Nscale: an efficient RAID-6 online scaling via optimizing data migration Ping XieZhu YuanYu Hu OriginalPaper 14 August 2022 Pages: 2383 - 2403
Godiva: green on-chip interconnection for DNNs Arghavan AsadFarah Mohammadi OriginalPaper 16 August 2022 Pages: 2404 - 2430
Intelligent quotient estimation from MRI images using optimal light gradient boosting machine P. ThilakavathyB. Diwan OriginalPaper 16 August 2022 Pages: 2431 - 2450
A dynamic energy conservation scheme with dual-rate adjustment and semi-sleep mode in cloud system Yu CuiYang ZhangShunfu Jin OriginalPaper 16 August 2022 Pages: 2451 - 2487
A novel approach towards high-performance image compression using multilevel wavelet transformation for heterogeneous datasets V. GowthamiK. Bhoopathy BaganS. Ewins Pon Pushpa OriginalPaper 16 August 2022 Pages: 2488 - 2518
Risk-Averse Influence Maximization Saeed NasehiMoghaddamMohammad FathianBabak Amiri OriginalPaper 16 August 2022 Pages: 2519 - 2569
Certificateless network coding scheme from certificateless public auditing protocol Genqing BianMingxuan SongBilin Shao OriginalPaper Open access 20 August 2022 Pages: 2570 - 2602
Fault tolerance and quality of service aware virtual machine scheduling algorithm in cloud data centers Heyang XuSen XuNaixuan Guo OriginalPaper 22 August 2022 Pages: 2603 - 2625
Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks Mohammed AlbishariMingchu LiEsmail Almosharea OriginalPaper 22 August 2022 Pages: 2626 - 2653
A performance evaluation of modular functions and state databases for Hyperledger Fabric blockchain systems Yean-Fu WenChen-Min Hsu OriginalPaper 22 August 2022 Pages: 2654 - 2690
A grey wolf optimizer-based chaotic gravitational search algorithm for global optimization Xianrui YuQiuhong ZhaoTongyu Wang OriginalPaper 22 August 2022 Pages: 2691 - 2739
Spanning simple path inside a simple polygon Abdolah SepahvandMohammadreza Razzazi OriginalPaper 22 August 2022 Pages: 2740 - 2766
Anti-aliasing convolution neural network of finger vein recognition for virtual reality (VR) human–robot equipment of metaverse Nghi C. TranJian‑Hong WangJia-Ching Wang OriginalPaper 22 August 2022 Pages: 2767 - 2782
Characterization of interval graphs that are paired 2-disjoint path coverable Jung-Heum ParkHyeong-Seok Lim OriginalPaper 22 August 2022 Pages: 2783 - 2800
ReNo: novel switch architecture for reliability improvement of NoCs Zahra ShirmohammadiYassin AllivandSanaz Kazemi Abharian OriginalPaper 23 August 2022 Pages: 2801 - 2818
DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning Zizhen LiuSi ChenXiaowei Li OriginalPaper 24 August 2022 Pages: 2819 - 2849
How much BiGAN and CycleGAN-learned hidden features are effective for COVID-19 detection from CT images? A comparative study Sima Sarv AhrabiAlireza MomenzadehLorenzo Piazzo OriginalPaper Open access 26 August 2022 Pages: 2850 - 2881
Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications G. K. RageshAjay Kumar OriginalPaper 26 August 2022 Pages: 2882 - 2909
Leveraging temporal-aware fine-grained features for robust multiple object tracking Han WuJiahao NieMingyu Gao OriginalPaper 26 August 2022 Pages: 2910 - 2931
ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems Ling XiaoBeiji ZouFanbo Nie OriginalPaper 29 August 2022 Pages: 2932 - 2960
Wasserstein generative adversarial networks for modeling marked events S. Haleh S. DizajiSaeid PashazadehJavad Musevi Niya OriginalPaper 29 August 2022 Pages: 2961 - 2983
Design of an efficient QCA-based median filter with energy dissipation analysis Vasudeva BevaraSyed AlihussainPradyut K. Sanki OriginalPaper 29 August 2022 Pages: 2984 - 3004
