Journal: Comput. J.

Volume 66, Issue 1

1 -- 15Nagaraj Honnikoll, Ishwar Baidari. Mean Error Rate Weighted Online Boosting Method
16 -- 34Saihua Cai, Jinfu Chen 0001, Haibo Chen 0005, Chi Zhang 0046, Qian Li, Dengzhou Shi, Wei Lin. Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints
35 -- 46Sana Khanam, Safdar Tanweer, Syed Sibtain Khalid. Youtube Trending Videos: Boosting Machine Learning Results Using Exploratory Data Analysis
47 -- 60Alonso Tenorio-Trigoso, Manuel Castillo-Cara, Giovanny Mondragón-Ruiz, Carmen Carrión 0001, María Blanca Caminero. An Analysis of Computational Resources of Event-Driven Streaming Data Flow for Internet of Things: A Case Study
61 -- 69Jafar Majidpour, Samer Kais Jameel, Jihad Anwar Qadir. Face Identification System Based on Synthesizing Realistic Image using Edge-Aided GANs
70 -- 85Niharika Gupta, Baij Nath Kaushik. Prognosis and Prediction of Breast Cancer Using Machine Learning and Ensemble-Based Training Model
86 -- 100Surbhi Gupta 0002, Manoj Kumar Gupta. Computational Model for Prediction of Malignant Mesothelioma Diagnosis
101 -- 113Parsi Kalpana. Chronological Sailfish Optimizer for Preserving Privacy in Cloud Based on Khatri-Rao Product
114 -- 127Qiaohong Hao, Qi Zhao, Mateu Sbert, Qinghe Feng, Cosmin Ancuti, Miquel Feixas, Màrius Vila, Jiawan Zhang. Information-Theoretic Channel for Multi-exposure Image Fusion
128 -- 143Mohammad Nabipour, Amir Reza Momen. A Novel Approach to Adaptive Resource Allocation for Energy Saving in Reconfigurable Heterogeneous Networks
144 -- 159Ankush Manocha, Gulshan Kumar, Munish Bhatia. IoT Analytics-inspired Real-time Monitoring for Early Prediction of COVID-19 Symptoms
160 -- 173Xiaodan Li, Wenling Wu. Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure
174 -- 183Qing Wang, Xi Zhang, Jing Qin, Jixin Ma, Xinyi Huang. A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree
184 -- 196Jinlu Liu, Bo Zhao, Jing Qin 0002, Xi Zhang, Jixin Ma 0001. Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing
197 -- 207Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu. Multi-key Fully Homomorphic Encryption from Additive Homomorphism
208 -- 220Chingfang Hsu, Lein Harn, Zhe Xia, Jianqun Cui, Jingxue Chen. Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks
221 -- 228Yulong Wei, Ronghua Li, Weihua Yang. Hybrid Fault Diagnosis Capability Analysis of Highly Connected Graphs
229 -- 244Mohammad Jalilvand Aghdam Bonab, Ramin Shaghaghi Kandovan. Effective Resource Allocation and Load Balancing in Hierarchical HetNets: Toward QoS-Aware Multi-Access Edge Computing
245 -- 266Ramachandro Majji, R. Rajeswari, Ch. Vidyadhari, Rajan Cristin. Squirrel Search Deer Hunting-Based Deep Recurrent Neural Network for Survival Prediction Using PAN-Cancer Gene Expression Data
267 -- 0Muthumanikandan Vanamoorthy, Valliyammai Chinnaiah. Corrigendum to: Congestion Free Transient Plane(CFTP) using bandwidth sharing during link failures in SDN