Journal: The Journal of Supercomputing

Volume 75, Issue 9

5597 -- 5621Hyunseung Choi, Mintae Kim, Gyubok Lee, Wooju Kim. Unsupervised learning approach for network intrusion detection system using autoencoders
5622 -- 5666Fateh Seghir, Abdallah Khababa, Fouzi Semchedine. An interval-based multi-objective artificial bee colony algorithm for solving the web service composition under uncertain QoS
5667 -- 5687Aladdin A. Abdulhassan, Mahmood Ahmadi. Cuckoo filter-based many-field packet classification using X-tree
5688 -- 5716Taban Moghimizadeh, Mohammad Mosleh. A novel design of fault-tolerant RAM cell in quantum-dot cellular automata with physical verification
5717 -- 5740Adrià Armejach, Marc Casas, Miquel Moretó. Design trade-offs for emerging HPC processors based on mobile market technology
5741 -- 5759Bruno C. S. Nogueira, Eduardo Tavares, Jean Araujo, Gustavo Callou. Accelerating continuous GRASP with a GPU
5760 -- 5781Hossein Ahmadvand, Maziar Goudarzi. SAIR: significance-aware approach to improve QoR of big data processing in case of budget constraint
5782 -- 5807Wen Liu, Tuqian Zhang, Junxia Liu. Window-based multiple continuous query algorithm for data streams
5808 -- 5830Xinsheng Zhang, Zhe Wang. A microcalcification cluster detection method based on deep learning and multi-scale feature fusion
5831 -- 5847Hongyi Gao, Xi Zeng, Chunhua Yao. Application of improved distributed naive Bayesian algorithms in text classification
5848 -- 5865Souvik Pal, Raghvendra Kumar, Le Hoang Son, Krishnan Saravanan, Mohamed Abdel Basset, Gunasekaran Manogaran, Pham Huy Thong. Novel probabilistic resource migration algorithm for cross-cloud live migration of virtual machines in public cloud
5866 -- 5881Akshay Tembhare, S. Sibi Chakkaravarthy, Sangeetha Dhamodaran, Vaidehi V., M. Venkata Rathnam. Role-based policy to maintain privacy of patient health records in cloud
5882 -- 5897Shaofei Wu, Jun Liu, Lizhi Liu. Modeling method of internet public information data mining based on probabilistic topic model
5898 -- 5913Guohong Yi, Zhili Feng, Tiancan Mei, Pushan Li, Wang Jin, Siyuan Chen. Multi-AGVs path planning based on improved ant colony algorithm
5914 -- 5929Blessy Selvam, Ravimaran Shanmugam, Selvam Sheba. Parallelized root cause analysis using cause-related aspect formulation technique (CRAFT)
5930 -- 5945Guolong Chen, Zhenghua Xin, Han Li, Tonghai Zhu, Maodi Wang, Yaxiang Liu, Sanqiang Wei. A greedy constructing tree algorithm for shortest path in perpetual wireless recharging wireless sensor network
5946 -- 5964Zhongru Wang, Binxing Fang. Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism
5965 -- 0Zhongru Wang, Binxing Fang. Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism
5966 -- 5983Yunlu Gong, Lianguo Jia. Research on SVM environment performance of parallel computing based on large data set of machine learning
5984 -- 6003Jingyan Ma, Kehong Zhang. Landmark community approximate optimal path query with pure linguistic attributes
6004 -- 6020Jun Hu, Jun Fang, Yanhua Du, Zhe Liu, Pengyang Ji. Application of PLS algorithm in discriminant analysis in multidimensional data mining
6021 -- 6037Qiuli Hui. Motion video tracking technology in sports training based on Mean-Shift algorithm
6038 -- 6054C. Ravi Shankar Hanuman, J. Kamala, A. R. Aruna. Implementation of multi-precision floating point divider for high speed signal processing applications
6055 -- 6069Zhicheng Zhang, Yan Zhang. Application of wireless sensor network in dynamic linkage video surveillance system based on Kalman filtering algorithm
6070 -- 6084Shifei Zhao. Application of a clustering algorithm in sports video image extraction and processing
6085 -- 6105Muthu Balaanand, N. Karthikeyan, S. Karthik, R. Varatharajan, Gunasekaran Manogaran, C. B. Sivaparthipan. An enhanced graph-based semi-supervised learning algorithm to detect fake users on Twitter
6106 -- 6117V. Vignesh, K. Premalatha. Optimal route path sustainability in military information system with reduced interference effect
6118 -- 6128Cheong Hee Park. Outlier and anomaly pattern detection on data streams
6129 -- 6157Jae Jun Yoo, Woong-Kee Loh, Kyu-Young Whang. Indexable sub-trajectory matching using multi-segment approximation: a partition-and-stitch framework
6158 -- 0Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry. Correction to: A security review of local government using NIST CSF: a case study