default search action
Journal of Database Management, Volume 34
Volume 34, Number 1, 2023
- Prajwal Eachempati, Praveen Ranjan Srivastava:
Prediction of the Stock Market From Linguistic Phrases: A Deep Neural Network Approach. 1-22 - Haiyan Wang, Jun Hong, Kaixiang You, Jian Luo:
Multi-Feature Video Recommendation Based on Hypergraph Convolution for Mobile Edge Environment. 1-18 - Taiyu Ban, Xiangyu Wang, Xin Wang, Jiarun Zhu, Lvzhou Chen, Yizhan Fan:
Knowledge Extraction From National Standards for Natural Resources: A Method for Multi-Domain Texts. 1-23 - Yanwei Zheng, Zichun Zhang, Qi Luo, Zhenzhen Xie, Dongxiao Yu:
A Truss-Based Framework for Graph Similarity Computation. 1-18 - Jun Lu, Wenhe Xu, Kailong Zhou, Zhicong Guo:
Frequent Itemset Mining Algorithm Based on Linear Table. 1-21 - Nan Feng, Yuguang Wang, Zhiguo Chen, Tingting Song:
The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis. 1-23 - Gang Peng, Rahul Bhaskar:
Artificial Intelligence and Machine Learning for Job Automation: A Review and Integration. 1-12 - Fangwan Huang, Shijie Zhuang, Zhiyong Yu, Yuzhong Chen, Kun Guo:
Adaptive Modularized Recurrent Neural Networks for Electric Load Forecasting. 1-18 - Jeng-Shyang Pan, Pei Hu, Tien-Szu Pan, Shu-Chuan Chu:
Improved Equilibrium Optimizer for Short-Term Traffic Flow Prediction. 1-20 - Yifei Xue, Jian Wang, Weipeng Jing:
An Enhanced Energy-Efficient Web Service Composition Algorithm Based on the Firefly Algorithm. 1-19 - Junhua Fang, Zonglei Zhang:
A Distributed Spatial Index With High Update Efficiency for Location-Based Real-Time Services. 1-28 - Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu:
Selecting Rotation Constants on SIMON-Type Ciphers. 1-23 - Junfeng Man, Longqian Zhao, Bowen Xu, Cheng Peng, Junjie Jiang, Yi Liu:
Computation Offloading Method for Large-Scale Factory Access in Edge-Edge Collaboration Mode. 1-29 - Huosong Xia, Wuyue An, Zuopeng Justin Zhang:
Credit Risk Models for Financial Fraud Detection: A New Outlier Feature Analysis Method of XGBoost With SMOTE. 1-20 - Harish Kumar, Rameshwar Shivadas Ture, M. P. Gupta, R. S. Sharma:
Technological Solutions for Digital Identity: A Computer Vision-Based Approach to Mitigate Imaging Errors. 1-17 - Gongqing Wu, Zhuochun Miao, Shengjie Hu, Yinghuan Wang, Zan Zhang, Xianyu Bao:
Semi-Supervised Event Extraction Incorporated With Topic Event Frame. 1-26 - Rankang Li, Shanxiong Chen, Fujia Zhao, Xiaogang Qiu:
Text Detection Model for Historical Documents Using CNN and MSER. 1-23 - Pranay Sindhu, Kumkum Bharti:
The Effects of Atmospherics and Influencers on Purchase Intention in Social Commerce. 1-23 - Mehmet Demir, Ozgur Turetken, Alexander Ferworn, Mehdi Kargar:
A Blockchain-Based System for Aid Delivery: Concept Development, Data Modeling, and Validation. 1-35
Volume 34, Number 2, 2023
- Monu Singh, Amit Kumar Singh:
Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE. 1-20 - R. Gurunath, Debabrata Samanta:
A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography. 1-22 - Farhan Ullah, Xiaochun Cheng, Leonardo Mostarda, Sohail Jabbar:
Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis. 1-26 - Maryam Bukhari, Sadaf Yasmin, Saira Andleeb Gillani, Muazzam Maqsood, Seungmin Rho, Sang Soo Yeo:
Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks. 1-25 - Erukala Suresh Babu, Bhukya Padma, Soumya Ranjan Nayak, Nazeeruddin Mohammad, Uttam Ghosh:
Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything. 1-33 - Parul Lakhotia, Rinky Dwivedi, Deepak Kumar Sharma, Nonita Sharma:
Intrusion Detection System for IoE-Based Medical Networks. 1-18
Volume 34, Number 3, 2023
- Yalan Feng, Huabin Wang, Dai-lei Zhang, Jiahao Li, Liang Tao:
One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding. 1-18 - Wenjie Liu, Sai Chen, Guoyao Huang, Lingfeng Lu, Huakang Li, Guozi Sun:
Incorporating I Ching Knowledge Into Prediction Task via Data Mining. 1-16 - Peng Chen, Shuang Liu, Niko Lukac:
CNN-Based Vessel Meeting Knowledge Discovery From AIS Vessel Trajectories. 1-38 - Yikai Liu, Fenglan Ju, Qunwei Zhang, Meng Zhang, Zezhong Ma, Mingduo Li, Aimin Yang, Fengchun Liu:
Overview of Internet of Medical Things Security Based on Blockchain Access Control. 1-20 - Liqun Liu, Renyuan Gu, Jiuyuan Huo, Yubo Zhou:
Origin-Oriented Shuffled Frog Leaping Vehicle Routing Multiobjective Optimization Algorithm. 1-24 - Zhihua Zhong, Guanlin Chen, Rui Wang, Yuchi Huo:
Neural Super-Resolution in Real-Time Rendering Using Auxiliary Feature Enhancement. 1-13 - Yongdong Li, Liang Qu, Guiyan Cai, Guoan Cheng, Long Qian, Yuling Dou, Fengqin Yao, Shengke Wang:
Video Object Counting With Scene-Aware Multi-Object Tracking. 1-13 - Tian Zhang:
Target Detection for Motion Images Using the Improved YOLO Algorithm. 1-17 - Min Li, Huabin Wang, Leqian Li, Dai-lei Zhang, Liang Tao:
Finger Vein Recognition Based on a Histogram of Competitive Gabor Directional Binary Statistics. 1-19 - Hongjie Wan, Junchen Ma, Qiumei Yu, Guozi Sun, Hansen He, Huakang Li:
Modeling and Optimization of Multi-Model Waste Vehicle Routing Problem Based on the Time Window. 1-16 - Hui Li, Yifei Zhu:
Privacy-Preserving Contact Tracing for Curbing the Spread of Infectious Disease. 1-17 - Xintong Song, Donghua Yang, Yutong Wang, Hongzhi Wang, Jinbao Wang, Bo Zheng:
TransFusion Model Fusion Mechanism Based on Transformer for Traffic Flow Prediction. 1-14 - Haiyi Liu, Ying Jiang, Yongquan Chen:
Completion of Parallel app Software User Operation Sequences Based on Temporal Context. 1-17 - Feng Ye, Xinjun Sheng, Nadia Nedjah, Jun Sun, Peng Zhang:
A Benchmark for Performance Evaluation of a Multi-Model Database vs. Polyglot Persistence. 1-20
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.