


default search action
Concurrency and Computation: Practice and Experience, Volume 37
Volume 37, Number 1, January 2025
Research Article
- Qiqi Zhang, Bohui Li, Shaojin Geng
, Xingjuan Cai
:
A Multi-Workflow Scheduling Approach With Explicit Evolutionary Multi-Objective Multi-Task Optimization Algorithm in Cloud Environment.
Special Issue Paper
- W. Pepper Marts
, Matthew G. F. Dosanjh
, Whit Schonbein
, Scott Levy
, Patrick G. Bridges
:
Measuring Thread Timing to Assess the Feasibility of Early-Bird Message Delivery Across Systems and Scales. - Jiezhou He, Zhiming Luo, Wei Peng, Songzhi Su, Xue Zhao, Guojun Zhang, Shaozi Li:
HRCUNet: Hierarchical Region Contrastive Learning for Segmentation of Breast Tumors in DCE-MRI. - Dongfeng Xing, Mingxing Tian:
Analysis and Fuzzy Neural Networks-Based Inertia Coefficient Adjustment Strategy of Power Converters. - Mete Celik, Ahmet Sakir Dokuz, Alper Ecemis, Emre Erdogmus:
Discovering and Ranking Urban Social Clusters Out of Streaming Social Media Datasets. - Jie Wang, Huiqun Yu, Guisheng Fan, Jiayin Zhang:
Request Deadline Split and Interference-Aware Request Migration in Edge Cloud. - Barry Linnert, César Augusto Fonticielha De Rose, Hans-Ulrich Heiß:
Toward a Dynamic Allocation Strategy for Deadline-Oriented Resource and Job Management in HPC Systems. - Pujasuman Tripathy, Pabitra Mohan Khilar:
Weighted Centroid Amorphous Algorithm for Position Error Minimization in WSN. - Mrinal Ashish Khadse, Dhananjay Manohar Dakhane:
A Review on Network Covert Channel Construction and Attack Detection. - Mohammad Alaei, Fahimeh Yazdanpanah:
A Survey on Heterogeneous CPU-GPU Architectures and Simulators. - Giuseppe Bilotta:
From GPU to CPU (and Beyond): Extending Hardware Support in GPUSPH Through a SYCL-Inspired Interface. - Yuzhen Pi, Quande Yuan, Zhenming Zhang, Jingya Wen, Lei Kou:
An Ultra-Short-Term Wind Power Prediction Method Based on Spatiotemporal Characteristics Fusion. - Haoyang He, Yan Gu, Qingzhi Liu, Hao Wu, Long Cheng:
Job Scheduling in Hybrid Clouds With Privacy Constraints: A Deep Reinforcement Learning Approach. - Xingfu Wu, Prasanna Balaprakash, Michael Kruse, Jaehoon Koo, Brice Videau, Paul D. Hovland, Valerie Taylor, Brad Geltz, Siddhartha Jana, Mary W. Hall:
ytopt: Autotuning Scientific Applications for Energy Efficiency at Large Scales. - Vahini Siruvoru, Shivampeta Aparna:
Harmonic Migration Algorithm for Virtual Machine Migration and Switching Strategy in Cloud Computing. - Xiaoyun Lu, Chunjie Zhou, Shengjie Liu, Jialong Li:
3D LVCN: A Lightweight Volumetric ConvNet. - Yiming Mou, Lunzhi Deng, Yu Ruan:
A Revocable Certificateless Encryption Scheme for Multi-User.
Volume 37, Number 2, January 2025
Special Issue Paper
- Yonghwan Kim
, Yoshiaki Katayama, Koichi Wada:
Complete Visibility Algorithms of Luminous Robots With Two-Color Lights on Grid. - Xuanzhengbo Ren
, Masatoshi Kawai, Tetsuya Hoshino, Takahiro Katagiri, Toru Nagai:
Auto-Tuning Mixed-Precision Computation by Specifying Multiple Regions.
Research Article
- Sweta Gupta
, Kamlesh Kumar Gupta, Piyush Kumar Shukla
:
Improving the End-to-End Protection in E-Voting Using BVM - Blockchain-Based E-Voting Mechanism. - Mohamed Hedi Fourati
, Soumaya Marzouk, Mohamed Jmaiel:
Cloud Elasticity of Microservices-Based Applications: A Survey.
Special Issue Paper
- Satoki Tsuji
, Yasuaki Ito
, Koji Nakano
, Akihiko Kasagi:
GPU Acceleration of the Boys Function Evaluation in Computational Quantum Chemistry.
Research Article
- T. R. Chenthil
, G. Balachandran
, S. Ranjith
, E. Sakthivel
:
A Quantum-Inspired Source-Distributed Opportunistic Routing Protocol for Reliable Routing in Underwater Wireless Sensor Networks. - Monika Dubey, Ashutosh Kumar Singh
, Richa Mishra
:
AI Based Resource Management for 5G Network Slicing: History, Use Cases, and Research Directions. - Xuanli Liu, Weibei Fan
, Jing He
, Zhijie Han
, Chi-Hung Chi:
Reliability Assessment of Multiprocessor System Based on Exchanged Crossed Cube Networks. - Subhajit Sahu
, Kishore Kothapalli
:
A Fast Parallel Approach for Neighborhood-Based Link Prediction by Disregarding Large Hubs. - Ameni Chetouane
, Kamel Karoui:
New Continual Federated Learning System for Intrusion Detection in SDN-Based Edge Computing.
Special Issue Paper
- Niclas Jansson
, Martin Karp, Jacob Wahlgren, Stefano Markidis, Philipp Schlatter:
Design of Neko - A Scalable High-Fidelity Simulation Framework With Extensive Accelerator Support.
Research Article
- Mingxiu Tuo, Chenglei Jia, Siyu Jin, Shunli Zhang
:
FPM-SSD: Fast Parallel Multi-Scale Smooth Signed Distance Surface Reconstruction. - Bin Zhang
, Yuejuan Wei, Shuqui Zang, Qing Li, Yan Qiang:
An Echo Pressure Model Based on Mutil-Gaussian Beam Theory for Measuring the Liquid Level in Special Field.
