


default search action
The Journal of Supercomputing, Volume 78
Volume 78, Number 1, January 2022
- Chia-Yin Liu
, Hasitha Muthumala Waidyasooriya
, Masanori Hariyama:
Design space exploration for an FPGA-based quantum annealing simulator with interaction-coefficient-generators. 1-17 - Seyedsalar Sefati
, Maryamsadat Mousavinasab, Roya Zareh Farkhady:
Load balancing in cloud computing environment using the Grey wolf optimization algorithm based on the reliability: performance evaluation. 18-42 - Bernabé López-Albelda
, Francisco M. Castro, José María González-Linares
, Nicolás Guil
:
FlexSched: Efficient scheduling techniques for concurrent kernel execution on GPUs. 43-71 - Saeid Esmaeilzade, Nasrollah Pakniat
, Ziba Eslami:
A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes. 72-92 - Pedram Memari
, Seyedeh Samira Mohammadi
, Fariborz Jolai
, Reza Tavakkoli-Moghaddam
:
A latency-aware task scheduling algorithm for allocating virtual machines in a cost-effective and time-sensitive fog-cloud architecture. 93-122 - Ning Liu, Pai Liu:
Goaling recognition based on intelligent analysis of real-time basketball image of Internet of Things. 123-143 - Huang Zhi-Bin
, Fu Guang-Tao, Dong Dan-Yang, Xiao Chen, Ding Zhe-Lun, Dai Zhi-Tao:
Novel parallel hybrid genetic algorithms on the GPU for the generalized assignment problem. 144-167 - Samaneh Fathi Ozonbolagh, Meghdad Mirabi:
Efficient XML data placement schemes over multiple mobile wireless broadcast channels. 168-199 - Serif Yesil, Ozcan Ozturk
:
Scheduling for heterogeneous systems in accelerator-rich environments. 200-221 - Ting Zhu, Wen Qu, Wenliang Cao:
An optimized image watermarking algorithm based on SVD and IWT. 222-237 - Midia Reshadi, Seyedeh Yasaman Hosseini Mirmahaleh
:
Mapping and virtual neuron assignment algorithms for MAERI accelerator. 238-257 - Kunal Jani, Ankit Kumar, Ronak Nahata:
Hpcfolder: a simple tool used to parallelize algorithms using the message passing interface (MPI). 258-278 - Mohsen Raji
, Mohaddaseh Nikseresht
:
UMOTS: an uncertainty-aware multi-objective genetic algorithm-based static task scheduling for heterogeneous embedded systems. 279-314 - Seyed Mansour Shahidi
, Shahram Etemadi Borujeni
:
Reversible multiplier with a column-wise structure and a reduced number of ancilla inputs and garbage outputs. 315-342 - Soonhyeong Jeong, Byeongtae Ahn
:
A study of application platform for smart contract visualization based blockchain. 343-360 - B. Prasanalakshmi
, K. Murugan, Karthik Srinivasan, S. Shridevi
, Shermin Shamsudheen
, Yu-Chen Hu:
Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography. 361-378 - Ji Luo, Chuhao Zhao, Qiao Chen, Guangqin Li
:
Using deep belief network to construct the agricultural information system based on Internet of Things. 379-405 - Felipe Fernandes Lima Melo, Ermeson C. Andrade, Gustavo Callou:
Optimization of electrical infrastructures at data centers through a DoE-based approach. 406-439 - Yingying Li, Huihui Sun, Jianmin Pang:
Revisiting split tiling for stencil computations in polyhedral compilation. 440-470 - Minhaj Ahmad Khan
:
A cost-effective power-aware approach for scheduling cloudlets in cloud computing environments. 471-496 - Mariem Bouchaala
, Cherif Ghazel, Leïla Azouz Saïdane:
Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card. 497-522 - Elham Khodadadi, Behrang Barekatain
, Elham Yaghoubi, Zahra Mogharrabi-Rad:
FT-PDC: an enhanced hybrid congestion-aware fault-tolerant routing technique based on path diversity for 3D NoC. 523-558 - Yi Guo:
The microscopic visual forms in architectural art design following deep learning. 559-577 - Shengchao Hou:
Auxiliary tumour diagnosis image with deep learning technology. 578-595 - Mina Nasrazadani, Afsaneh Fatemi
, Mohammadali Nematbakhsh:
Sign prediction in sparse social networks using clustering and collaborative filtering. 596-615 - Jianxin Li, Yiting Chen, XiuNiao Zhao, Jinyu Huang:
An improved DQN path planning algorithm. 616-639 - Sokchomrern Ean, Manas Bazarbaev, Keon Myung Lee, Aziz Nasridinov, Kwan-Hee Yoo:
Dynamic programming-based computation of an optimal tap working pattern in nonferrous arc furnace. 640-666 - Heena Wadhwa
, Rajni Aron:
TRAM: Technique for resource allocation and management in fog computing environment. 667-690 - Zhilong Ou
, Yanmin Luo
, Jin Chen, Geng Chen:
SRFNet: selective receptive field network for human pose estimation. 691-711 - Xianyao Chen
, Kyung Tae Kim, Hee Yong Youn:
Feature matching and instance reweighting with transfer learning for human activity recognition using smartphone. 712-739 - Laith Mohammad Abualigah
, Muhammad Alkhrabsheh:
Amended hybrid multi-verse optimizer with genetic algorithm for solving task scheduling problem in cloud computing. 740-765 - Wael Doghri, Ahlem Saddoud
, Lamia Chaari Fourati
:
Cyber-physical systems for structural health monitoring: sensing technologies and intelligent computing. 766-809 - Yu-Wei Chan, Tsan-Ching Kang, Chao-Tung Yang, Chih-Hung Chang
, Shih-Meng Huang, Yin-Te Tsai:
Tool wear prediction using convolutional bidirectional LSTM networks. 810-832 - Ji Hoon Kang:
Scalable implementation of multigrid methods using partial semi-aggregation of coarse grids. 833-851 - P. C. Karthik, J. Sasikumar, Manickam Baskar
, E. Poovammal
, P. Kalyanasundaram:
Field equations for incompressible non-viscous fluids using artificial intelligence. 852-867 - Behrouz Safaiezadeh, Ebrahim Mahdipour, Majid Haghparast
, Samira Sayedsalehi
, Mehdi Hosseinzadeh:
Novel design and simulation of reversible ALU in quantum dot cellular automata. 868-882 - Behrouz Safaiezadeh, Ebrahim Mahdipour, Majid Haghparast
, Samira Sayedsalehi
, Mehdi Hosseinzadeh:
Correction to: Novel design and simulation of reversible ALU in quantum dot cellular automata. 883 - Fatemeh Keshavarz-Kohjerdi
:
Embedding linear arrays of the maximum length in O-shaped meshes. 884-918 - Marina Shimchenko, J. Rubén Titos Gil
, Ricardo Fernández Pascual
, Manuel E. Acacio
, Stefanos Kaxiras
, Alberto Ros
, Alexandra Jimborean
:
Analysing software prefetching opportunities in hardware transactional memory. 919-944 - Robert Ritchie, Khodakhast Bibak
:
DOTMIX-Pro: faster and more efficient variants of DOTMIX for dynamic-multithreading platforms. 945-961 - Elham Mazinan, Hassan Naderi
, Mitra Mirzarezaee
, Saber Saati
:
Microblogs recommendations based on implicit similarity in content social networks. 962-986 - Kasturi Dhal
, Satyananda Champati Rai, Prasant Kumar Pattnaik
, Somanath Tripathy:
CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage. 987-1009 - Shengzhou Hu
, Xingfu Wang, Hua He, Tingting Zhong:
Complex and flexible data access policy in attribute-based encryption. 1010-1029 - Seyedeh Nafiseh Sajedi, Mohsen Maadani
, Meisam Nesari Moghadam
:
F-LEACH: a fuzzy-based data aggregation scheme for healthcare IoT systems. 1030-1047 - Fatma Kuncan
, Yilmaz Kaya, Ramazan Tekin, Melih Kuncan
:
A new approach for physical human activity recognition based on co-occurrence matrices. 1048-1070 - Kuna Venkateswararao
, Pravati Swain:
Binary-PSO-based energy-efficient small cell deployment in 5G ultra-dense network. 1071-1092 - Che Chen, Rongzong Guo, Wenjie Zhang
, Jingmin Yang, Chai Kiat Yeo
:
Optimal sequential relay-remote selection and computation offloading in mobile edge computing. 1093-1116 - P. Venkateswara Rao
, A. P. Siva Kumar:
The societal communication of the Q&A community on topic modeling. 1117-1143 - Ouafa Bentaleb
, Adam S. Z. Belloum, Abderrazak Sebaa
, Aouaouche El-Maouhab:
Containerization technologies: taxonomies, applications and challenges. 1144-1181 - Ahmad Nekooei-Joghdani, Faramarz Safi-Esfahani
:
Dynamic scheduling of independent tasks in cloud computing applying a new hybrid metaheuristic algorithm including Gabor filter, opposition-based learning, multi-verse optimizer, and multi-tracker optimization algorithms. 1182-1243 - Asif Umer
, Babar Nazir
, Zulfiqar Ahmad
:
Adaptive market-oriented combinatorial double auction resource allocation model in cloud computing. 1244-1286 - Asif Umer, Babar Nazir, Zulfqar Ahmad:
Correction to: Adaptive market‑oriented combinatorial double auction resource allocation model in cloud computing. 1287 - Seyed Milad Farzaneh, Omid Fatemi:
A novel virtual machine placement algorithm using RF element in cloud infrastructure. 1288-1329 - Raffaele Cerulli, Ciriaco D'Ambrosio
, Antonio Iossa
, Francesco Palmieri:
Maximum Network Lifetime Problem with Time Slots and coverage constraints: heuristic approaches. 1330-1355 - Xi Wang, Jianxi Fan, Shukui Zhang, Jia Yu:
Node-to-set disjoint paths problem in cross-cubes. 1356-1380 - Guozhen Zhang, Yi Liu, Hailong Yang
, Depei Qian:
Efficient detection of silent data corruption in HPC applications with synchronization-free message verification. 1381-1408 - Rashmi Sahay
, G. Geethakumari, Barsha Mitra:
A holistic framework for prediction of routing attacks in IoT-LLNs. 1409-1433 - Zeinab Nadalizadeh, Mahmoud Momtazpour
:
GreenPacker: renewable- and fragmentation-aware VM placement for geographically distributed green data centers. 1434-1457 - Saeed Roohollahi, Amid Khatibi Bardsiri
, Farshid Keynia
:
Sampling in weighted social networks using a levy flight-based learning automata. 1458-1478 - Abubakar Sulaiman Gezawa
, Zikirillahi A. Bello, Qicong Wang, Yunqi Lei:
A voxelized point clouds representation for object classification and segmentation on 3D data. 1479-1500 - Daniela L. Freire
, Rafael Z. Frantz
, Fabricia Roos-Frantz, Vitor Basto-Fernandes
:
Queue-priority optimized algorithm: a novel task scheduling for runtime systems of application integration platforms. 1501-1531 - Nafiseh Fareghzadeh
:
An architecture supervisor scheme toward performance differentiation and optimization in cloud systems. 1532-1563
Volume 78, Number 2, February 2022
- Saqib R. Chaudhry
, P. Liu, X. Wang, Vinny Cahill, Martin Collier:
A measurement study of offloading virtual network functions to the edge. 1565-1582 - Noureddine Ait Ali
, Ahmed El Abbassi
, Bouchaib Cherradi
:
The performances of iterative type-2 fuzzy C-mean on GPU for image segmentation. 1583-1601 - Zeeshan Ali, Aun Irtaza, Muazzam Maqsood
:
An efficient U-Net framework for lung nodule detection using densely connected dilated convolutions. 1602-1623 - Jun Liu:
The analysis of innovative design and evaluation of energy storage system based on Internet of Things. 1624-1641 - Sarra Bouhenni
, Saïd Yahiaoui
, Nadia Nouali-Taboudjemat, Hamamache Kheddouci:
Efficient parallel edge-centric approach for relaxed graph pattern matching. 1642-1671 - Seyed-Sajad Ahmadpour, Mohammad Mosleh
, Saeed Rasouli Heikalabad:
Efficient designs of quantum-dot cellular automata multiplexer and RAM with physical proof along with power analysis. 1672-1695 - Qi Du
, Hui Huang:
MPI parameter optimization during debugging phase of HPC system. 1696-1711 - Jie Chen
, Xianguo Qing, Fang Ye, Kai Xiao, Kai You, Qian Sun:
Consensus-based bundle algorithm with local replanning for heterogeneous multi-UAV system in the time-sensitive and dynamic environment. 1712-1740 - Ruimin Wang, Zhiwei Yang, Hao Xu, Lu Lu:
A high-performance batched matrix multiplication framework for GPUs under unbalanced input distribution. 1741-1758 - Hanbyul Yeon, Seongbum Seo, Hyesook Son, Yun Jang
:
Visual analysis for panel data imputation with Bayesian network. 1759-1782 - (Withdrawn) A novel IoT-fog-cloud-based healthcare system for monitoring and predicting COVID-19 outspread. 1783-1806
- Huiyan Jiang
, Zhaoshuo Diao
, Yu-Dong Yao:
Deep learning techniques for tumor segmentation: a review. 1807-1851 - Mingjie Wu, Qingkui Chen, Jingjuan Wang:
Toward low CPU usage and efficient DPDK communication in a cluster. 1852-1884 - Mengzhao Zhang, Jeong-Geun Kim, Su-Kyung Yoon, Shin-Dug Kim
:
Dynamic recognition prefetch engine for DRAM-PCM hybrid main memory. 1885-1902 - Sheng Bao, Wenzhong Shi
, Wenzheng Fan
, Pengxin Chen, Mingyan Nie, Haodong Xiang:
A tight coupling mapping method to integrate the ESKF, g2o, and point cloud alignment. 1903-1922 - Nikita Ahuja, Harsha Bikkavilli, Zhaoqi Chen, Mary Mehrnoosh Eshaghian-Wilner
, Abhishek Mittal, Kodiak Ravicz, Bhimsen Sangal, Sagarneel Sarma, Mike Schlesinger, Ariana Wilner:
Real-time cellular-level imaging and medical treatment with a swarm of wireless multifunctional robots. 1923-1943 - P. Kirubanantham, Udhaya Sankar S. M
, C. Amuthadevi, Manickam Baskar
, M. Senthil Raja
, P. C. Karthik:
An intelligent web service group-based recommendation system for long-term composition. 1944-1960 - Cheol-Jin Kim, Myung-Jae Lee, Kyu Hong Hwang, Young-Guk Ha:
End-to-end deep learning-based autonomous driving control for high-speed environment. 1961-1982 - Kaouther Gasmi, Selma Dilek
, Suleyman Tosun
, Suat Ozdemir:
A survey on computation offloading and service placement in fog computing-based IoT. 1983-2014 - Alireza Safaei, Ramin Nassiri
, Amir Masoud Rahmani:
Enterprise service composition models in IoT context: solutions comparison. 2015-2042 - Fu-Hsing Wu, Huey-Jen Lai, Hsuan-Hung Lin, Po-Chou Chan, Chien-Ming Tseng, Kun-Min Chang, Yung-Fu Chen
, Chih-Sheng Lin:
Predictive models for detecting patients more likely to develop acute myocardial infarctions. 2043-2071 - Ali Kadhum Idrees, Raphaël Couturier
:
Energy-saving distributed monitoring-based firefly algorithm in wireless sensors networks. 2072-2097 - Mohammed Nasser Ba-Hutair
, Zaher Al Aghbari
, Ibrahim Kamel:
NodeRank: Finding influential nodes in social networks based on interests. 2098-2124 - Hojjat Emami
:
Stock exchange trading optimization algorithm: a human-inspired method for global optimization. 2125-2174 - Roberto Rocco
, Davide Gadioli, Gianluca Palermo:
Legio: fault resiliency for embarrassingly parallel MPI applications. 2175-2195 - Jiangwei Hao
, Jinchen Xu
, Shaozhong Guo, Yuanyuan Xia:
Design of variable precision transcendental function automatic generator. 2196-2218 - Vahhab Samadi Bokharaie, Ali Jahanian
:
Power side-channel leakage assessment and locating the exact sources of leakage at the early stages of ASIC design process. 2219-2244 - Marcos Falcao
, Caio Souza, Andson M. Balieiro
, Kelvin L. Dias:
An analytical framework for URLLC in hybrid MEC environments. 2245-2264 - Baosheng Li, Baole Han, Chuandong Qin
:
Application of large-scale L2-SVM for microarray classification. 2265-2286 - O. Mohana Chandrika, M. Siva Kumar:
Design and analysis of SRAM cell using reversible logic gates towards smart computing. 2287-2306 - Zahra Jalalian, Mohsen Sharifi
:
A hierarchical multi-objective task scheduling approach for fast big data processing. 2307-2336 - Angshuman Khan
, Rajeev Arya:
High performance nanocomparator: a quantum dot cellular automata-based approach. 2337-2353 - Atanu Barai
, Yehia Arafa, Abdel-Hameed A. Badawy, Gopinath Chennupati, Nandakishore Santhi
, Stephan J. Eidenbenz:
PPT-Multicore: performance prediction of OpenMP applications using reuse profiles and analytical modeling. 2354-2385 - Vijay Kumar Yadav
, Rakesh Kumar Yadav
, Shekhar Verma, S. Venkatesan:
CP2EH: a comprehensive privacy-preserving e-health scheme over cloud. 2386-2416 - Xia Liao
, Yixian Shen, Shengguo Li, Yutong Lu, Yufei Du, Zhiguang Chen:
Optimizing data query performance of Bi-cluster for large-scale scientific data in supercomputers. 2417-2441 - Negin Bagheri Renani, Elham Yaghoubi
, Naser Sadehnezhad, Tofigh Abbasi:
NLR-OP: a high-performance optical router based on North-Last turning model for multicore processors. 2442-2476 - T. Vijayalakshmi, Rathinam Senthamarai
:
Application of homotopy perturbation and variational iteration methods for nonlinear imprecise prey-predator model with stability analysis. 2477-2502 - Fatemeh Alidadi Shamsabadi
, Shaghayegh Bakhtiari Chehelcheshmeh
:
A cloud-based mobile payment system using identity-based signature providing key revocation. 2503-2527 - Hassan Aliakbarpour, Mohammad Taghi Manzuri
, Amir Masoud Rahmani:
Improving the readability and saliency of abstractive text summarization using combination of deep neural networks equipped with auxiliary attention mechanism. 2528-2555 - Hansub Shin, Kisung Lee, Hyuk-Yoon Kwon
:
A comparative experimental study of distributed storage engines for big spatial data processing using GeoSpark. 2556-2579 - D. Rekha, J. Sangeetha, V. Ramaswamy:
Digital document analytics using logistic regressive and deep transition-based dependency parsing. 2580-2596 - Abbas Dehghani
, Ali Kavari, Mahdi Kalbasi
, Keyvan RahimiZadeh
:
A new approach for design of an efficient FPGA-based reconfigurable convolver for image processing. 2597-2615 - Farough Ashkouti
, Keyhan Khamforoosh
, Amir Sheikhahmadi, Hana Khamfroush:
DHkmeans-ℓdiversity: distributed hierarchical K-means for satisfaction of the ℓ-diversity privacy model using Apache Spark. 2616-2650 - (Withdrawn) Smart communication using tri-spectral sign recognition for hearing-impaired people. 2651-2664
- Hsin-Te Wu
:
The internet-of-vehicle traffic condition system developed by artificial intelligence of things. 2665-2680 - Fushun Zhu
, Hua Yan
:
An efficient parallel entropy coding method for JPEG compression based on GPU. 2681-2708 - Tongpo Zhang, Xiaokai Nie, Xu Zhu, Enggee Lim, Fei Ma, Limin Yu
:
Improved Camshift Algorithm in AGV Vision-based Tracking with Edge Computing. 2709-2723 - Shinjin Kang, Soo Kyun Kim
:
Floor plan optimization for indoor environment based on multimodal data. 2724-2743 - Ailin Chen, Pin Yang, Pengsen Cheng:
ACTSSD: social spammer detection based on active learning and co-training. 2744-2771 - Jayabrabu Ramakrishnan, Rajesh Doss
, Thangam Palaniswamy
, Raddad Faqihi
, Dowlath Fathima
, Karthik Srinivasan:
High performance computation of human computer interface for neurodegenerative individuals using eye movements and deep learning technique. 2772-2792 - Dina A. Amer
, Gamal Attiya
, Ibrahim Zeidan, Aida A. Nasr
:
Elite learning Harris hawks optimizer for multi-objective task scheduling in cloud computing. 2793-2818 - Carlos Gomes
, Eduardo Tavares, Meuse Nogueira de O. Junior, Bruno C. S. Nogueira:
Cloud storage availability and performance assessment: a study based on NoSQL DBMS. 2819-2839 - Özgün Özerk, Can Elgezen, Ahmet Can Mert
, Erdinç Öztürk, Erkay Savas:
Efficient number theoretic transform implementation on GPU for homomorphic encryption. 2840-2872 - Muhammad Bilal
, Muazzam Maqsood
, Sadaf Yasmin, Najam Ul Hasan, Seungmin Rho:
A transfer learning-based efficient spatiotemporal human action recognition framework for long and overlapping action classes. 2873-2908 - Xuning Liu, Zhixiang Li, Zixian Zhang, Guoying Zhang:
Coal and gas outbursts prediction based on combination of hybrid feature extraction DWT+FICA-LDA and optimized QPSO-DELM classifier. 2909-2936 - Subrota Kumar Mondal
, Rui Pan
, Hussain Mohammed Dipu Kabir
, Tan Tian, Hong-Ning Dai
:
Kubernetes in IT administration and serverless computing: An empirical study and research challenges. 2937-2987 - Wim Vanderbauwhede
:
Making legacy Fortran code type safe through automated program transformation. 2988-3028 - Sungbum Kim
, Wooyeon Jo, Jino Lee, Taeshik Shon:
AI-enabled device digital forensics for smart cities. 3029-3044 - Ricardo J. Barrientos
, Javier A. Riquelme
, Ruber Hernández-García
, Cristóbal A. Navarro
, Wladimir E. Soto-Silva:
Fast kNN query processing over a multi-node GPU environment. 3045-3071 - Soheir Mohamed Khamis
, Naglaa M. Reda
, Wael Zakaria Abd Allah
:
Combining Range-Suffrage and Sort-Mid Algorithms for Improving Grid Scheduling. 3072-3090 - Soheir Mohamed Khamis
, Naglaa M. Reda
, Wael Zakaria
:
Correction to: Combining Range-Suffrage and Sort-Mid Algorithms for Improving Grid Scheduling. 3091
Volume 78, Number 3, February 2022
- Kamalesh Karmakar
, Rajib K. Das, Sunirmal Khatua
:
An ACO-based multi-objective optimization for cooperating VM placement in cloud data center. 3093-3121 - Didier El Baz, Bilal Fakih, Romeo Sanchez Nigenda
, Vincent Boyer
:
Parallel best-first search algorithms for planning problems on multi-core processors. 3122-3151 - Martti Forsell
, Sara Nikula
, Jussi Roivainen, Ville Leppänen
, Jesper Larsson Träff:
Performance and programmability comparison of the thick control flow architecture and current multicore processors. 3152-3183 - Asma Rahim, Mehr Yahya Durrani, Saira Andleeb Gillani, Zeeshan Ali, Najam Ul Hasan, Mucheol Kim:
An efficient recommender system algorithm using trust data. 3184-3204 - Yonghua Zhang
, Hongxu Jiang, Xiaojian Liu, Haiheng Cao, Yu Du:
High-efficient MPSoC-based CNNs accelerator with optimized storage and dataflow. 3205-3225 - Noha Shehab
, Mahmoud Mohammed Badawy, Hesham Arafat Ali:
Toward feature selection in big data preprocessing based on hybrid cloud-based model. 3226-3265 - Omar Younis Abdulhammed
:
Load balancing of IoT tasks in the cloud computing by using sparrow search algorithm. 3266-3287 - Jia-Wei Chang
:
Enabling progressive system integration for AIoT and speech-based HCI through semantic-aware computing. 3288-3324 - Dragan Korac, Boris Damjanovic, Dejan Simic:
A model of digital identity for better information security in e-learning systems. 3325-3354 - Dragan Korac, Boris Damjanovic, Dejan Simic:
Correction to: A model of digital identity for better information security in e-learning systems. 3355 - Hyeonwoo Kim, Hyungjoon Kim
, Bumyeon Ko, Jonghwa Shim, Eenjun Hwang
:
Two-stage person re-identification scheme using cross-input neighborhood differences. 3356-3373 - Sabrine Khriji
, Yahia Benbelgacem, Rym Chéour, Dhouha El Houssaini, Olfa Kanoun:
Design and implementation of a cloud-based event-driven architecture for real-time data processing in wireless sensor networks. 3374-3401 - Chittetti Venkateswarlu, Venkateswara Rao Nandanavanam:
Optimal channel estimation and interference cancellation in MIMO-OFDM system using MN-based improved AMO model. 3402-3424 - Yan Wang
, Kenli Li, Xia Deng, Keqin Li:
Performance-aware cache management for energy-harvesting nonvolatile processors. 3425-3447 - Jiawei Lu
, Wei Zhao, Haotian Zhu, Jie Li, Zhenbo Cheng, Gang Xiao
:
Optimal machine placement based on improved genetic algorithm in cloud computing. 3448-3476 - Amir Javadpour, Guojun Wang:
cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. 3477-3499 - (Withdrawn) Applying deep learning in football ankle injury for value of high-power magnetic resonance bioimaging evaluation. 3500-3516
- Noor Aldeen Alawad
, Bilal H. Abed-alguni
:
Discrete Jaya with refraction learning and three mutation methods for the permutation flow shop scheduling problem. 3517-3538 - Xiaoying Sun, Qiaoli Lu:
Contrast-enhanced ultrasound in optimization of treatment plans for diabetic nephropathy patients based on deep learning. 3539-3560 - Chunlin Li, Qianqian Cai, Youlong Luo:
Data balancing-based intermediate data partitioning and check point-based cache recovery in Spark environment. 3561-3604 - Marco Atzori
, Wiebke Köpp, Steven Wei Der Chien
, Daniele Massaro
, Fermín Mallor, Adam Peplinski, Mohamad Rezaei, Niclas Jansson
, Stefano Markidis, Ricardo Vinuesa, Erwin Laure, Philipp Schlatter, Tino Weinkauf:
In situ visualization of large-scale turbulence simulations in Nek5000 with ParaView Catalyst. 3605-3620 - Aida Lahouij
, Lazhar Hamel
, Mohamed Graiet
:
An optimization approach for cloud composite services. 3621-3645 - Tariq Mahmood
, Jianqiang Li
, Yan Pei
, Faheem Akhtar
, Suhail Ashfaq Butt
, Allah Ditta
, Sirajuddin Qureshi:
An intelligent fault detection approach based on reinforcement learning system in wireless sensor network. 3646-3675 - Peng Su, Yuanyuan Chen, Mengmeng Lu:
Smart city information processing under internet of things and cloud computing. 3676-3695 - Saurabh Rana
, Mohammad S. Obaidat, Dheerendra Mishra
, Ankita Mishra, Y. Sreenivasa Rao:
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems. 3696-3714 - Abrar Alajlan
, Marwah Almasri:
Automatic lane marking prediction using convolutional neural network and S-Shaped Binary Butterfly Optimization. 3715-3745 - Affan Ahmad Toor, Muhammad Usman
:
Adaptive telecom churn prediction for concept-sensitive imbalance data streams. 3746-3774 - Jinlong Zhang, Shengye Huang:
Improving the performance of uplink visible light communication in urban streets. 3775-3790 - Ye Le, Yaser Ahangari Nanehkaran
, Deborah Simon Mwakapesa, Ruipeng Zhang, Jianbing Yi, Yimin Mao:
FP-DCNN: a parallel optimization algorithm for deep convolutional neural network. 3791-3813 - Emmanuel Bugingo, Wei Zheng, Defu Zhang:
Comparative evaluation of task priorities for processing and bandwidth capacities-based workflow scheduling for cloud environment. 3814-3842 - Jing-You Lu, Hsu-Chao Lai, Wen-Yueh Shih, Yi-Feng Chen, Shen-Hang Huang, Hao-Han Chang
, Jun-Zhe Wang, Jiun-Long Huang
, Tian-Shyr Dai:
Structural break-aware pairs trading strategy using deep reinforcement learning. 3843-3882 - Imen Abdennadher
:
DAACS : a Decision Approach for Autonomic Computing Systems. 3883-3904 - Xiaozhong Chen, Rongli Chen, Cairu Yang:
Research to key success factors of intelligent logistics based on IoT technology. 3905-3939 - Yuxuan Zhao, Ka Lok Man, Jeremy S. Smith, Sheng-Uei Guan:
A novel two-stream structure for video anomaly detection in smart city management. 3940-3954 - Yigang Chang, Qian Wu, Limin Chi, Huaying Huo, Qiang Li:
Adoption of combined detection technology of tumor markers via deep learning algorithm in diagnosis and prognosis of gallbladder carcinoma. 3955-3975 - Jimmy Ming-Tai Wu, Min Wei, Mu-En Wu
, Shahab Tayeb:
Top-k dominating queries on incomplete large dataset. 3976-3997 - Mina Javanmard Goldanloo, Farhad Soleimanian Gharehchopogh
:
A hybrid OBL-based firefly algorithm with symbiotic organisms search algorithm for solving continuous optimization problems. 3998-4031 - Zhongmin Wang, Weiye Zhang
, Xiaomin Jin, Yihua Huang, Chen Lu:
An optimal edge server placement approach for cost reduction and load balancing in intelligent manufacturing. 4032-4056 - D. Kavitha
, C. H. Renumadhavi:
An efficient multilayer deep detection perceptron (MLDDP) methodology for detecting testicular anomalies with or without congenital heart disease (TACHD). 4057-4072 - Qingchun Bai, Jie Zhou
, Liang He:
PG-RNN: using position-gated recurrent neural networks for aspect-based sentiment classification. 4073-4094 - Isil Öz
, Ömer Faruk Karadas:
Regional soft error vulnerability and error propagation analysis for GPGPU applications. 4095-4130 - Arman Aghdashi, Seyedeh Leili Mirtaheri:
Novel dynamic load balancing algorithm for cloud-based big data analytics. 4131-4156 - Arman Aghdashi, Seyedeh Leili Mirtaheri:
Correction to: Novel dynamic load balancing algorithm for cloud‑based big data analytics. 4157 - Ting-Wei Zhang
, Guang-Hui Xu
, Xi-Sheng Zhan, Tao Han:
A new hybrid algorithm for path planning of mobile robot. 4158-4181 - Shanxi Li, Qingguo Zhou
, Rui Zhou, Qingquan Lv:
Intelligent malware detection based on graph convolutional network. 4182-4198 - Weilin Cai
, Heng Chen, Ziheng Wang
, Xingjun Zhang:
Implementation and optimization of ChaCha20 stream cipher on sunway taihuLight supercomputer. 4199-4216 - Jorge González-Domínguez
, José M. Martín-Martínez
, Roberto R. Expósito
:
MPI-dot2dot: A parallel tool to find DNA tandem repeats on multicore clusters. 4217-4235 - Ashish Mohan Yadav
, Kuldeep Narayan Tripathi
, S. C. Sharma:
A bi-objective task scheduling approach in fog computing using hybrid fireworks algorithm. 4236-4260 - Maziyar Grami
:
An energy-aware scheduling of dynamic workflows using big data similarity statistical analysis in cloud computing. 4261-4289 - Lingfeng Huang, Genggeng Liu:
Functional motion detection based on artificial intelligence. 4290-4329 - Gangmin Park, Yong Seok Heo, Kisung Lee, Hyuk-Yoon Kwon
:
A parallel and accurate method for large-scale image segmentation on a cloud environment. 4330-4357 - Biqing Zeng, Heng Yang
, Shuai Liu, Mayi Xu:
Learning for target-dependent sentiment based on local context-aware embedding. 4358-4376 - Jian Zheng
, Jianfeng Wang, Yanping Chen, Shuping Chen, Jingjin Chen, Wenlong Zhong, Wenling Wu:
Effective approximation of high-dimensional space using neural networks. 4377-4397 - Fei Yang, Huyin Zhang, Shiming Tao:
Travel order quantity prediction via attention-based bidirectional LSTM networks. 4398-4420 - Paulo Pereira
, Carlos Melo, Jean Araujo
, Jamilson Dantas, Vinícius Santos, Paulo Maciel:
Availability model for edge-fog-cloud continuum: an evaluation of an end-to-end infrastructure of intelligent traffic management service. 4421-4448 - Jiawen Zhang
, Zhiguo Zhang, Xu Ji, Wei Ren, Yufei Cheng, Chunan Wang, Qingpeng Kan:
Deep learning convolutional neural network in diagnosis of serous effusion in patients with malignant tumor by tomography. 4449-4466 - Hongyu Wu, Lili Wang:
Analysis of lower limb high-risk injury factors of patellar tendon enthesis of basketball players based on deep learning and big data. 4467-4486 - Ki-Hong Park, Yang Sun Lee
:
Simple shadow removal using shadow depth map and illumination-invariant feature. 4487-4502 - M. N. Sudha, M. Rajendiran, Mariusz Specht
, Kasarla Satish Reddy
, S. Sugumaran:
A low-area design of two-factor authentication using DIES and SBI for IoT security. 4503-4525 - Lei Wang, Bin Lin, Rongli Chen, Kuan-Han Lu:
Using data mining methods to develop manufacturing production rule in IoT environment. 4526-4549 - Rongli Chen, Xiaozhong Chen, Cairu Yang:
Using a task dependency job-scheduling method to make energy savings in a cloud computing environment. 4550-4573 - Junfeng Tian, Qianyu Yang:
Horae: causal consistency model based on hot data governance. 4574-4599
Volume 78, Number 4, March 2022
- Lingfeng Huang:
Design of an IoT DDoS attack prediction system based on data mining technology. 4601-4623 - Said Nabi
, Masroor Ahmed:
PSO-RDAL: particle swarm optimization-based resource- and deadline-aware dynamic load balancer for deadline constrained cloud tasks. 4624-4654 - Supriya Raheja, Mohammed Alshehri
, Ahmed A. Mohamed
, Supriya Khaitan, Manoj Kumar
, Thompson Stephan:
A smart intuitionistic fuzzy-based framework for round-robin short-term scheduler. 4655-4679 - Supriya Raheja, Mohammed Alshehri
, Ahmed A. Mohamed
, Supriya Khaitan, Manoj Kumar, Thompson Stephan:
Correction to: A smart intuitionistic fuzzy‑based framework for round‑robin short‑term scheduler. 4680 - Dezhu Zhao, Yufeng Qian
, Jun Liu, Min Yang:
The facial expression recognition technology under image processing and neural network. 4681-4708 - Ramin Safa
, Peyman Bayat
, Leila Moghtader
:
Automatic detection of depression symptoms in twitter using multimodal analysis. 4709-4744 - S. Senthil Kumaran
, S. P. Balakannan
, Jun Li
:
A deep analysis of object capabilities for intelligence considering wireless IoT devices with the DNN approach. 4745-4758 - Jiawen Shi
, Hong Li, Jiale Zhou, Zhicheng Pang, Chiyu Wang:
Optimizing emotion-cause pair extraction task by using mutual assistance single-task model, clause position information and semantic features. 4759-4778 - Jianjiang Li, Zhaochu Deng
, Panpan Du, Jie Lin:
A new software cache structure on Sunway TaihuLight. 4779-4798 - Faisal Alkhateeb, Bilal H. Abed-alguni
, Mohammad Hani Al-rousan:
Discrete hybrid cuckoo search and simulated annealing algorithm for solving the job shop scheduling problem. 4799-4826 - Hao Cao, Shaozhong Guo, Jiangwei Hao, Yuanyuan Xia, Jinchen Xu
:
Superblock-based performance optimization for Sunway Math Library on SW26010 many-core processor. 4827-4849 - Chunlin Li, Jing Zhang, Xianmin Yang:
Scalable blockchain storage mechanism based on two-layer structure and improved distributed consensus. 4850-4881 - Ayeh Moori, Behrang Barekatain
, Mehdi Akbari:
LATOC: an enhanced load balancing algorithm based on hybrid AHP-TOPSIS and OPSO algorithms in cloud computing. 4882-4910 - Mahboubeh Shamsi, Abdolreza Rasouli Kenari
, Roghayeh Aghamohammadi:
Reinforcement learning for traffic light control with emphasis on emergency vehicles. 4911-4937 - Chandrashekhar Meshram
, Rabha W. Ibrahim, Sarita Gajbhiye Meshram
, Sajjad Shaukat Jamal, Agbotiname Lucky Imoize:
An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture. 4938-4959 - Sweety Nain
, Prachi Chaudhary
:
A neural network-based approach for the performance evaluation of branch prediction in instruction-level parallelism processors. 4960-4976 - Mounya Smara, Makhlouf Aliouat
, Saad Harous
, Al-Sakib Khan Pathan
:
Robustness improvement of component-based cloud computing systems. 4977-5009 - Qingquan Liu, Yingli Wu, Zuo Jun, Xin Li:
Deep learning in the information service system of agricultural Internet of Things for innovation enterprise. 5010-5028 - Xiao Liu, Deyu Qi, Wenlin Li, Haotong Zhang:
Exploring the Internet of Things sequence-structure detection and supertask network generation of temporal-spatial-based graph convolutional neural network. 5029-5049 - Prateek
, Rajeev Arya:
Range free localization technique under erroneous estimation in wireless sensor networks. 5050-5074 - Hadeel Alazzam
, Orieb AbuAlghanam, Ahmad Sharieh:
Best path in mountain environment based on parallel A* algorithm and Apache Spark. 5075-5094 - Zhongmin Wang, Gang Wang
, Xiaomin Jin, Xiang Wang, Jianwei Wang:
Caching-based task scheduling for edge computing in intelligent manufacturing. 5095-5117 - Belen Gonzalez-Sanchez
, Miguel A. Vega-Rodríguez
, Sergio Santander-Jiménez
:
Parallel multi-objective optimization approaches for protein encoding. 5118-5148 - Jian Cao, Yongjiang Guo:
Handoff calls' joining behavior and incentive mechanism in wireless cellular networks with retrial orbit. 5149-5180 - Yimin Mao, Dejin Gan, Deborah Simon Mwakapesa, Yaser Ahangari Nanehkaran
, Tao Tao, Xueyu Huang:
A MapReduce-based K-means clustering algorithm. 5181-5202 - Praphula Kumar Jain
, Rajendra Pamula
, Ephrem Admasu Yekun:
A multi-label ensemble predicting model to service recommendation from social media contents. 5203-5220 - Hanifa Teimourian, Amir Teimourian
, Kamil Dimililer
, Fadi M. Al-Turjman
:
The potential of wind energy via an intelligent IoT-oriented assessment. 5221-5240 - K. Ishwarya
, A. Alice Nithya
:
Performance-enhanced real-time lifestyle tracking model based on human activity recognition (PERT-HAR) model through smartphones. 5241-5268 - Chhaihuoy Long, Eunhye Jo
, Yunyoung Nam
:
Development of a yoga posture coaching system using an interactive display based on transfer learning. 5269-5284 - Ying-Hung Pu, Po-Sheng Chiu, Yu-Shiuan Tsai
, Meng-Tsung Liu, Yi-Zeng Hsieh, Shih-Syun Lin:
Aerial face recognition and absolute distance estimation using drone and deep learning. 5285-5305 - Jerry Lacmou Zeutouo
, Vianney Kengne Tchendji
, Jean Frédéric Myoupo
:
High-performance CGM-based parallel algorithms for minimum cost parenthesizing problem. 5306-5332 - E. Karthik, T. Sethukarasi:
Sarcastic user behavior classification and prediction from social media data using firebug swarm optimization-based long short-term memory. 5333-5357 - Ali Banaei, Mohsen Sharifi
:
ETAS: predictive scheduling of functions on worker nodes of Apache OpenWhisk platform. 5358-5393 - Yan Zhang, Hongle Du
, Gang Ke, Lin Zhang, Yeh-Cheng Chen:
Dynamic weighted selective ensemble learning algorithm for imbalanced data streams. 5394-5419 - Rongxin Chen
, Zhijin Wang, Hang Su, Shutong Xie, Zongyue Wang:
Parallel XPath query based on cost optimization. 5420-5449 - Sankhamita Sinha, Subhayan Bhattacharya, Sarbani Roy:
Impact of second-order network motif on online social networks. 5450-5478 - Mai Shawkat, Mahmoud Badawi, Sally M. El-Ghamrawy
, Reham Arnous, Ali I. Eldesoky:
An optimized FP-growth algorithm for discovery of association rules. 5479-5506 - Jiandong Hou, Zhisheng Tian:
Application of recurrent neural network in predicting athletes' sports achievement. 5507-5525 - Naskath Jahangeer
, B. Paramasivan, Zaid Mustafa
, Hamza Aldabbas:
Connectivity analysis of V2V communication with discretionary lane changing approach. 5526-5546 - Huaying Huo, Yigang Chang, Yu Tang:
Analysis of treatment effect of acupuncture on cervical spondylosis and neck pain with the data mining technology under deep learning. 5547-5564 - Danyang Xiao
, Xinxin Li, Jieying Zhou, Yunfei Du, Weigang Wu:
Iteration number-based hierarchical gradient aggregation for distributed deep learning. 5565-5587 - Ying Zhang, Haifeng Zhao:
A multi-agent model for decision making on environmental regulation in urban agglomeration. 5588-5609 - Eshrag A. Refaee
, Shermin Shamsudheen
:
Trust- and energy-aware cluster head selection in a UAV-based wireless sensor network using Fit-FCM. 5610-5625 - Mohammad Mahdi Kazemian, Meghdad Mirabi:
Controller placement in software defined networks using multi-objective antlion algorithm. 5626-5649 - Le Luo, Yi Liu, Hailong Yang
, Depei Qian:
Magas: matrix-based asynchronous graph analytics on shared memory systems. 5650-5680 - Haizhou Ma, Aiping Ding:
Construction and implementation of a college talent cultivation system under deep learning and data mining algorithms. 5681-5696 - Yunfei Yang, Jingwei Yang, Xiantao Huang:
Evaluation of sports public service under fuzzy integral and deep neural network. 5697-5711 - Alireza Salehan
, Arash Deldari
:
Corona virus optimization (CVO): a novel optimization algorithm inspired from the Corona virus pandemic. 5712-5743 - Diksha Rangwani
, Hari Om:
Four-factor mutual authentication scheme for health-care based on wireless body area network. 5744-5778 - Babak Nikmard, Naser Movahhedinia, Mohammad Reza Khayyambashi:
Congestion avoidance by dynamically cache placement method in named data networking. 5779-5805 - Yashwant Singh Patel
, Rishabh Jaiswal, Rajiv Misra:
Deep learning-based multivariate resource utilization prediction for hotspots and coldspots mitigation in green cloud data centers. 5806-5855 - Mehdi Ayar, Ayaz Isazadeh, Farhad Soleimanian Gharehchopogh
, MirHojjat Seyedi
:
Chaotic-based divide-and-conquer feature selection method and its application in cardiac arrhythmia classification. 5856-5882 - Xintong Peng, Lijun Tang:
Biomechanics analysis of real-time tennis batting images using Internet of Things and deep learning. 5883-5902 - Prasanta Kumar Roy
, Ansuman Bhattacharya:
A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment. 5903-5930 - Prasanta Kumar Roy
, Ansuman Bhattacharya:
Correction to: A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment. 5931-5932 - Ji Liu, Xiao Liang, Wenxi Ruan, Bo Zhang:
High-performance medical data processing technology based on distributed parallel machine learning algorithm. 5933-5956 - Xinzhong Liu, Cong Xie, Wenwu Xie
, Peng Zhu, Zhihe Yang:
Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT. 5957-5973 - Wanshui Song, Wenyin Zhang, Linbo Zhai, Luanqi Liu, Jiuru Wang, Shanyun Huang, Bei Li:
EOS.IO blockchain data analysis. 5974-6005 - Neha Garg
, Damanpreet Singh, Major Singh Goraya
:
Optimal virtual machine scheduling in virtualized cloud environment using VIKOR method. 6006-6034 - A. Arunkumar Gudivada
, Gnanou Florence Sudha:
Novel optimized low power design of single-precision floating-point adder using Quantum-dot Cellular Automata. 6035-6053 - Victor Malyshkin
:
Parallel computing technologies. 6054-6055 - Victor Malyshkin
:
Parallel computing technologies 2020. 6056-6059
Volume 78, Number 5, April 2022
- Christos Tsolakis
, Polykarpos Thomadakis, Nikos Chrisochoides:
Tasking framework for adaptive speculative parallel mesh generation. 1-32 - Qinghua Liu
, Jiadui Chen, Yongming Wu, Kai Yang:
Linguistic Z-numbers and cloud model weighted ranking technology and its application in concept evaluation of information axiom. 6061-6089 - Maodong Li, Guanghui Xu
, Bo Fu, Xilin Zhao:
Whale optimization algorithm based on dynamic pinhole imaging and adaptive strategy. 6090-6120 - G. Suseendran, D. Akila
, Hannah Vijaykumar, T. Nusrat Jabeen, R. Nirmala, Anand Nayyar
:
Multi-sensor information fusion for efficient smart transport vehicle tracking and positioning based on deep learning technique. 6121-6146 - Qing Zhang
, Jun-Hua Ren:
Software-defect prediction within and across projects based on improved self-organizing data mining. 6147-6173 - Ke-Jou Hsu, Jerry Chou:
Performance benchmarking and auto-tuning for scientific applications on virtual cluster. 6174-6206 - Gaurav Sharma
, Lava Bhargava
, Vinod Kumar:
Hybrid learning scenario path selection and abstraction framework for smart verification of complex SoCs. 6207-6233 - Sumika Chauhan
, Govind Vashishtha
, Anil Kumar
:
A symbiosis of arithmetic optimizer with slime mould algorithm for improving global optimization and conventional design problem. 6234-6274 - Tarek Hagras
:
Slack extender mechanism for greening dependent-tasks scheduling on DVFS-enabled computing platforms. 6275-6295 - Yongbin Li:
Construction of Internet of Things English terms model and analysis of language features via deep learning. 6296-6317 - Huanyu Cui, Nianbin Wang, Yuhua Wang, Qilong Han, Yuezhu Xu:
An effective SPMV based on block strategy and hybrid compression on GPU. 6318-6339 - Rasool Esmaeilyfard
:
Improving detection of web service antipatterns using crowdsourcing. 6340-6370 - Mingping Qi, Jianhua Chen:
Authentication and key establishment protocol from supersingular isogeny for mobile environments. 6371-6385 - Canghai Yang, Han Wang, Ji Zhang, Long Zuo:
Semi-partitioned scheduling of mixed-criticality system on multiprocessor platforms. 6386-6410 - Mayur Wankhade, Chandra Sekhara Rao Annavarapu, Mukul Kirti Verma:
CBVoSD: context based vectors over sentiment domain ensemble model for review classification. 6411-6447 - Francisco Alejandro Madera-Ramírez
, José Luis López-Martínez
, Francisco Moo-Mena, Jorge R. Gomez-Montalvo
:
CPU-GPU buffer communication using compute shader to fill volumes with spheres. 6448-6460 - Hussam Fakhouri
, Faten Hamad
, Abedalsalam Alawamrah:
Success history intelligent optimizer. 6461-6502 - Chang-Xuan Wan, Bo Li
:
Financial causal sentence recognition based on BERT-CNN text classification. 6503-6527 - Daniela L. Freire
, Rafael Z. Frantz
, Fabricia Roos-Frantz, Vitor Basto-Fernandes
:
Task scheduling characterisation in enterprise application integration. 6528-6566 - Heng Wen
, Suxin Wang, Fuqiang Lu
, Ming Feng, Lei Zhen Wang, Jun Kai Xiong, Ma Cong Si:
Colony search optimization algorithm using global optimization. 6567-6611 - Sanjeev Kumar
, Richa Agrawal:
A comprehensive survey on meta-heuristic-based energy minimization routing techniques for wireless sensor network: classification and challenges. 6612-6663 - Sonal Yadav
, Ritu Raj:
Power efficient network selector placement in control plane of multiple networks-on-chip. 6664-6695 - Tianyi Liu
, Shuoyuan Wang
, Yue Liu, Weiming Quan, Lei Zhang
:
A lightweight neural network framework using linear grouped convolution for human activity recognition on mobile devices. 6696-6716 - Tao Sun, Zhengqiang Xiong, Zixian Wei, Zhengxing Wang:
Infrared image super-resolution method for edge computing based on adaptive nonlocal means. 6717-6738 - Liqiong Xu, Shuming Zhou:
An O(log2 N) algorithm for reliability assessment of augmented cubes based on h-extra edge-connectivity. 6739-6751 - Chunlin Li, Yong Zhang, Youlong Luo:
Adaptive handover based on traffic balancing and multi-dimensional collaborative resource management in MEC environment. 6752-6787 - Sudip Kumar Palit
, Mohuya Chakraborty, Subhalaxmi Chakraborty
:
AUGChain: blockchain-based mobile user authentication scheme in global mobility network. 6788-6816 - Shubha Brata Nath, Subhrendu Chattopadhyay, Raja Karmakar, Sourav Kanti Addya, Sandip Chakraborty
, Soumya K. Ghosh:
Containerized deployment of micro-services in fog devices: a reinforcement learning-based approach. 6817-6845 - Leila Dehbozorgi, Reza Sabbaghi-Nadooshan
, Alireza Kashaninia
:
Realization of processing-in-memory using binary and ternary quantum-dot cellular automata. 6846-6874 - Ling Peng, Dongbo Zhang
:
An adaptive Lévy flight firefly algorithm for multilevel image thresholding based on Rényi entropy. 6875-6896 - Ling Peng, Dongbo Zhang
:
Correction to: An adaptive Lévy flight firefly algorithm for multilevel image thresholding based on Rényi entropy. 6897 - Wael Khallouli
, Jingwei Huang
:
Cluster resource scheduling in cloud computing: literature review and research challenges. 6898-6943 - Vedika Gupta, Stuti Juyal, Yu-Chen Hu
:
Understanding human emotions through speech spectrograms using deep neural network. 6944-6973 - Seifedine Kadry, Venkatesan Rajinikanth
, David Taniar
, Robertas Damasevicius, Xiomara Patricia Blanco-Valencia
:
Automated segmentation of leukocyte from hematological images - a study using various CNN schemes. 6974-6994 - Xinyang Wang
, Lijuan Huang, Qiao Sun, Naqin Zhou, Yuehong Chen, Weiwei Lin, Keqin Li:
The g-extra diagnosability of the balanced hypercube under the PMC and MM* model. 6995-7015 - Dongmei Wang, Yiwen Liang
, Xinmin Yang:
NKA: a pathogen dose-based natural killer cell algorithm and its application to classification. 7016-7037 - Yuhao Xie, Jiarong Liang, Wen Yin, Changzhen Li:
The properties and t/s-diagnosability of k-ary n-cube networks. 7038-7057 - Yuhao Xie, Jiarong Liang, Wen Yin, Changzhen Li:
Correction to: The properties and t/s-diagnosability of k-ary n-cube networks. 7058 - Víctor M. García-Molla
, M. Ángeles Simarro, Francisco-Jose Martínez-Zaldívar, Murilo Boratto
, Pedro Alonso, Alberto González
:
Parallel signal detection for generalized spatial modulation MIMO systems. 7059-7077 - Ameni Kallel
, Molka Rekik
, Mahdi Khemakhem
:
Hybrid-based framework for COVID-19 prediction via federated machine learning models. 7078-7105 - (Withdrawn) Simulation of cross-modal image-text retrieval algorithm under convolutional neural network structure and hash method. 7106-7132
- Saijuan Xu, Ling Wei, Genggeng Liu
, Yeh-Cheng Chen, Guolong Chen:
A high-quality global routing algorithm based on hybrid topology optimization and heuristic search for data processing in MEC. 7133-7157 - José A. Moríñigo
, Andrés Bustos, Rafael Mayo-García:
Error resilience of three GMRES implementations under fault injection. 7158-7185 - Wenlong Zhao, Wu Wang
, Qiao Wang:
Optimization of cosmological N-body simulation with FMM-PM on SIMT accelerators. 7186-7205 - Vimala Balakrishnan
, Zhongliang Shi, Chuan Liang Law, Regine Lim
, Lee Leng Teh, Yue Fan:
A deep learning approach in predicting products' sentiment ratings: a comparative analysis. 7206-7226 - Zhonglin Chen, Cuili Yang, Junfei Qiao
:
The optimal design and application of LSTM neural network based on the hybrid coding PSO algorithm. 7227-7259 - Tina Esther Trueman
, P. Narayanasamy, J. Ashok Kumar:
A graph-based method for ranking of cloud service providers. 7260-7277 - Ling Bo Han
, Bin Lao
, Ge Nong:
Succinct parallel Lempel-Ziv factorization on a multicore computer. 7278-7303 - Xiaojun Zhu
, Yu Wang, Zhengrui Qin:
RoV: receiving files from voice calls using dual-tone multi-frequency method. 7304-7320 - Seifedine Kadry, V. Rajinikanth
, Rubén González Crespo
, Elena Verdú
:
Automated detection of age-related macular degeneration using a pre-trained deep-learning scheme. 7321-7340 - C. Anand Deva Durai
, Arshiya Begum, T. Jemima Jebaseeli, Asfia Sabahath
:
COVID-19 pandemic, predictions and control in Saudi Arabia using SIR-F and age-structured SEIR model. 7341-7353 - Ehsan Jokar
, Mohammad Mosleh
, Mohammad Kheyrandish:
GWBM: an algorithm based on grey wolf optimization and balanced modularity for community discovery in social networks. 7354-7377 - Shiva Jalali, Monireh Hosseini
:
Collaborative filtering in dynamic networks based on deep auto-encoder. 7410-7427 - Jinyan Li, Yaoyang Wu
, Simon Fong, Antonio J. Tallón-Ballesteros, Xin-She Yang
, Sabah Mohammed, Feng Wu:
A binary PSO-based ensemble under-sampling model for rebalancing imbalanced training data. 7428-7463 - Ghazaleh Javadzadeh, Amir Masoud Rahmani, Morteza Saberikamarposhti
:
Mathematical model for the scheduling of real-time applications in IoT using Dew computing. 7464-7488 - Xiaolan Wang:
Application of 3D-HEVC fast coding by Internet of Things data in intelligent decision. 7489-7508 - Taemin Lee, Changhun Jung, Kyungtaek Lee, Sanghyun Seo
:
A study on recognizing multi-real world object and estimating 3D position in augmented reality. 7509-7528
Volume 78, Number 6, April 2022
- Adrian Bernal
, María-Emilia Cambronero
, Alberto Núñez
, Pablo C. Cañizares, Valentín Valero
:
Evaluating cloud interactions with costs and SLAs. 7529-7555 - Antonio Fuentes-Alventosa, Juan Gómez-Luna, José María González-Linares
, Nicolás Guil, Rafael Medina Carnicer
:
CAVLCU: an efficient GPU-based implementation of CAVLC. 7556-7590 - Rydhm Beri, Mithilesh K. Dubey, Anita Gehlot
, Rajesh Singh
, Mohammed Abd-Elnaby, Aman Singh
:
A novel fog-computing-assisted architecture of E-healthcare system for pregnant women. 7591-7615 - Toshpulatov Mukhiddin
, Wookey Lee, Suan Lee
, Arousha Haghighian Roudsari
:
Human pose, hand and mesh estimation using deep learning: a survey. 7616-7654 - Renato B. Hoffmann, Júnior Löff
, Dalvan Griebler
, Luiz Gustavo Fernandes:
OpenMP as runtime for providing high-level stream parallelism on multi-cores. 7655-7676 - Anand Deva Durai
, Mythily Ganesh
, Rincy Merlin Mathew, Dinesh Kumar Anguraj
:
A novel approach with an extensive case study and experiment for automatic code generation from the XMI schema Of UML models. 7677-7699 - Pratima Sharma
, Rajni Jindal
, Dutta Borah Malaya:
Blockchain-based cloud storage system with CP-ABE-based access control and revocation process. 7700-7728 - Bagher Salami, Hamid Noori
, Mahmoud Naghibzadeh:
Online energy-efficient fair scheduling for heterogeneous multi-cores considering shared resource contention. 7729-7748 - Chang-Po Chiang
, Shiuh-Jeng Wang, Yu-Shu Chen:
Manipulating cyber army in pilot case forensics on social media. 7749-7767 - Hamid Reza Mahdiani
:
Z-Voter: a novel high-impedance voter for efficient realization of tristate logic in quantum-dot cellular automata technology. 7768-7787 - Hang Cai:
Application of intelligent real-time image processing in fitness motion detection under internet of things. 7788-7804 - Zongyun Liu, Jingqi Fu
:
Resource pricing and offloading decisions in mobile edge computing based on the Stackelberg game. 7805-7824 - Cássio L. M. Belusso
, Sandro Sawicki, Vitor Basto-Fernandes
, Rafael Z. Frantz, Fabricia Roos-Frantz:
Selecting services in the cloud: a decision support methodology focused on infrastructure-as-a-service context. 7825-7860 - Gaurav Baranwal
, Deo Prakash Vidyarthi:
TRAPPY: a truthfulness and reliability aware application placement policy in fog computing. 7861-7887 - Xiaomin Jin, Feng Gao
, Zhongmin Wang, Yanping Chen:
Optimal deployment of mobile cloudlets for mobile applications in edge computing. 7888-7907 - Roohollah Keshvari, Maryam Imani, Mohsen Parsa Moghaddam:
A clustering-based short-term load forecasting using independent component analysis and multi-scale decomposition transform. 7908-7935 - Mingzu Zhang, Hongxi Liu, Wenshui Lin:
A unified approach to reliability and edge fault tolerance of cube-based interconnection networks under three hypotheses. 7936-7947 - Rajendra Prasad Nayak, Srinivas Sethi
, Sourav Kumar Bhoi, Debasis Mohapatra, Rashmi Ranjan Sahoo
, Pradip Kumar Sharma
, Deepak Puthal
:
TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network. 7948-7981 - Xiaomei Li
, Zhijiang Xie, Xiong Deng, Yanxue Wu
, Yangjun Pi
:
Traffic sign detection based on improved faster R-CNN for autonomous driving. 7982-8002 - Deepika Saxena
, Ashutosh Kumar Singh:
OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments. 8003-8024 - P. Rajasekar
, Yogesh Palanichamy:
A flexible deadline-driven resource provisioning and scheduling algorithm for multiple workflows with VM sharing protocol on WaaS-cloud. 8025-8055 - Jefferson Andres Bravo-Montes, Alonso Martín-Toledano, Alfonso Sánchez-Macián
, Oscar Ruano
, Francisco Garcia-Herrero
:
Design and implementation of efficient QCA full-adders using fault-tolerant majority gates. 8056-8080 - Marcio M. Gonçalves
, Josie E. Rodriguez Condia
, Matteo Sonza Reorda
, Luca Sterpone, José Rodrigo Azambuja:
Evaluating low-level software-based hardening techniques for configurable GPU architectures. 8081-8105 - Mohammad Najafimehr, Sajjad Zarifzadeh, Seyedakbar Mostafavi:
A hybrid machine learning approach for detecting unprecedented DDoS attacks. 8106-8136 - Wafa Abdelghani
, Ikram Amous
, Corinne Amel Zayani
, Florence Sèdes
, Geoffrey Roman-Jimenez:
Dynamic and scalable multi-level trust management model for Social Internet of Things. 8137-8193 - Maede Safari, Zahra Shirmohammadi
, Nezam Rohbani, Hamed Farbeh
:
LETHOR: a thermal-aware proactive routing algorithm for 3D NoCs with less entrance to hot regions. 8194-8218 - Sun-Yuan Hsieh
, Chih-Wei Hsu, Cheng-Han Yeh, Geng-Hua Zhang:
Novel scheme for reducing communication data traffic in advanced metering infrastructure networks. 8219-8246 - Zeeshan Javed, Gon-Woo Kim
:
PanoVILD: a challenging panoramic vision, inertial and LiDAR dataset for simultaneous localization and mapping. 8247-8267 - Chao Gou, Yuchen Zhou
, Dan Li:
Driver attention prediction based on convolution and transformers. 8268-8284 - Dineshkumar Rajendran
, S. Prasanna:
Stealth assessment strategy in distributed systems using optimal deep learning with game based learning. 8285-8301 - Mohammad Amiri-Zarandi, Rozita A. Dara
, Evan D. G. Fraser:
LBTM: A lightweight blockchain-based trust management system for social internet of things. 8302-8320 - Lili Chen, Wensheng Gan, Qi Lin, Shuqiang Huang, Chien-Ming Chen
:
OHUQI: Mining on-shelf high-utility quantitative itemsets. 8321-8345 - Jeydson L. Silva
, Ronaldo R. B. de Aquino, Aida Araujo Ferreira
, Davidson C. Marques:
Deep brain emotional learning-based intelligent controller applied to an inverted pendulum system. 8346-8366 - Chi-Yao Weng, Hao-Yu Weng
, Cheng-Ta Huang
:
High-fidelity reversible data hiding based on PVO and median preserving. 8367-8388 - Nasim Razzaghi, Shahram Babaie
:
A new selfish thing detection method based on Voronoi diagram for Internet of Things. 8389-8408 - Hualin Ma
, Liyan Zhang:
Attention-based framework for weakly supervised video anomaly detection. 8409-8429 - Angshuman Khan
, Rajeev Arya:
Design and energy dissipation analysis of simple QCA multiplexer for nanocomputing. 8430-8444 - Xin Tang, Wenjin Liu, Jia Ren, Yukuan Du, Baodan Chen:
An optimized hardware design of a two-dimensional guide filter and its application in image denoising. 8445-8466 - Chuanhui Shan
, Jun Ou, Xiumei Chen:
Matrix-product neural network based on sequence block matrix product. 8467-8492 - Satish S. Salunkhe
, Shelendra Pal, Abhishek Agrawal, Ravi Rai, S. S. Sreeja Mole, Bos Mathew Jos
:
Energy optimization for CAN bus and media controls in electric vehicles using deep learning algorithms. 8493-8508 - Yilin Yuan
, Jianbiao Zhang, Wanshan Xu, Zheng Li:
Identity-based public data integrity verification scheme in cloud storage system via blockchain. 8509-8530 - Yonghao Wu, Huyin Zhang, Cong Li, Shiming Tao, Fei Yang:
MVDLSTM: MultiView deep LSTM framework for online ride-hailing order prediction. 8531-8559 - K. Nageswara Reddy, M. Thillaikarasi, B. Siva Kumar, T. Suresh:
A novel elephant herd optimization model with a deep extreme Learning machine for solar radiation prediction using weather forecasts. 8560-8576 - Mohd Shariq
, Karan Singh
, Pramod Kumar Maurya
, Ali Ahmadian
, David Taniar
:
AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems. 8577-8602 - Mohd Shariq
, Karan Singh
, Pramod Kumar Maurya
, Ali Ahmadian
, David Taniar
:
Correction to: AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems. 8603 - Anand Ghuli
, Damodar Reddy Edla, João Manuel R. S. Tavares
:
Epileptic seizure endorsement technique using DWT power spectrum. 8604-8624 - Abdullah Saleh Alqahtani
, Saravanan Pandiaraj, Maheswari Murali
, Sami Alshmrany:
An automatic query expansion based on hybrid CMO-COOT algorithm for optimized information retrieval. 8625-8643 - Maryam Panahnejad, Meghdad Mirabi:
APT-Dt-KC: advanced persistent threat detection based on kill-chain model. 8644-8677 - Qiang Liu, Qun Cong:
Kinematic and dynamic control model of wheeled mobile robot under internet of things and neural network. 8678-8707 - Vankamamidi Srinivasa Naresh
, V. V. L. Divakar Allavarpu
, Sivaranjani Reddi:
Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN. 8708-8732 - Hasitha Muthumala Waidyasooriya
, Masanori Hariyama:
Temporal and spatial parallel processing of simulated quantum annealing on a multicore CPU. 8733-8750 - Shaokang Cai
, Dezhi Han, Dun Li
, Zibin Zheng
, Noël Crespi:
An reinforcement learning-based speech censorship chatbot system. 8751-8773 - Se-Hang Cheong
, Kim-Hou Ng, Yain-Whar Si:
An image classification approach for hole detection in wireless sensor networks. 8774-8809 - K. Subba Reddy, K. Rajendra Prasad
, Govardhan Reddy Kamatam, N. Ramanjaneya Reddy:
An extended visual methods to perform data cluster assessment in distributed data systems. 8810-8829 - Maganti Srinivas
, M. Ramesh Patnaik:
Clustering with a high-performance secure routing protocol for mobile ad hoc networks. 8830-8851 - Muneeba Nasir, Abdul Rehman Javed
, Muhammad Adnan Tariq, Muhammad Asim
, Thar Baker
:
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. 8852-8866 - Jaehak Yu, Se Jin Park, Chee Meng Benjamin Ho
, Soonhyun Kwon, Kang-Hee Cho, Yang Sun Lee
:
AI-based stroke prediction system using body motion biosignals during walking. 8867-8889 - (Withdrawn) Intrusion detection based on machine learning in the internet of things, attacks and counter measures. 8890-8924
- K. S. Archana, S. Srinivasan
, S. Prasanna Bharathi, R. Balamurugan
, T. N. Prabakar
, A. Sagai Francis Britto
:
A novel method to improve computational and classification performance of rice plant disease identification. 8925-8945 - Nilesh Vishwasrao Patil
, C. Rama Krishna, Krishan Kumar:
KS-DDoS: Kafka streams-based classification approach for DDoS attacks. 8946-8976 - Sourav Hati, Debashis De, Anwesha Mukherjee
:
DewBCity: blockchain network-based dew-cloud modeling for distributed and decentralized smart cities. 8977-8997
Volume 78, Number 7, May 2022
- Zhensen Chen, Wenyuan Yang, Jingmin Yang
:
Deeply feature fused video super-resolution network using temporal grouping. 8999-9016 - You Fu, Wei Zhou
:
A heterogeneous parallel implementation of the Markov clustering algorithm for large-scale biological networks on distributed CPU-GPU clusters. 9017-9037 - Mouna Ben Said, Nader Ben Amor
, Fatma Ben Taher, Khaled Lahbib:
Multi-constraints self-adaptation for reconfigurable multimedia embedded systems. 9038-9064 - Milad Yadollahi, Arash Shams Taleghani
, Vahid Esfahanian:
Multi-grid ion thruster lifetime simulation using hybrid parallel processing. 9065-9078 - Farshid Samsami Khodadad, Hamid Noori
:
Characterizing energy and performance of soft-core-based homogeneous multiprocessor systems. 9079-9101 - M. V. S. S. Nagendranth
, M. Rajesh Khanna, N. Krishnaraj, Mohamed Yacin Sikkandar, Mohamed Abdelkader Aboamer, R. Surendran
:
Type II fuzzy-based clustering with improved ant colony optimization-based routing (t2fcatr) protocol for secured data transmission in manet. 9102-9120 - Amit Chhabra
, Kuo-Chan Huang, Nebojsa Bacanin
, Tarik A. Rashid
:
Optimizing bag-of-tasks scheduling on cloud data centers using hybrid swarm-intelligence meta-heuristic. 9121-9183 - Julian Morillo
, Maxime Vassaux
, Peter V. Coveney, Marta Garcia-Gasulla
:
Hybrid parallelization of molecular dynamics simulations to reduce load imbalance. 9184-9215 - P. U. Poornima, R. Sridhar
:
High-performance investigation of a snubber circuit-based split source inverter for nonlinear loads using PWM techniques. 9216-9244 - Hyeong-Jin Kim, Hyunjo Lee, Yong-Ki Kim, Jae-Woo Chang
:
Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing. 9245-9284 - Eshrag A. Refaee, Shermin Shamsudheen
:
A computing system that integrates deep learning and the internet of things for effective disease diagnosis in smart health care systems. 9285-9306 - Hua Xiang:
The collection of theater music data and genre recognition under the internet of things and deep belief network. 9307-9325 - Junfeng Tian, Tianfeng Zhang
:
Secure and effective assured deletion scheme with orderly overwriting for cloud data. 9326-9354 - Jiaqi Zhang, Ruijuan Zheng, Xuhui Zhao, Junlong Zhu
, Junwei Xu
, Qingtao Wu
:
A computational resources scheduling algorithm in edge cloud computing: from the energy efficiency of users' perspective. 9355-9376 - Manimurugan Shanmuganathan
, Saad Almutairi
:
A user-based video recommendation approach using CAC filtering, PCA with LDOS-CoMoDa. 9377-9391 - Yu-Chih Wei, Tzu-Yin Liao
, Wei-Chen Wu
:
Using machine learning to detect PII from attributes and supporting activities of information assets. 9392-9413 - K. Anand, A. Vijayaraj
, M. Vijay Anand:
Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing. 9414-9437 - (Withdrawn) FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. 9438-9455
- Zhengbo Chen
, Di Wang, Qi Yu, Fang Zheng, Feng Guo, Zuoning Chen:
AMT: asynchronous in-place matrix transpose mechanism for sunway many-core processor. 9456-9474 - Gang Jin:
Player target tracking and detection in football game video using edge computing and deep learning. 9475-9491 - Wei Ying
, Ryu Fattah, Siyang Zhong, Jingwen Guo
, Xin Zhang:
An efficient and high-order sliding mesh method for computational aeroacoustics. 9492-9520 - Zakieh Sharifian, Behrang Barekatain
, Alfonso Ariza-Quintana
, Zahra Beheshti
, Faramarz Safi-Esfahani:
LOADng-AT: a novel practical implementation of hybrid AHP-TOPSIS algorithm in reactive routing protocol for intelligent IoT-based networks. 9521-9569 - Zhenzhen Tian
, Xinhua Wang:
Construction of enterprise innovation performance model using knowledge base and edge computing. 9570-9594 - Zhifang Liu:
Using neural network to establish manufacture production performance forecasting in IoT environment. 9595-9618 - K. Narasimhulu
, Meena Abarna KT, B. Siva Kumar, T. Suresh:
A novel sampling-based visual topic models with computational intelligence for big social health data clustering. 9619-9641 - Zhi-bin Huang
, Guang-Tao Fu, Ling-jing Cao, Min Yu, Wu-Bing Yang:
A parallel high-precision critical point detection and location for large-scale 3D flow field on the GPU. 9642-9667 - Anum Kalsoom, Muazzam Maqsood, Sadaf Yasmin, Maryam Bukhari, Zian Shin, Seungmin Rho:
A computer-aided diagnostic system for liver tumor detection using modified U-Net architecture. 9668-9690 - Yingbiao Yao, Xiaochong Kong, Jiecheng Bao, Xin Xu, Nenghua Gu, Wei Feng:
Uniform scheduling of interruptible garbage collection and request IO to improve performance and wear-leveling of SSDs. 9691-9710 - Cairu Yang, Xuzhong Zhang:
Research into the application of AI robots in community home leisure interaction. 9711-9740 - Farshad Safaei
, Reza Akbar, Mehrnaz Moudi:
Efficient methods for computing the reliability polynomials of graphs and complex networks. 9741-9781 - Chen Lang
, Ze Wang
, Kaiming He, Shimin Sun
:
POI recommendation based on a multiple bipartite graph network model. 9782-9816 - Víctor M. García-Molla
, Pedro Alonso-Jordá
, Ricardo García-Laguía:
Parallel border tracking in binary images using GPUs. 9817-9839 - Wenzhong Lou, Jinkui Wang, Zilong Su, Dakui Wang:
Application of distributed motion estimation for swarm MAVs in a GPS-restricted environment based on a wireless sensor network. 9840-9861 - Xiaoji Wan, Hailin Li
, Liping Zhang, Yenchun Jim Wu
:
Dimensionality reduction for multivariate time-series data mining. 9862-9878 - Fu-Hsing Wang
, Shuo-I Wang:
Independent spanning trees on WK-recursive networks and WK-recursive pyramids. 9879-9906 - Kang Zhou, Chi Guo
, Huyin Zhang:
Relational attention-based Markov logic network for visual navigation. 9907-9933 - Jianwen Yuan, Qinglin Zhao, Jianqing Li
, Jun Li, Zhiming Cai, Yu-Teng Chang:
Edge mining resources allocation among normal and gap blockchains using game theory. 9934-9951 - Nitish Andola, Raghav Gahlot, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma:
Searchable encryption on the cloud: a survey. 9952-9984 - Danilo Clemente
, Paulo Pereira, Jamilson Dantas, Paulo Romero Martins Maciel:
Availability evaluation of system service hosted in private cloud computing through hierarchical modeling process. 9985-10024 - Mi Yang, An Zhang, Wenhao Bi, Yunong Wang:
A resource-constrained distributed task allocation method based on a two-stage coalition formation methodology for multi-UAVs. 10025-10062 - Chong Wang, Hao Jin
, Ronglei Wei, Ke Zhou:
Revocable, dynamic and decentralized data access control in cloud storage. 10063-10087 - Ningjing Liang
, Xingjun Zhang, Heng Chen, Changjiang Zhang:
Thou code: a triple-erasure-correcting horizontal code with optimal update complexity. 10088-10117 - Gilles Perrot, Stéphane Domas, Raphaël Couturier
:
How separable median filters can get better results than full 2D versions. 10118-10148 - Hossein Sadr
, Mojdeh Nazari Solimandarabi
:
ACNN-TL: attention-based convolutional neural network coupling with transfer learning and contextualized word representation for enhancing the performance of sentiment classification. 10149-10175 - M. Kandan
, Anbazhagan Krishnamurthy, S. Arun Mozhi Selvi, Mohamed Yacin Sikkandar, Mohamed Abdelkader Aboamer, T. Tamilvizhi:
Quasi oppositional Aquila optimizer-based task scheduling approach in an IoT enabled cloud environment. 10176-10190 - Asiya Ashraf, Zeshan Iqbal
, Muhammad Attique Khan
, Usman Tariq
, Seifedine Nimer Kadry, Sang Oh Park:
Scalable offloading using machine learning methods for distributed multi-controller architecture of SDN networks. 10191-10210 - Hamid Mehdi
, Houman Zarrabi
, Ahmad Khadem Zadeh, Amir Masoud Rahmani
:
A flexible energy management approach for smart healthcare on the internet of patients (IoP). 10211-10249 - Md. Rafiul Hassan, Walaa N. Ismail
, Ahmad Chowdhury, Sharara Hossain, Shamsul Huda, Mohammad Mehedi Hassan
:
A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-19. 10250-10274 - Naw Safrin Sattar
, Shaikh Arifuzzaman:
Scalable distributed Louvain algorithm for community detection in large graphs. 10275-10309 - Shih-Chin Tan, Chun-Liang Lai
, Jia-Jeng Hou:
Scenario analysis on medical treatments of patients with knee osteoarthritis. 10310-10325
Volume 78, Number 8, May 2022
- Hamza Noueihed, Heba Harb, Joe Tekli
:
Knowledge-based virtual outdoor weather event simulator using unity 3D. 10620-10655 - Eva Patel
, Dharmender Singh Kushwaha:
A hybrid CNN-LSTM model for predicting server load in cloud computing. 1-30 - Jia-Lang Xu
, Ying-Lin Hsu
:
Analysis of agricultural exports based on deep learning and text mining. 10876-10892 - Ming Gao
, YuBin Lu:
URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system. 10893-10905 - Nazanin Sarrafzade, Reza Entezari-Maleki
, Leonel Sousa:
A genetic-based approach for service placement in fog computing. 10854-10875 - Yuedong Zhang
, Yuanbin Mo:
Chaotic adaptive sailfish optimizer with genetic characteristics for global optimization. 10950-10996 - Yanshul Sharma, Shounak Chakraborty, Sanjay Moulik
:
ETA-HP: an energy and temperature-aware real-time scheduler for heterogeneous platforms. 1-25 - Millán Álvarez Martínez
, Basilio B. Fraguela
, José Carlos Cabaleiro
:
A highly optimized skeleton for unbalanced and deep divide-and-conquer algorithms on multi-core clusters. 10434-10454 - Yongwei Wang
, Jingbo Wu, Zhijun Guo, Chengwei Xie, Junjie Liu, Xin Jin:
Flux-weakening fuzzy adaptive ST-SMO sensorless control algorithm for PMSM in EV. 10930-10949 - Avishek Banerjee
, Sudip Kumar De
, Koushik Majumder, Dinesh Dash, Samiran Chattopadhyay
:
Construction of energy minimized WSN using GA-SAMP-MWPSO and K-mean clustering algorithm with LDCF deployment strategy. 11015-11050 - Alireza Mahjoub
, Fatemeh Vardi, Roya Rad:
A multi-criteria decision based on adaptive routing algorithms with discrete operators for on-chip networks. 10906-10929 - Tran Duy Thanh
, Jun-Ho Huh
:
Building a model to exploit association rules and analyze purchasing behavior based on rough set theory. 11051-11091 - Tapan Kumar Mohanta
, Dushmanta Kumar Das:
Advanced localization algorithm for wireless sensor networks using fractional order class topper optimization. 10405-10433 - Sumaiya Thaseen Ikram, V. Priya, B. Anbarasu, Xiaochun Cheng, Muhammad Rukunuddin Ghalib
, Achyut Shankar
:
Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier. 10725-10756 - Jianshan Zhang
, Ming Li, Zheyi Chen, Bing Lin
:
Computation offloading for object-oriented applications in a UAV-based edge-cloud environment. 10829-10853 - Longqing Zhang
, Liping Bai, Xinwei Zhang, Lei Yang, Liwei Tian, YangHong Zhang:
Multi-factor indicator of THIC intelligent lighting system with BP neural network. 10757-10771 - Kennedy Senagi
, Nicolas Jouandeau:
Parallel construction of Random Forest on GPU. 10480-10500 - Mehmet Hakan Karaata
, Aysha Dabees, Fawaz Alazemi
:
A reliable concurrent multicast algorithm for content distribution. 10542-10574 - V. Ezhil Arasi, K. Indra Gandhi, K. Kulothungan:
Auditable attribute-based data access control using blockchain in cloud storage. 10772-10798 - Ruizhi Zhang:
Analyzing body changes of high-level dance movements through biological image visualization technology by convolutional neural network. 10521-10541 - Seungmin Baek, Eunhye Jo
, Senghour Mey, Yunyoung Nam:
Development of a color block play device for child attentional capability test. 10712-10724 - Shengli Yang, Haoliang Wang, Qiang Chen:
An improved algorithm based on deep learning network for road image redundancy removal. 10385-10404 - Mahnoosh Mahdavimoghadam, Amin Nikanjam
, Monireh Abdoos
:
Improved reinforcement learning in cooperative multi-agent environments using knowledge transfer. 10455-10479 - Amin Heydari Alashti
, Ahmad Asgharian Rezaei
, Alireza Elahi, Sobhan Sayyaran, Mohammad Ghodsi:
Parsisanj: an automatic component-based approach toward search engine evaluation. 10690-10711 - Mohamed Elawady
, Amany M. Sarhan
, Mahmoud Alshewimy
:
Toward a mixed reality domain model for time-Sensitive applications using IoE infrastructure and edge computing (MRIoEF). 10656-10689 - Weiwei Cai, Fazhi He, Xiao Lv:
Multi-core accelerated CRDT for large-scale and dynamic collaboration. 10799-10828 - V. Shenbagalakshmi, T. Jaya:
Application of machine learning and IoT to enable child safety at home environment. 10357-10384 - D. Vinoth, P. Prabhavathy:
An intelligent machine learning-based sarcasm detection and classification model on social networks. 10575-10594 - Tao Wang:
Exploring intelligent image recognition technology of football robot using omnidirectional vision of internet of things. 10501-10520 - Min Wang
, Zhihan Lv
:
Construction of personalized learning and knowledge system of chemistry specialty via the internet of things and clustering algorithm. 10997-11014 - Otávio de Paula Albuquerque, Marcelo Fantinato
, Patrick C. K. Hung, Sarajane Marques Peres, Farkhund Iqbal, Umair Rehman, Muhammad Umair Shah:
Recommendations for a smart toy parental control tool. 11156-11194 - Chenyu Ma, Jinfang Jia
, Zhen Liu, Kun Zhang, Jianqiang Huang, Xiaoying Wang:
Simulation of three-dimensional phase field model with LBM method using OpenCL. 11092-11110 - Ankur O. Bang
, Udai Pratap Rao
:
Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices. 11111-11137 - Lluis Mas
, Jordi Vilaplana, Jordi Mateo, Francesc Solsona
:
A queuing theory model for fog computing. 11138-11155 - Kavita Jaiswal
, Veena Anand:
FAGWO-H: A hybrid method towards fault-tolerant cluster-based routing in wireless sensor network for IoT applications. 11195-11227
Volume 78, Number 9, June 2022
- Zhiyong Xia, Liping Zhang, Shengfeng Liu, Wei Ran, Yujuan Liu, Jihong Tu
:
Deep learning-based hysteroscopic intelligent examination and ultrasound examination for diagnosis of endometrial carcinoma. 11229-11244 - Xiaoyan Zhang, Xiaoyan Zhu, Zhiqiang Xie:
Deep learning in cone-beam computed tomography image segmentation for the diagnosis and treatment of acute pulpitis. 11245-11264 - Pan Luo, Jinling Li:
Dual-source computed tomography image information under deep learning algorithm in evaluation of coronary artery lesion in children with Kawasaki disease. 11265-11282 - Lieguang Chen, Ying Lu, Renzhi Pei, Pisheng Zhang, Xuhui Liu, Xiaohong Du, Dong Chen, Junjie Cao, Shuangyue Li, Xianxu Zhuang:
Deep learning in molecular biology marker recognition of patients with acute myeloid leukemia. 11283-11297 - Ran Lv, Yinpu Tian, Zhen Yu, Chenzhi Liu:
Clinical efficacy of computed tomography-guided microwave ablation sequential transcatheter arterial chemoembolization under edge calculation for primary liver cancer over 5 cm in diameter. 11298-11317 - Lu Cao, Yuling Liu
:
Optimization design and research of simulation system for urban green ecological rainwater by genetic algorithm. 11318-11344 - Belén Bermejo
, Carlos Juiz:
A general method for evaluating the overhead when consolidating servers: performance degradation in virtual machines and containers. 11345-11372 - Muhammed Hanefi Calp, Resul Butuner, Utku Kose
, Atif Alamri, David Camacho:
IoHT-based deep learning controlled robot vehicle for paralyzed patients of smart cities. 11373-11408 - Dylan Jude
, Jayanarayanan Sitaraman, Andrew M. Wissink:
An octree-based, cartesian navier-stokes solver for modern cluster architectures. 11409-11440 - Min Tian, Junjie Wang
, Zanjun Zhang, Wei Du, Jingshan Pan
, Tao Liu:
swSuperLU: A highly scalable sparse direct solver on Sunway manycore architecture. 11441-11463 - Xiaoyan Liu, Yi Liu, Hailong Yang
, Ming Dun, Bohong Yin, Zhongzhi Luan, Depei Qian:
Accelerating approximate matrix multiplication for near-sparse matrices on GPUs. 11464-11491 - Shubhra Jain
, Rahul Kumar Verma
, K. K. Pattanaik
, Anupam Shukla:
A survey on event-driven and query-driven hierarchical routing protocols for mobile sink-based wireless sensor networks. 11492-11538 - Kamil Stokfiszewski
, Kamil Wieloch, Mykhaylo Yatsymirskyy:
An efficient implementation of one-dimensional discrete wavelet transform algorithms for GPU architectures. 11539-11563 - Ali H. Majeed
, Esam Alkaldy
:
High-performance adder using a new XOR gate in QCA technology. 11564-11579 - Yi Wang, Shuran Song
:
An adaptive firefly algorithm for multilevel image thresholding based on minimum cross-entropy. 11580-11600 - Feng Jiang
, Gang Wang, Peng He
, Chengcheng Zheng, Zhiyong Xiao, Yue Wu:
Application of canny operator threshold adaptive segmentation algorithm combined with digital image processing in tunnel face crevice extraction. 11601-11620 - Hui Zeng
:
Influences of mobile edge computing-based service preloading on the early-warning of financial risks. 11621-11639 - R. Abitha, S. Mary Vennila, I. Mohamed Zaheer:
Evolutionary multi-objective optimization of artificial neural network for classification of autism spectrum disorder screening. 11640-11656 - Juan Mompean
, Juan L. Aragón
, Pablo Artal:
Energy-efficient design of a presbyopia correction wearable powered by mobile GPUs and FPGAs. 11657-11679 - Dongmei Wang, Yiwen Liang
, Hongbin Dong, Chengyu Tan, Zhenhua Xiao, Sai Liu:
Innate immune memory and its application to artificial immune systems. 11680-11701 - Anirban Ghose
, Soumyajit Dey:
FGFS: Feature Guided Frontier Scheduling for SIMT DAGs. 11702-11743 - Ahmed Fanfakh, Hassan N. Noura
, Raphaël Couturier
:
ORSCA-GPU: one round stream cipher algorithm for GPU implementation. 11744-11767 - Liwei Tian
, Li Feng, Lei Yang, Yuankai Guo:
Stock price prediction based on LSTM and LightGBM hybrid model. 11768-11793 - Sharif Naser Makhadmeh
, Ammar Kamal Abasi, Mohammed Azmi Al-Betar
:
Hybrid multi-verse optimizer with grey wolf optimizer for power scheduling problem in smart home using IoT. 11794-11829 - Sadaf Mokhtari, Hamid Barati
, Ali Barati
:
A hierarchical congestion control method in clustered internet of things. 11830-11855 - K. Venkatesh, D. Narasimhan
:
Revealing the novel precise subset identification and deduplication of audio substance over the shared public environment. 11856-11872 - Fei Jiang
, Xiao-Ya Ma, Yan-Hua Zhang
, Li Wang, Wen-Liang Cao, Jian-Xin Li, Jin Tong:
A new form of deep learning in smart logistics with IoT environment. 11873-11894 - Huijun Zheng, Yong Peng, Jianlan Guo, Yeh-Cheng Chen:
Course scheduling algorithm based on improved binary cuckoo search. 11895-11920 - Satyajit Padhy, Ming-Han Tsai, Shalini Sharma, Jerry Chou:
CAMIRA: a consolidation-aware migration avoidance job scheduling strategy for virtualized parallel computing clusters. 11921-11948 - Xiaoyun Xia, Zhengxin Huang
, Xue Peng, Zefeng Chen, Yi Xiang:
Performance analysis of evolutionary algorithm for the maximum internal spanning tree problem. 11949-11973 - Leijin Long, Feng He, Hongjiang Liu:
Correction to: The use of remote sensing satellite using deep learning in emergency monitoring of high-level landslides disaster in Jinsha River. 11974 - Satinder Singh Mohar
, Sonia Goyal, Ranjit Kaur:
Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics. 11975-12023 - Sima Sarv Ahrabi
, Lorenzo Piazzo, Alireza Momenzadeh
, Michele Scarpiniti
, Enzo Baccarelli:
Exploiting probability density function of deep convolutional autoencoders' latent space for reliable COVID-19 detection on CT scans. 12024-12045 - Ziheng Wang
, Heng Chen, Xiaoshe Dong
, Weilin Cai, Yan Kang
, Xingjun Zhang:
Extending τ-Lop to model MPI blocking primitives on shared memory. 12046-12069 - Erle Du
:
Impact of bank research and development on total factor productivity and performance evaluation by RBF network. 12070-12092
Volume 78, Number 10, July 2022
- An Braeken
:
Authenticated key agreement protocols for dew-assisted IoT systems. 12093-12113 - Zaid A. Hussain
, Hosam M. F. AboElFotoh
, Bader F. AlBdaiwi:
Independent spanning trees in Eisenstein-Jacobi networks. 12114-12135 - Mehmet Aldag, Yonal Kirsal
, Sadik Ülker:
An analytical modelling and QoS evaluation of fault-tolerant load balancer and web servers in fog computing. 12136-12158 - Chihoon Song
, Young-Woo Sohn
:
The influence of dependability in cloud computing adoption. 12159-12201 - Ju-Won Park
, Min-Woo Kwon, Taeyoung Hong:
Queue congestion prediction for large-scale high performance computing systems using a hidden Markov model. 12202-12223 - Marcos Lupión
, Juan F. Sanjuan, Pilar Martínez Ortigosa
:
Using a Multi-GPU node to accelerate the training of Pix2Pix neural networks. 12224-12241 - Ping Guo
, Minliang Jiang:
TSMSA: a 2DSPP algorithm with multi-strategy rectangle selection. 12242-12277 - Mohammed Alweshah
, Saleh Alkhalaileh, Majdi Beseiso, Muder Almiani
, Salwani Abdullah:
Intrusion detection for IoT based on a hybrid shuffled shepherd optimization algorithm. 12278-12309 - Javier Cano-Cano
, Francisco J. Andújar, Francisco J. Alfaro-Cortés, José L. Sánchez, Gaspar Mora:
Providing quality of service in omni-path networks. 12310-12343 - Jirí Dokulil, Siegfried Benkner
:
The OCR-Vx experience: lessons learned from designing and implementing a task-based runtime system. 12344-12379 - Ming-Shou An
, Dae-Seong Kang:
The distance measurement based on corner detection for rebar spacing in engineering images. 12380-12393 - S. P. Maniraj
, P. Sardarmaran
:
A hybrid deep learning approach for skin cancer diagnosis using subband fusion of 3D wavelets. 12394-12409 - Qing Ye, Yuhao Zhou, Mingjia Shi
, Jiancheng Lv:
FLSGD: free local SGD with parallel synchronization. 12410-12433 - Qing Ye, Yuhao Zhou, Mingjia Shi, Jiancheng Lv:
Correction to: FLSGD: free local SGD with parallel synchronization. 12434 - Yu-Teng Chang, Hui-Ru Yang, Chien-Ming Chen
:
Analysis on improving the application of machine learning in product development. 12435-12460 - Yun Ye, Xiaojuan Zhao, Lu Xiong
:
An improved bat algorithm with velocity weight and curve decreasing. 12461-12475 - F. Yifeng Zheng, S. Lei Huang, Wenjie Zhang, F. Jingmin Yang, F. Liwei Yang, Chai Kiat Yeo:
Distributed algorithm for computation offloading in mobile edge computing considering user mobility and task randomness. 12476-12504 - Carlos Melo
, Felipe Oliveira, Jamilson Dantas, Jean Araujo
, Paulo Pereira, Ronierison Maciel, Paulo Maciel:
Performance and availability evaluation of the blockchain platform hyperledger fabric. 12505-12527 - Meihong Chen, Fuzhi Su:
A basketball game prediction system based on artificial intelligence. 12528-12552 - Wyatt Praharenka
, David Pankratz, João P. L. de Carvalho
, Ehsan Amiri, José Nelson Amaral:
Vectorizing divergent control flow with active-lane consolidation on long-vector architectures. 12553-12588 - Muneeswaran Packiaraj
, Sriram Kailasam
:
HyPar-FCA: a distributed framework based on hybrid partitioning for FCA. 12589-12620 - Xiaoyu Li, Xiuguo Zhang, Peipeng Wang, Zhiying Cao:
Web services recommendation based on Metapath-guided graph attention network. 12621-12647 - Yanni Wang
, Rongchun Guo, Suwen Zhao:
Target tracking algorithm based on multiscale analysis and combinatorial matching. 12648-12661 - Mahmood Lakzaei, Vahid Sattari Naeini
, Amir Sabbagh Molahosseini, Amir Javadpour:
A joint computational and resource allocation model for fast parallel data processing in fog computing. 12662-12685 - Xiaojian Hu, Tong Liu
, Xiatong Hao, Chenxi Lin:
Attention-based Conv-LSTM and Bi-LSTM networks for large-scale traffic speed prediction. 12686-12709 - Vidhi Chaudhary, Preetpal Kaur Buttar
, Manoj Kumar Sachan:
Satellite imagery analysis for road segmentation using U-Net architecture. 12710-12725 - Reza Fani, Morteza Saheb Zamani
:
Runtime hardware Trojan detection by reconfigurable monitoring circuits. 12726-12752 - N. Veni, J. Manjula:
High-performance visual geometric group deep learning architectures for MRI brain tumor classification. 12753-12764 - Muhammad Umar Farooq
, Xingfu Wang
, Ammar Hawbani
, Asad Khan
, Adeel Ahmed
, Saeed H. Alsamhi
, Bushra Qureshi
:
POWER: probabilistic weight-based energy-efficient cluster routing for large-scale wireless sensor networks. 12765-12791 - Chandrashekhar Meshram
, Rabha W. Ibrahim, Sarita Gajbhiye Meshram
, Agbotiname Lucky Imoize, Sajjad Shaukat Jamal, Sharad Kumar Barve:
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric. 12792-12814 - Mingping Qi, Jianhua Chen:
Provably secure post-quantum authenticated key exchange from supersingular isogenies. 12815-12833 - Tariq Ahamed Ahanger
, Abdullah Alqahtani, Meshal Alharbi, Abdullah Algashami:
Cognitive decision-making in smart police industry. 12834-12860 - Suping Liu, Jibo Zhang, Wenlong Su:
An improved method of identifying learner's behaviors based on deep learning. 12861-12872 - Sivadi Balakrishna
:
D-ACSM: a technique for dynamically assigning and adjusting cluster patterns for IoT data analysis. 12873-12897 - Lucas Vinícius, Laécio Rodrigues, Matheus Torquato, Francisco Airton Silva
:
Docker platform aging: a systematic performance evaluation and prediction of resource consumption. 12898-12928 - Romain Dolbeau
:
Correction to: Theoretical peak FLOPS per instruction set: a tutorial. 12929
Volume 78, Number 11, July 2022
- Laiba Hamid, Asmara Jadoon, Hassan Asghar
:
Comparative analysis of task level heuristic scheduling algorithms in cloud computing. 12931-12949 - Hao Liang
, Li Kang
, Jianjun Huang
:
A robust low-rank matrix completion based on truncated nuclear norm and Lp-norm. 12950-12972 - Tianbo Liu, Jindong Zhang
:
An improved path planning algorithm based on fuel consumption. 12973-13003 - Jeremy Mechouche
, Roua Touihri, Mohamed Sellami, Walid Gaaloul:
Conformance checking for autonomous multi-cloud SLA management and adaptation. 13004-13039 - Yanbiao Niu, Xuefeng Yan
, Yongzhen Wang
, Yanzhao Niu:
Dynamic opposite learning enhanced artificial ecosystem optimizer for IIR system identification. 13040-13085 - S. M. Srinivasavarma Vegesna
, Shanmukha Rao Pydi, Sk. Noor Mahammad:
Hardware-based multi-match packet classification in NIDS: an overview and novel extensions for improving the energy efficiency of TCAM-based classifiers. 13086-13121 - Jieling Li, Hao Zhang
, Yanhua Liu, Zhihuang Liu
:
Semi-supervised machine learning framework for network intrusion detection. 13122-13144 - Puneet Kansal
, Manoj Kumar, Om Prakash Verma:
Classification of resource management approaches in fog/edge paradigm and future research prospects: a systematic review. 13145-13204 - Hadi Mojez
, Amir-Massoud Bidgoli, Hamid Haj Seyyed Javadi:
Star capacity-aware latency-based next controller placement problem with considering single controller failure in software-defined wide-area networks. 13205-13244 - Michael P. Kapralos
:
Taylor polynomials as an estimator for certain toeplitz matrices. 13245-13275 - Wenhao Li, Zhan Zhang, Yanjun Shu, Hongwei Liu
, Tianming Liu:
Toward optimal operator parallelism for stream processing topology with limited buffers. 13276-13297 - Changpeng Zhu
, Bo Han, Yinliang Zhao:
A comparative performance study of spark on kubernetes. 13298-13322 - Francisco Orts
, Gloria Ortega López, Ernestas Filatovas
, Ester M. Garzón:
Implementation of three efficient 4-digit fault-tolerant quantum carry lookahead adders. 13323-13341 - Nooshin Mahdavi
, Farhad Razaghian
, Hamed Farbeh
:
Data block manipulation for error rate reduction in STT-MRAM based main memory. 13342-13372 - Tejas M. Modi
, Pravati Swain:
Intelligent routing using convolutional neural network in software-defined data center network. 13373-13392 - Zhiwei Yang, Lu Lu, Ruimin Wang:
A batched GEMM optimization framework for deep learning. 13393-13408 - Mritunjay Rai
, Tanmoy Maity, Rohit Sharma
, Ravindra Kumar Yadav
:
Early detection of foot ulceration in type II diabetic patient using registration method in infrared images and descriptive comparison with deep learning methods. 13409-13426 - Metehan Guzel
, Suat Ozdemir:
Fair and energy-aware IoT service composition under QoS constraints. 13427-13454 - Sergio Moreno-Álvarez
, Mercedes Eugenia Paoletti
, Juan A. Rico-Gallego, Juan Mario Haut
:
Heterogeneous gradient computing optimization for scalable deep neural networks. 13455-13469 - Limin Xia, Changhong Wei
:
Abnormal event detection in surveillance videos based on multi-scale feature and channel-wise attention mechanism. 13470-13490 - Xiaolong Huang
, Alexandre F. Ramos
, Yuefan Deng
:
Optimal circulant graphs as low-latency network topologies. 13491-13510 - Zongmao Cheng, Hao Tan, Jiaxin Wang, Xiao Fu
:
A scheduling scheme for stochastic event capture based on Bayes statistical method. 13511-13529 - Zaher Al Aghbari
, Ahmed M. Khedr, Banafsj Khalifa, P. V. Pravija Raj:
An adaptive coverage aware data gathering scheme using KD-tree and ACO for WSNs with mobile sink. 13530-13553 - HyunJin Kim, Taeshik Shon:
Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing. 13554-13563 - Xin Shuai, Linbo Qing, Mozhi Zhang, Weiheng Sun, Xiaohai He:
A video compression artifact reduction approach combined with quantization parameters estimation. 13564-13582 - Amal Hjouji
, Jaouad EL-Mekkaoui
:
Helmet-fourier orthogonal moments for image representation and recognition. 13583-13623 - Khushboo Jain
, Pawan Singh Mehra
, Anshu Kumar Dwivedi
, Arun Agarwal:
SCADA: scalable cluster-based data aggregation technique for improving network lifetime of wireless sensor networks. 13624-13652 - En-Ming Huang
, Jerry Chou:
Optimization of multi-class 0/1 knapsack problem on GPUs by improving memory access efficiency. 13653-13679 - Ismail Hadj Ahmed, Abdelghani Djebbari
, Amar Kachenoura
, Lotfi Senhadji
:
Telemedical transport layer security based platform for cardiac arrhythmia classification using quadratic time-frequency analysis of HRV signal. 13680-13709 - Ritvik Nimmagadda
, Kritika Arora, Miguel Vargas Martin:
Emotion recognition models for companion robots. 13710-13727 - Vojdan Kjorveziroski
, Sonja Filiposka
:
Kubernetes distributions for the edge: serverless performance evaluation. 13728-13755 - Esmaeil Ghaferi, Razieh Malekhosseini
, Farhad Rad
, Karamollah Bagherifard:
A clustering method for locating services based on fog computing for the internet of things. 13756-13779 - Rui Miao
, Hongxu Jiang
, Fangzheng Tian, Xiaobin Li:
High anti-interference and FPGA-oriented method for real-time ship detection based on structured LBP features. 13780-13813 - Pablo Antonio Martínez
, Gregorio Bernabé
, José Manuel García Carrasco
:
HDNN: a cross-platform MLIR dialect for deep neural networks. 13814-13830 - Ravi Shanker
, Mahua Bhattacharya:
Classification of brain MR images using Modified version of Simplified Pulse-Coupled Neural Network and Linear Programming Twin Support Vector Machines. 13831-13863 - Zeeshan Javed, Gon-Woo Kim
:
Publisher Correction to: PanoVILD: a challenging panoramic vision, inertial and LiDAR dataset for simultaneous localization and mapping. 13864
Volume 78, Number 12, August 2022
- Meiguang Zheng
, Dongbang Mao, Liu Yang, Yeming Wei, Zhigang Hu:
DOSP: an optimal synchronization of parameter server for distributed machine learning. 13865-13892 - Tsu-Yang Wu
, Qian Meng
, Lei Yang, Xinglan Guo, Saru Kumari:
A provably secure lightweight authentication protocol in mobile edge computing environments. 13893-13914 - Victor A. Melent'ev
:
Formal method for the synthesis of optimal topologies of computing systems based on the projective description of graphs. 13915-13941 - Subrat Kumar Pradhan
, Dushmanta Kumar Das:
Delay-discretization-based sliding mode H∞ load frequency control scheme considering actuator saturation of wind-integrated power system. 13942-13987 - Jinrui Zhang
:
Exploration on coal mining-induced rockburst prediction using Internet of things and deep neural network. 13988-14008 - Yingjun Ye, Yongdong Zhang, Weicai Ye:
Failure detection algorithm for Fail-Lagging model applied to HPC. 14009-14033 - Hassan N. Noura
, Raphaël Couturier
, Ola Salman, Kamel Mazouzi:
DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm. 14034-14071 - Mekkaoui Djamel Eddine
, Yanming Shen:
A deep learning based approach for predicting the demand of electric vehicle charge. 14072-14095 - Kai Zeng, Qian Ma, Jiawen Wu, Zhe Chen, Tao Shen, Chenggang Yan:
FPGA-based accelerator for object detection: a comprehensive survey. 14096-14136 - Lucas Leiva
, Martín Vázquez, Jordina Torrents-Barrena:
FPGA acceleration analysis of LibSVM predictors based on high-level synthesis. 14137-14163 - Ping Guo
, Yicheng Jiang:
An improved ant-based heuristic approach for solving the longest cycle problem in large-scale complex networks. 14164-14190 - Liying Liu, Yain-Whar Si
:
1D convolutional neural networks for chart pattern classification in financial time series. 14191-14214 - Jianjiang Li, Jiali Li, Yun Yang, Baixue Ji, Dandan Chen, Xinfu He, Ningming Nie:
A parallel ETD algorithm for large-scale rate theory simulation. 14215-14230 - Said Nabi, Muhammad Aleem
, Masroor Ahmed, Muhammad Arshad Islam, Muhammad Azhar Iqbal:
RADL: a resource and deadline-aware dynamic load-balancer for cloud tasks. 14231-14265 - Vivekanand Jha
, Rashika Sharma:
An energy efficient weighted clustering algorithm in heterogeneous wireless sensor networks. 14266-14293 - Shan Wang, Shusheng Tong:
Analysis of high-level dance movements under deep learning and internet of things. 14294-14316 - Guosun Zeng, Huanliang Xiong, Chunling Ding, Guijuan Kuang, Canghai Wu:
Game strategies among multiple cloud computing platforms for non-cooperative competing assignment user tasks. 14317-14342 - Yun Wang, Lu Huang, Austin Lin Yee
:
Full-convolution Siamese network algorithm under deep learning used in tracking of facial video image in newborns. 14343-14361 - Haoran Zhao, Tao Ren
, Chen Wang, Xiaotao Yang, Yingyou Wen:
Multi-context unsupervised domain adaption for HEp-2 cell classification using maximum partial classifier discrepancy. 14362-14380 - Abdul Quaiyum Ansari
, Vipin Sharma
, Rajesh Mishra:
A 3-disjoint path design of non-blocking shuffle exchange network by extra port alignment. 14381-14401 - Sadegh Eskandari
:
Multi-label feature selection using geometric series of relevance matrix. 14402-14418 - Saeed Akbar
, Ruixuan Li:
A Shapley value-based thermal-efficient workload distribution in heterogeneous data centers. 14419-14447 - Hongyu Shi, Qiubo Li:
Edge computing and the internet of things on agricultural green productivity. 14448-14470 - Ahmadreza Montazerolghaem
:
Softwarization and virtualization of VoIP networks. 14471-14503 - Junwei Xu
, Ruijuan Zheng, Lei Yang, Muhua Liu, Jianqiang Song, Mingchuan Zhang, Qingtao Wu:
Service placement strategy for joint network selection and resource scheduling in edge computing. 14504-14529 - Chunyan She, Shaohua Zeng:
An enhanced local outlier detection using random walk on grid information graph. 14530-14547 - Payal Mittal
, Akashdeep Sharma, Raman Singh
, Arun Kumar Sangaiah
:
On the performance evaluation of object classification models in low altitude aerial data. 14548-14570 - Georgios Zioviris, Kostas Kolomvatsos, George I. Stamoulis:
Credit card fraud detection using a deep learning multistage model. 14571-14596 - Qifen Yang
, Ziyang Li
, Gang Han, Wanyi Gao
, Shuhua Zhu, Xiaotian Wu, Yuhui Deng:
An improvement of spectral clustering algorithm based on fast diffusion search for natural neighbor and affinity propagation. 14597-14625 - Quan Yu, Jin-Yu Song
, Xiao-Han Yu, Kai Cheng, Gang Chen:
To solve the problems of combat mission predictions based on multi-instance genetic fuzzy systems. 14626-14647 - P. V. Sabique
, P. Ganesh
, R. Sivaramakrishnan
:
Stereovision based force estimation with stiffness mapping in surgical tool insertion using recurrent neural network. 14648-14679 - Kyle Spurlock
, Heba Elgazzar
:
A genetic mixed-integer optimization of neural network hyper-parameters. 14680-14702 - Ana Guasque
, José María Aceituno, Patricia Balbastre
, José E. Simó, Alfons Crespo
:
Schedulability analysis of dynamic priority real-time systems with contention. 14703-14725 - Junlu Wang
, Qiang Liu, Baoyan Song:
Blockchain-based multi-malicious double-spending attack blacklist management model. 14726-14755 - Pablo M. Aviles
, Diego Lloria, Jose A. Belloch
, Sandra Roger
, Almudena Lindoso, Maximo Cobos
:
Performance analysis of a millimeter wave MIMO channel estimation method in an embedded multi-core processor. 14756-14767
Volume 78, Number 13, September 2022
- Shirin Kavezadeh, Ashkan Farazin
, Alireza Hosseinzadeh:
Supercomputing of reducing sequenced bases in de novo sequencing of the human genome. 14769-14793 - Sangmin Lee
, Seong Joon Park
, Hwangnam Kim
:
Enhancing gas detection-based swarming through deep reinforcement learning. 14794-14812 - Dipty Tripathi, Amit Biswas
, Anil Kumar Tripathi, Lalit Kumar Singh, Amrita Chaturvedi:
An integrated approach of designing functionality with security for distributed cyber-physical systems. 14813-14845 - Xiaowen Li, Ran Lu
, Peiyu Liu, Zhenfang Zhu:
Graph convolutional networks with hierarchical multi-head attention for aspect-level sentiment classification. 14846-14865 - Janmenjoy Nayak
, Saroj K. Meher
, Alireza Souri
, Bighnaraj Naik, S. Vimal
:
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. 14866-14891 - (Withdrawn) An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment. 14892-14918
- Muhammad Jawad Ikram
, Mostafa Elsayed Saleh, Muhammad Abdulhamid Al-Hashimi, Osama Ahmed Abulnaja:
Investigating the effect of varying block size on power and energy consumption of GPU kernels. 14919-14939 - Martí Anglada
, Enrique de Lucas, Joan-Manuel Parcerisa, Juan L. Aragón
, Antonio González:
Dynamic sampling rate: harnessing frame coherence in graphics applications for energy-efficient GPUs. 14940-14964 - Kai Song
, Wen Li, Boyang Zhang, Liping Yan, Xianchao Wang:
Parallel design and implementation of Jacobi iterative algorithm based on ternary optical computer. 14965-14990 - Vijay Kumar Yadav
, Nitish Andola, Shekhar Verma, S. Venkatesan:
EP2LBS: efficient privacy-preserving scheme for location-based services. 14991-15013 - Rakhi Sharma, Shail Kumar Dinkar
:
A novel social deep autoencoder NMF incentive scheme to detect a selfish node in delay tolerant network. 15014-15041 - Karim Gasmi
:
Hybrid deep learning model for answering visual medical questions. 15042-15059 - Pei-Chun Lin
, Benjamin Yankson, Vishal Chauhan, Manabu Tsukada:
Building a speech recognition system with privacy identification information based on Google Voice for social robots. 15060-15088 - Indranil Sarkar
, Sanjay Kumar
:
Deep learning-based energy-efficient computational offloading strategy in heterogeneous fog computing networks. 15089-15106 - B. Mounica, K. Lavanya:
Feature selection with a deep learning based high-performance computing model for traffic flow analysis of Twitter data. 15107-15122 - Ming Li, Jianshan Zhang
, Bing Lin
, Xing Chen:
MultiOff: offloading support and service deployment for multiple IoT applications in mobile edge computing. 15123-15153 - Jakub Beránek
, Stanislav Böhm, Vojtech Cima:
Analysis of workflow schedulers in simulated distributed environments. 15154-15180 - Reyhaneh Ameri, Mohammad Reza Meybodi, Mohammad Mehdi Daliri Khomami:
Cellular Goore Game and its application to quality-of-service control in wireless sensor networks. 15181-15228 - Xiue Gao, Bo Chen
, Panling Jiang, Zhengtao Xiang, Yufeng Chen, Yunming Wang:
Hierarchy-entropy based method for command and control networks reconfiguration. 15229-15249 - Zalán Heszberger
:
Hyperbolic trees for efficient routing computation. 15250-15268 - Bin Guo, Emil Sekerinski:
Efficient parallel graph trimming by arc-consistency. 15269-15313 - Chih-Min Lo, Jian-Hong Wang
, Hsing-Wen Wang:
Virtual reality human-robot interaction technology acceptance model for learning direct current and alternating current. 15314-15337 - Christian Ponte-Fernández
, Jorge González-Domínguez, María J. Martín
:
Fiuncho: a program for any-order epistasis detection in CPU clusters. 15338-15357 - Somayeh Kashi, Ahmad Patooghy, Dara Rahmati, Mahdi Fazeli
:
A multi-application approach for synthesizing custom network-on-chips. 15358-15380 - Changqing Gong, Ting Wang, Wanying He, Han Qi
:
A quantum approximate optimization algorithm for solving Hamilton path problem. 15381-15403 - Betzabeth León
, Sandra Méndez
, Daniel Franco
, Dolores Rexachs
, Emilio Luque
:
A model of checkpoint behavior for applications that have I/O. 15404-15436 - Betzabeth León
, Sandra Méndez
, Daniel Franco
, Dolores Rexachs
, Emilio Luque
:
Correction to: A model of checkpoint behavior for applications that have I/O. 15437-15438 - P. N. Senthil Prakash
, N. Rajkumar:
HSVNN: an efficient medical data classification using dimensionality reduction combined with hybrid support vector neural network. 15439-15462 - Eht E. Sham
, Deo Prakash Vidyarthi
:
Admission control and resource provisioning in fog-integrated cloud using modified fuzzy inference system. 15463-15503 - Tengteng Liang, Mingzu Zhang, Xing Yang:
Reliability analysis of the pentanary n-cube based on h-extra edge-connectivity with a concentration behavior. 15504-15531 - Jingjing Guo, Chunlin Li, Youlong Luo:
Resource management and switch migration in SDN-based multi-access edge computing environments. 15532-15566 - Murugesan Kalaiarasi, Vepadappu Raman Venkatasubramani, V. Vinoth Thyagarajan, S. Rajaram:
A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms. 15567-15597 - Elham Pashaei, Elnaz Pashaei:
Hybrid binary arithmetic optimization algorithm with simulated annealing for feature selection in high-dimensional biomedical data. 15598-15637 - Mohammad Javad Shayegan
, Mehdi Faizollahi-Samarin:
An extended version of sectional MinHash method for near-duplicate detection. 15638-15662 - Zeyu Ji
, Xingjun Zhang, Jingbo Li, Jia Wei, Zheng Wei:
EP4DDL: addressing straggler problem in heterogeneous distributed deep learning. 15663-15680 - Chuanzhu Zhang:
Evaluation and analysis of human resource management mode and its talent screening factors based on decision tree algorithm. 15681-15713
Volume 78, Number 14, September 2022
- Jose A. Belloch
, José M. Badía, Germán León
, Balázs Bank, Vesa Välimäki
:
Multicore implementation of a multichannel parallel graphic equalizer. 15715-15729 - Hazem M. Bahig, Dieaa I. Nassr, Mohammed A. Mahdi
, Mohamed A. G. Hazber
, Khaled Abdul-Aziz Al-Utaibi, Hatem M. Bahig:
Speeding up wheel factoring method. 15730-15748 - Peyman Rahmani
, Seyed Mostafa Fakhrahmad
, Mohammad Taheri
:
New attacks on secret sharing-based data outsourcing: toward a resistant scheme. 15749-15785 - Hanan Suwi
, Laaziz Lahlou, Nadjia Kara, Claes Edstrom:
RAFALE: Rethinking the provisioning of virtuAl network services using a Fast and scAlable machine LEarning approach. 15786-15819 - Lubnnia Morais Florêncio Souza
, Kádna Camboim, Fernanda M. R. Alencar:
A systematic literature review about integrating dependability attributes, performability and sustainability in the implantation of cooling subsystems in data center. 15820-15856 - Tzu-Liang Kung
:
Exact assessment of the super Pk-connectivity for the crossed cube interconnection network. 15857-15881 - Tongtong Geng, Yueping Du:
Applying the blockchain-based deep reinforcement consensus algorithm to the intelligent manufacturing model under internet of things. 15882-15904 - Mohsen Taherinia, Mahdi Esmaeili, Behrouz Minaei-Bidgoli:
A high-performance algorithm for finding influential nodes in large-scale social networks. 15905-15952 - Hsiu-Hsia Lin
, Tianyi Zhang, Yu-Chieh Wang, Chao-Tung Yang
, Lun-Jou Lo, Chun-Hao Liao, Shih-Ku Kuang:
A system for quantifying facial symmetry from 3D contour maps based on transfer learning and fast R-CNN. 15953-15973 - Chunyan Ruan, Wen Qu, Jianfeng Luo, Kuan-Han Lu:
An algorithm for calculating the degree of similarity between English words through the different position and appearance coefficients of letters. 15974-15994 - Ningrinla Marchang
, Goldie M. Meitei, Tejendra Thakur:
Task reduction using regression-based missing data imputation in sparse mobile crowdsensing. 15995-16028 - Xiaomei Zhang
, Pengming Zhang, Xin Zeng, Yajie Wang, Chi-Hung Chi:
sAuth: a hierarchical implicit authentication mechanism for service robots. 16029-16055 - Islam Alshawish, Ali Al-Haj
:
An efficient mutual authentication scheme for IoT systems. 16056-16087 - Yao Song
, Liang Wang, Limin Xiao, Wei Wei, Rafal Scherer, Guangjun Qin, Jinquan Wang:
Hypergraph-partitioning-based online joint scheduling of tasks and data. 16088-16117 - Deepa Devassy
, J. Immanuel Johnraja, Getzi Jeba Leelipushpam Paulraj:
NBA: novel bio-inspired algorithm for energy optimization in WSN for IoT applications. 16118-16135 - Farzaneh Kaviani
, Mohammadreza Soltanaghaei
:
CQARPL: Congestion and QoS-aware RPL for IoT applications under heavy traffic. 16136-16166 - Vinod Kumar
, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat
, Jangirala Srinivas, Musheer Ahmad
, Adesh Kumari:
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure. 16167-16196 - Muruganantham Ponnusamy, Pradeep Bedi, Tamilarasi Suresh
, Aravindhan Alagarsamy
, R. Manikandan, Natarajan Yuvaraj
:
Design and analysis of text document clustering using salp swarm algorithm. 16197-16213 - Qi Cheng, Yixin Chen, Yuteng Xiao
, Hongsheng Yin, Weidong Liu:
A dual-stage attention-based Bi-LSTM network for multivariate time series prediction. 16214-16235 - Han Xiao
, Shi-yang Xiao, Ge Ma, Cailin Li:
Image Sobel edge extraction algorithm accelerated by OpenCL. 16236-16265 - Kai Lei
, Hao Ye, Junjie Fang, Peiwu Chen, Liangjie Zhang
, Jing Xiao:
GBRM: a graph embedding and blockchain-based resource management framework for 5G MEC. 16266-16285 - Moonyoung Chung, Soon J. Hyun, Woong-Kee Loh
:
Efficient exact k-flexible aggregate nearest neighbor search in road networks using the M-tree. 16286-16302 - Mahdi Maleknasab Ardakani
, Mohammad Ali Tabarzad
, Mohammad Amin Shayegan:
Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm. 16303-16335 - S. Manimaran, V. N. Sastry, N. P. Gopalan:
STMAD: sensor-based threat's mitigation on smartphones using allowlist and denylist. 16336-16363 - Dilli Babu Salvakkam
, Rajendra Pamula
:
MESSB-LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage. 16364-16393 - Gautam Pal
:
An efficient system using implicit feedback and lifelong learning approach to improve recommendation. 16394-16424 - (Withdrawn) Application of deep learning to detect defects on the surface of steel balls in an IoT environment. 16425-16452
- Prasannavenkatesan Theerthagiri
:
Mobility prediction for random walk mobility model using ARIMA in mobile ad hoc networks. 16453-16484 - Kunmei Li, Nasser Fard:
Analysis of impact of balanced level on MI-based and non-MI-based feature selection methods. 16485-16497 - R. Ramachandran
, K. Arutchelvan:
ArRaNER: A novel named entity recognition model for biomedical literature documents. 16498-16511 - Yuxi Hu, Taimeng Fu, Guanchong Niu, Zixiao Liu, Man-On Pun:
3D map reconstruction using a monocular camera for smart cities. 16512-16528 - Kaili Sun, Yuan Li, Huyin Zhang, Chi Guo, Linfei Yuan, Quan Hu:
Syntax-Aware graph convolutional network for the recognition of chinese implicit inter-sentence relations. 16529-16552 - Tangina Sultana
, Young-Koo Lee
:
Efficient rule mining and compression for RDF style KB based on Horn rules. 16553-16580 - Xiao Li, Kewen Li:
High-dimensional imbalanced biomedical data classification based on P-AdaBoost-PAUC algorithm. 16581-16604 - Ying-Ze Zhao, Xiang-Jun Li
, Meijie Ma:
Embedded connectivity of some BC networks. 16605-16618 - Qifen Yang, Ziyang Li
, Gang Han, Wanyi Gao, Shuhua Zhu, Xiaotian Wu, Yuhui Deng:
Correction to: An improvement of spectral clustering algorithm based on fast diffusion search for natural neighbor and affinity propagation. 16619-16620
Volume 78, Number 15, October 2022
- Xi Liu
, Jun Liu
, Hong Wu:
Energy-aware allocation for delay-sensitive multitask in mobile edge computing. 16621-16646 - Sudheer Kumar Battula
, Saurabh Garg, Ranesh Naha
, Muhammad Bilal Amin, Byeong Kang, Erfan Aghasian:
A blockchain-based framework for automatic SLA management in fog computing environments. 16647-16677 - Rahman Hajian
, Seyed Hossein Erfani
, Saru Kumari
:
A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway. 16678-16720 - Guanqaun Wu, Desheng Zeng:
Optimization of network resource management based on software-defined networking in the 5G environment. 16721-16744 - J. Sathya Priya, A. Bhagyalakshmi, K. Muthulakshmi, N. Deepa:
DBAHHO: Deep belief network-based adaptive Harris Hawks optimization for adaptive offloading strategy in mobile edge computing. 16745-16769 - Jitendra Patil
, Vrinda Tokekar, Alpana Rajan, Anil Rawat:
Discriminate, locate and mitigate DDoS traffic in presence of Flash Crowd in Software Defined Network. 16770-16793 - Jianhang Liu
, Jiebing Wang, Yuming Ge, Shibao Li, Xue-rong Cui:
A data distribution scheme for VANET based on fountain code. 16794-16819 - Roberto Barriga
, Miquel Romero, David F. Nettleton, Houcine Hassan:
Advanced data modeling for industrial drying machine energy optimization. 16820-16840 - Po-Hsuan Huang
, Ting-Wei Chang, Chia-Heng Tu
, Shen-Ming Chung:
POPS: an off-peak precomputing scheme for privacy-preserving computing. 16841-16860 - Sakshi Gupta
, Itu Snigdh
:
Leveraging data aggregation algorithm in LoRa networks. 16861-16875 - Changqing Gong, Weiqi Guan, Abdullah Gani, Han Qi
:
Network attack detection scheme based on variational quantum neural network. 16876-16897 - Subha Ghosh
, Debashis De:
RAM: resource allocation in MIMO-MISO cognitive IoT for 5G wireless networks using two-level weighted majority cooperative game. 16898-16950 - R. Bala
, R. Manoharan:
Trusted consensus protocol for blockchain networks based on fuzzy inference system. 16951-16974 - Malihe Hariri
, Mostafa Nouri Baygi, Saeid Abrishami
:
A hybrid algorithm for scheduling scientific workflows in IaaS cloud with deadline constraint. 16975-16996 - Mohammad Faraji Mehmandar
, Sam Jabbehdari
, Hamid Haj Seyyed Javadi:
A self-learning approach for proactive resource and service provisioning in fog environment. 16997-17026 - Arash Deldari
, Abolghasem Yousofi, Mahmoud Naghibzadeh, Alireza Salehan:
CDA: a novel multicore scheduling for cost-aware deadline-constrained scientific workflows on the IaaS cloud. 17027-17054 - Binbin Zhou, Lu Lu:
An effective 3-D fast fourier transform framework for multi-GPU accelerated distributed-memory systems. 17055-17073 - Lucindia Dupak, Subhasish Banerjee:
Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in MANET environment. 17074-17094 - Chongchong Zhang, Yannan Shi, Jiangong Liu, Shuaishuai Jiang, Hanqiu Wang, Yiying Wang:
A denoising method of mine microseismic signal based on NAEEMD and frequency-constrained SVD. 17095-17113 - Xiaochun Cheng, Seifedine Kadry
, Maytham N. Meqdad
, Rubén González Crespo
:
CNN supported framework for automatic extraction and evaluation of dermoscopy images. 17114-17131 - Anubhav Shivhare
, Manish Kumar Maurya
, Jafar Sarif, Manish Kumar:
A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based IoT. 17132-17149 - Valon Raca
, Seeun William Umboh
, Eduard Mehofer, Bernhard Scholz:
Runtime and energy constrained work scheduling for heterogeneous systems. 17150-17177 - Veena Goswami
, Gopinath Panda:
Multimedia content delivery services in the cloud with partial sleep and abandonment. 17178-17201 - Parisa Goudarzi, Amir Masoud Rahmani, Mohammad Mosleh:
Resource discovery approaches in cloudIoT: a systematic review. 17202-17230 - Jesús Cámara
, José-Carlos Cano, Javier Cuenca
, Mariano Saura-Sánchez:
PARCSIM: a parallel computing simulator for scalable software optimization. 17231-17246 - Shanshan Yin, Liqiong Xu:
Hybrid diagnosis of regular networks under the HPMC fault model. 17247-17260 - Yue Li, Mingcheng Xu, Gaojian Xu:
Blockchain-based mutual authentication protocol without CA. 17261-17283 - Poonam Rani, Preeti Kaur, Vibha Jain, Jyoti Shokeen
, Sweety Nain:
Blockchain-based IoT enabled health monitoring system. 17284-17308 - Kourosh Dadashtabar Ahmadi, Ali Jabar Rashidi, Ali Massomi Moghri:
Design and simulation of autonomous military vehicle control system based on machine vision and ensemble movement approach. 17309-17347 - Maryam Masoumi, Hassan Motallebi
:
A structure-aware algorithm for fault-tolerant scheduling of scientific workflows. 17348-17377 - Fei Li, Yuzhu Wang
, Zhenzhen Wang, Xiaohui Ji, Jinrong Jiang, Xiaoyong Tang, He Zhang:
CC-RRTMG_SW++: Further optimizing a shortwave radiative transfer scheme on GPU. 17378-17402 - Adel Binbusayyis
, Haya Alaskar, Thavavel Vaiyapuri, M. Dinesh:
An investigation and comparison of machine learning approaches for intrusion detection in IoMT network. 17403-17422 - Poria Pirozmand, Amir Javadpour, Hamideh Nazarian, Pedro Pinto
, Seyedsaeid Mirkamali, Forough Ja'fari:
GSAGA: A hybrid algorithm for task scheduling in cloud infrastructure. 17423-17449 - Anqi Yu
, Nuo Wang
:
Node-importance ranking in scale-free networks: a network metric response model and its solution algorithm. 17450-17469 - Zheng Gao, Chenxiang Zhang, Zhengyin Li:
Financial sequence prediction based on swarm intelligence algorithms and internet of things. 17470-17490
Volume 78, Number 16, November 2022
- Xuejie Wang
, Qilei Cao, Qiaozheng Wang, Zhiying Cao, Xiuguo Zhang, Peipeng Wang:
Robust log anomaly detection based on contrastive learning and multi-scale MASS. 17491-17512 - Felix Liu
, Albin Fredriksson, Stefano Markidis:
A survey of HPC algorithms and frameworks for large-scale gradient-based nonlinear optimization. 17513-17542 - Sergio Barrachina, Adrián Castelló
, Manuel F. Dolz
, Andrés E. Tomás:
BestOf: an online implementation selector for the training and inference of deep neural networks. 17543-17558 - D. Dhinakaran
, P. M. Joe Prathap
:
Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining. 17559-17593 - Xi Liu
, Jun Liu:
An online mechanism for task allocation and pricing in crowd sensing systems. 17594-17618 - Wei Li
, Liangqilin Ni, Zhou Lei, Lei Wang:
Cumulative learning-based competitive swarm optimizer for large-scale optimization. 17619-17656 - Pankaj Kumar
, Hari Om:
A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network. 17657-17688 - Hajer Saidi
, Mariem Turki
, Zied Marrakchi, Mohamed Abid, Abdulfattah Obeid:
Development and Analysis of Novel Mesh of Tree-based embedded FPGA. 17689-17720 - Jongwoo Ha, Dongsoo Kim, Minsoo Kim
:
Assessing severity of road cracks using deep learning-based segmentation and detection. 17721-17735 - Junfeng Tian, Yanan Pang
:
A causal consistency model based on grouping strategy. 17736-17757 - Pranava K. Jha
:
Vertex transitivity, distance metric, and hierarchical structure of the dual-cube. 17758-17775 - Junchen Fu, Zhaohui Qi:
A TDF-WNSP-WLFM algorithm for product recommendation based on multiple types of implicit user behavior. 17776-17796 - Sifeng Zhu, Mingyang Zhao
, Qinghua Zhang:
Multi-objective optimal offloading decision for multi-user structured tasks in intelligent transportation edge computing scenario. 17797-17825 - Ester M. Garzón, José Antonio Martínez
, Juan José Moreno, María Luz Puertas
:
HPC acceleration of large (min, +) matrix products to compute domination-type parameters in graphs. 17826-17843 - Ali Kadhum M. Al-Qurabat
, Suha Abdulhussein Abdulzahra, Ali Kadhum Idrees:
Two-level energy-efficient data reduction strategies based on SAX-LZW and hierarchical clustering for minimizing the huge data conveyed on the internet of things networks. 17844-17890 - Pranitha Sanda
, Digambar Pawar
, V. Radha:
Blockchain-based tamper-proof and transparent investigation model for cloud VMs. 17891-17919 - Xiaoyi Chang, Yuebin Li, Ting Bai, Tianrong Qu, Jungang Gao, Chao Zhao
:
Usage of biorthogonal wavelet filtering algorithm in data processing of biomedical images. 17920-17942 - Yan Xu, Yuwen Wang, Shunbo Hu, Yuyue Du:
Deep convolutional neural networks for bias field correction of brain magnetic resonance images. 17943-17968 - Jingli Shi
, Weihua Li, Quan Bai, Takayuki Ito:
BeeAE: effective aspect term extraction with artificial bee colony. 17969-17991 - Jun-Gi Jang, Moonjeong Park, Jongwuk Lee, Lee Sael
:
Large-scale tucker Tensor factorization for sparse and accurate decomposition. 17992-18022 - Tong Xu, Changrong Zhao, Guancheng Song, Zhaoyang You
:
Design of intelligent control system for printing and dyeing wastewater treatment under internet of things and deep learning. 18023-18050 - Cristián Ramírez
, Adrián Castelló
, Enrique S. Quintana-Ortí:
A BLIS-like matrix multiplication for machine learning in the RISC-V ISA-based GAP8 processor. 18051-18060 - Hong-Danh Thai
, Jun-Ho Huh
:
Optimizing patient transportation by applying cloud computing and big data analysis. 18061-18090 - Delaram Khalili, Behrang Barekatain
:
GAJEL-DSDN: an intelligent hybrid genetic-Jaya-based switch migration algorithm for efficient load balancing in distributed SDNs. 18091-18129 - Fangxin Xu
, Li Feng, Jie Yang, Hong Liang, Yu-Teng Chang:
Design and analysis of a novel collision notification scheme for IoT environments. 18130-18152 - Nassima Kadri
, Azzeddine Chenine, Zakaria Laib, Mouloud Koudil:
Reliability-aware intelligent mapping based on reinforcement learning for networks-on-chips. 18153-18188 - Yichang Hu, Lu Lu, Cuixu Li:
Memory-accelerated parallel method for multidimensional fast fourier implementation on GPU. 18189-18208 - Huanhuan Wu, Yuantao Hua, Hua Zou, Gang Ke:
A lightweight network for vehicle detection based on embedded system. 18209-18224 - Jingjing Guo, Chunlin Li, Youlong Luo:
Blockchain-assisted caching optimization and data storage methods in edge environment. 18225-18257 - Moh'd A. Radaideh
, Rakan Abdelqader:
A proposed cloud-based platform of information technology services delivery management. 18258-18287 - Xian Wu, Zhaocai Wang
:
Multi-objective optimal allocation of regional water resources based on slime mould algorithm. 18288-18317 - B. P. Santosh Kumar, Mohd Anul Haq
, P. Sreenivasulu, D. Siva, Malik Bader Alazzam
, Fawaz Alassery, Sathishkumar Karupusamy:
Fine-tuned convolutional neural network for different cardiac view classification. 18318-18335 - Sehwa Park, Seog Park
:
Nearly most influential location selection with differentially private user locations in a road network. 18336-18360 - Abdulrahman Alamer, Sultan Basudan
:
Security and privacy of network transmitted system in the Internet of Robotic Things. 18361-18378 - Lilly Raamesh
, S. Jothi, S. Radhika:
Test case minimization and prioritization for regression testing using SBLA-based adaboost convolutional neural network. 18379-18403
Volume 78, Number 17, November 2022
- Yong Zhong, Liang Chen, Changlin Dan, Amin Rezaeipanah:
A systematic survey of data mining and big data analysis in internet of things. 18405-18453 - Seyed Mahdi Ghadamgahi, Reza Sabbaghi-Nadooshan
, Keivan Navi:
Novel ternary adders and subtractors in quantum cellular automata. 18454-18496 - Priyanka Paliwal
, Julian L. Webber, Abolfazl Mehbodniya, Mohd Anul Haq
, Anil Kumar
, Prem Kumar Chaurasiya:
Multi-agent-based approach for generation expansion planning in isolated micro-grid with renewable energy sources and battery storage. 18497-18523 - Hai Huan
, Nan Zou, Yi Zhang, Yaqin Xie, Chao Wang:
Remote sensing image reconstruction using an asymmetric multi-scale super-resolution network. 18524-18550 - Qiqi Wang, Hongjie Zhang, Jing Li
, Yu Shen, Xiaohui Liu:
Predicting job finish time based on parameter features and running logs in supercomputing system. 18551-18577 - Maryam Bukhari, Mehr Yahya Durrani, Saira Andleeb Gillani, Sadaf Yasmin, Seungmin Rho, Sang-Soo Yeo
:
Exploiting vulnerability of convolutional neural network-based gait recognition system. 18578-18597 - Zheng Fang, Bichao Ye, Bingan Yuan, Tingjun Wang, Shuo Zhong, Shunren Li, Jianyi Zheng:
Angle prediction model when the imaging plane is tilted about z-axis. 18598-18615 - Yingrong Guan, Yaoyu Qiu, Cheng Tian:
Trajectory planning in college football training using deep learning and the internet of things. 18616-18635 - Mozhdeh Khaksar Manshad
, Mohammad Reza Meybodi, Afshin Salajegheh:
A new multi-wave continuous action-set cellular learning automata for link prediction problem in weighted multi-layer social networks. 18636-18665 - Nehru Kandasamy
, Vaishali H. Dhare
, Nagarjuna Telagam
:
Novel optimized ultra-dense 1-bit magnitude comparator design in quantum-dot cellular automata technology based on MV32 gate. 18666-18690 - Zuhal Ozturk, Haluk Rahmi Topcuoglu
, Mahmut Taylan Kandemir:
Studying error propagation on application data structure and hardware. 18691-18724 - Imene Ben Hafaiedh
, Maroua Ben Slimane:
A distributed formal-based model for self-healing behaviors in autonomous systems: from failure detection to self-recovery. 18725-18753 - Ying Li, Xueting Cui, Jiahao Fan
, Tan Wang:
Global chaotic bat algorithm for feature selection. 18754-18776 - Mahdi R. Alagheband
, Atefeh Mashatan:
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives. 18777-18824 - Korrapati Sindhu, Karthick Seshadri
, Chidambaram Kollengode:
Workload characterization and synthesis for cloud using generative stochastic processes. 18825-18855 - Yun Wang
, Xingquan Zuo, Zhiqiang Wu, Hui Wang, Xinchao Zhao:
Variable neighborhood search based multiobjective ACO-list scheduling for cloud workflows. 18856-18886 - Long Gao, Fen Zheng, Jian Yong Bian:
Using computer theory to detect PCB defects in an IoT environment. 18887-18914 - Chuen-Horng Lin
, Chia-Ching Yu, Huan-Yu Chen:
Augmentation dataset of a two-dimensional neural network model for use in the car parts segmentation and car classification of three dimensions. 18915-18958 - Qin-lu He
, Genqing Bian, Weiqi Zhang, Zhen Li:
RTFTL: design and implementation of real-time FTL algorithm for flash memory. 18959-18993 - Junfeng Tian, Qianqian Song
:
An efficient auditing scheme with a novel structure for multiple replicas. 18994-19019 - Chong Chen, Yixuan Dou, Jie Chen, Yaru Xue:
A novel neural network training framework with data assimilation. 19020-19045 - Shamimul Qamar
, Abdul Azeem
, Tanweer Alam
, Izhar Ahmad:
A crow search algorithm integrated with dynamic awareness probability for cellular network cost management. 19046-19069 - Shubhang Pandey
, T. G. Venkatesh:
Performance investigation of packet-based communication in 3D-memories. 19070-19096 - Juan José Moreno
, Ester M. Garzón, José-Jesús Fernández, Antonio Martínez-Sánchez
:
HPC enables efficient 3D membrane segmentation in electron tomography. 19097-19113 - Younes Khair
, Dennai Abdeslem, Youssef Elmir
:
Dynamic and elastic monitoring of VMs in cloud environment. 19114-19137 - Fuzhi Su, Meihong Chen:
Basketball players' score prediction using artificial intelligence technology via the Internet of Things. 19138-19166 - Heng Chen, Ziheng Wang
, Xi Xiao, Jingbo Li, Xiaoshe Dong
, Xingjun Zhang:
SunwayURANS: 3D full-annulus URANS simulations of transonic axial compressors on Sunway TaihuLight. 19167-19187 - Sepide Masoudi, Faramarz Safi-Esfahani
:
SM@RMFFOG: sensor mining at resource management framework of fog computing. 19188-19227 - Chhayly Lim, Jungyeon Kim, Jeongseok Kim, Byeong-Gwon Kang, Yunyoung Nam:
Estimation of respiratory rate in various environments using microphones embedded in face masks. 19228-19245 - Farhan Ullah
, Jihoon Moon, Hamad Naeem
, Sohail Jabbar:
Explainable artificial intelligence approach in combating real-time surveillance of COVID19 pandemic from CT scan and X-ray images using ensemble model. 19246-19271 - Xiaomeng Zhai
, Hong Zhang
, Xu Huang, Shouhua Zhang:
Graph partitioning strategies: one size does not fit all. 19272-19295 - Pankaj Kumar Choudhary
, Dushmanta Kumar Das:
Optimal coordination of over-current relay in a power distribution network using aggrandized class topper optimization (A-CTO) algorithm. 19296-19321 - Suhua Wang, Zhiqiang Ma, Xiaoxin Sun, Huinan Zhao, Xiuzhuo Wei, Rui Ma, Bo Tang:
Leveraging side information as adjusting embedding to improve user representation for recommendations. 19322-19345 - Felipe Tirado
, Alvaro Wong, Dolores Rexachs
, Emilio Luque
:
Scalable performance analysis method for SPMD applications. 19346-19371 - Jing Bai
, Junfeng Zhou, Ming Du, Ziyang Chen:
Index-based top kα-maximal-clique enumeration over uncertain graphs. 19372-19400
Volume 78, Number 18, December 2022
- Baiqiang Gan
, Yuqiang Chen, Qiuping Dong, Jianlan Guo, Rongxia Wang:
A convolutional neural network intrusion detection method based on data imbalance. 19401-19434 - Yung-Ting Chuang
, Chiu-Shun Hsiang:
A popularity-aware and energy-efficient offloading mechanism in fog computing. 19435-19458 - Shinjin Kang, Soo Kyun Kim
:
Pleasure-arousal-outlier model for quantitative evaluation of game experiences. 19459-19477 - Wen Zhou
, Kaixin Zhang, Zhe Ming, Jingliang Chen, Yiwen Liang:
Immune optimization inspired artificial natural killer cell earthquake prediction method. 19478-19500 - Yanxu Jiang
, Linfei Han, Yifang Gao:
Artificial intelligence-enabled smart city construction. 19501-19521 - Diego Teijeiro
, Margarita Amor
, Ramón Doallo, Eduardo Corbelle Rico, Juan Porta, Jorge Parapar
:
Land consolidation through parcel exchange among landowners using a distributed Spark-based genetic algorithm. 19522-19544 - Wen Qu, Ting Zhu, Jie Liu, Jianxin Li:
A time sequence location method of long video violence based on improved C3D network. 19545-19565 - Yang Yang
, Chen Qian, Haomiao Li, Yuchao Gao
, Jinran Wu
, Chan-Juan Liu
, Shangrui Zhao
:
An efficient DBSCAN optimized by arithmetic optimization algorithm with opposition-based learning. 19566-19604 - Nilesh Patidar
, Namit Gupta
:
An extensible architecture of 32-bit ALU for high-speed computing in QCA technology. 19605-19627 - Maryam Tavakoli-Zaniani
, Mohammad Reza Gholamian
, Seyyed Alireza Hashemi Golpayegani:
Improving heuristics miners for healthcare applications by discovering optimal dependency graphs. 19628-19661 - Cry Kuranga
, Njodzi Ranganai, Tendai S. Muwani
:
Particle swarm optimization-based empirical mode decomposition predictive technique for nonstationary data. 19662-19683 - Sangseok You
, Lionel P. Robert
:
Team robot identification theory (TRIT): robot attractiveness and team identification on performance and viability in human-robot teams. 19684-19706 - Changnian Han, Peng Zhang, Yicong Zhu, Guojing Cong, James R. Kozloski, Chih-Chieh Yang, Leili Zhang, Yuefan Deng
:
Scalable multiscale modeling of platelets with 100 million particles. 19707-19724 - Sedighe Abasabadi, Hossein Nematzadeh
, Homayun Motameni, Ebrahim Akbari
:
Hybrid feature selection based on SLI and genetic algorithm for microarray datasets. 19725-19753 - D. Dhinakaran
, P. M. Joe Prathap
:
Correction to: Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining. 19754

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.