Journal: The Journal of Supercomputing

Volume 76, Issue 2

755 -- 0. Advanced parallel and distributed computing for big urban data
756 -- 776S. Venkatraman 0001, B. Surendiran, P. Arun Raj Kumar. Spam e-mail classification for the Internet of Things environment using semantic similarity approach
777 -- 792Yaqin Ye, Ying An, Bo Chen, Junjue Wang, Yingqiang Zhong. Land use classification from social media data and satellite imagery
793 -- 813Qiang Lu 0002, Wenqiang Xu, Haibo Zhang, Qingpeng Tang, Jie Li, Rui Fang. ElectricVIS: visual analysis system for power supply data of smart city
814 -- 830Xiaojun Liu, Ning Yang, Yu Jiang, Lichuan Gu, Xianzhang Shi. A parallel computing-based Deep Attention model for named entity recognition
831 -- 843Zaijun Wang, Jinlin Zhu, Xiaoping Guo, YunTing Ma, Zifan Li. Distributed task allocation method based on self-awareness of autonomous robots
844 -- 857Xiaokun Leng 0001, Songhao Piao, Lin Chang 0001, Zhicheng He, Zheng Zhu. Dynamic running hexapod robot based on high-performance computing
858 -- 875Kiran Kumar Patro, Surya Prakasa Rao Reddi, S. K. Ebraheem Khalelulla, P. Rajesh Kumar, K. Shankar. ECG data optimization for biometric human recognition using statistical distributed machine learning algorithm
876 -- 896Jinhong Feng, Jundong Zhang, Chuan Wang, Minyi Xu. Self-adaptive collective intelligence-based mutation operator for differential evolution algorithms
897 -- 914Weihuang Dai, Ping Hu. Application of BP neural network in the analytic hierarchy process of person-post evaluation model
915 -- 931N. V. Chinnasamy, A. Senthilkumar. Secured distributed routing technique using extended DART and table elimination (ET-DART) technique in wireless sensor networks environment
932 -- 947Aiping Guo, Ajuan Jiang, Jie Lin, Xiaoxiao Li. Data mining algorithms for bridge health monitoring: Kohonen clustering and LSTM prediction approaches
948 -- 963Yingchun Xia, Xingyue Wang, Lichuan Gu, Qijuan Gao, Jun Jiao, Chao Wang. A collective entity linking algorithm with parallel computing on large-scale knowledge base
964 -- 988Mohamed Abdel Basset, Mumtaz Ali, Asma Atef. Resource levelling problem in construction projects under neutrosophic environment
989 -- 1004V. Vijayalakshmi, A. Senthilkumar. USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networks
1005 -- 1019Yongjun Qi, Junhua Gu, Weixun Li, Zepei Tian, YaJuan Zhang, Juanping Geng. Pulmonary nodule image super-resolution using multi-scale deep residual channel attention network with joint optimization
1020 -- 1033Tian Chen, Yongsheng Zuo, Xin An, Fuji Ren. A variable-length compatible compression scheme based on tristate signals
1034 -- 1048Shengxiang Gao, Zhengtao Yu 0001, Yunlong Li, Yusen Wang, Yafei Zhang. Chinese-Vietnamese bilingual news event summarization based on distributed graph ranking
1049 -- 1062Zne-Jung Lee, Chou-Yuan Lee. A parallel intelligent algorithm applied to predict students dropping out of university
1063 -- 1081Rong Zhao, Maozhu Jin, Peiyu Ren, Qian Zhang. Stable two-sided satisfied matching for ridesharing system based on preference orders
1082 -- 1085Gustavo Ramirez-Gonzalez, Enas Adbulhay. Preface on special section on cognitive computing for emerging internet of things
1086 -- 1104Mazin Abed Mohammed, Mohd Khanapi Abd Ghani, Arunkumar N., Raed Ibraheem Hamed, Salama A. Mostafa, Mohamad Khir Abdullah, Burhanuddin Mohd Aboobaider. Decision support system for nasopharyngeal carcinoma discrimination from endoscopic images using artificial neural network
1105 -- 1115Zhibin Zhang, Deyu Li. Multi-label algorithm based on rough set of fractal dimension attribute
1116 -- 1127Yifu Zeng, Yantao Zhou, Fei Zheng. Data skyline query protocol based on parallel genetic improvement decision tree
1128 -- 1143K. Shankar 0002, S. K. Lakshmanaprabu, Deepak Gupta 0002, Andino Maseleno, Victor Hugo C. de Albuquerque. Optimal feature-based multi-kernel SVM approach for thyroid disease classification
1144 -- 1158Qianming Zhou, Jin Xie. Mobile client data security storage protocol based on multifactor node evaluation
1159 -- 1169Li Ang, Zheng Bao Yu. Sparse low-rank correction scalable video coding based on interactive region of interest viewpoint
1170 -- 1179Fanlei Yan. Gauss interference ant colony algorithm-based optimization of UAV mission planning
1180 -- 1200G. P. Bharathi, K. Meena alias Jeyanthi. An optimization algorithm-based resource allocation for cooperative cognitive radio networks
1201 -- 1211Jing Yang, Mingyu Fan, Guangwei Wang. Encryption scheme with mixed homomorphic signature based on message authentication for digital image
1212 -- 1225Renato F. Pereira, Valberto E. R. da Silva Filho, Lorena B. Moura, Arunkumar N., Auzuir Ripardo de Alexandria, Victor Hugo C. de Albuquerque. Automatic quantification of spheroidal graphite nodules using computer vision techniques
1226 -- 1241Prerna Sharma, Apoorva Gupta, Aastha Aggarwal, Deepak Gupta 0002, Ashish Khanna, Aboul Ella Hassanien, Victor Hugo C. de Albuquerque. The health of things for classification of protein structure using improved grey wolf optimization
1242 -- 1267D. Jude Hemanth, Utku Kose, Omer Deperlioglu, Victor Hugo C. de Albuquerque. An augmented reality-supported mobile application for diagnosis of heart diseases
1268 -- 1276Mengrui Wang. Dominator tree data flow cognitive analysis for green public building design
1277 -- 1292T. N. Sugumar, N. Rajam Ramasamy. mDesk: a scalable and reliable hypervisor framework for effective provisioning of resource and downtime reduction
1293 -- 1304Tiancheng Wang. Unsupervised video multi-target tracking based on fast resampling particle filter
1305 -- 1320João Alexandre Lôbo Marques, Paulo César Cortez, João Paulo do Vale Madeiro, Victor Hugo C. de Albuquerque, Simon James Fong, Fernando S. Schlindwein. Nonlinear characterization and complexity analysis of cardiotocographic examinations using entropy measures
1321 -- 1330Yifu Zeng, Yantao Zhou, Xu Zhou, Fei Zheng. Fuzzy clustering-based skyline query preprocessing algorithm for large-scale flow data analysis
1331 -- 1341Weizheng Li, Xiumei Tu. Quality analysis of multi-sensor intrusion detection node deployment in homogeneous wireless sensor networks
1342 -- 1357Pu Zaiyi. Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction