Intelligent Automation & Soft Computing, Volume 34 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 34, Number 1, 2022

Hyun Yoo, Kyungyong Chung:
Classification of Multi-Frame Human Motion Using CNN-based Skeleton Extraction. 1-13

S. Parvathi, S. Umamaheswari
:
Discrete Firefly Algorithm for Optimizing Topology Generation and Core Mapping of Network-on-Chip. 15-32

S. K. Janarthanan, C. Kathirvel:
Optimized CUK Converter Based 1Φ Grid Tied Photovoltaic System. 33-50

Debasis Mohapatra, Sourav Kumar Bhoi, Kalyan Kumar Jena, Chittaranjan Mallick, Kshira Sagar Sahoo, N. Z. Jhanjhi
, Mehedi Masud:
Core-based Approach to Measure Pairwise Layer Similarity in Multiplex Network. 51-64

K. C. Rajeswari, R. S. Mohana, S. Manikandan, S. Beski Prabaharan
:
Speech Quality Enhancement Using Phoneme with Cepstrum Variation Features. 65-86

Saydul Akbar Murad
, Apurba Adhikary
, Abu Jafar Md Muzahid
, Md. Murad Hossain Sarker, Md. Ashikur Rahman Khan, Md. Bipul Hossain, Anupam Kumar Bairagi, Mehedi Masud, Md. Kowsher:
AI Powered Asthma Prediction Towards Treatment Formulation: An Android App Approach. 87-103

Valliappan Raman
, Khaled ELKarazle, Patrick H. H. Then:
Gender-specific Facial Age Group Classification Using Deep Learning. 105-118

Sandeep Kumar, Arpit Jain
, Shilpa Rani, Hammam A. Alshazly, Sahar Ahmed Idris, Sami Bourouis
:
Deep Neural Network Based Vehicle Detection and Classification of Aerial Images. 119-131

J. Arravinth, D. Manjula:
Multi-Agent with Multi Objective-Based Optimized Resource Allocation on Inter-Cloud. 133-147

Rongrong Ni
, Xiaofeng Liu, Yizhou Chen, Xu Zhou, Huili Cai, Chu Kiong Loo:
Negative Emotions Sensitive Humanoid Robot with Attention-Enhanced Facial Expression Recognition Network. 149-164

V. Ravindra Krishna Chandar, M. Thangamani:
False Alarm Reduction in ICU Using Ensemble Classifier Approach. 165-181

S. Manikandan, P. Dhanalakshmi, K. C. Rajeswari, A. Delphin Carolina Rani:
Deep Sentiment Learning for Measuring Similarity Recommendations in Twitter Data. 183-192

V. P. Ajay
, M. Nesasudha:
Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks. 193-204

K. Aruna, G. Pradeep
:
Ant Colony Optimization-based Light Weight Container (ACO-LWC) Algorithm for Efficient Load Balancing. 205-219

Ling Wang, Shan Ji, Zhaokang Wang, Xiaowan Wang, Ghulam Mohiuddin, Yongjun Ren:
Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data. 221-234

Ali G. Alkhathami:
A Stacked Ensemble-Based Classifier for Breast Invasive Ductal Carcinoma Detection on Histopathology Images. 235-247

G. R. Sreekanth, Adel Fahad Alrasheedi
, K. Venkatachalam, Mohamed Abouhawwash
, Sameh S. Askar:
Extreme Learning Bat Algorithm in Brain Tumor Classification. 249-265

Mani Deepak Choudhry
, B. Aruna Devi, M. Sundarrajan:
Novel Optimized Framework for Video Processing in IoRT Driven Hospitals. 267-278

Mahdi Souzanchi-K, Mohammad R. Akbarzadeh-Totonchi, Nadia Naghavi, Ali Sharifnezhad, Vahab Khoshdel:
Adaptive Fuzzy Robust Tracking Control Using Human Electromyogram Signals for Elastic Joint Robots. 279-294

Xinyao Liu, Baojiang Cui, Lantao Xing:
Generating Synthetic Trajectory Data Using GRU. 295-305

R. Anand Babu
, S. Kannan:
Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method. 307-323

A. Backia Abinaya, G. Karthikeyan
:
Data Offloading in the Internet of Vehicles Using a Hybrid Optimization Technique. 325-338

