scientific journal | Q5633421 |
P8375 | Crossref journal ID | 373835 |
P8903 | HAL journal ID | 158120 |
P236 | ISSN | 2666-2558 |
2666-2566 | ||
P7363 | ISSN-L | 2666-2558 |
P856 | official website | https://benthamscience.com/public/journals/recent-advances-in-computer-science-and-communications |
P10283 | OpenAlex ID | S4210235671 |
P7662 | Scilit journal ID | 4294234 |
P495 | country of origin | Kingdom of the Netherlands | Q29999 |
P407 | language of work or name | English | Q1860 |
P1476 | title | Recent advances in computer science and communications |
Q111899646 | A Cluster Analysis Method of Software Development Activities Based on Event Log |
Q128589566 | A Comparative Analysis of Feature Selection Algorithms in Cross Domain Sentiment Classification |
Q114252605 | A Comparative Study on the Application of Text Mining in Cybersecurity |
Q126545032 | A Comprehensive Review of Load Balancing Techniques in Cloud Computing and Their Simulation with CloudSim Plus |
Q128907576 | A Comprehensive Study of Deep Learning Techniques to Predict Dissimilar Diseases in Diabetes Mellitus Using IoT |
Q114592032 | A Concept of Captcha Based Dynamic Password |
Q114951845 | A Defense Mechanism Based on Improved Allocation Strategy of VMs Co-Resident Attack in Power Cloud Platform |
Q129081442 | A Dynamic Task Scheduling Algorithm for Cloud Computing Environment |
Q127520055 | A Fully Convolutional Neural Network for Recognition of Diabetic Retinopathy in Fundus Images |
Q113258656 | A Hybrid Hyper-Heuristic Flower Pollination Algorithm for Service Composition Problem in IoT |
Q127495560 | A Hybrid Technique for Selection and Minimization of Test Cases in Regression Testing |
Q126584276 | A Localization Scheme for Underwater Acoustic Wireless Sensor Networks using AoA |
Q127708850 | A Method for Webpage Classification Based on URL Using Clustering |
Q129223684 | A Novel DWT-ERT-based Fault Location for Distribution Network |
Q120833884 | A Novel Encryption of Text Messages Using Two Fold Approach |
Q122998798 | A Novel Model for Aligning Knowledge Management Activities within the Process of Developing Quality Software |
Q123002806 | A Novel Permutation Based Encryption Using Tree Traversal Approach |
Q128779800 | A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion |
Q114951968 | A Novel and Secure Hybrid iWD-MASK Algorithm for Enhanced Image Security |
Q120967561 | A Novel and Secure Image Encryption Scheme Based on Chaotic Logistic Map and Random Scrambling Using a Special Parameter of Gray Code Transformation |
Q114951849 | A Practical Conflicting Role-Based Cloud Security Risk Evaluation Method |
Q126412016 | A QoS Metric Approach for Web Service Pertinence for the Cloud |
Q128626396 | A Review Study of Modified Swarm Intelligence: Particle Swarm Optimization, Firefly, Bat and Gray Wolf Optimizer Algorithms |
Q128114700 | A Review of Multi-Objective Evolutionary Based Fuzzy Classifiers |
Q126987394 | A Review on Different Biometric Template Protection Methods |
Q127973608 | A Robust Real Time Object Detection and Recognition Algorithm for Multiple Objects |
Q127243763 | A Sentiment Score and a Rating Based Numeric Analysis Recommendations System: A Review |
Q128226023 | A Stack Autoencoders Based Deep Neural Network Approach for Cervical Cell Classification in Pap-Smear Images |
Q114951841 | A Study of Malware Propagation Dynamics in Wireless Sensor Network Using Spatially Correlated Security Model |
Q126587707 | A Survey of Load Balancing and Implementation of Clustering-Based Approach for Clouds |
Q128174211 | A Thorough Review of Deep Learning in Autism Spectrum Disorder Detection: From Data to Diagnosis |
Q127218349 | A Trust Based Neighbor Identification Using MCDM Model in Wireless Sensor Networks |
Q126620388 | A Two-Sided Matching Method for Green Suppliers and Manufacturers with Intuitionistic Linguistic Preference Information |
Q114951759 | AI-based security protocols for IoT applications: A critical review |
