TJS - 2022 - volume 78 论文列表 |
点击这里查看 The Journal of Supercomputing 的JCR分区、影响因子等信息 |
Shih-Chin Tan Chun-Liang Lai Jia-Jeng Hou
Scalable distributed Louvain algorithm for community detection in large graphs.Naw Safrin Sattar Shaikh Arifuzzaman
A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-19.Md. Rafiul Hassan Walaa N. Ismail Ahmad Chowdhury Sharara Hossain Shamsul Huda Mohammad Mehedi Hassan
A flexible energy management approach for smart healthcare on the internet of patients (IoP).Hamid Mehdi Houman Zarrabi Ahmad Khadem Zadeh Amir Masoud Rahmani
Scalable offloading using machine learning methods for distributed multi-controller architecture of SDN networks.Asiya Ashraf Zeshan Iqbal Muhammad Attique Khan Usman Tariq Seifedine Nimer Kadry Sang Oh Park
Quasi oppositional Aquila optimizer-based task scheduling approach in an IoT enabled cloud environment.M. Kandan Anbazhagan Krishnamurthy S. Arun Mozhi Selvi Mohamed Yacin Sikkandar Mohamed Abdelkader Aboamer T. Tamilvizhi
ACNN-TL: attention-based convolutional neural network coupling with transfer learning and contextualized word representation for enhancing the performance of sentiment classification.Hossein Sadr Mojdeh Nazari Solimandarabi
How separable median filters can get better results than full 2D versions.Gilles Perrot Stéphane Domas Raphaël Couturier
Thou code: a triple-erasure-correcting horizontal code with optimal update complexity.Ningjing Liang Xingjun Zhang Heng Chen Changjiang Zhang
Revocable, dynamic and decentralized data access control in cloud storage.Chong Wang Hao Jin Ronglei Wei Ke Zhou
A resource-constrained distributed task allocation method based on a two-stage coalition formation methodology for multi-UAVs.Mi Yang An Zhang Wenhao Bi Yunong Wang
Availability evaluation of system service hosted in private cloud computing through hierarchical modeling process.Danilo Clemente Paulo Pereira Jamilson Dantas Paulo Romero Martins Maciel
Searchable encryption on the cloud: a survey.Nitish Andola Raghav Gahlot Vijay Kumar Yadav S. Venkatesan Shekhar Verma
Edge mining resources allocation among normal and gap blockchains using game theory.Jianwen Yuan Qinglin Zhao Jianqing Li Jun Li Zhiming Cai Yu-Teng Chang
Relational attention-based Markov logic network for visual navigation. Independent spanning trees on WK-recursive networks and WK-recursive pyramids. Dimensionality reduction for multivariate time-series data mining.Xiaoji Wan Hailin Li Liping Zhang Yenchun Jim Wu
Application of distributed motion estimation for swarm MAVs in a GPS-restricted environment based on a wireless sensor network.Wenzhong Lou Jinkui Wang Zilong Su Dakui Wang
Parallel border tracking in binary images using GPUs.Víctor M. García-Molla Pedro Alonso-Jordá Ricardo García-Laguía
POI recommendation based on a multiple bipartite graph network model.Chen Lang Wang Ze Kaiming He Shimin Sun
Efficient methods for computing the reliability polynomials of graphs and complex networks.Farshad Safaei Reza Akbar Mehrnaz Moudi
Research into the application of AI robots in community home leisure interaction. Uniform scheduling of interruptible garbage collection and request IO to improve performance and wear-leveling of SSDs.Yingbiao Yao Xiaochong Kong Jiecheng Bao Xin Xu Nenghua Gu Wei Feng
A computer-aided diagnostic system for liver tumor detection using modified U-Net architecture.Anum Kalsoom Muazzam Maqsood Sadaf Yasmin Maryam Bukhari Zian Shin Seungmin Rho
A parallel high-precision critical point detection and location for large-scale 3D flow field on the GPU.Zhi-bin Huang Guang-Tao Fu Ling-jing Cao Min Yu Wu-Bing Yang
A novel sampling-based visual topic models with computational intelligence for big social health data clustering.K. Narasimhulu Meena Abarna KT B. Siva Kumar T. Suresh
Using neural network to establish manufacture production performance forecasting in IoT environment. Construction of enterprise innovation performance model using knowledge base and edge computing. LOADng-AT: a novel practical implementation of hybrid AHP-TOPSIS algorithm in reactive routing protocol for intelligent IoT-based networks.Zakieh Sharifian Behrang Barekatain Alfonso Ariza-Quintana Zahra Beheshti Faramarz Safi-Esfahani
An efficient and high-order sliding mesh method for computational aeroacoustics.Wei Ying Ryu Fattah Siyang Zhong Jingwen Guo Xin Zhang
Player target tracking and detection in football game video using edge computing and deep learning. AMT: asynchronous in-place matrix transpose mechanism for sunway many-core processor.Zhengbo Chen Di Wang Qi Yu Fang Zheng Feng Guo Zuoning Chen
FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing.K. Anand A. Vijayaraj M. Vijay Anand
Using machine learning to detect PII from attributes and supporting activities of information assets.Yu-Chih Wei Tzu-Yin Liao Wei-Chen Wu
A user-based video recommendation approach using CAC filtering, PCA with LDOS-CoMoDa.Manimurugan Shanmuganathan Saad Almutairi
A computational resources scheduling algorithm in edge cloud computing: from the energy efficiency of users' perspective.Jiaqi Zhang Ruijuan Zheng Xuhui Zhao Junlong Zhu Junwei Xu Qingtao Wu
Secure and effective assured deletion scheme with orderly overwriting for cloud data. The collection of theater music data and genre recognition under the internet of things and deep belief network. A computing system that integrates deep learning and the internet of things for effective disease diagnosis in smart health care systems.Eshrag A. Refaee Shermin Shamsudheen
Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing.Hyeong-Jin Kim Hyunjo Lee Yong-Ki Kim Jae-Woo Chang
High-performance investigation of a snubber circuit-based split source inverter for nonlinear loads using PWM techniques. Hybrid parallelization of molecular dynamics simulations to reduce load imbalance.Julian Morillo Maxime Vassaux Peter V. Coveney Marta Garcia-Gasulla
Optimizing bag-of-tasks scheduling on cloud data centers using hybrid swarm-intelligence meta-heuristic.Amit Chhabra Kuo-Chan Huang Nebojsa Bacanin Tarik A. Rashid
Type II fuzzy-based clustering with improved ant colony optimization-based routing (t2fcatr) protocol for secured data transmission in manet.M. V. S. S. Nagendranth M. Rajesh Khanna N. Krishnaraj Mohamed Yacin Sikkandar Mohamed Abdelkader Aboamer R. Surendran
Characterizing energy and performance of soft-core-based homogeneous multiprocessor systems.Farshid Samsami Khodadad Hamid Noori
Multi-grid ion thruster lifetime simulation using hybrid parallel processing.Milad Yadollahi Arash Shams Taleghani Vahid Esfahanian
Multi-constraints self-adaptation for reconfigurable multimedia embedded systems. A heterogeneous parallel implementation of the Markov clustering algorithm for large-scale biological networks on distributed CPU-GPU clusters. Deeply feature fused video super-resolution network using temporal grouping.Sourav Hati Debashis De Anwesha Mukherjee
KS-DDoS: Kafka streams-based classification approach for DDoS attacks.Nilesh Vishwasrao Patil C. Rama Krishna Krishan Kumar