Jenson Jose, Therattil Jose P:
Novel L2CL-LCL Topology for Wireless Power Transmission PMSM Powered Electrical Vehicle. 339-355

Divya Sharma
, Sanjay Jain, Vivek Maik:
Energy Efficient Clustering and Optimized LOADng Protocol for IoT. 357-370

Yintong Wang
, Yingjie Yang, Haiyan Chen, Hao Zheng, Heyou Chang
:
End-to-end Handwritten Chinese Paragraph Text Recognition Using Residual Attention Networks. 371-388

M. Murugesan, S. Thilagamani:
Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos. 389-405

S. Hariharan
, R. Venkatesan:
Background Subtraction in Surveillance Systems Using Local Spectral Histograms and Linear Regression. 407-422

Gurram Sunitha, M. N. Pushpalatha, Anbusubramanian Parkavi, Prasanthi Boyapati
, Ranjan Walia
, Rachna Kohar, Kashif Qureshi:
Modeling of Chaotic Political Optimizer for Crop Yield Prediction. 423-437

S. Karthic
, S. Manoj Kumar
:
Wireless Intrusion Detection Based on Optimized LSTM with Stacked Auto Encoder Network. 439-453

Min Rao, Yufeng Li, Hongye Liu, Isabel Wang, Yongjun Ren:
Influencing Factors Analysis of Rehabilitation for Patients with Spinal Cord Injury. 455-466

K. Naveen Durai, R. Subha, Anandakumar Haldorai
:
Hybrid Invasive Weed Improved Grasshopper Optimization Algorithm for Cloud Load Balancing. 467-483

M. L. Ramamoorthy, S. Selvaperumal, G. Prabhakar:
Self-Balancing Vehicle Based on Adaptive Neuro-Fuzzy Inference System. 485-497

Farah Tawfiq Abdul Hussien
, Abdul Monem S. Rahma
, Hala Bahjat Abdul Wahab:
A Secure E-commerce Environment Using Multi-agent System. 499-514

B. Chinthamani, N. S. Bhuvaneswari, R. Senthil Kumar, N. R. Shanker:
Motor Torque Measurement Using Dual-Function Radar Polarized Signals of Flux. 515-530

Gang Xu, Fan Yun, Xiu-Bo Chen, Shiyuan Xu
, Jingzhong Wang, Tao Shang, Yan Chang, Mianxiong Dong:
Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption. 531-541

Kanagaraj Prathibanandhi, R. Ramesh, C. Yaashuwanth:
Analysis of Brushless DC Motor Using Enhanced Fopid Controller with ALO Algorithm. 543-557

R. Punithavathi
, K. Venkatachalam, Mehedi Masud, Mohammed A. Alzain, Mohamed Abouhawwash
:
Crypto Hash Based Malware Detection in IoMT Framework. 559-574

Vishnu Kumar Kaliappan, Tuan Anh Nguyen
, Dugki Min, Jae-Woo Lee, U. Sakthi
:
Steering Behavior-based Multiple RUAV Obstacle Avoidance Control. 575-591

Honggeun Ji, Jina Kim, Syjung Hwang, Eunil Park:
Automated Crack Detection via Semantic Segmentation Approaches Using Advanced U-Net Architecture. 593-607

Wei Fang
, Yu Sha, Meihan Qi, Victor S. Sheng:
Movie Recommendation Algorithm Based on Ensemble Learning. 609-622

Niraj Kumar
, Vishnu Mohan Mishra, Adesh Kumar:
Smart Grid Security by Embedding S-Box Advanced Encryption Standard. 623-638

S. Deivanayagi
, P. S. Periasamy:
Computer Aided Coronary Atherosclerosis Plaque Detection and Classification. 639-653

D. Kothandaraman
, M. Manickam, Ananthakrishnan Balasundaram
, D. Pradeep, A. Arulmurugan, Arun Kumar Sivaraman, Sita Rani
, Barnali Dey, R. Balakrishna:
Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things. 655-666

D. Banumathy, Osamah Ibrahim Khalaf, Carlos Andrés Tavera Romero
, J. Indra, Dilip Kumar Sharma
:
CAD of BCD from Thermal Mammogram Images Using Machine Learning. 667-685

