


default search action
Computers, Materials and Continua, Volume 81
Volume 81, Number 1, 2024
- Shachar Bar, P. W. C. Prasad, Md Shohel Sayeed:

Enhancing Internet of Things Intrusion Detection Using Artificial Intelligence. 1-23 - Jiahe Wang, Xizhan Gao, Fa Zhu, Xingchi Chen:

Exploring Frontier Technologies in Video-Based Person Re-Identification: A Survey on Deep Learning Approach. 25-51 - Xionglve Li, Chengyu Wang, Yifan Yang, Changsheng Hou, Bingnan Hou, Zhiping Cai:

Internet Inter-Domain Path Inferring: Methods, Applications, and Future Directions. 53-78 - Hamed Taherdoost:

Wearable Healthcare and Continuous Vital Sign Monitoring with IoT Integration. 79-104 - Qianqian Zhang, Yi Zhang, Yuanyuan Ma, Yanmei Liu

, Xiangyang Luo:
Digital Image Steganographer Identification: A Comprehensive Survey. 105-131 - Yuanjing Luo, Xichen Tan, Zhiping Cai:

Robust Deep Image Watermarking: A Survey. 133-160 - Hoi Chuen Cheng, Frederick Ziyang Hong, Babar Hussain, Yiru Wang, Chik Patrick Yue:

Development of Multi-Agent-Based Indoor 3D Reconstruction. 161-181 - Murad Njoum, Rossilawati Sulaiman, Zarina Shukur, Faizan Qamar:

High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution. 183-211 - Zhi Wang, Jinming Cao, Zhonglei Liu, Yuhong Zhao:

Paraelectric Doping Simultaneously Improves the Field Frequency Adaptability and Dielectric Properties of Ferroelectric Materials: A Phase-Field Study. 213-228 - Sayat Ibrayev, Batyrkhan Omarov, Arman Ibrayeva, Zeinel Momynkulov:

DeepSurNet-NSGA II: Deep Surrogate Model-Assisted Multi-Objective Evolutionary Algorithm for Enhancing Leg Linkage in Walking Robots. 229-249 - Jiaqi Gao, Kangfeng Zheng, Xiujuan Wang, Chunhua Wu, Bin Wu:

Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation. 251-270 - Nahed Tawfik, Heba M. Emara, Walid El-Shafai, Naglaa F. Soliman, Abeer D. Algarni, Fathi E. Abd El-Samie:

Enhancing Early Detection of Lung Cancer through Advanced Image Processing Techniques and Deep Learning Architectures for CT Scans. 271-307 - Bayan Alabdullah, Muhammad Tayyab, Yahay Alqahtani, Naif Al Mudawi, Asaad Algarni, Ahmad Jalal, Jeongmin Park:

Sports Events Recognition Using Multi Features and Deep Belief Network. 309-326 - Gang Long, Zhaoxin Zhang:

PUNet: A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data. 327-343 - Rehman Ullah Khan, Athar Shahzad Fazal, Ahmad Ali Khan, Hamza Tahir:

Advancing PCB Quality Control: Harnessing YOLOv8 Deep Learning for Real-Time Fault Detection. 345-367 - Xi Li, Weiwei Zhu, Qian Li, Changhui Hou, Yaozong Zhang:

Re-Distributing Facial Features for Engagement Prediction with ModernTCN. 369-391 - Mehdi Houichi

, Faouzi Jaïdi, Adel Bouhoula:
Cyber Security within Smart Cities: A Comprehensive Study and a Novel Intrusion Detection-Based Approach. 393-441 - Jingfa Ma, Hu Liu, Lingxiao Chen:

Demand-Responsive Transportation Vehicle Routing Optimization Based on Two-Stage Method. 443-469 - Omkumar Chandraumakantham, Sudhakaran Gajendran, Suguna Marappan, Mohammed Zakariah, Abdulaziz S. Almazyad:

A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection. 471-501 - Muhammad Ahmad, Manuel Mazzara, Salvatore Distefano, Adil Mehmood Khan, Hamad Ahmed Altuwaijri:

Improving Generalization for Hyperspectral Image Classification: The Impact of Disjoint Sampling on Deep Models. 503-532 - Yujian Wang, Jianxun Zhang, Renhao Sun:

A Facial Expression Recognition Method Integrating Uncertainty Estimation and Active Learning. 533-548 - Yingnan Zhao, Yuyuan Ruan, Zhen Peng:

Short-Term Wind Power Prediction Based on WVMD and Spatio-Temporal Dual-Stream Network. 549-566 - Yunfei Ban, Damin Zhang, Qing He

, Qianwen Shen:
APSO-CNN-SE: An Adaptive Convolutional Neural Network Approach for IoT Intrusion Detection. 567-601 - Jian Zhao, Kang Wang, Jiacun Wang, Xiwang Guo, Liang Qi:

African Bison Optimization Algorithm: A New Bio-Inspired Optimizer with Engineering Applications. 603-623 - Mohammad Shoab, Loiy Alsbatin:

GRU Enabled Intrusion Detection System for IoT Environment with Swarm Optimization and Gaussian Random Forest Classification. 625-642 - Stephen Ojo, Moez Krichen, Meznah A. Alamro, Alaeddine Mihoub, Gabriel Avelino R. Sampedro, Jaroslava Kniezova:

Improving Multiple Sclerosis Disease Prediction Using Hybrid Deep Learning Model. 643-661 - Xin Cong, Lanjin Feng, Lingling Zi:

Research on IPFS Image Copyright Protection Method Based on Blockchain. 663-684 - Yali Si, Feng Li, Shan Zhong, Chenghang Huo, Jing Chen, Jinglian Liu:

Adaptive Successive POI Recommendation via Trajectory Sequences Processing and Long Short-Term Preference Learning. 685-706 - Noor Ullah Bacha, Songfeng Lu, Attiq Ur Rehman, Muhammad Idrees, Yazeed Yasin Ghadi, Tahani Jaser Alahmadi:

Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting (XSS) Attack Detection. 707-748 - Mustafa Mohammed Alhassow

, Oguz Ata, Dogu Cagdas Atilla:
Obstacle Avoidance Capability for Multi-Target Path Planning in Different Styles of Search. 749-771 - Vesal Khean, Chomyong Kim, Sunjoo Ryu, Awais Khan, Min Kyung Hong, Eun Young Kim, Joungmin Kim, Yunyoung Nam:

Human Interaction Recognition in Surveillance Videos Using Hybrid Deep Learning and Machine Learning Models. 773-787 - Kelan Ren, Facheng Yan, Honghua Chen, Wen Jiang, Bin Wei, Mingshu Zhang:

Cross-Target Stance Detection with Sentiments-Aware Hierarchical Attention Network. 789-807 - Rabia Javed, Tanzila Saba, Tahani Jaser Alahmadi, Sarah Alotaibi, Bayan Alghofaily, Amjad Rehman:

EfficientNetB1 Deep Learning Model for Microscopic Lung Cancer Lesion Detection and Classification Using Histopathological Images. 809-825 - Anitha Ramachandran, K. S. Sendhil Kumar:

Border Sensitive Knowledge Distillation for Rice Panicle Detection in UAV Images. 827-842 - Yizhuo Zhu, Shaosi He, Deming Lei:

Dynamical Artificial Bee Colony for Energy-Efficient Unrelated Parallel Machine Scheduling with Additional Resources and Maintenance. 843-866 - Mahesh Thyluru Ramakrishna, Kuppusamy Pothanaicker, Padma Selvaraj, Surbhi Bhatia Khan, Vinoth Kumar Venkatesan, Saeed Alzahrani, Mohammad Alojail:

Leveraging EfficientNetB3 in a Deep Learning Framework for High-Accuracy MRI Tumor Classification. 867-883 - Novsheena Rasool, Javaid Iqbal Bhat, Najib Ben Aoun, Abdullah Alharthi, Niyaz Ahmad Wani, Vikram Chopra, Muhammad Shahid Anwar:

ResMHA-Net: Enhancing Glioma Segmentation and Survival Prediction Using a Novel Deep Learning Framework. 885-909 - Naeem Raza, Muhammad Asif Habib, Mudassar Ahmad, Qaisar Abbas, Mutlaq B. Aldajani, Muhammad Ahsan Latif:

Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems. 911-931 - Shuang Kang, Yinchao He, Wenwen Li, Sen Liu:

Research on Defect Detection of Wind Turbine Blades Based on Morphology and Improved Otsu Algorithm Using Infrared Images. 933-949 - Muhammad Naeem Ul Hassan, Zhengtao Yu, Jian Wang, Ying Li, Shengxiang Gao, Shuwan Yang, Cunli Mao:

LKMT: Linguistics Knowledge-Driven Multi-Task Neural Machine Translation for Urdu and English. 951-969 - Abbas Ali Hassan, Fardin Abdali Mohammadi:

Automatic Extraction of Medical Latent Variables from ECG Signals Utilizing a Mutual Information-Based Technique and Capsular Neural Networks for Arrhythmia Detection. 971-983 - Zeshuang Song, Xiao Wang, Qing Wu, Yanting Tao, Linghua Xu, Yaohua Yin, Jianguo Yan:

A Task Offloading Strategy Based on Multi-Agent Deep Reinforcement Learning for Offshore Wind Farm Scenarios. 985-1008 - Juanling Liang, Wenguang Luo, Yongxin Qin:

Path Planning of Multi-Axis Robotic Arm Based on Improved RRT. 1009-1027 - Vincent Omollo Nyangaresi

, Arkan A. Ghaib, Hend Muslim Jasim, Zaid Ameen Abduljabbar, Junchao Ma, Mustafa A. Al Sibahee, Abdulla J. Y. Aldarwish, Ali Hasan Ali, Husam A. Neamah:
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks. 1029-1057 - Adisa Haskovic Dzubur, Samir Causevic, Belma Memic, Muhamed Begovic, Elma Avdagic-Golub, Alem Colakovic:

Optimization Model Proposal for Traffic Differentiation in Wireless Sensor Networks. 1059-1084 - Baowei Wang, Wen You:

Virtual Assembly Collision Detection Algorithm Using Backpropagation Neural Network. 1085-1100 - Futai Liang, Xin Chen, Song He, Zihao Song, Hao Lu:

An Aerial Target Recognition Algorithm Based on Self-Attention and LSTM. 1101-1121 - Zongbao Jiang, Minqing Zhang, Weina Dong, Chao Jiang, Fuqiang Di:

Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption. 1123-1155 - Ting Cai, Chun Ye, Zhiwei Ye, Ziyuan Chen, Mengqing Mei, Haichao Zhang, Wanfang Bai, Peng Zhang:

Multi-Label Feature Selection Based on Improved Ant Colony Optimization Algorithm with Dynamic Redundancy and Label Dependence. 1157-1175 - Suzhe Wang, Xueying Zhang, Fenglian Li, Zelin Wu:

Stroke Electroencephalogram Data Synthesizing through Progressive Efficient Self-Attention Generative Adversarial Network. 1177-1196 - Chunyuan Li, Peng Zhang, Shuangming Wang, Lie Liu, Mingquan Shi:

Industrial Fusion Cascade Detection of Solder Joint. 1197-1214 - Hind Baageel, Md Mahfuzur Rahman:

Leveraging Sharding-Based Hybrid Consensus for Blockchain. 1215-1233 - Tongan Yu, Yali Xue, Yiming He, Shan Cui, Jun Hong:

Adversarial Defense Technology for Small Infrared Targets. 1235-1250 - Qianqian Zhang, Yingmei Li, Jianjun Zhan, Shan Chen:

Improved Harris Hawks Algorithm and Its Application in Feature Selection. 1251-1273 - Byeongcheon Lee, Sangmin Kim, Muazzam Maqsood, Jihoon Moon

, Seungmin Rho:
Advancing Autoencoder Architectures for Enhanced Anomaly Detection in Multivariate Industrial Time Series. 1275-1300 - Qingkun Chen, Qinmu Wu:

Dynamic Networking Method of Vehicles in VANET. 1301-1318 - Zhaoan Wang, Kishlay Jha, Shaoping Xiao:

Continual Reinforcement Learning for Intelligent Agricultural Management under Climate Changes. 1319-1336 - Jianhua Liu, Jincheng Wei, Rongxin Luo, Guilin Yuan, Jiajia Liu, Xiaoguang Tu:

Computation Offloading in Edge Computing for Internet of Vehicles via Game Theory. 1337-1361 - Wenxia Wang, Jinchen Xu, Xiaodong Ding, Zhihui Song, Yizhen Huang, Xin Zhou, Zheng Shan:

HQNN-SFOP: Hybrid Quantum Neural Networks with Signal Feature Overlay Projection for Drone Detection Using Radar Return Signals - A Simulation. 1363-1390 - Ke Li, Xiaofeng Wang, Hu Wang:

Hierarchical Optimization Method for Federated Learning with Feature Alignment and Decision Fusion. 1391-1407 - Hongjun Zhang, Zeyu Zhang, Yilong Ruan, Hao Ye, Peng Li, Desheng Shi:

Research on Tensor Multi-Clustering Distributed Incremental Updating Method for Big Data. 1409-1432 - Xiong Zhang, Minqing Zhang, Xu'an Wang, Siyuan Huang, Fuqiang Di:

Constructive Robust Steganography Algorithm Based on Style Transfer. 1433-1448 - Suya Li, Ying Cao, Hengyi Ren

, Dongsheng Zhu, Xin Xie:
LQTTrack: Multi-Object Tracking by Focusing on Low-Quality Targets Association. 1449-1470 - Lechan Yang, Li Li, Shouming Ma:

TGAIN: Geospatial Data Recovery Algorithm Based on GAIN-LSTM. 1471-1489 - Shuai Cao, Jianan Liang, Yongjun Cao, Jinglun Huang, Zhishu Yang:

PSMFNet: Lightweight Partial Separation and Multiscale Fusion Network for Image Super-Resolution. 1491-1509 - Muhammad Aamer Ejaz, Kamalrulnizam Abu Bakar, Ismail Fauzi Bin Isnin, Babangida Isyaku, Taiseer Abdalla Elfadil Eisa, Abdelzahir Abdelmaboud, Asma Abbas Hassan Elnour:

Elevating Localization Accuracy in Wireless Sensor Networks: A Refined DV-Hop Approach. 1511-1528 - Shijie Yang, Jiateng Yuan, Zhipeng Zhang, Zhibo Chen, Hanchao Zhang, Xiaohui Cui

:
Multi-UAV Collaborative Mission Planning Method for Self-Organized Sensor Data Acquisition. 1529-1563 - Menghan Zhang, Fangfang Shan, Mengyao Liu, Zhenyu Wang:

Research on Fine-Grained Recognition Method for Sensitive Information in Social Networks Based on CLIP. 1565-1580 - Chi Cui, Haiping Du

, Zhijuan Jia, Yuchu He, Lipeng Wang:
Blockchain-Enabled Federated Learning with Differential Privacy for Internet of Vehicles. 1581-1593 - Tao Zheng, Rui Tang, Xingshu Chen, Changxiang Shen:

KubeFuzzer: Automating RESTful API Vulnerability Detection in Kubernetes. 1595-1612 - Lingsheng Li, Weiqing Bai, Chong Han:

Multiscale Feature Fusion for Gesture Recognition Using Commodity Millimeter-Wave Radar. 1613-1640 - Zhihong Lin, Zeng Zeng, Yituan Yu, Yinlin Ren, Xuesong Qiu, Jinqian Chen:

Graph Attention Residual Network Based Routing and Fault-Tolerant Scheduling Mechanism for Data Flow in Power Communication Network. 1641-1665 - Gang Long, Zhaoxin Zhang:

Adaptive Update Distribution Estimation under Probability Byzantine Attack. 1667-1685 - Tao Zheng, Wenyi Tang, Xingshu Chen, Changxiang Shen:

NCCMF: Non-Collaborative Continuous Monitoring Framework for Container-Based Cloud Runtime Status. 1687-1701 - Fahim Nasir, Abdulghani Ali Ahmed, Mehmet Sabir Kiraz, Iryna Yevseyeva, Mubarak Saif:

Data-Driven Decision-Making for Bank Target Marketing Using Supervised Learning Classifiers on Imbalanced Big Data. 1703-1728 - Manh-Tuyen Vi, Duc-Nghia Tran, Vu Thi Thuong, Nguyen Ngoc Linh, Duc-Tan Tran:

Efficient Real-Time Devices Based on Accelerometer Using Machine Learning for HAR on Low-Performance Microcontrollers. 1729-1756 - Liang Zeng, Ziyang Ding, Junyang Shi, Shanshan Wang:

A Discrete Multi-Objective Squirrel Search Algorithm for Energy-Efficient Distributed Heterogeneous Permutation Flowshop with Variable Processing Speed. 1757-1787 - Umar Zaman, Junaid Khan, Eunkyu Lee, Sajjad Hussain, Awatef Salem Balobaid, Rua Y. Aburasain, Kyungsup Kim:

An Efficient Long Short-Term Memory and Gated Recurrent Unit Based Smart Vessel Trajectory Prediction Using Automatic Identification System Data. 1789-1808 - Bolin Guo, Shi Qiu, Pengchang Zhang, Xingjia Tang:

Mural Anomaly Region Detection Algorithm Based on Hyperspectral Multiscale Residual Attention Network. 1809-1833 - Zerong Tang, Tiecheng Song, Jing Hu:

V2I Physical Layer Security Beamforming with Antenna Hardware Impairments under RIS Assistance. 1835-1854 - Longgang Zhao, Seok-Won Lee:

Integrating Ontology-Based Approaches with Deep Learning Models for Fine-Grained Sentiment Analysis. 1855-1877 - Shiguang Hu, Le Ru, Bo Lu, Zhenhua Wang, Xiaolin Zhao, Wenfei Wang, Hailong Xi:

Research on Maneuver Decision-Making of Multi-Agent Adversarial Game in a Random Interference Environment. 1879-1903
Volume 81, Number 2, 2024
- Muhammad Abdullah Khan, Muhammad Usman, Yuhong Zhao:

First Principles Calculations for Corrosion in Mg-Li-Al Alloys with Focus on Corrosion Resistance: A Comprehensive Review. 1905-1952 - Jingbo Zhang, Qiong Wu, Pingyi Fan, Qiang Fan:

A Comprehensive Survey on Joint Resource Allocation Strategies in Federated Edge Learning. 1953-1998 - Altaf Hussain, Shuaiyong Li

, Tariq Hussain, Xianxuan Lin, Farman Ali
, Ahmad Ali AlZubi:
Computing Challenges of UAV Networks: A Comprehensive Survey. 1999-2051 - Monirah Al-Ajlan, Mourad Ykhlef:

A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions. 2053-2076 - Mohd Asif Hajam, Tasleem Arif, Akib Mohi Ud Din Khanday, Mudasir Ahmad Wani, Muhammad Asim:

AI-Driven Pattern Recognition in Medicinal Plants: A Comprehensive Review and Comparative Analysis. 2077-2131 - Mitra Madanchian, Hamed Taherdoost:

AI-Powered Innovations in High-Tech Research and Development: From Theory to Practice. 2133-2159 - Mujahid Ali:

Discrete Choice Models and Artificial Intelligence Techniques for Predicting the Determinants of Transport Mode Choice - A Systematic Review. 2161-2194 - Ting Chen, Shuna Jiang, Xin Fan, Jianchuan Xia, Xiujuan Zhang, Chuanwen Luo, Yi Hong:

Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems. 2195-2217 - Jian Su, Haijian Shao, Xing Deng, Yingtao Jiang:

An Investigation of Frequency-Domain Pruning Algorithms for Accelerating Human Activity Recognition Tasks Based on Sensor Data. 2219-2242 - Hina Bhanbhro, Yew Kwang Hooi, Mohamed Nordin Bin Zakaria, Worapan Kusakunniran, Zaira Hassan:

MCBAN: A Small Object Detection Multi-Convolutional Block Attention Network. 2243-2259 - Haemin Jung, Heesung Park, Hae Sun Jung, Kwangyon Lee:

Enhancing Building Facade Image Segmentation via Object-Wise Processing and Cascade U-Net. 2261-2279 - Trong Thua Huynh

, Hoang Thanh Nguyen, Du Thang Phu:
Enhancing Fire Detection Performance Based on Fine-Tuned YOLOv10. 2281-2298 - Bassam Mohammad Elzaghmouri

, Yosef Hasan Fayez Jbara, Said Elaiwat, Nisreen Innab, Ahmed A. F. Osman, Mohammed Ataelfadiel, Farah H. Zawaideh, Mouiad Fadeil Alawneh, Asef Al-Khateeb, Marwan Abu-Zanona:
A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments. 2299-2316 - Xiaojun Jin, Chao Ma, Song Luo, Pengyi Zeng, Yifei Wei:

Two-Stage Client Selection Scheme for Blockchain-Enabled Federated Learning in IoT. 2317-2336 - Van-Truong Nguyen, Dai-Nhan Duong, Dinh-Hieu Phan, Thanh-Lam Bui, Xiem HoangVan, Phan Xuan Tan:

Adaptive Nonlinear PD Controller of Two-Wheeled Self-Balancing Robot with External Force. 2337-2356 - Altaf Hussain, Shuaiyong Li

, Tariq Hussain, Razaz Waheeb Attar, Farman Ali
, Ahmed Alhomoud, Babar Shah:
Integrated Energy-Efficient Distributed Link Stability Algorithm for UAV Networks. 2357-2394 - Deema Alsekait, Mohammed Zakariah, Syed Umar Amin, Zafar Iqbal Khan, Jehad Saad Alqurni:

Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network. 2395-2436 - Bing Shi, Jianhua Zhao, Bin Ma, Juan Huan, Yueping Sun:

A Novel YOLOv5s-Based Lightweight Model for Detecting Fish's Unhealthy States in Aquaculture. 2437-2456 - Yucheng Liang, Ke Niu, Yingnan Zhang, Yifei Meng, Fangmeng Hu:

Adaptive Video Dual Domain Watermarking Scheme Based on PHT Moment and Optimized Spread Transform Dither Modulation. 2457-2492 - Sameema Tariq, Ata ur-Rehman, Maria Abubakar, Waseem Iqbal, Hatoon S. Alsagri

, Yousef A. Alduraywish, Haya Abdullah Abdulaziz Alhakbani:
A Recurrent Neural Network for Multimodal Anomaly Detection by Using Spatio-Temporal Audio-Visual Data. 2493-2515 - Wenming Wang, Zhiquan Liu, Shumin Zhang, Guijiang Liu:

Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments. 2517-2545 - Gajjala Savithri, Nallagatla Raghavendra Sai:

Dynamic Deep Learning for Enhanced Reliability in Wireless Sensor Networks: The DTLR-Net Approach. 2547-2569 - Keke Zhou, Guoqiang Zheng, Huihui Zhai, Xiangshuai Lv, Weizhen Zhang:

An Improved Distraction Behavior Detection Algorithm Based on YOLOv5. 2571-2585 - Mehwash Farooqui, Atta Rahman

, Latifa Alsuliman, Zainab Alsaif, Fatimah Albaik, Cadi Alshammari, Razan Sharaf, Sunday O. Olatunji, Sara Waslallah Althubaiti, Hina Gull:
A Deep Learning Approach to Industrial Corrosion Detection. 2587-2605 - Zong-Dong Du, Xuefeng Feng, Feng Li, Qing-Long Xian, Zhenhong Jia:

A Lightweight UAV Visual Obstacle Avoidance Algorithm Based on Improved YOLOv8. 2607-2627 - Chen Chen, Kai Qiao, Jie Yang, Jian Chen, Bin Yan:

PCB CT Image Element Segmentation Model Optimizing the Semantic Perception of Connectivity Relationship. 2629-2642 - Rongwei Yu, Xiya Guo, Peihao Zhang, Kaijuan Zhang:

HGNN-ETC: Higher-Order Graph Neural Network Based on Chronological Relationships for Encrypted Traffic Classification. 2643-2664 - Kusum Yadav, Yasser Alharbi, Eissa Jaber Alreshidi, Abdulrahman Alreshidi, Anuj Kumar Jain, Anurag Jain, Kamal Kumar, Sachin Sharma, Brij B. Gupta:

A Comprehensive Image Processing Framework for Early Diagnosis of Diabetic Retinopathy. 2665-2683 - Tao Yan, Javed Rashid, Muhammad Shoaib Saleem, Sajjad Ahmad, Muhammad Faheem:

A Hybrid Deep Learning Approach for Green Energy Forecasting in Asian Countries. 2685-2708 - Jinlin Xu, Wansu Pan, Haibo Tan, Longle Cheng, Xiaofeng Li:

An Adaptive Congestion Control Optimization Strategy in SDN-Based Data Centers. 2709-2726 - Ahamad B. Alkodre, Nour Mahmoud Bahbouh, Sandra Sendra, Adnan Ahmed Abi Sen, Yazed Alsaawy, Saad Said Alqahtany, Abdallah Namoun, Hani Almoamari:

A Shuffling-Steganography Algorithm to Protect Data of Drone Applications. 2727-2751 - Yong Xu, Xuewei Zhang, Wenlong Xie, Shihong Zhang, Xinyue Huang, Yaqiang Tian, Liansheng Chen:

Fuzzy Control Optimization of Loading Paths for Hydroforming of Variable Diameter Tubes. 2753-2768 - Yameng Yin, Lieping Zhang, Xiaoxu Shi, Yilin Wang, Jiansheng Peng, Jianchu Zou:

Improved Double Deep Q Network Algorithm Based on Average Q-Value Estimation and Reward Redistribution for Robot Path Planning. 2769-2790 - Isha Sood, Varsha Sharma:

TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection. 2791-2818 - Mehrdad Shoeibi, Mohammad Mehdi Sharifi Nevisi, Sarvenaz Sadat Khatami, Diego Martín, Sepehr Soltani, Sina Aghakhani

:
Improved IChOA-Based Reinforcement Learning for Secrecy Rate Optimization in Smart Grid Communications. 2819-2843 - Shanjita Akter Prome, Md. Rafiqul Islam, Md. Kowsar Hossain Sakib, David Asirvatham, Neethiahnanthan Ari Ragavan, Cesar Sanín, Edward Szczerbicki:

LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques. 2845-2871 - Alaa Thobhani, Beiji Zou, Xiaoyan Kui, Amr Abdussalam, Muhammad Asim, Naveed Ahmed, Mohammed Ali Alshara:

A Concise and Varied Visual Features-Based Image Captioning Model with Visual Selection. 2873-2894 - Jian Feng, Tian Liu, Cailing Du:

Position-Aware and Subgraph Enhanced Dynamic Graph Contrastive Learning on Discrete-Time Dynamic Graph. 2895-2909 - Sanxia Shi, Yinglei Song:

A Novel Filtering-Based Detection Method for Small Targets in Infrared Images. 2911-2934 - Alonso Alvarez, Borja Bordel Sánchez:

How Software Engineering Transforms Organizations: An Open and Qualitative Study on the Organizational Objectives and Motivations in Agile Transformations. 2935-2966 - Mohana Priya Govindarajan:

Automatic Fetal Segmentation Designed on Computer-Aided Detection with Ultrasound Images. 2967-2986 - Tanvir Fatima Naik Bukht, Abdulwahab Alazeb, Naif Al Mudawi, Bayan Alabdullah, Khaled Alnowaiser

, Ahmad Jalal, Hui Liu:
Robust Human Interaction Recognition Using Extended Kalman Filter. 2987-3002 - Hira Akhtar Butt, Khoula Said Al Harthy, Mumtaz Ali Shah, Mudassar Hussain, Rashid Amin

, Mujeeb Ur Rehman:
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking. 3003-3031 - Jeng-Shyang Pan, Wenda Li, Shu-Chuan Chu, Xiao Sui, Junzo Watada:

Enhanced Growth Optimizer and Its Application to Multispectral Image Fusion. 3033-3062 - Shaoxiong Wu, Ruoxin Li, Xiaofeng Tao, Hailong Wu, Ping Miao, Yang Lu, Yanyan Lu, Qi Liu, Li Pan:

A Combined Method of Temporal Convolutional Mechanism and Wavelet Decomposition for State Estimation of Photovoltaic Power Plants. 3063-3077 - Farida Asriani, Azhari Azhari, Wahyono Wahyono