Q126427470 | AN ENERGY EFFICIENT SPECTRUM AWARE ROUTING FOR COGNITIVE RADIO NETWORKS |
Q128234816 | ANN-Based Relaying Algorithm for Protection of SVC- Compensated AC Transmission Line and Criticality Analysis of a Digital Relay |
Q126651830 | An Accomplished Energy-Aware Approach for Server Load Balancing in Cloud Computing |
Q126744296 | An Anatomy of a Hybrid Color Descriptor with a Neural Network Model to Enhance the Retrieval Accuracy of an Image Retrieval System |
Q123357202 | An Asymmetric Optical Cryptosystem of Double Image Encryption Based on Optical Vortex Phase Mask Using Gyrator Transform Domain |
Q129082315 | An Automated Technique for Optic Disc Detection in Retinal Fundus Images Using Elephant Herding Optimization Algorithm |
Q126808125 | An Automatic Question Generation System Using Rule-Based Approach in Bloom’s Taxonomy |
Q127495788 | An Automatic Text Summarization Method with the Concern of Covering Complete Formation |
Q127366814 | An Efficient Computational Model for Assessing the Stability Characteristics of Electro-active Natural Bio-resources |
Q127279230 | An Efficient Speculative Task Detection Algorithm for MapReduce Schedulers |
Q126585699 | An Energy Efficient Routing Approach to Enhance Coverage for Application-Specific Wireless Sensor Networks Using Genetic Algorithm |
Q128307323 | An Energy Efficient Routing Protocol Based On New Variable Data Packet (VDP) Algorithm for Wireless Sensor Networks |
Q123241906 | An Image Encryption Scheme Based on Hybrid Fresnel Phase Mask and Singular Value Decomposition |
Q127401149 | An Improved Approach to Analyze Accidents and Promote Road Safety using Association Rule Mining and Multi-Criteria Decision Analysis Methods |
Q113258654 | An Intelligent Artificial Bee Colony and Adaptive Bacterial Foraging Optimization Scheme for Reliable Breast Cancer Diagnosis |
Q128574638 | An Intelligent Resource Manager Over Terrorism Knowledge Base |
Q128307430 | An Optimal Feature Selection Method for Automatic Face Retrieval Using Enhanced Grasshopper Optimization Algorithm |
Q128005713 | An Optimal Framework for Spatial Query Optimization Using Hadoop in Big Data Analytics |
Q127470341 | An Optimized Classification of Apps Reviews for Improving Requirement Engineering |
Q127355317 | An Un-Supervised Approach for Backorder Prediction Using Deep Autoencoder |
Q128491870 | Analysis and Synthesis of A Human Prakriti Identification System Based on Soft Computing Techniques |
Q114951782 | Analysis of Blockchain Security Applications in Electronic Health Records Standardization |
Q126413454 | Analysis of Optimum Precoding Schemes in Millimeter Wave System |
Q126546177 | Analysis of Performance of Two Wavelet Families Using GLCM Feature Extraction for Mammogram Classification of Breast Cancer |
Q127353582 | Analysis of Voice Cues in Recognition of Sarcasm |
Q127227679 | Android Quiz Application Based on Face Recognition |
Q113192204 | Anuvaadika: Implementation of Sanskrit to Hindi Translation Tool Using Rule-Based Approach |
Q113421380 | Application of Data Science over IOT & Its Security Approaches |
Q128061429 | Aspect-Oriented System Coupling Metric and its Validation |
Q113421385 | Automating Duplicate Detection for Lexical Heterogeneous Web Databases |
Q127355479 | Bayesian Spam Detection Framework on Mobile Device |
Q114951948 | Big Data Security Challenges and Solution of Distributed Computing in Hadoop Environment: A Security Framework |
Q113421390 | Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review |
Q114951806 | Big Data over Cloud, its Infrastructure & Security |
Q127242214 | Bio-signals Compression using Auto-Encoder |
Q126525568 | Biometric Cryptosystems: Towards a Light and Precise Remote Authentication |
Q128833654 | Brain Tumor Detection from MR Images Employing Fuzzy Graph Cut Technique |
Q126445270 | Breast Cancer Classification Using Discrete Wavelet Transformation and Deep Learning |
Q128834573 | Bug Report Summarization by Using Swarm Intelligence Approaches |
Q128234132 | Burrows Wheeler Transform and Wavelet Tree Based Retrieval of Genome Sequence in an Indexed Genome Database |
Q129250603 | CNN-FastText Multi-Input (CFMI) Neural Networks for Social Media Clickbait Classification |
Q128844265 | Catechize Global Optimization through Leading Edge Firefly Based Zone Routing Protocol |
Q114044382 | Category Classification of the Training Set Combined with Sentence Multiplication for Semantic Data Extraction Using GENI Algorithm |
Q126783528 | Centre-of-Mass Based Gait Recognition for Person Identification |
Q127367153 | Classification and Analysis of Static Metric Based Antipattern Detection in Service Computing |
Q127470467 | Classification of Diabetes by Kernel Based SVM with PSO |
Q127518836 | Clustering Algorithm for Community Detection in Complex Network: A Comprehensive Review |
Q127639312 | Collaborative Packet Dropping Intrusion Detection in MANETs |
Q128207904 | Combinatorial Double Auction Based Meta-scheduler for Medical Image Analysis Application in Grid Environment |
Q128127977 | Comparative Performance Evaluation of Keyword and Semantic Search Engines using Different Query Set Categories |
Q114951869 | Comparative Study of Cryptography for Cloud Computing for Data Security |
Q126864779 | Comparative Study of Fuzzy PID and PID Controller Optimized with Spider Monkey Optimization for a Robotic Manipulator System |
Q114951973 | Complexity and Nesting Evolution in Open Source Software Systems: Experimental Study |
Q113393037 | Coral Reef Classification Using Improved WLD Feature Extraction with Convolution Neural Network Classification |
Q128288488 | Cost-Aware Ant Colony Optimization for Resource Allocation in Cloud Infrastructure |
Q127341655 | Cost-effective Heuristic Workflow Scheduling Algorithm in Cloud Under Deadline Constraint |
Q128897082 | Cross-Attention Based Text-Image Transformer for Visual Question Answering |
Q114044366 | Deep Image Segmentation Based on Morphological Edge Operator |
Q128085974 | Deep Learning Based Sentiment Classification on User-Generated Big Data |
Q128208149 | Defining Theoretical Foundations to Unified Metamodel For Model Reusability |
Q126340844 | Design and Development of the Novel Electrothermal Wall-Hanging Boiler |
Q111518480 | Design and Implementation of Low Energy Wireless Network Nodes Based on Hardware Compression Acceleration |
Q128588905 | Design of Dynamic Morphological Analyser for Hindi Nouns Using Rule Based Approach |
Q128088269 | Design of Relation Extraction Framework to Develop Knowledge Base |
Q127612778 | Design, Development and Comparison of Heuristic Driven Algorithms Based on the Crossed Domain Products’ Reviews for User’s Summarization |
Q126538173 | Designing an Expert System for the Diagnosis of Multiple Myeloma by Using Rough Set Theory |
Q128830080 | Determining Network Communities Based on Modular Density Optimization |
Q129657522 | Diagnosis and Management System of Healthcare Resources for Pulmonary Cardio-vascular Diseases Based on Supervised Machine Learning |
Q114044383 | Dimensionality Reduction Technique in Decision Making Using Pythagorean Fuzzy Soft Matrices |
Q127242564 | Dimensionality Reduction Techniques for IoT Based Data |
Q126990359 | Distance Aware VM Allocation Process to Minimize Energy Consumption in Cloud Computing |
Q126662178 | Distributed Content-Based Image Retrieval of Satellite Images on Hadoop |
Q127470258 | Dynamic Consolidation of Virtual Machine: A Survey of Challenges for Resource Optimization in Cloud Computing |
Q128309424 | Dynamic Data Placement Strategy with Network Security Issues in Distributed Cloud Environment for Medical Issues: An Overview |
Q126305330 | Dynamic Feature Extraction Method of Phone Speakers Based on Deep Learning |
Q114951820 | Editorial: Image, Video Forensics, and Multimedia Content Security |
Q126863866 | Effectiveness of Online Learning and its Comparison Using Innovative Statistical Approach |
Q127179283 | Effects of the Dynamic and Energy Based Feature Extraction on Hindi Speech Recognition |
Q127941821 | Efficient Dynamic Resource Allocation in Hadoop Multiclusters for Load- Balancing Problem |
Q127791551 | Efficient FIR Filter Architecture using FPGA |
Q127590855 | Empowered AODV Protocol in Wireless Sensor Network using Three Variable RSA Cryptosystem |
Q127471731 | Energy Efficient Clustering and Routing Algorithm for WSN |
Q129001670 | Energy Saving Using Green Computing Approach for Internet of Thing (IoT) Based Tiny Level Computational Devices |
Q127562168 | Energy-Efficient Routing Protocol for Network Life Enhancement in Wireless Sensor Networks |
Q126666914 | Energy-Efficient and Degree-Distance Clustering Based Hierarchical Routing Protocol for WSNs |
Q126855676 | Enhanced Auxiliary Cluster Head Selection Routing Algorithm in Wireless Sensor Networks |
Q127083016 | Enhanced Mseec Routing Protocol Involving Tabu Search with Static and Mobile Nodes in Wsns |
Q128722010 | Enhancing Image Captioning Using Deep Convolutional Generative Adversarial Networks |
Q127367431 | Enhancing Resiliency Feature in Smart Grids through a Deep Learning Based Prediction Model |
Q114951844 | Enhancing Security in Key Management Using Hybrid Cache Supported One Way Hash Chain Technique |
Q126636674 | Exhaust Emission Characteristics of a Three-Wheeler Auto Diesel Engine Fueled with Pongamia, Mahua and Jatropha Biodiesels |
Q128088628 | Feature Selection Method Based on Grey Wolf Optimization and Simulated Annealing |
Q127901203 | Fuzzy Control Algorithm for Estimation and Interaction of Dynamic Arm Motion |
Q127469735 | GRADE: A Novel Gravitational Density-Based Clustering Approach in the Multi-Objective Framework |
Q127336738 | Genes Expression Classification Through Histone Modification Using Temporal Neural Network |
Q128062480 | Greedy Load Balancing Energy Efficient Routing Scheme for Wireless Sensor Networks |
Q127518979 | Hybrid Deep Neural Model for Duplicate Question Detection in Trans-Literated Bi-Lingual Data |
Q128117885 | IMSM: An Interval Migration Based Approach for Skew Mitigation in MapReduce |
Q128127540 | IP Traceback using Flow Based Classification |
Q126745721 | Identification of Key Nodes in Distributed Access Control Model |
Q128553036 | Improving Recommender Systems Using Co-Appearing and Semantically Correlated User Interests |
Q128200696 | Improving Sentiment Analysis using Hybrid Deep Learning Model |
Q126561274 | Infrared patch-image model based on non-convex weighted nuclear norm minimization |
Q126666503 | Inspirations from Nature for Meta-Heuristic Algorithms: A Survey |
Q128899683 | Into the World of Underwater Swarm Robotics: Architecture, Communication, Applications and Challenges |
Q128535379 | Intuitionistic Fuzzy Shapley-TOPSIS Method for Multi-Criteria Decision Making Problems Based on Information Measures |
Q128388558 | Intuitionistic Level Set Segmentation for Medical Image Segmentation |
Q114951848 | IoT Based Comprehensive Autonomous Home Automation and Security System Using M2M Communication |
Q126659223 | Iot Secured Disjunctive XOR Two Factor Mutual Authentication for Users |
Q126546902 | Isolated Word-Based Spoken Dialogue System Using Odia Phones |
Q122874476 | Key Issues in Software Reliability Growth Models |
Q113421376 | Knowledge Representation and The Semantic Web: An Historical Overview of Influences on Emerging Tools |
Q129219376 | Komodo Dragon Mlipir Algorithm-based CNN Model for Detection of Illegal Tree Cutting in Smart IoT Forest Area |
Q127321499 | Localization and Tracking of Mobile Jammer Sensor Node Detection in Multi-Hop Wireless Sensor Network |
Q113258657 | Logistic Step Size Based Artificial Bee Colony Algorithm for Optimum Induction Motor Speed Control |
Q126864577 | Low Power and High Speed Sequential Circuits Test Architecture |
Q126786378 | Lung Cancer Prediction Using Random Forest |
Q126638830 | Machine Learning Based Parametric Estimation Approach for Poll Prediction |
Q128832558 | Malicious Route Detection in Vehicular Ad-hoc Network using Geographic Routing with Masked Data |
Q126563024 | Mathura (MBI) - A Novel Imputation Measure for Imputation of Missing Values in Medical Datasets |
Q127495503 | Matrix Factorization-based Improved Classification of Gene Expression Data |
Q129622220 | Maximizing Emotion Recognition Accuracy with Ensemble Techniques on EEG Signals |
Q128308708 | Mining of Closed High Utility Itemsets: A Survey |
Q128815823 | Moving Object Detection and Recognition Using Optical Flow and Eigen Face Using Low Resolution Video |
Q127487225 | Multi-Level Image Segmentation of Color Images Using Opposition Based Improved Firefly Algorithm |
Q126525694 | Multisensory Decision Level Fusion for Improvement in Urban Land Classification |
Q127218585 | Numerical Studies of Blood Flow in Left Coronary Model |
Q128003639 | Optimal Adaptive Data Dissemination Protocol for VANET Road Safety Using Optimal Congestion Control Algorithm |
Q128817090 | Optimal Privacy Preserving Technique Over Big Data Analytics Using Oppositional Fruit Fly Algorithm |
Q126628745 | Optimized Overcurrent Relay Coordination in a Microgrid System |
Q127611256 | Optimized Solution of TSP (Travelling Salesman Problem) Based on Mendelian Inheritance |
Q127960031 | Peak Average Power Reduction in NOMA by using PTSCT Technique |
Q126587226 | Performance Comparison of Web Backend and Database: A Case Study of Node.JS, Golang and MySQL, Mongo DB |
Q128637863 | Performance Evaluation of Edge Orientation Histograms Based System for Real-time Object Detection in Two Separate Platforms |
Q127242210 | Performance Evaluation of Neural Network for Human Classification Using Blob Dataset |
Q126651385 | Performance Optimization of IoT Networks Within the Gateway Layer |
Q113258652 | Predicting Rainfall-induced Landslide Using Bee Colony Algorithm Based on Support Vector Regression. |
Q127073110 | Predicting Suitable Agile Method Using Fuzzy AHP |
Q128062314 | Prediction of Customer Plan using Churn Analysis for Telecom Industry |
Q127709374 | Prediction of Tetralogy of Fallot using Fuzzy Clustering |
Q128648317 | Probabilistic and Fuzzy based Efficient Routing Protocol for Mobile Ad Hoc Networks |
Q127953703 | Project Management Knowledge Areas and Skills for Managing Software and Cloud Projects: Overcoming Challenges |
Q126745392 | Quantitative Analysis and Evaluation of Tractor Gear Shifting Comfort with Entropy-Based Matter-Element Model |
Q128308857 | Real Time Acoustic Feature Analysis for Gender Identification |
Q128266549 | Real-Time Detection of Road Lane-Lines for Autonomous Driving |
Q113223418 | Recent Advances in Robot Trajectory Planning in a Dynamic Environment |
Q126303873 | Recent Advances on GERT Method Based on Bayesian Networks |
Q126332427 | Recognition of Persian Sign Language Alphabet Using Gaussian Distribution, Radial Distance and Centroid-Radii |
Q126331882 | Reliability Analysis and Modeling of Green Computing Based Software Systems |
Q126545392 | Research on Edge Detection of Agricultural Pest and Disease Leaf Image Based on LVQ Neural Network |
Q122657666 | Review on Applicability and Utilization of Blockchain Technology in Ubiquitous Computing |
Q126418701 | Risk Factor Identification, Classification and Prediction Summary of Chronic Kidney Disease |
Q126648438 | Role of Self Phase Modulation and Cross Phase Modulation on Quality of Signal in Optical Links |
Q128341527 | SDRFHBLoc- A Secure Framework for Localization in Wireless Sensor Networks |
Q128833429 | SEGIN-Minus: A New Approach to Design Reliable and Fault-Tolerant MIN |
Q113223424 | SQL Versus NoSQL Databases to Assess Their Appropriateness for Big Data Application |
Q128869749 | SVM and HMM Classifier Combination Based Approach for Online Handwritten Indic Character Recognition |
Q126658134 | Safety Monitoring and Warning System for Subway Construction Workers Using Wearable Technology |
Q128688458 | Secure Digital Databases using Watermarking based on English-Character Attributes |
Q114845540 | Secure Virtual Machine Live Migration using Advanced Metric Encryption |
Q129281047 | Sentiment Polarity Classification Using Conjure of Genetic Algorithm and Differential Evolution Methods for Optimized Feature Selection |
Q114951965 | Signcryption-Based Security Framework for Low Computing Power Devices |
Q114365533 | Software Reliability Prediction of Open Source Software Using Soft Computing Technique |
Q113421412 | Software-Defined Security Architecture for a Smart Home Networks Using Token Sharing Mechanism |
Q113258655 | Solving the Job Shop Scheduling Problem with an Enhanced Artificial Bee Colony Algorithm through Local Search Heuristic |
Q128832696 | Source Redundancy Management and Host Intrusion Detection in Wireless Sensor Networks |
Q128073574 | Speech Recognition Using Elman Artificial Neural Network and Linear Predictive Coding |
Q127974723 | State-of-the-Art: A Systematic Literature Review of Image Segmentation in Latent Fingerprint Forensics |
Q127438469 | Statistical Analysis of Machine Translation Evaluation Systems for English- Hindi Language Pair |
Q127595235 | Supervised Classifier Approach for Intrusion Detection on KDD with Optimal MapReduce Framework Model in Cloud Computing |
Q113223417 | Systematic Review of Machine Learning–Based Open-Source Software Maintenance Effort Estimation |
Q128810642 | Target Signal Communication Detection of Black Flying UAVs Based on Deep Learning Algorithm |
Q127301320 | Technique for Optimization of Association Rule Mining by Utilizing Genetic Algorithm |
Q128613207 | Techniques and Trends for Fine-Grained Opinion Mining and Sentiment Analysis: Recent Survey |
Q128287693 | The Application of the Positive Semi-Definite Kernel Space for SVM in Quality Prediction |
Q128065598 | The Inverse Edit Term Frequency for Informal Word Conversion Using Soundex for Analysis of Customer’s Reviews |
Q126747089 | The Prototype for Drone Self-Navigation Utilizing in Underground Mine |
Q126407048 | Time-Frequency Spectral Power Assessment of Rolling Element Bearing Faults Using Adaptive Modified Morlet Wavelet Transform |
Q126431555 | Time-Synchronization Free Localization Scheme with Mobility Prediction for UAWSNs |
Q128240256 | To Improve the Web Personalization Using the Boosted Random Forest for Web Information Extraction |
Q127366834 | Transaction Scheduling Heuristics in Mobile Distributed Real Time Database System |
Q128899799 | Tree-Based Ant Colony Optimization Algorithm for Effective Multicast Routing in Mobile Adhoc Network |
Q123198622 | Unsymmetric Image Encryption Using Lower-Upper Decomposition and Structured Phase Mask in the Fractional Fourier Domain |
Q127213973 | Utility-Based SK-Clustering Algorithm for Privacy Preservation of Anonymized Data in Healthcare |
Q114951962 | Viability of Adaptive Network Security Exercising Tradeoff between Performance and Security |
Q128680557 | Web Service Composition in Cloud: A Fuzzy Rule Model |
Q127476256 | Web Service Discovery Using Bio-Inspired Holistic Matching Based Linked Data Clustering Model for RDF Data |
Q128883284 | Withdrawal Notice: An Improved Collaborative Filtering Method through Content Association |
Q128962215 | Withdrawal Notice: Big Data Opportunities in the Telecommunication Sector: A Case Study of a Moroccan Mobile Networks Operator |
Q126306831 | Withdrawal Notice: BotGuard: Clustering and correlation of network traffic for Botnet detection |
Q126526966 | Withdrawal Notice: Empowering Secured Outsourcing in Cloud Storage Through Data Integrity Verification |
Q126404748 | Withdrawal Notice: Lossless Watermarking Algorithm Based on Multiple- Base Notational System and Pixel Difference |
Q128991697 | Withdrawal Notice: The Effectiveness of Hierarchical Structure on Cloud Systems |
Q114752210 | YARN Schedulers for Hadoop MapReduce Jobs: Design Goals, Issues and Taxonomy |
Q126666889 | YOLOv3-Tesseract Model for Improved Intelligent form Recognition |
Search more.