427 | -- | 443 | Hongly Va, Min-Hyung Choi, Min Hong. Parallel Cloth Simulation Using OpenGL Shading Language |
445 | -- | 460 | Khalid A. H. Alzahrani, Mrim Alnfiai. Evaluation of NFC-Guidable System to Manage Polypharmacy in Elderly Patients |
461 | -- | 477 | Sardar Zafar Iqbal, Hina Gull, Saqib Saeed, Madeeha Saqib, Mohammed Abdulrahman Alqahtani, Yasser A. Bamarouf, Gomathi Krishna, May Issa Aldossary. Relative Time Quantum-based Enhancements in Round Robin Scheduling |
479 | -- | 492 | A. S. Anakath, R. Kannadasan, Niju P. Joseph, P. Boominathan, G. R. Sreekanth. Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing |
493 | -- | 509 | D. Nageswari, N. Kalaiarasi, G. Geethamahalakshmi. Optimal Placement and Sizing of Distributed Generation Using Metaheuristic Algorithm |
511 | -- | 524 | P. Rajeswari, K. Jayashree. Hybrid Metaheuristics Web Service Composition Model for QoS Aware Services |
525 | -- | 538 | R. Sakunthala Jenni, S. Shankar. Semantic Based Greedy Levy Gradient Boosting Algorithm for Phishing Detection |
539 | -- | 555 | Dequan Li, Jiming Li, Xu Zhou, Jinrong Hu, Xin Wang, Jing Duan. FACT: An Air-Ground Communication Framework for Seeding Quality Control of Aircraft |
557 | -- | 567 | Abdullah Alharbi, Masood Ahmad, Wael Alosaimi, Hashem Alyami, Alka Agrawal, Rajeev Kumar 0001, Abdul Wahid, Raees Ahmad Khan. Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective |
569 | -- | 582 | K. Ezhilarasi, G. Maria Kalavathy. Enhanced Neuro-Fuzzy-Based Crop Ontology for Effective Information Retrieval |
583 | -- | 593 | Adriano G. Passos, Tiago Cousseau, Marco A. Luersen. A Smart Deep Convolutional Neural Network for Real-Time Surface Inspection |
595 | -- | 609 | Monday Eze, Charles Okunbor, Deborah Aleburu, Olubukola Adekola, Ibrahim Ramon, Nneka Richard-Nnabu, Oghenetega Avwokuruaye, Abisola Olayiwola, Rume Yoro, Esomu Solomon. Graphics Evolutionary Computations in Higher Order Parametric Bezier Curves |
611 | -- | 624 | Jaber Almutairi, Mohammad Aldossary. Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments |
625 | -- | 644 | Shadi Nashwan. Analysis of the Desynchronization Attack Impact on the E2EA Scheme |
645 | -- | 460 | Thangavel Renukadevi, Kuppusamy Saraswathi, P. Prabu, K. Venkatachalam. Brain Image Classification Using Time Frequency Extraction with Histogram Intensity Similarity |
661 | -- | 676 | B. Prabhu Shankar, S. Chitra. Optimal Data Placement and Replication Approach for SIoT with Edge |
677 | -- | 688 | R. Reena Roy, G. S. Anandha Mala. Early Detection of Pancreatic Cancer Using Jaundiced Eye Images |
689 | -- | 698 | Wei Fang, Enming Gu, Weinan Yi, Weiqing Wang, Victor S. Sheng. A New Method of Image Restoration Technology Based on WGAN |
699 | -- | 715 | Baili Zhang, Keke Ling, Pei Zhang, Zhao Zhang, Mingjun Zhong. Algorithms to Calculate the Most Reliable Maximum Flow in Content Delivery Network |
717 | -- | 734 | Hasan Alsiraji. A Generalized State Space Average Model for Parallel DC-to-DC Converters |
735 | -- | 749 | S. Prakash, M. Vinoth Kumar, Saravana Ram Ram, Miodrag Zivkovic, Nebojsa Bacanin, Milos Antonijevic. Hybrid GLFIL Enhancement and Encoder Animal Migration Classification for Breast Cancer Detection |
751 | -- | 765 | G. R. Sreekanth, S. Ahmed Najat Ahmed, Marko Sarac, Ivana Strumberger, Nebojsa Bacanin, Miodrag Zivkovic. Mobile Fog Computing by Using SDN/NFV on 5G Edge Nodes |
767 | -- | 780 | S. Gladson Oliver, T. Purusothaman. Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol |
781 | -- | 794 | Yu Sun, Yi Ding, Junyi Jiang, Vincent G. Duffy. Measuring Mental Workload Using ERPs Based on FIR, ICA, and MARA |
795 | -- | 809 | Qunhui Zhang, Mengzhe Lu, Liang Dai. On Mixed Model for Improvement in Stock Price Forecasting |
811 | -- | 828 | Masood Ahmad, Jehad F. Al-Amri, Ahmad F. Subahi, Sabita Khatri, Adil Hussain Seh, Mohd Nadeem, Alka Agrawal. Healthcare Device Security Assessment through Computational Methodology |
829 | -- | 847 | R. Amirthavalli, S. Thanga Ramya, N. R. Shanker. Modified Mackenzie Equation and CVOA Algorithm Reduces Delay in UASN |
849 | -- | 859 | K. Kiruthika Devi, G. A. Sathish Kumar. Stochastic Gradient Boosting Model for Twitter Spam Detection |