Correction
- Correction to "A DSEL for High Throughput and Low Latency Software-Defined Radio on Multicore CPUs".
Volume 37, Number 3, February 2025
Research Article
- Bhanu Pratap, Ayush Singh, Pawan Singh Mehra
:
REHAS: Robust and Efficient Hyperelliptic Curve-Based Authentication Scheme for Internet of Drones. - Heda Wang
, Shuyan Zhang:
Research on the Application of Improved BERT-DPCNN Model in Chinese News Text Classification. - Xiaowen Chen, Jian Lv, Qingsheng Xie
:
Fatigue Detection Based on Blood Volume Pulse Signal and Multi-Physical Features. - Zexin Zhang
:
Enhancing Invariant Feature Learning via Cross-Composition and Self-Enrichment Normalization for Visible-Infrared Person Re-Identification.
Special Issue Paper
- Pedro Moritz de Carvalho Neto, Márcio Castro
, Frank Siqueira:
Dynamic Load Balancing in Kubernetes Environments With Kubernetes Scheduling Extension (KSE).
Review Article
- Omar Ben Maaouia
, Hazem Fkaier, Christophe Cérin, Mohamed Jemni
:
An Efficient Services Placement for Optimizing the Energy Consumption in Volunteer Cloud Computing.
Research Article
- Qiang Li, Feng Zhao, Linlin Zhao, Maokai Liu, Yubo Wang, Shuo Zhang, Yuanyuan Guo, Shunlu Wang, Weigang Wang:
A System of Multimodal Image-Text Retrieval Based on Pre-Trained Models Fusion. - Qiang Qian, Ping Ma
, Nini Wang, Hongli Zhang, Cong Wang, Xinkai Li:
Research on Industrial Process Fault Diagnosis Based on Deep Spatiotemporal Fusion Graph Convolutional Network. - Jie Wen, Qian Wang, Haozhe Dong, Zhihua Cui
:
Personalized Indicator Based Evolutionary Algorithm for Uncertain Constrained Many-Objective Optimization Problem With Interval Functions.
Special Issue Paper
- Hüseyin Can Önel
, Ali Ata Adam
, Nilay Sezer-Uzol
:
Comparative Aerodynamic Analysis and Parallel Performance of 2D CFD Simulations of a VAWT Using Sliding Mesh Interface Method.
Research Article
- P. Vinayasree
, A. Mallikarjuna Reddy
:
A Reliable and Secure Permissioned Blockchain-Assisted Data Transfer Mechanism in Healthcare-Based Cyber-Physical Systems. - Jintao Jiao
, Lei Guo, Wensen Yu, Sheng Yang, Shaozi Li:
An Efficient Lattice-Based Heterogeneous Signcryption Scheme for VANETs.
Special Issue Paper
Research Article
- Qingpeng Li, Xinyue Hu, Jia Zhao
, Hao Cao:
Density Peak Clustering Algorithm Based on Shared Neighbors and Natural Neighbors and Analysis of Electricity Consumption Patterns.
Special Issue Paper
- Le Mai Weakley
, Scott Michael
, Laura Huber, Abhinav Thota
, Ben Fulton, Matthew Kusz:
Monitoring and Characterizing GPU Usage.
Research Article
- Jia Zhao
, Ming Chen, Jeng-Shyang Pan, Longzhe Han, Shenyu Qiu, Zhaoxiu Nie:
Contextual Information Aggregation and Multi-Scale Feature Fusion for Single Image De-Raining in Generative Adversarial Networks.
Special Issue Paper
- Tolga Büyüktanir, Mehmet S. Aktas:
On the Use of Embedding Techniques for Modeling User Navigational Behavior in Intelligent Prefetching Strategies.
Research Article
- Rupali Sachin Vairagade
, Priya Parkhi, Yogita Hande, Bhagyashree Hambarde:
Blockchain-Powered Framework for Trust Enhancement in FinTech: A Comprehensive Trust Evaluation Approach.
Special Issue Paper
- Shunsuke Tsukiyama, Koji Nakano
, Yasuaki Ito
, Takumi Kato, Yuya Kawamata:
Ising Models for Solving the N-Queens Puzzle Based on the Domain-Wall Vectors.
Research Article
- Boykuziev Ilkhom
, Angshuman Khan
, Rupayan Das
, Abdurakhimov Bakhtiyor
:
A Novel Approach to Integer Factorization: A Paradigm in Cryptography.
Special Issue Paper
- Tandac F. Guclu
, Busra Tayhan
, Ebru Çetin
, Ali Rana Atilgan
, Canan Atilgan
:
High Throughput Mutational Scanning of a Protein via Alchemistry on a High-Performance Computing Resource.
Research Article
- Abhinav Tomar
, Geetanjali Rathee:
Optimized Framework for Composite Cloud Service Selection: A Computational Intelligence-Driven Approach.
Special Issue Paper
- Mateus S. de Melo, Roberto Pinto Souto
, Lúcia M. A. Drummond
:
Optimized Execution of a Numerical Weather Forecast Model in a Cloud Cluster.
Research Article
- Raushan Kumar Singh
, Mukesh Kumar:
Optimization of Path for Road Network With Modified Ant Colony Optimization (MACO). - Pragya
, Bijendra Kumar:
Enhanced IPv6 Addressing Scheme: Irreversible Elegant Pairing for Reconnaissance Attack Prevention. - Yangyang Shen
, Jing Wu, Minfu Ma, Xiaofeng Du, Datian Niu:
Application of an Improved Differential Evolution Algorithm in Practical Engineering. - Xiaohan Wang
, Xuehui Du, Hengyi Lv, Siyuan Shang
, Aodi Liu
:
Unstructured Text Data Security Attribute Mining Method Based on Multi-Model Collaboration. - Xue Li, Yang Xiang, Lan Ma, Hong Li
, Huawei Wang, Lili Cai, Shuai Lu, Chao Tang, Xilian Wei:
Probabilistic Risk Analysis for Catenary System of Heavy-Haul Railway Based on Casual Inference. - Sunil Kumar, Gaurav Mittal, Arvind Yadav
:
Three Party Post Quantum Secure Lattice Based Construction of Authenticated Key Establishment Protocol for Mobile Communication.
Special Issue Paper
- Qingquan Tong, Rongju Yao
:
Integrating Embedding and LSHiForest in English Text Anomaly Detection.
Research Article
- Changcheng Wei, Juanyan Fang
, Zhu Xu, Jinbao Meng, Zenglu Ye, Yipeng Wang, Tumennast Erdenebold
:
YOLOv8-ESW: An Improved Oncomelania hupensis Detection Model. - Hong Chen
, Jianxun Liu
, Zhifeng Zhu
:
A Dynamic Energy-Efficient Scheduling Method for Periodic Workflows Based on Collaboration of Edge-Cloud Computing Resources. - Arash Heidari
, Mohammad Ali Jabraeil Jamali
, Nima Jafari Navimipour:
An Innovative Performance Assessment Method for Increasing the Efficiency of AODV Routing Protocol in VANETs Through Colored Timed Petri Nets.
Volume 37, Numbers 4-5, February 2025
Special Issue Paper
- Maxime Dresler, Sanaï Mansour, Safaâ Talhaoui, Yukiko Yamauchi
, Sébastien Tixeuil:
On Dynamics of Basic Network Creation Games With Non-Uniform Communication Interest.
Research Article
- Tao Ye, Zhihua Cui
:
Dynamic Multi-Objective Workflow Scheduling Model in Cloud Environment Based on Adaptive Mutation Strategy. - Neda Matin
, Mina Zolfy Lighvan, Najibeh Farzi Veijouyeh
:
Convolutional Neural Networks for Imbalanced Advanced Security Network Metrics and Non-Payload-Based Obfuscations Dataset to Detect Intrusion. - Remya Kommadath
, Debasis Maharana
, Prakash Kotecha:
Multiobjective Phase-Wise Teaching Learning-Based Optimization With No-Wait Time Heuristic for Job Shop Scheduling Problem.
Special Issue Paper
- Luis C. R. Alvarenga, Yuri Frota, Daniel de Oliveira
, Rafaelli Coutinho:
Optimizing Resource Estimation for Scientific Workflows in HPC Environments: A Layered-Bucket Heuristic Approach.
Research Article
- Zhixiang Zhao
, Yanxia Wu, Guoyin Zhang, Yiqing Yang, Ruize Hong:
Recursive Hybrid Compression for Sparse Matrix-Vector Multiplication on GPU. - Wenping Chen, Huibin Wang
, Zhe Chen, Lili Zhang:
Research on Multi-Scale Parallel Joint Optimization CNN for Arrhythmia Diagnosis. - Zixia Chen
, Tingquan Gu, Zelin Chen, Bingda Zhang:
Task Allocation Algorithm and Simulation Analysis for Multiple AMRs in Digital-Intelligent Warehouses. - Suhail Muhammad Kamal, Yidong Chen, Shaozi Li:
Advancing Continuous Sign Language Recognition Through Denoising Diffusion Transformer-Based Spatial-Temporal Enhancement. - Yanyan Wu, Yajun Xie, Yintao Hong:
The DeepLabV3+ Algorithm Combined With the ResNeXt Network for Medical Image Segmentation. - Hussein Younis, Mohammad M. N. Hamarsheh
:
ONOS Flood Defender: A Real-Time Flood Attacks Detection and Mitigation System in SDN Networks.
Special Issue Paper
- Guoquan Yuan, Xinjian Zhao, Shuaiqi Zhang
, Shi Chen, Shanming Wei:
A Robust Watermarking for Camera-Captured Images Using Few-Shot Learning and Simulated Noise Layer. - Ensar Atasoy
, Burhan Çuhadaroglu
:
Numerical Analysis of the Effetcs of Blended Split Winglets on Aerodynamic Performance of Aircraft.
Research Article
- Zhiwen Wang, Jiexia Huang, Junlin Huang, Yuhang Wang, Canlong Zhang
:
PM2.5 Concentration Prediction Using CNN-LSTM Model Based on Multi-Feature Fusion. - Ruoxi Wang, Yujia Zhu, Daoxun Xia
:
Cascade Ownership Verification Framework Based on Invisible Watermark for Model Copyright Protection. - Shweta Kushwaha
, Ravi Shankar Singh, Kanika Prajapati:
Multi-Objective Workflow Scheduling in Cloud Using Archimedes Optimization Algorithm. - Yashuang Mu
, Tian Liu, Wenqiang Zhang, Hongyue Guo, Lidong Wang
, Xiaodong Liu
:
A Distributed Information Granulation Method for Time Series Clustering. - Wenjian Feng, Zhiwen Wang, Chunmiao Wei, Xinhui Jiang, Yuhang Wang, Jiexia Huang:
Low-Light Image Enhancement Algorithm Based on Improved MSRCP With Chromaticity Preservation. - Mohamed Amine Laamari
, Nadjet Kamel:
A New Multi-Objective Binary Bat Algorithm for Feature Selection in Intrusion Detection Systems. - Morteza Jouyban, Soodeh Hosseini
:
Dynamic Model of Malware Propagation Based on Community Structure in Heterogeneous Networks. - Zilin Xia, Zedong Huang, Jinan Gu, Wenbo Wang:
Surface Defect Detector Based on Deformable Convolution and Lightweight Multi-Scale Attention. - Rangu Manjula
, Naveen Chauhan:
ProACT: Probabilistic Analysis and Countermeasures Tool for Blockchain Supply Chains With Smart Contracts Composition.
Special Issue Paper
- Seyma Cihan
, Adnan Ozsoy
, Oya Deniz Beyan:
Managing Clinical Research on Blockchain Using FAIR Principles. - Lucas Roges, Tiago Ferreto
:
Multi-Objective Dynamic Registry Provisioning in Edge Computing Infrastructures. - Xingyuan Kang
, Keichi Takahashi, Chawanat Nakasan, Kohei Ichikawa
, Hajimu Iida:
Load-Aware Multi-Objective Optimization of Controller and Datastore Placement in Distributed Sdns.
Research Article
- Man Zhang, Zheng Kou
:
Difference and Influencing Factors of the City Logistics Development Level in China. - N. Saravana Kumar
, S. Selvakumara Samy:
Cold Start Prediction and Provisioning Optimization in Serverless Computing Using Deep Learning.
Retraction
- RETRACTION: Brain Tumor Segmentation and Overall Survival Period Prediction in Glioblastoma Multiforme Using Radiomic Features.
- RETRACTION: An Integrated Framework for COVID-19 Classification Based on Classical and Quantum Transfer Learning from a Chest Radiograph.
- RETRACTION: An Efficient Medical Image Super Resolution Based on Piecewise Linear Regression Strategy Using Domain Transform Filtering.
- RETRACTION: A Multi-modality Paradigm for CT and MRI Fusion with Applications of Quantum Image Processing.
Research Article
- Chuqi Yan
, Jianqiang Huang
:
An Efficient Parallel Ordered Depth-First Search Strategy for Directed Acyclic Graphs. - Tasnim Assali
, Zayneb Trabelsi Ayoub
, Sofiane Ouni
:
Synergistic Distributed CNN Model for Protein Classification With a Collaborative BSP Synchronization Based on LSTM Prediction. - Yuchen Hou
, Buqing Cao
, Jianxun Liu
, Changyun Li, Min Shi:
TPST: A Traffic Flow Prediction Model Based on Spatial-Temporal Identity. - Xing Lu, Fengshan Lai, Zhixiang Cao, Daoxun Xia
:
ARTransformer: An Architecture of Resolution Representation Learning for Cross-Resolution Person Re-Identification. - Yuting Zhang, Yangfeng Wu, Huang Xu, Yajun Xie, Yan Zhang:
Improved Co-DETR With Dropkey and Its Application to Hot Work Detection. - Shu-Rong Yan, Mohadeseh Nadershahi, Wei Guo, Ebrahim Ghaderpour
, Ardashir Mohammadzadeh:
A Multi-Objective Decision-Making Neural Network: Effective Structure and Learning Method. - Nengfu Cai
, Yi Jiang, Haitao Zhang, Zhiwen Yang, Laicheng Zhong, Qi Chen:
HCRP-OSD: Fine-Grained Open-Set Intrusion Detection Based on Hybrid Convolution and Adversarial Reciprocal Points Learning. - Huipeng Chen
, Xinglei Yu
, Shaopeng Zhu
, Zhijun Wu, Chou Jay Tsai Chien, Junjie Zhu, Rougang Zhou:
Adaptive Slip Control of Distributed Electric Drive Vehicles Based on Improved PSO-BPNN-PID. - S. Kanthimathi
, R. Sivakami, B. Indira:
Modified Cryptosystem-Based Authentication Protocol for Internet of Things in Fog Networks.
Special Issue Paper
- Ismail H. Toroslu
, Gadir Suleymanli:
Efficient Parallel Algorithm for Approximating Betweenness Centrality Values of Top k Nodes in Large Graphs.
Research Article
- Vinu Josephraj
, S. Wilfred Franklin
:
A Comprehensive Reinforcement Learning Framework for Priority-Aware Data Center Scheduling Optimization and QOS-Defined Buffer Management. - Soumyaranjan Panda
, Vikas Pareek, Sanjay Saxena:
Fv-SFL: A Contrastive Learning-Based Feature Sharing Method for Reducing the Effect of Label Skewed Data Heterogeneity in Federated Medical Imaging.
Special Issue Paper
- Tung Nguyen
, Hideyuki Kawashima:
Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real-Time Database Systems.
Research Article
- J. C. Miraclin Joyce Pamila
, Ramar Senthamil Selvi
:
Improved SVM-Recursive Feature Elimination (ISVM-RFE) Based Feature Selection for Bigdata Classification Under Map Reduce Framework.
Volume 37, Numbers 6-8, April 2025
Research Article
- Wen Zeng, Wenjing Yan, Emily Simpson, Carlos Molina-Jiménez
:
Quantitative Risk Assessment for Cloud-Based Software Migration Processes.
Special Issue Paper
- Xue Li
, Mingxing Liu, Lanshun Nie, Wenxiao Cheng, Xiaohe Wu, Dechen Zhan:
S2C-HAR: A Semi-Supervised Human Activity Recognition Framework Based on Contrastive Learning. - Zhaokun Chen, Qin Xie, Wei Jiang
:
Hybrid Deep Learning Models for Tennis Action Recognition: Enhancing Professional Training Through CNN-BiLSTM Integration. - Baoqing Tai, Xianxian Yang, Ju Chong, Lei Chen
:
Personalized Self-Directed Learning Recommendation System Based on Social Knowledge in Distributed Web.
Research Article
- Zhaolu Zuo
, Jie Wang, Jing Wang:
Stereo Calibration of Non-Overlapping FOV Cameras With Phase-Shifting Wedge Grating. - Tianbao Liu
, Yang Li, Xiwen Qin:
Enhanced Gradient-Based Optimizer Algorithm With Multi-Strategy for Feature Selection. - Akanksha Singh, Harish Chandra
, Saurabh Rana:
A Robust Lattice-Based Post-Quantum Three-Party Key Exchange Scheme for Mobile Devices. - Girish Talmale
, Urmila Shrawankar
:
Analysis and Performance Measure of Dynamic Cluster Based Hierarchical Real Time Scheduling for Distributed Systems.
Special Issue Paper
- Hemraj Raikwar
, Harshil Sadharakiya, Sushanta Karmakar:
Dynamic Algorithms for Approximate Steiner Trees.
Research Article
- Yuan Zeng
, Hengzhou Ye, Gaoxing Li:
Adaptive Dynamic Service Placement Approach for Edge-Enabled Vehicular Networks Based on SAC and RF. - Qingqing Wu, Tinghong Gao
:
Machine Learning-Based Modeling of Clinical Diagnosis and Treatment of Patients With Hemorrhagic Stroke. - Sinchan Sengupta
, Sathya Peri:
On Reducing Stretch in Spanning Trees. - Lei Tan
, Xinmin Song:
Quadratic Estimation for Discrete Time System With State Equality Constraints and Composite Disturbances.
Special Issue Paper
- Ryuji Ukai
, Chihiro Yoshimura, Hiroyuki Mizuno:
Quantum Computer Architecture for Quantum Error Correction With Distributing Process to Multiple Temperature Layers. - Bruno Silva, Luiz Guerreiro Lopes
:
GPU Acceleration of the GWO Optimization Algorithm: Application to the Solution of Large Nonlinear Equation Systems.
Research Article
- Manvitha Gali
, Aditya Mahamkali:
Deep Learning Based Attack Detection and QoS Aware Secure Routing Protocol for SDN-IoT Network.
Special Issue Paper
- Kemal Ebcioglu, Batuhan Bulut, Atakan Dogan
, Gürhan Küçük, Ismail San
:
1,024-FPGA DES Supercomputer on the AWS Cloud. - Qiang Ren, Chengmingchan Yan, Fumin Zou, Yue Xing, Haolin Wang
, Ying Zhang
:
Real-Time Monitoring of On-Board Unit Status in Highway Electronic Toll Collection Systems Using Graphsage-Based Heterogeneous Graph Learning. - Baoqing Tai, Xianxian Yang, Ju Chong, Lei Chen
:
An Efficient Hybrid Recommender System for e-Learning Based on Cloud Content in Educational Web Services. - Wangyong Guo
, Siyang Shao, Kexin Zhang, Rongqiang Feng, Xueqiong Wu, Zhihao Zhang:
Privacy-Preserving Real-Time Smart Grid Topology Analysis: A Graph Neural Networks Approach.
Volume 37, Numbers 9-11, May 2025
Research Article
- Wenbin Yao, Longcan Hu
, Yingying Hou:
A Distributed Parallel Network Intrusion Detection System Based on Ray Framework With GPU Acceleration. - G. Arul Dalton
, Augusteen Bamila Virgin Louis
, A. Ramachandran, J. Savija
:
Modified Deep Learning Model in Proactive Decision-Making for Handover Management in 5G. - Sanfeng Zhang
, Hongzhen Xu, Xiaojun Yu:
CGKDFL: A Federated Learning Approach Based on Client Clustering and Generator-Based Knowledge Distillation for Heterogeneous Data. - Tarek Ramadan
, Nathan Pinnow, Chase Phelps, Jayaraman J. Thiagarajan, Tanzima Z. Islam
:
Structure-Aware Representation Learning for Effective Performance Prediction. - Rhauani Weber Aita Fazul
, Odorico Machado Mendizabal
, Patrícia Pitthan Barcelos:
DARB: A Dynamic Architecture for Data Replica Balancing. - Le Xu
, Yong Xu:
A Multi-Scenario Multi-Period Facility Location-Allocation Model and Algorithm for Pre-Disaster Planning. - Nupur Jangu
, Zahid Raza
:
A Modified Jellyfish Search Algorithm for Task Scheduling in Fog-Cloud Systems.
Special Issue Paper
- Caio Von Rondow Morais, Jeronimo Penha, José Augusto Miranda Nacif
, Ricardo S. Ferreira
:
Unblocking Placement and Routing in Rearrangeable Multi-Stage Networks.
Research Article
- Anita Thakur
, Virender Ranga
, Ritu Agarwal:
Revocable and Privacy-Preserving CP-ABE Scheme for Secure mHealth Data Access in Blockchain. - Nadia Dahmani, Hatem Aziza
, Hajer Ben-Romdhane
, Saoussen Krichen:
Multi-Criteria Optimization of Scientific Workflow Schedules for Improved Energy Efficiency in Cloud Infrastructures. - K. Aruna:
Secure Attestation and Dynamic Load Balancing (SALB) for Optimized Container Management: Ensuring Integrity and Enhancing Resource Efficiency.
Special Issue Paper
- Meirong Zheng, Ruchun Jia
, Jing Zhu, Shaorong Zhang, Wenlong Yao, Yuanbin Li:
Intelligent Network Security Optimization Algorithm Based on Cnns. - Shugui Lin, Wei Zhang, Ruchun Jia
, Haitao Deng, Linyuan Li, Jianjun Zhou, Ze Li:
Optimization of Anti-Tampering Method for Financial Data in Edge Intelligent Systems Based on Support Vector Machine.
Research Article
- Yujia Zhu, Jia Luo, Ruoxi Wang, Xiaojie Du, Daoxun Xia
:
Multiuser Hierarchical Authorization Using Sparsity Polarization Pruning for Model Active Protection. - Zewei Zhang
, Taoshen Li, Linfeng Yang:
Adaptive Hierarchical Offloading for Mobile Edge Computing in High-Mobility SWIPT-Enabled Networks. - Yaru Zhao
, Jianbiao Zhang, Yihao Cao
, Xianqun Han:
MOFDRNet: A Model for Data Leakage Attacks in Federated Learning. - Seyed Ebrahim Dashti
, Wassan Sajit Nasser Al-Jabri, Ali Farzanehmehr
:
Detecting Network Security Bypass Threats Using Machine Learning Methods: Detecting Intruders on the Network. - Yu Mao
, Chunyu Shi, Zhiyi Cai, Hui Chen, Lei Guo
:
Hierarchical Feature Selection Based on Instance Correlation and Label Semantic Structure. - Tiantian Zhang
, Ying Wang, Bo Gong, Jianbo Xu, Junjie Wu, Changxu Wan:
Privacy Protection During the Issuance and Revocation of Verifiable Credentials in Self-Sovereign Identity. - Anuradha Banerjee
, Sachin Kumar Gupta
, Vinod Kumar
:
A Genetic Algorithm-Based Approach for Collision Avoidance in a Multi-UAV Disaster Mitigation Deployment. - Yujia Xie
, Dongmei Li, Xiaomei Zhang, Wenjing Lv:
A Traceable and Anonymous Mutual Authentication Scheme for Smart Healthcare on Elliptic Curves. - Nouf A. AlSowaygh
, Mohammed J. F. Alenazi
, Maazen Alsabaan:
SCGG: Smart City Network Topology Graph Generator. - Bin Deng, Hao Guo, Weidong Li
:
An Alternative Mechanism for Multiresource Fair Allocation in Heterogeneous Cloud Computing Systems. - Fulong Li
, Fanlong Zhang, Yuhang Wu, Zhuowei Wang
, Quan Chen
, Yuan Chai, Yongchao Tao:
Toward Latency-Efficient Multicast Coflow Scheduling for Reconfigurable Data Center Networks. - Han Wang
, Balaji Muthurathinam Panneer Chelvan, Muhammed Golec
, Sukhpal Singh Gill
, Steve Uhlig
:
HealthEdgeAI: GAI and XAI Based Healthcare System for Sustainable Edge AI and Cloud Computing Environments. - Jiawei Chen, Jiayi Zhong, Guosheng Kang
, Jianxun Liu
, Yiping Wen
:
Variantrank: Business Process Event Log Sampling Based on Importance of Trace Variants.
Special Issue Paper
- Yonghao Yu
, Dawei Zhao, Yongwei Tang, WengTak Kuok, Wei Ding:
High-Precision Indoor Visible Light Positioning Method for Line-Of-Sight Scenes Based on a Spatiotemporal Sequence Attention Mechanism.
Research Article
- Anupam Yadav, Ashish Sharma
:
A New Approach to Cloud Resource Scheduling Using Genetic Reinforcement Kernel Optimization and Machine Learning Model. - Siyi Chen, Haiyang Kuang
, Jiaxin Zhou, Jin Liu:
Customer-Satisfaction and Risk-Aware Pricing Policy for Profit Maximization in Cloud Computing. - K. P. Uvarajan
, Kishore Balasubramanian
, C. Gowri Shankar:
Unveiling the Invisible: Powering Security Threat Detection in WSN With AI. - Junhu Peng
, Tao Peng
, Can Tang, Xingxing Xie:
A Multi-Strategy Fusion for Mobile Robot Path Planning via Dung Beetle Optimization. - Rahul Singh, Laxminarayan Das, Dharminder Chaudhary
:
Building Scalable and Quantum Attack Resistant Authenticated Message Delivery System for Internet of Vehicles With Blockchain Consensus Mechanism.
Special Issue Paper
- Xin Zhao, Haotian Zheng, Qiyun Zhang
:
Modern Advances in Artificial Intelligence Across the Athletic Domain.
Research Article
- Gezi Shi
, Jing Li, Tangbao Zou, Haiyan Yu, Feng Zhao:
Density Viewpoint Clustering Outlier Detection Algorithm With Feature Weight and Entropy. - Yuling Luo, Bingxiong Jiang, Sheng Qin
, Qiang Fu, Shunsheng Zhang:
EEG-Based Epilepsy Recognition via Federated Learning With Differential Privacy. - Mohamed Lehsaini
, Anas Nawfel Saidi, Tawfiq Nebbou, Pascal Lorenz:
Efficient Routing Protocol Using Fresh Vehicular Traffic Information for VANETs. - Qiang Peng, Renjun Zhan, Husheng Wu
, Aiai Wang, Yuanda Lai:
A Multi-Strategy Enhanced Wolf Pack Algorithm for Three-Dimensional Path Planning of Unmanned Aerial Vehicles. - Shuilin Chen
, Jianguo Zheng:
Discrete Gray Wolf Optimizer for Solving Distributed Permutation Flowshop Scheduling Problem. - K. Viswanathan Iyer
, Karthick Seshadri
, K. Srinivasulu
:
An Advancement in Huffman Coding With a Potential for Parallel Decoding. - Gubao Mao
, Xianwen Fang
, Ke Lu
:
Business Process Anomaly Behavior Detection Method Based on Multiperspective Association Rules. - Shuqi Niu, Zhao Zhang
, Hongyan Zhou
, Xue-Bo Chen
:
Short-Term Power Load Prediction Based on Cluster Analysis and Temporal Convolutional Networks of Attention Mechanism. - Minni Jain
, Aditya Gupta, Aaryan Arora, Aayush Patel:
Ranking Influential Nodes in Social Networks Based on the Game of Thieves Algorithm.
