5597 | -- | 5621 | Hyunseung Choi, Mintae Kim, Gyubok Lee, Wooju Kim. Unsupervised learning approach for network intrusion detection system using autoencoders |
5622 | -- | 5666 | Fateh Seghir, Abdallah Khababa, Fouzi Semchedine. An interval-based multi-objective artificial bee colony algorithm for solving the web service composition under uncertain QoS |
5667 | -- | 5687 | Aladdin A. Abdulhassan, Mahmood Ahmadi. Cuckoo filter-based many-field packet classification using X-tree |
5688 | -- | 5716 | Taban Moghimizadeh, Mohammad Mosleh. A novel design of fault-tolerant RAM cell in quantum-dot cellular automata with physical verification |
5717 | -- | 5740 | Adrià Armejach, Marc Casas, Miquel Moretó. Design trade-offs for emerging HPC processors based on mobile market technology |
5741 | -- | 5759 | Bruno C. S. Nogueira, Eduardo Tavares, Jean Araujo, Gustavo Callou. Accelerating continuous GRASP with a GPU |
5760 | -- | 5781 | Hossein Ahmadvand, Maziar Goudarzi. SAIR: significance-aware approach to improve QoR of big data processing in case of budget constraint |
5782 | -- | 5807 | Wen Liu, Tuqian Zhang, Junxia Liu. Window-based multiple continuous query algorithm for data streams |
5808 | -- | 5830 | Xinsheng Zhang, Zhe Wang. A microcalcification cluster detection method based on deep learning and multi-scale feature fusion |
5831 | -- | 5847 | Hongyi Gao, Xi Zeng, Chunhua Yao. Application of improved distributed naive Bayesian algorithms in text classification |
5848 | -- | 5865 | Souvik Pal, Raghvendra Kumar, Le Hoang Son, Krishnan Saravanan, Mohamed Abdel Basset, Gunasekaran Manogaran, Pham Huy Thong. Novel probabilistic resource migration algorithm for cross-cloud live migration of virtual machines in public cloud |
5866 | -- | 5881 | Akshay Tembhare, S. Sibi Chakkaravarthy, Sangeetha Dhamodaran, Vaidehi V., M. Venkata Rathnam. Role-based policy to maintain privacy of patient health records in cloud |
5882 | -- | 5897 | Shaofei Wu, Jun Liu, Lizhi Liu. Modeling method of internet public information data mining based on probabilistic topic model |
5898 | -- | 5913 | Guohong Yi, Zhili Feng, Tiancan Mei, Pushan Li, Wang Jin, Siyuan Chen. Multi-AGVs path planning based on improved ant colony algorithm |
5914 | -- | 5929 | Blessy Selvam, Ravimaran Shanmugam, Selvam Sheba. Parallelized root cause analysis using cause-related aspect formulation technique (CRAFT) |
5930 | -- | 5945 | Guolong Chen, Zhenghua Xin, Han Li, Tonghai Zhu, Maodi Wang, Yaxiang Liu, Sanqiang Wei. A greedy constructing tree algorithm for shortest path in perpetual wireless recharging wireless sensor network |
5946 | -- | 5964 | Zhongru Wang, Binxing Fang. Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism |
5965 | -- | 0 | Zhongru Wang, Binxing Fang. Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism |
5966 | -- | 5983 | Yunlu Gong, Lianguo Jia. Research on SVM environment performance of parallel computing based on large data set of machine learning |
5984 | -- | 6003 | Jingyan Ma, Kehong Zhang. Landmark community approximate optimal path query with pure linguistic attributes |
6004 | -- | 6020 | Jun Hu, Jun Fang, Yanhua Du, Zhe Liu, Pengyang Ji. Application of PLS algorithm in discriminant analysis in multidimensional data mining |
6021 | -- | 6037 | Qiuli Hui. Motion video tracking technology in sports training based on Mean-Shift algorithm |
6038 | -- | 6054 | C. Ravi Shankar Hanuman, J. Kamala, A. R. Aruna. Implementation of multi-precision floating point divider for high speed signal processing applications |
6055 | -- | 6069 | Zhicheng Zhang, Yan Zhang. Application of wireless sensor network in dynamic linkage video surveillance system based on Kalman filtering algorithm |
6070 | -- | 6084 | Shifei Zhao. Application of a clustering algorithm in sports video image extraction and processing |
6085 | -- | 6105 | Muthu Balaanand, N. Karthikeyan, S. Karthik, R. Varatharajan, Gunasekaran Manogaran, C. B. Sivaparthipan. An enhanced graph-based semi-supervised learning algorithm to detect fake users on Twitter |
6106 | -- | 6117 | V. Vignesh, K. Premalatha. Optimal route path sustainability in military information system with reduced interference effect |
6118 | -- | 6128 | Cheong Hee Park. Outlier and anomaly pattern detection on data streams |
6129 | -- | 6157 | Jae Jun Yoo, Woong-Kee Loh, Kyu-Young Whang. Indexable sub-trajectory matching using multi-segment approximation: a partition-and-stitch framework |
6158 | -- | 0 | Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry. Correction to: A security review of local government using NIST CSF: a case study |