no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Accurate Range-Free Localization with Hybrid DV-Hop Algorithms Based on PSO for UWB Wireless Sensor Networks
|
Lakshmi, Yedida Venkata |
|
|
49 |
3 |
p. 4157-4178 |
article |
2 |
A Combined Computer Vision and Convolution Neural Network Approach to Classify Turbid Water Samples in Accordance with National Water Quality Standards
|
Nazemi Ashani, Zahra |
|
|
49 |
3 |
p. 3503-3516 |
article |
3 |
A Comprehensive Analysis of Machine Learning- and Deep Learning-Based Solutions for DDoS Attack Detection in SDN
|
Aslam, Naziya |
|
|
49 |
3 |
p. 3533-3573 |
article |
4 |
A Deep Autoencoder-Based Approach for Suspicious Action Recognition in Surveillance Videos
|
Ahmed, Waqas |
|
|
49 |
3 |
p. 3517-3532 |
article |
5 |
A Framework for Elephant Flow Detection for SDNs Based on the Classification
|
Çavdar, Tuğrul |
|
|
49 |
3 |
p. 4243-4252 |
article |
6 |
A Human Visual System-Based Blind Image Watermarking Scheme in the IWT-APDCBT Domain Integrating Geometric and Non-Geometric Distortion Correction Techniques
|
Barlaskar, Saharul Alom |
|
|
49 |
3 |
p. 3979-4003 |
article |
7 |
A Hybrid Deep Learning Framework to Predict Alzheimer’s Disease Progression Using Generative Adversarial Networks and Deep Convolutional Neural Networks
|
SinhaRoy, Rajarshi |
|
|
49 |
3 |
p. 3267-3284 |
article |
8 |
A Lightweight Quantized CNN Model for Plant Disease Recognition
|
Rakib, Abdul Fattah |
|
|
49 |
3 |
p. 4097-4108 |
article |
9 |
An Effective Hybrid Framework Based on Combination of Color and Texture Features for Content-Based Image Retrieval
|
Alghamdi, Fahad A. |
|
|
49 |
3 |
p. 3575-3591 |
article |
10 |
A New Fuzzy-Based Color Reflectance Space with Selective Feature Extraction: Face Recognition Under Diversified Illuminations
|
Chaudhary, Juhi |
|
|
49 |
3 |
p. 4325-4351 |
article |
11 |
An Improved JPS Algorithm for Global Path Planning of the Seabed Mining Vehicle
|
Fan, Beibei |
|
|
49 |
3 |
p. 3963-3977 |
article |
12 |
An Intelligent IoT-Cloud-Based Air Pollution Forecasting Model Using Univariate Time-Series Analysis
|
Ansari, Manzoor |
|
|
49 |
3 |
p. 3135-3162 |
article |
13 |
An Optimized Adaptive BP Neural Network Based on Improved Lion Swarm Optimization Algorithm and Its Applications
|
Liu, Miaomiao |
|
|
49 |
3 |
p. 3417-3434 |
article |
14 |
A Novel Cyber Security Model Using Deep Transfer Learning
|
Çavuşoğlu, Ünal |
|
|
49 |
3 |
p. 3623-3632 |
article |
15 |
A Novel Extension of Fermatean Fuzzy Sets into Group Decision Making: A Study for Prioritization of Renewable Energy Technologies
|
Göçer, Fethullah |
|
|
49 |
3 |
p. 4209-4228 |
article |
16 |
A Regularization Factor-Based Approach to Anomaly Detection Using Contrastive Learning
|
Maurya, Abhinav |
|
|
49 |
3 |
p. 3371-3381 |
article |
17 |
A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks
|
Alslman, Yasmeen |
|
|
49 |
3 |
p. 4179-4195 |
article |
18 |
Artificial Bee Colony-Based Blind Watermarking Scheme for Color Images Alter Detection Using BRISK Features and DCT
|
Soualmi, Abdallah |
|
|
49 |
3 |
p. 3253-3266 |
article |
19 |
Artificial Intelligence Enabled Smart Monitoring and Controlling of IoT-Green House
|
Riskiawan, H. Y. |
|
|
49 |
3 |
p. 3043-3061 |
article |
20 |
Automated Question and Answer Generation from Texts using Text-to-Text Transformers
|
Goyal, Rupali |
|
|
49 |
3 |
p. 3027-3041 |
article |
21 |
BCVSE: Verifiable Searchable Encryption Scheme With Blockchain Supporting Fuzzy Query
|
Zhou, Fucai |
|
|
49 |
3 |
p. 4401-4418 |
article |
22 |
BDFGNet: A Lightweight Salient Object Detection Network Based on Background Denoising and Feature Generation
|
Xu, Tao |
|
|
49 |
3 |
p. 4365-4381 |
article |
23 |
Blockchain Based n-party Virtual Payment Model with Concurrent Execution
|
Sahoo, Sujit Sangram |
|
|
49 |
3 |
p. 3285-3312 |
article |
24 |
BotDefender: A Collaborative Defense Framework Against Botnet Attacks using Network Traffic Analysis and Machine Learning
|
Prasad, Arvind |
|
|
49 |
3 |
p. 3313-3329 |
article |
25 |
BT-LPD: B+ Tree-Inspired Community-Based Link Prediction in Dynamic Social Networks
|
Singh, Shashank Sheshar |
|
|
49 |
3 |
p. 4039-4060 |
article |
26 |
Classification of Satellite Images Using an Ensembling Approach Based on Deep Learning
|
Abdul Azeem, Noamaan |
|
|
49 |
3 |
p. 3703-3718 |
article |
27 |
Classification of Skin Lesions by Incorporating Drop-Block and Batch Normalization Layers in Representative CNN Models
|
Lakshmi, T. R. Vijaya |
|
|
49 |
3 |
p. 3671-3684 |
article |
28 |
Cloud-Based Demand-Responsive Transportation System Using Forecasting Model
|
Khair, Younes |
|
|
49 |
3 |
p. 3829-3843 |
article |
29 |
CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things
|
Tanveer, Muhammad |
|
|
49 |
3 |
p. 3453-3466 |
article |
30 |
Compact Image Transformer Based on Convolutional Variational Autoencoder with Augmented Attention Backbone for Target Recognition in Infrared Images
|
Nebili, Billel |
|
|
49 |
3 |
p. 3383-3396 |
article |
31 |
Control Stochastic Selection-Based Biomedical Text Summarization Using Sim-TLBO
|
Gupta, Supriya |
|
|
49 |
3 |
p. 3593-3607 |
article |
32 |
Convolutional Neural Network for Head Segmentation and Counting in Crowded Retail Environment Using Top-view Depth Images
|
Abed, Almustafa |
|
|
49 |
3 |
p. 3735-3749 |
article |
33 |
Data Augmentation for Improving Explainability of Hate Speech Detection
|
Ansari, Gunjan |
|
|
49 |
3 |
p. 3609-3621 |
article |
34 |
Deep Contextualised Text Representation and Learning for Sarcasm Detection
|
Gedela, Ravi Teja |
|
|
49 |
3 |
p. 3719-3734 |
article |
35 |
Deep Learning-Based Modified Bidirectional LSTM Network for Classification of ADHD Disorder
|
Saurabh, Sudhanshu |
|
|
49 |
3 |
p. 3009-3026 |
article |
36 |
Deep Learning-Based Noise Type Classification and Removal for Drone Image Restoration
|
Ahmed, Waqar |
|
|
49 |
3 |
p. 4287-4306 |
article |
37 |
Deep Learning-Based Power Analysis Attack for Extracting AES Keys on ATmega328P Microcontroller
|
Negabi, Ismail |
|
|
49 |
3 |
p. 4197-4208 |
article |
38 |
DE-GWO: A Multi-objective Workflow Scheduling Algorithm for Heterogeneous Fog-Cloud Environment
|
Shukla, Prashant |
|
|
49 |
3 |
p. 4419-4444 |
article |
39 |
Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction
|
Mujeerulla, Mohammed |
|
|
49 |
3 |
p. 4109-4124 |
article |
40 |
Design and Analysis of a Fifth Order Low Pass Gm-C Filter for Seizure Detection
|
Devi, Swagata |
|
|
49 |
3 |
p. 2935-2944 |
article |
41 |
Detection of Lung Opacity and Treatment Planning with Three-Channel Fusion CNN Model
|
Türk, Fuat |
|
|
49 |
3 |
p. 2973-2985 |
article |
42 |
Discrete Student Psychology Optimization Algorithm for the Word Sense Disambiguation Problem
|
Haouassi, Hichem |
|
|
49 |
3 |
p. 3487-3502 |
article |
43 |
Domain Effect Investigation for Bert Models Fine-Tuned on Different Text Categorization Tasks
|
Coban, Onder |
|
|
49 |
3 |
p. 3685-3702 |
article |
44 |
Efficient Design of Modified Wallace Tree Approximate Multipliers Based on Imprecise Compressors for Error-Tolerance Applications
|
Rao, E. Jagadeeswara |
|
|
49 |
3 |
p. 4253-4270 |
article |
45 |
Efficient Techniques for Residential Appliances Scheduling in Smart Homes for Energy Management Using Multiple Knapsack Problem
