


default search action
Concurrency and Computation: Practice and Experience, Volume 35
Volume 35, Number 1, January 2023
Research Articles
- Mallela Siva Naga Raju
, Battula Srinivasa Rao
:
Lung and colon cancer classification using hybrid principle component analysis network-extreme learning machine. - Dheeraj Kumar Dixit
, Amit Bhagat
, Dharmendra Dangi
:
An accurate fake news detection approach based on a Levy flight honey badger optimized convolutional neural network model. - V. Desika Vinayaki
, R. Kalaiselvi:
ESLO: Enhanced sea lion optimization based bi-directional CNN-RNN for accurate detection of diabetic retinopathy. - S. Lavanya
, S. V. Annlin Jeba, P. Bhuvaneswari, Francis H. Shajin:
Support vector machine classifier optimized with seagull optimization algorithm for brain tumor classification. - Aboul-Karim Mohamed El Maarouf
, Luc Giraud
, Abdou Guermouche
, Thomas Guignon:
Combining reduction with synchronization barrier on multi-core processors. - Kubilay Muhammed Sünnetci
, Esat Kaba
, Fatma Beyazal Çeliker
, Ahmet Alkan
:
Comparative parotid gland segmentation by using ResNet-18 and MobileNetV2 based DeepLab v3+ architectures from magnetic resonance images. - Uma Yadav
, Ashish K. Sharma
, Dipti Patil:
Review of automated depression detection: Social posts, audio and video, open challenges and future direction. - Nivethithai S, Hariharan Bhagavathi
:
Optimized multi-objective Q-learning with enhanced beetle swarm optimization based scientific workflows scheduling on cloud computing environment. - Madamanchi Venugopal
, Virendra K. Sharma, Kalpana Sharma:
Web information mining and semantic analysis in heterogeneous unstructured text data using enhanced latent Dirichlet allocation. - Taki Eddine Saidi
, Abdelhakim Khouas, Abbes Amira:
Implementation of a real-time stereo vision algorithm on a cost-effective heterogeneous multicore platform. - Oswalt Manoj Stanislaus
, Pon Harshavardhanan
, Akila Victor
, Sajeev Ram Arumugam
:
A novel fuzzy based deep neural network for rain fall prediction using cloud images. - Yogesh Beeharry
, Dujaya R. Calchand:
Performance analysis of regression-based machine learning models towards intelligent selection of MIMO configurations. - G. Harish Kumar
, P. Trinatha Rao:
An energy efficiency perceptive on MIMO-OFDM systems using hybrid fruit fly-based salp swarm optimization technique. - Tariq Iqbal, Nada M. Alfaer, Muhammad Hussain Tahir
, Hassan M. Aljohani, Farrukh Jamal, Ahmed Z. Afify
:
Properties and estimation approaches of the odd JCA family with applications. - F. Mary Harin Fernandez
, T. Venkata Ramana, Mahammad Shabana
, V. Kannagi, M. Nalini
:
Personalized ontology and deep training tree-based optimal gated recurrent unit-recurrent neural network for prediction of students' behavior. - V. Sureshkumar
, S. Rajasomashekar, B. Sarala
:
An efficient underground water prediction using optimal deep neural network. - Saba Khanum
, Khurram Mustafa:
A systematic literature review on sensitive data protection in blockchain applications. - Garima Gupta, Rahul Katarya
:
A novel approach to alleviate data sparsity and generate dynamic fruit recommendations from point-of-sale data. - Vijesh Bhagat
, Santosh Kumar, Sachin Kumar Gupta
, Mithilesh Kumar Chaube
:
Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications. - Ying Huang
, Wei Li
:
Dynamic cognitive maps for robot route planning in complex workplaces represented by abstract mazes. - Vishakha Chourasia
, Sudhakar Pandey, Rahul Chaurasiya, Sanjay Kumar
:
Improving the delivery ratio in vehicular delay-tolerant network using customized binary particle swarm optimization-based optimized throwbox deployment. - Usha Jain
, Saied Pirasteh, Muzzammil Hussain
:
Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet-of-Things-Fog environment. - T. Sampradeepraj
, V. Anusuya Devi
, S. P. Raja
:
Secure multicasting in wireless sensor networks using identity based cryptography. - Anitha Swaminathan
, Vanitha Muthuraman:
Metaheuristic optimization based feature subset selection with deep belief network for stress prediction in working employees. - Lilly Raamesh
, S. Radhika
, S. Jothi
:
Hybrid support vector machine and K-nearest neighbor-based software testing for educational assistant. - Ismail Yenilmez
, Yeliz Mert Kantar
:
New exponentiated generalized censored regression models: Monte Carlo simulation and application. - Tugba Gürbüz
, Çelebi Uluyol
:
Research article classification with text mining method. - Abdulsalam O. Alzahrani
, Mohammed J. F. Alenazi:
ML-IDSDN: Machine learning based intrusion detection system for software-defined network. - Mohammad Hormozi, Seyed Hossein Erfani
:
An SDN-based DDoS defense approach using route obfuscation. - Anbukkarasi Sampath
, Varadhaganapathy Shanmugavel:
Hybrid Tamil spell checker with combined character splitting. - Gladys Amos Shewa
, Fidelis Ifeanyi Ugwuowo:
Kibria-Lukman type estimator for gamma regression model. - Pushpendra Kumar Rajput
, Geeta Sikka:
Multi-agent architecture approach for self-healing systems: Run-time recovery with case-based reasoning.
Review
- Palwinder Kaur
, Rajesh Kumar Singh:
A review on optimization techniques for medical image analysis.
Research Articles
- Swapna Mudrakola
, Nagaratna Hegde:
Removal of noise on mammogram breast images using filtering methods. - Hariprasad Siddharthan
, Deepa Thangavel
:
A novel framework approach for intrusion detection based on improved critical feature selection in Internet of Things networks. - Tatiparti B. Prasad Reddy
, D. Vydeki:
Ebola deep wavelet extreme learning machine based chronic kidney disease prediction on the internet of medical things platform. - Anju Mongandampulath Akathoott
, Rupesh Nasre
:
Single-linkage clustering of dynamic data. - Kalai Selvi Thanupillai
, Rahimunnisa Kamal Basha
:
Pulse coupled neural network optimized with chaotic grey wolf algorithm for breast cancer classification using mammogram images. - Susmi Jacob
, Vinod Puthuvath, Muralidharan Akarsh, Jackson George, Jewel Joseph, Jigil Joy:
A smartphone authentication system based on touch gesture dynamics. - Vaishali Kaushal
, Rajan Yadav:
Learning successful implementation of Chatbots in businesses from B2B customer experience perspective.
Volume 35, Number 2, January 2023
Research Articles
- Qaisar Abbas
:
An intelligent medical image classification system using few-shot learning. - Qihang Qiao, Lan Chen, Hong Cai, He Zhang, Zhenjie Yao
:
An online workflow scheduling algorithm considering license limitation in heterogeneous environment. - Satish Kumar Satti
, Suganya Devi K
, Srinivasan P:
Recognizing the Indian Cautionary Traffic Signs using GAN, Improved Mask R-CNN, and Grab Cut. - Gnana Prakasam Mercy Bai
, Venkadesh Perumal:
Taylor political monarch butterfly optimization driven deep learning model for acute lymphoblastic leukemia detection and severity classification using blood smear images. - Sudhagar Dhandapani
, Arokia Renjit Jerald Rodriguez
:
Poor and rich dolphin optimization algorithm with modified deep fuzzy clustering for COVID-19 patient analysis. - Yasin Turkyilmaz, Arafat Sentürk, Muhammed Enes Bayrakdar
:
Employing machine learning based malicious signal detection for cognitive radio networks. - Swati Hira
, Parag S. Deshpande:
Automated heuristic based context dependent ETL process to generate multi-dimensional model for tabular data. - Anil V. Turukmane
:
Forecasting the IoT-based cyber threats using the hybrid forage dependent ensemble classifier. - Praveena Nalamani Govardhan
, Srigitha Surendranath, Manju Sundararajan
:
Artificial intelligence-based remote monitoring system for automated anomaly detection in wireless sensor networks. - Yu Hong
, Yi Li, Haining Tan:
A noninterference trusted dual system security guarantee method based on secure memory. - Juan Chen, Ying Chen, Han Zhao
, Tao Ma:
Development of neural-network-based stereo bionic compound eyes with fiber bundles. - Bhargav Shir, Jai Prakash Verma
, Pronaya Bhattacharya
:
Mobility prediction for uneven distribution of bikes in bike sharing systems. - Sepehr Asgarian
, Rouzbeh Ghasemi, Saeedeh Momtazi
:
Generative adversarial network for sentiment-based stock prediction. - Jansi Rajamoney
, Amutha Ramachandran:
Representative-discriminative dictionary learning algorithm for human action recognition using smartphone sensors. - Mohit Kumar
, Kalka Dubey, Samayveer Singh, Jitendra Kumar Samriya, Sukhpal Singh Gill
:
Experimental performance analysis of cloud resource allocation framework using spider monkey optimization algorithm. - Ayse Nur Ay
, Mustafa Zahid Yildiz:
The performance of an electromyography-based deep neural network classifier for external and internal focus instructions. - Jean-Marie Mirebeau
, Lionel Gayraud, Remi Barrère, Da Chen, François Desquilbet:
Massively parallel computation of globally optimal shortest paths with curvature penalization. - Zhaoyu Xue, Wanwan Guo, Zhihua Cui
, Wensheng Zhang:
The global evaluation strategy for many-objective partial collaborative computation offloading problem. - Rahul Katarya
:
Towards the significance of taxi recommender systems in smart cities. - Mahesh Gangathimmappa, Neelakandan Subramani
, Velmurugan Sambath, Rengaraj Alias Muralidharan Ramanujam
, Naresh Sammeta
, Maheswari Marimuthu
:
Deep learning enabled cross-lingual search with metaheuristic web based query optimization model for multi-document summarization. - Kalaiarasi Governor
, Padmavathy Ramanujam
, Suja Cherukullapurath Mana, Geetha Perumal:
Near duplicate detection of images with area and proposed pixel-based feature extraction. - Yujin Li, Bo Liu
, Enju Wu, Jianqiang Li, Zhangbing Zhou, Wenbo Zhang:
DRA-MQoS: An MQoS scheduling algorithm based on resource feature matching in federated edge cloud. - Jingbo Zhang
, Liping Xie:
Survey on compressed sensing reconstruction method for 3D data. - Vikas Juneja
, Shail Kumar Dinkar:
A predictive vampire attack detection by social spider optimized Gaussian mixture model clustering. - Sachin Dattatraya Shingade
, Rohini P. Mudhalwadkar:
Hybrid extreme learning machine based bidirectional long short-term memory for crop prediction. - Shumeng He
, Gaodi Xu, Houqun Yang
:
A semantic segmentation method for remote sensing images based on multiple contextual feature extraction. - Mariyaprincy Antony Saviour, Dhandapani Samiappan
:
IPFS based file storage access control and authentication model for secure data transfer using block chain technique. - Shaopeng Zhu
, Bangxuan Wei, Chaoxin Chen, Jian Gao, Wenbo Ning, Zhi Huang:
Emergency steering collision avoidance control based on distributed driving intelligent vehicles. - Abdul R. Hummaida
, Norman W. Paton, Rizos Sakellariou
:
A hierarchical decentralized architecture to enable adaptive scalable virtual machine migration. - Ricardo Ferreira Vilela
, João Choma Neto
, Victor Hugo Santiago Costa Pinto
, Paulo Sergio Lopes de Souza
, Simone do Rócio Senger de Souza
:
Bio-inspired optimization to support the test data generation of concurrent software. - Muthulakshmi Arumugasamy
, Antonidoss Arokiasamy:
Tunicate Henry gas solubility optimization-based deep residual network for fruit ripeness classification.
Review
- Shudi Wang
, Manman Xu, Ying Sun, Guozhang Jiang, Yaoqing Weng
, Xin Liu
, Guojun Zhao, Hanwen Fan, Jun Li, Cejing Zou, Yuanmin Xie, Li Huang, Baojia Chen:
Improved single shot detection using DenseNet for tiny target detection.
Research Articles
- Gnana Soundari Arunachalam
, Vimal S
, Gomathi Ramalingam
, Rajendran Nanjappan:
A classy energy efficient spider monkey optimization based clustering and data aggregation models for wireless sensor network. - Li Lv
, Xiaodong Zhou, Dekun Tan, Ping Kang, Runxiu Wu:
Multi-objective firefly algorithm with multi-strategy integration. - Mahesh B. Shelke
, Daivat D. Sawant, Chatrabhuj B. Kadam, Kailas Ambhure, Sachin N. Deshmukh:
Marathi SentiWordNet: A lexical resource for sentiment analysis of Marathi. - Liqiong Chen, Xiaoyu Bi
, Guoqing Fan, Huaiying Sun
:
A multitask recommendation algorithm based on DeepFM and Graph Convolutional Network. - Dilay Parmar
, Udai Pratap Rao
:
Privacy-preserving enhanced dummy-generation technique for location-based services. - P. Ravi Kiran Varma
, Sathiya R. R
, M. Vanitha:
Enhanced Elman spike neural network based intrusion attack detection in software defined Internet of Things network. - Jothi Kumar Alagappan
, Savaridoss Paul Victor:
Deep auto-encoder based clustering algorithm for graph-based web page recommendation system. - Mehmet Serhat Odabas
, Nurettin Senyer
, Dursun Kurt:
Determination of quality grade of tobacco leaf by image processing on correlated color temperature.
Volume 35, Number 3, February 2023
Research Articles
- R. Srivel
, Kalaiselvi Kaliannan
, S. Shanthi
, Uma Perumal
:
An automation query expansion strategy for information retrieval by using fuzzy based grasshopper optimization algorithm on medical datasets. - Shashi Bhushan
, Anoop Kumar
:
Novel predictive estimators using ranked set sampling. - Prabhakar N. Kota
, Ashok S. Chandak, B. P. Patil
:
IOT-HML: A hybrid machine learning technique for IoT enabled industrial monitoring and control system. - John Philip Bhimavarapu
, Sriharsha Ramaraju, Dimmita Nagajyothi, Inumula Veeraraghava Rao
:
Convolutional neural network based object detection system for video surveillance application. - Angel Petricia Vijayakumar
, V. Mary Anita Rajam
:
Temporal intensity modeling of sub-events in microblogs. - A. Syed Musthafa
, K. Sankar, T. Benil, Yamarthi Narasimha Rao
:
A hybrid machine learning technique for early prediction of lung nodules from medical images using a learning-based neural network classifier. - Jeyshri J.
, M. Kowsigan
:
Adaptive fuzzy-region growing fusion and improved CNN-ANFIS-based automated segmentation and classification of cervical cancer. - Lakshmi M. Nair
, Mary Synthia Regis Prabha D. M.
:
A novel modified tunicate swarm algorithm for optimal charge scheduling and pricing of electric vehicles with user priority-based charging station selection. - Seyedeh Masoumeh Mirsadeghpour Zoghi, Masoud Sanei
, Ghasem Tohidi, Shokoofeh Banihashemi, Navideh Modarresi:
Performance evaluation of investment with DEA models under pure jump processes. - Daniel Francis Selvaraj Jayapalan
, John Patrick Ananth:
Internet of Things-based root disease classification in alfalfa plants using hybrid optimization-enabled deep convolutional neural network. - Gnanasamy Lazar Sindhuraj Infant Cyril
, John Patrick Ananth:
Whale social optimization driven deep recurrent neural network for loan eligibility prediction. - Arun Kumar Ramachandran
, Vijay Franklin John Bosco Martin
:
Adaptive autism behavior prediction using improved binary whale optimization technique. - Gaurav Dubey
, Harivans Pratap Singh, Kavita Sheoran, Geetika Dhand, Pooja Malik:
Drug review sentimental analysis based on modular lexicon generation and a fusion of bidirectional threshold weighted mapping CNN-RNN. - Qiang Yin
, JiaXin Gu
, Shaoyun Song, Yonglin Zhang, Gang Zhao, ZhiQiang Hao:
Acquisition method of target leveling height based on machine vision. - Neetu Singla
, Jyotsna Singh, Sushama Nagpal:
Raven finch optimized deep convolutional neural network model for intra-frame video forgery detection. - Abdullah Talha Kabakus
:
A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security. - Qingpeng Li, Gang Wang
, Yang Zhang, Qin Yang:
Analysis of user electricity consumption behavior based on density peak clustering with shared neighbors and attractiveness. - Amarendhar Reddy Madireddy
, Kongara Ravindranath
:
Dynamic virtual machine relocation system for energy-efficient resource management in the cloud. - Ramachandro Majji
, Om Prakash P. G, Subbiah Vairamuthu, Balasubramaniam Selva Rani:
Hybrid optimization based deep neuro fuzzy network for skin cancer detection. - Priti S. Lahane
, Manish Sharma
:
Secured information sharing for supply chain management based on blockchain technology and optimal key generation process.
Volume 35, Number 4, February 2023
Research Articles
- Thavasilingam Daniya
, Vigneshwari Srinivasan
:
Shuffled shepherd social optimization based deep learning for rice leaf disease classification and severity percentage prediction. - Devarayapattana Siddalingaiah Sahana
, Chandrasekaran Gopala Krishnan
:
Certificate revocation schemes for providing secure QoS in MANETs. - Tao Ye, Wenting Li, Jiangjiang Zhang
, Zhihua Cui
:
A novel multi-objective immune optimization algorithm for under sampling software defect prediction problem. - Akhilesh Kumar Singh
, Zahid Raza
:
A framework for IoT and blockchain based smart food chain management system. - Senol Ergunsah, Vedat Tümen
, Selahattin Kosunalp
, Kubilay Demir:
Energy-efficient animal tracking with multi-unmanned aerial vehicle path planning using reinforcement learning and wireless sensor networks. - Sonia Sharma
, Rajendra Kumar Bharti
:
New efficient Hadoop scheduler: Generalized particle swarm optimization and simulated annealing-dominant resource fairness. - Zhongjun Yang, Zhi Liu
, Xuejun Zong, Guogang Wang:
An optimized adaptive ensemble model with feature selection for network intrusion detection. - Zhen Wei, Jinghuan Nie:
Research on color fusion model of historic and cultural blocks in Shanghai based on deep learning algorithm-take Tianzifang as an example. - Chitti Babu Karakati
, Sethukarasi Thirumaaran:
Software code refactoring based on deep neural network-based fitness function. - Ramaiah Pushpa
, Maadappa Siddappa:
Fractional Artificial Bee Chicken Swarm Optimization technique for QoS aware virtual machine placement in cloud. - Abdul Majid
, Shakeel Ahmad, Muhammad Aslam
, Muhammad Kashif:
A robust Kibria-Lukman estimator for linear regression model to combat multicollinearity and outliers. - Srikrishna Iyer, Thangappa Velmurugan
, Periasamy Prakasam
, Durairaj Sumathi, Thengalpalayam Rajamanickam Suresh Kumar
:
Support Vector Machine based spectrum handoff scheme for seamless handover in Cognitive Radio Networks. - Mohana Ramaiyar Sundaram
, Iwin Thanakumar Joseph Swamidason
, Velliangiri Sarveshwaran
:
Parkinson's disease detection using sea lion shuffled shepherd optimization assisted deep maxout network. - Mouthami Kuppusamy
, Anandamurugan Selvaraj
:
A novel hybrid deep learning model for aspect based sentiment analysis. - Junguo Liao
, Haifeng Wang
, June Wu:
A multikey fully homomorphic encryption privacy protection protocol based on blockchain for edge computing system. - Sinciya Ponnupilla Omana
, Jawad Ahmad Dar, Thevasigamani Rajesh Kumar, Arpakkam Karuppan Sampath, Sudhir Sharma:
Henry gas bird swarm optimization algorithm-based deep learning for brain tumor classification using magnetic resonance imaging. - Celal Öztürk
, Murat Tasyürek
, Mehmet Ugur Türkdamar
:
Transfer learning and fine-tuned transfer learning methods' effectiveness analyse in the CNN-based deep learning models. - Renwang Song
, Lei Yang, Linying Chen, ZengShou Dong:
Research on frequency band sparse optimization algorithm in health index of rolling bearing. - Bala Krishna Manash Enturi
, A. Suhasini, Narayana Satyala:
Intelligent skin cancer diagnosis using adaptive k-means segmentation and deep learning models. - Deepak Dahiya
:
Hybrid classifier strategy with tuned training weights for distributed denial of service attack detection.
Volume 35, Number 5, February 2023
Research Articles
- Akhileshwar Prasad Agrawal
, Nanhay Singh:
A hybrid intelligently initialized particle swarm optimizer with weight factored binary gray wolf optimizer for mitigation of security issues in Internet of Things and sensor nodes. - Muhammad Faraz Hyder
, Waqas Ahmed, Maaz Ahmed
:
Toward deceiving the intrusion attacks in containerized cloud environment using virtual private cloud-based moving target defense. - Srinivasan Krishnasamy
, Murugasan Rajiah, Krishna Kumari SenthilKumar, Shanker Nagalingam Rajendiran:
Association rule-based multilevel regression pricing and artificial neural networks based land selling price prediction based on market value. - Jia Zhao
, Pengyu Cheng, Jiazhen Hou, Tanghuai Fan, Longzhe Han:
Short-term load forecasting of multi-scale recurrent neural networks based on residual structure. - B. C. Preethi
, George Sugitha, Kavitha G.:
Cycle-consistent generative adversarial network optimized with water strider optimization algorithm fostered intrusion detection framework for securing cloud computing environment. - Hanyu Xue
, Bo Liu
, Xin Yuan
, Ming Ding
, Tianqing Zhu
:
Face image de-identification by feature space adversarial perturbation. - Prasanna Deshpande
, Sidharth Dinesh, Apurva Umredkar, Ashwin G. Kothari
:
Improved search and rescue optimization based load balancing scheme of CCTV footage on edge computing environment. - Tejas M. Modi
, Pravati Swain:
Enhanced routing using recurrent neural networks in software defined-data center network. - Arnapurna Panda
:
Determining approximate solution of partial differential equations using radial basis function model trained with parallel symbiotic organisms search algorithm. - Adnan Umer, Adnan Noor Mian
, Omer F. Rana
:
Predicting machine behavior from Google cluster workload traces. - Jing Wang
, Haoxiang Jie, Yue Jiang:
Group-guided artificial bee colony algorithm with elastic adjustment strategy. - Shang-Qun Xie, Hanxiao Suo, Rui Zhou, Juanhua Zhu, Man Fan
:
Numerical study on over-pressure performance of premixed explosion in utility tunnel. - Jin Xu
, Huiqun Yu, Guisheng Fan
, Jiayin Zhang
:
Uncertainty-aware scheduling of real-time workflows under deadline constraints on multi-cloud systems. - Mohammad Bawaneh
, Vilmos Simon:
Novel traffic congestion detection algorithms for smart city applications. - Wen Huang
, Ming Zhuo, Tianqing Zhu
, Shijie Zhou, Yongjian Liao:
Differential privacy: Review of improving utility through cryptography-based technologies. - Salih Erdem Erol
, Çagla Aksoy, Seref Sagiroglu:
Social big data applications and challenges. - Sathya Ramasamy
, Vaidehi Kaliyaperumal:
A hybridized channel selection approach with deep convolutional neural network for effective ovarian cancer prediction in periodic acid-Schiff-stained images. - Arati Kushwaha
, Prashant K. Srivastava, Ashish Khare
:
Human activity recognition based on integration of multilayer information of convolutional neural network architecture. - Mengmeng Yang
, Kwok-Yan Lam, Tianqing Zhu
, Chenghua Tang:
SPoFC: A framework for stream data aggregation with local differential privacy. - Pavithra M
, Parvathi RMS:
Optimizing minimum spanning tree using stochastic-Variable neighborhood search for efficient clustering of cancer gene data.
Volume 35, Number 6, 2023
Research Articles
- Ramasamy Rajeswari
, Manickam Prabhakar, Govindhan Padmapriya, Balan Santhosh Kumar:
Blood vessel detection using enhanced DeepJoint fuzzy clustering algorithm with deep Maxout network for glaucoma detection. 1 - Abhishek Srivastava
, Rajeev Paulus:
Coverage hole aware optimal cluster based routing for wireless sensor network assisted IoT using hybrid deep recurrent neural network. 1 - Mohammadreza Khani
, Ikhlas Abdel-Qader:
Machine learning based asynchronous computational framework for generalized Kalman filter. 1 - Michael Mary Adline Priya
, S. Joseph Jawhar:
Dropout AlexNet-extreme learning optimized with fast gradient descent optimization algorithm for brain tumor classification. 1 - Vimala Shanmugam
, Telu Venkata Madhusudhana Rao, Hanumantu Joga Rao, Balajee Maram
:
Internet of things based smart application for rice leaf disease classification using optimization integrated deep maxout network. 1 - Xuanxia Yao, Yang Li
, Zhiguo Shi, Kaijun Liu, Xiaojiang Du:
Android malware detection based on sensitive features combination. 1 - V. Brindha Devi
, Johny Elma K., Rooban S., Francis H. Shajin:
Self-attention based progressive generative adversarial network optimized with arithmetic optimization algorithm for kidney stone detection. 1 - Perumal Mahendran
, M. S. Kavitha
, R. Radhika, C. Kotteeswaran:
Design of all pass make over based capricious digital filter using eminent speed dual carry select adder and truncation and rounding approximate multiplier for image processing application. 1 - Manjunath Varchagall
, Prasad Adaguru Yogegowda
:
Early detection of liver disorders using hybrid soft computing techniques for optimal feature selection and classification. 1 - Di Li
, Yikun Hu, Guoqing Xiao, Mingxing Duan, Kenli Li
:
An active defense model based on situational awareness and firewalls. 1 - Kuldeep Singh Yadav
, Anish Monsley Kirupakaran, Rabul Hussain Laskar:
GCR-Net: A deep learning-based bare hand detection and gesticulated character recognition system for human-computer interaction. 1 - Mohammad Javadian, Sajad Hayati
, Vahid Ghasemi
:
An intelligent signboard to assign the speed limit on ways using ANN. 1 - Alireza Chamkoori
, Serajdean Katebi
:
Security and storage improvement in distributed cloud data centers by increasing reliability based on particle swarm optimization and artificial immune system algorithms. 1 - Çigdem Avci Salma
, Bedir Tekinerdogan
, Cagatay Catal
:
Analyzing the performance of long short-term memory architectures for malware detection models. 1 - Anitha Yarava
, Chigarapalle Shoba Bindu
:
An efficient trust inference model in online social networks using fuzzy petri nets. 1 - Mufeed Ahmed Naji Saif
, SK Niranjan Aradhya, Belal Abdullah Hezam Murshed
, Omar Abdullah Murshed Farhan Alnaggar, Issa Mohammed Saeed Ali
:
Multi-objective container scheduling and multi-path routing for elastic business process management in autonomic multi-tenant cloud. 1 - Abdul Wasay Mudasser
, Shah Aqueel Ahmed Abdul Gafoor:
Secure Internet of Things based hybrid optimization techniques for optimal centroid routing protocol in wireless sensor network. 1 - Lei Jiang
, Peng Yuan, Jing Liao, Qiongbing Zhang, Jianxun Liu
, Keqin Li:
Undersampling of approaching the classification boundary for imbalance problem. 1 - Anshuman Tyagi
, Pawan Singh
, Harsh Dev:
Proposed spatio-temporal features for human activity classification using ensemble classification model. 1 - Rahul Kumar Singh
, Manoj Kumar Sachan, Ram Bahadur Patel:
Cross-domain sentiment classification using decoding-enhanced bidirectional encoder representations from transformers with disentangled attention. 1
Volume 35, Number 7, 2023
Research Articles
- L. B. Lisha
, C. Helen Sulochana
:
Highly accurate blood vessel segmentation using texture-based modified K-means clustering with deep learning model. - Amrita
, Shivani Joshi
, Rajiv Kumar
, Avinash Dwivedi
, Vipin Rai
, Sansar Singh Chauhan
:
Water wave optimized nonsubsampled shearlet transformation technique for multimodal medical image fusion. - Muhammad Mubashir Khan
, Muhammad Faraz Hyder
, Shariq Mahmood Khan, Junaid Arshad
:
Ransomware prevention using moving target defense based approach. - Arulanandam Gnanaprakasam Aruna
, Manickam Sangeetha:
An effective veracity management for sentiment analysis in social media using crowdsourcing and multi-set feature learning. - Adewale F. Lukman
, Mohammad Arashi
, Vilmos Prokaj:
Robust biased estimators for Poisson regression model: Simulation and applications. - Ramraj Dangi
, Praveen Lalwani:
A novel hybrid deep learning approach for 5G network traffic control and forecasting. - Erdener Ozcetin
, Gürkan Öztürk:
A variable neighborhood search for Open Vehicle Routing Problem. - S. Saravanan
, D. Prabakar, S. S. Sathya
:
Trust aware ad hoc routing protocol with key management based mechanism and optimal energy-efficient cluster head selection in mobile ad hoc networks. - Nayani Sateesh
, Pasupureddy Srinivasa Rao, Davuluri Rajya Lakshmi:
Optimized ensemble learning-based student's performance prediction with weighted rough set theory enabled feature mining. - Chukhu Chunka, Subhasish Banerjee, Sachin Kumar Gupta
:
A secure communication using multifactor authentication and key agreement techniques in internet of medical things for COVID-19 patients. - Ramakrishna Guttula
, Ramesh Adireddy, Venkateswarlu Mannepally:
Hybrid optimization algorithm for optimal designing of microstrip patch antenna. - Balachandra Kumaraswamy
, Poonacha P. G:
An improved sub-harmonic to harmonic ratio method for pitch estimation and Shadja detection. - Pratheep Kumar P
, Mary Amala Bai V, Ram P. Krish:
Krill herd optimization algorithm with deep convolutional neural network fostered breast cancer classification using mammogram images. - Kamal Kumar Gola
, Brij Mohan Singh, Bhumika Gupta, Nishant Chaurasia
, Shikha Arya:
Multi-objective hybrid capuchin search with genetic algorithm based hierarchical resource allocation scheme with clustering model in cloud computing environment. - Elumalaivasan Poongavanam
, Padmanathan Kasinathan, Kulothungan Kanagasabai:
Taylor ant lion optimization-based generative adversarial networks for forecasting electricity consumption. - Çagatay Çetinkaya
:
Inference of P(X > Y) for the Burr-XII model under generalized progressive hybrid censored data with binomial removals. - Adlin Sheeba
, B. Uma Maheswari
:
An efficient fault tolerance scheme based enhanced firefly optimization for virtual machine placement in cloud computing. - Mallekedi Anand
, Anuj Jain, Manoj Kumar Shukla:
An optimized deep network based soil texture prediction and vegetation analysis using satellite image database. - Salih Berkan Aydemir
, Funda Kutlu Onay
:
Marine predator algorithm with elite strategies for engineering design problems. - Vahid Nosrati, Mohsen Rahmani
:
HMDE-FS: A homogeneous distributed ensemble feature selection framework based on resampling with/without replacement.
Volume 35, Number 8, 2023
Research Articles
- Saptashwa Mitra
, Maxwell Roselius, Pedro Andrade-Sanchez, John K. McKay, Sangmi Lee Pallickara:
Radix+: High-throughput georeferencing and data ingestion over voluminous and fast-evolving phenotyping sensor data. - Adrian Kummerländer
, Márcio Dorn
, Martin Frank, Mathias J. Krause:
Implicit propagation of directly addressed grids in lattice Boltzmann methods. - Malige Mahadevaiah Ramakrishna
, Vedanandam Karthikeyan:
UChOA-ANN based effective diagnostic model for early detection and accurate prediction of dengue affected blood samples. - Sathya Ramasamy
, Ananthi Selvarajan
, Vaidehi Kaliyaperumal, Aruchamy Prasanth
:
A hybrid location-dependent ultra convolutional neural network-based vehicle number plate recognition approach for intelligent transportation systems. - Babitha Alphonse
, Boyed Wesley Alfred Sylam:
Enhancement of video demosaicing techniques using optimization algorithm. - Lijesh Lekshmanan
, Arockia Selva Saroja George:
Landslide identification using water cycle particle swarm optimization-based deep generative adversarial network. - Pendela Kanchanamala
, Ramesh Karnati
, Palagiri Vijaya Bhaskar Reddy:
Hybrid optimization enabled deep learning and spark architecture using big data analytics for stock market forecasting. - Esther Mukoya
, Richard Rimiru, Michael W. Kimwele, Consolata Gakii, Grace Mugambi:
Accelerating deep learning inference via layer truncation and transfer learning for fingerprint classification. - Haoyi Zhao
, Bo Tao
, Ruyi Ma, Baojia Chen:
Manipulator trajectory tracking based on adaptive fuzzy sliding mode control. - Syed Khurram Jah Rizvi
, Muhammad Moazam Fraz
:
Robust malware clustering of windows portable executables using ensemble latent representation and distribution modeling. - Dani Reagan Vivek Joseph
, Shantha Selvakumari Ramapackiyam
:
Distributed job allocation using response threshold for heterogeneous robot team under deadline constraints. - Dakun Liu
, Guifen Chen, Yijun Wang:
Energy efficiency optimization routing decision scheme in three-dimensional wireless ad hoc network. - Karthik Ramamurthy
, Rashmi Dinesh Thekkath, Shivam Batra
, Sreejan Chattopadhyay:
A novel deep learning architecture for disease classification in Arabica coffee plants. - Vikas Bajpai
, Anukriti Bansal
, Subrat Kumar Dash:
A deep and wide neural network to predict summer monsoon rainfall using time series data. - Vijay Raviprabhakaran
:
Quorum sensing centered bacterial horde algorithm for global optimization. - Oguzhan Mehmet Günes, Pelin Kasap
, Burcin Seyda Çorba Zorlu:
The comparison of machine learning classification algorithms used to diagnose liver cirrhosis disease and a brief review. - S. Senthilkumar
, V. Samuthira Pandi, T. Sripriya, N. Pragadish:
Design of recustomize finite impulse response filter using truncation based scalable rounding approximate multiplier and error reduced carry prediction approximate adder for image processing application. - Selvin Ebenezer Selvaraj
, Raghuveera Tripuraribhatla:
Optimization integrated generative adversarial network for occluded text recognition with language modeling. - Arezoo Khatibi
, Omid Khatibi:
Using dynamic voltage frequency scaling and service-level agreement to reduce energy consumption in cloud datacenters based on distance. - Muhammad Zaid, Muhammad Waheed Akram, Amna Rizvi, Syed Khurram Jah Rizvi
:
Blockchain based integrity assurance framework for COVID-19 information management & decision making at National Command Operation Center, Pakistan.
Volume 35, Number 9, 2023
Research Articles
- Miran Taha
, Aree Ali:
Smart algorithm in wireless networks for video streaming based on adaptive quantization. - Hong Chen
, Yiping Wen
, Yuan Wang:
An energy-efficient method of resource allocation based on request prediction in multiple cloud data centers. - Adaleta Gicic
, Dzenana Donko
, Abdulhamit Subasi
:
Intelligent credit scoring using deep learning methods. - Hesam Rezaei, Ali Ghaffari
:
QoS-based routing scheme in software-defined networks using fuzzy analytic hierarchy process. - Mallikarjuna Rao Y.
, Munagala Surya Bhupal Rao
, P. Veeresh
, Y. Narasimha Reddy, M. M. Raghavendra:
Adaptive leaf abnormality segmentation and improved plant disease classification by tuned long short-term memory with recurrent neural network. - Veera Sekhar Reddy Bhumireddypalli
, Srinivas Rao Koppula, Neeraja Koppula:
Enhanced conditional random field-long short-term memory for name entity recognition in English texts. - Nandan Banerji
, Subhrabrata Choudhury:
Auction inspired service replication for context-aware IoT environment. - Tareek M. Pattewar
, Dinesh Jain, B. V. Kiranmayee
:
A Buffalo-based bi-directional recurrent paradigm for Indian stock market prediction. - Joshua Reginald Pullagura
, Dhulipalla Venkata Rao:
Black-hole attack and counter measure in ad hoc networks using traditional routing optimization. - Shweta Bondre
, Dipti Patil:
Recent advances in agricultural disease image recognition technologies: A review. - Guiqiu Hu, Xiji Hu, Somayeh Pouramini
:
Thermal comfort and energy performance improvement by optimization of shading devices using improved Battle Royal algorithm. - Emre Yalcin
, Alper Bilge
:
Popularity bias in personality perspective: An analysis of how personality traits expose individuals to the unfair recommendation. - Yuanyuan Shen, Manman Peng
, Qiang Wu, Guoqi Xie:
Multigraph learning for parallelism discovery in sequential programs. - Mahdi Chehimi
, Mohamad Khattar Awad, Mohammed Al-Husseini
, Ali Chehab:
Machine learning-based anti-jamming technique at the physical layer. - Haize Hu
, Jianxun Liu, Xiangping Zhang:
Multilayer self-attention residual network for code search. - Wanshan Xu
, Jianbiao Zhang, Yilin Yuan
, Xiao Wang:
Symmetric searchable encryption with supporting search pattern and access pattern protection in multi-cloud. - Madhu Kirola
, Minakshi Memoria
, Ankur Dumka:
Optimized U-Net convolutional neural network based breast cancer prediction for accuracy increment in big data. - Eunice Jennifer Robert
, Jude Hemanth Duraisamy
:
A review on computational methods based automated sign language recognition system for hearing and speech impaired community. - Pandian Suresh
, Selvaraj Shobana
, Ganesan Ramya, Manasea Selvin Belsam Jeba Ananth
:
Hybrid optimization enabled multi-aggregator-based charge scheduling of electric vehicle in internet of electric vehicles. - Fadi Barbàra
, Claudio Schifanella
:
MP-HTLC: Enabling blockchain interoperability through a multiparty implementation of the hash time-lock contract.
Volume 35, Number 10, 2023
Research Articles
- Mohammed Saud Ali Al-Fadheeli, Yassine Bouteraa, Adil Hussein Mohammed, Hayder Mahmood Salman, Ghadir Ghasemi
:
Predicting building energy utilization with energy plus simulation and advanced sea lion optimization algorithm based on Elman neural network. - Levent Sabah
, Mehmet Simsek
:
A new fast entropy-based method to generate composite centrality measures in complex networks. - Marios D. Dikaiakos
, Nikolas G. Chatzigeorgiou, Athanasios Tryfonos, Andreas Andreou, Nicholas Loulloudes, George Pallis, George E. Georghiou:
A cyber-physical management system for medium-scale solar-powered data centers. - Amit Singh
:
Opportunistic coding across on-route dominating nodes in a flow-oriented SDN enabled WSN. - Vigneshwari Kothandaraman
:
Binary swallow swarm optimization with convolutional neural network brain tumor classifier for magnetic resonance imaging images. - Ben Cao
, Jianxun Liu:
Combining bidirectional long short-term memory and self-attention mechanism for code search. - Murat Erhan Çimen
, Zeynep Garip
, Ali Fuat Boz:
Comparison of metaheuristic optimization algorithms for numerical solutions of optimal control problems. - Mingxue Ouyang
, Jianqing Xi, Weihua Bai
, Keqin Li:
A container deployment strategy for server clusters with different resource types. - Venkata Ratnam Ganji
, Aparna Chaparala, Radhika Sajja
:
Shuffled shepherd political optimization-based deep learning method for credit card fraud detection. - Selvaraj Saravanakumar
, Thangavel Saravanan
:
Secure personal authentication in fog devices via multimodal rank-level fusion. - Pooja Tyagi, Saru Kumari
, Mridul Kumar Gupta
, Chien-Ming Chen
, Tsu-Yang Wu, Sachin Kumar
:
A secure protocol for patient monitoring in wireless body area networks. - K. Karthikeyan, P. Madhavan
:
Multilayer privacy-preserving model for security and privacy access control in edge computing. - Sathiyandrakumar Srinivasan
, P. Deepalakshmi:
An innovative malware detection methodology employing the amalgamation of stacked BiLSTM and CNN+LSTM-based classification networks with the assistance of Mayfly metaheuristic optimization algorithm in cyber-attack. - Amanjot Kaur
, Nitin Auluck
:
Real-time trust aware scheduling in fog-cloud systems. - Aakansha Garg
, Rajeev Arya
, Maheshwari Prasad Singh:
An integrated approach for dual resource optimization of relay-based mobile edge computing system.
Volume 35, Number 11, 2023
Editorial
- Jacir Luiz Bordin, Yasuaki Ito:
International Symposium on Computing and Networking (CANDAR 2019) special issue.
Special Issue Papers
- Daisuke Takafuji
, Koji Nakano
, Yasuaki Ito
:
Efficient parallel implementations to compute the diameter of a graph. - Max Plauth
, Joan Bruguera Micó, Andreas Polze:
Improved data transfer efficiency for scale-out heterogeneous workloads using on-the-fly I/O link compression. - Paulo V. G. Farias
, Tulio A. Lima, Jacir Luiz Bordim:
Mitigating message dissemination issues in safety applications for vehicular ad hoc networks. - Grégory Bénassy, Fukuhito Ooshita
, Michiko Inoue
:
Eventually consistent distributed ledger despite degraded atomic broadcast. - Ryota Yasudo
, Koji Nakano
, Michihiro Koibuchi, Hiroki Matsutani, Hideharu Amano:
Designing low-diameter interconnection networks with multi-ported host-switch graphs. - Naoki Matsumura, Yasuaki Ito
, Koji Nakano
, Akihiko Kasagi, Tsuguchika Tabaru:
A novel structured sparse fully connected layer in convolutional neural networks. - Yotam Ashkenazi, Shlomi Dolev, Sayaka Kamei
, Fukuhito Ooshita
, Koichi Wada:
Forgive and forget: Self-stabilizing swarms in spite of Byzantine robots.
Editorial
- Abderrahim Ait Wakrime
, Mohamed Sellami
, Riadh Ben Halima
:
Future internet services and applications.
Special Issue Papers
- Marwa Elleuch
, Nassim Laga, Oumaima Alaoui Ismaili, Walid Gaaloul:
Multi-perspective business process discovery from messaging systems: State-of-the art. - Zakaria Maamar
, Noura Faci, Said Elnaffar, Fadwa Yahya, Khouloud Boukadi
, Djamal Benslimane
:
Semantic thingsourcing for the Internet of Things. - Sahar Allegue
, Takoua Abdellatif
, Houssem El Abed:
SBM: A Smart Budget Manager in banking using machine learning, NLP, and NLU. - Fatima Laiche
, Asma Ben Letaifa
, Taoufik Aguili:
QoE-aware traffic monitoring based on user behavior in video streaming services. - Marwa Boulakbech
, Nizar Messai, Yacine Sam, Thomas Devogele:
Configuration approach for personalized travel mashup. - Ilias Mavridis
, Helen D. Karatza
:
Orchestrated sandboxed containers, unikernels, and virtual machines for isolation-enhanced multitenant workloads and serverless computing in cloud. - Abdelkader Ouared
, Yassine Ouhammou:
Capitalizing the database cost models process through a service-based pipeline.
Volume 35, Number 12, 2023
Research Articles
- Subhadra Perumalla
, Santanu Chatterjee, A. P. Siva Kumar:
Secure communication using multilevel authentication strategy in Internet of Drones. - R. Raja Kumar
, Jegadeesh Athimoolam, Ahilan Appathurai, Surendiran Rajendiran
:
Novel segmentation and classification algorithm for detection of tomato leaf disease. - Jayalakshmi Venkataraman
, Lakshmi Mohandoss:
FBO-RNN: Fuzzy butterfly optimization-based RNN-LSTM for extracting sentiments from Twitter Emoji database. - Thota Seshu Chakravarthy
, Lokesh Selvaraj
:
NNPEC: Neighborhood node propagation entropy centrality is a unique way to find the influential node in a complex network. - Nihal Gaouar, Mohamed Lehsaini
, Tawfiq Nebbou:
CCITL: A cloud-based smart traffic management protocol using intelligent traffic light system in VANETs. - Lili Xu, Houfu Peng, Xing Lu, Daoxun Xia
:
Learning to generalize aerial person re-identification using the meta-transfer method. - Pramod Kumar Poladi, K. Sagar:
Reinforcement learning and neuro-fuzzy GNN-based vertical handover decision on internet of vehicles. - Jianxun Liu
, Runbin Xie, Guosheng Kang
, Yiping Wen
:
Spatial-temporal aware service composition for production factors under industrial internet. - Vamshi Adouth
, Eswari Rajagopal:
Blockchain-based certificateless public auditing with privacy-preserving for cloud-based cyber-physical systems. - Karthika Perumal
, Arockiasamy Karmel
:
Optimized deep neural network based DDoS attack detection and bait mitigation process in software defined network.
Volume 35, Number 13, 2023
Editorial
- Rongbo Zhu
, Ashiq Anjum, Hongxiang Li, Maode Ma:
Edge intelligence-enabled cyber-physical systems.
Special Issue Papers
- Jinchao Chen
, Pengcheng Han, Yifan Liu, Xiaoyan Du:
Scheduling independent tasks in cloud environment based on modified differential evolution. - Jianquan Zhang
, Xiao Xiao:
Soft fusion-based cooperative spectrum sensing using particle swarm optimization for cognitive radio networks in cyber-physical systems. - Feng Yin, Rongjun Yang, Hongxin Yu, Wei Zhou, Yuanjun Zhao
, Shuai Zhang:
Edge intelligence-enabled supply chain financial model based on Business-to-Business e-business platforms. - Bakkiam David Deebak
, Fadi Al-Turjman
:
Lightweight privacy-aware secure authentication scheme for cyber-physical systems in the edge intelligence era. - Xiaozhu Liu
, Bang Li:
Stylized image resolution enhancement scheme based on an improved convolutional neural network in cyber-physical systems. - Jiayan Gu
, Yan Wu, Ashiq Anjum
, John Panneerselvam
, Yao Lu, Bo Yuan
:
Optimization of service addition in multilevel index model for edge computing. - Naila Mukhtar
, Mohamad Ali Mehrabi
, Yinan Kong, Ashiq Anjum:
Edge enhanced deep learning system for IoT edge device security analytics. - Jun Ge, Lei-lei Shi
, Lu Liu
, Hongwei Shi, John Panneerselvam:
Edge intelligence-enabled dynamic overlapping community discovery and evolution prediction in social media data streams. - Chao Tan
, Genlin Ji, Xiaoqian Zeng:
Multi-label enhancement manifold learning algorithm for vehicle video. - Qianqian Luo
, Zhenzhou Lin, Guohua Yang, Xiaofeng Zhao:
DEC: A deep-learning based edge-cloud orchestrated system for recyclable garbage detection. - Runqun Xiong
, Lan Xiong
, Feng Shan, Junzhou Luo
:
SBHA: An undetectable black hole attack on UANET in the sky. - Xiao Zheng
, Houkai Liu, Xiujun Wang, Xuangou Wu, Feng Yu:
Timo: In-memory temporal query processing for big temporal data. - Gaofeng He
, Bingfeng Xu
, Junjie Zhao, Yadong Shi:
Architecture-oriented security strategy determination for cyber-physical systems. - Yumeng Tan
, Xupeng Fu, Jianbo Zhu, Lina Chen:
A improved detection method for lung nodule based on multi-scale 3Dconvolutional neural network. - Hai Wang
, Yan Wang, Yuhui Ma, Chenguang Qin, Kan Zhang
, Ling Gao, Jie Ren:
Noise processing and multitask learning for far-field dialect classification. - Gang Li
, Yuan Mengge, Yu Li, Jingang Huang, Ling Zhang, Haixuan Zhang, Zhenhua Han:
Seismic P-wave first-arrival picking model based on EQK-IncResNet. - Run Fang Hao, Chuang Liu
, Yong Qiang Cheng:
New fusion features convolutional neural network with high generalization ability on rolling bearing fault diagnosis.
Volume 35, Number 14, 2023
Special Issue Papers
- Hiroshi Kagawa, Yasuaki Ito
, Koji Nakano
, Ryota Yasudo
, Yuya Kawamata, Ryota Katsuki, Yusuke Tabata, Takashi Yazane, Kenichiro Hamano:
High-throughput FPGA implementation for quadratic unconstrained binary optimization. - Toshi Ikeya, Masaki Aida
:
Derivation and characteristics of closed-form solutions of the fundamental equations for online user dynamics. - Junya Nakamura
, Sayaka Kamei
, Yukiko Yamauchi:
Evacuation from various types of finite two-dimensional square grid fields by a metamorphic robotic system. - Tomohiro Imanaga, Koji Nakano
, Ryota Yasudo
, Yasuaki Ito
, Yuya Kawamata, Ryota Katsuki, Yusuke Tabata, Takashi Yazane, Kenichiro Hamano:
Simple iterative trial search for the maximum independent set problem optimized for the GPUs. - Max Plauth
, Felix Eberhardt, Andreas Grapentin, Andreas Polze:
Improving the accessibility of NUMA-aware C++ application development based on the PGASUS framework. - Hongsheng Hu
, Gillian Dobbie, Zoran Salcic, Meng Liu
, Jianbing Zhang, Lingjuan Lyu, Xuyun Zhang
:
Differentially private locality sensitive hashing based federated recommender system. - Daniel Rivas-Barragan
, Francesc Guim
, Jordà Polo
, David Carrera
:
Performance characterization of video analytics workloads in heterogeneous edge infrastructures. - Xiaojing Yin
, Jiwei Huang
, Lei Liu, Wei He, Lizhen Cui
:
An reinforcement learning approach for allocating software resources. - Dharma Teja Vooturi
, Girish Varma, Kishore Kothapalli
:
Ramanujan bipartite graph products for efficient block sparse neural networks. - Fei Teng, Rui Zhu
, Yabo Zhou, Maoru Chi, Haibo Zhang
:
A lightweight model of wheel-rail force inversion for railway vehicles. - Rongbin Xu
, Zhiqiang Liu, Yuanmo Lin, Xianliang Feng, Hui Lin, Ying Xie
:
Unified adaptive deep classification for industrial real-time situation awareness in edge environment. - Sonia Souabi
, Asmaâ Retbi, Mohammed Khalidi Idrissi, Samir Bennani:
A recommendation approach based on correlation and co-occurrence within social learning network. - Jean-Sébastien Lerat
, Sidi Ahmed Mahmoudi
, Saïd Mahmoudi
:
Single node deep learning frameworks: Comparative study and CPU/GPU performance analysis. - Jing Chen, Kun Ma
, Ke Ji, Zhenxiang Chen:
TM-HOL: Topic memory model for detection of hate speech and offensive language. - Laila Bouhouch
, Mostapha Zbakh
, Claude Tadonki:
Dynamic data replication and placement strategy in geographically distributed data centers.
Erratum
- Erratum.
Volume 35, Number 15, 2023
SPECIAL ISSUE PAPERS
- Nguyen Thanh Tung, Le Duc Thinh:
Design cloud-fog systems based on the energy of Internet of Things devices. - Le Xuan Truong
:
An approach to evaluating the efficiency of a solution for visualization problem. - Hiep Xuan Huynh
, Be Ut Lai, Nghia Duong-Trung
, Thanh-Hai Nguyen
, Cang Thuong Phan
:
Modeling population dynamics for information dissemination through Facebook. - Tran Ngoc Thinh, Tran Hoang Quoc Bao, Duc-Minh Ngo, Cuong Pham-Quoc
:
High-performance anomaly intrusion detection system with ensemble neural networks on reconfigurable hardware. - Nguyen Van Han
, Nguyen Cong Hao:
Algorithm for reasoning with words based on linguistic fuzzy cognitive map. - Hafiz Mahfooz Ul Haque
, Kiran Saleem
, Ahmad Salman Khan
:
Modeling belief-desire-intention reasoning agents for situation-aware formalisms. - Thanh-Hai Nguyen
, Toan Bao Tran
, Phuong Ha Dang Bui
:
An effective way for Taiwanese stock price prediction: Boosting the performance with machine learning techniques. - Hafiz Mahfooz Ul Haque
, Salwa Muhammad Akhtar, Ijaz Uddin
:
Contextual defeasible reasoning framework for heterogeneous knowledge sources. - Zeeshan Saleem, Adi Alhudhaif
, Kashif Naseer Qureshi
, Gwanggil Jeon
:
Context-aware text classification system to improve the quality of text: A detailed investigation and techniques. - Haidar Zulfiqar, Hafiz Mahfooz Ul Haque
, Faiza Tariq, Rashad Mahmood Khan:
A survey on smart parking systems in urban cities. - Yin-Goo Yim, Hyeon-Jun Jang, Hyun-Wook Jin
:
QoS for best-effort batch jobs in container-based cloud. - Marek Nowicki
, Lukasz Górski
, Piotr Bala
:
Performance evaluation of Java/PCJ implementation of parallel algorithms on the cloud (extended version). - Alper Tufek
, Mehmet S. Aktas
:
On the provenance extraction techniques from large scale log files. - Sangho Yeo, Minho Bae, Minjoong Jeong, Oh-Kyoung Kwon, Sangyoon Oh
:
Crossover-SGD: A gossip-based communication in distributed deep learning for alleviating large mini-batch problem and enhancing scalability. - Taylor L. Groves
, Naveen Ravichandrasekaran, Brandon Cook
, Noel Keen
, David Trebotich, Nicholas J. Wright, Bob Alverson, Duncan Roweth, Keith D. Underwood:
Not all applications have boring communication patterns: Profiling message matching with BMM. - Samar Aseeri
, Anando Gopal Chatterjee, Mahendra K. Verma, David E. Keyes
:
A scheduling policy to save 10% of communication time in parallel fast Fourier transform. - Xingfu Wu
, Valerie Taylor:
Utilizing ensemble learning for performance and power modeling and improvement of parallel cancer deep learning CANDLE benchmarks. - Xingfu Wu
, Valerie Taylor, Zhiling Lan:
Performance and power modeling and prediction using MuMMI and 10 machine learning methods. - Ryan E. Grant
, Simon D. Hammond, James H. Laros III, Michael J. Levenhagen, Stephen L. Olivier
, Kevin T. Pedretti
, Lee Ward, Andrew J. Younge:
Enabling power measurement and control on Astra: The first petascale Arm supercomputer.
Volume 35, Number 16, 2023
SPECIAL ISSUE PAPERS
- Anusha Vangala, Ashok Kumar Das, Jong-Hyouk Lee
:
Provably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment. - Limei Xiao, Yachao Zhang, Weizhe Gao
, Dayou Xu
, Ce Li
:
An object perception and positioning method via deep perception learning object detection. - Minho Lee, Libor Mesicek, Kitae Bae, Hoon Ko
:
AI advisor platform for disaster response based on big data. - Geon Ju Lee, Jason J. Jung
, David Camacho:
Exploiting weighted association rule mining for indicating synergic formation tactics in soccer teams. - Luong Vuong Nguyen
, Tri-Hai Nguyen
, Jason J. Jung
, David Camacho:
Extending collaborative filtering recommendation using word embedding: A hybrid approach. - Mengyi Zhang
, Zhaokai Kong
, Wenjun Zhu, Fei Yan, Chao Xie:
Pulmonary nodule detection based on 3D feature pyramid network with incorporated squeeze-and-excitation-attention mechanism. - Om Prakash Singh
, Chandan Kumar, Amit Kumar Singh
, Maheshwari Prasad Singh, Hoon Ko:
Fuzzy-based secure exchange of digital data using watermarking in NSCT-RDWT-SVD domain. - Wei Li, Guanxi Shen, Jingfang Zhang, Dong Liu, Chang Choi
:
A LoRaWAN monitoring system for large buildings based on embedded edge computing in indoor environment. - Kicheol Park, Bongjae Kim
:
Dynamic neuromorphic architecture selection scheme for intelligent Internet of Things services. - Kwangcheol Rim
, Pankoo Kim, Hoon Ko
:
Gradient descent for quadratic functions using geometric mean and the Kai Fang method. - Sinwoo Yoo
, Yeongbin Ryu, Sunghoon Shin
, Hyukjun Oh:
Analysis and classification of drone sounds from digital media. - Nitin K. Tyagi
, Mukta Goyal
:
Blockchain-based smart contract for issuance of country of origin certificate for Indian Customs Exports Clearance. - Suhyeon Lee
, Seungjoo Kim
:
Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies. - Xing Fan
, Baoning Niu:
A Bloom filter variant for Blockchain. - Luca Spalazzi
, Francesco Spegni
, Alessandra Corneli
, Berardo Naticchia
:
Blockchain based choreographies: The construction industry case study. - Stefano Bistarelli, Rocco De Nicola
, Letterio Galletta
, Cosimo Laneve
, Ivan Mercanti
, Adele Veschetti
:
Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays.
RETRACTION
- Retraction.
- Retraction.
- Retraction.
- Retraction.
- Retraction.
- Retraction.
- Retraction.
- Retraction.
- Retraction.
- Retraction.
Volume 35, Number 17, 2023
SPECIAL ISSUE PAPERS
- Vinicius S. da Silva, Angelo Gaspar Diniz Nogueira, Everton Camargo de Lima, Hiago Mayk G. de A. Rocha
, Matheus S. Serpa
, Marcelo Caggiani Luizelli, Fábio D. Rossi
, Philippe O. A. Navaux, Antonio Carlos Schneider Beck, Arthur Francisco Lorenzon
:
Smart resource allocation of concurrent execution of parallel applications. - João Fellipe Uller, João Vicente Souto, Pedro Henrique Penna, Márcio Castro
, Henrique Cota de Freitas
, Jean-François Méhaut:
LWMPI: An MPI library for NoC-based lightweight manycore processors with on-chip memory constraints. - Rafael Stubs Parpinelli
, Mateus Boiani
, André E. P. Dias:
A massively parallel speciation-based differential evolution algorithm applied to the 3D-AB protein structure prediction. - Mariza Ferro
, Gabrieli Silva, Felipe B. de Paula, Vítor Vieira, Bruno Schulze:
Towards a sustainable artificial intelligence: A case study of energy efficiency in decision tree algorithms. - Matheus S. Serpa
, Eduardo H. M. Cruz
, Matthias Diener
, Arthur Francisco Lorenzon
, Antonio C. S. Beck, Philippe O. A. Navaux
:
Mitigating execution unit contention in parallel applications using instruction-aware mapping. - Daniela Catelan
, Ricardo Santos, Liana Duenha:
Evaluation and characterization of approximate arithmetic circuits. - Vanderson Martins do Rosario
, Anderson Faustino da Silva, André Felipe Zanella, Otávio Oliveira Napoli, Edson Borin:
Fast selection of compiler optimizations using performance prediction with graph neural networks. - Rhayssa Sonohata, Danillo Christi A. Arigoni, Eraldo Rezende Fernandes, Ricardo Ribeiro dos Santos, Liana Dessandre Duenha
:
Performance predictors for graphics processing units applied to dark-silicon-aware design space exploration. - Westerley Carvalho
, Michael Canesche
, Lucas Reis, José Augusto Miranda Nacif
, Ricardo S. Ferreira
:
Heterogeneous reconfigurable architectures for machine learning dataflows. - Lucas Bragança
, Michael Canesche
, Jeronimo Costa Penha
, Josué Campos, José Augusto Miranda Nacif
, Ricardo S. Ferreira:
Fast flow cloud: A stream dataflow framework for cloud FPGA accelerator overlays at runtime. - Junkai Feng, Haibin Zhang, Kaili Zhang
, Pengfei Zhao:
An inertial Douglas-Rachford splitting algorithm for nonconvex and nonsmooth problems. - Fengwei Li, Qingfang Ye, Hajo Broersma
, Xiaoyan Zhang
:
Polynomial algorithms for computing the isolated toughness of interval and split graphs. - Tonglai Liu
, Jigang Wu, Jiaxing Li
, Jingyi Li, Yidong Li:
Efficient decentralized access control for secure data sharing in cloud computing. - Jinyong Wang, Zhiqiu Huang, Xiaowei Huang, Tiexin Wang, Guohua Shen, Jian Xie:
An accident prediction architecture based on spatio-clock stochastic and hybrid model for autonomous driving safety. - Huanlong Zhang
, Yuxing Feng, Wanwei Huang, Jie Zhang, Jianwei Zhang:
A novel mutual aid Salp Swarm Algorithm for global optimization. - Sixiang Tan
, Wenzhong Yang, JianZhuang Lin, Weijie Yu:
Feature extraction and enhancement for real-time semantic segmentation. - Sai Ji, Dachuan Xu
, Min Li, Yishui Wang, Dongmei Zhang:
Stochastic greedy algorithms for maximizing constrained submodular + supermodular functions. - Weidong Zhu, Shiyou Qian
, Jiawei Xu, Guangtao Xue, Jian Cao, Yanmin Zhu, Wenjuan Li:
Lap: A latency-aware parallelism framework for content-based publish/subscribe systems. - Zhenning Zhang
, Longkun Guo
, Linyang Wang, Juan Zou:
One-pass streaming algorithm for monotone lattice submodular maximization subject to a cardinality constraint. - Sai Charan Regunta, Sai Harsh Tondomker, Kshitij Shukla, Kishore Kothapalli
:
Efficient parallel algorithms for dynamic closeness- and betweenness centrality. - Le Zou
, Yan-Ping Chen, Zhize Wu, Qian-Jing Huang, Xiao-Feng Wang:
A sweeping optimization algorithm for the global cosine fitting energy image segmentation model. - Zisen Fang
, Fumin Qi, Yichuan Dong, Yong Zhang, Shengzhong Feng:
Parallel tensor decomposition with distributed memory based on hierarchical singular value decomposition. - Huifeng Shi
, Kai Miao
, Xiaochen Ren:
Short-term load forecasting based on CNN-BiLSTM with Bayesian optimization and attention mechanism. - Bin Qi
, Kazuhiko Komatsu
, Masayuki Sato
, Hiroaki Kobayashi
:
A dynamic parameter tuning method for SpMM parallel execution. - Zhaohong Chen, Xin Long
, Long Chen, Yalan Wu, Jigang Wu, Shuangyin Liu:
Intra-cluster aggregation aware routing for distributed training in wireless sensor networks. - MohammadReza HoseinyFarahabady
, Javid Taheri
, Albert Y. Zomaya
, Zahir Tari
:
Energy efficient resource controller for Apache Storm. - Xingchun Liu
, Jingjing Yu
, Zhipeng Feng, Hongxv Wang, Hui Tian
:
Adaptive multi-layer clustering strategies based on capacity weight for Internet of Things. - Xinxin Han, Guichen Gao, Yang Wang, Hing-Fung Ting, Ilsun You, Yong Zhang:
Online data caching in edge computing.
Volume 35, Number 18, 2023
SPECIAL ISSUE PAPERS
- Dajiang Lei
, Ling Shen, Liping Zhang
, Weisheng Li:
Extraction-and-excitation deep neural network for pansharpening. - Kuang Mao
, Sai Wu, Jiajia He, Haichao Huang, Yanlong Yin, Zujie Ren:
Textile pattern recommendations with convolutional neural networks and autoencoder. - Xin Ning
, Fangzhe Nan, Shaohui Xu, Lina Yu, Liping Zhang:
Multi-view frontal face image generation: A survey. - Dajiang Lei
, Jie Huang, Hao Chen, Jie Li, Yu Wu:
Communication-efficient distributed large-scale sparse multinomial logistic regression. - Juanjuan Zhao
, Jiexia Ye, Minxian Xu
, Cheng-Zhong Xu
:
Practical model with strong interpretability and predictability: An explanatory model for individuals' destination prediction considering personal and crowd travel behavior. - Girum Dagnaw
, Ke Zhou, Hua Wang:
SACRO : Solid state drive-assisted chunk caching for restore optimization. - Yaxuan Lu, Weijun Li, Xin Ning
, Xiaoli Dong, Liping Zhang, Linjun Sun, Chuantong Cheng:
Blind image quality assessment based on the multiscale and dual-domains features fusion. - Junjie Zhang, Qiao Yin
, Weicheng Hu, Yunfeng Li, Hu Li, Nan Ye, Bingyao Cao:
EPA: The effective pipeline architecture for CNN accelerator with high performance and computing efficiency based on FPGA. - Xin Ning
, Xinran Wang, Shaohui Xu, Weiwei Cai
, Liping Zhang, Lina Yu, Wenfa Li:
A review of research on co-training. - Yuefeng Wang
, Kuang Mao
, Tong Chen, Yanglong Yin, Shuibing He, Gang Chen:
Accelerating real-time object detection in high-resolution video surveillance. - Xiubo Liang
, Qian Zhao, Yanyu Zhang, Hongyu Liu, Qifei Zhang:
EduChain: A highly available education consortium blockchain platform based on Hyperledger Fabric. - Shuang Li
, Xiaoli Dong, Yuan Shi, Baoli Lu, Linjun Sun, Wenfa Li:
Multi-angle head pose classification with masks based on color texture analysis and stack generalization. - Yi Liu
, Xiaozhou Guo, Kaijun Tan, Guoliang Gong, Huaxiang Lu:
Novel activation function with pixelwise modeling capacity for lightweight neural network design. - Amit Mankodi
, Amit Bhatt, Bhaskar Chaudhury
:
Performance prediction from simulation systems to physical systems using machine learning with transfer learning and scaling. - Payel Sadhukhan
, Sarbani Palt:
Oversampling the minority class using a dedicated fitness function and genetic algorithmic progression. - Jared H. McLean
, Sean B. Cleveland
, Michael Dodge II, Matthew P. Lucas, Ryan Longman
, Thomas W. Giambelluca
, Gwen A. Jacobs:
Building a portal for climate data - Mapping automation, visualization, and dissemination. - Diana M. Naranjo
, Sebastián Risco
, Germán Moltó, Ignacio Blanquer:
A serverless gateway for event-driven machine learning inference in multiple clouds. - Jared H. McLean
, Sean B. Cleveland
, Kolja Rotzoll, Scot K. Izuka, Jason Leigh, Gwen A. Jacobs, Ryan Theriot:
The Hawai'i Groundwater Recharge Tool. - Eric Verner
, Helen Petropoulos, Bradley T. Baker, Henry Jeremy Bockholt, Jill Fries, Anastasia Bohsali, Rajikha Raja
, Duc Hoai Trinh, Vince D. Calhoun
:
BrainForge: An online data analysis platform for integrative neuroimaging acquisition, analysis, and sharing. - Gabriele Pierantoni, Tamás Kiss
, Alexander Bolotov, Dimitrios Kagialis, James DesLauriers
, Amjad Ullah, Huankai Chen, David Chan You Fee, Hai-Van Dang, József Kovács
, Anna Belehaki, Themistocles Herekakis
, Ioanna Tsagouri, Sandra Gesing:
Toward a reference architecture based science gateway framework with embedded e-learning support. - Patrick Diehl
, Steven R. Brandt:
Interactive C++ code development using C++Explorer and GitHub classroom for educational purposes. - Sandi Gec
, Petar Kochovski, Dejan Lavbic
, Vlado Stankovski
:
Multi-party smart contract for an AI services ecosystem: An application to smart construction. - Massimiliano Assante
, Leonardo Candela
, Donatella Castelli, Roberto Cirillo
, Gianpaolo Coro
, Andrea Dell'Amico, Luca Frosini
, Lucio Lelii
, Marco Lettere, Francesco Mangiacrapa
, Pasquale Pagano
, Giancarlo Panichi
, Tommaso Piccioli, Fabio Sinibaldi
:
Virtual research environments co-creation: The D4Science experience. - Iain Barclay
, Alun D. Preece, Ian J. Taylor, Swapna Krishnakumar Radha, Jarek Nabrzyski:
Providing assurance and scrutability on shared data and machine learning models with verifiable credentials. - Roland Oruche, Eric D. Milman, Mauro Lemus Alarcon, Xiyao Cheng, Ashish Pandey, Songjie Wang, Prasad Calyam
, Kerk F. Kee:
Science gateway adoption using plug-in middleware for evidence-based healthcare data management. - Marcelo K. Moori
, Hiago Mayk G. de A. Rocha
, Janaina Schwarzrock
, Arthur Francisco Lorenzon
, Antonio Carlos Schneider Beck
:
Improving the efficiency of graph algorithm executions on high-performance computing. - Thais Aparecida Silva Camacho
, Vanderson Martins do Rosario
, Otávio Oliveira Napoli
, Edson Borin
:
PB3Opt: Profile-based biased Bayesian optimization to select computing clusters on the cloud. - Kleber Kruger
, Ricardo Pannain
, Rodolfo Azevedo
:
DONUTS: An efficient method for checkpointing in non-volatile memories. - Leonardo Rebouças de Carvalho
, Alba Cristina Magalhaes Alves de Melo, Aletéia P. F. Araújo:
AFMC: An alignment framework for multiple computing services and providers. - Alan L. Nunes
, Alba C. M. A. Melo
, Claude Tadonki
, Cristina Boeres
, Daniel de Oliveira
, Lúcia Maria de Assumpção Drummond
:
Optimizing computational costs of Spark for SARS-CoV-2 sequences comparisons on a commercial cloud.
Volume 35, Number 19, 2023
SPECIAL ISSUE PAPERS
- Liujie Yuan, Shaobo Zhang
, Gengming Zhu, Karim Alinani:
Privacy-preserving mechanism for mixed data clustering with local differential privacy. - Tao Peng
, Kejian Guan, Jierong Liu, Jianer Chen, Guojun Wang, Jiawei Zhu:
A blockchain-based mobile crowdsensing scheme with enhanced privacy. - Kishan Kumar Singh
, Vijay Kumar Jha
:
An optimized novel public cloud system to secure the medical record from third parties. - Peng Chen, Jixin Zhang, Jiageng Chen
, Weizhi Meng
:
MLCT: A multi-level contact tracing scheme with strong privacy. - Qiuling Chen
, Ayong Ye
, Ziwen Zhao, Jinbo Xiong:
The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles. - Fang Qi, Yingkai Zhao
, Md. Zakirul Alam Bhuiyan, Tao Hai
, Md. Monirul Islam, Shaobo Zhang
, Zhe Tang:
Unauthorized and privacy-intrusive human activity watching through Wi-Fi signals: An emerging cybersecurity threat. - Zhiniang Peng, Wei Zhou, Xiaogang Zhu, Youke Wu, Sheng Wen:
On the security of fully homomorphic encryption for data privacy in Internet of Things. - Siyu Luan
, Zonghua Gu
, Rui Xu, Qingling Zhao, Gang Chen:
LRP-based network pruning and policy distillation of robust and non-robust DRL agents for embedded systems. - Haoyu Liu, Shiwen Zhang
, Mengling Li, Wei Liang, Voundi Koe Arthur Sandor:
A real-time privacy-preserving scheme based on grouping queries for continuous location-based services. - Haiyong Bao, Zheng Xu
, Haibo Hong, Qinglei Kong, Haifeng Qian:
NLSP: A novel lattice-based secure primitive for privacy-preserving smart grid communications. - Danlei Du
, Entao Luo, Yang Yi, Tao Peng
, Xubin Li, Shaobo Zhang
, Xu Jiang, Tian Wang
:
Differential privacy protection method for trip-oriented shared data. - Yufeng Wang
, Xu Zhang, Jianhua Ma, Qun Jin:
LDP-Fed+: A robust and privacy-preserving federated learning based classification framework enabled by local differential privacy. - Linghe Zhu, Haibo Hong
, Mande Xie, Jun Yu:
DLPM: A dynamic location protection mechanism supporting continuous queries. - Yonghua Hu, Xin Zhang
, Shuying Wang, Wei Liang, Kuan-Ching Li
:
Research on global register allocation for code containing array-unit dual-usage register names. - Gaurav Pareek, Sumana Maiti
:
Efficient dynamic key-aggregate cryptosystem for secure and flexible data sharing. - Aiswarya S. Nair, Sabu M. Thampi
:
A location-aware physical unclonable function and Chebyshev map-based mutual authentication mechanism for internet of surveillance drones. - Tairi Chiba, Ren Ohmura, Junya Nakamura
:
Network bandwidth variation-adapted state transfer for geo-replicated state machines and its application to dynamic replica replacement. - Masahiro Shibata
, Sébastien Tixeuil:
Semi-uniform deployment of mobile robots in perfect ℓ $$ \ell $$ -ary trees. - Ranyelson Neres Carvalho
, Lucas Rodrigues Costa
, Jacir Luiz Bordim
, Eduardo A. P. Alchieri
:
DataPlane-ML: An integrated attack detection and mitigation solution for software defined networks. - Daisuke Takafuji
, Koji Nakano
, Yasuaki Ito
, Akihiko Kasagi:
GPU implementations of deflate encoding and decoding. - Tomohiro Ishigami, Teijiro Isokawa, Naotake Kamiura
, Hiroki Masumoto, Hitoshi Tabuchi:
Instillation checking using long short-term memories for ophthalmology patients. - Jiamian Huang, Yasuaki Ito
, Koji Nakano
:
Graphics processing unit-accelerated high-quality watercolor painting image generation. - Yoshiharu Tajima
, Masahiro Asaoka, Akihiro Tabuchi, Akihiko Kasagi, Tsuguchika Tabaru:
NEEBS: Nonexpert large-scale environment building system for deep neural network. - Rodrigo F. Bezerra
, Jacir Luiz Bordim
:
Predicting consecutive spectrum opportunities with hidden Markov models. - Yaodong Wang
, Yamin Li:
Hybrid interconnection networks for reducing hardware cost and improving path diversity based on fat-trees and hypercubes.
Volume 35, Number 20, 2023
SPECIAL ISSUE PAPERS
- Laura Promberger
, Rainer Schwemmer, Holger Fröning
:
Characterization of data compression across CPU platforms and accelerators. - Tu Mai Anh Do
, Loïc Pottier
, Rafael Ferreira da Silva
, Silvina Caíno-Lores, Michela Taufer, Ewa Deelman:
Performance assessment of ensembles of in situ workflows under resource constraints. - Cristian Peñaranda
, Carlos Reaño
, Federico Silla
:
Exploring the use of data compression for accelerating machine learning in the edge with remote virtual graphics processing units. - W. Pepper Marts, Andrew Worley, Prema Soundarajan
, Derek Schafer, Matthew G. F. Dosanjh, Ryan E. Grant, Purushotham V. Bangalore, Anthony Skjellum
, Sheikh K. Ghafoor:
Design of a portable implementation of partitioned point-to-point communication primitives. - Chaoyue Tan
, Yuling Chen, Xiaojun Ren, Changgen Peng:
A mobile energy trading scheme based on Lightning Network. - Weijin Jiang, Wanqing Zhang
, Pingping Chen
, Junpeng Chen, Yongxia Sun
, Ying Yang:
Quantity sensitive task allocation based on improved whale optimization algorithm in crowdsensing system. - Shuaiyong Shen
, Yang Yang
, Ximeng Liu:
Toward data privacy preservation with ciphertext update and key rotation for IoT. - Bo Wang, Yina Guo, Hongtao Li
, Zhiying Li:
k-anonymity based location privacy protection method for location-based services in Internet of Thing. - Wei Liu
, Ying-Hui Zhang, Yi-Fei Li, Dong Zheng:
A fine-grained medical data sharing scheme based on federated learning. - Fangfang Shan
, Fuyang Li
, Peiyu Ji:
A smart access control mechanism based on user preference in online social networks. - Ling Song
, Hongxin Liu, Shunming Lyu, Xiaofei Niu, Tie Hou, Yuling Ma, Qiang Lyu:
Exploring human behavior patterns and socio-demographic factors based on American Time Use Survey. - Lili Chen
, Zhen Wang, Jintao Wu, Yunchuan Guo, Fenghua Li, Zifu Li:
Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach. - Yuanyuan Zhang
, Zuobin Ying, Bowen Zhao, Chun Lung Philip Chen:
A privacy preserving data aggregation and query for metro passenger flow via mobile crowdsensing. - Zhou Zhou
, Youliang Tian, Changgen Peng, Nan Yang, Shigong Long:
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things. - Gonzalo Berger, Manuel Freire, Renzo Marini, Ernesto Dufrechou
, Pablo Ezzatti
:
Advancing on an efficient sparse matrix multiplication kernel for modern GPUs. - Hamidreza Khaleghzadeh
, Ravi Reddy Manumachu
, Alexey L. Lastovetsky:
Efficient exact algorithms for continuous bi-objective performance-energy optimization of applications with linear energy and monotonically increasing performance profiles on heterogeneous high performance computing platforms. - Wlodzimierz Funika
, Pawel Koperek
, Jacek Kitowski
:
Continuous self-adaptation of control policies in automatic cloud management. - Yu-Hsiang Tsai
, Terry Cojean
, Hartwig Anzt
:
Providing performance portable numerics for Intel GPUs.
EDITORIAL
- Rosa M. Badia
:
Special Issue 19th international workshop on algorithms, models and tools for parallel computing on heterogeneous platforms (HeteroPar'21).
SPECIAL ISSUE PAPER
- Pablo Vizcaino
, Filippo Mantovani
, Roger Ferrer
, Jesús Labarta
:
Acceleration with long vector architectures: Implementation and evaluation of the FFT kernel on NEC SX-Aurora and RISC-V vector extension.
Volume 35, Number 21, 2023
RESEARCH ARTICLES
- Yuerong Zhao
, Hongbo Guo, Ling Gao, Hai Wang, Jie Zheng, Kan Zhang, Yong Zheng:
Multifeature fusion action recognition based on key frames. - Jun Zhou
, Dan Feng, Fang Wang:
Probability distribution based resource management for multitenant cloud clusters. - Feng He
, Zhiyu Wang
, Xiaoyan Gu
:
Network topology generation based on eigenvector centrality with real-time guarantee. - Summiya A. Pathan
, C. Noorullah Shariff
:
A novel blockchain tumbling scalability framework in a bitcoin network. - Mathieu Dugré
, Valérie Hayot-Sasson, Tristan Glatard:
Performance comparison of Dask and Apache Spark on HPC systems for neuroimaging. - Yuqian Wang
, JianWei Ma, Axyonov Sergey, Shaofei Zang, Miao Zhang:
DPA-UNet rectal cancer image segmentation based on visual attention. - N. Nataraj, R. V. Nataraj:
A novel hybrid meta-heuristic-oriented latency sensitive cloud object storage system. - Hadis Hafizpour
, Mohammad Ebrahim Shiri, Amir Masoud Rahmani
:
New attribute-based encryption schemes with anonymous authentication and time limitation in fog computing. - E. Ahila Devi
, Arumugam Chandrasekar
, S. Radhika
:
WSO-T2FSM: War strategy optimization-based type-2 fuzzy-based starling murmuration for addressing the routing problem in mobile ad hoc network. - Fursan Thabit
, Özgü Can
, Rizwan Uz Zaman Wani, Mohammed Ali Qasem, S. B. Thorat, Hoda A. Alkhzaimi:
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms. - G. S. Prashanth
, P. Manjunatha:
Cluster based energy efficient routing protocol for heterogeneous wireless sensor networks. - Praveen Velusamy
, Keerthika Periasamy
, Sivapriya Gurusamy, Sangeetha Kuppusamy:
Modeling a novel heuristic model for handling vehicle routing using multiobjective optimization. - Sarika Gupta, Himani Bansal:
Trust evaluation of health websites by eliminating phishing websites and using similarity techniques. - Apparna Allada
, Rajaram Bhavani, Kavitha Chaduvula
, Rajaram Priya:
Alzheimer's disease classification using competitive swarm multi-verse optimizer-based deep neuro-fuzzy network. - Ji Liu
, Xuehai Zhou, Lei Mo
, Shilei Ji, Yuan Liao, Zheng Li, Qin Gu, Dejing Dou:
Distributed and deep vertical federated learning with big data. - Abdelkader Ouared
, Moussa Amrani, Pierre-Yves Schobbens
:
Explainable AI for DBA: Bridging the DBA's experience and machine learning in tuning database systems. - Ashok Kumar
, Madan Lal, Sumandeep Kaur:
An autonomic resource management system for energy efficient and quality of service aware resource scheduling in cloud environment. - Garima Verma
, Ashutosh Kumar:
Novel quantum key distribution and attribute based encryption for cloud data security. - Hongjian Li
, Chen Xu, Tiantian Wang, Jingjing Wang, Peng Zheng, Tongming Liu, Libo Tang:
A cost-efficient and QoS-aware adaptive placement of applications in fog computing. - Brice Ekane, Alain Tchana, Daniel Hagimont, Boris Teabe
, Noel De Palma:
Networking in next generation disaggregated datacenters. - Subbarayan Anitha
, Theagarajan Padma, V. Valli Mayil
:
A generic resource augmentation architecture for efficient mobile communication. - Zhixia Zhang
, Jie Wen, Xingjuan Cai
, Zhihua Cui
:
A many-objective optimization algorithm with dual criteria and mixed distribution correction strategy. - G. Kannan
, Karunambiga K, P. J. Sathish Kumar, Francis H. Shajin:
Detection of COVID-19 patient based on attention segmental recurrent neural network (ASRNN) Archimedes optimization algorithm using ultra-low-dose CT images. - Yuqing Zhang
, Zhaofeng Ma, Shoushan Luo, Shushuang Wang, Pengfei Duan, Xiao Liu:
DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection. - Linna Wang, Yunfei Song, Yujia Zhu, Daoxun Xia
, Guoquan Han:
A framework for deep neural network multiuser authorization based on channel pruning. - Jiashu Wu
, Yang Wang, Jinpeng Wang, Hekang Wang, Taorui Lin:
How does solid-state drives cluster perform for distributed file systems: An empirical study. - Yulin Li
, Yaojin Lin, Xiehua Yu, Lei Guo
, Shaozi Li:
Label distribution learning with high-order label correlations. - S. Suganya
, Shanmugam Selvamuthukumaran
:
Stacked multi-layer security for Hadoop distributed file system using HSCT steganography. - Daoyuan Song, Xinghua Xu, Xiaopeng Cui, Yangbin Ou, Weiming Chen
:
Bolt looseness detection based on Canny edge detection algorithm. - Li Huang, Cheng Wang, Juntong Yun
, Bo Tao
, Jinxian Qi, Ying Liu, Hongjie Ma, Hui Yu
:
Object pose estimation based on stereo vision with improved K-D tree ICP algorithm.
Volume 35, Number 22, 2023
RESEARCH ARTICLES
- Gaganpreet Kaur
, Raman Kumar Goyal
, Rajesh Mehta
:
Reducing unnecessary handovers and improving ranking abnormality based on multi-attribute decision making graph theory and matrix approach with Euclidean distance in heterogeneous wireless networks. - Arathi Boyanapalli
, A. Shanthini:
Ovarian cancer detection in computed tomography images using ensembled deep optimized learning classifier. - Zhixia Zeng
, Ruohe Huang, Ruliang Xiao
, Xinhong Lin
, Shi Zhang
:
Anomaly detection for high-dimensional dynamic data stream using stacked habituation autoencoder and union kernel density estimator. - J. Jerisha Liby
, Thirasamma Jaya:
Advanced reversible stenographic method for image and video frames by adapting dual tree complex wavelet transform and chaotic whale optimization algorithm. - Yoosef Alidoost Alanagh, Mojtaba Firouzi, Abdolreza Rasouli Kenari
, Mahboubeh Shamsi
:
Introducing an adaptive model for auto-scaling cloud computing based on workload classification. - Mariam Chaabane
, Ismael Bouassida Rodriguez, Hamida Belkhiria:
UML design for access control architecture in smart building application. - Narahari Narasimhaiah
, Praveen Sam Rachapudy:
Canny aspiration paraphernalia framework based healthcare monitoring system and secure medical interoperability. - D. Monica Satyavathi
, A. Ch. Sudhir:
OQ-IICA: Optimal QoS-aware intra-inter cluster data aggregation technique for IoT-assisted WSNs using hybrid optimization techniques. - Vasavi Chithanuru, Mangayarkarasi Ramaiah
:
An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions - A review. - Bappaditya Das, Chintan Kr Mandal
:
Prediction of behavior of a noncommunicative robot based on observations of its movement. - Nathan Heavner, Per-Gunnar Martinsson
, Gregorio Quintana-Ortí:
Computing rank-revealing factorizations of matrices stored out-of-core. - Huihui Zhu, Pengyun Hu, Xianpiao Tang, Daoxun Xia
, Haifeng Huang:
NAGNet: A novel framework for real-time students' sentiment analysis in the wisdom classroom. - Binquan Zhang
, Di Wu, Zhuoxuan Lan, Zhihua Cui, Liping Xie:
Malicious code detection based on many-objective transfer model. - M. Suganthy
, S. Ashok
, A. Uma Maheswari, T. D. Subha:
Recalling-enhanced recurrent neural network optimized with wood pecker mating algorithm for brain tumor classification. - Ting Zou, Zhihui Chen, Saeid Razmjooy
:
Optimized hierarchical radial basis function neural networks by developing coronavirus herd immunity optimizer for solid oxide fuel cells. - Junfeng Tian, Qi Zhu
:
A differential privacy trajectory data storage and publishing scheme based on radix tree. - Monika Kumari
, Ajay Kaul:
Deep learning techniques for remote sensing image scene classification: A comprehensive review, current challenges, and future directions. - Zhiqiang Du
, Zhi Qu, Yanfang Fu, Muhong Huang
, Liangxin Liu:
Multi-strategy-based leader election mechanism for the Raft algorithm. - Zhiwei Chen, Lunzhi Deng
, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang:
An efficient revocable identity-based encryption with ciphertext evolution in the cloud-assisted system. - S. Murugaveni
, B. Priyalakshmi:
Layering of edge node for jamming attack detection and elimination in wireless sensor network. - Marwah Mohammad Almasri, Abrar Mohammed Alajlan
:
A novel-cascaded ANFIS-based deep reinforcement learning for the detection of attack in cloud IoT-based smart city applications. - Zhi Wang, Yongfei Qin, Yan Shi, Ming Jiang, Weigang Wang:
Research on e-commerce recommendation system based on matrix factorization algorithm. - Jalal Sakhdari, Behrooz Zolfaghari, Shaghayegh Izadpanah, Samaneh Mahdizadeh Zargar, Mahla Rahati-Quchani, Mahsa Shadi, Saeid Abrishami
, Abbas Rasoolzadegan:
Edge computing: A systematic mapping study. - Mohammad Luqman
, Arman Rasool Faridi
:
Authentication of fog-assisted IoT networks using Advanced Encryption credibility approach with modified Diffie-Hellman encryption. - Anisha Kumari, Bibhudatta Sahoo, Ranjan Kumar Behera:
Workflow aware analytical model to predict performance and cost of serverless execution. - Yujun Liu
, Xiangchen Zhang, Jinhe Su, Guorong Cai
:
AAEE-Net: Attention-guided aggregation and error-aware enhancement network for accurate and efficient stereo matching. - Akshita Sharma, Baijnath Kaushik, Akshma Chadha
, Reya Sharma
:
Comparative evaluation of deep dense sequential and deep dense transfer learning models for suicidal emotion prediction. - Deepak Kumar, Kartik Sahoo
, Manoj Thakur
:
A hybrid multicategory framework for generating automated trading systems. - Chuitian Rong
, Jinyu Zhou
:
Distributed structural clustering on large graph. - Tarek Hamrouni, Riad Mokadem
, Amel Khelifa:
Review on data replication strategies in single vs. interconnected cloud systems: Focus on data correlation-aware strategies.
Volume 35, Number 23, 2023
RESEARCH ARTICLES
- Oleksii Osliak
, Andrea Saracino
, Fabio Martinelli, Paolo Mori:
Cyber threat intelligence for critical infrastructure security. - Hao Wu
, Yuqi Chen, Chi Zhang, Jiangchao Dong, Yuxin Wang:
Loads prediction and consolidation of virtual machines in cloud. - Satya Deo Kumar Ram
, Shashank Srivastava, Krishn Kumar Mishra:
Redefining the learning mechanism in teaching-learning-based optimization and its applications for flowtime-aware-cost minimizing of the workflow in cloud. - Beata Dmitruk
, Przemyslaw Stpiczynski
:
Improving accuracy of summation using parallel vectorized Kahan's and Gill-Møller algorithms. - Mohammed Bencheikh
, Chakib Mustapha Anouar Zouaoui, Nasreddine Taleb
, Aoued Boukelif, Afaf Benaouda Chaht, Mohamed Naimi:
A reliable alternating multi-path transmission control protocol scheduling for bandwidth aggregation performance. - Yukang Zhang
, Zhanyou Ma, Yilin Liu, Shunzhi Wang:
Analysis of P2P network system based on two-stage service and failure repairability. - Harpreet Singh
, Birmohan Singh
, Manpreet Kaur
:
Lévy flight and disrupt operator-based elephant herding optimization for global optimization problems and feature selection to classify medical data. - Nivaashini Mathappan
, Suganya Elavarasan, Sountharrajan Sehar
:
Hybrid intelligent intrusion detection system for multiple Wi-Fi attacks in wireless networks using stacked restricted Boltzmann machine and deep belief networks. - Tian Fan
, Wanwan Guo, Zhixia Zhang
, Zhihua Cui
:
A many-objective optimization based intelligent algorithm for virtual machine migration in mobile edge computing. - Lenin Narengbam
, Shouvik Dey:
Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system. - Mangayarkarasi Ramaiah
, Vanmathi Chandrasekaran, Vinayakumar Ravi
:
A robust malware traffic classifier to combat security breaches in industry 4.0 applications. - Hamed Fazlollahtabar
:
Rough DT2R2ML for renewable energy supplier selection in the presence of big data. - Sachin Dattatraya Shingade
, Rohini P. Mudhalwadkar:
Sensor information-based crop recommendation system using machine learning for the fertile regions of Maharashtra. - Linu Joseph
, Dhanapal Ramasamy:
Hybrid bidirectional long short term memory with black widow optimization for crop yield prediction using data mining. - Sateesh Gorikapudi
, Hari Kishan Kondaveeti
:
A novel clustering model via optimized fuzzy C-means algorithm and sandpiper optimization with cycle crossover process in IoT. - Shahnawaz Ahmad
, Shabana Mehfuz, Javed Beg:
An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage. - Huseyin Guney
:
Feature selection-integrated classifier optimisation algorithm for network intrusion detection. - Meng Jia
, Zheren Sun:
Computer data processing method of map manifold based on derivative transfer approach. - Supreet Singh
, Urvinder Singh:
A novel self-adaptive hybrid slime mould naked mole-rat algorithm for numerical optimization and energy-efficient wireless sensor network. - Ayman Ibaida
, Sharif Abuadbba
, Dhiah Al-Shammary
, Ibrahim Khalil
:
ECG compression technique using fast fractals in the Internet of medical things. - Archana Raut
, Sunanda P. Khandait:
An intelligent MAC protocol for mission critical applications in wireless sensor networks. - Kamal Kumar Gola
, Shikha Arya:
Underwater acoustic sensor networks: Taxonomy on applications, architectures, localization methods, deployment techniques, routing techniques, and threats: A systematic review. - R. S. Arunkumar
, Ambayiram Chinnasamy
:
NLOS node localization for improving warning message distribution in VANETS. - Zhenzhen He
, Jiong Yu, Tiquan Gu, Zhe Li
, Xusheng Du, Ping Li:
Query cost estimation in graph databases via emphasizing query dependencies by using a neural reasoning network. - Aruchamy Prasanth
, Sabeena Gnanaselvi, Devi Sowndarya, Pushpalatha Naveenkumar:
An artificial intelligence approach for energy-aware intrusion detection and secure routing in internet of things-enabled wireless sensor networks. - Adrien Cassagne
, Romain Tajan, Olivier Aumage, Camille Leroux, Denis Barthou
, Christophe Jégo:
A DSEL for high throughput and low latency software-defined radio on multicore CPUs. - Shatha O. Abbas
, Mohammed J. F. Alenazi
:
SSHS: SDN seamless handover system among LAN access points. - Zuhe Li, Yuhao Cui
, Fengqin Wang
, Weihua Liu, Yongshuang Yang, Zeqi Yu, Bin Jiang, Hui Chen:
A multimodal face antispoofing method based on multifeature vision transformer and multirank fusion. - Yufeng Wang
, Bo Zhang, Jianhua Ma, Qun Jin:
Artificial intelligence of things (AIoT) data acquisition based on graph neural networks: A systematical review. - Durgesh M. Sharma
, Shishir Kumar Shandilya, Suresh Chandra Satapathy:
Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms.
Volume 35, Number 24, 2023
EDITORIAL
- Kamer Kaya, Cevat Sener, Hüsnü Yenigün:
Special issue on High-Performance Computing Conference (BASARIM 2022).
SPECIAL ISSUE PAPERS
- Merdan Batyrow
, Ilknur Eruçar, Hande Öztürk
:
Size dependent change of mean square displacement in gold nanocrystals: A molecular dynamics simulation. - Zuhal Altuntas
, Sanem Arslan
, Betul Boz:
Approximate execution and grouping of critical sections for performance-accuracy tradeoff. - Sanem Arslan
, Osman S. Ünsal:
Efficient thread-to-core mapping alternatives for application-level redundant multithreading. - Ali Burak Can, Mounes Zaval, Meryem Uzun-Per
, Mehmet S. Aktas
:
On the big data processing algorithms for finding frequent sequences. - Ali Can Fadil
, Baha Zafer
:
Parallel aeroacoustic computation of unsteady transonic weapon bay using detached-eddy simulation via open computational fluid dynamics source codes. - Muhammad Aditya Sasongko
, Milind Chabbi, Paul H. J. Kelly, Didem Unat:
Precise event sampling-based data locality tools for AMD multicore architectures. - Ismail Güzel
, Atabey Kaygun:
Classification of stochastic processes with topological data analysis. - Gülçin Yildiz
, Fatih Erdogan Sevilgen
:
Hyper-heuristic method for processor allocation in parallel tasks scheduling. - Buse Yilmaz
:
A novel graph transformation strategy for optimizing SpTRSV on CPUs. - Alparslan Fisne
, Alperen Kalay, Faruk Yavuz, Cagri Cetintepe, Adnan Ozsoy
:
Energy-efficient computing for machine learning based target detection. - Leonardo Fagundes-Junior
, Michael Canesche
, Ricardo S. Ferreira
, Alexandre Santos Brandão
:
High-performance graphics processing unit-based strategy for tuning a unmanned aerial vehicle controller subject to time-delay constraints. - Jeronimo Costa Penha
, Lucas Bragança, Michael Canesche
, Dener Ribeiro, José Augusto Miranda Nacif
, Ricardo S. Ferreira:
Gene regulatory accelerators on cloud FPGA. - André M. Yokoyama, Mariza Ferro
, Felipe B. de Paula, Vítor Vieira, Bruno Schulze:
Investigating hardware and software aspects in the energy consumption of machine learning: A green AI-centric analysis. - Minh Thanh Chung
, Josef Weidendorfer
, Karl Fürlinger
, Dieter Kranzlmüller
:
From reactive to proactive load balancing for task-based parallel applications in distributed memory machines.
Volume 35, Number 25, 2023
EDITORIAL
- Aleksandar Ilic
, Leonel Sousa:
Special issue: 20th international workshop on algorithms, models and tools for parallel computing on heterogeneous platforms (HeteroPar'22).
SPECIAL ISSUE PAPERS
- Mathieu Faverge, Nathalie Furmento, Abdou Guermouche, Gwenolé Lucas
, Raymond Namyst, Samuel Thibault, Pierre-André Wacrenier:
Programming heterogeneous architectures using hierarchical tasks. - Carlos Bilbao
, Juan Carlos Saez
, Manuel Prieto
:
Flexible system software scheduling for asymmetric multicore systems with PMCSched: A case for Intel Alder Lake. - Jisheng Zhao
, Colleen Bertoni, Jeffrey Young, Kevin Harms, Vivek Sarkar, Brice Videau:
HIPLZ: Enabling performance portability for exascale systems. - Gabriel Rodriguez-Canal
, Nick Brown
, Yuri Torres
, Arturo González-Escribano
:
Task-based preemptive scheduling on FPGAs leveraging partial reconfiguration. - Svetlana Kulagina
, Henning Meyerhenke
, Anne Benoit:
Mapping tree-shaped workflows on systems with different memory sizes and processor speeds. - Pietro Incardona, Aryaman Gupta
, Serhii Yaskovets, Ivo F. Sbalzarini
:
A portable C++ library for memory and compute abstraction on multi-core CPUs and GPUs. - Martin Wilhelm
, Hanna Geppert, Anna Drewes, Thilo Pionteck:
A comprehensive modeling approach for the task mapping problem in heterogeneous systems with dataflow processing units. - Ami Marowka
:
A comparison of two performance portability metrics. - Muhammad Umair Sadiq
, Muhammad Murtaza Yousaf:
A scalable parallel algorithm for global sequence alignment with customizable scoring scheme. - Gennaro Mellone
, Ciro Giuseppe De Vita
, Dante D. Sánchez-Gallegos
, Genaro Sanchez-Gallegos
, Catherine Alessandra Torres Charles
, Javier García Blas
, Jesús Carretero Pérez
, José Luis González Compeán
, Giuliano Laccetti
:
A novel approach for large-scale environmental data partitioning on cloud and on-premises storage for compute continuum applications. - Pawel Czarnul
:
A multithreaded CUDA and OpenMP based power-aware programming framework for multi-node GPU systems.
Volume 35, Number 26, 2023
RESEARCH ARTICLES
- Binjing Xu
, Qiong Wu, Hong Qin, Zhiyuan Liu, Lin Shi, Shuang Li
:
VCSNet: V-fused color saliency net. - Ji Liu
, Daxiang Dong, Xi Wang, An Qin, Xingjian Li, Patrick Valduriez, Dejing Dou, Dianhai Yu:
Large-scale knowledge distillation with elastic heterogeneous computing resources. - Hamza Aydemir
, Mehmet Tekerek
, Mehmet Gök
:
Complete coverage planning with clustering method for autonomous mobile robots. - Alok Mishra
, Thr Satar Jabar, Yehia Ibrahim Alzoubi, Kamta Nath Mishra
:
Enhancing privacy-preserving mechanisms in Cloud storage: A novel conceptual framework. - Huseyin Guney
:
AWC-NIDS: Attack-wise customized network intrusion detection system using machine learning, concurrency, and distributed systems. - Deepika Agrawal, Sudhakar Pandey:
FUCBR: Fuzzy-based unequal clustering and bat-based routing protocol for WSNs assisted IoT. - Karthik Ramamurthy
, Anirudh Muthuswamy, Nagharjun Mathimariappan, Gugan S. Kathiresan
:
A novel two-staged network for skin disease detection using atrous residual convolutional networks. - Saba Khanum
, Khurram Mustafa:
A lattice-based blind ring signature scheme for sensitive data protection in blockchain applications. - Mir Salim Ul Islam
, Ashok Kumar
:
Context-aware application scheduling in fog computing environment. - Jiayuan Bai
:
Deep learning-based intraoperative video analysis for supporting surgery. - R. S. Reshma Raj
, Athul Joseph, Akhil Sarwar T. H., Saidalavi Kalady, P. B. Jayaraj:
SpecMap: An efficient spectral partitioning based static application mapping algorithm for 2D mesh NoCs. - Dharavath Champla
, Sivakumar Dhandapani, Nagarajan Velmurugan:
DL-DC: Deep learning-based deadline constrained load balancing technique. - Rajesh Bingu
, S. Jothilakshmi, N. Srinivasu:
An intelligent multiclass deep classifier-based intrusion detection system for cloud environment. - Sahar Abdollahi, Hamid Asadi, Ahmadreza Montazerolghaem
, Sayyed Majid Mazinani:
FMap: A fuzzy map for scheduling elephant flows through jumping traveling salesman problem variant toward software-defined networking-based data center networks. - Pratibha Yadav, Deo Prakash Vidyarthi
:
An efficient fuzzy-based task offloading in edge-fog-cloud architecture.
Volume 35, Number 27, 2023
SPECIAL ISSUE PAPERS
- K. Swapna Sudha
, N. Jeyanthi:
Dynamic Forest of Random Subsets-based supervised hash signature scheme for secure user authentication in smart home environment. - Sandra Catalán
, José R. Herrero, Francisco D. Igual
, Enrique S. Quintana-Ortí
, Rafael Rodríguez-Sánchez
:
Fine-grain task-parallel algorithms for matrix factorizations and inversion on many-threaded CPUs. - Patrick Finnerty
, Tomio Kamada
, Chikara Ohta:
Automatically balancing relocatable distributed collections. - Pietro Ghiglio
, Uwe Dolinsky, Mehdi Goli, Kumudha Narasimhan
:
Improving performance of SYCL applications on CPU architectures using LLVM-directed compilation flow. - Guillaume Helbecque
, Jan Gmys, Nouredine Melab, Tiago Carneiro
, Pascal Bouvry:
Parallel distributed productivity-aware tree-search using Chapel.
RESEARCH ARTICLES
- Chenxi Wang, Mengli Ren
, Chen E, Lei Guo
, Xiehua Yu, Yaojin Lin, Shaozi Li:
Online feature selection for hierarchical classification learning based on improved ReliefF. - Chenxi Wang, Chen E
, Mengli Ren
, Lei Guo
, Xiehua Yu, Yaojin Lin, Shaozi Li:
Multi-label feature selection based on relative entropy and fuzzy neighborhood mutual discrimination index. - Qihe Lou, Yanbin Li, Ning Liu
:
Power grid investment forecasting method based on PSO-GRU neural network. - Hoda Mashayekhi
, Elham Sadat Alavi, Behzad Rezaie:
Microblog topic detection using evolutionary clustering and social network information. - Bhushan M. Patil
, Satish Ket:
Machine learning based secure and efficient task allocation in multi-cloud. - Jatinder Kaur
, Ashutosh Kumar Singh, Neeru Jindal:
Systematic survey on generative adversarial networks for brain tumor segmentation and classification. - Zongxia Wang
, Naigong Yu, Firdaous Essaf:
A soma-synapses neuron model and FPGA implementation. - Junfeng Tian, Naxi Tian
:
Fine-grained assured insertion and deletion scheme based on onion encryption in cloud storage. - Ashwani Kumar, Ashutosh Aggarwal
, Anu Rani, Jatin Bedi, Ravinder Kumar
:
A mat-heuristics approach for electric vehicle route optimization under multiple recharging options and time-of-use energy prices. - Thuraya N. I. Alrumaih
, Mohammed J. F. Alenazi
:
Evaluation of industrial network robustness against targeted attacks.
Volume 35, Number 28, 2023
SPECIAL ISSUE PAPERS
- Upendra Singh
, Puja Gupta
, Mukul Shukla, Varsha Sharma, Sunita Varma, Sumit Kumar Sharma
:
Acknowledgment of patient in sense behaviors using bidirectional ConvLSTM. - Siyang Yu
, Fan Wu
, Baoding Chen, Ronghui Cao, Zhibang Yang
, Keqin Li:
A parallel game model-based intrusion response system for cross-layer security in industrial internet of things. - Nick Hagerty
, Verónica G. Melesse Vergara
, Arnold N. Tharrington:
Studying performance portability of LAMMPS across diverse GPU-based platforms. - Ricardo Jesus
, Tomás Oliveira e Silva, Michèle Weiland:
Vectorizing and distributing number-theoretic transform to count Goldbach partitions on Arm-based supercomputers. - Sharad Singhal
, Clarete Riana Crasta, Mashood Abdulla K, Faizan Barmawer, Gautham Bhat, Ramya Ahobala, P. N. Soumya, Rishi kesh K. Rajak:
OpenFAM: Programming disaggregated memory.
RESEARCH ARTICLE
- José Ignacio Aliaga
, Hartwig Anzt, Enrique S. Quintana-Ortí
, Andrés E. Tomás:
Sparse matrix-vector and matrix-multivector products for the truncated SVD on graphics processors.
SPECIAL ISSUE PAPER
- Julien Monniot
, François Tessier, Matthieu Robert, Gabriel Antoniu:
Supporting dynamic allocation of heterogeneous storage resources on HPC systems.
RESEARCH ARTICLES
- Anis Kricha, Zied Kricha
, Anis Sakly:
Robust image watermarking in DCT domain using optimal inter-block difference. - Lin Chen, Xianzhong Yi, Yuanhua Zhou, Lijun Liu, Hangming Liu, Saeid Razmjooy
:
Reactive power control of hybrid systems using improved coyote optimizer. - B. Meenakshi
, D. Karunkuzhali, Syed Muqthadar Ali:
Blockchain-enabled joint trust (RF-AOA-HTSA) algorithm-based multiobjective clustering protocol for wireless sensor network. - Arulkumaran Ganeshan
, Santhosh Jayagopalan
, Balamurugan Perumal, Velliangiri Sarveshwaran
:
Secure identity key and blockchain-based authentication approach for secure data communication in multi-WSN. - Kishore Balasubramanian
, Gayathri Devi Krishnamoorthy, Ramya Kishore:
Classification of white blood cells based on modified U-Net and SVM. - Rui Zhang
, Yihao Cao, Weiquan Zhang, Xingjuan Cai
:
Cross-modal person re-identification based on deep attention hash learning. - Gourav Kumar, Uday Pratap Singh
, Sanjeev Jain:
Stock price forecasting based on the relationship among Asian stock markets using deep learning. - Neeraj Saini, Vivekananda Bhat Kasaragod, Krishna Prakasha, Ashok Kumar Das
:
A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.