:
Improving Badminton Action Recognition Using Spatio-Temporal Analysis and a Weighted Ensemble Learning Model. 3079-3096 - Long Giang Nguyen, Tran Thanh Dai, Le Hoang Son, Tran Thi Ngan, Nguyen Nhu Son

, Cu Nguyen Giap:
Attribute Reduction on Decision Tables Based on Hausdorff Topology. 3097-3124 - Sonia Goel, Meena Tushir, Jyoti Arora, Tripti Sharma, Deepali Gupta, Ali Nauman, Ghulam Muhammad:

An Enhanced Integrated Method for Healthcare Data Classification with Incompleteness. 3125-3145 - Nataliya Shakhovska, Mykola O. Medykovskyy, Oleksandr Gurbych, Mykhailo Mamchur, Mykhailo Melnyk:

Enhancing Solar Energy Production Forecasting Using Advanced Machine Learning and Deep Learning Techniques: A Comprehensive Study on the Impact of Meteorological Data. 3147-3163 - Samsul Huda

, Yasuyuki Nogami, Maya Rahayu, Takuma Akada, Md. Biplob Hossain, Muhammad Bisri Musthafa, Yang Jie, Le Hoang Anh
:
IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication. 3165-3187 - Mohammed Amin Almaiah, Leen Mohammad Saqr, Leen Ahmad Al-Rawwash, Layan Ahmed Altellawi, Romel Al-Ali, Omar Almomani:

Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems. 3189-3220 - Jiajun Liu, Lina Tan, Zhili Zhou, Weijin Jiang, Yi Li, Peng Chen:

A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography. 3221-3240 - Mingyuan Zhai, Hanquan Zhang, Le Wang, Dong Xiao, Zhengmin Gu, Zhenni Li:

Special Vehicle Target Detection and Tracking Based on Virtual Simulation Environment and YOLOv5-Block+DeepSort Algorithm. 3241-3260 - Chenghai Yu, Zhilong Lu:

YOLO-VSI: An Improved YOLOv8 Model for Detecting Railway Turnouts Defects in Complex Environments. 3261-3280 - Yuefan Liu, Ducheng Zhang, Chen Guo:

GL-YOLOv5: An Improved Lightweight Non-Dimensional Attention Algorithm Based on YOLOv5. 3281-3299 - Yuanyuan Ma, Ang Chen, Cunzhi Hou, Ruixia Jin, Jinghui Zhang, Ruixiang Li:

DC-FIPD: Fraudulent IP Identification Method Based on Homology Detection. 3301-3323 - Xi Li, Yuxin Li, Zhenhua Xiao, Zhenghua Huang, Lianying Zou:

DAUNet: Detail-Aware U-Shaped Network for 2D Human Pose Estimation. 3325-3349 - Qi Wang, Chenxin Li, Chichen Lin, Weijian Fan, Shuang Feng, Yuanzhong Wang:

A News Media Bias and Factuality Profiling Framework Assisted by Modeling Correlation. 3351-3369 - Juhwan Kim, Baehoon Son, Jihyeon Yu, Joobeom Yun:

AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics. 3371-3393 - Arar Al Tawil, Laiali Almazaydeh, Doaa Sami Qawasmeh, Baraah Qawasmeh, Mohammad Alshinwan, Khaled Elleithy:

Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT. 3395-3412
Volume 81, Number 3, 2024
- Fangling Yang, Qian Wang

, Eric Jianfeng Cheng, Di Zhang
, Hao Li
:
User Instructions for the Dynamic Database of Solid-State Electrolyte 2.0 (DDSE 2.0). 3413-3419 - Chenquan Gan, Qingyi Zhu, Xinghai Xiao, Deepak Kumar Jain, Akanksha Saini:

Blockchain-Assisted Electronic Medical Data-Sharing: Developments, Approaches and Perspectives. 3421-3450 - Shi Dong, Mengke Liu, Khushnood Abbas:

The Metaverse Review: Exploring the Boundless Ream of Digital Reality. 3451-3498 - Ali Hassan

, N. Nizam-Uddin, Asim Quddus, Syed Rizwan Hassan
, Ateeq Ur Rehman, Salil Bharany:
Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity. 3499-3559 - Jianyong Wang, Mingliang Gao, Qilei Li, Hyunbum Kim, Gwanggil Jeon:

A Survey on Supervised, Unsupervised, and Semi-Supervised Approaches in Crowd Counting. 3561-3582 - Xiaolong Qu, Ziwei Tian, Jinman Cui, Ruowei Li, Dongmei Li, Xiaoping Zhang:

A Review of Knowledge Graph in Traditional Chinese Medicine: Analysis, Construction, Application and Prospects. 3583-3616 - João Manuel R. S. Tavares, Chiranjeevi Karri, José J. M. Machado, Deepak Kumar Jain, Suresh Dannana, Santosh Kumar Gottapu, Amir H. Gandomi:

Recent Technology Advancements in Smart City Management: A Review. 3617-3663 - Nicolás Amigo

:
Mechanical Properties of Copper with Dendritic Silver Inclusions: Insights from Molecular Dynamics Simulations. 3665-3678 - Kithmini Godewatte Arachchige, Mohsin Murtaza, Chi-Tsun Cheng

, Bader M. Albahlal, Cheng-Chi Lee:
Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach. 3679-3705 - Fareed A. Jokhio, Mehwish Laghari, Sarfaraz Natha, Mohammad Siraj

, Saif A. Alsaif, Usman Ashraf, Asghar Ali:
A Scalable and Generalized Deep Ensemble Model for Road Anomaly Detection in Surveillance Videos. 3707-3729 - S. Ramacharan, Martin Margala, Amjan Shaik, Prasun Chakrabarti, Tulika Chakrabarti:

Advancing Breast Cancer Diagnosis: The Development and Validation of the HERA-Net Model for Thermographic Analysis. 3731-3760 - Yifan Yu, Dazhi Wang, Yanhua Chen, Hongfeng Wang, Min Huang:

Contribution Tracking Feature Selection (CTFS) Based on the Fusion of Sparse Autoencoder and Mutual Information. 3761-3780 - Xirui Yang, Chen Zhang:

A Location Trajectory Privacy Protection Method Based on Generative Adversarial Network and Attention Mechanism. 3781-3804 - Abduladheem Fadhil Khudhur, Ayça Kurnaz Türkben, Sefer Kurnaz:

Design and Develop Function for Research Based Application of Intelligent Internet-of-Vehicles Model Based on Fog Computing. 3805-3824 - Yang He, Haizhen Wang, Na Jia, Pan Tan:

A DDoS Identification Method for Unbalanced Data CVWGG. 3825-3851 - Dazhi E, Ming Zhang, Jiale Liu, Huiyuan Jiang, Keming Mao:

RE-SMOTE: A Novel Imbalanced Sampling Method Based on SMOTE with Radius Estimation. 3853-3880 - Shi Luo, Sheng Zheng, Yuxin Zhao:

YOLO-DEI: Enhanced Information Fusion Model for Defect Detection in LCD. 3881-3901 - Umapathi Krishnamoorthy

, Shanmugam Jagan, Mohammed Zakariah, Abdulaziz S. Almazyad, K. Gurunathan:
A Novel Optimized Deep Convolutional Neural Network for Efficient Seizure Stage Classification. 3903-3926 - Ting Chen, Shujiao Wang, Xiujuan Zhang, Xin Fan, Chuanwen Luo, Yi Hong:

UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems. 3927-3950 - Rihem Farkh

, Ghislain Oudinet
, Yasser Foued:
Image Captioning Using Multimodal Deep Learning Approach. 3951-3968 - Guojun Chen, Tao Cui, Yongjie Hou, Huihui Li:

EGSNet: An Efficient Glass Segmentation Network Based on Multi-Level Heterogeneous Architecture and Boundary Awareness. 3969-3987 - Ji-Yuan Ding, Changman Zou, Wang-Su Jeon, Sang-Yong Rhee:

An Improved YOLO Detection Approach for Pinpointing Cucumber Diseases and Pests. 3989-4014 - Jehad Ali, Mohammed J. F. Alenazi:

Effective Controller Placement in Software-Defined Internet-of-Things Leveraging Deep Q-Learning (DQL). 4015-4032 - Avi Deb Raha, Mrityunjoy Gain, Md. Mehedi Hassan, Anupam Kumar Bairagi, Fatema Jannat Dihan, Apurba Adhikary, Md. Bipul Hossain, Saydul Akbar Murad, Taher Al-Shehari, Mohammed Kadrie, Nasser A. Alsadhan:

Modeling and Predictive Analytics of Breast Cancer Using Ensemble Learning Techniques: An Explainable Artificial Intelligence Approach. 4033-4048 - Saad Awadh Alanazi:

ML-SPAs: Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks. 4049-4080 - Buchi Reddy Ramakantha Reddy, Lokesh Kumar Ramasamy:

A Fusion Model for Personalized Adaptive Multi-Product Recommendation System Using Transfer Learning and Bi-GRU. 4081-4107 - Brij B. Gupta, Ahmed Alhomoud, Kwok Tai Chui

, Akshat Gaurav, Varsha Arya, Razaz Waheeb Attar, Shavi Bansal:
Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks. 4109-4124 - Farah Mohammad, Khulood Mohammed Al Mansoor:

MDD: A Unified Multimodal Deep Learning Approach for Depression Diagnosis Based on Text and Audio Speech. 4125-4147 - Ammar Odeh, Anas Abu Taleb:

Robust Network Security: A Deep Learning Approach to Intrusion Detection in IoT. 4149-4169 - Rashid Ahmad, Asif Nawaz, Ghulam Mustafa, Tariq Ali, Mehdi Tlija, Mohammed A. El-Meligy, Zohair Ahmed:

CHART: Intelligent Crime Hotspot Detection and Real-Time Tracking Using Machine Learning. 4171-4194 - Stephen Abednego Philemon, Christian Adi Ananta, Christine Dewi, Hanna Prillysca Chernovita, Abbott Po Shun Chen

:
Adjusted Reasoning Module for Deep Visual Question Answering Using Vision Transformer. 4195-4216 - Khushmeen Kaur Brar, Bhawna Goyal, Ayush Dogra, Sampangi Rama Reddy, Ahmed Alkhayyat, Rajesh Singh, Manob Jyoti Saikia:

Multi-Class Skin Cancer Detection Using Fusion of Textural Features Based CAD Tool. 4217-4263 - Monir Abdullah

:
IoT-CDS: Internet of Things Cyberattack Detecting System Based on Deep Learning Models. 4265-4283 - Dunya Ahmed Alkurdi, Mesut Çevik, Abdurrahim Akgundogdu:

Advancing Deepfake Detection Using Xception Architecture: A Robust Approach for Safeguarding against Fabricated News on Social Media. 4285-4305 - Tianzhe Jiao, Yuming Chen, Zhe Zhang, Chaopeng Guo, Jie Song:

MMDistill: Multi-Modal BEV Distillation Framework for Multi-View 3D Object Detection. 4307-4325 - Parthasarathi Manivannan, Palaniyappan Sathyaprakash, Vaithiyashankar Jayakumar, Jayakumar Chandrasekaran, Bragadeesh Srinivasan Ananthanarayanan, Md Shohel Sayeed:

Weather Classification for Autonomous Vehicles under Adverse Conditions Using Multi-Level Knowledge Distillation. 4327-4347 - Yahia F. Said, Ali Ahmad Alalawi, Yahya Alassaf, Taoufik Saidani, Refka Ghodhbani, Olfa Ben Rhaiem:

Context-Aware Feature Extraction Network for High-Precision UAV-Based Vehicle Detection in Urban Environments. 4349-4370 - Manh Vu Minh, Cho Do Xuan:

A Novel Approach for Android Malware Detection Based on Intelligent Computing. 4371-4396 - Yi Xuan Chew, Siti Fatimah Abdul Razak, Sumendra Yogarayan

, Sharifah Noor Masidayu Sayed Ismail:
Dual-Modal Drowsiness Detection to Enhance Driver Safety. 4397-4417 - Weiyu Hao, Jingyi Wang, Huimin Lu:

A Real-Time Semantic Segmentation Method Based on Transformer for Autonomous Driving. 4419-4433 - De Rosal Ignatius Moses Setiadi

, Nova Rijati, Ahmad Rofiqul Muslikh, Bonifacius Vicky Indriyono, Aceng Sambas:
Secure Image Communication Using Galois Field, Hyper 3D Logistic Map, and B92 Quantum Protocol. 4435-4463 - Dayong Wang, Kamalrulnizam bin Abu Bak, Babangida Isyaku, Liping Lei:

An Asynchronous Data Transmission Policy for Task Offloading in Edge-Computing Enabled Ultra-Dense IoT. 4465-4483 - Ki-Pyoung Ma, Dong-Ju Ryu, Sang-Joon Lee:

Reverse Analysis Method and Process for Improving Malware Detection Based on XAI Model. 4485-4502 - Sabina Rakhmetulayeva, Zhandos Zhanabekov, Aigerim K. Bolshibayeva:

Evaluation of Modern Generative Networks for EchoCG Image Generation. 4503-4523 - Muhammad Ali Ilyas, Assad Abbas, Abdul Rehman, Dongsun Kim, Muhammad Tahir Naseem

, Nasro Min-Allah:
Fake News Detection on Social Media Using Ensemble Methods. 4525-4549 - Wu-Jiu Sun, Xiao Fan Liu

:
Uncovering Causal Relationships for Debiased Repost Prediction Using Deep Generative Models. 4551-4573 - Soha Rawas, Cerine Tafran, Duaa Hamed Alsaeed, Nadia Al-Ghreimil:

Transforming Healthcare: AI-NLP Fusion Framework for Precision Decision-Making and Personalized Care Optimization in the Era of IoMT. 4575-4601 - Mansoor-ul-haque, Muhammad Affan Alim, Muhammad Taha Jilani, Muhammad Mansoor Alam, Mazliham Mohd Su'ud:

Enhancing Software Cost Estimation Using Feature Selection and Machine Learning Techniques. 4603-4624 - Naeem Ali Askar, Adib Habbal, Hassen Hamouda, Abdullah M. Alnajim, Sheroz Khan:

SEF: A Smart and Energy-Aware Forwarding Strategy for NDN-Based Internet of Healthcare. 4625-4658 - Juliet A. Murali, Brindha T.:

A Multi-Objective Clustered Input Oriented Salp Swarm Algorithm in Cloud Computing. 4659-4690 - Maryam Mahsal Khan, Attaullah Buriro, Tahir Ahmad, Subhan Ullah:

Backdoor Malware Detection in Industrial IoT Using Machine Learning. 4691-4705 - Musulmon Lolaev, Anand Paul, Jeonghong Kim:

Assessor Feedback Mechanism for Machine Learning Model. 4707-4726 - YongBeom Park, Jian Kim, Beomkyu Suh, Ismatov Akobir, Ki-Il Kim:

Content Caching Algorithms in Drone-Aided Ad Hoc Networks. 4727-4742 - Praveena Nuthakki, T. Pavan Kumar, Musaed A. Alhussein, Khursheed Aurangzeb, Muhammad Shahid Anwar, Leenendra Chowdary Gunnam

:
AI-Driven Resource and Communication-Aware Virtual Machine Placement Using Multi-Objective Swarm Optimization for Enhanced Efficiency in Cloud-Based Smart Manufacturing. 4743-4756 - Taha Yacine Trad, Kheireddine Choutri, Mohand Lagha, Souham Meshoul, Fouad Khenfri, Raouf Fareh, Hadil Shaiba:

Real-Time Implementation of Quadrotor UAV Control System Based on a Deep Reinforcement Learning Approach. 4757-4786 - Wahidah Hashim, Reema Thabit, Israa Ibraheem Al-Barazanchi, Mashary Nawwaf Alrasheedy, Abeer Aljohan, Jongwoon Park, Byoungchol Chang:

Optimizing the Clinical Decision Support System (CDSS) by Using Recurrent Neural Network (RNN) Language Models for Real-Time Medical Query Processing. 4787-4832 - Weiwei Hu, Kiran Sree Pokkuluri

, Rajesh Arunachalam, Bander A. Jabr, Yasser A. Ali, Preethi Palanisamy:
RSSI-Based 3D Wireless Sensor Node Localization Using Hybrid T Cell Immune and Lotus Optimization. 4833-4851 - Brij B. Gupta, Akshat Gaurav, Razaz Waheeb Attar, Varsha Arya, Shavi Bansal, Ahmed Alhomoud, Kwok Tai Chui

:
A Hybrid CNN-Brown-Bear Optimization Framework for Enhanced Detection of URL Phishing Attacks. 4853-4874 - Fuheng Qu, Yuhang Shi, Yong Yang, Yuyao Liu, Yating Hu:

Coordinate Descent K-means Algorithm Based on Split-Merge. 4875-4893 - Surbhi Bhatia Khan, Mohammad Alojail, Mahesh Thyluru Ramakrishna, Hemant Sharma:

A Hybrid WSVM-Levy Approach for Energy-Efficient Manufacturing Using Big Data and IoT. 4895-4914

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