Siti Nurul Aqmariah Mohd Kanafiah, Mohd. Yusoff Mashor, Zeehaida Mohamed, Yap Chun Way, Shazmin Aniza Abdul Shukor, Yessi Jusman:
An Intelligent Classification System for Trophozoite Stages in Malaria Species. 687-697
Volume 34, Number 2, 2022

T. Manojpraphakar, A. Soundarrajan:
Deep Contextual Learning for Event-Based Potential User Recommendation in Online Social Networks. 699-713

Tamara Al Shloul, Usman Azmat
, Suliman A. Alsuhibany, Yazeed Yasin Ghadi
, Ahmad Jalal, Jeongmin Park:
Smartphone Sensors Based Physical Life-Routine for Health Education. 715-732

Yurananatul Mangalmurti, Naruemon Wattanapongsakorn:
Practical Machine Learning Techniques for COVID-19 Detection Using Chest X-Ray Images. 733-752

A. Herald, C. Vennila
:
Errorless Underwater Channel Selection Scheme Using Forward Error Rectification and Modulation. 753-768

Samirah Alzahrani, A. I. EL-Maghrabi, M. S. Badr:
Another View of Weakly Open Sets Via DNA Recombination. 769-783

Pankaj Jood
, Sanjeev Kumar Aggarwal, Vikram Chopra:
Adaptive Neuro-Fuzzy Based Load Frequency Control in Presence of Energy Storage Devices. 785-804

Sriramulu Bojjagani
, D. R. Denslin Brabin
, K. Saravanan:
Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment. 805-819

P. Kavitha, P. Subha Karuvelam:
A Novel Controller for Microgrid Interactive Hybrid Renewable Power Sources. 821-836

Kamppa Lavanya
, K. Vimala Devi
, B. R. Tapas Bapu:
Deep Reinforcement Extreme Learning Machines for Secured Routing in Internet of Things (IoT) Applications. 837-848

Vinay Gautam, Jyoti Rani:
Mango Leaf Stress Identification Using Deep Neural Network. 849-864

R. S. Jothilakshmi, S. Chitra Selvi
:
Control and Automation of Hybrid Renewable Energy Harvesting System. 865-876

P. Indra, G. Kavithaa:
Adaptive Resource Allocation Neural Network-Based Mammogram Image Segmentation and Classification. 877-893

S. Kirubadevi
, S. Sutha:
PMSG Based Wind Energy Conversion System Using Intelligent MPPT with HGRSC Converter. 895-910

R. Vidhya, T. T. Mirnalinee
:
Hybrid Optimized Learning for Lung Cancer Classification. 911-925

Jun Wang, Tingjuan Zhang, Yong Cheng, Prof Mingshun Jiang:
Dynamic Selection of Optional Feature for Object Detection. 927-940

Ahtsham Alam, Syed Ahmed Abdullah, Israr Akhter, Suliman A. Alsuhibany, Yazeed Yasin Ghadi
, Tamara Al Shloul, Ahmad Jalal:
Object Detection Learning for Intelligent Self Automated Vehicles. 941-955

U. Hari, A. Ruhan Bevi
:
Dark and Bright Channel Priors for Haze Removal in Day and Night Images. 957-967

S. Aiswarya, R. Gomathi
:
Secured Medical Data Transfer Using Reverse Data Hiding System Through Steganography. 969-982

R. Saveeth, S. Uma Maheswari:
Crack Detection in Composite Materials Using McrowDNN. 983-1000

Yingnan Zhao, Peiyuan Ji, Fei Chen, Guanlan Ji, Sunil Kumar Jha
:
Spatio-temporal Model Combining VMD and AM for Wind Speed Prediction. 1001-1016

M. Manicka Raja
, S. Manoj Kumar
:
Aggregated PSO for Secure Data Transmission in WSN Using Fog Server. 1017-1032

J. Rajalakshmi, S. Siva Ranjani
:
Optimal and Energy Effective Power Allocation Using Multi-Scale Resource GOA-DC-EM in DAS. 1049-1063

Anjani Kumar Singh, Nitish Pathak, Neelam Sharma, Abhishek Gandhar
, Shabana Urooj, Swaleha Zubair, Jabeen Sultana, Guthikonda Nagalaxmi:
An Experimental Approach to Diagnose Covid-19 Using Optimized CNN. 1065-1080

