897 | -- | 917 | Shanguo Lv, Hongli Chen. Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm |
919 | -- | 943 | Jingkuang Liu, Lemei Yan, Dong Wang. A Hybrid Blockchain Model for Trusted Data of Supply Chain Finance |
945 | -- | 962 | Bo Fang. Method for Quickly Identifying Mine Water Inrush Using Convolutional Neural Network in Coal Mine Safety Mining |
963 | -- | 978 | Anil Kumar Budati, George Ghinea, S. N. V. Ganesh. Novel Aninath Computation Detection Algorithm to Identify the UAV Users in 5G Networks |
979 | -- | 995 | R. Bala Krishnan, N. Rajesh Kumar, N. R. Raajan, G. Manikandan, A. Srinivasan 0002, D. Narasimhan. An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography |
997 | -- | 1021 | B. Ida Seraphim, E. Poovammal. Adversarial Attack by Inducing Drift in Streaming Data |
1023 | -- | 1043 | Smriti Sachan, Rohit Sharma, Amit Sehgal. SINR Based Energy Optimization Schemes for 5G Vehicular Sensor Networks |
1045 | -- | 1066 | Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh 0001. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks |
1067 | -- | 1084 | Mukesh Soni, Dileep Kumar Singh. LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network |
1085 | -- | 1116 | Arthur A. M. Teodoro, Otávio S. M. Gomes, Muhammad Saadi, Bruno A. Silva, Renata Lopes Rosa, Demóstenes Z. Rodríguez. An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT |
1117 | -- | 1135 | Gang Li, Mingle Zhou, Zhengqian Feng, Min Li, Hui Jiang. Research on Key Influencing Factors of E-Government Cloud Service Satisfaction |
1137 | -- | 1155 | M. Kirankumar, M. Santhi. Accomplishment of Reversible Logic Gates in WSN Environment by Patternization |
1157 | -- | 1186 | Nanditha Boddu, Veeramallu Boba, Ramesh Vatambeti. A Novel Georouting Potency based Optimum Spider Monkey Approach for Avoiding Congestion in Energy Efficient Mobile Ad-hoc Network |
1187 | -- | 1205 | Selvakumar S, S. S. Manivannan. A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON) |
1207 | -- | 1224 | Bingjun Wan, Chengwei Xu, Rajendra Prasad Mahapatra, P. Selvaraj. Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI |
1225 | -- | 1239 | Dhiren P. Bhagat. Tracking of Moving Target in Wireless Sensor Network with Improved Network Life Time Using PSO |
1241 | -- | 1264 | V. Jyothi, M. V. Subramanyam. An Enhanced Routing Technique to Improve the Network Lifetime of Cognitive Sensor Network |
1265 | -- | 1282 | Libin Liu, Zhiyuan Sun. Flow Control in Network Media Information Transmission Based on Differential Evolution Algorithm |
1283 | -- | 1309 | Jeyasudha Jeyaraj, Usha Gopal. An Intelligent Centrality Measures for Influential Node Detection in COVID-19 Environment |
1311 | -- | 1329 | Satheesh Narayanasami, Rajasekhar Butta, Rajeshkumar Govindaraj, Surendra Singh Choudhary, Dilip Kumar Sharma, Anjana Poonia, Sudhakar Sengan, Pankaj Dadheech, Neeraj Kumar Shukla, Rajesh Verma. An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks |
1331 | -- | 1339 | Bei He. Algorithm to Enhance Security of Dynamic Data Migration in Optical Fiber Network |
1341 | -- | 1357 | Weina He, Yafei Wang, Dongliang Xia. Fuzzy Integration Algorithm of Big Data in Peer-to-Peer Communication Network Based on Deep Learning |
1359 | -- | 1376 | B. Sowmiya, E. Poovammal. A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain |
1377 | -- | 1403 | Venu Madhav Kuthadi, Rajalakshmi Selvaraj, S. Baskar 0002, P. Mohamed Shakeel, Abhishek Ranjan. Optimized Energy Management Model on Data Distributing Framework of Wireless Sensor Network in IoT System |
1405 | -- | 1432 | Fawad Masood, Maha Driss, Wadii Boulila, Jawad Ahmad 0001, Sadaqat ur Rehman, Sana Ullah Jan, Abdullah Qayyum, William J. Buchanan. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations |
1433 | -- | 1451 | Qiheng Sun, Lanxia Zhang. Bilateral Matching Model Between R & D Personnel and Project Manager Based on Ant Colony Optimization |
1453 | -- | 1477 | Muhammad Hassaan Anwar, Saeid Ghafouri, Sukhpal Singh Gill, Joseph Doyle. Recommender System for Optimal Distributed Deep Learning in Cloud Datacenters |
1479 | -- | 1501 | K. Subramanian, S. Shanmugavel. A Complete Continuous Target Coverage Model for Emerging Applications of Wireless Sensor Network Using Termite Flies Optimization Algorithm |
1503 | -- | 1516 | Yichun Dong. Design of an Automatic Detection System for Abnormal Communication Data Packets of Electronic Equipment |
1517 | -- | 1528 | T. Rubesh Kumar, Moorthi Madhavan. Hybrid Fabric Wearable Antenna Design and Evaluation for High Speed 5G Applications |
1529 | -- | 1546 | Xuemei Wang, Jiajun Zhang. An Algorithm of Video Image Fault-Tolerant Coding Transmission Based on OFDM Technology |
1547 | -- | 1564 | Yingying Liu, Yisen Wang 0002. Adaptive Data Transmission Method Based on Mean Fuzzy Algorithm in Ad Hoc Networks |
1565 | -- | 1585 | Inderjeet Kaur, E. Laxmi Lydia, Vinay Kumar Nassa, Bhanu Shrestha, Jamel Nebhen, Sharaf J. Malebary, Gyanendra Prasad Joshi. Generative Adversarial Networks with Quantum Optimization Model for Mobile Edge Computing in IoT Big Data |
1587 | -- | 1614 | M. Gayathri, C. Malathy 0001. Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication |
1615 | -- | 1631 | Amit Kishor, Chinmay Chakraborty. Artificial Intelligence and Internet of Things Based Healthcare 4.0 Monitoring System |
1633 | -- | 1645 | Lanfang Jia. Algorithm Design of Multi-channel Weak Signal Detection and Synchronous Acquisition in Communication Network |
1647 | -- | 1663 | Jayagopalan Santhosh, P. Balamurugan, G. Arulkumaran, Manickam Baskar, R. Velumani. Image Driven Multi Feature Plant Management with FDE Based Smart Agriculture with Improved Security in Wireless Sensor Networks |
1665 | -- | 1681 | Liren Zou. Detection Method of DC Microgrid Network Attack Based on Two-level and Multi-segment Model |
1683 | -- | 1704 | Amit Kishor, Chinmay Chakarbarty. Task Offloading in Fog Computing for Using Smart Ant Colony Optimization |
1705 | -- | 1716 | Abdulrahman Saad Alqahtani, Khaled Ali Abuhasel, Mohammed M. Alquraish. A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection |
1717 | -- | 1736 | N. Sree Divya, Veeramallu Bobba, Ramesh Vatambeti. An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication |
1737 | -- | 1762 | Roy Setiawan, Vidya Sagar Ponnam, Sudhakar Sengan, Mamoona Anam, Chidambaram Subbiah, Khongdet Phasinam, Manikandan Vairaven, Selvakumar Ponnusamy. Certain Investigation of Fake News Detection from Facebook and Twitter Using Artificial Intelligence Approach |
1763 | -- | 1785 | Satheesh Narayanasami, Sudhakar Sengan, Saira Khurram, Farrukh Arslan, Suresh Kumar Murugaiyan, Regin Rajan, Vijayakumar Peroumal, Anil Kumar Dubey, Sujatha Srinivasan, Dilip Kumar Sharma. Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT |
1787 | -- | 1808 | Hasnain Ali Almashhadani, Xiaoheng Deng, Suhaib N. Abdul Latif, Mohammed M. Ibrahim, Ali Hussien Alshammari. An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles |
1809 | -- | 1825 | C. Santhanakrishnan, K. Annapurani, S. Pradeep, T. Senthilkumar, M. Ramya. Physical Features Based Authentication Technique and Key Management for IoT Networks |
1827 | -- | 0 | Muhammad Junaid, Sajid Ali, Isma Farah Siddiqui, Choon-Sung Nam, Nawab Muhammad Faseeh Qureshi, Jaehyoun Kim, Dong Ryeol Shin. Correction to: Performance Evaluation of Data-driven Intelligent Algorithms for Big data Ecosystem |