1 | -- | 13 | Ao Zhou, Shangguang Wang, Qibo Sun, Jinglin Li, Qinglin Zhao, Fangchun Yang. Support for spot virtual machine purchasing simulation |
15 | -- | 28 | Su-Kyung Yoon, Young-Sun Youn, Min-Ho Son, Shin-Dug Kim. Harmonized memory system for object-based cloud storage |
29 | -- | 38 | L. Priya, Sheila Anand. Object recognition and 3D reconstruction of occluded objects using binocular stereo |
39 | -- | 49 | R. Kishorekumar, P. Deepa. Automatic change detection using multiindex information map on high-resolution remote sensing images |
51 | -- | 63 | Opinder Singh, Jatinder Singh, Ravinder Singh. Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET |
65 | -- | 77 | R. Rajamohamed, J. Manokaran. Improved credit card churn prediction based on rough clustering and supervised learning techniques |
79 | -- | 90 | Ravi Subban, N. Susitha, Dattatreya P. Mankame. Efficient iris recognition using Haralick features based extraction and fuzzy particle swarm optimization |
91 | -- | 103 | Mukil Alagirisamy, Chee Onn Chow. An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks |
105 | -- | 113 | S. Angeline Julia, Paul Rodrigues. A case study of HMS using CIPA |
115 | -- | 124 | K. L. Neela, V. Kavitha. Enhancement of data confidentiality and secure data transaction in cloud storage environment |
125 | -- | 134 | M. Sugadev, E. Logashanmugam. Corporate feed based metamaterial antenna for wireless applications |
135 | -- | 147 | V. C. Maha Vishnu, M. Rajalakshmi, R. Nedunchezhian. Intelligent traffic video surveillance and accident detection system with dynamic traffic signal control |
149 | -- | 161 | M. Veeresha, M. Sugumaran. Hybrid spatial air index for processing queries in road networks |
163 | -- | 176 | Dinesh Komarasamy, Muthuswamy Vijayalakshmi. ScHeduling of jobs and Adaptive Resource Provisioning (SHARP) approach in cloud computing |
177 | -- | 187 | A. Karthikeyan, P. Senthil Kumar. GALS implementation of randomly prioritized buffer-less routing architecture for 3D NoC |
189 | -- | 204 | Gunasekaran Manogaran, Daphne Lopez. A Gaussian process based big data processing framework in cluster computing environment |
205 | -- | 211 | I. Nelson, C. Annadurai, R. Kalidoss, B. Partibane. Mitigation of co-channel interferences in cognitive multi-carrier code division multiple access system by singular value decomposition techniques |
213 | -- | 227 | Priyan Malarvizhi Kumar, Usha Devi Gandhi. Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles |
229 | -- | 237 | A. Ravi, M. N. Giriprasad, P. V. Naganjaneyulu. SAR images denoising using a novel stochastic diffusion wavelet scheme |
239 | -- | 250 | L. Javid Ali, G. S. Anandhamala. Actor-oriented approach for fault tolerance in e-commerce events |
251 | -- | 263 | S. Gnanavel, S. Ramakrishnan. HD video transmission on UWB networks using H.265 encoder and anfis rate controller |
265 | -- | 275 | Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang. DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications |
277 | -- | 286 | Ping Li 0018, Jin Li 0002, Zhengan Huang, Chong-zhi Gao, Wenbin Chen 0003, Kai Chen 0012. Privacy-preserving outsourced classification in cloud computing |
287 | -- | 297 | Yamin Wen, Zheng Gong, Zhengan Huang, Weidong Qiu. A new efficient authorized private set intersection protocol from Schnorr signature and its applications |
299 | -- | 310 | Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace H. S. Ip. Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks |
311 | -- | 322 | Javid Ullah, Muhammad Arfan Jaffar. Object and motion cues based collaborative approach for human activity localization and recognition in unconstrained videos |
323 | -- | 331 | Sadia Arshid, Ayyaz Hussain, Asim Munir, Anum Nawaz, Sanneya Aziz. Multi-stage binary patterns for facial expression recognition in real world |
333 | -- | 346 | Shah Nazir, Sara Shahzad, Rodziah Binti Atan, Haleem Farman. Estimation of software features based birthmark |
347 | -- | 362 | E. Vijay Sekar, J. Anuradha, Anshita Arya, Balamurugan Balusamy, Victor I. Chang. A framework for smart traffic management using hybrid clustering techniques |
363 | -- | 375 | Babar Shah, Farkhund Iqbal, Omar Alfandi, Yoonsoo Kim, SeokYoon Kang, Ki-Il Kim. Fuzzy searching and routing in unstructured mobile peer-to-peer networks |
377 | -- | 391 | Zahid Halim, Uzma. Optimizing the minimum spanning tree-based extracted clusters using evolution strategy |
393 | -- | 407 | M. Arfan Jaffar, Abdul Basit Siddiqui, Mubashar Mushtaq. Ensemble classification of pulmonary nodules using gradient intensity feature descriptor and differential evolution |
409 | -- | 421 | Toqeer Ali Syed, Mohammad Nauman, Salman Jan. Trust in IoT: dynamic remote attestation through efficient behavior capture |
423 | -- | 441 | Adnan Amin, Babar Shah, Sajid Anwar, Feras Al-Obeidat, Asad Masood Khattak, Awais Adnan. A prudent based approach for compromised user credentials detection |
443 | -- | 452 | Fozia Mehboob, Muhammad Abbas, Richard M. Jiang, Abdul Rauf, Shoab Ahmad Khan, Saad Rehman. Trajectory based vehicle counting and anomalous event visualization in smart cities |
453 | -- | 467 | Zulfiqar Ali, Waseem Shahzad. EPACO: a novel ant colony optimization for emerging patterns based classification |
469 | -- | 480 | Saleh M. Al-Saleem, Aftab Ali, Naveed Khan. Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique |
481 | -- | 492 | Abdul Shahid, Muhammad Tanvir Afzal. Section-wise indexing and retrieval of research articles |
493 | -- | 502 | Khawaja Tehseen Ahmed, Muhammad Amjad Iqbal. Region and texture based effective image extraction |
503 | -- | 514 | Naila Habib Khan, Awais Adnan, Sadia Basar. Urdu ligature recognition using multi-level agglomerative hierarchical clustering |
515 | -- | 522 | Muhammad Abid, Asad Habib, Jawad Ashraf, Abdul Shahid. Urdu word sense disambiguation using machine learning approach |
523 | -- | 537 | Haseeb Ahmad, Ali Daud, Licheng Wang, Ibrar Ahmad, Muhammad Hafeez, Yixian Yang. Quantifying team precedence in the game of cricket |
539 | -- | 548 | Muhammad Nazir, Zahoor Jan, Muhammad Sajjad. Facial expression recognition using histogram of oriented gradients based transformed features |
549 | -- | 567 | Muhammad Sajjad, Adnan Shah, Zahoor Jan, Syed Inayat Ali Shah, Sung Wook Baik, Irfan Mehmood. Facial appearance and texture feature-based robust facial expression recognition framework for sentiment knowledge discovery |
569 | -- | 588 | Mohammad Nauman, Tamleek Ali Tanveer, Sohail Khan, Toqeer Ali Syed. Deep neural architectures for large scale android malware analysis |
589 | -- | 603 | Bashir Hayat, Kyong Hoon Kim, Ki-Il Kim. A study on fuzzy logic based cloud computing |
605 | -- | 622 | Afsheen Khalid, Fakhri Alam Khan, Imran Ahmed. Extracting reference text from citation contexts |
623 | -- | 632 | Feras Al-Obeidat, Abdallah Tubaishat, Anna Dillon, Babar Shah. Analyzing students' performance using multi-criteria classification |
633 | -- | 654 | Imran Ahmed, Awais Adnan. A robust algorithm for detecting people in overhead views |
655 | -- | 666 | Saad Razzaq, Fahad Maqbool, Maham Khalid, Iram Tariq, Aqsa Zahoor, Muhammad Ilyas. Zombies Arena: fusion of reinforcement learning with augmented reality on NPC |
667 | -- | 680 | Arif Jamal Malik, Farrukh Aslam Khan. A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection |
681 | -- | 690 | R. Varatharajan, Gunasekaran Manogaran, Priyan Malarvizhi Kumar, Revathi Sundarasekar. Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm |
691 | -- | 701 | Syed Hamad Shirazi, Arif Iqbal Umar, NuhmanUl Haq, Saeeda Naz, Muhammad Imran Razzak, Ahmad Zaib. Extreme learning machine based microscopic red blood cells classification |
703 | -- | 714 | Ibrar Ahmad, Xiaojie Wang, Yuzhao Mao, Guang Liu, Haseeb Ahmad, Rahat Ullah. Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory |
715 | -- | 728 | Janeth López-Martínez, Alan Ramírez-Noriega, Reyes Juárez-Ramírez, Guillermo Licea, Samantha Jiménez. User stories complexity estimation using Bayesian networks for inexperienced developers |
729 | -- | 739 | Abdul Rauf, Muhammad Ramzan. Parallel testing and coverage analysis for context-free applications |
741 | -- | 754 | Muhammad Amin, Tamleek Ali Tanveer, Shakirullah Shah, Muhammad Abdullah, Muhammad Shafi. DeepSIC: a deep model |
755 | -- | 766 | R. Karthikeyan, P. Chitra. Novel power reduction framework for enhancing cloud computing by integrated GSNN scheduling method |
767 | -- | 777 | D. Danalakshmi, S. Kannan, V. Thiruppathy Kesavan. Reactive power pricing using cloud service considering wind energy |
779 | -- | 788 | Ning Wang, Jianping Zeng, Maozhi Ye, Mingming Chen. Text mining and sustainable clusters from unstructured data in cloud computing |
789 | -- | 795 | Zhanyu Liu. Research on the Internet of Things and the development of smart city industry based on big data |
797 | -- | 804 | Xiaoping Jiang, Chenghua Li, Jing Sun 0010. A modified K-means clustering for mining of multimedia databases based on dimensionality reduction and similarity measures |
805 | -- | 811 | Shiqi Li, Mingming Wang, Shiping Liu, Yan Fu. A novel pattern recognition technique based on group clustering computing and convex optimization for dimensionality reduction |
813 | -- | 825 | Jianqin Zhang, Zhihong Chen, Yaqiong Liu, Mingyi Du, Weijun Yang, Liang Guo. Space-time visualization analysis of bus passenger big data in Beijing |
827 | -- | 835 | Zhengyan Cui, Taohua-Ouyang. Research from the perspective of resource orchestration on digital ecosystem |
837 | -- | 844 | Zhexi Yang, Wei Liu, Duo Xu. Study of cloud service queuing model based on imbedding Markov chain perspective |
845 | -- | 853 | Wei Xiong, Hejin Yuan, Lang You. Prediction method of icing thickness of transmission line based on MEAO |
855 | -- | 868 | Lanyong Zhang, Zewei Liu, Christos Papavassiliou, Sheng Liu. Formation path control method for group coordination based on fuzzy logic control method |
869 | -- | 877 | Yun Bai. Industrial Internet of things over tactile Internet in the context of intelligent manufacturing |
879 | -- | 892 | Yao-Hsu Tsai. Simplified structural modeling of loyalty acquisition based on the conceptual clustering model |
893 | -- | 905 | Xue Yang, Han-Qi Yu, Shi-Ming Sun, Wei Chen. Using correspondence analysis to select training set for multi-modal information data |
907 | -- | 922 | Xing Li, Jianmin He, BingJie Hou, Peiyang Zhang. Exploring the innovation modes and evolution of the cloud-based service using the activity theory on the basis of big data |
923 | -- | 931 | Qindong Sun, Yimin Qiao, Hongyi Zhou, Jiamin Wang, Nan Wang. A loss prevention methodology for catering industry based on operation data analysis |
933 | -- | 943 | Hui Li, Shu Zhang, Yun Hu, Jun Shi, Zhaoman Zhong. Research of social recommendation based on social tag and trust relation |
945 | -- | 953 | Hongtao Liu, Hongwei Guan, Jie Jian, Xueyan Liu, Ying Pei. Clustering based on words distances |
955 | -- | 966 | Fengjun Shang, Yalin Li, Xiaolin Deng, Dexiang He. Android malware detection method based on naive Bayes and permission correlation algorithm |
967 | -- | 975 | Xinyao Zou. A four-gram unified event model for web mining |
977 | -- | 984 | Jian Yang. The artificial stock market model based on agent and scale-free network |
985 | -- | 995 | Lirong Qiu, Jie Li. Sentiment analysis of short texts in microblog based on ependency parsing |
997 | -- | 1007 | Min Xiao, Sheng Cui, Ruixing Ming, Tao Jiang. Large deviations for the stochastic present value of aggregate net claims with infinite variance in the renewal risk model and its application in risk management |
1009 | -- | 1022 | Ming Qu, Yuchun Chang. A collaboration centric approach for building the semantic knowledge network for knowledge advantage machine |
1023 | -- | 1031 | Yanqing Han, Yuyan Lei, Guanju Chen. Consumption experience model and identification based on IWOM and emotional computing |
1033 | -- | 1044 | Akash Kumar Bhoi, Karma Sonam Sherpa, Bidita Khandelwal. Arrhythmia and ischemia classification and clustering using QRS-ST-T (QT) analysis of electrocardiogram |
1045 | -- | 1058 | Hyesung Ji, Youdong Yun, Seolhwa Lee, Kuekyeng Kim, HeuiSeok Lim. An adaptable UI/UX considering user's cognitive and behavior information in distributed environment |
1059 | -- | 1068 | Yoon-Su Jeong, Seung Soo Shin. An IoT healthcare service model of a vehicle using implantable devices |
1069 | -- | 1078 | TaeGyu Kim, Jung-Hoon Cha, Jongchul Park. Association between in-game performance parameters recorded via global positioning system and sports injuries to the lower extremities in elite female field hockey players |
1079 | -- | 1095 | Doohwan Kim, Jang-Eui Hong, Ilchul Yoon, Sang Ho Lee. Code refactoring techniques for reducing energy consumption in embedded computing environment |
1097 | -- | 1107 | Seolhwa Lee, Danial Hooshyar, Hyesung Ji, Kichun Nam, HeuiSeok Lim. Mining biometric data to predict programmer expertise and task difficulty |
1109 | -- | 1116 | Seon-Chil Kim, Sun-Youl Seo, Ji Hyun Yu, Sang Deok Lee, Kwang-Hwan Kim, Chang-Gyu Kim. Development of radiation shield providing medical support for radioactive disaster in computer awareness analysis convergence-based |
1117 | -- | 1126 | Meijing Li, Xiuming Yu, Keun Ho Ryu, Sanghyuk Lee, Nipon Theera-Umpon. Face recognition technology development with Gabor, PCA and SVM methodology under illumination normalization condition |
1127 | -- | 1138 | GuoZhong Li, Jae-Rim Jung, Seong-Taek Park. Factors enhancing mobile social networking friendship maintenance: a study of alumni community on Wechat |
1139 | -- | 1149 | Hyun Yoo, Kyungyong Chung. Heart rate variability based stress index service model using bio-sensor |
1151 | -- | 1160 | Sungho Sim, Hanyong Choi. A study on web services discovery system based on the internetof things user information |
1161 | -- | 1173 | Hyung-Jin Mun, Sunghyuck Hong, Jungpil Shin. A novel secure and efficient hash function with extra padding against rainbow table attacks |
1175 | -- | 1185 | Sang Hyun Lee, Sang Joon Lee. Development of remote automatic panorama VR imaging rig systems using smartphones |
1187 | -- | 0 | Hyung-Jin Mun, Sunghyuck Hong, Jungpil Shin. Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks |