


default search action
Concurrency and Computation: Practice and Experience, Volume 36
Volume 36, Number 1, 2024
Research Articles
- Luis Benet, Luca Ferranti, Nathalie Revol:
A framework to test interval arithmetic libraries and their IEEE 1788-2015 compliance. - Lei Li
, Sheng Lian, Dazhen Lin, Zhiming Luo, Beizhan Wang, Shaozi Li:
Learning multi-organ and tumor segmentation from partially labeled datasets by a conditional dynamic attention network. - Margret Sharmila F
, K. Karuppasamy:
An effective cryptanalysis of DES for secure communication using hybrid cryptanalysis and deep neural network. - R. Satheeskumar
, Bonam Raghavaiah, S. Geerthik, T. Senthil Kumar:
An efficient VLSI architecture for fast motion estimation by hybridizing parallel spiral and adaptive threshold star diamond search algorithm-based search algorithm in HEVC. - Atefeh Hemmati
, Hanieh Mohammadi Arzanagh
, Amir Masoud Rahmani
:
A taxonomy and survey of big data in social media. - Prabhjot Kaur
, Shalini Batra, Prashant Singh Rana:
Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network. - Karthikeyan V
, Murugan K:
A novel machine learning-based classification approach to prevent flow table overflow attack in Software-Defined Networking. - Tu Tran
, Bharath Ramesh, Benjamin Michalowicz
, Mustafa Abduljabbar, Hari Subramoni, Aamir Shafi, Dhabaleswar K. Panda:
Accelerating communication with multi-HCA aware collectives in MPI. - Raouia Bouabdallah
, Fairouz Fakhfakh:
Extending OCCI for an autonomous SLA negotiation strategy in federated clouds. - Shahul Hamead Haja Moinudeen
, Mirnalinee Thanganadar Thangathai, Kavi Priya Dhandapani
:
Selective wakeup for parallel forward engines under variable load towards energy conservation in IP routers. - G. Sakthivel
, P. Madhubala:
Advanced set containment deep learned Rabin certificateless signcryption for secured transmission with big data in cloud. - Medha Kirti
, Ashish Kumar Maurya, Rama Shankar Yadav:
A Fault-tolerant model for tuple space coordination in distributed environments. - Marc González Tallada
, Enric Morancho
:
Compute units in OpenMP: Extensions for heterogeneous parallel programming. - Rongqiang Feng
, Hongwei Du, Tianchi Du, Xueqiong Wu, Haiping Yu, Kexin Zhang, Chenxi Huang, Lianlian Cao:
Fault diagnosis for wind turbines based on LSTM and feature optimization strategies. - Huanyu Cui
, Nianbin Wang, Qilong Han, Ye Wang, Jiahang Li:
A two-stage parallel method on GPU based on hybrid-compression-format for diagonal matrix.
Volume 36, Number 2, 2024
Research Articles
- Khushboo A. Patel
, Shivangi Shukla
, Sankita J. Patel:
A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier. - Özcan Dülger
, Tansel Dökeroglu:
A new parallel tabu search algorithm for the optimization of the maximum vertex weight clique problem. - Kieran Leach
, Philip Cass, Steven Robson, Eimantas Kazakevicius, Martin Lafferty, Andrew Turner, Alan Simpson:
Automated service monitoring in the deployment of ARCHER2. - Anil Kumar
, Dinesh Singh, Rama Shankar Yadav:
Entropy and improved k-nearest neighbor search based under-sampling (ENU) method to handle class overlap in imbalanced datasets. - Princy Diwan
, Ramgopal Kashyap, Brijesh Khandelwal:
Blockchain assisted encryption scheme for intellectual share estimation using medical research data. - B. Jaishankar
, Bharathi Gururaj
, Nandam Gayatri
:
An effective autism spectrum disorder screening method using machine learning classification techniques. - Deepa Rathi
, Sanjeev Kumar
, Farhan Musanna, Deepak Singh
:
Quantum secret sharing protocol through noisy channel with application in visual cryptography. - Mohd. Aquib Ansari
, Dushyant Kumar Singh, Ruchi Jayaswal:
Using postural data and recurrent learning to monitor shoplifting activities in megastores. - Ruizhong Du
, Chuan Liu
, Yan Gao:
Anonymous federated learning framework in the internet of things. - Imtisenla Longkumer
, Dilwar Hussain Mazumder:
Improving cancer prediction using feature selection in spark environment. - Xudong Wang, Weiyi Zhong
:
Evolution and innovations in animation: A comprehensive review and future directions. - Bartosz Balis
, Tomasz Lelek, Jakub Bodera, Michal Grabowski, Costin Grigoras:
Improving prediction of computational job execution times with machine learning. - Poonam Samir Jadhav
, Gautam M. Borkar:
Quasi-identifier recognition with echo chamber optimization-based anonymization for privacy preservation of cloud storage. - Lei Kou
, Junhe Wan, Hailin Liu
, Wende Ke, Hui Li, Jie Chen, Zhen Yu
, Quande Yuan:
Optimized design of patrol path for offshore wind farms based on genetic algorithm and particle swarm optimization with traveling salesman problem. - Nupur Jangu
, Zahid Raza
:
Smart admission control strategy utilizing volunteer-enabled fog-cloud computing.
Volume 36, Number 3, 2024
Research Articles
- Hirotsugu Kakugawa
, Sayaka Kamei:
A self-stabilizing distributed algorithm for the bounded lattice domination problems under the distance-2 model. - Harsh Bhatt, Nilesh Kumar Jadav, Aparna Kumari, Rajesh Gupta
, Sudeep Tanwar
, Zdzislaw Polkowski, Amr Tolba
, Azza S. Hassanein:
Artificial neural network-driven federated learning for heart stroke prediction in healthcare 4.0 underlying 5G. - Amandeep Kaur, C. Rama Krishna, Nilesh Vishwasrao Patil
:
K-DDoS-SDN: A distributed DDoS attacks detection approach for protecting SDN environment. - Hatice Vildan Dudukcu
, Murat Taskiran
, Nihan Kahraman:
UAV instantaneous power consumption prediction using LR-TCN with simple moving average. - Verónica G. Melesse Vergara
, Reuben D. Budiardja
, Paul Peltz, Jeffery Niles, Christopher Zimmer, Daniel Dietz, Christopher Fuson, Hong Liu, Paul Newman, James Simmons, Christopher Muzyn:
A step towards the final frontier: Lessons learned from acceptance testing of the first HPE/Cray EX 3000 system at ORNL. - M. Chengathir Selvi
, J. Maruthupandi, T. Bhuvaneswari, T. Manonmani:
An adaptive gravitational search optimization (AGSO)-based convolutional neural network - long short-term memory (CNN-LSTM) approach for face recognition and classification. - Akash Shah
, Sapna Varshney
, Monica Mehrotra
:
DeepMUI: A novel method to identify malicious users on online social network platforms. - Junfeng Tian, Hongwei Xu
, Jin Tian:
SLChain: A secure and low-storage pressure sharding blockchain. - Zhigang Zhang
, Zhixia Zhang
, Zhihua Cui
:
Federated malware detection based on many-objective optimization in cross-architectural IoT. - Alexandre Denis
, Emmanuel Jeannot
, Philippe Swartvagher
, Samuel Thibault:
Tracing task-based runtime systems: Feedbacks from the StarPU case.
Volume 36, Number 4, 2024
Research Articles
- Ankita Srivastava, Pramod Kumar Mishra
:
Fuzzy based multi-criteria based cluster head selection for enhancing network lifetime and efficient energy consumption. - Chavit Denninnart
, Mohsen Amini Salehi
:
SMSE: A serverless platform for multimedia cloud systems. - Yachao Huo
, Zongqu Zhao, Panke Qin, Shujing Wang, Chengfu Zheng:
Post-quantum secure two-party computing protocols against malicious adversaries. - Jinglei Guo
, Chen Gao, Shouyong Jiang
, Wei Xie, Zhijian Wu:
An improved brain storm optimization with chunking-grouping method. - Shveta Verma
, Anju Bala:
Efficient Auto-scaling for Host Load Prediction through VM migration in Cloud. - Di Wu
, Zhen Yang, Tong Li
, Junrui Liu:
JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm. - Manoj D. Shelar
, S. Srinivasa Rao:
Enhanced capsule network-based executable files malware detection and classification - deep learning approach. - Alexander Michels
, Anand Padmanabhan
, Zhiyu Li, Shaowen Wang
:
EasyScienceGateway: A new framework for providing reproducible user environments on science gateways. - Ping Wei, Shou Fa Wang
, Yi Ming Wang:
Numerical study on the influence of centroid-to-buoyancy center ratio on the motion stability of supercavitating vehicle. - Michal Antkowiak, Lukasz Kucharski, Romuald Lemanski, Grzegorz Kamieniarz
:
Algorithms on low energy spectra of the Hubbard model pertinent to molecular nanomagnets.
Volume 36, Number 5, 2024
Research Articles
- Zuoyong Li
, Weice Wang, Taotao Lai, Haiping Xu, Pantea Keikhosrokiani
:
Object-aware deep feature extraction for feature matching. - Yunbo Wan
, Zhong Zhao, Jie Liu
, Laiping Zhang, Yong Zhang, Jianqiang Chen:
Large-scale homo- and heterogeneous parallel paradigm design based on CFD application PHengLEI. - Insozhan Nagasundharamoorthi
, Prabhu Venkatesan, Parthasarathy Velusamy:
Hash message authentication codes for securing data in wireless body area networks. - Jiange Zhang, Qing Yi, Christina L. Peterson
, Damian Dechev:
Compiler-driven approach for automating nonblocking synchronization in concurrent data abstractions. - Wassim Jerbi
, Omar Cheikhrouhou
, Abderrahmen Guermazi
, Hafedh Trabelsi
:
An enhanced MSU-TSCH scheduling algorithms for industrial wireless sensor networks. - Meena Zenith N
, R. Radhika:
Examining the impact of social media advertising using ANOVA analysis. - Gang Zhao
, Hui He
, Bingbing Di
, Tong Wu:
ERSChain: Towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext-policy attribute-based encryption. - Shuilin Chen
, Jianguo Zheng:
Hybrid grey wolf optimizer for solving permutation flow shop scheduling problem. - Parvaz Ahmad Malla, Sophiya Sheikh
, Mohammad Shahid, Sheikh Umar Mushtaq
:
Energy-efficient sender-initiated threshold-based load balancing (e-STLB) in cloud computing environment. - Felix Wittwer
, Nicholas K. Sauter
, Derek Mendez, Billy K. Poon
, Aaron S. Brewster
, James M. Holton
, Michael E. Wall
, William E. Hart
, Deborah Bard
, Johannes P. Blaschke
:
Accelerating x-ray tracing for exascale systems using Kokkos.
Volume 36, Number 6, 2024
Research Articles
- Sellamuthu Suseela
, Ravi Krithiga, Muthusamy Revathi, Sudhakaran Gajendran, Reddipalayam Murugeshan Bhavadharini:
Energy aware optimal routing model for wireless multimedia sensor networks using modified Voronoi assisted prioritized double deep Q-learning. - C. Jackulin
, S. Murugavalli
, K. Valarmathi:
IFATA-Deep net: Improved invasive feedback artificial tree algorithm with deep quantum neural network for root disease classification. - Haochen Zhao
, Jie Wen, Jinqian Yang, Xingjuan Cai
, Chunxia Liu:
A many-objective optimization-based local tensor factorization model for skin cancer detection. - Nilesh Rathod
, Sunil Wankhade:
Fractional cuckoo search invasive weed optimized neural network for data classification. - Shaiqa Nasreen
, Ajaz Hussain Mir:
Cloud forensics: A centralized cloud provenance investigation system using MECC. - Kalimullah Lone
, Shabir Ahmad Sofi:
e-TOALB: An efficient task offloading in IoT-fog networks. - Pritam Kumar Nayak
, Ravi Shankar Singh, Shweta Kushwaha, Prasanth Kumar Bevara, Vinod Kumar
, Rambabu Medara
:
Efficient task scheduling on the cloud using artificial neural network and particle swarm optimization. - Fernanda G. O. Passos
, Vinod E. F. Rebello
:
An autonomic parallel strategy for exhaustive search tree algorithms on shared or heterogeneous systems. - Li Lv
, Faying Zhang, Shenyu Qiu, Tanghuai Fan:
Adaptive kernel density estimation weighted twin support vector machine and its sample screening method. - Shadi Doostani, Hamid Barati
, Ali Barati:
A lightweight hierarchical method for improving security in the internet of things using fuzzy logic.
Volume 36, Number 7, 2024
Research Articles
- Rafael Sanchez-Lara, José Luis López-Martínez
, Joel Antonio Trejo-Sánchez, Herman L. Offerhaus
, José A. Álvarez-Chávez:
Implementation and evaluation of two parallel computational models for the simulation of a long-haul DWDM system limited by FWM. - (Withdrawn) Minimal channel cost-based energy-efficient resource allocation algorithm for task offloading under FoG computing environment.
- Chen Li
, Ziniu Lin
, Lihua Tian, Bin Zhang:
A scheduling algorithm based on critical factors for heterogeneous multicore processors. - Pichai Subramanian Apirajitha
, Godfrey Winster Sathianesan
:
On developing Block-Chain based Secure Storage Model (BSSM) with auditing and integrity analysis in the cloud. - Bin Deng:
Aquila optimizer with dynamic group strategy for global optimization tasks. - Ahmed Saidi
, Abdelouahab Amira, Omar Nouali:
A secure multi-authority attribute based encryption approach for robust smart grids. - Lei Liu
:
Multi-objective Firefly algorithm for enhanced balanced exploitation and exploration capabilities. - Zhen Wei, Jinghuan Nie, Wei Zhang
:
Intelligent lighting design of cloud computing platform based on digital twin historic landscape blocks - Take Yu Garden commercial street in Shanghai as an example. - A. Priyadharshini, Suresh Dannana, Arun Sekar Rajasekaran
, Maria Azees:
An efficient key agreement and anonymous privacy preserving scheme for vehicular ad-hoc networks with handover authentication. - Man Zhang, Zheng Kou
:
Spatio-temporal pattern evolution and driving factors of A-level logistics enterprises in Yangtze River Delta.
Volume 36, Number 8, 2024
RESEARCH ARTICLES
- Rui Zhu
, Hang Liu, Xiaolong Xu, Leilei Lin, Yeting Chen, Wenxin Li:
A-PGRD: Attention-based automatic business process model generation from RPA process description. - Madhavarapu Chandan
, S. G. Santhi, T. Srinivasa Rao:
Deep ensemble of classifier for intrusion detection in WSN and improved attack mitigation process. - Kazuto Kobori
, Chunghan Lee
, Toshio Hirotsu:
Performance evaluation of portable time synchronization method using eBPF. - G. Nirmala Priya
, K. Suresh Kumar
, N. Suganthi, Satish Muppidi:
Squirrel Henry Gas Solubility Optimization driven Deep Maxout Network with multi-texture feature descriptors for digital image forgery detection. - Vanderlei Munhoz, Márcio Castro
:
Enabling the execution of HPC applications on public clouds with HPC@Cloud toolkit. - Brett M. Bode
, David King, Celso L. Mendes, William T. Kramer, Saurabh Jha, Roger Ford, Justin Davis, Steven Dramstad:
Blue Waters system and component reliability. - Siddharth Katyal, Shashank Gupta
, Oshin Rawlley, Debjani Ghosh:
A fog-driven three-factor authentication protocol for secure data sharing in Internet of Vehicles cyber-physical systems. - Zuowen Tan, Jintao Jiao
, Yanliang Chen:
Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT. - Jinchao Li
, Yuxuan Tian, Jindong Wang, Jinling Yang, Yinfang Zhu, Xuemin Cheng, Qun Hao:
Design of novel deformable mirror with large displacement.
REVIEW ARTICLE
- Iraq Ahmad Reshi
, Sahil Sholla:
The blockchain conundrum: An in-depth examination of challenges, contributing technologies, and alternatives.
Volume 36, Number 9, 2024
RESEARCH ARTICLES
- Ameni Chetouane
, Kamel Karoui:
Risk based intrusion detection system in software defined networking. - Fayssal Bendaoud
, Marwen Abdennebi:
A machine learning access network selection in a heterogeneous wireless environment. - Saurabh Chandra
, Rajeev Arya
, Maheshwari Prasad Singh:
Optimal D2D power for secure D2D communication with random eavesdropper in 5G-IoT networks. - Yan Chen, Jiajian Xie, Jiajun Xue, Hui Wang:
A robust transformer GAN for unpaired data makeup transfer. - Beenish Habib
, Farida Khursheed:
Time-based DDoS attack detection through hybrid LSTM-CNN model architectures: An investigation of many-to-one and many-to-many approaches.
REVIEW ARTICLE
- Baki Gökgöz
, Fatih Gül
, Tolga Aydin
:
An overview memristor based hardware accelerators for deep neural network.
RESEARCH ARTICLES
- Lúcia Maria de Assumpção Drummond, Luciano Andrade, Pedro de Brito Muniz, Matheus Marotti Pereira, Thiago do Prado Silva, Luan Teylo
:
Design and analyses of web scraping on burstable virtual machines. - Kamil Halbiniak
, Norbert Meyer, Krzysztof Rojek
:
Single- and multi-GPU computing on NVIDIA- and AMD-based server platforms for solidification modeling application. - Hidangmayum Satyajeet Sharma
, Khundrakpam Johnson Singh
:
A feed forward deep neural network model using feature selection for cloud intrusion detection system. - Juncheng Jia, Ji Liu, Chendi Zhou, Hao Tian, Mianxiong Dong, Dejing Dou:
Efficient asynchronous federated learning with sparsification and quantization.
Volume 36, Number 10, 2024
EDITORIALS
- Carlos Reaño
, Federico Silla
, Blesson Varghese
:
Accelerator virtualization. - Pezhman Gholamnezhad, Ali Broumandnia
, Vahid Seydi
:
An improved model-based evolutionary algorithm for multi-objective optimization. - Xiaoping Sun, Hai Zhuge
:
Semantics, knowledge and advanced cyber-infrastructure for intelligent applications. - Xiao Liu:
Editorial for special issue on "Edge computing accelerated deep learning: Technologies and applications".
SPECIAL ISSUE PAPERS
- Qiguo Huang
, Zhengliang Li, Qing Gu:
Multi-task deep neural networks for just-in-time software defect prediction on mobile apps. - Wenhao Song
, Wenzhe Zhai, Mingliang Gao
, Qilei Li
, Abdellah Chehri, Gwanggil Jeon
:
Multiscale aggregation and illumination-aware attention network for infrared and visible image fusion. - Yang Gu
, Jian Cao, Shiyou Qian
, Nengjun Zhu, Wei Guan
:
MANSOR: A module alignment method based on neighbor information for scientific workflow. - Jiayan Gu
, Yan Wu, Ashiq Anjum
, Lu Liu
, John Panneerselvam
, Yao Lu:
An adaptive key selection method for the multilevel index model for effective service management in the cloud. - Masato Kobayashi, Yusuke Hirota, Shuhei Kudo, Takeo Hoshi, Yusaku Yamamoto
:
Automatic performance tuning using the ATMathCoreLib tool: Two experimental studies related to dense symmetric eigensolvers. - Carl Christian Kjelgaard Mikkelsen
, Lorién López-Villellas
, Pablo García-Risueño:
Newton's method revisited: How accurate do we have to be? - Kai Peng
, Chengfang Ling, Bohai Zhao, Victor C. M. Leung:
A fairness-aware task offloading method in edge-enabled IIoT with multi-constraints using AGE-MOEA and weighted MMF. - Oleg Bystrov
, Ruslan Pacevic
, Arnas Kaceniauskas
:
Cost- and performance-aware resource selection for parallel software on heterogeneous cloud. - Rosalba Cacciapuoti, Luisa D'Amore
:
Scalability analysis of a two level domain decomposition approach in space and time solving data assimilation models. - Qiong Lu, Huaizhong Lin, Wei Xing, Lei Zhao, Jingjing Chen
:
PKD-Net: Distillation of prior knowledge for image completion by multi-level semantic attention. - Tianhong Xiong
, Shangqing Feng, Maolin Pan, Yang Yu:
Smart contract generation for inter-organizational process collaboration. - Luisa Carracciuolo
, Valeria Mele
, Gianluca Sabella
:
Toward a new linpack-like benchmark for heterogeneous computing resources. - Liya Ma
, Chen Li, Siqi Sun, Shu Guo, Lihong Wang, Jianxin Li:
Privacy-preserving graph publishing with disentangled variational information bottleneck. - Xiaotian Li
, Koji Nakano
, Yasuaki Ito
, Daisuke Takafuji, Takashi Yazane, Junko Yano, Takumi Kato, Shiro Ozaki, Rie Mori, Ryota Katsuki:
Bit duplication technique to generate hard quadratic unconstrained binary optimization problems with adjustable sizes. - Zhijie Shen
, Bowen Liu, Wanchun Dou:
An effective data placement strategy for IIoT applications. - Christopher D. Rickett
, Kristyn J. Maschhoff, Sreenivas R. Sukumar:
Optimizing the Cray Graph Engine for performant analytics on cluster, SuperDome Flex, Shasta systems and cloud deployment. - Javed Ali Khan
, Tahir Ullah, Arif Ali Khan, Affan Yasin, Muhammad Azeem Akbar, Khursheed Aurangzeb:
Can end-user feedback in social media be trusted for software evolution: Exploring and analyzing fake reviews. - Yulin He
, Jin Yang, Yingchao Cheng, Xueqin Du, Joshua Zhexue Huang:
A novel member enhancement-based clustering ensemble algorithm. - Wanyu Qiu
, Chuanhe Huang, Zhengfa Li, M. Wasim Abbas Ashraf
, Danxin Wang:
Traffic offloading for postdisaster rescue in UAV-assisted networks: A coalition formation game approach.
EDITORIAL
- Marco Lapegna
, Valeria Mele
, Raffaele Montella, Lukasz Szustak
:
Special Issue on the pervasive nature of HPC (PN-HPC).
SPECIAL ISSUE PAPER
- Filippos Pantekis
, Phillip James
, Oliver Kullmann
, Liam O'Reilly
:
Optimized massively parallel solving of N-Queens on GPGPUs.
RESEARCH ARTICLES
- Ashis Kumar Mishra
, Subasish Mohapatra, Pradip Kumar Sahu:
Coalition theory based task scheduling algorithm using DLFC-NN model. - Baoyong Yan, Jialin Tian, Jun Wan, Yu Qiu, Weiming Chen
:
Real-time prediction of horizontal drilling pressure based on convolutional Transformer. - Yongwei Tang, Wei Ding, Jun Zhou, Yonghao Yu
, Huijuan Hao:
Research on cloud robot security strategy based on chaos encryption.
Volume 36, Number 11, May 2024
RESEARCH ARTICLES
- Ao Gong
, Yun Cheng, Jing Su, Li Zhang:
Research on hybrid synchronization methods in multi-user collaborative VR simulation medical surgery training system. - Alavieh Sadat Alavizadeh, Seyed Hossein Erfani
, Meghdad Mirabi
, Amir Sahafi:
A distributed reliable collusion-free algorithm for selecting multiple coordinators in IOTA using fog computing.
SPECIAL ISSUE PAPER
- Prabha Mahenthiran, Dinakaran Muruganadam
:
Handoff performance analysis of PMIPv6-based distributed mobility management protocol-urban scenario.
RESEARCH ARTICLES
- Lanjun Wan
, Xueyan Cui, Yuanyuan Li, Weihua Zheng, Xinpan Yuan:
HeteroPP: A directive-based heterogeneous cooperative parallel programming framework. - Natalia Chaudhry
, Muhammad Murtaza Yousaf:
Exploiting hashing for concurrent query processing and indexing of current location of moving objects.
SPECIAL ISSUE PAPER
- Jiangwei Shang
, Zhan Zhang, Kun Zhang, Chuanyou Li, Lei Qian, Hong-Wei Liu:
An algorithm/hardware co-optimized method to accelerate CNNs with compressed convolutional weights on FPGA.
RESEARCH ARTICLES
- Mandeep Kumar
, Amritpal Singh:
Bloom filter empowered smart storage/access in IoMT [edge-fog-cloud] hierarchy for health-care data ingestion. - Soumi Dhar
, Shyamosree Pal, Gaurav Bhattacharjee, Abhishek Pandey:
A digital geometric approach for discrete Voronoi diagram construction using GPU. - Yunfeng Ye
, Huifang Liu, Wenhui Kuang, Wenxuan Chen:
Virtual reality modeling application based on multi perspective and deep learning in the new media presentation and brand building of Dongguan City memory. - Amol D. Vibhute
, Minhaj Khan, Anuradha Kanade
, Chandrashekhar H. Patil
, Sandeep V. Gaikwad, Kanubhai K. Patel
, Jatinderkumar R. Saini
:
An LSTM-based novel near-real-time multiclass network intrusion detection system for complex cloud environments.
SPECIAL ISSUE PAPER
- Pankaj Prasad Dwivedi
, Dilip Kumar Sharma
:
A novel approach for constructing privacy-aware architecture utilizing Shannon's entropy.
RESEARCH ARTICLES
- Pan Pan
:
Local feature matching and tracking optimization of machine VSLAM based on AG Sinkhorn. - Zhihao Liang, Huijuan Lu
, Zhendong Ming, Zhuijun Chai, Yudong Yao:
DML-OFA: Deep mutual learning with online feature alignment for the detection of COVID-19 from chest x-ray images.
SPECIAL ISSUE PAPER
- Marcos J. Santos-Neto, Jacir Luiz Bordim
, Eduardo A. P. Alchieri, Edison Ishikawa:
DDoS attack detection in SDN: Enhancing entropy-based detection with machine learning.
RESEARCH ARTICLES
- Pankaj Kumar, Anurag Singh
, Ajay K. Sharma:
Identification of influential vertices in complex networks: A hitting time-based approach. - Vikramjit Singh
, Krishna Pal Sharma, Harsh Kumar Verma:
MF-DLB: Multimetric forwarding and directed acyclic graph-based load balancing for geographic routing in FANETs. - Somayyeh Jafari, Nasrin Aghaee-Maybodi
:
Detection of phishing addresses and pages with a data set balancing approach by generative adversarial network (GAN) and convolutional neural network (CNN) optimized with swarm intelligence. - Pujasuman Tripathy
, Pabitra Mohan Khilar:
Improvement of amorphous localization algorithm in WSN using ALO and GWO. - Khushnaseeb Roshan
, Aasim Zafar
:
AE-Integrated: Real-time network intrusion detection with Apache Kafka and autoencoder. - Qi Wang
:
Research on the application of bilateral collaborative algorithm in hotel tourism consumption preference recommendation.
SPECIAL ISSUE PAPER
- Beibei Wu
:
Research on denoising and enhancing methods of medical images based on convolutional neural networks.
RESEARCH ARTICLE
- Guohua Shen, Mengnan Cai
, Zhiqiu Huang, Yang Yang, Feifei Guo, Linlin Wei:
LoHDP: Adaptive local differential privacy for high-dimensional data publishing.
EDITORIAL
- Roman Wyrzykowski
, Boleslaw K. Szymanski
:
Advances into exascale computing.
Volume 36, Number 12, May 2024
RESEARCH ARTICLE
- Muhammet Tay
, Arafat Sentürk
:
Decision tree-based task offloading in vehicle edge computing.
SPECIAL ISSUE PAPER
- Johannes P. Blaschke, Aaron S. Brewster, Daniel W. Paley, Derek Mendez, Asmit Bhowmick
, Nicholas K. Sauter, Wilko Kröger, Murali Shankar, Bjoern Enders, Deborah Bard:
Real-time XFEL data analysis at SLAC and NERSC: A trial run of nascent exascale experimental data analysis.
RESEARCH ARTICLES
- Wei Qin
, Hao Wang, Xiangfeng Luo:
Open-domain event schema induction via weighted attentive hypergraph neural network. - Ravil Dorozhinskii
, Gonzalo Brito Gadeschi, Michael Bader:
Fused GEMMs towards an efficient GPU implementation of the ADER-DG method in SeisSol. - Yishu Du, Loris Marchal
, Guillaume Pallez, Yves Robert
:
Improving batch schedulers with node stealing for failed jobs. - B. Mohammed Siyad
, Ramasundaram Mohan:
Processing-in-memory based multilateration localization in wireless sensor networks using memristor crossbar arrays. - Ahmad Jalili, Jafar Ahmad Abed Alzubi, Roghayeh Rezaei, Julian L. Webber, Christian Fernández-Campusano
, Mehdi Gheisari
, Rashid Amin, Abolfazl Mehbodniya:
Markov chain-based analysis and fault tolerance technique for enhancing chain-based routing in WSNs. - Buqing Cao
, Hao Huang, Shanpeng Liu, Yizhi Liu, Yiping Wen, Dong Zhou, Mingdong Tang:
Knowledge distillation representation and DCNMIX quality prediction-based Web service recommendation. - Houfu Peng, Xing Lu, Lili Xu, Daoxun Xia
, Xiaoyao Xie:
Parameter instance learning with enhanced vision transformers for aerial person re-identification. - Songyi Xiao, Wenjun Wang
:
Ranking-based architecture generation for surrogate-assisted neural architecture search. - Paul Immanuel, A. Berin Greeni
:
Optimization of layout for embedding half hypercube into conventional tree architectures. - Payal Thakur, Vivek Kumar Sehgal
:
Synergizing edge computing and blockchain for cyber-physical systems. - Saravanan Muniswamy
, Radhakrishnan Vignesh:
Joint optimization of load balancing and resource allocation in cloud environment using optimal container management strategy. - Tong Zhou, Yaning Yu, Haonan Yuan, Bing Liu, Hongyang Zhao, Ruijin Wang
:
CCSFLF: Cloud-edge-terminal collaborative self-adaptive federated learning framework. - Manoj Kumar Patra
, Bibhudatta Sahoo, Ashok Kumar Turuk:
FPHO: Fractional Pelican Hawks optimization based container consolidation in CaaS cloud. - Thankaraja Raja Sree
, R. Harish, Veni Thangaraj:
FogSec: A secure and effective mutual authentication scheme for fog computing.
SPECIAL ISSUE ARTICLE
- Ethan Gibbons, Ke Qiu
:
A recurrence for the surface area of the ( n , k ) $$ \left(n,k\right) $$ -star graph.
RESEARCH ARTICLES
- Li Li, Renjia Su
, Xin Zhao:
Neighbor cleaning learning based cost-sensitive ensemble learning approach for software defect prediction. - Farheen Syed, Saeed Hamood Alsamhi, Sachin Kumar Gupta
, Abdu Saif:
LSB-XOR technique for securing captured images from disaster by UAVs in B5G networks. - Sahin Aydin
, Dieaa Aldara:
Microservices-based databank for Turkish hazelnut cultivars using IoT and semantic web technologies.
REVIEW ARTICLE
- Sangita Baruah
, Dhruba Jyoti Borah
, Vaskar Deka
:
Reviewing various feature selection techniques in machine learning-based botnet detection.
Volume 36, Number 13, June 2024
RESEARCH ARTICLES
- Peng Long, Yuhang Wu, Quan Chen
, Lianglun Cheng:
Distributed low-latency broadcast scheduling for multi-channel duty-cycled wireless IoT networks. - Siyyadula Venkata Rama Vara Prasad
, Pabitra Mohan Khilar:
SVM-SFL based malicious UAV detection in wireless sensor networks. - Cagatay Korkuc
, Nilay Aytas Korkmaz
, Yasin Genç
, Ahmet Akkoç
, Erkan Afacan
, Erdem Yazgan
:
BLOCKBOX: Blockchain based black box designing and modeling. - Aditi Zear, Virender Ranga
, Kamal Kumar Gola
:
Network partition detection and recovery with the integration of unmanned aerial vehicle.
SPECIAL ISSUE PAPER
- Haotian Zhang
, Jinzhe Li
, Fang Hu, Haobo Lin, Jiali Ma:
AMter: An end-to-end model for transcriptional terminators prediction by extracting semantic feature automatically based on attention mechanism.
RESEARCH ARTICLES
- Shanshan Kong
:
A deep learning model of dance generation for young children based on music rhythm and beat. - Tong Li
, Ziming Wang:
Multi objective optimization scheduling of unmanned warehouse handling robots based on A star algorithm. - Mohd Ahsan Siddiqui
, Mala Kalra, C. Rama Krishna:
ADSBAN: Anomaly detection system for body area networks utilizing IoT and machine learning. - Maha Aljohani
:
Transforming data-intensive workflows: A cutting-edge multi-layer security and quality aware security framework.
SPECIAL ISSUE PAPER
- John K. Holmen
, Philipp Grete
, Verónica G. Melesse Vergara
:
Early experiences on the OLCF Frontier system with AthenaPK and Parthenon-Hydro.
RESEARCH ARTICLE
- Muhammad Faraz Hyder
, Saadia Arshad, Tasbiha Fatima:
Toward social media forensics through development of iOS analyzers for evidence collection and analysis.
CORRECTION
- Corrigendum.
REVIEW ARTICLE
- Kanupriya
, Inderveer Chana, Raman Kumar Goyal
:
Computation offloading techniques in edge computing: A systematic review based on energy, QoS and authentication.
RESEARCH ARTICLES
- Xuan Su, Cong Liu
, Shuaipeng Zhang, Qingtian Zeng:
Sampling business process event logs with guarantees. - Pranav Shrivastava
, Bashir Alam, Mansaf Alam:
Blockchain assisted blind signature algorithm with data integrity verification scheme. - Khaleel Ur Rahman Khan
, Mohammed Abdul Azeem
:
An optimized crypto-based routing protocol for secure routing in wireless sensor networks. - Payal Sharma
, B. R. Purushothama:
EPREKM: ElGamal proxy re-encryption-based key management scheme with constant rekeying cost and linear public bulletin size. - Kun Liu
, Jianxun Liu
, Haize Hu:
Deep code search efficiency based on clustering.
SPECIAL ISSUE PAPER
- Qi Liu, Li Pan, Xuefei Cao, Jixiang Gan
, Xianming Huang, Xiaodong Liu:
A spatio-temporal graph convolutional approach to real-time load forecasting in an edge-enabled distributed Internet of Smart Grids energy system.
RESEARCH ARTICLES
- Zengpeng Li
, Huiqun Yu, Guisheng Fan
, Jiayin Zhang
, Jin Xu
:
Energy-efficient reliability-aware offloading for delay-sensitive tasks in collaborative edge computing. - Weirong Liu
, Peidong Liu, Changhong Shi, Zhiqiang Zhang, Zhijun Li, Chaorong Liu:
TDLC: Tensor decomposition-based direct learning-compression algorithm for DNN model compression. - Yildiran Yilmaz
:
Stacked ensemble modeling for improved tuberculosis treatment outcome prediction in pediatric cases. - Haithem Mezni, Mokhtar Sellami
, Amal Al-Rasheed, Hela Elmannai:
Cross-network service recommendation in smart cities.
REVIEW ARTICLE
- Medha Kirti
, Ashish Kumar Maurya, Rama Shankar Yadav:
Fault-tolerance approaches for distributed and cloud computing environments: A systematic review, taxonomy and future directions.
RESEARCH ARTICLE
- Alper Alimoglu
, Can C. Özturan
:
An autonomous blockchain-based computational broker for e-science.
REVIEW ARTICLE
- Qingdi Han
, Siqi Lu
, Wenhao Wang, Haipeng Qu, Jingsheng Li, Yang Gao:
Privacy preserving and secure robust federated learning: A survey.
Volume 36, Number 14, June 2024
RESEARCH ARTICLES
- Dawei Sun
, Yueru Wang, Jialiang Sui, Shang Gao, Jia Rong, Rajkumar Buyya
:
Lc-Stream: An elastic scheduling strategy with latency constraints in geo-distributed stream computing environments. - Gang Xian
, Wenxiang Yang
, Jie Yu
:
FP-JSC: Job failure prediction on supercomputers through job application sequence correlation.
REVIEW ARTICLE
- Hema Shekhawat
, Daya Sagar Gupta
:
A survey on lattice-based security and authentication schemes for smart-grid networks in the post-quantum era.
RESEARCH ARTICLES
- Soni Chaurasia
, Kamal Kumar
:
MH-ARO: Meta-heuristic based adaptive routing for large scale opportunistic networks. - Twinkle Kumari, Damanpreet Singh, Birmohan Singh
:
Multi-chaotic maps and blockchain based image encryption.
SPECIAL ISSUE PAPER
- Hao Jiang, Qizhou Yu
, Dan Han, Yaqing Chen, Zejun Li:
A path planning method for unmanned aerial vehicle based on improved wolf pack algorithm.
RESEARCH ARTICLES
- Kenan Mengüç
, Alper Yilmaz:
Improving model performance of shortest-path-based centrality measures in network models through scale space. - Muddamalla Naresh, G. V. Pradeep Kumar
, V. Sireesha
, V. V. Satyanarayana Tallapragada
:
Joint optimal beam forming and resource allocation in intelligent reflecting surface aided wireless power transfer rate splitting multiple access system. - Lian Lian
:
An improved sparrow search algorithm using chaotic opposition-based learning and hybrid updating rules. - Rashmi Keshri, Deo Prakash Vidyarthi
:
An ML-based task clustering and placement using hybrid Jaya-gray wolf optimization in fog-cloud ecosystem.
SPECIAL ISSUE PAPER
- Jion Hirose
, Junya Nakamura
, Fukuhito Ooshita
, Michiko Inoue
:
Fast gathering despite a linear number of weakly Byzantine agents†.
RESEARCH ARTICLES
- Chenfei Nie
, Zhipeng Zhou, Mianxiong Dong, Kaoru Ota, Qiang Li:
EPIDL: Towards efficient and privacy-preserving inference in deep learning. - Li Sun
, Juanjuan Zhao
, Jun Zhang, Fan Zhang, Kejiang Ye, Chengzhong Xu:
STRmt: A state transition based model for real-time crowd counting in a metro system.
SPECIAL ISSUE PAPER
RESEARCH ARTICLES
- Rashmeet Toor
, Inderveer Chana:
Cloud menu: Cloud based network analysis for disease-diet associations and recommendations. - Lei Chen
:
Medical education and artificial intelligence: Question answering for medical questions based on intelligent interaction. - Nupa Ram Chauhan
, Rakesh Kumar Dwivedi:
Hybrid one-dimensional residual autoencoder and ensemble of gradient boosting for cloud IDS. - Rafael Keller Tesser
, Alvaro Marques, Edson Borin
:
A lightweight performance proxy for deep-learning model training on Amazon SageMaker. - Helder J. F. Luz
, Paulo S. L. Souza
, Simone R. S. Souza
:
Structural testing for CUDA programming model. - Nagaraju Sonti
, Mulpuri Santhi Sri Rukmini, Venkatappa Reddy Pamulapati:
Social network based link correlation using graph neural network with deep learning architectures for feature vectors prediction and classification. - Yan Yan
, Pengbin Yan, Adnan Mahmood, Fei Xu, Quan Z. Sheng
:
Towards achieving geo-indistinguishability for 3D GPS location: A 3D Laplace mechanism approach.
Volume 36, Number 15, July 2024
RESEARCH ARTICLES
- Nora A. Alsalamh, Abdulrahman Almutairi, Abdulmalik A. Humayed, Mohammed J. F. Alenazi
:
DMoiSDN: A defensive mechanism of object integrity for SDN. - Tayebeh Sadat Mousavi, Achyut Shankar, Mohammad Hossein Rezvani
, Hamid Ghadiri
:
Entropy-aware energy-efficient virtual machine placement in cloud environments using type information. - Feiyan Fan, Xiaoling Cheng, Xijun Yan, Yongqiang Wu, Zhonghua Luo
:
Multi-objective Firefly algorithm combining logistic mapping and Cauchy mutation. - Dongzhi Cao
, Peng Liang, Tongjuan Wu, Shiqiang Zhang
, Li Zhou:
Enhancing trust and security in IoT computing offloading through game theory and blockchain-based control strategy. - Nianxin Li
, Linbo Zhai, Shudian Song, Xiumin Zhu, Yumei Li, Feng Yang:
Cache allocation policy based on user preference using reinforcement learning in mobile edge computing.
REVIEW ARTICLE
- Mohsen Khani
, Mohammad Mohsen Sadr
, Shahram Jamali:
Deep reinforcement learning-based resource allocation in multi-access edge computing.
SPECIAL ISSUE PAPERS
- Maharage Nisansala Sevwandi Perera, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai:
Secured tracing for group signatures from attribute-based encryption. - Jin Lu
:
A face retrieval technique combining large models and artificial neural networks. - Bing Han, Congfei Li, Hua Deng, Guowei Liu, Ze Zheng:
Domain-specific translation tool from structured text to C source code with code readability enhancement in programmable logic controllers.
RESEARCH ARTICLES
- Luís Cunha
, Eriky Marciano, Anderson Moraes, Leandro Santiago, Carlos Santos
:
New parallelism and heuristic approaches for generating tree t -spanners in graphs. - R. Ratheesh
, M. Saranya Nair, P. Vetrivelan, J. Rajeswari
:
Throughput and coverage based Base Station-Relay Station deployment for 5G cellular network.
SPECIAL ISSUE PAPERS
- Nick Brown
, Gordon Gibb, Evgenij Belikov, Rupert Nash:
Predicting accurate batch queue wait times on production supercomputers by combining machine learning techniques. - Verónica G. Melesse Vergara
, Reuben D. Budiardja
, Wayne Joubert:
Early experiences evaluating the HPE/Cray ecosystem for AMD GPUs.
RESEARCH ARTICLES
- Syed Humaid Hasan, Syeda Huyam Hasan, Usman Ali Khan, Syed Hamid Hasan:
Containerized deep learning in agriculture: Orchestrating GoogleNet with Kubernetes on high performance computing. - Houaida Ghanmi
, Nasreddine Hajlaoui
, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit:
Blockchain-cloud integration: Comprehensive survey and open research issues.
SPECIAL ISSUE PAPER
- Yaqing Chen, Qizhou Yu
, Dan Han
, Hao Jiang:
UAV path planning: Integration of grey wolf algorithm and artificial potential field.
Volume 36, Number 16, July 2024
RESEARCH ARTICLE
- Subil Abraham
, Ryan Prout, Thomas Robinson, Chris Blanton, Matthew Davis:
Evaluating integration and performance of containerized climate applications on a Hewlett Packard Enterprise Cray system.
SPECIAL ISSUE PAPERS
- Sam Dixon, Lina Yao, Robert Davidson:
Modality aware contrastive learning for multimodal human activity recognition. - Jean Luca Bez
, Houjun Tang, M. Scot Breitenfeld, Huihuo Zheng
, Wei-Keng Liao, Kaiyuan Hou, Zanhua Huang, Suren Byna
:
h5bench: A unified benchmark suite for evaluating HDF5 I/O performance on pre-exascale platforms.
RESEARCH ARTICLES
- Mathumohan Swamidoss
, Duraimurugan Samiayya
, Manikandan Gunasekar
:
Next-generation energy-efficient optical networking: DQ-RGK algorithm for dynamic quality of service and adaptive resource allocation. - Asrin Vakili, Hamza Mohammed Ridha Al-Khafaji
, Mehdi Darbandi, Arash Heidari
, Nima Jafari Navimipour
, Mehmet Unal:
A new service composition method in the cloud-based Internet of things environment using a grey wolf optimization algorithm and MapReduce framework.
SPECIAL ISSUE PAPER
- Hao Li
, Wu Yang, Wei Wang, Huanran Wang:
Neural network approaches for rumor stance detection: Simulating complex rumor propagation systems.
RESEARCH ARTICLES
- Dandan Wang, Qi Li:
Developing ensemble clustering through similarity measures: A semi-supervised hierarchical clustering learning. - Cen Chen
, Zhuo Lv, Nuannuan Li, Tao Zhang, Zheng Zhang, Hao Chang:
Design and multilevel reconstruction method of intelligent power industry control system based on digital twins. - Shuxian Lin
, Chenxi Wang, Xiehua Yu, Huirong Fang, Yaojin Lin:
Online streaming feature selection based on hierarchical structure information. - Nanavath Venkatesh Naik
, Madhavi Kasa:
Adaptive QoE-based video delivery by optimizing the bitrate of the video course using network bandwidth and user bandwidth. - Chao Lu
, Feng Hong:
A novel approach for location selection in logistics: Ensemble SVM and improved genetic algorithm. - Helen Schottenhamml
, Ani Anciaux-Sedrakian, Frédéric Blondel
, Harald Köstler, Ulrich Rüde:
waLBerla-wind: A lattice-Boltzmann-based high-performance flow solver for wind energy applications. - Ankita Kumari, Purushottam Singh
, Prashant Pranav
, Sandip Dutta, Soubhik Chakraborty:
Prevention of sleep deprivation attack in MANET using cumulative priority based cluster head selection.
SPECIAL ISSUE PAPERS
- Sanderson L. Gonzaga de Oliveira
, M. I. Santana, Diego N. Brandão, C. Osthoff:
An OpenMP-based breadth-first search implementation using the bag data structure. - Rolando P. Hong Enriquez
, Rosa M. Badia, Barbara M. Chapman, Kirk Bresniker
, Scott Pakin, Alok Mishra, Pedro Bruel, Aditya Dhakal, Gourav Rattihalli, Ninad Hogade, Eitan Frachtenberg, Dejan S. Milojicic:
Quantum optimization algorithms: Energetic implications.
Volume 36, Number 17, August 2024
RESEARCH ARTICLE
- Azade Hashemi Feriz, Mehrdad Jalali
, Yahya Forghani:
Enhancing CNN-LSTM neural networks using jellyfish search algorithm for pandemic modeling.
SPECIAL ISSUE PAPER
- Jiaping Yang, Dongping Ren, Yong Liu
, Hailong Zhou, Yunquan Sun:
Research on PSO-SVM base wine grade recognition based on Max-Relevance and Min-Redundancy feature selection.
RESEARCH ARTICLES
- Syed Minhal Abbas, Nadeem Javaid
, Nabil Ali Alrajeh, Safdar Hussain Bouk, Soliman Alhudaithy:
Towards a robust scale-free network in internet of health things against multiple attacks using an inter-core based reconnection strategy. - N. Jagadish Kumar
, D. Dhinakaran
, A. Naresh Kumar, A. V. Kalpana:
Swarm Intelligence with a Chaotic Leader and a Salp algorithm: HDFS optimization for reduced latency and enhanced availability.
SPECIAL ISSUE PAPER
- Shuai Yuan
, Ningkang Peng, Ziyan Shi, Sichuan Zhao, Runcheng Li, Yanhui Gu, Huan He:
Detection of algal tiny objects based on morphological features.
RESEARCH ARTICLES
- Mohanad R. Aljanabi, Keivan Borna
, Shamsollah Ghanbari:
A fuzzy model for generalized transportation problems in China. - Qifang Luo, Meiyan Wang, Yongquan Zhou
:
A spiral modeling based on manta ray foraging optimization for wireless networks resource allocation. - Riya Kakkar
, Smita Agrawal
, Sudeep Tanwar
:
DEVS: Secure and optimal decentralized energy trading scheme for Electric Vehicle and Charging Station using game theory. - Gyanendra Kumar
, Pragya
:
IPv6 addressing with hidden duplicate address detection to mitigate denial of service attacks in the internet of drone. - Marjan Mokhtari
, Mahdi Kherad
:
Community detection by influential nodes based on random walk distance. - Wei Li
, Tao Feng, Guodong Du
, Sixin Liang, Ang Bian:
Learning to cluster person via graph convolution networks for video-based person re-identification. - Rina Onishi
, Takashi Hoshino, Hideyuki Kawashima:
EPO-R: An efficient garbage collection scheme for long-term transactions.
Volume 36, Number 18, August 2024
Research Article
- S. Kaliraj
, V. Sivakumar
, N. Premkumar
, S. Vatchala:
Snake swarm optimization-based deep reinforcement learning for resource allocation in edge computing environment. - Kirti Bala
, Pankaj Deep Kaur:
Information and communication technology in smart agriculture: A scientometric review. - Shen Qu
:
Application of histogram of oriented gradient features and support vector machine models in stage lighting control in drama. - Roman Kolpakov
, Mikhail Posypkin:
Lower time bounds for parallel solving of the subset sum problem by a dynamic programming algorithm. - Satveer Singh
, Deo Prakash Vidyarthi
:
PMRNA: Parameter matching of realtime and non-realtime applications for resource provisioning in fog-integrated cloud. - R. Renugadevi
, C. T. Kalaivani
, A. Arul Edwin Raj
, Jeffin Gracewell
:
Dynamic edge clustering and task scheduling for edge assisted metaverse system in the field of remote work and collaboration. - Xianpiao Tang, Pengyun Hu, Dewei Yu, Kai Yu, Daoxun Xia
:
A novel relation-aware global attention network for sentiment analysis of students in the wisdom classroom.
Special Issue Paper
- Carlos A. T. Aguni
, Liria M. Sato, Edson T. Midorikawa:
MCMPI: A library with elasticity for multi-domain and public cloud environments. - Alden Stradling
, Steven L. Johnson, Graham van Heule:
Deploying Cray EX systems with CSM at LANL.
Research Article
- Hong Zhang
:
A novel student achievement prediction model based on bagging-CART machine learning algorithm. - Abhay Deep Seth
, Shruti Sharma
, Ankur Ratmele
:
NHAPMAD: Novel hybrid approaches for privacy-preserved multiple attacks detection. - Gongkun Luo, Zhiwen Wang
, Yuhang Wang, Kuangquan Wang:
Detection of pneumonia in chest X-ray image based on separable convolutional neural network. - Ying Xu, Ning Zhang, Ao Wang, Tao Feng, Guodong Du
:
Hospital readmission prediction with hybrid-sampling and self-paced balance learning. - Yuliang Xi
, Xin Yan, Zhao-hong Jia, Bo Yang, Rui Su, Xin Liu:
A dynamic multigraph and multidimensional attention neural network model for metro passenger flow prediction.
Volume 36, Number 19, August 2024
Research Article
- Nannan Zong
, Songzhi Su, Changle Zhou:
Boosting semi-supervised learning under imbalanced regression via pseudo-labeling.
Special Issue Paper
- Dewi Yokelson
, Oskar Lappi
, Srinivasan Ramesh, Miikka S. Väisälä, Kevin A. Huck, Touko Puro, Boyana Norris, Maarit J. Korpi-Lagg
, Keijo Heljanko
, Allen D. Malony:
SOMA: Observability, monitoring, and in situ analytics for exascale applications.
Research Article
- Benbo Zha
, Hong Shen:
Probabilistic scheduling of dynamic I/O requests via application clustering for burst-buffers equipped high-performance computing. - Nan Ding
, Pieter Maris, Hai Ah Nam, Taylor L. Groves
, Muaaz Gul Awan, LeAnn Lindsey, Christopher S. Daley, Oguz Selvitopi, Leonid Oliker, Nicholas J. Wright, Samuel Williams:
Evaluating the potential of disaggregated memory systems for HPC applications. - Yu Zhang
, Tianhao Zhao, Linjie Wu, Zhihua Cui
:
Interval many-objective dynamic charging planning in wireless rechargeable sensor networks. - Subasini Chellathurai Amirthabai
, Udita Malhotra, Thapasimuthu Rajeswari Saravanan, Sudhahar Thachankurichy Natesan:
Healthcare security in cloud-based wireless sensor networks: Botnet attack detection via autoencoder-aided goal-based artificial intelligent agent. - Qi Mao, Jingbo Zhang
, Tianhao Zhao, Xingjuan Cai
:
A many objective based feature selection model for software defect prediction. - Bingkun He
, Haokun Li, Tong Chen:
DRL-based computing offloading approach for large-scale heterogeneous tasks in mobile edge computing. - Ashfaq Ahmad Najar
, Manohar Naik Sugali
, Faisal Rasheed Lone, Azra Nazir:
A novel CNN-based approach for detection and classification of DDoS attacks. - Mohd Azeem Faizi Noor
, Khurram Mustafa:
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers. - K. Yesodha
, S. Viswanathan
, M. Krishnamurthy, Arputharaj Kannan:
Multi-lingual encryption technique using Unicode and Riemann zeta function and elliptic curve cryptography for secured routing in wireless sensor networks.
Special Issue Paper
- Ji Gu
, Yushi Liu, Xiaolong Xu
:
SharpEdge: A QoS-driven task scheduling scheme with blockchain in mobile edge computing.
Volume 36, Number 20, September 2024
Research Article
- Shengxing Bai
, Chenyang Bu, Xindong Wu:
High-degree penalty based global statistical network embedding for name disambiguation in anonymized graph. - Aruna Malik, Samayveer Singh
, Manju, Mohit Kumar
, Sukhpal Singh Gill
:
IoT based sensor network clustering for intelligent transportation system using meta-heuristic algorithm. - Anumukonda Naga Seshu Kumar
, Rajesh Kumar Yadav, Nallanthighal Srinivasa Raghava:
FLOLSTM: Fuzzy logic-driven optimized LSTM for improved malicious traffic detection in hypervisor environments. - Dinesh Soni
, Neetesh Kumar:
Fuzzy logic-based computation offloading technique in fog computing. - Sandeep Kumar
, Arun Solanki:
Improving ROUGE-1 by 6%: A novel multilingual transformer for abstractive news summarization. - Vamshi Adouth
, Eswari Rajagopal:
QSKCG: Quantum-based secure key communication and key generation scheme for outsourced data in cloud. - Ayres Nishio da Silva Junior, Milton Brown Do Coutto Filho
, Julio Cesar Stacchini de Souza, Esteban W. G. Clua:
GPU parallel processing to enable extensive criticality analysis in state estimation. - Bo Ye
, Feng Li, Linghao Zhang, Zhengwei Chang, Bin Wang, Xiaoyu Zhang, Sayina Bodanbai:
Fault diagnosis of power equipment based on variational autoencoder and semi-supervised learning. - Xiaoran Zhao, Changgen Peng
, Hongfa Ding, Weijie Tan:
An integrated graph data privacy attack framework based on graph neural networks in IoT. - Sachin Kumar Gupta
, Parul Gupta, Pawan Singh:
Enhancing UAV-HetNet security through functional encryption framework.
Volume 36, Number 21, September 2024
Research Article
- Mintu Singh
, Maheshwari Prasad Singh:
Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks. - Teng Chang
, Zhixia Zhang, Xingjuan Cai
:
Explainable recommender system directed by reconstructed explanatory factors and multi-modal matrix factorization. - Shahnawaz Ahmad
, Mohd Arif, Javed Ahmad, Mohd. Nazim, Shabana Mehfuz:
Convergent encryption enabled secure data deduplication algorithm for cloud environment. - Li-sen Wei
, Er-Chao Li:
A many-objective evolutionary algorithm based on bi-direction fusion niche dominance.
Special Issue Paper
- Biyuan Yao
, Qingchen Zhang, Ruonan Feng, Xiaokang Wang:
System response curve based first-order optimization algorithms for cyber-physical-social intelligence.
Research Article
- Naga Sravanthi Puppala
, R. Manoharan:
Optimizing pool mining performance: A VIKOR-based model for identifying reputed miners in blockchain networks. - Mehdi Madjid Abbas
, Omar Rafik Merad Boudia, Sidi Mohammed Senouci, Ghalem Belalem:
Blockchain-based secure multifunctional data aggregation for fog-IoT environments. - Rui Zheng
, Linjie Wu, Xingjuan Cai
, Yubin Xu:
Explicable recommendation model based on a time-assisted knowledge graph and many-objective optimization algorithm. - Biqun Xiang, Bo Zhong, Anhua Wang, Wuping Mao, Liang Liu
:
Edge computing collaborative offloading strategy for space-air-ground integrated networks. - Mengjun Wang
, Yuhua Wang, Shuanhu Sun, Xiaobo Bai:
Complex stress mechanism and design method of urban rail prestressed concrete U-beams based on finite element simulation.
Volume 36, Number 22, October 2024
Research Article
- Feng Shi
:
A genetic algorithm-based virtual machine scheduling algorithm for energy-efficient resource management in cloud computing. - Dongxin Lu, Danni Zheng, Lei Kou
, Qingfeng Li, Wende Ke
:
Dark channel enhancement research on human ear images based on smartphone photography. - Suhail Muhammad Kamal
, Yidong Chen
, Shaozi Li:
Adversarial autoencoder for continuous sign language recognition. - Aashima Sharma, Sanmeet Kaur, Maninder Singh:
Enhancing healthcare security: Time-based authentication for privacy-preserving IoMT sensor monitoring framework leveraging blockchain technology. - Sanchit
, Navjot Singh
, Jagpreet Singh:
Multi-objective GA to schedule task graphs on heterogeneous voltage frequency islands. - Xin Liu, Lv Zhao
, Jie Jin
:
A noise-tolerant fuzzy-type zeroing neural network for robust synchronization of chaotic systems. - Junguo Liao
, Haonan Tian
:
MBB-YOLO: A comprehensively improved lightweight algorithm for crowded object detection. - Lei Shi, Zepeng Li, Shuangliang Zhao
, Yuqi Fan, Dingjun Qian:
Non-orthogonal multiple access-based task processing and energy optimization in vehicular edge computing networks. - Purushottam Singh
, Prashant Pranav
, Shamama Anwar
, Sandip Dutta:
Leveraging generative adversarial networks for enhanced cryptographic key generation. - Shuai Wang, Hui Wang
, Futao Liao, Zichen Wei, Min Hu:
Multi-population artificial bee colony algorithm for many-objective cascade reservoir scheduling. - Rourab Paul
, Nimisha Ghosh, Amrutanshu Panigrahi, Amlan Chakrabarti, Prasant Mohapatra:
Blockchain based secret key management for trusted platform module standard in reconfigurable platform. - Steffi P. L.
, W. R. Sam Emmanuel, P. Arockia Jansi Rani:
Network traffic classification based- masked language regression model using CNN. - Linyu Liu
, Raziah Ahmad, Suriati Ahmad, Xuejie Wang:
The application of IGA in urban landscape design optimization. - Jing Gui
, Yongbin Wang, Wuyue Shuai:
Improving reading performance by file prefetching mechanism in distributed cache systems.
Special Issue Paper
- Amir Shehata
, Thomas J. Naughton
, David E. Bernholdt
, Howard Pritchard
:
Bringing HPE Slingshot 11 support to Open MPI.
Volume 36, Number 23, October 2024
Research Article
- Yilin Wu
, Wenzhong Guo, Yaojin Lin:
Label distribution feature selection based on neighborhood rough set. - Glenn K. Lockwood, Alberto Chiusole
, Lisa Gerhardt, Kirill Lozinskiy, David Paul, Nicholas J. Wright:
Architecture and performance of Perlmutter's 35 PB ClusterStor E1000 all-flash file system. - Guohua Jing
:
The quality evaluation system of ideological and political classroom teaching in universities based on GA-BP algorithm.
Special Issue Paper
- Kaiyun Liu, Weibei Fan
, Fu Xiao, Haolin Mao, Huipeng Huang, Yizhou Zhao:
Secure paths based trustworthy fault-tolerant routing in data center networks.
Research Article
- Taha Abdelazziz Rahmani, Ghalem Belalem, Sidi Ahmed Mahmoudi
, Omar Rafik Merad Boudia:
Equalizer: Energy-efficient machine learning-based heterogeneous cluster load balancer. - Jinsheng Fang
, Hanjiang Lin, Jianglong Zhao, Kun Zeng:
An efficient multi-scale large asymmetric-kernel network for lightweight image super-resolution.
Special Issue Paper
- Yao Wu, Weiwei Liu
:
Optimization design of supply chain network based on BP neural network performance evaluation and feedback mechanism.
Research Article
- Namratha M
, Kunwar Singh:
Updated delegated proof of stake and Nash equilibrium: A mining pool game model for blockchain network. - Laya Mohammadi, Vahid Khajehvand
:
Queuing-based energy-efficient processing algorithm for smart transportation through V2V communication. - Vishal Garg
, Bikrampal Kaur
, Surender Jangra
:
Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing. - Aboulfazl Dayyani, Maghsoud Abbaspour
:
SIoT identity management with the ability to preserve owner privacy and built-in resistance to Sybil attacks. - Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, Sunil Prajapat, Pankaj Kumar
:
A provably secure authenticated key agreement protocol for industrial sensor network system. - Masha Sosonkina
, Gabriel Mateescu, Peng Xu, Tosaporn Sattasathuchana, Buu Pham, Mark S. Gordon, Sarom S. Leang:
Runtime performance of a GAMESS quantum chemistry application offloaded to GPUs. - Nidhi Joraviya
, Bhavesh N. Gohil
, Udai Pratap Rao:
Ab-HIDS: An anomaly-based host intrusion detection system using frequency of N-gram system call features and ensemble learning for containerized environment.
Special Issue Paper
- Yang Wu, Mengping Yu, Huan Huang
, Rui Hou:
A study of online academic risk prediction based on neural network multivariate time series features.
Volume 36, Number 24, November 2024
Retraction
- RETRACTION: Minimal Channel Cost-Based Energy-Efficient Resource Allocation Algorithm for Task Offloading Under Fog Computing Environment.
Special Issue Paper
- Qiuming Luo, Senhong Liu
, Jinke Huang, Jinrong Li:
M-DFCPP: A runtime library for multi-machine dataflow computing.
Research Article
- Dharmaraj Dharani
, K. Anitha Kumari
:
A smart surveillance system utilizing modified federated machine learning: Gossip-verifiable and quantum-safe approach. - Oshin Sharma
, Deepak Sharma:
Adam-Ladybug Beetle Optimization enabled multi-objective service placement strategy in fog computing. - Sagarika Mohanty
, Bibhudatta Sahoo:
Metaheuristic algorithms for capacitated controller placement in software defined networks considering failure resilience. - Rongrong Jiang, Zhengqiu Weng
, Lili Shi, Erxuan Weng, Hongmei Li, Weiqiang Wang, Tiantian Zhu, Wuzhao Li:
Intelligent botnet detection in IoT networks using parallel CNN-LSTM fusion. - L. Raja
, G. Sakthi, S. Vimalnath, Subramaniam Gnanasaravanan:
An improved federated transfer learning model for intrusion detection in edge computing empowered wireless sensor networks.
Review Article
- Seyed Reza Rouholamini, Meghdad Mirabi
, Razieh Farazkish, Amir Sahafi
:
Proactive self-healing techniques for cloud computing: A systematic review.
Research Article
- Sumathi Sokkalingam, Rajesh Ramakrishnan:
HybGBS: A hybrid neural network and grey wolf optimizer for intrusion detection in a cloud computing environment. - R. Christal Jebi
, S. Baulkani, L. Femila
:
Hybrid energy-Efficient distributed aided frog leaping dynamic A* with reinforcement learning for enhanced trajectory planning in UAV swarms large-scale networks. - Ayes Chinmay
, Hemanta Kumar Pati
:
VoWiFi cell capacity improvement using A-MPDU frame aggregation technique for VBR traffic. - Ziyu Zhou, Na Wang, Jianwei Liu, Junsong Fu, Lunzhi Deng
:
The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT. - Junnan Liu
, Shengyi Jin, Dong Wang, Han Li:
An archive-based method for efficiently handling small file problems in HDFS.
Volume 36, Number 25, November 2024
Research Article
- Fatma Zohra Lebib
, Saida Kichou:
Recommending cloud services based on social trust: An overview.
Special Issue Paper
- Jinjie Shen
, Jing Wu, Yan Xing, Min Hu, Xiaohua Wang, Daolun Li, Wen-shu Zha:
Dual-task enhanced global-local temporal-spatial network for depression recognition from facial videos.
Research Article
- Jie Fang
, Kaihui Zhao, Shixiao Liang, Jiabin Wang:
Image encryption algorithm based on a novel 2D logistic-sine-coupling chaos map and bit-level dynamic scrambling. - Jiawen Chen, Chao Cai, Fangbin Yan, Bowen Zhou
:
Research on insulator image segmentation and defect recognition technology based on U-Net and YOLOv7. - Zeinab Zoghi
, Gürsel Serpen:
Building an intrusion detection system on UNSW-NB15: Reducing the margin of error to deal with data overlap and imbalance. - Emmanuel Antwi-Boasiako
, Shijie Zhou, Yongjian Liao, Isaac Amankona Obiri
, Eric Kuada, Ebenezer Kwaku Danso, Acheampong Edward Mensah:
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis. - Chinu
, Urvashi Bansal
:
Fair XIDS: Ensuring fairness and transparency in intrusion detection models.
Special Issue Paper
- Jialin Shi
, Youquan Yang, Kailai Zhang:
Noise-robust neural networks for medical image segmentation by dual-strategy sample selection. - Ercan Selçuk Bölükbasi
, Fahreddin Sükrü Torun, Murat Manguoglu:
A distributed memory parallel randomized Kaczmarz for sparse system of equations.
Research Article
- Bingquan Wang, Jin Peng, Meili Cui
:
Secure access technology for industrial internet of things.
Volume 36, Number 26, November 2024
Research Article
- Kumar Sachin Yadav
, Ajit Kumar Keshri:
To secure an e-commerce system using epidemic mathematical modeling with neural network. - Zhang Qingmiao
, Dinghua Zhang:
Novel hawk swarm-optimized deep learning classification with K-nearest neighbor based decision making for autonomous vehicle movement controller. - M. Anand Kumar, Edeh Michael Onyema
, B. Sundaravadivazhagan, Manish Gupta, Achyut Shankar, Venkataramaiah Gude
, Nagendar Yamsani:
Detection and mitigation of few control plane attacks in software defined network environments using deep learning algorithm.
Special Issue Paper
- William F. Godoy
, Pedro Valero-Lara, Keita Teranishi, Prasanna Balaprakash, Jeffrey S. Vetter:
Large language model evaluation for high-performance computing software development.
Research Article
- Shubham Singh
, Amit Kumar Mishra, Siddhartha Kumar Arjaria, Chinmay Bhatt, Daya Shankar Pandey, Ritesh Kumar Yadav:
Improved deep network-based load predictor and optimal load balancing in cloud-fog services.
Special Issue Paper
- Hirotsugu Kakugawa
, Sayaka Kamei, Masahiro Shibata
, Fukuhito Ooshita
:
A self-stabilizing distributed algorithm for the 1-MIS problem under the distance-3 model.
Research Article
- Sushama A. Deshmukh
, Smita L. Kasar:
Applications of blockchain technology in privacy preserving and data security for real time (data) applications. - Yibo Liu, Xuyan Zhang, Chaoqun Wu, Minghui Yang:
Obstacle avoidance planning for industrial robots based on singular manifold splitting configuration space.
Special Issue Paper
- Siyue Sun
, Ma Zhu, Baojun Qi, Chen Liu:
Inverse design of a novel multiport power divider based on hybrid neural network.
Research Article
- V. Charles Prabu
, Perumal Pandiaraja
:
FRC-SGAN based anomaly event recognition for computer night vision in edge and cloud environment.
Volume 36, Number 27, December 2024
Research Article
- Wei Wu
, Feiyue Qiu, Liping Wang, Yanxiu Liu:
Multiscale spatial-temporal transformer with consistency representation learning for multivariate time series classification. - Arash Heidari
, Zahra Amiri, Mohammad Ali Jabraeil Jamali, Nima Jafari:
Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults.
Special Issue Paper
- Mengmeng Cui, Yuan Zhang
, Zhichen Hu, Nan Bi, Tao Du, Kangrong Luo, Juntong Liu:
Attribute expansion relation extraction approach for smart engineering decision-making in edge environments.
Research Article
- Haorui Wang, Yang Liu
, Hong Luo, Yuanyin Luo, Yuyan Zhang, Fei Long, Lijun Li:
Camellia oleifera trunks detection and identification based on improved YOLOv7. - Kalyan Baital
, Amlan Chakrabarti
:
Energy efficient dynamic scheduling of dependent tasks for multi-core real-time systems using delay techniques. - Gajendra Kumar Ahirwar, Ratish Agarwal, Anjana Pandey:
A competent CCHFMO with AMDH for QoS improvisation and efficient route protection in MANET.
Review Article
- G. Sakthivel
, P. Madhubala:
Extreme learning with projection relational algebraic secured data transmission for big cloud data.
Research Article
- Yan Jin, Peyman Arebi
:
A novel controllability method on complex temporal networks based on temporal motifs. - Tayebeh Varmeziar
, Mohammad Ebrahim Shiri, Parisa Rahmani:
Improving QoS in cloud resources scheduling using dynamic clustering algorithm and SM-CDC scheduling model. - Naima Firdaus
, Zahid Raza
:
Federated learning based multi-head attention framework for medical image classification. - Chengying Mao
, Jifu Chen, Dave Towey, Zhuang Zhao, Linlin Wen:
QoS prediction of cloud services by selective ensemble learning on prefilling-based matrix factorizations. - Devishree Naidu
, Niranjan Kumar Ray:
Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks. - Atefeh Hemmati, Amir Masoud Rahmani
:
ClusFC-IoT: A clustering-based approach for data reduction in fog-cloud-enabled IoT. - Yapeng Miao
, Ying Miao
, Xuexue Miao
:
Blockchain-based transparent and certificateless data integrity auditing for cloud storage.
Special Issue Paper
- Yaodong Wang
, Yamin Li:
An in-depth study of dimension-extended dragonfly interconnection network.
Volume 36, Number 28, December 2024
Research Article
- Vijayant Pawar, Shelly Sachdeva
:
PEBS: An efficient patient-enabled blockchain system. - Ming-Chang Lee
, Jia-Chun Lin
, Sokratis K. Katsikas
:
Exploring the effects of RNNs and deep learning frameworks on real-time, lightweight, adaptive time series anomaly detection. - D. Sendil Vadivu
, Narendran Rajagopalan
:
RyuGuard - Combining Ryu and machine learning for proactive DDoS defense in software-defined networks.
Special Issue Paper
- Masashi Oda, Kai Keida, Ryota Yasudo:
A low-latency memory-cube network with dual diagonal mesh topology and bypassed pipelines.
Research Article
- Nesrine Charfi
, Maroua Tounsi, Basel Solaiman
:
Sparse representation of finger knuckle print images for personal identification. - Yang Cao
, Yunwei Dong, Jiajie Peng:
Vulnerability detection based on transformer and high-quality number embedding. - Haixiong Liu, Zuoyong Li
, Jiawei Wu, Kun Zeng, Rong Hu, Wei Zeng:
ASCL: Accelerating semi-supervised learning via contrastive learning. - Nitin Kumar Tyagi
, Kanchan Tyagi:
A systematic multi attributes fuzzy-based decision-making to migrate the monolithic paradigm electronic governance applications to new software architecture. - Sahul Goyal
, Lalit Kumar Awasthi
:
EBWO-GE: An innovative approach to dynamic VM consolidation for cloud data centers. - Wen Meiqi, Xing Siyu
, Wei Bo, Yu Yanting:
A novel superposition coding scheme based on polar code for multi-user detection in underwater acoustic OFDM communication system. - Hardik Saini, Vivek Kumar
, Tanmoy Chakraborty:
Energy efficient permanence-based community detection algorithm. - Ankit Kumar Jain
, Pooja Kumari
, Rajat Dhull, Krish Jindal, Shahid Raza:
Enhancing Software-Defined Networking With Dynamic Load Balancing and Fault Tolerance Using a Q-Learning Approach.
Special Issue Paper
- Xin Wang
:
Comparison of Positioning Error Prediction Results of Industrial Robots Based on Three Different Types of Neural Networks.
Research Article
- Majid Hamid Ali
, Serkan Öztürk:
TCP Congestion Management Using Deep Reinforcement Trained Agent for RED. - Ankur Kumar Singhal, Anurag Singh
:
Mapping Health Pathways: A Network Analysis for Improved Illness Prediction. - Shina Panicker
, T. V. Vijay Kumar, Divakar Yadav:
A Multiobjective Approach for E-Commerce Website Structure Optimization. - K. Aruna
, Pradeep Gurunathan:
Enhancing Edge Environment Scalability: Leveraging Kubernetes for Container Orchestration and Optimization.
Review Article
- Raouia Bouabdallah
, Fairouz Fakhfakh:
Workflow Scheduling in Cloud-Fog Computing Environments: A Systematic Literature Review.
Research Article
- Suneel Kumar
, Sarvesh Pandey
:
WSC: A Crowd-Powered Framework for Mapping Decomposable Complex-Task With Worker-Set. - Nitesh Kumar, Rohit Beniwal
:
A Multi-Constrained Green Routing Protocol for IoT-Based Software-Defined WSN.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.