Chunhua Pan, Yi Cao, Jinglong Ren:
Research on the Identification of Hand-Painted and Machine-Printed Thangka Using CBIR. 1081-1091

S. Velmurugan
, P. Ezhumalai, E. A. Mary Anita:
A Neuro Fuzzy with Improved GA for Collaborative Spectrum Sensing in CRN. 1093-1108

V. Manimaran
, K. G. Srinivasagan:
Person Re-Identification Using LBPH and K-Reciprocal Encoding. 1109-1121

S. Jeevitha, K. Valarmathi
:
A Novel Deep Learning Framework for Pulmonary Embolism Detection for Covid-19 Management. 1123-1139

M. E. Shajini Sheeba, P. Jagatheeswari:
Hybrid Renewable Energy System Using Cuckoo Firefly Optimization. 1141-1156

Yuping Deng, Tao Wu, Xi Chen, Amir Homayoon Ashrafzadeh:
Multi-Classification and Distributed Reinforcement Learning-Based Inspection Swarm Offloading Strategy. 1157-1174

Mukhsar
, Ansari Saleh Ahmar
, M. A. El Safty
, Hamed El-Khawaga, M. El Sayed:
Bayesian Convolution for Stochastic Epidemic Model. 1175-1186

P. L. Joseph Raj, Krishnan Kalimuthu, Sabitha Gauni, C. T. Manimegalai:
Extended Speckle Reduction Anisotropic Diffusion Filter to Despeckle Ultrasound Images. 1187-1196

Subaselvi Sundarraj
, Gunaseelan Konganathan:
Energy Efficient Mobile Harvesting Scheme for Clustered SDWSN with Beamforming Technique. 1197-1213

R. Gopi, S. Veena, S. Balasubramanian, D. Ramya, P. Ilanchezhian, A. Harshavardhan, Zatin Gupta
:
IoT Based Disease Prediction Using Mapreduce and LSQN3 Techniques. 1215-1230

E. Gothai, Surbhi Bhatia
, Aliaa M. Alabdali, Dilip Kumar Sharma
, Bhavana Raj Kondamudi, Pankaj Dadheech
:
Design Features of Grocery Product Recognition Using Deep Learning. 1231-1246

Nabila Mansouri
, Khalid Sultan
, Aakash Ahmad
, Ibrahim Alseadoon, Adal Alkhalil:
A Deep Learning Framework for COVID-19 Diagnosis from Computed Tomography. 1247-1264

T. Tamilvizhi, R. Surendran, Carlos Andrés Tavera Romero, Sadish Sendil Murugaraj
:
Privacy Preserving Reliable Data Transmission in Cluster Based Vehicular Adhoc Networks. 1265-1279

J. Noorul Ameen
, S. Jabeen Begum:
Evolutionary Algorithm Based Adaptive Load Balancing (EA-ALB) in Cloud Computing Framework. 1281-1294

Alaa Khalid Alduraibi:
A Hybrid Deep Features PSO-ReliefF Based Classification of Brain Tumor. 1295-1309

Badriya Murdhi Alenzi, Muhammad Badruddin Khan, Mozaherul Hoque Abul Hasanat
, Abdul Khader Jilani Saudagar
, Mohammed Alkhathami, Abdullah AlTameem:
Automatic Annotation Performance of TextBlob and VADER on Covid Vaccination Dataset. 1311-1331

Che-Chern Lin, Chien-Chun Pan:
Generating Intelligent Remedial Materials with Genetic Algorithms and Concept Maps. 1333-1349

T. Ragupathi, M. Govindarajan, T. Priyaradhikadevi:
Class Imbalance Handling with Deep Learning Enabled IoT Healthcare Diagnosis Model. 1351-1366

Himanshu Sharma, Nidhi Gour, Sumit Chakravarty, Fahad Alraddady, Mehedi Masud, Rajneesh Pareek, Arun Kumar
:
Performance Analysis of PTS PAPR Reduction Method for NOMA Waveform. 1367-1375

P. Anitha
, K. Karthik Kumar, M. Ravindran, A. Saravanaselvan:
Evolutionary Algorithm Based Z-Source DC-DC Boost Converter for Charging EV Battery. 1377-1397

M. Nisha, M. Germin Nisha:
Optimum Tuning of Photovoltaic System Via Hybrid Maximum Power Point Tracking Technique. 1399-1413
Volume 34, Number 3, 2022

