Volume 13, Number 4, April 2022
A parallel algorithm for multi-AGV systems.

Dingding Yu Xianliang Hu Kewei Liang Jun Ying

An integrated converter topology for torque ripple minimization in BLDC motor using an ITSA technique.

Bapayya Naidu Kommula Venkata Reddy Kota

Big consumer opinion data understanding for Kano categorization in new product development.

Ke-Jia Chen Jian Jin Jiayi Luo

A Markov chain model for IEEE 802.15.4 in time critical wireless sensor networks under periodic traffic with reneging packets.

Hossein Hadadian Nejad Yousefi Yousef Seifi Kavian Alimorad Mahmoudi

Some novel q-rung orthopair fuzzy correlation coefficients based on the statistical viewpoint with their applications.

Surender Singh Abdul Haseeb Ganie

Novel image encryption algorithm using fractional chaos and cellular neural network.

Farhan Musanna Deepak Dangwal Sanjeev Kumar

A blockchain-based secure routing protocol for opportunistic networks.

Sanjay K. Dhurandher Jagdeep Singh Petros Nicopolitidis Raghav Kumar Geetanshu Gupta

An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream.

Basma Abd El-Rahiem Mohamed Amin Ahmed Sedik Fathi E. Abd El-Samie Abdullah M. Iliyasu

Adaptive trapezoid region intercept histogram based Otsu method for brain MR image segmentation.

Leyi Xiao Chaodong Fan Honglin Ouyang Andrea F. Abate Shaohua Wan

Interactive multilevel programming approaches in neutrosophic environments.

Sui-Zhi Luo Witold Pedrycz Lining Xing

Sign language digits and alphabets recognition by capsule networks.

Hongwang Xiao Yun Yang Ke Yu Jiao Tian Xinyi Cai Usman Muhammad Jinjun Chen

Cost, energy, and response delay awareness-solution for cloud resources management: proposition of a predictive dynamic algorithm for VMs allocation over a distributed cloud infrastructure.

Eya Dhib Khaled Boussetta Nawel Zangar Nabil Tabbane

Emergency decision support modeling under generalized spherical fuzzy Einstein aggregation information.

Shahzaib Ashraf Saleem Abdullah Ronnason Chinram

Modeling and optimizing a multi-period closed-loop supply chain for pricing, warranty period, and quality management.

Fatemeh Keshavarz-Ghorbani Alireza Arshadi Khamseh

Smart streetlights in Smart City: a case study of Sheffield.

Eisley Dizon Bernardi Pranggono

COVID-19 classification using deep feature concatenation technique.

Waleed Saad Wafaa A. Shalaby Mona Shokair Fathi E. Abd El-Samie Moawad I. Dessouky Essam Abdellatef

Significance driven inverse distance weighted filter to restore impulsive noise corrupted X-ray image.

Bharat Garg Prashant Singh Rana Vijaypal Singh Rathor

Probabilistic neural network based efficient bandwidth allocation in wireless sensor networks.

A. D. C. Navin Dhinnesh T. Sabapathi

LSTM and CNN based ensemble approach for spoof detection task in automatic speaker verification systems.

Mohit Dua Chhavi Jain Sushil Kumar

Incorporating individual and group privacy preferences in the internet of things.

Khaled Alanezi Shivakant Mishra

An edge-aware based adaptive multi-feature set extraction for stereo matching of binocular images.

Qazi Mazhar ul Haq Chang-Hong Lin Shanq-Jang Ruan Derlis Gregor

An optimal remote sensing image enhancement with weak detail preservation in wavelet domain.

Rajni Sharma M. Ravinder Nitin Sharma Kanchan Sharma

An elitism based self-adaptive multi-population Poor and Rich optimization algorithm for grouping similar documents.

Thirumoorthy Karpagalingam K. Muneeswaran

Markovian working vacation queue with imperfect service, balking and retrial.

Madhu Jain Sibasish Dhibar Sudeep Singh Sanga

Evidence approach imprecise intervals: extensions and evaluation measures.

Fred Petry Ronald R. Yager

A feature-level fusion based improved multimodal biometric recognition system using ear and profile face.

Partha Pratim Sarangi Deepak Ranjan Nayak Madhumita Panda Banshidhar Majhi

An end to end system for subtitle text extraction from movie videos.

Hossam Elshahaby Mohsen Rashwan

Similarity measure of the interval-valued fuzzy numbers and its application in risk analysis in paddy cultivation.

Mridul Krishna Gogoi Rituparna Chutia

Classification of Arabic healthcare questions based on word embeddings learned from massive consultations: a deep learning approach.

Hossam Faris Maria Habib Mohammad Faris Alaa Alomari Pedro A. Castillo Manal Alomari

Oppositional firefly optimization based optimal feature selection in chronic kidney disease classification using deep neural network.

Jerlin Rubini Lambert Eswaran Perumal

Hesitant fuzzy power Maclaurin symmetric mean operators in the framework of Dempster-Shafer theory for multiple criteria decision making.

Yanru Zhong Liangbin Cao Huanan Zhang Yuchu Qin Meifa Huang Xiaonan Luo

Extended matrix factorization with entity network construction for recommendation.

Jinmao Xu Lei Tan Daofu Gong Fenlin Liu

FriendCare-AAL: a robust social IoT based alert generation system for ambient assisted living.

Nancy Gulati Pankaj Deep Kaur

Wi-Fi assisted 5G D2D communications in unlicensed spectrum.

Babul P. Tewari Sasthi C. Ghosh

A new approach to q-linear Diophantine fuzzy emergency decision support system for COVID19.

Alaa Omran Almagrabi Saleem Abdullah Maria Shams Yasser D. Al-Otaibi Shahzaib Ashraf


Volume 13, Number 3, March 2022
E-commerce payment model using blockchain.

Shee-Ihn Kim Seung-Hee Kim

Frequency based tactile rendering method for pin-array tactile devices.

Sang-Youn Kim Yu-Joon Kim Dong-Soo Choi Byeong-Seok Shin

Design of recommendation system for tourist spot using sentiment analysis based on CNN-LSTM.

Hyeon-woo An Nammee Moon

Agent grouping recommendation method in edge computing.

Kayumiy Shokh Jakhon Haitao Guo Kyungeun Cho

GUI-based software modularization through module clustering in edge computing based IoT environments.

Yeong-Seok Seo Jun-Ho Huh

Visualization of knowledge map for monitoring knowledge diagnoses.

Jae-Young Choi Jee-Hyong Lee Younghwa Cho Suntae Kim Jeong-Ah Kim Seang-Yong Lee

Multiple vehicle tracking and classification system with a convolutional neural network.

HyungJun Kim

Analysis of user satisfaction of shared bicycles based on SEM.

Xiaomei Xia Huipeng Jiang Jin Wang

Trusted information project platform based on blockchain for sharing strategy.

Eunhee Lee Yongik Yoon

Special issue on user behavior analysis in edge computing based Internet-of-Things.

Young-Sik Jeong Jin Wang Neil Y. Yen

An ant colony optimization algorithm with adaptive greedy strategy to optimize path problems.

Wei Li Le Xia Ying Huang Soroosh Mahmoodi

An efficient lattice-based linkable ring signature scheme with scalability to multiple layer.

Yan Ren Haipeng Guan Qiuxia Zhao

APP-NTS: a network traffic similarity-based framework for repacked Android apps detection.

Mohammed Alshehri

EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting.

Yungen Wei Zheng Gong Shunzhi Yang Kai Ye Yamin Wen

Multi-scale residual denoising GAN model for producing super-resolution CTA images.

Pengcheng Li Zhangyu Li Xiongwen Pang Hui Wang Weiwei Lin Wentai Wu

A characteristic standardization method for circuit input vectors based on Hash algorithm.

Ying Shi Shuyi Huang Jungang Lou

A secure and efficient privacy-preserving data aggregation algorithm.

Hui Dou Yuling Chen Yixian Yang Yangyang Long

Towards accurate seismic events detection using motion sensors on smartphones.

Zhaohui Yuan Yuqin Zhu Mei He Qingping Cao

Data distribution and secure data transmission using IANFIS and MECC in IoT.

B. M. Pampapathi M. Nageswara Guptha M. S. Hema

Dictionary learning based on structural self-similarity and convolution neural network.

Ling Zhang Wenchao Jiang Wen Xiang

Community detection based on similarities of communication behavior in IP networks.

Shuzhuang Zhang Yaning Zhang Min Zhou Lizhi Peng

Single-channel blind source separation based on attentional generative adversarial network.

Xiao Sun Jindong Xu Yongli Ma Tianyu Zhao Shifeng Ou

Verifiable and privacy preserving federated learning without fully trusted centers.

Gang Han Tiantian Zhang Yinghui Zhang Guowen Xu Jianfei Sun Jin Cao

DSCAE: a denoising sparse convolutional autoencoder defense against adversarial examples.

Hongwei Ye Xiaozhang Liu Chunlai Li

Trust-based secure directed diffusion routing protocol in WSN.

Xinying Yu Fengyin Li Tao Li Nan Wu Hua Wang Huiyu Zhou

Blind image separation based on attentional generative adversarial network.

Xiao Sun Jindong Xu Yongli Ma Tianyu Zhao Shifeng Ou Lizhi Peng

Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis.

Ming Wan Jinfang Li Kai Wang Bailing Wang

An interactive role learning and discovery model for multi-department RBAC building based on attribute exploration.

Xiajiong Shen Jiyong Yang Lei Zhang Geying Yang

A new entropic criterion model in rational secure two-party computation.

Xinyu Zhang Yujun Liu Yuling Chen

Aitac: an identity-based traceable anonymous communication model.

Fengyin Li Zhongxing Liu Yilei Wang Nan Wu Jiguo Yu Chongzhi Gao Huiyu Zhou

Research cooperations of blockchain: toward the view of complexity network.

Yanli Wang Yilei Wang Zhaojie Wang Guoyu Yang Xiaomei Yu

Multi-station test scheduling optimization method for industrial robot servo system.

Shaomin Tang Guixiong Liu Zhiyu Lin Xiaobing Li

Research on adaptive beacon message transmission power in VANETs.

Meng Wang Tong Chen Fei Du Juan Wang Guanxiang Yin Yuejin Zhang

Deep anomaly detection in expressway based on edge computing and deep learning.

Juan Wang Meng Wang Qingling Liu Guanxiang Yin Yuejin Zhang

A object detection and tracking method for security in intelligence of unmanned surface vehicles.

Wei Zhang Xianzhong Gao Chifu Yang Feng Jiang Zhiyuan Chen

Prediction of mortality of premature neonates using neural network and logistic regression.

Aramesh Rezaeian Marzieh Rezaeian Seyede Fatemeh Khatami Fatemeh Khorashadizadeh Farshid Pouralizadeh Moghaddam

Network performance analysis from binding number prospect.

Wei Gao Li Yan Yingfang Li Bo Yang

Special issue on new advanced techniques in security of artificial intelligence.

Mohammed Atiquzzaman Jin Li Witold Pedrycz


Volume 13, Number 2, February 2022
Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix.

Chinmoy Biswas Ratna Dutta

Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication.

Osama S. Faragallah Walid El Shafai Ahmed I. Sallam Ibrahim F. Elashry El-Sayed El-Rabaie Ashraf Afifi Mohammed Abdullatif Alzain Jehad F. Al-Amri Fathi E. Abd El-Samie Hala S. El-sayed

A novel swarm intelligence algorithm inspired by the grazing of sheep.

Mahdi Esmailnia Kivi Vahid Majidnezhad

A systematic literature review on the blood supply chain: exploring the trend and future research directions.

Mahmood Eghtesadifard Fatemeh Jozan

A planned scheduling process of cloud computing by an effective job allocation and fault-tolerant mechanism.

Manoj Kumar Malik Ajit Singh Abhishek Swaroop

Three-stream spatio-temporal attention network for first-person action and interaction recognition.

Javed Imran Balasubramanian Raman

Dynamic Coordinative Estimation Enhancement in Cognitive Radio Network.

Jaya Lakshmi Arikatla G. N. Swamy M. N. Giri Prasad

A truthful budget feasible mechanism for IoT-based participatory sensing with incremental arrival of budget.

Jaya Mukhopadhyay Vikash Kumar Singh Sajal Mukhopadhyay Anita Pal Abhishek Kumar

Employing entropy measures to identify visitors in multi-occupancy environments.

Aadel Howedi Ahmad Lotfi Amir Pourabdollah

A novel single/multi-objective frameworks for techno-economic operation in power systems using tunicate swarm optimization technique.

Ragab A. El-Sehiemy

Exploitation whale optimization based optimal offloading approach and topology optimization in a mobile ad hoc cloud environment.

Vylala Anoop Plakkottu Radhakrishnan Bipin

S-THAD: a framework for sensor-based temporal human activity detection from continuous data streams.

Muhammad Ehatisham-ul-Haq Muhammad Awais Azam Fiza Murtaza Yasar Amin Qiang Fu

A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture.

Abhrajyoti Das Abhilash Kumar Das Nirmalya Kar

HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud.

P. Chinnasamy P. Deepalakshmi

Real-time forecasting of petrol retail using dilated causal CNNs.

Syed Muhammad Hur Rizvi Tahir Syed Jalaluddin Qureshi

Novel encryption for color images using fractional-order hyperchaotic system.

Khalid M. Hosny Sara T. Kamal Mohamed M. Darwish

Detection of R-peaks using fractional Fourier transform and principal component analysis.

Varun Gupta Monika Mittal Vikas Mittal Yatender Chaturvedi

Intelligent route discovery towards rushing attacks in ad hoc wireless networks.

Udayakumar Allimuthu K. Mahalakshmi

l1/2 regularized joint low rank and sparse recovery technique for illumination map estimation in low light image enhancement.

Baiju P. S. Sudhish N. George

Machine learning based hybrid model for energy efficient secured transmission in wireless sensor networks.

N. M. Saravana Kumar E. Suryaprabha K. Hariprasath

Impact of autoencoder based compact representation on emotion detection from audio.

Nivedita Patel Shireen Patel Sapan H. Mankad

Req-WSComposer: a novel platform for requirements-driven composition of semantic web services.

Maha Driss Safa Ben Atitallah Amal Albalawi Wadii Boulila

Path route layout design optimization using genetic algorithm: based on control mechanisms for on-line crossover intersection positions and bit targeted mutation.

Zikrija Avdagic Amir Smajevic Samir Omanovic Ingmar Besic

Parametric and nonparametric correlation ranking based supervised feature selection methods for skin segmentation.

Utku Kaya Mehmet Fidan

Pipeline surveillance along the international border using hybrid optimization algorithm.

Sudeep Varshney Chiranjeev Kumar Abhishek Swaroop

Serial attention network for skin lesion segmentation.

Yuan Ren Long Yu Shengwei Tian Junlong Cheng Zhiqi Guo Yanhan Zhang

Real-time fast low-light vision enhancement for driver during driving at night.

Gouranga Mandal Diptendu Bhattacharya Parthasarathi De

Decentralized blockchain based authentication for secure data sharing in Cloud-IoT.

Uma Narayanan Varghese Paul Shelbi Joseph

Spectrogram analysis of ECG signal and classification efficiency using MFCC feature extraction technique.

Yalamanchili Arpitha G. L. Madhumathi N. Balaji

Flexible big data approach for geospatial analysis.

Rahul Malik Madaan Nishi

Facial expression recognition with trade-offs between data augmentation and deep learning features.

Saiyed Umer Ranjeet Kumar Rout Chiara Pero Michele Nappi

Monitor system and Gaussian perturbation teaching-learning-based optimization algorithm for continuous optimization problems.

Po-Chou Shih Yang Zhang Xizhao Zhou


Volume 13, Number 1, January 2022
A novel blockchain based electronic health record automation system for healthcare.

Usharani Chelladurai Seethalakshmi Pandian

Improving time series forecasting using LSTM and attention models.

Hossein Abbasimehr Reza Paki

Hadoop Deep Neural Network for offending drivers.

Shiva Asadianfam Mahboubeh Shamsi Abdolreza Rasouli Kenari

PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system.

Wei Zhang Zhishuo Zhang Hu Xiong Zhiguang Qin

Real-time isolated hand sign language recognition using deep networks and SVD.

Razieh Rastgoo Kourosh Kiani Sergio Escalera

Computing stationary distributions of the D-MAP/D-MSP(a, b) /1 queueing system.

Sujit Kumar Samanta Kousik Das

A multi-verse optimizer algorithm for ambulance repositioning in emergency medical service systems.

Hamed Golabian Jamal Arkat Reza Tavakkoli-Moghaddam Hiwa Faroughi

COVINet: a convolutional neural network approach for predicting COVID-19 from chest X-ray images.

Muhammad Umer Imran Ashraf Saleem Ullah Arif Mehmood Gyu Sang Choi

A survey on multi-authority and decentralized attribute-based encryption.

Prince Silas Kwesi Oberko Victor-Hillary Kofi Setornyo Obeng Hu Xiong

An investigation on m-polar fuzzy threshold graph and its application on resource power controlling system.

Tanmoy Mahapatra Madhumangal Pal

Novel one round message authentication scheme for constrained IoT devices.

Hassan N. Noura Ola Salman Raphaël Couturier Ali Chehab

IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.

Liqiang Wu Xiaoyuan Yang Minqing Zhang Xu An Wang

Bi-objective optimization of application placement in fog computing environments.

Mutaz A. B. Al-Tarawneh

Some operations on Dombi neutrosophic graph.

Tejinder Singh Lakhwani Kartick Mohanta Arindam Dey Sankar Prasad Mondal Anita Pal

IoE based framework for smart agriculture.

Hitesh Mohapatra Amiya Kumar Rath

A feature reduction based reflected and exploited DDoS attacks detection system.

Deepak Kshirsagar Sandeep Kumar

Machine learning as a tool to study the influence of chronodisruption in preterm births.

Elena Díaz Catalina Fernández-Plaza Inés Abad Ana Alonso Celestino González Irene Díaz

Atom Taylor Bird Swarm algorithm-based deep belief network for incremental classification using medical data.

Afnan M. Alhassan Wan Mohd Nazmee Wan Zainon

Correlation coefficient of T-spherical type-2 hesitant fuzzy sets and their applications in clustering analysis.

Serif Özlü Faruk Karaaslan

Optimal school site selection in Urban areas using deep neural networks.

Nimra Zaheer Saeed-Ul Hassan Mohsen Ali Mudassir Shabbir

Fermatean fuzzy CRITIC-EDAS approach for the selection of sustainable third-party reverse logistics providers using improved generalized score function.

Arunodaya Raj Mishra Pratibha Rani Kiran Pandey

WS-ADVISING: a Reusable and reconfigurable microservices-based platform for effective academic advising.

Maha Driss

Simultaneous detection and tracking using deep learning and integrated channel feature for ambint traffic light recognition.

Ke Wang Xinwei Tang Shulian Zhao Yuchen Zhou

Recent advancement in cervical cancer diagnosis for automated screening: a detailed review.

B. Chitra S. S. Kumar

Miniaturized DGS based multi-band pass filters for satellite applications.

S. Oudaya Coumar

New mHealth hospital selection framework supporting decentralised telemedicine architecture for outpatient cardiovascular disease-based integrated techniques: Haversine-GPS and AHP-VIKOR.

Osamah Shihab Albahri A. A. Zaidan B. B. Zaidan Ahmed Shihab Albahri Ali H. Mohsin K. I. Mohammed M. A. Alsalem

Optimal fuzzy repairs' scheduling and sequencing of failure types over multiple periods.

Abbas Al-Refaie Ahmad Al-Hawadi

Review on implementation of IoT for environmental condition monitoring in the agriculture sector.

Kurakula Arun Kumar Karthikeyan Jayaraman

Opportunities and challenges for applying process mining in healthcare: a systematic mapping study.

Marcelo Rosano Dallagassa Cleiton dos Santos Garcia Edson Emílio Scalabrin Sergio Ossamu Ioshii Deborah Ribeiro Carvalho

Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm.

S. Immaculate Shyla S. S. Sujatha

An enhanced opposition-based Salp Swarm Algorithm for global optimization and engineering problems.

Abdelazim G. Hussien

A short-turning strategy to alleviate bus bunching.

Shengnan Tian Xiang Li Jiaming Liu Hongguang Ma Haitao Yu

VOP detection for read and conversation speech using CWT coefficients and phone boundaries.

Kumud Tripathi K. Sreenivasa Rao

A framework for analyzing the relationships between cancer patient satisfaction, nurse care, patient attitude, and nurse attitude in healthcare systems.

Ng Kim-Soon Alyaa Idrees Abdulmaged Salama A. Mostafa Mazin Abed Mohammed Fadia Abdalla Musbah Rabei Raad Ali Oana Geman

Service management mechanisms in the internet of things: an organized and thorough study.

Jiuhong Yu Mengfei Wang Jinfan Liu Karlo Abnosian

Accurate detection of Covid-19 patients based on Feature Correlated Naïve Bayes (FCNB) classification strategy.

Nehal A. Mansour Ahmed I. Saleh Mahmoud Mohammed Badawy Hesham A. Ali

A two-tier ensemble approach for writer dependent online signature verification.

Pratik Bhowal Debanshu Banerjee Samir Malakar Ram Sarkar

SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems.

Sneha Kanchan Garima Singh Narendra S. Chaudhari

Enhancing sentiment analysis using Roulette wheel selection based cuckoo search clustering method.

Avinash Chandra Pandey Ankur Kulhari Deep Shikha Shukla