|
Shewale, Amit |
|
|
49 |
3 |
p. 3793-3813 |
article |
46 |
End-to-End Deep Learning Method with Disparity Correction for Stereo Matching
|
Zhou, Zhiyu |
|
|
49 |
3 |
p. 3331-3345 |
article |
47 |
ESSAIoV: Enhanced Sparrow Search Algorithm-Based Clustering for Internet of Vehicles
|
Khedr, Ahmed M. |
|
|
49 |
3 |
p. 2945-2971 |
article |
48 |
Evolutionary Techniques for the Solution of Bio-Heat Equation Arising in Human Dermal Region Model
|
Ahmad, Iftikhar |
|
|
49 |
3 |
p. 3109-3134 |
article |
49 |
Familiarity, Common Causes and Effects of Technical Debt: A Replicated Study in the Saudi Software Industry
|
Aldaeej, Abdullah |
|
|
49 |
3 |
p. 4459-4477 |
article |
50 |
Fault Diagnosis in an Asynchronous Motor Using Three-Dimensional Convolutional Neural Network
|
Kerboua, Adlen |
|
|
49 |
3 |
p. 3467-3485 |
article |
51 |
Fire Object Detection and Tracking Based on Deep Learning Model and Kalman Filter
|
Daoud, Zeineb |
|
|
49 |
3 |
p. 3651-3669 |
article |
52 |
Gene Selection for High-Dimensional Imbalanced Biomedical Data Based on Marine Predators Algorithm and Evolutionary Population Dynamics
|
Almotairi, Khaled H. |
|
|
49 |
3 |
p. 3935-3961 |
article |
53 |
Genetic Algorithm-Based Hyperparameter Optimization for Convolutional Neural Networks in the Classification of Crop Pests
|
Ayan, Enes |
|
|
49 |
3 |
p. 3079-3093 |
article |
54 |
HAUOPM: High Average Utility Occupancy Pattern Mining
|
Kumar, Mathe John Kenny |
|
|
49 |
3 |
p. 3397-3416 |
article |
55 |
High-Definition Image Formation Using Multi-stage Cycle Generative Adversarial Network with Applications in Image Forensic
|
Arif, Danish |
|
|
49 |
3 |
p. 3887-3896 |
article |
56 |
Highly Imbalanced Railway Station Structural Damage Monitoring Based on Cluster-Based Undersampling and Siamese Artificial Neural Network
|
Chen, Yanchun |
|
|
49 |
3 |
p. 3915-3933 |
article |
57 |
IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
|
Kumar, Naveen |
|
|
49 |
3 |
p. 3241-3251 |
article |
58 |
IFEJM: New Intuitionistic Fuzzy Expert Judgment Method for Effort Estimation in Agile Software Development
|
El Beggar, Omar |
|
|
49 |
3 |
p. 2887-2908 |
article |
59 |
Investigating the Maturity of RE Practices and the Adoption of Human Values in Industry from the Perspective of Software Engineering Practitioners
|
Alwadani, Rawabi |
|
|
49 |
3 |
p. 3633-3649 |
article |
60 |
Joint Entity Relation Extraction Based on LSTM via Attention Mechanism
|
Cao, Xu |
|
|
49 |
3 |
p. 4353-4363 |
article |
61 |
LightFIDS: Lightweight and Hierarchical Federated IDS for Massive IoT in 6G Network
|
Alotaibi, Asma |
|
|
49 |
3 |
p. 4383-4399 |
article |
62 |
Machine Learning-Based Exploration of the Impact of Move Method Refactoring on Object-Oriented Software Quality Attributes
|
Al Dallal, Jehad |
|
|
49 |
3 |
p. 3867-3885 |
article |
63 |
Mounting RIS Panels on Tethered and Untethered UAVs: A Survey
|
Nazar, Ahmad M. |
|
|
49 |
3 |
p. 2857-2885 |
article |
64 |
Multi-illumination Mapping-Based Fusion Method for Low-Light Area’s Visibility and Backlit Image Enhancement
|
Yadav, Gaurav |
|
|
49 |
3 |
p. 3095-3108 |
article |
65 |
Multitask Particle Swarm Optimization Algorithm Based on Dual Spatial Similarity
|
Bian, Xiaotong |
|
|
49 |
3 |
p. 4061-4079 |
article |
66 |
Narrator2Vec: An Efficient Narrator Representation in Hadith Literature Using Word Embedding
|
Mghari, Mohammed |
|
|
49 |
3 |
p. 4479-4494 |
article |
67 |
Optimizing Base Station’s Anonymity with PID-Controlled Fake Packets and Data Aggregation
|
Aliyu, Farouq |
|
|
49 |
3 |
p. 4139-4156 |
article |
68 |
Performance-Aware Big Data Management for Remote Sensing Systems
|
Pekturk, Mustafa Kemal |
|
|
49 |
3 |
p. 3845-3865 |
article |
69 |
PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment
|
Bouleghlimat, Imene |
|
|
49 |
3 |
p. 3225-3239 |
article |
70 |
Quantum-Secure N2N Authentication Protocol Model for IoT Sensor Networks
|
Jayanth Babu, Ch. |
|
|
49 |
3 |
p. 4013-4024 |
article |
71 |
Query-Based Extractive Text Summarization Using Sense-Oriented Semantic Relatedness Measure
|
Rahman, Nazreena |
|
|
49 |
3 |
p. 3751-3792 |
article |
72 |
Random Projection-Based Cancelable Iris Biometrics for Human Identification Using Deep Learning
|
Rani, Rajneesh |
|
|
49 |
3 |
p. 3815-3828 |
article |
73 |
Region-Based Medical Image Watermarking Approach For Secure EPR Transmission Applied to e-Health
|
Benyoucef, Aicha |
|
|
49 |
3 |
p. 4025-4037 |
article |
74 |
Reinforcement Learning Algorithms with Selector, Tuner, or Estimator
|
Masadeh, Ala’eddin |
|
|
49 |
3 |
p. 4081-4095 |
article |
75 |
RME–SEP: An IoT Favorable Approach of Minimum Energy-Efficient Hybrid SEP for Heterogeneous WSN Data Routing
|
Sharma, Sarvesh Kumar |
|
|
49 |
3 |
p. 4005-4012 |
article |
76 |
SEBR: Scharr Edge-Based Regularization Method for Blind Image Deblurring
|
Bibi, Nazia |
|
|
49 |
3 |
p. 3435-3451 |
article |
77 |
Secure and Privacy-Preserving Framework for IoT-Enabled Smart Grid Environment
|
Kumar, Chandan |
|
|
49 |
3 |
p. 3063-3078 |
article |
78 |
Single Encoder and Decoder-Based Transformer Fusion with Deep Residual Attention for Restoration of Degraded Images and Clear Visualization in Adverse Weather Conditions
|
Shit, Sahadeb |
|
|
49 |
3 |
p. 4229-4242 |
article |
79 |
Sinter Quality Prediction Based on Multi-Features CNN + LSTM
|
Zhao, Zhiwei |
|
|
49 |
3 |
p. 4271-4286 |
article |
80 |
Smart Utilities IoT-Based Data Collection Scheduling
|
Sayed, Heba Allah |
|
|
49 |
3 |
p. 2909-2923 |
article |
81 |
Spectro-Temporal Energy Ratio Features for Single-Corpus and Cross-Corpus Experiments in Speech Emotion Recognition
|
Parlak, Cevahir |
|
|
49 |
3 |
p. 3209-3223 |
article |
82 |
State-of-the-Art Research in Blockchain of Things for HealthCare
|
Almalki, Jameel |
|
|
49 |
3 |
p. 3163-3191 |
article |
83 |
Subject-Wise Cognitive Load Detection Using Time–Frequency EEG and Bi-LSTM
|
Yedukondalu, Jammisetty |
|
|
49 |
3 |
p. 4445-4457 |
article |
84 |
Survival Classification in Heart Failure Patients by Neural Network-Based Crocodile and Egyptian Plover (CEP) Optimization Algorithm
|
Akalın, Fatma |
|
|
49 |
3 |
p. 3897-3914 |
article |
85 |
Topic Classification Using Regularized Variable-Size CNN and Dynamic BPSO in Online Social Network
|
Raul, Sanjib Kumar |
|
|
49 |
3 |
p. 3347-3369 |
article |
86 |
Two-Stage Motion Artifact Reduction Algorithm for rPPG Signals Obtained from Facial Video Recordings
|
Abdulrahaman, Luqman Qader |
|
|
49 |
3 |
p. 2925-2933 |
article |
87 |
Understanding the Interplay Between Metrics, Normalization Forms, and Data distribution in K-Means Clustering: A Comparative Simulation Study
|
El Khattabi, M.-Z. |
|
|
49 |
3 |
p. 2987-3007 |
article |
88 |
UniHaCh: Unicode and Hash Function Supported with Counting and Frequency Recurrence of Arabic Characters for Quranic Text Watermarking
|
Kazmi, Majida |
|
|
49 |
3 |
p. 4307-4323 |
article |
89 |
Using 2D Hénon Map, Cycling Chaos and DNA Sequence for New Secure Color Image Encryption Algorithm
|
SaberiKamarposhti, Morteza |
|
|
49 |
3 |
p. 4125-4137 |
article |
90 |
U-VIP-SLAM: Underwater Visual-Inertial-Pressure SLAM for Navigation of Turbid and Dynamic Environments
|
Amarasinghe, Chinthaka |
|
|
49 |
3 |
p. 3193-3207 |
article |