Privacy-preserving edge computing offloading scheme based on whale optimization algorithm Zhenpeng LiuJingyi WangJianhang Wei OriginalPaper Open access 29 August 2022 Pages: 3005 - 3023
Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata P. RajasekarH. MangalamC. S. Subash Kumar OriginalPaper 29 August 2022 Pages: 3024 - 3054
A pricing approach for optimal use of computing resources in cloud federation Bijan Pourghorbani DinachaliSam JabbehdariHamid Haj Seyyed Javadi OriginalPaper 29 August 2022 Pages: 3055 - 3094
Int-Monitor: a model triggered hardware trojan in deep learning accelerators Peng LiRui Hou OriginalPaper 29 August 2022 Pages: 3095 - 3111
Blockchain technology applications in the health domain: a multivocal literature review Merve Vildan BaysalÖzden Özcan-TopAysu Betin-Can OriginalPaper 30 August 2022 Pages: 3112 - 3156
A new improved maximal relevance and minimal redundancy method based on feature subset Shanshan XieYan ZhangJiang Liu OriginalPaper Open access 30 August 2022 Pages: 3157 - 3180
HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment P. Hari KumarG. S. AnandhaMala OriginalPaper 31 August 2022 Pages: 3181 - 3209
A power line loss analysis method based on boost clustering Junde ChenAdnan ZebDefu Zhang OriginalPaper 01 September 2022 Pages: 3210 - 3226
Noise-insensitive image representation via multiple extended LDB and class supervised intelligent coordination feature selection Xi ZhangYongxiong LiuTao Gao OriginalPaper 01 September 2022 Pages: 3227 - 3256
Star-structure connectivity of folded hypercubes and augmented cubes Lina BaHailun WuHeping Zhang OriginalPaper 01 September 2022 Pages: 3257 - 3276
An effective hybrid genetic algorithm and tabu search for maximizing network lifetime using coverage sets scheduling in wireless sensor networks Nemat allah MottakiHomayun MotameniHosein Mohamadi OriginalPaper 01 September 2022 Pages: 3277 - 3297
VALKYRIE: a suite of topology-aware clustering approaches for cloud-based virtual network services Imane El MansoumLaaziz LahlouClaes Edstrom OriginalPaper 02 September 2022 Pages: 3298 - 3328
Community detection in complex networks using stacked autoencoders and crow search algorithm Sanjay KumarAbhishek MallikSandeep Singh Sengar OriginalPaper 02 September 2022 Pages: 3329 - 3356
Hardware-accuracy trade-offs for error-resilient applications using an ultra-efficient hybrid approximate multiplier Sudeh Shirkavand Saleh AbadMohammad Hossein Moaiyeri OriginalPaper 03 September 2022 Pages: 3357 - 3372
Exploring interval implicitization in real-valued time series classification and its applications Zhifu TaoBingxin YaoJiaming Zhu OriginalPaper 03 September 2022 Pages: 3373 - 3391
An improved anomaly detection model for IoT security using decision tree and gradient boosting Maryam DouibaSaid BenkiraneMourade Azrour OriginalPaper 03 September 2022 Pages: 3392 - 3411
A multistep forecasting method for online car-hailing demand based on wavelet decomposition and deep Gaussian process regression Wenbing ChangRuowen LiShenghan Zhou OriginalPaper 03 September 2022 Pages: 3412 - 3436
Multivariate workload and resource prediction in cloud computing using CNN and GRU by attention mechanism Javad DoganiFarshad KhunjushMehdi Seydali OriginalPaper 04 September 2022 Pages: 3437 - 3470
Distribution of DDS-cerberus authenticated facial recognition streams Andrew T. ParkNathaniel PeckWayne C. Henry OriginalPaper Open access 04 September 2022 Pages: 3471 - 3488
Instance segmentation-based review photo validation scheme Sungwoo ParkJaeuk MoonEenjun Hwang OriginalPaper 05 September 2022 Pages: 3489 - 3510
Ladybug Beetle Optimization algorithm: application for real-world problems Saadat SafiriAmirhossein Nikoofard OriginalPaper 06 September 2022 Pages: 3511 - 3560