CMC-Computers Materials & Continua

Papers
(The median citation count of CMC-Computers Materials & Continua is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Automatic Aggregation Enhanced Affinity Propagation Clustering Based on Mutually Exclusive Exemplar Processing83
A Combined Method of Temporal Convolutional Mechanism and Wavelet Decomposition for State Estimation of Photovoltaic Power Plants80
A Novel Design of Antenna Array with Two K-Band Circularly Polarized燗ntenna77
Impediments of Cognitive System Engineering in Machine-Human Modeling74
MSADCN: Multi-Scale Attentional Densely Connected Network for Automated Bone Age Assessment73
Advanced Video Processing and Data Transmission Technology for Unmanned Ground Vehicles in the Internet of Battlefield Things (loBT)69
Mitigating Attribute Inference in Split Learning via Channel Pruning and Adversarial Training64
Deep Retraining Approach for Category-Specific 3D Reconstruction Models from a Single 2D Image62
RSG-Conformer: ReLU-Based Sparse and Grouped Conformer for Audio-Visual Speech Recognition59
Adaptive Resource Planning for AI Workloads with Variable Real-Time Tasks58
GENOME: Genetic Encoding for Novel Optimization of Malware Detection and Classification in Edge Computing58
IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN57
CNN Based Features Extraction and Selection Using EPO Optimizer for Cotton Leaf Diseases Classification56
Integrating Ontology-Based Approaches with Deep Learning Models for Fine-Grained Sentiment Analysis54
Reconfigurable Sensing Time in Cooperative Cognitive Network Using Machine Learning46
Trustworthy Personalized Federated Recommender System with Blockchain-Assisted Decentralized Reward Management46
An Adaptive Intrusion Detection Framework for IoT: Balancing Accuracy and Computational Efficiency46
Evaluating Spanish Medical Entity Recognition: Large Language Models with Prompting versus Fine-Tuning45
BFROU: A Reconfigurable Operation Unit Design Approach Using NPN Equivalence and Reed-Muller Logic Unit for Boolean Functions in Stream Ciphers43
Smart Offloading of IoT Big Data for Network Resources Optimization43
Pseudo Label Purification with Dual Contrastive Learning for Unsupervised Vehicle Re-Identification42
Coupled Effects of Single-Vacancy Defect Positions on the Mechanical Properties and Electronic Structure of Aluminum Crystals40
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction38
Federated Dynamic Aggregation Selection Strategy-Based Multi-Receptive Field Fusion Classification Framework for Point Cloud Classification37
From Identification to Obfuscation: A Survey of Cross-Network Mapping and Anti-Mapping Methods37
An Underwater Target Detection Algorithm Based on Attention Mechanism and Improved YOLOv735
An Optimization-Driven Design Scheme of Lightweight Acoustic Metamaterials for Additive Manufacturing33
An Image Inpainting Approach Based on Parallel Dual-Branch Learnable Transformer Network32
DRL-Based Cross-Regional Computation Offloading Algorithm31
Binary Code Similarity Detection: Retrospective Review and Future Directions31
Individual Software Expertise Formalization and Assessment from Project Management Tool Databases31
Smart Contract Vulnerability Detection Based on Symbolic Execution and Graph Neural Networks30
Enhancing Tea Leaf Disease Identification with Lightweight MobileNetV230
Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation30
ArtFlow: Flow-Based Watermarking for High-Quality Artwork Images Protection30
Human Motion Prediction Based on Multi-Level Spatial and Temporal Cues Learning30
Peer-to-Peer IoT Authentication Protocol Based on PUF and Multiple Reference Fuzzy Extractor30
Early-Stage Cervical Cancerous Cell Detection from Cervix Images Using YOLOv529
AI-Driven Learning Management Systems: Modern Developments, Challenges and Future Trends during the Age of ChatGPT29
A Global-Local Parallel Dual-Branch Deep Learning Model with Attention-Enhanced Feature Fusion for Brain Tumor MRI Classification29
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence29
Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems29
A Hybrid Deep Fused Learning Approach to Segregate Infectious Diseases28
GA-Stacking: A New Stacking-Based Ensemble Learning Method to Forecast the COVID-19 Outbreak28
An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment27
A Q-Learning-Assisted Co-Evolutionary Algorithm for Distributed Assembly Flexible Job Shop Scheduling Problems27
Survey on Video Security: Examining Threats, Challenges, and Future Trends27
Cybersecurity for Sustainable Smart Cities: Threat-Resilient and Energy-Conscious Urban Systems26
Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network25
A Robot Grasp Detection Method Based on Neural Architecture Search and Its Interpretability Analysis24
Evolve and Revoke: A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution24
A Federated Learning Framework with Blockchain-Based Auditable Participant Selection24
TSMixerE: Entity Context-Aware Method for Static Knowledge Graph Completion24
Deepfake Video Detection Based on Improved CapsNet and Temporal–Spatial Features24
Shear Let Transform Residual Learning Approach for Single-Image Super-Resolution23
Malicious Traffic Compression and Classification Technique for Secure Internet of Things23
A Progressive Approach to Generic Object Detection: A Two-Stage Framework for Image Recognition23
Royal Crown Shaped Polarization Insensitive Perfect Metamaterial Absorber for C-, X-, and Ku-Band Applications23
DSAFF-Net: A Backbone Network Based on Mask R-CNN for Small Object Detection23
IoT-Cloud Assisted Botnet Detection Using Rat Swarm Optimizer with燚eep燣earning23
Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble22
Location and Object Aware Model for Parallel Activity Recognition in Multi-Resident Smart Homes22
Efficient Scalable Template-Matching Technique for Ancient Brahmi Script營mage22
Spatial-Temporal Graph Fusion with Dual-Scale Convolution for Traffic Flow Prediction22
A Hybrid Attention-Based Residual Unet for Semantic Segmentation of Brain Tumor22
AI-Powered Innovations in High-Tech Research and Development: From Theory to Practice21
A Fuzzy Multi-Objective Framework for Energy Optimization and Reliable Routing in Wireless Sensor Networks via Particle Swarm Optimization21
Multi-Robot Privacy-Preserving Algorithms Based on Federated Learning: A Review21
Density Clustering Algorithm Based on KD-Tree and Voting Rules21
Single Sign-On Security and Privacy: A Systematic Literature Review21
C2Net-YOLOv5: A Bidirectional Res2Net-Based Traffic Sign Detection Algorithm21
Utilizing Machine Learning with Unique Pentaplet Data Structure to Enhance Data Integrity20
A Hybrid Approach for Pavement Crack Detection Using Mask R-CNN and Vision Transformer Model20
Application Research on Two-Layer Threat Prediction Model Based on Event Graph20
A Review of Knowledge Graph in Traditional Chinese Medicine: Analysis, Construction, Application and Prospects20
Developing a Model for Parkinson’s Disease Detection Using Machine Learning Algorithms20
Navigating the Blockchain Trilemma: A Review of Recent Advances and Emerging Solutions in Decentralization, Security, and Scalability Optimization20
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution20
Hash-Based Signature Authentication for Scalable and Security-Consistent QKD Post-Processing20
MalDetect-IoT: Enhanced IoT Malware Variant Detection with a Deep Stacked Ensemble Approach20
Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with燛rrors Problem19
Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles19
Internet of Things Enabled DDoS Attack Detection Using Pigeon Inspired Optimization Algorithm with Deep Learning Approach19
Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks19
Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method19
Modified Wild Horse Optimization with Deep Learning Enabled Symmetric Human Activity Recognition Model19
Hyperspectral Image Based Interpretable Feature Clustering Algorithm19
Abnormal Traffic Detection for Internet of Things Based on an Improved Residual Network18
Malware Detection in Android IoT Systems Using Deep Learning18
Billiards Optimization Algorithm: A New Game-Based Metaheuristic Approach18
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning18
Scalable Blockchain Technology for Tracking the Provenance of the Agri-Food18
A Comprehensive Study of Resource Provisioning and Optimization in Edge Computing18
ConvNeXt-Driven Dynamic Unified Network with Adaptive Feature Calibration for End-to-End Person Search18
Modelling of Wideband Concentric Ring Frequency Selective Surface for�G燚evices18
Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples18
Heterogeneous Task Allocation Model and Algorithm for Intelligent Connected Vehicles18
Cuckoo Search-Deep Neural Network Hybrid Model for Uncertainty Quantification and Optimization of Dielectric Energy Storage in Na<sub><b>1/2</b></sub>Bi<sub><b>1/2&18
SP-DSTS-MIMO Scheme-Aided H.266 for Reliable High Data Rate Mobile Video Communication18
Query Optimization Framework for Graph Database in Cloud Dew Environment18
Enhancing Breast Cancer Diagnosis with Channel-Wise Attention Mechanisms in Deep Learning17
Securing Internet of Things Devices with Federated Learning: A Privacy-Preserving Approach for Distributed Intrusion Detection17
Deep Learning-based Environmental Sound Classification Using Feature Fusion and Data Enhancement17
Nondestructive Testing of Bridge Stay Cable Surface Defects Based on Computer Vision17
A Survey of Multi-Blockchain: Architectures, Technologies, and Applications17
Enhancing Fire Detection with YOLO Models: A Bayesian Hyperparameter Tuning Approach17
A Double-Branch Xception Architecture for Acute Hemorrhage Detection and Subtype Classification17
A Lightweight Deep Learning-Based Model for Tomato Leaf Disease Classification17
MOALG: A Metaheuristic Hybrid of Multi-Objective Ant Lion Optimizer and Genetic Algorithm for Solving Design Problems17
A Review of Computing with Spiking Neural Networks17
SEFormer: A Lightweight CNN-Transformer Based on Separable Multiscale Depthwise Convolution and Efficient Self-Attention for Rotating Machinery Fault Diagnosis17
Research on Stock Price Prediction Method Based on the GAN-LSTM-Attention Model17
Multi-Objective Optimization of Defective Multi-Inventory Mother-Plate Cutting17
Studying the Electrocatalytic Hydrogen Evolution Reaction Performance of <i>L</i>1<sub>0</sub>-NiM Intermetallic Compounds by DFT Calculation17
Adaptive Successive POI Recommendation via Trajectory Sequences Processing and Long Short-Term Preference Learning16
Intelligent Traffic Surveillance through Multi-Label Semantic Segmentation and Filter-Based Tracking16
Dual-Classifier Label Correction Network for Carotid Plaque Classification on Multi-Center Ultrasound Images16
A Metamodeling Approach to Enforcing the No-Cloning Theorem in Quantum Software Engineering16
Enhanced Detection of APT Vector Lateral Movement in Organizational Networks Using Lightweight Machine Learning16
Unsupervised Low-Light Image Enhancement Based on Explicit Denoising and Knowledge Distillation16
LinguTimeX a Framework for Multilingual CTC Detection Using Explainable AI and Natural Language Processing16
Through-Wall Multihuman Activity Recognition Based on MIMO Radar16
Graph-Embedded Neural Architecture Search: A Variational Approach for Optimized Model Design16
Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication16
Double-Layer-Optimizing Method of Hybrid Energy Storage Microgrid Based on Improved Grey Wolf Optimization16
Root Security Parameter Generation Mechanism Based on SRAM PUF for Smart Terminals in Power IoT16
LP-CRI: Label Propagation Immune Generation Algorithm Based on Clustering and Rebound Mechanism16
PhotoGAN: A Novel Style Transfer Model for Digital Photographs16
PIDINet-MC: Real-Time Multi-Class Edge Detection with PiDiNet15
Research on Defect Detection of Wind Turbine Blades Based on Morphology and Improved Otsu Algorithm Using Infrared Images15
Leveraging Edge Optimize Vision Transformer for Monkeypox Lesion Diagnosis on Mobile Devices15
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map15
Segment-Conditioned Latent-Intent Framework for Cooperative Multi-UAV Search15
Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework15
Implementation of Human-AI Interaction in Reinforcement Learning: Literature Review and Case Studies15
Lightweight Multi-scale Convolutional Neural Network for Rice Leaf Disease燫ecognition15
Leveraging Transformers for Detection of Arabic Cyberbullying on Social Media: Hybrid Arabic Transformers15
An Improved Hybrid Deep Learning Approach for Security Requirements Classification15
Sine-Polynomial Chaotic Map (SPCM): A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks15
An Attention-Based 6D Pose Estimation Network for Weakly Textured Industrial Parts15
An Early Warning Model of Telecommunication Network Fraud Based on User Portrait15
An Integrated Attention-BiLSTM Approach for Probabilistic Remaining Useful Life Prediction15
Improved Particle Swarm Optimization for Parameter Identification of Permanent Magnet Synchronous Motor15
Virtual QPU: A Novel Implementation of Quantum Computing15
Semantic Knowledge Based Reinforcement Learning Formalism for Smart Learning Environments15
Big Data Testing Techniques: Taxonomy, Challenges and Future Trends14
Next-Generation Deep Learning Approaches for Kidney Tumor Image Analysis: Challenges, Clinical Applications, and Future Perspectives14
A Low-Collision and Efficient Grasping Method for Manipulator Based on Safe Reinforcement Learning14
LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques14
An Improved Harris Hawk Optimization Algorithm for Flexible Job Shop Scheduling Problem14
LKPNR: Large Language Models and Knowledge Graph for Personalized News Recommendation Framework14
Heuristic Feature Engineering for Enhancing Neural Network Performance in Spatiotemporal Traffic Prediction14
Modeling of Computer Virus Propagation with Fuzzy Parameters14
Robust Image Watermarking Using LWT and Stochastic Gradient Firefly Algorithm14
Stackelberg Game-Based Resource Allocation with Blockchain for Cold-Chain Logistics System14
A DDoS Identification Method for Unbalanced Data CVWGG14
An Infrared-Visible Image Fusion Network with Channel-Switching for Low-Light Object Detection14
YOLOCSP-PEST for Crops Pest Localization and Classification14
Deterministic PCA-Synchronized 3-D Mesh Watermarking with Fullerene-Guided Carrier Selection14
DM Code Key Point Detection Algorithm Based on CenterNet14
Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps14
A Novel Proactive AI-Based Agents Framework for an IoE-Based Smart Things Monitoring System with Applications for Smart Vehicles14
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation14
Optimization of Coronavirus Pandemic Model Through Artificial Intelligence14
AG-GCN: Vehicle Re-Identification Based on Attention-Guided Graph Convolutional Network14
Enhancing Intrusion Detection Systems Using Hybrid AI-Based Approaches14
A Spectral Convolutional Neural Network Model Based on Adaptive Fick’s Law for Hyperspectral Image Classification13
DH-LDA: A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid13
Multilevel Military Image Encryption Based on Tri-Independent Keying Approach13
Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning13
Detecting Double JPEG Compressed Color Images via an Improved Approach13
Flexible Global Aggregation and Dynamic Client Selection for Federated Learning in Internet of Vehicles13
Optimizing Airline Review Sentiment Analysis: A Comparative Analysis of LLaMA and BERT Models through Fine-Tuning and Few-Shot Learning13
Improving Machine Translation Formality with Large Language Models13
A Novel Krill Herd Based Random Forest Algorithm for Monitoring Patient Health13
NTSSA: A Novel Multi-Strategy Enhanced Sparrow Search Algorithm with Northern Goshawk Optimization and Adaptive <i>t</i>-Distribution for Global Optimization13
Multi-Perspective Data Fusion Framework Based on Hierarchical BERT: Provide Visual Predictions of Business Processes13
Deep Learning Based Underground Sewer Defect Classification Using a Modified RegNet13
Recent Advances in Deep-Learning Side-Channel Attacks on AES Implementations13
RRT Autonomous Detection Algorithm Based on Multiple Pilot Point Bias Strategy and Karto SLAM Algorithm13
YOLOv5ST: A Lightweight and Fast Scene Text Detector13
Survey of Indoor Localization Based on Deep Learning13
DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning13
A Big Data Based Dynamic Weight Approach for RFM Segmentation13
An Enhanced Fuzzy Routing Protocol for Energy Optimization in the Underwater Wireless Sensor Networks13
Leveraging Gradient-Based Optimizer and Deep Learning for Automated Soil Classification Model13
KurdSet: A Kurdish Handwritten Characters Recognition Dataset Using Convolutional Neural Network13
Optimal Structure Determination for Composite Laminates Using Particle Swarm Optimization and Machine Learning13
Hunter Prey Optimization with Hybrid Deep Learning for Fake News Detection on Arabic Corpus13
Developing a Secure Framework Using Feature Selection and Attack Detection燭echnique13
Intrusion Detection Systems in Industrial Control Systems: Landscape, Challenges and Opportunities13
A Low-Power 12-Bit SAR ADC for Analog Convolutional Kernel of Mixed-Signal CNN Accelerator13
Upholding Academic Integrity amidst Advanced Language Models: Evaluating BiLSTM Networks with GloVe Embeddings for Detecting AI-Generated Scientific Abstracts13
A Three-Dimensional Real-Time Gait-Based Age Detection System Using Machine Learning12
Offload Strategy for Edge Computing in Satellite Networks Based on Software Defined Network12
Med-ReLU: A Parameter-Free Hybrid Activation Function for Deep Artificial Neural Network Used in Medical Image Segmentation12
A Novel Approach for Security Enhancement of Data Encryption Standard12
Edge Computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet12
A Dual Attention Encoder-Decoder Text Summarization Model12
Dynamic Integration of Q-Learning and A-APF for Efficient Path Planning in Complex Underground Mining Environments12
Lightweight Complex-Valued Neural Network for Indoor Positioning12
HEaaN-ID3: Fully Homomorphic Privacy-Preserving ID3-Decision Trees Using CKKS12
Blockchain-Enabled Edge Computing Techniques for Advanced Video Surveillance in Autonomous Vehicles12
Adaptive Multi-Layer Defense Mechanism for Trusted Federated Learning in Network Security Assessment12
Generated Preserved Adversarial Federated Learning for Enhanced Image Analysis (GPAF)12
Enhancing Deep Learning Semantics: The Diffusion Sampling and Label-Driven Co-Attention Approach12
Two-Hop Delay-Aware Energy Efficiency Resource Allocation in Space-Air-Ground Integrated Smart Grid Network12
Face Forgery Detection via Multi-Scale Dual-Modality Mutual Enhancement Network12
Optimized Cardiovascular Disease Prediction Using Clustered Butterfly Algorithm12
Multiscale Feature Fusion for Gesture Recognition Using Commodity Millimeter-Wave Radar12
Predicting Dementia Risk Factors Based on Feature Selection and Neural Networks12
A Dual-Detection Method for Cashew Ripeness and Anthrax Based on YOLOv11-NSDDil12
Toward Efficient Traffic-Sign Detection via SlimNeck and Coordinate-Attention Fusion in YOLO-SMM12
Lightweight YOLOv5 with ShuffleNetV2 for Rice Disease Detection in Edge Computing12
Study on Sediment Removal Method of Reservoir Based on Double Branch Convolution12
Solar Radiation Prediction Using Boosted Coyote Optimization Algorithm with Deep Learning for Energy Management12
A Complex Fuzzy LSTM Network for Temporal-Related Forecasting Problems12
Attention Eraser and Quantitative Measures for Automated Bone Age Assessment12
Addressing Class Overlap in Sonic Hedgehog Medulloblastoma Molecular Subtypes Classification Using Under-Sampling and SVD-Enhanced Multinomial Regression12
A Multi-Level Circulant Cross-Modal Transformer for Multimodal Speech Emotion Recognition12
Efficient Route Planning for Real-Time Demand-Responsive Transit12
Neural Machine Translation by Fusing Key Information of Text12
Probability-Enhanced Anchor-Free Detector for Remote-Sensing Object Detection12
Classification of Job Offers into Job Positions Using NET and BERT Language Models12
Big Data Analytics Using Graph Signal Processing12
Intelligent Semantic Segmentation with Vision Transformers for Aerial Vehicle Monitoring12
Guest Editorial Special Issue on Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems12
Advanced DAG-Based Ranking (ADR) Protocol for Blockchain Scalability12
Proposed Biometric Security System Based on Deep Learning and Chaos燗lgorithms11
Deep Learning-Based NLP Framework for Public Sentiment Analysis on Green Consumption: Evidence from Social Media11
Bridging AI and Cyber Defense: A Stacked Ensemble Deep Learning Model with Explainable Insights11
Position-Wise Attention-Enhanced Vision Transformer for Diabetic Retinopathy Grading11
A Deception Defense Timing Selection Method Based on Time-Delayed FlipIt Game in Cloud-Edge Collaborative Networks11
A Comparative Study of Data Representation Techniques for Deep Learning-Based Classification of Promoter and Histone-Associated DNA Regions11
Multi-Scale Modelling and Simulation of Graphene–PDMS and CNT–PDMS Flexible Capacitive Pressure Sensors for Enhanced Sensitivity11
Numerical Simulation of Damage Behavior in Graphene-Reinforced Aluminum Matrix Composite Armatures under Multi-Physical Field Coupling11
A Harmonic Approach to Handwriting Style Synthesis Using Deep Learning11
Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT11
Effective Data Balancing and Fine-Tuning Techniques for Medical sLLMs in Resource-Constrained Domains11
Steel Surface Defect Detection Using Learnable Memory Vision Transformer11
Accelerating Falcon Post-Quantum Digital Signature Algorithm on Graphic Processing Units11
Ghost-Attention You Only Look Once (GA-YOLO): Enhancing Small Object Detection for Traffic Monitoring11
Innovative Approaches to Task Scheduling in Cloud Computing Environments Using an Advanced Willow Catkin Optimization Algorithm11
Modeling Pruning as a Phase Transition: A Thermodynamic Analysis of Neural Activations11
Fine-Grained Multivariate Time Series Anomaly Detection in IoT11
From Hardening to Understanding: Adversarial Training vs. CF-Aug for Explainable Cyber-Threat Detection System11
Multi-Agent Reinforcement Learning Based Context-Aware Heterogeneous Decision Support System11
A PPO-Based DRL Approach for Scalable Communication in Civilian UAV Networks11
Enhancing SHAP Explainability for Diagnostic and Prognostic ML Models in Alzheimer’s Disease11
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN11
0.15126705169678