Huiyu Sun, Ralph Grishman:
Employing Lexicalized Dependency Paths for Active Learning of Relation Extraction. 1415-1423

Hariprasad Siddharthan
, Thangavel Deepa, N. Bharathiraja:
Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM. 1425-1440

D. Karthik Prabhu, R. V. Maheswari
, B. Vigneshwaran
:
Deep Learning Based Power Transformer Monitoring Using Partial Discharge Patterns. 1441-1454

Yazeed Yasin Ghadi
, Israr Akhter, Suliman A. Alsuhibany, Tamara Al Shloul, Ahmad Jalal, Kibum Kim
:
Multiple Events Detection Using Context-Intelligence Features. 1455-1471

Wei Zhou, Hao Wang, Ghulam Mohiuddin, Dan Chen, Yongjun Ren:
Consensus Mechanism of Blockchain Based on PoR with Data Deduplication. 1473-1488

Joddat Fatima
, Amina Jameel, Muhammad Usman Akram, Adeel Muzaffar Syed, Malaika Mushtaq
:
Automatic Localization and Segmentation of Vertebrae for Cobb Estimation and Curvature Deformity. 1489-1504

D. Yuvaraj, S. Shanmuga Priya, M. Braveen
, S. Navaneetha Krishnan, S. Nachiyappan, Abolfazl Mehbodniya, A. Mohamed Uvaze Ahamed, M. Sivaram:
Novel DoS Attack Detection Based on Trust Mode Authentication for IoT. 1505-1522

May A. Al-Otaibi, Hesham Alhumyani, Saleh Ibrahim
, Alaa M. Abbas:
Efficient Medical Image Encryption Framework against Occlusion Attack. 1523-1536

T. Vetriselvi, J. Albert Mayan
, K. V. Priyadharshini, K. Sathyamoorthy
, S. Venkata Lakshmi
, P. Vishnu Raja:
Latent Semantic Based Fuzzy Kernel Support Vector Machine for Automatic Content Summarization. 1537-1551

Daqing Wu, Jiye Cui, Dan Li, Romany Fouad Mansour:
A New Route Optimization Approach of Fresh Agricultural Logistics Distribution. 1553-1569

M. Kavitha, B. Sankara Babu, B. Sumathy, T. Jackulin, N. Ramkumar, A. Manimaran, Ranjan Walia, S. Neelakandan
:
Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins. 1571-1586

M. Sangeetha, S. Malathi:
Modeling Metaheuristic Optimization with Deep Learning Software Bug Prediction Model. 1587-1601

B. Venkatesan, S. Chitra:
Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage. 1603-1615

M. Vanitha
, C. T. Kalaivani
, J. Kirubakaran, R. Praveena:
Effective Channel Allocation for Hybrid Network Usage Between Wi-Fi and Cellular Network. 1617-1627

Jiaqi Wang, Jie Zhang, Genlin Ji, Bo Sheng
:
Criss-Cross Attention Based Auto Encoder for Video Anomaly Event Detection. 1629-1642

R. Meena, V. Thulasi Bai:
Depression Detection on COVID 19 Tweets Using Chimp Optimization Algorithm. 1643-1658

Ashit Kumar Dutta, Yasser Albagory
, Farhan M. Obesat, Anas Waleed Abulfaraj:
Chaotic Krill Herd with Fuzzy Based Routing Protocol for Wireless Networks. 1659-1674

E. P. Kannan, S. S. Vinsley
, T. V. Chithra:
Medical Image Demosaicing Based Design of Newton Gregory Interpolation Algorithm. 1675-1691

A. Jameer Basha
, N. Rajkumar
, Mohammed A. Alzain, Mehedi Masud, Mohamed Abouhawwash
:
Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data. 1693-1706

Jianquan Ouyang
, Jing Zhang, Tianming Liu:
Attention Weight is Indispensable in Joint Entity and Relation Extraction. 1707-1723

Vijaya Krishna Sonthi
, Nagarajan S, N. Krishnaraj:
Deep Learning Based Residual Network Features for Telugu Printed Character Recognition. 1725-1736

Wen-Tsai Sung
, Sung-Jung Hsiao:
Intelligent Measurement and Monitoring by Integrating Fieldbus and Robotic Arm. 1737-1753

Maganti Srinivas
, M. Ramesh Patnaik:
Energy-Efficient Secure Adaptive Neuro Fuzzy Based Clustering Technique for Mobile Adhoc Networks. 1755-1767

K. Sudharson
, S. Arun:
Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm. 1769-1784

Liutao Zhao, Jiawan Zhang, Hairong Jing:
Blockchain-Enabled Digital Rights Management for Museum-Digital Property Rights. 1785-1801

R. S. Latha, K. Venkatachalam, Jehad F. Al-Amri, Mohamed Abouhawwash
:
Shrinkage Linear with Quadratic Gaussian Discriminant Analysis for Big Data Classification. 1803-1818

Henry Ugochukwu Ukwu
, Kamil Yurtkan:
4D Facial Expression Recognition Using Geometric Landmark-based Axes-angle Feature Extraction. 1819-1838

J. Praveenchandar, A. Tamilarasi
:
Resource Allocation Using Phase Change Hyper Switching Algorithm in the Cloud Environment. 1839-1850

B. Gomathi, S. T. Suganthi, T. N. Prabhu, Andriy Kovalenko
:
Multi-Objective Immune Algorithm for Internet of Vehicles for Data Offloading. 1851-1860

Weijian Zhang, Hao Wang, Hao Hua, Qirun Wang:
Selfish Mining and Defending Strategies in the Bitcoin. 1861-1875

Kavitha Chinniyan, Thamil Vani Samiyappan, Aishvarya Gopu, Narmatha Ramasamy:
Image Steganography Using Deep Neural Networks. 1877-1891

N. Sureka
, K. Gunaseelan:
Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm. 1893-1906

Sakorn Mekruksavanich
, Anuchit Jitpattanakul:
Sport-Related Activity Recognition from Wearable Sensors Using Bidirectional GRU Network. 1907-1925

S. Rajagopal, T. Ramakrishnan, S. Vairaprakash:
Anatomical Region Detection Scheme Using Deep Learning Model in Video Capsule Endoscope. 1927-1941

Wenwu Tan, Jianjun Zhang, Jiang Wu, Hao Lan, Xing Liu, Ke Xiao, Li Wang, Haijun Lin, Guang Sun, Peng Guo:
Application of CNN and Long Short-Term Memory Network in Water Quality Predicting. 1943-1958

S. Rajeswari, S. A. Arunmozhi, Y. Venkataramani:
Optimized Reinforcement Learning Based Multipath Transfer Protocol in Wireless Mesh Network. 1959-1970

Wen-Tsai Sung
, Ching-Hao Weng, Sung-Jung Hsiao:
Smart Greenhouse Control via NB-IoT. 1971-1988

Anil Sharma
, Suresh Kumar
:
Shallow Neural Network and Ontology-Based Novel Semantic Document Indexing for Information Retrieval. 1989-2005

Arpit Jain
, Adesh Kumar, Anand Prakash Shukla, Hammam A. Alshazly, Hela Elmannai
, Abeer D. Algarni, Roushan Kumar, Jitendra Yadav
:
Smart Communication Using 2D and 3D Mesh Network-on-Chip. 2007-2021

P. Thilagavathi
, S. Karthikeyan:
Adaptive Multicale Transformation Run-Length Code-Based Test Data Compression in Benchmark Circuits. 2035-2050

Hani A. Albalawi
, Ahmed M. Kassem, Sherif A. Zaid
, Abderrahim Lakhouit, Muhammed A. Arshad:
Energy Management of an Isolated Wind/Photovoltaic Microgrid Using Cuckoo Search Algorithm. 2051-2066

P. Ramadevi
, K. N. Baluprithviraj, V. Ayyem Pillai, Kamalraj Subramaniam:
Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems. 2067-2081

K. Muthulakshmi
, N. Krishnaraj, R. S. Ravi Sankar, A. Balakumar, S. Kanimozhi, B. Kiruthika:
A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems. 2083-2096

Ashit Kumar Dutta, Basit Qureshi
, Yasser Albagory
, Majed Alsanea
, Anas Waleed Abulfaraj, Abdul Rahaman Wahab Sait
:
Glowworm Optimization with Deep Learning Enabled Cybersecurity in Social Networks. 2097-2110

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







