235 | -- | 252 | Faezeh Mollasalehi, Shirin Shahrabi, Elham Adibi, Ehsan Mousavi Khaneghah. Empowerment of cluster and grid load balancing algorithms to support distributed exascale computing systems with high compatibility |
253 | -- | 261 | Guangli Zhu, Xiaoqing Li, Shunxiang Zhang, Xin Xu, Biao Zhang. An improved method for k-means clustering based on internal validity indexes and inter-cluster variance |
262 | -- | 271 | Qing Ye, Rui Li, Hang Yang, Xinran Guo. Human interactive behaviour recognition method based on multi-feature fusion |
272 | -- | 284 | Amin Jarrah, Mohmmad Zaitoun. Optimised implementation of AVR system using particle swarm optimisation |
285 | -- | 297 | Amine Zellagui, Naima Hadj-Said, Adda Ali-Pacha. A secure hash function based on sponge construction and chaos-maps |
298 | -- | 307 | Li Liu 0026, XueMei Lei, Qian Wang. A multi-objective computation offloading algorithm in MEC environments |
308 | -- | 314 | Awanish Kumar Mishra, Narendra Kohli. An improved motion estimation criterion for temporal coding of video |
315 | -- | 324 | Pradeep Kumar Roy, Ashish Singh, Asis Kumar Tripathy, Tapan Kumar Das. Cyberbullying detection: an ensemble learning approach |
325 | -- | 338 | Özlem Ece Yürek, Derya Birant, Alp Kut 0001. T-PdM: a tripartite predictive maintenance framework using machine learning algorithms |
339 | -- | 352 | Subhash V. Pingale, Sanjay R. Sutar. Automated network intrusion detection using multimodal networks |