A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs (Englisch)
- Neue Suche nach: Wang, Jin
- Neue Suche nach: Ju, Chunwei
- Neue Suche nach: Kim, Hye-jin
- Neue Suche nach: Sherratt, R. Simon
- Neue Suche nach: Lee, Sungyoung
- Neue Suche nach: Wang, Jin
- Neue Suche nach: Ju, Chunwei
- Neue Suche nach: Kim, Hye-jin
- Neue Suche nach: Sherratt, R. Simon
- Neue Suche nach: Lee, Sungyoung
In:
Cluster Computing
;
22
, Suppl 1
; 1787-1795
;
2017
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs
-
Beteiligte:Wang, Jin ( Autor:in ) / Ju, Chunwei ( Autor:in ) / Kim, Hye-jin ( Autor:in ) / Sherratt, R. Simon ( Autor:in ) / Lee, Sungyoung ( Autor:in )
-
Erschienen in:Cluster Computing ; 22, Suppl 1 ; 1787-1795
-
Verlag:
- Neue Suche nach: Springer US
- Neue Suche nach: Springer Science + Business Media B.V
-
Erscheinungsort:Dordrecht [u.a.]
-
Erscheinungsdatum:2017
-
ISSN:
-
ZDBID:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 54.32$jRechnerkommunikation / 54.50$jProgrammierung: Allgemeines / 54.25$jParallele Datenverarbeitung / 54.50 / 54.32 / 54.25
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.32$jRechnerkommunikation / 54.50$jProgrammierung: Allgemeines / 54.25$jParallele Datenverarbeitung / 54.50 Programmierung: Allgemeines / 54.32 Rechnerkommunikation / 54.25 Parallele Datenverarbeitung -
Datenquelle:
Inhaltsverzeichnis – Band 22, Ausgabe Suppl 1
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Diabetes prediction in healthcare systems using machine learning algorithms on Hadoop clusterYuvaraj, N. / SriPreethaa, K. R. et al. | 2017
- 11
-
A hybrid technique for gender classification with SLBP and HOG featuresAnnalakshmi, M. / Roomi, S. Mohamed Mansoor / Naveedh, A. Sheik et al. | 2018
- 21
-
Improved security and routing path learning in MANETs using Beer–Quiche game theoritical model in cloud computingSathiya, D. / Gomathy, B. et al. | 2018
- 33
-
Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machineKumaresan, T. / Saravanakumar, S. / Balamurugan, R. et al. | 2017
- 47
-
An efficient categorization of liver cirrhosis using convolution neural networks for health informaticsSuganya, R. / Rajaram, S. et al. | 2017
- 57
-
Upkeeping secrecy in information extraction using ‘k’ division graph based postulatesKumar, B. Santhosh / Karthik, S. / Arunachalam, V. P. et al. | 2018
- 65
-
Revamping data access privacy preservation method against inside attacks in wireless sensor networksBabu, S. Sathees / Balasubadra, K. et al. | 2018
- 77
-
Software defect prediction techniques using metrics based on neural network classifierJayanthi, R. / Florence, Lilly et al. | 2018
- 89
-
Instance selection and feature extraction using cuttlefish optimization algorithm and principal component analysis using decision treeSuganthi, M. / Karunakaran, V. et al. | 2018
- 103
-
Multi-biometric authentication system using finger vein and iris in cloud computingIlankumaran, S. / Deisy, C. et al. | 2018
- 119
-
Association rules and deep learning for cryptographic algorithm in privacy preserving data miningRajesh, N. / Selvakumar, A. Arul Lawrence et al. | 2018
- 133
-
Prediction of software fault-prone classes using an unsupervised hybrid SOM algorithmViji, C. / Rajkumar, N. / Duraisamy, S. et al. | 2018
- 145
-
Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree constructionTamilselvi, T. / Tholkappia Arasu, G. et al. | 2018
- 157
-
Optimized neural network for spectrum prediction using genetic algorithm in cognitive radio networksSupraja, P. / Gayathri, V. M. / Pitchai, R. et al. | 2018
- 165
-
Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviationGayathri, V. M. / Nedunchelian, R. et al. | 2018
- 177
-
An effective pose invariant face recognition system with the aid of ABC optimized ANFISAnantha Padmanabhan, S. / Krishna Kumar, N. J. et al. | 2018
- 189
-
Performance evaluation of support vector machine classification approaches in data miningChidambaram, S. / Srinivasagan, K. G. et al. | 2018
- 197
-
Cluster based effective prediction approach for improving the curable rate of lymphatic filariasis affected patientsRajagopal, Renuka Devi / Murugan, Saravanan / Kottursamy, Kottilingam / Raju, V. et al. | 2018
- 207
-
Trust based resource selection with optimization techniqueSaravana Kumar, E. / Vengatesan, K. et al. | 2018
- 215
-
Prognostic evaluation of multimodal biometric traits recognition based human face, finger print and iris images using ensembled SVM classifierRaja, J. / Gunasekaran, K. / Pitchai, R. et al. | 2018
- 229
-
Enhanced continuous and discrete multi objective particle swarm optimization for text summarizationPriya, V. / Umamaheswari, K. et al. | 2018
- 241
-
Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networksRani, K. Sasi Kala / Deepa, S. N. et al. | 2017
- 255
-
Triple referee incentive mechanism for secure mobile adhoc networksVedhavathy, T. R. / Manikandan, M. S. K. et al. | 2018
- 265
-
An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc networkBharathisindhu, P. / Selva Brunda, S. et al. | 2018
- 277
-
Probabilistic classification techniques to perform geographical labeling of web objectsAnjanKumar, K. N. / Chitra, S. / Satish Kumar, T. et al. | 2018
- 287
-
Chaotic social spider algorithm for load balance aware task scheduling in cloud computingArul Xavier, V. M. / Annadurai, S. et al. | 2018
- 299
-
Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environmentJagadeesan, S. / Parthasarathy, V. et al. | 2018
- 311
-
High performance feature selection algorithms using filter method for cloud-based recommendation systemMuthusankar, D. / Kalaavathi, B. / Kaladevi, P. et al. | 2018
- 323
-
Hybrid routing algorithm for improving path selection in sustainable networkJayanthi, N. / Valluvan, K. R. et al. | 2018
- 335
-
Intelligent computation techniques for optimization of the shortest path in an asynchronous network-on-chipIlamathi, K. / Rangarajan, P. et al. | 2018
- 347
-
A cloud system model employing random space vector pulse width modulation for noise reduction in VSI fed induction motorMohan Das, R. / Chandira Sekaran, E. et al. | 2018
- 361
-
Turtle edge encoding and flood fill based image compression schemeArockia Raj, Y. / Alli, P. et al. | 2018
- 379
-
Linear and non-linear proximal support vector machine classifiers for wind speed predictionRanganayaki, V. / Deepa, S. N. et al. | 2018
- 391
-
A silhouette based novel algorithm for object detection and tracking using information fusion of video framesJiang, Xiaoping / Sun, Jing / Ding, Hao / Li, Chenghua et al. | 2018
- 399
-
A new GLoSM embedded virtual machine model for big data services in cloud storage systemsKalai Arasan, K. / AnandhaKumar, P. et al. | 2018
- 407
-
Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networksValliyammai, Chinnaiah / Bhuvaneswari, Anbalagan et al. | 2018
- 423
-
Detection of DoS attacks in cloud networks using intelligent rule based classification systemRajendran, Rakesh / Santhosh Kumar, S. V. N. / Palanichamy, Yogesh / Arputharaj, Kannan et al. | 2018
- 435
-
Hybrid metaheuristic algorithm for improving the efficiency of data clusteringMageshkumar, C. / Karthik, S. / Arunachalam, V. P. et al. | 2018
- 443
-
A novel SMLR-PSO model to estimate the chlorophyll content in the crops using hyperspectral satellite imagesNandibewoor, Archana / Hegadi, Ravindra et al. | 2018
- 451
-
Information security model of block chain based on intrusion sensing in the IoT environmentLi, Daming / Cai, Zhiming / Deng, Lianbing / Yao, Xiang / Wang, Harry Haoxiang et al. | 2018
- 469
-
Optimized energy efficient route assigning method using related node discovery algorithm in MANETAruna, R. / Subramanian, R. / Sengottuvelan, P. / Shanthini, J. et al. | 2018
- 481
-
Intelligent early warning model of early-stage overflow based on dynamic clusteringLiang, Haibo / Li, Guoliang / Liang, Wenlong et al. | 2017
- 493
-
Study of spectral reflectance reconstruction based on regularization matrix R methodWang, Ke / Wang, Huiqin / Wang, Zhan / Gu, Qinghua / Yin, Ying / Mao, Li / Lu, Ying et al. | 2017
- 503
-
Gesture recognition based on modified adaptive orthogonal matching pursuit algorithmLi, Bei / Sun, Ying / Li, Gongfa / Kong, Jianyi / Jiang, Guozhang / Jiang, Du / Tao, Bo / Xu, Shuang / Liu, Honghai et al. | 2017
- 513
-
An effective task scheduling algorithm based on dynamic energy management and efficient resource utilization in green cloud computing environmentLu, Yong / Sun, Na et al. | 2017
- 521
-
Design of intelligent carpooling program based on big data analysis and multi-information perceptionZhou, Guiliang / Lv, Mengru / Bao, Tianwen / Mao, Lina / Huang, Kai et al. | 2017
- 533
-
Application of low impact development technology in rainwater drainage system reconstruction projectHu, Pengbo / Ma, Yue / Xue, Huifeng / Zhang, Feng et al. | 2017
- 545
-
Quantum-inspired immune clonal algorithm for railway empty cars optimization based on revenue management and time efficiencyJing, Yun / Liu, Yingke / Bi, Mingkai et al. | 2017
- 555
-
High-speed vision extraction based on the CamShift algorithmZhang, ChunYu / Chen, Lei / Gou, Rui Bin et al. | 2017
- 565
-
Assessment of recommendation trust for access control in open networksZhao, Bin / Xiao, Chuangbai / Zhang, Yu / Zhai, Peng / Wang, Zhi et al. | 2018
- 573
-
Safety analysis of traffic flow characteristics of highway tunnel based on artificial intelligence flow net algorithmTian, Lingling / Jiang, Juncheng / Tian, L. et al. | 2018
- 583
-
Online energy-efficient deployment based on equivalent continuous DFS for large-scale web clusterXiong, Zhi / Guo, Ting / Xue, Zhongliang / Cai, Weihong / Cai, Lingru / Luo, Nanfu et al. | 2018
- 597
-
Maximum data collection rate routing for data gather trees with data aggregation in rechargeable wireless sensor networksLin, Haifeng / Bai, Di / Liu, Yunfei et al. | 2017
- 609
-
Evolutionary energy balanced ant colony algorithm based on WSNsChen, Yegang / Wang, Hongxiang et al. | 2017
- 623
-
Research on concurrency comparison modeling based on $$\pi $$ calculus in future computer technologyBu, Hao / zhu, Rong / Chen, Shihong / Tan, Xiaoqiong et al. | 2018
- 635
-
Implementation of flexible denim nickel copper rip stop textile antenna for medical applicationThangaselvi, E. / Meena alias Jeyanthi, K. et al. | 2018
- 647
-
Splicing image forgery identification based on artificial neural network approach and texture featuresAbrahim, Araz Rajab / Rahim, Mohd Shafry Mohd / Sulong, Ghazali Bin et al. | 2018
- 661
-
Energy and cluster based efficient routing for broadcasting in mobile ad hoc networksVenu, Sivakumar / Zubair Rahman, A. M. J. Md. et al. | 2018
- 673
-
An augmented approach for pseudo-free groups in smart cyber-physical systemKumar, M. V. Ranjith / Bhalaji, N. / Singh, Swathi et al. | 2018
- 693
-
DSM: a dynamic scheduling method for concurrent workflows in cloud environmentXue, Shengjun / Peng, Yue / Xu, Xiaolong / Zhang, Jie / Shen, Chao / Ruan, Feng et al. | 2017
- 707
-
Identification of PIWI-interacting RNA modules by weighted correlation network analysisLiu, Yajun / Zhang, Junying / Li, Aimin / Zhang, Yuanyuan / Li, Yaoyao / Yuan, Xiguo / He, Zhongzhen / Liu, Zhaowen / Tuo, Shouheng et al. | 2017
- 719
-
Locating the critical slip surface in a slope stability analysis by enhanced fireworks algorithmXiao, Zeyun / Tian, Bin / Lu, Xiaochun et al. | 2017
- 731
-
Scalable top-k keyword search in relational databasesXu, Yanwei et al. | 2017
- 749
-
The dynamic model of pulverized coal and waste plastic bonded together in flight combustion processLiu, Jihui / He, Zhijun / Zhang, Junhong et al. | 2017
- 759
-
Building the intelligent transportation systems based on the computation of driving velocity law of blasting fly-rockHuang, Yong-hui / Mao, Ze-ling / Zhang, Zhi-yu / Li, Xin-han / Yan, Lei et al. | 2017
- 769
-
Analysis on key dimension’s measurement error in high speed computingZhang, Jin / Wang, Shulin / Zhou, Yijun et al. | 2017
- 781
-
Fitting a cluster of line images under central catadioptric cameraDuan, Huixian / Wu, Yihong / Song, Lei / Wang, Jun / Liu, Na et al. | 2017
- 795
-
Residual Sarsa algorithm with function approximationQiming, Fu / Wen, Hu / Quan, Liu / Heng, Luo / Lingyao, Hu / Jianping, Chen et al. | 2017
- 809
-
Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithmWei, Ming / Sun, Bo / Sun, Rong et al. | 2017
- 819
-
More efficient and effective tricks for deep action recognitionLiu, Zheyuan / Zhang, Xiaoteng / Song, Lei / Ding, Zhengyan / Duan, Huixian et al. | 2017
- 827
-
Distributed SVM face recognition based on HadoopZhang, Boping et al. | 2017
- 835
-
Assembly sequence planning method based on particle swarm algorithmWu, Yu-jia / Cao, Yan / Wang, Qiang-feng et al. | 2017
- 847
-
Semantic query graph based SPARQL generation from natural language questionsSong, Shengli / Huang, Wen / Sun, Yulong et al. | 2017
- 859
-
Layered constraint united scheduling model of multi-line lockPan, Xiang et al. | 2017
- 871
-
Memory-aware TLP throttling and cache bypassing for GPUsZhang, Jun / He, Yanxiang / Shen, Fanfan / Li, Qing’an / Tan, Hai et al. | 2017
- 885
-
Resource recommendation via user tagging behavior analysisLiu, Haibo et al. | 2017
- 895
-
A new DOA estimation algorithm based on compressed sensingYong, Zhang / Li-Yi, Zhang / Jian-Feng, Han / Zhe, Ban / Yi, Yang et al. | 2018
- 905
-
On the use of chaotic iterations to design keyed hash functionLin, Zhuosheng / Guyeux, Christophe / Yu, Simin / Wang, Qianxue / Cai, Shuting et al. | 2017
- 921
-
Improvement of malware detection and classification using API call sequence alignment and visualizationKim, Hyunjoo / Kim, Jonghyun / Kim, Youngsoo / Kim, Ikkyun / Kim, Kuinam J. / Kim, Hyuncheol et al. | 2017
- 931
-
Design and implementation of OpenGL SC 2.0 rendering pipelineBaek, Nakhoon / Kim, Kuinam J. et al. | 2017
- 937
-
Providing profiling information for OpenGL ES application programsKim, Kuinam J. / Baek, Nakhoon et al. | 2017
- 943
-
Prototype implementation of the OpenGL ES 2.0 shading language offline compilerBaek, Nakhoon / Kim, Kuinam J. et al. | 2017
- 949
-
A survey of deep learning-based network anomaly detectionKwon, Donghwoon / Kim, Hyunjoo / Kim, Jinoh / Suh, Sang C. / Kim, Ikkyun / Kim, Kuinam J. et al. | 2017
- 963
-
Testing the consistency of business data objects using extended static testing of CRUD matricesBures, Miroslav / Cerny, Tomas / Frajtak, Karel / Ahmed, Bestoun S. et al. | 2017
- 977
-
Novel routing protocol scheme for real-time applications in mobile Ad Hoc networksLee, Dong Chun / Lee, Do Hyeon et al. | 2017
- 989
-
A real-time operating system supporting distributed shared memory for embedded control systemsTamura, Yuji / Doan, Truong Thi / Chiba, Takahiro / Yoo, Myungryun / Yokoyama, Takanori et al. | 2017
- 999
-
Customized video service system design and implementation: from taste to image-based consuming methodPark, Hyojin / Yang, Jinhong / Kim, Hyuncheol / Choi, Jun Kyun et al. | 2017
- 1011
-
B+-tree construction on massive data with HadoopNgu, Huynh Cong Viet / Huh, Jun-Ho et al. | 2017
- 1023
-
Priority-based scheduling using best channel in 6TiSCH networksLee, Tsung-Han / Chang, Lin-Huang / Liu, Yan-Wei / Liaw, Jiun-Jian / Chu, Hung-Chi et al. | 2017
- 1035
-
Optimized state update for mobile games in cloud networksKim, Hye-Young / Kim, Kuinam J. et al. | 2017
- 1043
-
An efficient scheduling multimedia transcoding method for DASH streaming in cloud environmentVan Ma, Linh / Park, Jaehyung / Nam, Jiseung / Jang, Jonghyun / Kim, Jinsul et al. | 2017
- 1055
-
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis techniqueCam, Nguyen Tan / Pham, Van-Hau / Nguyen, Tuan et al. | 2017
- 1065
-
Collaborative data analytics for smart buildings: opportunities and modelsLazarova-Molnar, Sanja / Mohamed, Nader et al. | 2017
- 1079
-
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysisTuan, Ly Hoang / Cam, Nguyen Tan / Pham, Van-Hau et al. | 2017
- 1087
-
W-Scheduler: whale optimization for task scheduling in cloud computingSreenu, Karnam / Sreelatha, M. et al. | 2017
- 1099
-
Dragonfly optimization and constraint measure-based load balancing in cloud computingPolepally, Vijayakumar / Shahu Chatrapati, K. et al. | 2017
- 1113
-
Secure provable data possession scheme with replication support in the cloud using TweaksAli, S. Ahamed / Ramakrishnan, M. et al. | 2017
- 1125
-
Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home systemLiu, Hua / Chen, Guo / Huang, Yanting et al. | 2017
- 1137
-
An efficient personalized trust based hybrid recommendation (TBHR) strategy for e-learning system in cloud computingBhaskaran, S. / Santhi, B. et al. | 2017
- 1151
-
A new recommendation algorithm combined with spectral clustering and transfer learningLi, Xiang / Wang, Zhijian et al. | 2017
- 1169
-
Accurate detection of user interest data in cloud computing environmentYu, Qiang / Liu, Qi et al. | 2017
- 1179
-
A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computingThillaiarasu, N. / ChenthurPandian, S. et al. | 2017
- 1189
-
Cluster and cloud computing framework for scientific metrology in flow controlWang, Yumin / Li, Jiangbo / Wang, Harry Haoxiang et al. | 2017
- 1199
-
Classification of sentence level sentiment analysis using cloud machine learning techniquesArulmurugan, R. / Sabarmathi, K. R. / Anandakumar, H. et al. | 2017
- 1211
-
Histogram difference with Fuzzy rule base modeling for gradual shot boundary detection in video cloud applicationsKethsy Prabavathy, A. / Devi Shree, J. et al. | 2017
- 1219
-
A FCM cluster: cloud networking model for intelligent transportation in the city of MacauCai, Zhiming / Deng, Lianbing / Li, Daming / Yao, Xiang / Cox, David / Wang, Haoxiang et al. | 2017
- 1229
-
Research on abnormal data detection method of web browser in cloud computing environmentDuan, Xindong et al. | 2017
- 1239
-
Improved continuous query plan with cluster weighted dominant querying in synthetic datasetsMadhankumar, M. / Suresh Gnana Dhas, C. et al. | 2017
- 1247
-
LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environmentDaniel, Esther / Vasanthi, N. A. et al. | 2017
- 1259
-
Map-Reduce framework based cluster architecture for academic student’s performance prediction using cumulative dragonfly based neural networkVeeraManickam, M. R. M. / Mohanapriya, M. / Pandey, Bishwajeet K. / Akhade, Sushma / Kale, S. A. / Patil, Reshma / Vigneshwar, M. et al. | 2018
- 1277
-
Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloudGeorge, Ashok / Sumathi, A. et al. | 2018
- 1289
-
FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale imagesKumar, S. Vijaya / Nagaraju, C. et al. | 2018
- 1313
-
Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active TrustMehetre, Deepak C. / Roslin, S. Emalda / Wagh, Sanjeev J. et al. | 2018
- 1329
-
Cluster-based distributed architecture for prediction of student’s performance in higher educationRamanathan, L. / Parthasarathy, G. / Vijayakumar, K. / Lakshmanan, L. / Ramani, S. et al. | 2018
- 1345
-
Cluster based-image descriptors and fractional hybrid optimization for medical image retrievalYadav, Poonam et al. | 2018
- 1361
-
Implementing self adaptiveness in whale optimization for cluster head section in Internet of ThingsReddy, M. Praveen Kumar / Babu, M. Rajasekhara et al. | 2018
- 1373
-
Minimizing movement for network connectivity in mobile sensor networks: an adaptive approachJagtap, Arvind Madhukar / Gomathi, N. et al. | 2018
- 1385
-
Design and development of exponential lion algorithm for optimal allocation of cluster resources in cloudDevagnanam, J. / Elango, N. M. et al. | 2018
- 1401
-
FDLA: Fractional Dragonfly based Load balancing Algorithm in cluster cloud modelAshok Kumar, C. / Vimala, R. / Aravind Britto, K. R. / Sathya Devi, S. et al. | 2018
- 1415
-
Lossless and robust privacy preservation of association rules in data sanitizationNavale, Geeta S. / Mali, Suresh N. et al. | 2018
- 1429
-
Clustered entropy computing: a holoentropy based encoding scheme for high efficient computing systemsMunagala, Venkatesh / Satya Prasad, K. et al. | 2018
- 1443
-
Research on coordinated scheduling of multiple systems and single jobs based on improved particle swarm optimizationLei, Dingyou / Zhang, Peng / Zhang, Yinggui / Xia, Yangkun / Zhao, Shuo et al. | 2018
- 1459
-
Depth from defocus (DFD) based on VFISTA optimization algorithm in micro/nanometer visionLiu, Yongjun / Wei, Yangjie / Wang, Yi et al. | 2018
- 1469
-
Parallel image search application based on online hashing hierarchical rankingLi, Xiaofei / He, Di / Li, Jun-yi et al. | 2018
- 1479
-
Research on the thermal network optimization of wet axle based on high performance computing and wireless data transmissionLiu, Sheng / Sun, Dongye / Wu, Ensi / Qin, Datong et al. | 2018
- 1495
-
Semantic feature hierarchical clustering algorithm based on improved regional merging strategyyu-feng, Yao et al. | 2018
- 1505
-
Research on the single image super-resolution method based on sparse Bayesian estimationYang, Yong-qiang et al. | 2018
- 1515
-
A novel improved deep convolutional neural network model for medical image fusionXia, Kai-jian / Yin, Hong-sheng / Wang, Jiang-qiang et al. | 2018
- 1529
-
Face recognition algorithm based on wavelet transform and local linear embeddingZhou, Yan / Wang, Yu / Wang, Xu-hui et al. | 2018
- 1541
-
Dynamic data driven big data cooperative control scheme with virtual visualization for mobile multimedia communicationYin, Xiang-dong et al. | 2018
- 1549
-
Cause-chain analysis of coal-mine gas explosion accident based on Bayesian network modelLi, Xiangong / Wang, Xufeng / Fang, Yu et al. | 2018
- 1559
-
Automatic segmentation of coronary lumen based on minimum path and image fusion from cardiac computed tomography imagesLiu, Liu / Xu, Jin / Liu, Zheng et al. | 2018
- 1569
-
Application of computerized numerical modeling in multi-state wet wheel hub heat simulationsLiu, Sheng / Sun, Dongye / Wu, Ensi / Luo, Yong / Qin, Datong et al. | 2018
- 1581
-
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple partiesLi, Ye / Jiang, Zoe L. / Yao, Lin / Wang, Xuan / Yiu, S. M. / Huang, Zhengan et al. | 2017
- 1595
-
An improved anonymous authentication scheme for distributed mobile cloud computing servicesChaudhry, Shehzad Ashraf / Kim, I Luk / Rho, Seungmin / Farash, Mohammad Sabzinejad / Shon, Taeshik et al. | 2017
- 1611
-
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud servicesElmisery, Ahmed M. / Rho, Seungmin / Aborizka, Mohamed et al. | 2017
- 1639
-
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environmentManasrah, Ahmad M. / Aldomi, Ala’a / Gupta, B. B. et al. | 2017
- 1655
-
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social networkGao, Chong-zhi / Cheng, Qiong / Li, Xuan / Xia, Shi-bing et al. | 2018
- 1665
-
A bio-inspired leader election protocol for cognitive radio networksMurmu, Mahendra Kumar / Singh, Awadhesh Kumar et al. | 2018
- 1679
-
A localization and tracking scheme for target gangs based on big data of Wi-Fi locationsZhao, Fan / Shi, Wenqi / Gan, Yong / Peng, Ziru / Luo, Xiangyang et al. | 2018
- 1691
-
Online handwritten signature verification based on the most stable feature and partitionYang, Li / Jin, Xiaoyan / Jiang, Qi et al. | 2018
- 1703
-
Anonymous and formally verified dual signature based online e-voting protocolSaqib, Malik Najmus / Kiani, Junaid / Shahzad, Basit / Anjum, Adeel / Malik, Saif ur Rehman / Ahmad, Naveed / Khan, Atta ur Rehman et al. | 2018
- 1717
-
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvementJing, Zhengjun / Gu, Chunsheng / Yu, Zhimin / Shi, Peizhong / Gao, Chongzhi et al. | 2018
- 1729
-
Anomaly detection model based on data stream clusteringYin, Chunyong / Zhang, Sun / Yin, Zhichao / Wang, Jin et al. | 2017
- 1739
-
A distributed IDS architecture model for Smart Home systemsGajewski, Mariusz / Batalla, Jordi Mongay / Mastorakis, George / Mavromoustakis, Constandinos X. et al. | 2017
- 1751
-
A rational data delivery framework for disaster-inspired internet of nano-things (IoNT) in practiceAl-Turjman, Fadi et al. | 2017
- 1765
-
A performance comparison of linux containers and virtual machines using Docker and KVMChae, MinSu / Lee, HwaMin / Lee, Kiyeol et al. | 2017
- 1777
-
The resource running time manager for integrated environmentJung, Daeyong / Jeong, Heeseok / Kim, Jaesung / Lee, Daewon / Kim, Myungil et al. | 2017
- 1787
-
A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNsWang, Jin / Ju, Chunwei / Kim, Hye-jin / Sherratt, R. Simon / Lee, Sungyoung et al. | 2017
- 1797
-
Spatial task management method for location privacy aware crowdsourcingLi, Yan / Yi, Gangman / Shin, Byeong-Seok et al. | 2017
- 1805
-
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environmentRen, Yongjun / Wang, Jin / Feng, Xiujuan / Younn, Geumran / Kim, Jeong-Uk et al. | 2018
- 1815
-
Design and implementation of initial OpenSHMEM on PCIe NTB based cloud computingShim, Cheol / Cha, Kwang-ho / Choi, Min et al. | 2018
- 1827
-
Fast attack detection system using log analysis and attack tree generationKim, Duhoe / Kim, Yong-Hyun / Shin, Dongil / Shin, Dongkyoo et al. | 2018
- 1837
-
Big data and rule-based recommendation system in Internet of ThingsJeong, Hanjo / Park, Byeonghwa / Park, Minwoo / Kim, Ki-Bong / Choi, Kiseok et al. | 2017
- 1847
-
Development of healthcare service model using physical information data based on cluster sensing technologyKim, Bong-Hyun / Oh, Jai-Woo et al. | 2017
- 1861
-
Visualization of security event logs across multiple networks and its application to a CSOCSong, Boyeon / Choi, Jangwon / Choi, Sang-Soo / Song, Jungsuk et al. | 2017
- 1873
-
An empirical study on the influential factors affecting continuous usage of mobile cloud servicePark, Seong-Taek / Oh, Myeong-Ryoon et al. | 2017
- 1889
-
The supporting system for disabled person with the artificial hand controlled by muscle sensorJeong, Seungdo / Cho, Jungwon et al. | 2018
- 1899
-
Exposed body component-based harmful image detection in ubiquitous sensor dataJang, Seok-Woo / Jung, Myunghee et al. | 2018
- 1911
-
Word recommendation for English composition using big corpus data processingLee, Keon Myung / Han, Chan-Sik / Kim, Kwang-Il / Lee, Sang Ho et al. | 2018
- 1925
-
Chatbot-based heathcare service with a knowledge base for cloud computingChung, Kyungyong / Park, Roy C. et al. | 2018
- 1939
-
Research trend analysis on convergence and joint research of Korea using scientific papersYoo, Suhyeon / Kwon, O Young / Jeong, Dae-hyun et al. | 2017
- 1949
-
Development of a medical big-data mining process using topic modelingSong, Chang-Woo / Jung, Hoill / Chung, Kyungyong et al. | 2017
- 1959
-
Bucket-size balancing locality sensitive hashing using the map reduce paradigmLee, Kyung Mi / Jeong, Yoon-Su / Lee, Sang Ho / Lee, Keon Myung et al. | 2017
- 1973
-
The study on how to remove the shadow area for WSN based indoor disaster monitoring systemJung, Gang Hee / Park, Yoon Young / Kim, Se Yeob / Cho, Young Wook et al. | 2017
- 1985
-
Verifying a secure authentication protocol for IoT medical devicesBae, Woo-Sik et al. | 2017
- 1991
-
A study on secure user authentication and authorization in OAuth protocolChae, Cheol-Joo / Kim, Ki-Bong / Cho, Han-Jin et al. | 2017
- 2001
-
Cloud based u-healthcare network with QoS guarantee for mobile health serviceChung, Kyungyong / Park, Roy C. et al. | 2017
- 2017
-
Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authenticationKang, Hyeok / Lee, Keun-Ho / Kim, Gui-Jung et al. | 2017
- 2027
-
A mutual refinement technique for big data retrieval using hash tag graphPrasanth, T. / Gunasekaran, M. et al. | 2017
- 2039
-
Modeling and analysis for stock return movements along with exchange rates and interest rates in Markov regime-switching modelsKim, Suyi / Kim, So-Yeun / Choi, Kyungmee et al. | 2017
- 2049
-
A unified framework of trust prediction based on message passingOh, Hyun-Kyo / Kim, Jin-Woo / Kim, Sang-Wook / Lee, Kichun et al. | 2018
- 2063
-
Scalable distributed data cube computation for large-scale multidimensional data analysis on a Spark clusterLee, Suan / Kang, Seok / Kim, Jinho / Yu, Eun Jung et al. | 2018
- 2089
-
Who is answering whom? Finding “Reply-To” relations in group chats with deep bidirectional LSTM networksGuo, Gaoyang / Wang, Chaokun / Chen, Jun / Ge, Pengcheng / Chen, Weijun et al. | 2018
- 2101
-
Evaluation of software quality-in-use attributes based on analysis network processKim, Seung-Hee / Kim, Woo-Je et al. | 2018
- 2115
-
Analyzing and visualizing comprehensive and personalized online product reviewsKim, Jooyoung / Kim, Dongsoo et al. | 2018
- 2129
-
PRODA: improving parallel programs on GPUs through dependency analysisWei, Xiong / Hu, Ming / Peng, Tao / Jiang, Minghua / Wang, Zhiying / Qin, Xiao et al. | 2017
- 2145
-
Moving average multi directional local features for speaker recognitionMahmood, Awais / Muhammad, Ghulam / Alsulaiman, Mansour / Dhahri, Habib / Othman, Esam M. Asem / Faisal, Mohammed et al. | 2018
- 2159
-
Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanismShe, Wei / Li, Dingfang / Xia, Yongbo / Tian, Shasha et al. | 2018
- 2169
-
Optimized traffic control and data processing using IoTKuppusamy, P. / Kalpana, R. / Venkateswara Rao, P. V. et al. | 2018
- 2179
-
Task scheduling in a cloud computing environment using HGPSO algorithmSenthil Kumar, A. M. / Venkatesan, M. et al. | 2018
- 2187
-
Dynamic data-driven learning for self-healing avionicsImai, Shigeru / Chen, Sida / Zhu, Wennan / Varela, Carlos A. et al. | 2017
- 2211
-
Efficient parallel implementation of DDDAS inference using an ensemble Kalman filter with shrinkage covariance matrix estimationNino-Ruiz, Elias D. / Sandu, Adrian et al. | 2017
- 2223
-
Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platformWang, Kewen / Khan, Mohammad Maifi Hasan / Nguyen, Nhan / Gokhale, Swapna et al. | 2017
- 2239
-
Transit-hub: a smart public transportation decision support system with multi-timescale analytical servicesSun, Fangzhou / Dubey, Abhishek / White, Jules / Gokhale, Aniruddha et al. | 2018
- 2255
-
A simulation analysis method based on PSO-RBF model and its applicationFei, Xi / Youfu, Sun / Xuejun, Ruan et al. | 2018
- 2263
-
Apriori semantic processing orienting at the business English parallel corpus characteristics in business contractXin, Lu et al. | 2018
- 2273
-
Anti load disturbance method for AC servo motor power systemLv, Haoliang / Zhou, Xiaojun et al. | 2018
- 2285
-
Intelligent distribution characteristic analysis of heavy metals in reservoir sedimentsMin, Wang / Wen, Cheng / Jie-Hui, Ren / Ting, Meng / Tian, Wan et al. | 2018
- 2293
-
Distortion less secret image sharing scheme for Internet of Things systemLi, Li / Hossain, M. Shamim / El-Latif, Ahmed A. Abd / Alhamid, M. F. et al. | 2017
- 2309
-
An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technologyAlmogren, Ahmad et al. | 2018
- 2317
-
A cloud-based virtual caregiver for elderly people in a cyber physical IoT systemRahman, Md. Abdur / Hossain, M. Shamim et al. | 2018
- 2331
-
Performance evaluation of revised virtual resources allocation scheme in network function virtualization (NFV) networksKim, Hyuncheol et al. | 2018
- 2341
-
Design of network threat detection and classification based on machine learning on cloud computingKim, Hyunjoo / Kim, Jonghyun / Kim, Youngsoo / Kim, Ikkyun / Kim, Kuinam J. et al. | 2018
- 2351
-
The study on the application of virtual reality in adapted physical educationKang, Sunyoung / Kang, Seungae et al. | 2018
- 2357
-
Low-quality multivariate spatio-temporal serial data preprocessingYu, Tao / Li, Le / Chen, Lajiao / Song, Weijing et al. | 2017
- 2371
-
Performance optimization and evaluation for parallel processing of big data in earth system modelsWang, Yuzhu / Hao, Huiqun / Zhang, Junqiang / Jiang, Jinrong / He, Juanxiong / Ma, Yan et al. | 2017
- 2383
-
A distributed incremental information acquisition model for large-scale text dataSun, Shengtao / Gong, Jibing / Zomaya, Albert Y. / Wu, Aizhi et al. | 2017
- 2395
-
A novel disk I/O scheduling framework of virtualized storage systemLi, Dingding / Dong, Mianxiong / Tang, Yong / Ota, Kaoru et al. | 2018
- 2407
-
Whole procedure heterogeneous multiprocessors low-power optimization at algorithm-levelWang, Zhuowei / Xiong, Naixue / Wang, Hao / Cheng, Lianglun / Zhao, Wuqing et al. | 2018
- 2425
-
Score level multibiometrics fusion approach for healthcareEl-Latif, Ahmed A. Abd / Hossain, M. Shamim / Wang, Ning et al. | 2017
- 2437
-
A parameter based growing ensemble of self-organizing maps for outlier detection in healthcareElmougy, Samir / Hossain, M. Shamim / Tolba, Ahmed S. / Alhamid, Mohammed F. / Muhammad, Ghulam et al. | 2017
- 2461
-
MCCFG: an MOF-based multiple condition control flow graph for automatic test case generationSon, Hyun Seung / Park, Young B. / Kim, R. Young Chul et al. | 2016
- 2471
-
An iterative sampling method for online aggregationZhang, Zhiqiang / Hu, Jianghua / Xie, Xiaoqin / Pan, Haiwei / Feng, Xiaoning et al. | 2017
- 2485
-
Mirrored and hybrid disk arrays and their reliabilityThomasian, Alexander et al. | 2018
- 2495
-
Iot based real time trafic control using cloud computingVardhana, M. / Arunkumar, N. / Abdulhay, Enas / Vishnuprasad, P. V. et al. | 2018
- 2505
-
An efficient DDoS detection based on SU-Genetic feature selectionWang, Chundong / Yao, Honglei / Liu, Zheli et al. | 2018
- 2517
-
IoT based fall detection and ambient assisted system for the elderlyChandra, I. / Sivakumar, N. / Gokulnath, Chandra Babu / Parthasarathy, P. et al. | 2018
- 2527
-
On the role of message broker middleware for many-task computing on a big-data platformNguyen, Cao Ngoc / Lee, Jaehwan / Hwang, Soonwook / Kim, Jik-Soo et al. | 2018
- 2541
-
Correction to: Runtime self-monitoring approach of business process compliance in cloud environmentsBarnawi, Ahmed / Awad, Ahmed / Elgammal, Amal / Shawi, Radwa El / Almalaise, Abdullah / Sakr, Sherif et al. | 2018