Journal: New Generation Comput.

Volume 40, Issue 4

889 -- 914Akshma Chadha, Baijnath Kaushik. A Hybrid Deep Learning Model Using Grid Search and Cross-Validation for Effective Classification and Prediction of Suicidal Ideation from Social Network Data
915 -- 933Xing Yang, Pan Huang, Le An, Peng Feng 0002, Biao Wei, Peng He 0002, Kexin Peng. A Growing Model-Based OCSVM for Abnormal Student Activity Detection from Daily Campus Consumption
935 -- 939Gurdeep Singh Hura, Sven Groppe, Sarika Jain 0001, Le Gruenwald. Artificial Intelligence in Global Epidemics, Part 2
941 -- 960Ankita Bansal, Niranjan Kumar. Aspect-Based Sentiment Analysis Using Attribute Extraction of Hospital Reviews
961 -- 985Indrani Roy, Rinita Shai, Arijit Ghosh, Anirban Bej, Soumen Kumar Pati. CoWarriorNet: A Novel Deep-Learning Framework for CoVID-19 Detection from Chest X-Ray Images
987 -- 1007Aditya Gupta, Vibha Jain, Amritpal Singh. Stacking Ensemble-Based Intelligent Machine Learning Model for Predicting Post-COVID-19 Complications
1009 -- 1027Shajulin Benedict. Shared Mobility Intelligence Using Permissioned Blockchains for Smart Cities
1029 -- 1052Utkarsh Sharma, Prateek Pandey, Shishir Kumar. A Transformer-Based Model for Evaluation of Information Relevance in Online Social-Media: A Case Study of Covid-19 Media Posts
1053 -- 1075Fatih Demir, Kürsat Demir, Abdulkadir Sengür. DeepCov19Net: Automated COVID-19 Disease Detection with a Robust and Effective Technique Deep Learning Approach
1077 -- 1091Muhammed Yildirim, Orkun Eroglu, Yesim Eroglu, Ahmet Çinar, Emine Cengil. COVID-19 Detection on Chest X-ray Images with the Proposed Model Using Artificial Intelligence and Classifiers
1093 -- 1123Aditya Gupta, Amritpal Singh. An Intelligent Healthcare Cyber Physical Framework for Encephalitis Diagnosis Based on Information Fusion and Soft-Computing Techniques
1125 -- 1141Chandrakanta Mahanty, Raghvendra Kumar 0001, S. Gopal Krishna Patro. Internet of Medical Things-Based COVID-19 Detection in CT Images Fused with Fuzzy Ensemble and Transfer Learning Models
1143 -- 1164Nevin Güler Dincer, Serdar Demir, Muhammet Oguzhan Yalçin. Forecasting COVID19 Reliability of the Countries by Using Non-Homogeneous Poisson Process Models
1165 -- 1202Dimple Tiwari, Bharti Nagpal. KEAHT: A Knowledge-Enriched Attention-Based Hybrid Transformer Model for Social Sentiment Analysis
1203 -- 1239Kaustuv Mandal, Suman Halder, Pulakesh Roy, Manash K. Paul, Sipra Das Bit, Rajib Banerjee. An Online Mobility Management System to Automatically Avoid Road Blockage and COVID-19 Hotspots
1241 -- 1279A. S. Prakaash, K. Sivakumar, B. Surendiran, S. Jagatheswari, K. Kalaiarasi. Design and Development of Modified Ensemble Learning with Weighted RBM Features for Enhanced Multi-disease Prediction Model

Volume 40, Issue 3

737 -- 764Rishabh Gupta, Ashutosh Kumar Singh 0001. A Differential Approach for Data and Classification Service-Based Privacy-Preserving Machine Learning Model in Cloud Environment
765 -- 807Xiaoyang Liu 0001, Mengyao Zhang, Giacomo Fiumara, Pasquale De Meo. Complex Network Hierarchical Sampling Method Combining Node Neighborhood Clustering Coefficient with Random Walk
809 -- 843Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, Mohammad Masdari. A Botnet Detection in IoT Using a Hybrid Multi-objective Optimization Algorithm
845 -- 870Nassira Achich, Fatma Ghorbel, Sonda Ammar Bouhamed, Fayçal Hamdi 0001, Elisabeth Métais, Faïez Gargouri, Haithem Kharfia, Bilel Gargouri. An Evidence Theory-Based Approach to Handling Conflicting Temporal Data in OWL 2
871 -- 887Shinsaku Izumi. Performance Analysis of Chemotaxis-Inspired Stochastic Controllers for Multi-Agent Coverage