A novel method to improve computational and classification performance of rice plant disease identification.K. S. Archana S. Srinivasan S. Prasanna Bharathi R. Balamurugan T. N. Prabakar A. Sagai Francis Britto
Intrusion detection based on machine learning in the internet of things, attacks and counter measures.Eid Rehman Muhammad Haseeb-ud-Din Arif Jamal Malik Tehmina Karmat Khan Aaqif Afzaal Abbasi Seifedine Kadry Muhammad Attique Khan Seungmin Rho
AI-based stroke prediction system using body motion biosignals during walking.Jaehak Yu Se Jin Park Chee Meng Benjamin Ho Soonhyun Kwon Kang-Hee Cho Yang Sun Lee
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT.Muneeba Nasir Abdul Rehman Javed Muhammad Adnan Tariq Muhammad Asim Thar Baker
Clustering with a high-performance secure routing protocol for mobile ad hoc networks.Maganti Srinivas M. Ramesh Patnaik
An extended visual methods to perform data cluster assessment in distributed data systems.K. Subba Reddy K. Rajendra Prasad Govardhan Reddy Kamatam N. Ramanjaneya Reddy
An image classification approach for hole detection in wireless sensor networks.Se-Hang Cheong Kim-Hou Ng Yain-Whar Si
An reinforcement learning-based speech censorship chatbot system.Shaokang Cai Dezhi Han Dun Li Zibin Zheng Noël Crespi
Temporal and spatial parallel processing of simulated quantum annealing on a multicore CPU.Hasitha Muthumala Waidyasooriya Masanori Hariyama
Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN.Vankamamidi Srinivasa Naresh V. V. L. Divakar Allavarpu Sivaranjani Reddi
Kinematic and dynamic control model of wheeled mobile robot under internet of things and neural network. APT-Dt-KC: advanced persistent threat detection based on kill-chain model.Maryam Panahnejad Meghdad Mirabi
An automatic query expansion based on hybrid CMO-COOT algorithm for optimized information retrieval.Abdullah Saleh Alqahtani Saravanan Pandiaraj Maheswari Murali Sami Alshmrany
Epileptic seizure endorsement technique using DWT power spectrum.Anand Ghuli Damodar Reddy Edla João Manuel R. S. Tavares
Correction to: AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems.Mohd Shariq Karan Singh Pramod Kumar Maurya Ali Ahmadian David Taniar
AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems.Mohd Shariq Karan Singh Pramod Kumar Maurya Ali Ahmadian David Taniar
A novel elephant herd optimization model with a deep extreme Learning machine for solar radiation prediction using weather forecasts.K. Nageswara Reddy M. Thillaikarasi B. Siva Kumar T. Suresh
MVDLSTM: MultiView deep LSTM framework for online ride-hailing order prediction.Yonghao Wu Huyin Zhang Cong Li Shiming Tao Fei Yang
Identity-based public data integrity verification scheme in cloud storage system via blockchain.Yilin Yuan Jianbiao Zhang Wanshan Xu Zheng Li
Energy optimization for CAN bus and media controls in electric vehicles using deep learning algorithms.Satish S. Salunkhe Shelendra Pal Abhishek Agrawal Ravi Rai S. S. Sreeja Mole Bos Mathew Jos
Matrix-product neural network based on sequence block matrix product.Chuanhui Shan Jun Ou Xiumei Chen
An optimized hardware design of a two-dimensional guide filter and its application in image denoising.Xin Tang Wenjin Liu Jia Ren Yukuan Du Baodan Chen
Design and energy dissipation analysis of simple QCA multiplexer for nanocomputing. Attention-based framework for weakly supervised video anomaly detection. A new selfish thing detection method based on Voronoi diagram for Internet of Things. High-fidelity reversible data hiding based on PVO and median preserving.Chi-Yao Weng Hao-Yu Weng Cheng-Ta Huang
Deep brain emotional learning-based intelligent controller applied to an inverted pendulum system.Jeydson L. Silva Ronaldo R. B. de Aquino Aida Ferreira Davidson C. Marques
OHUQI: Mining on-shelf high-utility quantitative itemsets.Lili Chen Wensheng Gan Qi Lin Shuqiang Huang Chien-Ming Chen
LBTM: A lightweight blockchain-based trust management system for social internet of things.Mohammad Amiri-Zarandi Rozita A. Dara Evan D. G. Fraser
Stealth assessment strategy in distributed systems using optimal deep learning with game based learning.Dineshkumar Rajendran S. Prasanna
Driver attention prediction based on convolution and transformers. PanoVILD: a challenging panoramic vision, inertial and LiDAR dataset for simultaneous localization and mapping. Novel scheme for reducing communication data traffic in advanced metering infrastructure networks.Sun-Yuan Hsieh Chih-Wei Hsu Cheng-Han Yeh Geng-Hua Zhang
LETHOR: a thermal-aware proactive routing algorithm for 3D NoCs with less entrance to hot regions.Maede Safari Zahra Shirmohammadi Nezam Rohbani Hamed Farbeh
Dynamic and scalable multi-level trust management model for Social Internet of Things.Wafa Abdelghani Ikram Amous Corinne Amel Zayani Florence Sèdes Geoffrey Roman-Jimenez
A hybrid machine learning approach for detecting unprecedented DDoS attacks.Mohammad Najafimehr Sajjad Zarifzadeh Seyedakbar Mostafavi
Evaluating low-level software-based hardening techniques for configurable GPU architectures.Marcio M. Gonçalves Josie E. Rodriguez Condia Matteo Sonza Reorda Luca Sterpone José Rodrigo Azambuja
Design and implementation of efficient QCA full-adders using fault-tolerant majority gates.J. A. Bravo-Montes A. Martín-Toledano Alfonso Sánchez-Macián Oscar Ruano Francisco Garcia-Herrero
A flexible deadline-driven resource provisioning and scheduling algorithm for multiple workflows with VM sharing protocol on WaaS-cloud.P. Rajasekar Yogesh Palanichamy
OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments.Deepika Saxena Ashutosh Kumar Singh
Traffic sign detection based on improved faster R-CNN for autonomous driving.Xiaomei Li Zhijiang Xie Xiong Deng Yanxue Wu Yangjun Pi
TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network.Rajendra Prasad Nayak Srinivas Sethi Sourav Kumar Bhoi Debasis Mohapatra Rashmi Ranjan Sahoo Pradip Kumar Sharma Deepak Puthal
A unified approach to reliability and edge fault tolerance of cube-based interconnection networks under three hypotheses.Mingzu Zhang Hongxi Liu Wenshui Lin
A clustering-based short-term load forecasting using independent component analysis and multi-scale decomposition transform.Roohollah Keshvari Maryam Imani Mohsen Parsa Moghaddam
Optimal deployment of mobile cloudlets for mobile applications in edge computing.Xiaomin Jin Feng Gao Zhongmin Wang Yanping Chen
TRAPPY: a truthfulness and reliability aware application placement policy in fog computing.Gaurav Baranwal Deo Prakash Vidyarthi
Selecting services in the cloud: a decision support methodology focused on infrastructure-as-a-service context.Cássio L. M. Belusso Sandro Sawicki Vítor Basto Fernandes Rafael Z. Frantz Fabricia Roos-Frantz
Resource pricing and offloading decisions in mobile edge computing based on the Stackelberg game. Application of intelligent real-time image processing in fitness motion detection under internet of things. Z-Voter: a novel high-impedance voter for efficient realization of tristate logic in quantum-dot cellular automata technology. Manipulating cyber army in pilot case forensics on social media.Chang-Po Chiang Shiuh-Jeng Wang Yu-Shu Chen
Online energy-efficient fair scheduling for heterogeneous multi-cores considering shared resource contention.Bagher Salami Hamid Noori Mahmoud Naghibzadeh
Blockchain-based cloud storage system with CP-ABE-based access control and revocation process.Pratima Sharma Rajni Jindal Dutta Borah Malaya
A novel approach with an extensive case study and experiment for automatic code generation from the XMI schema Of UML models.Anand Deva Durai Mythily Ganesh Rincy Merlin Mathew Dinesh Kumar Anguraj
OpenMP as runtime for providing high-level stream parallelism on multi-cores.Renato B. Hoffmann Júnior Löff Dalvan Griebler Luiz Gustavo Fernandes
Human pose, hand and mesh estimation using deep learning: a survey.Toshpulatov Mukhiddin Wookey Lee Suan Lee Arousha Haghighian Roudsari
A novel fog-computing-assisted architecture of E-healthcare system for pregnant women.Rydhm Beri Mithilesh K. Dubey Anita Gehlot Rajesh Singh Mohammed Abd-Elnaby Aman Singh
CAVLCU: an efficient GPU-based implementation of CAVLC.Antonio Fuentes-Alventosa Juan Gómez-Luna José María González-Linares Nicolás Guil Rafael Medina Carnicer
Evaluating cloud interactions with costs and SLAs.Adrian Bernal María-Emilia Cambronero Alberto Núñez Pablo C. Cañizares Valentín Valero
Taemin Lee Changhun Jung Kyungtaek Lee Sanghyun Seo
Application of 3D-HEVC fast coding by Internet of Things data in intelligent decision. Mathematical model for the scheduling of real-time applications in IoT using Dew computing.Ghazaleh Javadzadeh Amir Masoud Rahmani Morteza Saberi Kamarposhti
A binary PSO-based ensemble under-sampling model for rebalancing imbalanced training data.Jinyan Li Yaoyang Wu Simon Fong Antonio J. Tallón-Ballesteros Xin-She Yang Sabah Mohammed Feng Wu
Collaborative filtering in dynamic networks based on deep auto-encoder. GWBM: an algorithm based on grey wolf optimization and balanced modularity for community discovery in social networks.Ehsan Jokar Mohammad Mosleh Mohammad Kheyrandish
COVID-19 pandemic, predictions and control in Saudi Arabia using SIR-F and age-structured SEIR model.C. Anand Deva Durai Arshiya Begum T. Jemima Jebaseeli Asfia Sabahath
Automated detection of age-related macular degeneration using a pre-trained deep-learning scheme.Seifedine Kadry V. Rajinikanth Rubén González Crespo Elena Verdú
RoV: receiving files from voice calls using dual-tone multi-frequency method.Xiaojun Zhu Yu Wang Zhengrui Qin
Succinct parallel Lempel-Ziv factorization on a multicore computer. A graph-based method for ranking of cloud service providers.Tina Esther Trueman P. Narayanasamy J. Ashok Kumar
The optimal design and application of LSTM neural network based on the hybrid coding PSO algorithm.Zhonglin Chen Cuili Yang Junfei Qiao
A deep learning approach in predicting products' sentiment ratings: a comparative analysis.Vimala Balakrishnan Zhongliang Shi Chuan Liang Law Regine Lim Lee Leng Teh Yue Fan
Optimization of cosmological N-body simulation with FMM-PM on SIMT accelerators.Wen-Long Zhao Wu Wang Qiao Wang
Error resilience of three GMRES implementations under fault injection.José A. Moríñigo Andrés Bustos Rafael Mayo-García
A high-quality global routing algorithm based on hybrid topology optimization and heuristic search for data processing in MEC.Saijuan Xu Ling Wei Genggeng Liu Yeh-Cheng Chen Guolong Chen
Simulation of cross-modal image-text retrieval algorithm under convolutional neural network structure and hash method. Hybrid-based framework for COVID-19 prediction via federated machine learning models.Ameni Kallel Molka Rekik Mahdi Khemakhem
Parallel signal detection for generalized spatial modulation MIMO systems.Víctor M. García-Molla M. Ángeles Simarro Francisco-Jose Martínez-Zaldívar Murilo Boratto Pedro Alonso Alberto González
Correction to: The properties and t/s-diagnosability of k-ary n-cube networks.Yuhao Xie Jiarong Liang Wen Yin Changzhen Li
The properties and t/s-diagnosability of k-ary n-cube networks.Yuhao Xie Jiarong Liang Wen Yin Changzhen Li
NKA: a pathogen dose-based natural killer cell algorithm and its application to classification.Dongmei Wang Yiwen Liang Xinmin Yang
The g-extra diagnosability of the balanced hypercube under the PMC and MM* model.Xinyang Wang Lijuan Huang Qiao Sun Naqin Zhou Yuehong Chen Weiwei Lin Keqin Li
Automated segmentation of leukocyte from hematological images - a study using various CNN schemes.Seifedine Kadry Venkatesan Rajinikanth David Taniar Robertas Damasevicius Xiomara Patricia Blanco-Valencia
Understanding human emotions through speech spectrograms using deep neural network.Vedika Gupta Stuti Juyal Yu-Chen Hu
Cluster resource scheduling in cloud computing: literature review and research challenges. Correction to: An adaptive Lévy flight firefly algorithm for multilevel image thresholding based on Rényi entropy. An adaptive Lévy flight firefly algorithm for multilevel image thresholding based on Rényi entropy. Realization of processing-in-memory using binary and ternary quantum-dot cellular automata.Leila Dehbozorgi Reza Sabbaghi-Nadooshan Alireza Kashaninia
Containerized deployment of micro-services in fog devices: a reinforcement learning-based approach.Shubha Brata Nath Subhrendu Chattopadhyay Raja Karmakar Sourav Kanti Addya Sandip Chakraborty Soumya K. Ghosh
AUGChain: blockchain-based mobile user authentication scheme in global mobility network.Sudip Kumar Palit Mohuya Chakraborty Subhalaxmi Chakraborty
Adaptive handover based on traffic balancing and multi-dimensional collaborative resource management in MEC environment.Chunlin Li Yong Zhang Youlong Luo
An O(log2 N) algorithm for reliability assessment of augmented cubes based on h-extra edge-connectivity. Infrared image super-resolution method for edge computing based on adaptive nonlocal means.Tao Sun Zhengqiang Xiong Zixian Wei Zhengxing Wang
A lightweight neural network framework using linear grouped convolution for human activity recognition on mobile devices.Tianyi Liu Shuoyuan Wang Yue Liu Weiming Quan Lei Zhang
Power efficient network selector placement in control plane of multiple networks-on-chip. A comprehensive survey on meta-heuristic-based energy minimization routing techniques for wireless sensor network: classification and challenges. Colony search optimization algorithm using global optimization.Heng Wen Suxin Wang Fuqiang Lu Ming Feng Lei Zhen Wang Jun Kai Xiong Ma Cong Si
Task scheduling characterisation in enterprise application integration.Daniela L. Freire Rafael Z. Frantz Fabricia Roos-Frantz Vítor Basto Fernandes
Financial causal sentence recognition based on BERT-CNN text classification. Success history intelligent optimizer.Hussam Fakhouri Faten Hamad Abedalsalam Alawamrah
CPU-GPU buffer communication using compute shader to fill volumes with spheres.F. A. Madera-Ramirez J. L. Lopez-Martinez Francisco Moo-Mena Jorge R. Gomez-Montalvo
CBVoSD: context based vectors over sentiment domain ensemble model for review classification.Mayur Wankhade Chandra Sekhara Rao Annavarapu Mukul Kirti Verma
Semi-partitioned scheduling of mixed-criticality system on multiprocessor platforms.Canghai Yang Han Wang Ji Zhang Long Zuo
Authentication and key establishment protocol from supersingular isogeny for mobile environments. Improving detection of web service antipatterns using crowdsourcing. An effective SPMV based on block strategy and hybrid compression on GPU.Huanyu Cui Nianbin Wang Yuhua Wang Qilong Han Yuezhu Xu
Construction of Internet of Things English terms model and analysis of language features via deep learning. Slack extender mechanism for greening dependent-tasks scheduling on DVFS-enabled computing platforms. A symbiosis of arithmetic optimizer with slime mould algorithm for improving global optimization and conventional design problem.Sumika Chauhan Govind Vashishtha Anil Kumar
Hybrid learning scenario path selection and abstraction framework for smart verification of complex SoCs.Gaurav Sharma Lava Bhargava Vinod Kumar
Performance benchmarking and auto-tuning for scientific applications on virtual cluster. Software-defect prediction within and across projects based on improved self-organizing data mining. Multi-sensor information fusion for efficient smart transport vehicle tracking and positioning based on deep learning technique.G. Suseendran D. Akila Hannah Vijaykumar T. Nusrat Jabeen R. Nirmala Anand Nayyar
Whale optimization algorithm based on dynamic pinhole imaging and adaptive strategy.Maodong Li Guanghui Xu Bo Fu Xilin Zhao
Linguistic Z-numbers and cloud model weighted ranking technology and its application in concept evaluation of information axiom. Tasking framework for adaptive speculative parallel mesh generation.A. Arunkumar Gudivada Gnanou Florence Sudha
Optimal virtual machine scheduling in virtualized cloud environment using VIKOR method.Neha Garg Damanpreet Singh Major Singh Goraya
EOS.IO blockchain data analysis.Wanshui Song Wenyin Zhang Linbo Zhai Luanqi Liu Jiuru Wang Shanyun Huang Bei Li
Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT.Xinzhong Liu Cong Xie Wenwu Xie Peng Zhu Zhihe Yang
High-performance medical data processing technology based on distributed parallel machine learning algorithm.Ji Liu Xiao Liang Wenxi Ruan Bo Zhang
Correction to: A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment.Prasanta Kumar Roy Ansuman Bhattacharya
A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment.Prasanta Kumar Roy Ansuman Bhattacharya
Biomechanics analysis of real-time tennis batting images using Internet of Things and deep learning. Chaotic-based divide-and-conquer feature selection method and its application in cardiac arrhythmia classification.Mehdi Ayar Ayaz Isazadeh Farhad Soleimanian Gharehchopogh MirHojjat Seyedi
Deep learning-based multivariate resource utilization prediction for hotspots and coldspots mitigation in green cloud data centers.Yashwant Singh Patel Rishabh Jaiswal Rajiv Misra
Congestion avoidance by dynamically cache placement method in named data networking.Babak Nikmard Naser Movahhedinia Mohammad Reza Khayyambashi
Four-factor mutual authentication scheme for health-care based on wireless body area network. Corona virus optimization (CVO): a novel optimization algorithm inspired from the Corona virus pandemic. Evaluation of sports public service under fuzzy integral and deep neural network.Yunfei Yang Jingwei Yang Xiantao Huang
Construction and implementation of a college talent cultivation system under deep learning and data mining algorithms. Magas: matrix-based asynchronous graph analytics on shared memory systems.Le Luo Yi Liu Hailong Yang Depei Qian
Controller placement in software defined networks using multi-objective antlion algorithm.Mohammad Mahdi Kazemian Meghdad Mirabi
Trust- and energy-aware cluster head selection in a UAV-based wireless sensor network using Fit-FCM.Eshrag A. Refaee Shermin Shamsudheen
A multi-agent model for decision making on environmental regulation in urban agglomeration. Iteration number-based hierarchical gradient aggregation for distributed deep learning.Danyang Xiao Xinxin Li Jieying Zhou Yunfei Du Weigang Wu
Analysis of treatment effect of acupuncture on cervical spondylosis and neck pain with the data mining technology under deep learning.Huaying Huo Yigang Chang Yu Tang
Connectivity analysis of V2V communication with discretionary lane changing approach.J. Naskath B. Paramasivan Zaid Mustafa Hamza Aldabbas
Application of recurrent neural network in predicting athletes' sports achievement. An optimized FP-growth algorithm for discovery of association rules.Mai Shawkat Mahmoud Badawi Sally M. El-Ghamrawy Reham Arnous Ali I. Eldesoky
Impact of second-order network motif on online social networks.Sankhamita Sinha Subhayan Bhattacharya Sarbani Roy
Parallel XPath query based on cost optimization.Rongxin Chen Zhijin Wang Hang Su Shutong Xie Zongyue Wang
Dynamic weighted selective ensemble learning algorithm for imbalanced data streams.Yan Zhang Hongle Du Gang Ke Zhang Lin Yeh-Cheng Chen
ETAS: predictive scheduling of functions on worker nodes of Apache OpenWhisk platform. Sarcastic user behavior classification and prediction from social media data using firebug swarm optimization-based long short-term memory. High-performance CGM-based parallel algorithms for minimum cost parenthesizing problem.Jerry Lacmou Zeutouo Vianney Kengne Tchendji Jean Frédéric Myoupo
Aerial face recognition and absolute distance estimation using drone and deep learning.Ying-Hung Pu Po-Sheng Chiu Yu-Shiuan Tsai Meng-Tsung Liu Yi-Zeng Hsieh Shih-Syun Lin
Development of a yoga posture coaching system using an interactive display based on transfer learning.Chhaihuoy Long Eunhye Jo Yunyoung Nam
Performance-enhanced real-time lifestyle tracking model based on human activity recognition (PERT-HAR) model through smartphones. The potential of wind energy via an intelligent IoT-oriented assessment.Hanifa Teimourian Amir Teimourian Kamil Dimililer Fadi M. Al-Turjman
A multi-label ensemble predicting model to service recommendation from social media contents.Praphula Kumar Jain Rajendra Pamula Ephrem Admasu Yekun
A MapReduce-based K-means clustering algorithm.Yimin Mao Dejin Gan Deborah Simon Mwakapesa Yaser Ahangari Nanehkaran Tao Tao Xueyu Huang
Handoff calls' joining behavior and incentive mechanism in wireless cellular networks with retrial orbit. Parallel multi-objective optimization approaches for protein encoding.Belen Gonzalez-Sanchez Miguel A. Vega-Rodríguez Sergio Santander-Jiménez
Caching-based task scheduling for edge computing in intelligent manufacturing.Zhongmin Wang Gang Wang Xiaomin Jin Xiang Wang Jianwei Wang
Best path in mountain environment based on parallel A* algorithm and Apache Spark.Hadeel Alazzam Orieb AbuAlghanam Ahmad Sharieh
Range free localization technique under erroneous estimation in wireless sensor networks. Exploring the Internet of Things sequence-structure detection and supertask network generation of temporal-spatial-based graph convolutional neural network.Xiao Liu De-yu Qi Wen-lin Li Hao-tong Zhang
Deep learning in the information service system of agricultural Internet of Things for innovation enterprise.Qingquan Liu Yingli Wu Zuo Jun Xin Li
Robustness improvement of component-based cloud computing systems.Mounya Smara Makhlouf Aliouat Saad Harous Al-Sakib Khan Pathan
A neural network-based approach for the performance evaluation of branch prediction in instruction-level parallelism processors. An efficient authentication with key agreement procedure using Mittag-Leffler-Chebyshev summation chaotic map under the multi-server architecture.Chandrashekhar Meshram Rabha W. Ibrahim Sarita Gajbhiye Meshram Sajjad Shaukat Jamal Agbotiname Lucky Imoize
Reinforcement learning for traffic light control with emphasis on emergency vehicles.Mahboubeh Shamsi Abdolreza Rasouli Kenari Roghayeh Aghamohammadi
LATOC: an enhanced load balancing algorithm based on hybrid AHP-TOPSIS and OPSO algorithms in cloud computing.Ayeh Moori Behrang Barekatain Mehdi Akbari
Scalable blockchain storage mechanism based on two-layer structure and improved distributed consensus.Chunlin Li Jing Zhang Xianmin Yang
Superblock-based performance optimization for Sunway Math Library on SW26010 many-core processor.Hao Cao Shaozhong Guo Jiangwei Hao Yuanyuan Xia Jinchen Xu
Discrete hybrid cuckoo search and simulated annealing algorithm for solving the job shop scheduling problem.Faisal Alkhateeb Bilal H. Abed-alguni Mohammad Hani Al-rousan
A new software cache structure on Sunway TaihuLight.Jianjiang Li Zhaochu Deng Panpan Du Jie Lin
Optimizing emotion-cause pair extraction task by using mutual assistance single-task model, clause position information and semantic features.Jiawen Shi Hong Li Jiale Zhou Zhicheng Pang Chiyu Wang
A deep analysis of object capabilities for intelligence considering wireless IoT devices with the DNN approach.S. Senthil Kumaran S. P. Balakannan Jun Li
Automatic detection of depression symptoms in twitter using multimodal analysis.Ramin Safa Peyman Bayat Leila Moghtader
The facial expression recognition technology under image processing and neural network.Dezhu Zhao Yufeng Qian Jun Liu Min Yang
Correction to: A smart intuitionistic fuzzy‑based framework for round‑robin short‑term scheduler.Supriya Raheja Mohammed Alshehri Ahmed A. Mohamed Supriya Khaitan Manoj Kumar Thompson Stephan
A smart intuitionistic fuzzy-based framework for round-robin short-term scheduler.Supriya Raheja Mohammed Alshehri Ahmed A. Mohamed Supriya Khaitan Manoj Kumar Thompson Stephan
PSO-RDAL: particle swarm optimization-based resource- and deadline-aware dynamic load balancer for deadline constrained cloud tasks. Design of an IoT DDoS attack prediction system based on data mining technology.Rongli Chen Xiaozhong Chen Cairu Yang
Using data mining methods to develop manufacturing production rule in IoT environment.Lei Wang Bin Lin Rongli Chen Kuan-Han Lu
A low-area design of two-factor authentication using DIES and SBI for IoT security.M. N. Sudha M. Rajendiran Mariusz Specht Kasarla Satish Reddy S. Sugumaran
Simple shadow removal using shadow depth map and illumination-invariant feature. Analysis of lower limb high-risk injury factors of patellar tendon enthesis of basketball players based on deep learning and big data. Deep learning convolutional neural network in diagnosis of serous effusion in patients with malignant tumor by tomography.Jiawen Zhang Zhiguo Zhang Xu Ji Wei Ren Yufei Cheng Chunan Wang Qingpeng Kan
Availability model for edge-fog-cloud continuum: an evaluation of an end-to-end infrastructure of intelligent traffic management service.Paulo Pereira Carlos Melo Jean Araujo Jamilson Dantas Vinícius Santos Paulo Maciel
Travel order quantity prediction via attention-based bidirectional LSTM networks.Fei Yang Huyin Zhang Shiming Tao
Effective approximation of high-dimensional space using neural networks.Jian Zheng Jianfeng Wang Yanping Chen Shuping Chen Jingjin Chen Wenlong Zhong Wenling Wu
Learning for target-dependent sentiment based on local context-aware embedding.Biqing Zeng Heng Yang Shuai Liu Mayi Xu
A parallel and accurate method for large-scale image segmentation on a cloud environment.Gangmin Park Yong Seok Heo Kisung Lee Hyuk-Yoon Kwon
Functional motion detection based on artificial intelligence. An energy-aware scheduling of dynamic workflows using big data similarity statistical analysis in cloud computing. A bi-objective task scheduling approach in fog computing using hybrid fireworks algorithm.Ashish Mohan Yadav Kuldeep Narayan Tripathi S. C. Sharma
MPI-dot2dot: A parallel tool to find DNA tandem repeats on multicore clusters.Jorge González-Domínguez José M. Martín-Martínez Roberto R. Expósito
Implementation and optimization of ChaCha20 stream cipher on sunway taihuLight supercomputer.Weilin Cai Heng Chen Ziheng Wang Xingjun Zhang
Intelligent malware detection based on graph convolutional network.Shanxi Li Qingguo Zhou Rui Zhou Qingquan Lv
A new hybrid algorithm for path planning of mobile robot.Ting-Wei Zhang Guang-Hui Xu Xi-Sheng Zhan Tao Han
Correction to: Novel dynamic load balancing algorithm for cloud‑based big data analytics.Arman Aghdashi Seyedeh Leili Mirtaheri
Novel dynamic load balancing algorithm for cloud-based big data analytics.Arman Aghdashi Seyedeh Leili Mirtaheri
Regional soft error vulnerability and error propagation analysis for GPGPU applications. PG-RNN: using position-gated recurrent neural networks for aspect-based sentiment classification.Qingchun Bai Jie Zhou Liang He
An efficient multilayer deep detection perceptron (MLDDP) methodology for detecting testicular anomalies with or without congenital heart disease (TACHD). An optimal edge server placement approach for cost reduction and load balancing in intelligent manufacturing.Zhongmin Wang Weiye Zhang Xiaomin Jin Yihua Huang Chen Lu
A hybrid OBL-based firefly algorithm with symbiotic organisms search algorithm for solving continuous optimization problems.Mina Javanmard Goldanloo Farhad Soleimanian Gharehchopogh
Top-k dominating queries on incomplete large dataset.Jimmy Ming-Tai Wu Min Wei Mu-En Wu Shahab Tayeb
Adoption of combined detection technology of tumor markers via deep learning algorithm in diagnosis and prognosis of gallbladder carcinoma.Yigang Chang Qian Wu Limin Chi Huaying Huo Qiang Li
A novel two-stream structure for video anomaly detection in smart city management.Yuxuan Zhao Ka Lok Man Jeremy Smith Sheng-Uei Guan
Research to key success factors of intelligent logistics based on IoT technology.Xiaozhong Chen Rongli Chen Cairu Yang
DAACS : a Decision Approach for Autonomic Computing Systems. Structural break-aware pairs trading strategy using deep reinforcement learning.Jing-You Lu Hsu-Chao Lai Wen-Yueh Shih Yi-Feng Chen Shen-Hang Huang Hao-Han Chang Jun-Zhe Wang Jiun-Long Huang Tian-Shyr Dai
Comparative evaluation of task priorities for processing and bandwidth capacities-based workflow scheduling for cloud environment.Emmanuel Bugingo Wei Zheng Defu Zhang
FP-DCNN: a parallel optimization algorithm for deep convolutional neural network.Ye Le Yaser Ahangari Nanehkaran Deborah Simon Mwakapesa Ruipeng Zhang Jianbing Yi Yimin Mao
Improving the performance of uplink visible light communication in urban streets. Adaptive telecom churn prediction for concept-sensitive imbalance data streams.Affan Ahmad Toor Muhammad Usman
Automatic lane marking prediction using convolutional neural network and S-Shaped Binary Butterfly Optimization. Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems.Saurabh Rana Mohammad S. Obaidat Dheerendra Mishra Ankita Mishra Y. Sreenivasa Rao
Smart city information processing under internet of things and cloud computing.Peng Su Yuanyuan Chen Mengmeng Lu
An intelligent fault detection approach based on reinforcement learning system in wireless sensor network.Tariq Mahmood Jianqiang Li Yan Pei Faheem Akhtar Suhail Ashfaq Butt Allah Ditta Sirajuddin Qureshi
An optimization approach for cloud composite services.Aida Lahouij Lazhar Hamel Mohamed Graiet
In situ visualization of large-scale turbulence simulations in Nek5000 with ParaView Catalyst.Marco Atzori Wiebke Köpp Steven Wei Der Chien Daniele Massaro Fermín Mallor Adam Peplinski Mohamad Rezaei Niclas Jansson Stefano Markidis Ricardo Vinuesa Erwin Laure Philipp Schlatter Tino Weinkauf
Data balancing-based intermediate data partitioning and check point-based cache recovery in Spark environment.Chunlin Li Qianqian Cai Youlong Luo
Contrast-enhanced ultrasound in optimization of treatment plans for diabetic nephropathy patients based on deep learning. Discrete Jaya with refraction learning and three mutation methods for the permutation flow shop scheduling problem.Noor Aldeen Alawad Bilal H. Abed-alguni
Applying deep learning in football ankle injury for value of high-power magnetic resonance bioimaging evaluation.Jun Xie Jianwei Zhang Shuang Liu Guohua Chen
cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. Optimal machine placement based on improved genetic algorithm in cloud computing.Jiawei Lu Wei Zhao Haotian Zhu Jie Li Zhenbo Cheng Gang Xiao
Performance-aware cache management for energy-harvesting nonvolatile processors.Yan Wang Kenli Li Xia Deng Keqin Li
Optimal channel estimation and interference cancellation in MIMO-OFDM system using MN-based improved AMO model.Chittetti Venkateswarlu Venkateswara Rao Nandanavanam
Design and implementation of a cloud-based event-driven architecture for real-time data processing in wireless sensor networks.Sabrine Khriji Yahia Benbelgacem Rym Chéour Dhouha El Houssaini Olfa Kanoun
Two-stage person re-identification scheme using cross-input neighborhood differences.Hyeonwoo Kim Hyungjoon Kim Bumyeon Ko Jonghwa Shim Eenjun Hwang
Correction to: A model of digital identity for better information security in e-learning systems.Dragan Korac Boris Damjanovic Dejan Simic
A model of digital identity for better information security in e-learning systems.Dragan Korac Boris Damjanovic Dejan Simic
Enabling progressive system integration for AIoT and speech-based HCI through semantic-aware computing. Load balancing of IoT tasks in the cloud computing by using sparrow search algorithm. Toward feature selection in big data preprocessing based on hybrid cloud-based model.Noha Shehab Mahmoud Mohammed Badawy Hesham Arafat Ali
High-efficient MPSoC-based CNNs accelerator with optimized storage and dataflow.Yonghua Zhang Hongxu Jiang Xiaojian Liu Haiheng Cao Yu Du
An efficient recommender system algorithm using trust data.Asma Rahim Mehr Yahya Durrani Saira Andleeb Gillani Zeeshan Ali Najam Ul Hasan Mucheol Kim
Performance and programmability comparison of the thick control flow architecture and current multicore processors.Martti Forsell Sara Nikula Jussi Roivainen Ville Leppänen Jesper Larsson Träff
Parallel best-first search algorithms for planning problems on multi-core processors.Didier El Baz Bilal Fakih Romeo Sanchez Nigenda Vincent Boyer
An ACO-based multi-objective optimization for cooperating VM placement in cloud data center.Soheir Mohamed Khamis Naglaa M. Reda Wael Zakaria
Combining Range-Suffrage and Sort-Mid Algorithms for Improving Grid Scheduling.Soheir Mohamed Khamis Naglaa M. Reda Wael Zakaria Abd Allah
Fast kNN query processing over a multi-node GPU environment.Ricardo J. Barrientos Javier A. Riquelme Ruber Hernández-García Cristóbal A. Navarro Wladimir E. Soto-Silva
AI-enabled device digital forensics for smart cities.Sungbum Kim Wooyeon Jo Jino Lee Taeshik Shon
Making legacy Fortran code type safe through automated program transformation. Kubernetes in IT administration and serverless computing: An empirical study and research challenges.Subrota Kumar Mondal Rui Pan Hussain Mohammed Dipu Kabir Tan Tian Hong-Ning Dai
Coal and gas outbursts prediction based on combination of hybrid feature extraction DWT+FICA-LDA and optimized QPSO-DELM classifier.Xuning Liu Zhixiang Li Zixian Zhang Guoying Zhang
A transfer learning-based efficient spatiotemporal human action recognition framework for long and overlapping action classes.Muhammad Bilal Muazzam Maqsood Sadaf Yasmin Najam Ul Hasan Seungmin Rho
Efficient number theoretic transform implementation on GPU for homomorphic encryption.Özgün Özerk Can Elgezen Ahmet Can Mert Erdinç Öztürk Erkay Savas
Cloud storage availability and performance assessment: a study based on NoSQL DBMS.Carlos Gomes Eduardo Tavares Meuse Nogueira de O. Junior Bruno C. S. Nogueira
Elite learning Harris hawks optimizer for multi-objective task scheduling in cloud computing.Dina A. Amer Gamal Attiya Ibrahim Zeidan Aida A. Nasr
High performance computation of human computer interface for neurodegenerative individuals using eye movements and deep learning technique.Jayabrabu Ramakrishnan Rajesh Doss Thangam Palaniswamy Raddad Faqihi Dowlath Fathima Karthik Srinivasan
ACTSSD: social spammer detection based on active learning and co-training.Ailin Chen Pin Yang Pengsen Cheng
Floor plan optimization for indoor environment based on multimodal data. Improved Camshift Algorithm in AGV Vision-based Tracking with Edge Computing.Tongpo Zhang Xiaokai Nie Xu Zhu Enggee Lim Fei Ma Limin Yu
An efficient parallel entropy coding method for JPEG compression based on GPU. The internet-of-vehicle traffic condition system developed by artificial intelligence of things. Smart communication using tri-spectral sign recognition for hearing-impaired people.B. Kanisha V. Mahalakshmi M. Baskar K. Vijaya P. Kalyanasundaram
DHkmeans-ℓdiversity: distributed hierarchical K-means for satisfaction of the ℓ-diversity privacy model using Apache Spark.Farough Ashkouti Keyhan Khamforoosh Amir Sheikhahmadi Hana Khamfroush
A new approach for design of an efficient FPGA-based reconfigurable convolver for image processing.Abbas Dehghani Ali Kavari Mahdi Kalbasi Keyvan RahimiZadeh
Digital document analytics using logistic regressive and deep transition-based dependency parsing.D. Rekha J. Sangeetha V. Ramaswamy
A comparative experimental study of distributed storage engines for big spatial data processing using GeoSpark.Hansub Shin Kisung Lee Hyuk-Yoon Kwon
Improving the readability and saliency of abstractive text summarization using combination of deep neural networks equipped with auxiliary attention mechanism.Hassan Aliakbarpour Mohammad Taghi Manzuri Amir Masoud Rahmani
A cloud-based mobile payment system using identity-based signature providing key revocation.Fatemeh Alidadi Shamsabadi Shaghayegh Bakhtiari Chehelcheshmeh
Application of homotopy perturbation and variational iteration methods for nonlinear imprecise prey-predator model with stability analysis.T. Vijayalakshmi Rathinam Senthamarai
NLR-OP: a high-performance optical router based on North-Last turning model for multicore processors.Negin Bagheri Renani Elham Yaghoubi Naser Sadehnezhad Tofigh Abbasi
Optimizing data query performance of Bi-cluster for large-scale scientific data in supercomputers.Xia Liao Yixian Shen Shengguo Li Yutong Lu Yufei Du Zhiguang Chen
CP2EH: a comprehensive privacy-preserving e-health scheme over cloud.Vijay Kumar Yadav Rakesh Kumar Yadav Shekhar Verma S. Venkatesan
PPT-Multicore: performance prediction of OpenMP applications using reuse profiles and analytical modeling.Atanu Barai Yehia Arafa Abdel-Hameed A. Badawy Gopinath Chennupati Nandakishore Santhi Stephan J. Eidenbenz
High performance nanocomparator: a quantum dot cellular automata-based approach. A hierarchical multi-objective task scheduling approach for fast big data processing. Design and analysis of SRAM cell using reversible logic gates towards smart computing.O. Mohana chandrika M. Siva kumar
Application of large-scale L2-SVM for microarray classification.Baosheng Li Baole Han Chuandong Qin
An analytical framework for URLLC in hybrid MEC environments.Marcos Falcao Caio Souza Andson M. Balieiro Kelvin L. Dias
Power side-channel leakage assessment and locating the exact sources of leakage at the early stages of ASIC design process.Vahhab Samadi Bokharaie Ali Jahanian
Design of variable precision transcendental function automatic generator.Jiangwei Hao Jinchen Xu Shaozhong Guo Yuanyuan Xia
Legio: fault resiliency for embarrassingly parallel MPI applications.Roberto Rocco Davide Gadioli Gianluca Palermo
Stock exchange trading optimization algorithm: a human-inspired method for global optimization. NodeRank: Finding influential nodes in social networks based on interests.Mohammed Nasser Ba-Hutair Zaher Al Aghbari Ibrahim Kamel
Energy-saving distributed monitoring-based firefly algorithm in wireless sensors networks.Ali Kadhum Idrees Raphaël Couturier
Predictive models for detecting patients more likely to develop acute myocardial infarctions.Fu-Hsing Wu Huey-Jen Lai Hsuan-Hung Lin Po-Chou Chan Chien-Ming Tseng Kun-Min Chang Yung-Fu Chen Chih-Sheng Lin
Enterprise service composition models in IoT context: solutions comparison.Alireza Safaei Ramin Nassiri Amir Masoud Rahmani
A survey on computation offloading and service placement in fog computing-based IoT.Kaouther Gasmi Selma Dilek Suleyman Tosun Suat Ozdemir
End-to-end deep learning-based autonomous driving control for high-speed environment.Cheol-jin Kim Myung-Jae Lee Kyu Hong Hwang Young-Guk Ha
An intelligent web service group-based recommendation system for long-term composition.P. Kirubanantham Udhaya Sankar S. M C. Amuthadevi M. Baskar M. Senthil Raja P. C. Karthik
Real-time cellular-level imaging and medical treatment with a swarm of wireless multifunctional robots.Nikita Ahuja Harsha Bikkavilli Zhaoqi Chen Mary Mehrnoosh Eshaghian-Wilner Abhishek Mittal Kodiak Ravicz Bhimsen Sangal Sagarneel Sarma Mike Schlesinger Ariana Wilner
A tight coupling mapping method to integrate the ESKF, g2o, and point cloud alignment.Sheng Bao Wenzhong Shi Wenzheng Fan Pengxin Chen Mingyan Nie Haodong Xiang
Dynamic recognition prefetch engine for DRAM-PCM hybrid main memory.Mengzhao Zhang Jeong-Geun Kim Su-Kyung Yoon Shin-Dug Kim
Toward low CPU usage and efficient DPDK communication in a cluster.Mingjie Wu Qingkui Chen Jingjuan Wang
Deep learning techniques for tumor segmentation: a review.Huiyan Jiang Zhaoshuo Diao Yu-Dong Yao
A novel IoT-fog-cloud-based healthcare system for monitoring and predicting COVID-19 outspread.Tariq Ahamed Ahanger Usman Tariq Muneer Nusir Abdulaziz Aldaej Imdad Ullah Abdullah Sulman
Visual analysis for panel data imputation with Bayesian network.Hanbyul Yeon Seongbum Seo Hyesook Son Yun Jang
A high-performance batched matrix multiplication framework for GPUs under unbalanced input distribution.Ruimin Wang Zhiwei Yang Hao Xu Lu Lu
Consensus-based bundle algorithm with local replanning for heterogeneous multi-UAV system in the time-sensitive and dynamic environment.Jie Chen Xianguo Qing Fang Ye Kai Xiao Kai You Qian Sun
MPI parameter optimization during debugging phase of HPC system. Efficient designs of quantum-dot cellular automata multiplexer and RAM with physical proof along with power analysis.Seyed-Sajad Ahmadpour Mohammad Mosleh Saeed Rasouli Heikalabad
Efficient parallel edge-centric approach for relaxed graph pattern matching.Sarra Bouhenni Saïd Yahiaoui Nadia Nouali-Taboudjemat Hamamache Kheddouci
The analysis of innovative design and evaluation of energy storage system based on Internet of Things. An efficient U-Net framework for lung nodule detection using densely connected dilated convolutions.Zeeshan Ali Aun Irtaza Muazzam Maqsood
The performances of iterative type-2 fuzzy C-mean on GPU for image segmentation. A measurement study of offloading virtual network functions to the edge.Daniela L. Freire Rafael Z. Frantz Fabricia Roos-Frantz Vítor Basto Fernandes
A voxelized point clouds representation for object classification and segmentation on 3D data.Abubakar Sulaiman Gezawa Zikirillahi A. Bello Qicong Wang Yunqi Lei
Sampling in weighted social networks using a levy flight-based learning automata.Saeed Roohollahi Amid Khatibi Bardsiri Farshid Keynia
GreenPacker: renewable- and fragmentation-aware VM placement for geographically distributed green data centers.Zeinab Nadalizadeh Mahmoud Momtazpour
A holistic framework for prediction of routing attacks in IoT-LLNs.Rashmi Sahay G. Geethakumari Barsha Mitra
Efficient detection of silent data corruption in HPC applications with synchronization-free message verification.Guozhen Zhang Yi Liu Hailong Yang Depei Qian
Node-to-set disjoint paths problem in cross-cubes.Xi Wang Jianxi Fan Shukui Zhang Jia Yu
Maximum Network Lifetime Problem with Time Slots and coverage constraints: heuristic approaches.Raffaele Cerulli Ciriaco D'Ambrosio Antonio Iossa Francesco Palmieri
A novel virtual machine placement algorithm using RF element in cloud infrastructure.Seyed Milad Farzaneh Omid Fatemi
Correction to: Adaptive market‑oriented combinatorial double auction resource allocation model in cloud computing.Asif Umer Babar Nazir Zulfqar Ahmad
Adaptive market-oriented combinatorial double auction resource allocation model in cloud computing.Asif Umer Babar Nazir Zulfiqar Ahmad
Dynamic scheduling of independent tasks in cloud computing applying a new hybrid metaheuristic algorithm including Gabor filter, opposition-based learning, multi-verse optimizer, and multi-tracker optimization algorithms.Ahmad Nekooei-Joghdani Faramarz Safi-Esfahani
Containerization technologies: taxonomies, applications and challenges.Ouafa Bentaleb Adam S. Z. Belloum Abderrazak Sebaa Aouaouche El-Maouhab
The societal communication of the Q&A community on topic modeling.P. Venkateswara Rao A. P. Siva Kumar
Optimal sequential relay-remote selection and computation offloading in mobile edge computing.Che Chen Rongzong Guo Wenjie Zhang Jingmin Yang Chai Kiat Yeo
Binary-PSO-based energy-efficient small cell deployment in 5G ultra-dense network.Kuna Venkateswararao Pravati Swain
A new approach for physical human activity recognition based on co-occurrence matrices.Fatma Kuncan Yilmaz Kaya Ramazan Tekin Melih Kuncan
F-LEACH: a fuzzy-based data aggregation scheme for healthcare IoT systems.Seyedeh Nafiseh Sajedi Mohsen Maadani Meisam Nesari Moghadam
Complex and flexible data access policy in attribute-based encryption.Shengzhou Hu Xingfu Wang Hua He Tingting Zhong
CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage.Kasturi Dhal Satyananda Champati Rai Prasant Kumar Pattnaik Somanath Tripathy
Microblogs recommendations based on implicit similarity in content social networks.Elham Mazinan Hassan Naderi Mitra Mirzarezaee Saber Saati
DOTMIX-Pro: faster and more efficient variants of DOTMIX for dynamic-multithreading platforms.Robert Ritchie Khodakhast Bibak
Analysing software prefetching opportunities in hardware transactional memory.Marina Shimchenko J. Rubén Titos Gil Ricardo Fernández Pascual Manuel E. Acacio Stefanos Kaxiras Alberto Ros Alexandra Jimborean
Embedding linear arrays of the maximum length in O-shaped meshes. Correction to: Novel design and simulation of reversible ALU in quantum dot cellular automata.Behrouz Safaiezadeh Ebrahim Mahdipour Majid Haghparast Samira Sayedsalehi Mehdi Hosseinzadeh
Novel design and simulation of reversible ALU in quantum dot cellular automata.Behrouz Safaiezadeh Ebrahim Mahdipour Majid Haghparast Samira Sayedsalehi Mehdi Hosseinzadeh
Field equations for incompressible non-viscous fluids using artificial intelligence.P. C. Karthik J. Sasikumar M. Baskar E. Poovammal P. Kalyanasundaram
Scalable implementation of multigrid methods using partial semi-aggregation of coarse grids. Tool wear prediction using convolutional bidirectional LSTM networks.Yu-Wei Chan Tsan-Ching Kang Chao-Tung Yang Chih-Hung Chang Shih-Meng Huang Yin-Te Tsai
Cyber-physical systems for structural health monitoring: sensing technologies and intelligent computing.Wael Doghri Ahlem Saddoud Lamia Chaari Fourati
Amended hybrid multi-verse optimizer with genetic algorithm for solving task scheduling problem in cloud computing.Laith Mohammad Abualigah Muhammad Alkhrabsheh
Feature matching and instance reweighting with transfer learning for human activity recognition using smartphone.Xianyao Chen Kyung Tae Kim Hee Yong Youn
SRFNet: selective receptive field network for human pose estimation.Zhilong Ou Yanmin Luo Jin Chen Geng Chen
TRAM: Technique for resource allocation and management in fog computing environment. Dynamic programming-based computation of an optimal tap working pattern in nonferrous arc furnace.Sokchomrern Ean Manas Bazarbaev Keon Myung Lee Aziz Nasridinov Kwan-Hee Yoo
An improved DQN path planning algorithm.Jianxin Li Yiting Chen XiuNiao Zhao Jinyu Huang
Sign prediction in sparse social networks using clustering and collaborative filtering.Mina Nasrazadani Afsaneh Fatemi Mohammadali Nematbakhsh
Auxiliary tumour diagnosis image with deep learning technology. The microscopic visual forms in architectural art design following deep learning. FT-PDC: an enhanced hybrid congestion-aware fault-tolerant routing technique based on path diversity for 3D NoC.Elham Khodadadi Behrang Barekatain Elham Yaghoubi Zahra Mogharrabi-Rad
Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card.Mariem Bouchaala Cherif Ghazel Leïla Azouz Saïdane
A cost-effective power-aware approach for scheduling cloudlets in cloud computing environments. Revisiting split tiling for stencil computations in polyhedral compilation.Yingying Li Huihui Sun Jianmin Pang
Optimization of electrical infrastructures at data centers through a DoE-based approach.Felipe Fernandes Lima Melo Ermeson C. Andrade Gustavo Callou
Using deep belief network to construct the agricultural information system based on Internet of Things.Ji Luo Chuhao Zhao Qiao Chen Guangqin Li
Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography.B. Prasanalakshmi K. Murugan Karthik Srinivasan S. Shridevi Shermin Shamsudheen Yu-Chen Hu
A study of application platform for smart contract visualization based blockchain.Soonhyeong Jeong Byeongtae Ahn
Reversible multiplier with a column-wise structure and a reduced number of ancilla inputs and garbage outputs.Seyed Mansour Shahidi Shahram Etemadi Borujeni
UMOTS: an uncertainty-aware multi-objective genetic algorithm-based static task scheduling for heterogeneous embedded systems.Mohsen Raji Mohaddaseh Nikseresht
Hpcfolder: a simple tool used to parallelize algorithms using the message passing interface (MPI).Kunal Jani Ankit Kumar Ronak Nahata
Mapping and virtual neuron assignment algorithms for MAERI accelerator.Midia Reshadi Seyedeh Yasaman Hosseini Mirmahaleh
An optimized image watermarking algorithm based on SVD and IWT. Scheduling for heterogeneous systems in accelerator-rich environments. Efficient XML data placement schemes over multiple mobile wireless broadcast channels.Samaneh Fathi Ozonbolagh Meghdad Mirabi
Novel parallel hybrid genetic algorithms on the GPU for the generalized assignment problem.Huang Zhi-Bin Fu Guang-Tao Dong Dan-Yang Xiao Chen Ding Zhe-Lun Dai Zhi-Tao
Goaling recognition based on intelligent analysis of real-time basketball image of Internet of Things. A latency-aware task scheduling algorithm for allocating virtual machines in a cost-effective and time-sensitive fog-cloud architecture.Pedram Memari Seyedeh Samira Mohammadi Fariborz Jolai Reza Tavakkoli-Moghaddam
A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes.Saeid Esmaeilzade Nasrollah Pakniat Ziba Eslami
FlexSched: Efficient scheduling techniques for concurrent kernel execution on GPUs.Bernabé López-Albelda Francisco M. Castro José María González-Linares Nicolás Guil
Load balancing in cloud computing environment using the Grey wolf optimization algorithm based on the reliability: performance evaluation.Seyedsalar Sefati Maryamsadat Mousavinasab Roya Zareh Farkhady
Design space exploration for an FPGA-based quantum annealing simulator with interaction-coefficient-generators.Chia-Yin Liu Hasitha Muthumala Waidyasooriya Masanori Hariyama