuel Luna Martins and
Felipe Mendes da Cruz and
Rogério Pontes de Araújo and
Carlo Marcelo Revoredo da Silva Systematic literature review on security
misconfigurations in web applications 840--852
Beatriz M. Reichert and
Rafael R. Obelheiro Software supply chain security: a
systematic literature review . . . . . . 853--867
Oussama Harkati and
Lemnouar Noui and
Assia Beloucif A lossless probabilistic image
encryption algorithm based on QSD
decomposition and matrix transformations 868--879
Vaibhav Bhogade and
B. Nithya Time series forecasting using
transformer neural network . . . . . . . 880--888
Roisan Wahlang and
K. Chandrasekaran Dimensionality reduction using neural
networks for lattice-based cryptographic
keys . . . . . . . . . . . . . . . . . . 889--910
Sandeep Singh Rana and
Gaurav Verma and
O. P. Sahu Energy-efficient resource allocation for
NOMA-MEC system under imperfect
successive interference cancellation . . 911--920
S. A. Norton Stanley and
Shoney Sebastian Elastic circuit de-constructor: a
pattern to enhance resiliency in
microservices . . . . . . . . . . . . . 921--932
Nadia Bali and
Zied Jaoua and
Olfa Bzeouich and
Imed Abbassi Intrusion detection systems for the
internet of things: a probabilistic
anomaly detection approach . . . . . . . 933--944
Mathew Nicho and
Brian Cusack and
Shini Girija and
Nalin Arachchilage Evaluating the cost of classifier
discrimination choices for IoT sensor
attack detection . . . . . . . . . . . . 945--956
Krishna Siva Prasad Mudigonda and
Nikitha Lingineni and
Y. Manisai and
Manoj Pennada and
Mallesh Gadde and
Revanth Sai Aluri Extractive text summarization on medical
insights using fine-tuned transformers 957--973
Shamama Anwar and
Anshuman Srivastava A threefold chaotic image encryption
technique for efficacious image data
protection . . . . . . . . . . . . . . . 974--982
Shakti Kinger and
Vrushali Kulkarni A review of explainable AI in medical
imaging: implications and applications 983--997
Mohsen Alambardar Meybodi and
Mahdi Safari and
Ensieh Davoodijam Domination based graph neural networks 998--1005
Maithri Bairy and
Balachandra Muniyal and
Nisha P. Shetty Enhancing healthcare data integrity:
fraud detection using unsupervised
learning techniques . . . . . . . . . . 1006--1019
Bibek Ranjan Ghosh and
Jyotsna Kumar Mandal and
Swarnadeep Das and
Ayantanu Laha and
Rajarshi Saha and
Siddhartha Banerjee Blind image authentication using
singular value decomposition with
enhanced robustness by augmenting
Hamming code . . . . . . . . . . . . . . 1020--1044
Wafia Abada and
Abdelkrim Bouramoul and
Moustafa Sadek Kahil How machine learning algorithms can
examine patterns in multiple substance
addictions: predicting the effects and
interactions of psychoactive substances 1045--1055
Liwei Zheng and
Yan Wang and
Zhanqi Cui Modeling contextual goals and detecting
context conflicts from BDD-based user
stories . . . . . . . . . . . . . . . . 1057--1068
Haya A. Alubaidan and
Sumayh S. Aljameel A prediction model for improving virtual
machine live migration performance in
cloud computing using artificial
intelligence techniques . . . . . . . . 1069--1087
K. A. Bhat and
S. A. Sofi From shallows to depths: unveiling
hybrid synthetic data modeling for
enhanced learning with privacy
considerations in naturally imbalanced
datasets . . . . . . . . . . . . . . . . 1088--1103
Noureddine El-haryqy and
Zhour Madini and
Younes Zouine A review of deep learning techniques for
enhancing spectrum sensing and
prediction in cognitive radio systems:
approaches, datasets, and challenges . . 1104--1128
Abdul Ghofar Alhasyim and
Nabila Husna Shabrina A novel hybrid CNN-GRU model for
website-based user interface code
generator . . . . . . . . . . . . . . . 1129--1142
Poonam Mangwani and
Vrinda Tokekar An efficient test case selection
framework for multitenant SaaS
applications using RTS4MTS . . . . . . . 1143--1151
Nirmal Varghese Babu and
E. Grace Mary Kanaga Advanced functional connectivity
analysis with integrated EEG signal
enhancement and GTW-EEG-GAN for emotion
detection . . . . . . . . . . . . . . . 1152--1165
Krishna Siva Prasad Mudigonda and
Karthik Bulusu and
Yashmitha Sri and
Adithi Damera and
Vignesh Kode Capturing multiple emotions from
conversational data using fine tuned
transformers . . . . . . . . . . . . . . 1166--1178
Ambika Annavarapu and
Surekha Borra Figure-ground segmentation based medical
image denoising using deep convolutional
neural networks . . . . . . . . . . . . 1179--1205
Adla Sanober and
Shamama Anwar A secure and privacy preserving model
for healthcare applications based on
blockchain-layered architecture . . . . 1206--1218
Manoj Kumar Sain and
Rabul Laskar and
Joyeeta Singha and
Sandeep Saini Patient activity recognition for robust
performance under varied illumination
and cluttered background in indoor
environment . . . . . . . . . . . . . . 1219--1245
Majid Sepahvand and
Maytham N. Meqdad and
Fardin Abdali-Mohammadi State-of-the-art in human activity
recognition based on inertial
measurement unit sensors: survey and
applications . . . . . . . . . . . . . . 1--16
Jianfeng Jiang and
Shen Xu and
Ying Gao A uniformed adaptive early termination
model through probabilistic feature to
speed up quantization-based search . . . 17--28
Sajad Balali Dehkordi and
Saeed Nasri and
Sina Dami Unveiling anomalies: transformative
insights from transformer-based
autoencoder models . . . . . . . . . . . 29--44
Mohammad Izadi and
Mehran Safayani and
Abdolreza Mirzaei Knowledge distillation on
spatial-temporal graph convolutional
network for traffic prediction . . . . . 45--56
Zeina Swilam and
Abeer Hamdy and
Andreas Pester Improving code semantics learning using
enhanced Abstract Syntax Tree . . . . . 57--69
Hassan I. Abdalla and
Aneela Altaf and
Ali A. Hamzah A threefold-ensemble $k$-nearest
neighbor algorithm . . . . . . . . . . . 70--83
Ellie Small and
Javier Cabrera Principal phrase mining: an automated
method for extracting meaningful phrases
from text . . . . . . . . . . . . . . . 84--92
Sumit Sharma and
Sarika Jain and
Mukesh Kumar Tiwari and
Sohan lal Classifying the state of knowledge-based
question answering: patterns, progress,
and prospects . . . . . . . . . . . . . 93--105
Reno C. Alencar and
Bruno J. T. Fernandes and
Paulo H. E. S. Lima and
Carlo M. R. da Silva AI techniques for automated penetration
testing in MQTT networks: a literature
investigation . . . . . . . . . . . . . 106--121
Tarun Jain and
Dinesh Gopalani and
Yogesh Kumar Meena Informative task classification with
concatenated embeddings using deep
learning on crisisMMD . . . . . . . . . 123--140
Amit Paul and
Narayan Changder and
Animesh Dutta DSF-GAM: a location inference model in
social network Twitter . . . . . . . . . 141--161
Rohit Lohar and
Meenakshi Tripathi and
Hossein Shirazi Free-Phish: detecting phishing websites
hosted on free Web hosting domains . . . 162--168
Mahjabeen Tahir and
Azizol Abdullah and
Nur Izura Udzir and
Khairul Azhar Kasmiran A systematic review of machine learning
and deep learning techniques for anomaly
detection in data mining . . . . . . . . 169--187
Neha Kaushik and
Harish Kumar and
Vinay Raj Maintainability improvement of
microservices based applications using
micro frontend . . . . . . . . . . . . . 188--196
Deepali Bassi and
Hardeep Singh The empirical analysis of
multi-objective hyperparameter
optimization in software vulnerability
prediction . . . . . . . . . . . . . . . 197--215
Xiaobao Fu Application of perceptual graph neural
network intelligent algorithm in
software testing platform . . . . . . . 216--225
Y. C. A. Padmanabha Reddy and
Sai Sathwik Kosuru and
Nageswara Rao Sirisalla and
G. N. Vivekananda and
Venkata Akanksha Perala Empirical techniques for effort
estimation in designing effective ML
models . . . . . . . . . . . . . . . . . 226--234