Volume 40, Issue 2

399 -- 402Shin-ya Nishizaki, Shinnosuke Seki. 6-th Birthday Special Issue
403 -- 465Yuichi Komorida, Shin-ya Katsumata, Nick Hu, Bartek Klin, Samuel Humeau, Clovis Eberhart, Ichiro Hasuo. Codensity Games for Bisimilarity
467 -- 480Robert Glück, Tetsuo Yokoyama. Making Programs Reversible with Minimal Extra Data
481 -- 506Satoshi Egi, Akira Kawata, Mayuko Kori, Hiromi Ogawa. Embedding Non-linear Pattern Matching with Backtracking for Non-free Data Types into Haskell
507 -- 540Yuki Nishida 0001, Hiromasa Saito, Ran Chen, Akira Kawata, Jun Furuse, Kohei Suenaga, Atsushi Igarashi. Helmholtz: A Verifier for Tezos Smart Contracts Based on Refinement Types
541 -- 551Hisamichi Ishizaka, GilTak Kong, Katsunobu Imai. The Weak Universality of Two-Dimensional Five-State von Neumann Neighborhood Number-Conserving Cellular Automaton
553 -- 601Andrew Alseth, Jacob Hendricks, Matthew J. Patitz, Trent A. Rogers. Replication of Arbitrary Hole-Free Shapes via Self-assembly with Signal-Passing Tiles
603 -- 621Chun-Hsiang Chan, Cheng-Yu Shih, Ho-Lin Chen. On the Computational Power of Phosphate Transfer Reaction Networks
623 -- 657Ryutaro Yako, Daihei Ise, Ken Komiya, Kenzo Fujimoto, Satoshi Kobayashi. Monotone Control of R Systems
659 -- 680Fumiya Okubo, Kaoru Fujioka, Takashi Yokomori. Chemical Reaction Regular Grammars
681 -- 702Takashi Nakakuki, Keiji Murayama, Hiroyuki Asanuma. DNA Concentration Regulator That can be Driven for a Long Time
703 -- 721Adrien Fauste-Gay, Nicolas Lobato-Dauzier, Alexandre Baccouche, Yannick Rondelez, Soo Hyeon Kim, Teruo Fujii, Nathanaël Aubert-Kato, Anthony J. Genot. Toggling Between Two Limit Cycles in a Molecular Ecosystem
723 -- 736Ibuki Kawamata, Shin-ichiro M. Nomura, Satoshi Murata. Autonomous and Programmable Strand Generator Implemented as DNA and Enzymatic Chemical Reaction Cascade

Volume 40, Issue 1

1 -- 3Masayuki Numao, Yutaka Matsuo, Yoji Kiyota. Renewal of the Major Fields of New Generation Computing Vol. 40 (2022)
5 -- 6Akinori Abe, Naohiro Matsumura, Katsutoshi Yada. Selected Papers from the 35th JSAI Annual Meeting
7 -- 24Masanori Hirano 0001, Kiyoshi Izumi, Hiroki Sakaji. STBM+: Advanced Stochastic Trading Behavior Model for Financial Markets using Residual Blocks or Transformers
25 -- 45Wachara Fungwacharakorn, Kanae Tsushima, Ken Satoh. Diagnosing and Treating Effect of Legal Rule-Based Revision
47 -- 48Takaaki Mizuki. Preface: Special Issue on Card-Based Cryptography 2
49 -- 65Suthee Ruangwises. Two Standard Decks of Playing Cards are Sufficient for a ZKP for Sudoku
67 -- 93Yoshifumi Manabe, Hibiki Ono. Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
95 -- 113Takeshi Nakai, Satoshi Shirouchi, Yuuki Tokushige, Mitsugu Iwamoto, Kazuo Ohta. Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations
115 -- 147Alexander Koch 0001, Stefan Walzer. Private Function Evaluation with Cards
149 -- 171Léo Robert, Daiki Miyahara, Pascal Lafourcade 0001, Takaaki Mizuki. Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake
173 -- 198Yoshiki Abe, Takeshi Nakai, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Yohei Watanabe 0001, Mitsugu Iwamoto, Kazuo Ohta. Efficient Card-Based Majority Voting Protocols
199 -- 223Kengo Miyamoto, Kazumasa Shinagawa. Graph Automorphism Shuffles from Pile-Scramble Shuffles
225 -- 254Tuan Nguyen Quoc, Katsumi Inoue, Chiaki Sakama. Enhancing Linear Algebraic Computation of Logic Programs Using Sparse Representation
255 -- 283Alok Kumar Shukla, Shubhra Dwivedi. Discovery of Botnet Activities in Internet-of-Things System Using Dynamic Evolutionary Mechanism
285 -- 310Bagher Zarei, Mohammad Reza Meybodi, Behrooz Masoumi. A New Evolutionary Model Based on Cellular Learning Automata and Chaos Theory
311 -- 338Lalengmawia Chhangte, Alok Chakrabarty. Mapping Quantum Circuits in IBM Q Devices Using Progressive Qubit Assignment for Global Ordering
339 -- 376Sanjay Kumar Anand, Suresh Kumar. Uncertainty Analysis in Ontology-Based Knowledge Representation
377 -- 397Tasbiha Ibad, Said Jadid Abdulkadir, Norshakirah Aziz, Mohammed Gamal Ragab, Qasem Al-Tashi. Hyperparameter Optimization of Evolving Spiking Neural Network for Time-Series Classification