Volume 37, Numbers 12-14, 2025
- Jiatang Cheng, Kaike Tu, Yan Xiong:
Cuckoo Search Algorithm With Ensemble Strategy for Continuous Optimization Problems. - Mahesh P. Wankhade, Dharmendra G. Ganage, Megha M. Wankhade, Yugendra Chincholkar:
Effective Cluster Head and Routing Scheme Estimation Using Mixed Attention-Based Drift Enabled Federated Deep Reinforcement Learning in Wireless Sensor Networks. - Ruirui Gao, Shuai Shang, Wenqi Zhang, Xiaofen Wang, Ke Huang, Xiong Li:
Vupsi: Verifiable Unbalanced Private Set Intersection Based on Homomorphic Encryption. - Gongli Li, Weichen Liu, Lu Li:
Verifiable Cloud-Assisted Multi-Party Private Set Intersection Cardinality. - Tinggui Chen, Jiawen Ye, Yanping Zhou, Qing Yu, Shanshan Wang, Gongfa Li:
Prediction of Carbon Emission Rights Trading Prices Based on the CNN-LSTM Model in the Context of Carbon Peak: Taking Guangdong Province as an Example. - Paraskevi Kritopoulou, Georgios Loupas, Eleftheria Lagiokapa, Nefeli Georgakopoulou, Sotiris Diplaris, Stefanos Vrochidis:
Design of a Configurable Acoustic Sensor Network for Privacy-Compliant Urban Soundscape Recordings. - Biraja Prasad Nayak, Lopamudra Hota, Ashok Kumar Turuk, Arun Kumar:
Enhancing VANET Safety Communications With AHP-Based Resource Allocation. - Ajay Nain, Sophiya Sheikh, Mohammad Shahid:
An Efficient Load Distribution Approach for Optimizing Resources in SDN-Based Edge Computing Environment. - Huifang Liu, Huilin Ye, Yunfeng Ye:
Construction and Application of a Digital Platform for Charitable Cultural Resources Integrating VR Technology and BiGRU. - Deepak Kumar Mishra, Pawan Singh Mehra:
Exploring Blockchain-Based Patient-Centric Healthcare: A Comprehensive Review. - Henrique Correia Torres Santos, Luciano S. de Souza, Jonathan H. A. de Carvalho, Tiago A. E. Ferreira:
PESC - Parallel Experience for Sequential Code. - Xinyan Zhang, Jing Fang:
Prediction of Network Public Opinion Evolution Trends in Emergent Hot Events. - Johannes Pekkilä, Oskar Lappi, Fredrik Robertsen, Maarit J. Korpi-Lagg:
Stencil Computations on AMD and Nvidia Graphics Processors: Performance and Tuning Strategies. - Priyadarshni Gupta, Praveen Kumar, Shivani Tripathi, Rajiv Misra:
BRL-Net: A Blockchain-Based Task Offloading Framework Using Smart Contracts for Metaverse. - Insaf Achour, Hanen Idoudi, Samiha Ayed:
Access Control Modeling and Validation for Ethereum Smart Contracts. - Hongjiao Li, Ming Jin, Jiayi Xu, Zhenya Shi, Anyang Yin:
SS-LDP: A Framework for Sparse Streaming Data Collection Based on Local Differential Privacy. - Jaishree Mayank, Arijit Mondal:
A Unified Job Scheduler for Optimization of Different System Performance Metrics. - Juan José Moreno, Savíns Puertas-Martín, Juana López Redondo, Pilar M. Ortigosa, Ester M. Garzón:
Where High-Performance Computing Meets Radiotherapy for Enhanced Intensity-Modulated Radiation Therapy Planning. - Guosheng Kang, Zhen Wang, Hangyu Cheng, JianXun Liu, Yiping Wen, Jun Peng:
Modeling Multilevel Business Process Monitoring via BPMN Extension. - Archana Archana, Narander Kumar:
A S-Threshold Method to Perform Horizontal Auto-Scaling in a Cloud Computing Environment. - Afaf Benaouda Chaht, Mohammed Bencheikh, Chakib Mustapha Anouar Zouaoui, Abdennacer Bounoua, Nasreddine Taleb, Mohamed Naimi:
An Effective Load-Balancing Approach for Multicast IPTV Traffic in Multihoming Networks. - Zhaoqian Zhang, Di Wu, Qiang Zhu, Wei Qin:
Blockchain-Based Ciphertext-Policy Attribute-Based Encryption for Controlled Multi-User Collaboration. - Ruizhong Du, Ziyuan Wang, Yuan Wan:
A Multi-Level Role-Based Provable Data Possession Scheme for Medical Cloud Storage. - Yongwang Song, Haiyan Jiang:
Hockey Trajectory Prediction Combining Visual Object Alignment Algorithm and Template Matching Model. - Zexin Zhang:
Weak-Strong Synergy Learning With Random Grayscale Substitution for Cross-Modality Person Re-Identification. - Mustafa Özdemir:
Predicting the Best Green Growth Performance With Integrated Intuitionistic Fuzzy and Metaheuristic Algorithms. - Mustafa Etcil, Bilge Kagan Dedeturk, Burak Kolukisa, Burcu Bakir-Gungor, Vehbi Cagri Gungor:
Breast Cancer Detection Using a New Parallel Hybrid Logistic Regression Model Trained by Particle Swarm Optimization and Clonal Selection Algorithms. - Kun Zeng, Zhonghua Peng, Zuoyong Li, Yun Chen, Feng Chen, Nanbing Wu:
Multi-Modal Anomalous Driving Behavior Detection With Adaptive Masking. - Zhaoqian Zhang, Di Wu, Shang Gao:
Attribute-Based Access Control With Credible Outsourcing and Collusion-Resistant Revocation Based on Blockchain for Iomt.
Volume 37, Numbers 15-17, 2025
- Kajal Tiwari, Sanjay Kumar:
Accelerating Healthcare Data Access: A Blockchain and Decentralized Indexing Approach. - Jia Deng, Jianxun Liu, Yi Liu, Yiming Yin, Yong Xiao:
An Android API Recommendation Approach Based on API Dependency Paths Learning. - Vaibhav Pandey, Poonam Saini, Mansi Gupta, Aditya Bhardwaj:
Dynamic Job Scheduling for Energy Savings in YARN: A Comparative Study With Benchmark Workloads. - P. Lakshmiramana, A. Vadivel:
Secuyolo: Secure Object Detection Framework With Darknet-53 and CBAM in Edge Devices. - Mohd Anas Wajid, Shaharyar Alam Ansari, Mohammad Luqman, Mohammad Khubeb Siddiqui, Mohammad Saif Wajid:
GSR-C2N: Graph Feature Extracted Spar-Raven Optimized CNN Based Crypto Mining Framework. - Yi-Peng Shang-Guan, Jie-Sheng Wang, Yong-Cheng Sun, Yu-Wei Song, Yu-liang Qi:
Multi-Strategy Fusion Binary Zebra Optimization Algorithm for Solving Complex Industrial Process Data Feature Selection and Prediction Models. - Cristian Campos, Rafael Asenjo, Javier Hormigo, Angeles G. Navarro:
Leveraging SYCL for Heterogeneous cDTW Computation on CPU, GPU, and FPGA. - Bing Tang, Haiyan Li, Wei Xu, Buqing Cao, Qing Yang:
Energy-Latency Tradeoffs for Service Placement Based on Reinforcement Learning in Edge Computing. - Biao Gan, Xiaoxia Jin:
Integration of Knowledge Graph and CNN-GRU in College Students' Mental Health Education and Psychological Crisis Intervention. - Qingzhi Liu, Changbo Chen, Hanwen Dai:
Fusing the Polyhedral and Tensor Compilers to Accelerate Scientific Computing Kernels. - Xuchao Liu, Jiayang Li:
Defect Detection of Prefabricated Building Components With Integrated YOLOv5s-GhostNet. - Hema Priya Natarajan:
Privacy Preserving Federated Reinforcement Imitation Learning Framework With Robust Aggregation for Cloud-Based Domestic Robots. - Lucas Bragança da Silva, César Grandis, Jeronimo Penha, José Augusto Miranda Nacif, Ricardo S. Ferreira:
Reconfigurable Domain-Specific Architectures Based on Coarse-Grained Operators in High-Performance FPGAs. - Kang Wang, Xin Zeng, Sujie Xian, Zhongxin Li, Zhilin Wu:
HKSCSO: A Novel Enhanced Sand Cat Swarm Optimization Algorithm for UAV Three-Dimensional Path Planning. - Ioannis Vardas, Jesper Larsson Träff, Ruben Laso, Sascha Hunold:
Mpisee: Communicator-Centric Profiling of MPI Applications. - P. Sridhar, Sathiya R. R:
Cloud Workload Forecasting via Latency-Aware Time Series Clustering-Based Scheduling Technique. - Md Akram Khan, Bibudatta Sahoo, Sambit Kumar Mishra:
Container Placement Using Penalty-Based PSO in the Cloud Data Center. - Yongqin Zhu, Bojiang Xie:
Leveraging Traversal Tree for Node Pair Selection-Based Reliable IoT Network Construction. - Pinky, Karan Verma:
Enhanced Task Scheduling With Metaheuristics for Delay and Energy Optimization in Cloud-Fog Computing. - Somayeh Rahmani, Vahid Khajehvand, Mohsen Torabian:
Entropy-Aware VM Selection and Placement in Cloud Data Centers. - Fengyi Gao, Na Wang, Jianwei Liu, Zhiquan Liu, Junsong Fu, Lunzhi Deng:
A Verifiable and Efficient Multi-Keyword Fuzzy Rank Search Scheme Over Encrypted Data With Privacy-Preserving. - Huseyin Guney:
A Fast-Optimizing and Adaptable Intrusion Detection System Based on Progressively Optimized Support Vector Machines. - Dawei Sun, Jia Peng, Ting Zhu, Jonathan Kua, Shang Gao, Rajkumar Buyya:
Toward High-Availability Distributed Stream Computing Systems via Checkpoint Adaptation. - Qikun Zhang, Jinbo Feng, Ruifang Wang, Yongjiao Li, Junling Yuan, Yu-an Tan:
An Access Control Model Against Attribute Guessing Attacks for Data Sharing in Cloud Computing Environment. - Mahdieh Khorashadizade, Soodeh Hosseini, Morteza Jouyban:
An Improved Binary Slime Mold Algorithm for Intrusion Detection Systems. - Yan Zhang, Yali Peng, Shengnan Wu, Shigang Liu:
Dual-Weighted Multiview Clustering Based on Anchor. - Shuguang Zhang, Lingjie Liu, Xuntao Zhi, Yu Cheng, Xinyu Zheng, Yunlong Wang:
Shilling Attack Detection Method Integrating Item Temporal Information and Relational Networks. - Maryam Naghibi, Hamid Barati, Ali Barati:
HDAMM: Hierarchical Geographical Data Aggregation Method Using Mobile Sink in Wireless Sensor Networks. - Jiaqi Li:
RIES Low-Carbon Economic Dispatch With Improved WSO Algorithm Considering Integrated Demand Response. - Neeshu Rathi, Sanjeev Kumar:
Enhanced Quantum Ensemble Classification Algorithm With Shallow Circuit and Parallelism Mechanism. - Wisam Makki Alwash, Mustafa Kara, Muhammed Ali Aydin, Hasan Hüseyin Balik:
An Effective Federated Learning Approach for Secure and Private Scalable Intrusion Detection on the Internet of Vehicles. - Andavarapu Sravani, Golagani Lavanya Devi:
DSPCNN: Deep Spiking Parallel Convolutional Neural Network for Video Recommendation System. - A. Swaminathan, R. Saravanan, Baskar Kasi, S. Ramaraju:
A Novel Distributed Learning Approach for Detecting Covert Communications in Wireless Sensor Networks. - Linh Nguyen Thi My, Vu Nguyen, Tham Vo:
Adaptive Deep Fuzzy Neural Network With Multi-Headed Self-Attention for Improving Performance of Social Network Representation Learning and Link Prediction. - Keyu Wang, Huailiang Tan, Zaihong He, Jinyou Li, Keqin Li:
Innovative Bloom Filter-Based Multilevel Block Classification: A Practical Approach to Enhancing SSD Performance and Endurance.
Volume 37, Numbers 18-20, 2025
- Zhiqiang Zheng, Yiyang Li, Zhi Weng, Xiaoding Wu:
PMS-LoFTR: A Model for Cattle Identification Based on Image Matching. - Jianyong Zhu, Hao Chen, Hongtao Wang:
SDT-MCS: Topology-Aware Microservice Orchestration With Adaptive Learning in Cloud-Edge Environments. - Liu Kun, Wenbo Zhou, Wang Hui, Zihao Shen, Peiqian Liu:
Privacy-Secure Asynchronous Federated Multimodal Pedestrian Trajectory Prediction Models. - Ahmed A. Mawgoud, Mohamed Hamed N. Taha, Mohamed Loey, Mazhar Hussain Malik, Nour Eldeen Mahmoud Khalifa:
Enhancing Data Privacy and Trust in E-Learning: A Blockchain-Based Access Control Protocol for Cloud Educational Systems. - Jie Xu, Zikang Li, Jianping Chen:
Feature Extraction Algorithm Based on Maximizing Circular Margin Discriminant Analysis. - Changhong Zhu, Haitao Zhang, Xingtao Xu:
DualRT: A Qos-Aware Soft Real-Time Video Analytics Framework for Dual-Stage GPU-CPU Tasks on Edge. - Marcin Lawenda, Kyrylo Khloponin, Krzesimir Samborski, Lukasz Szustak:
Profiling and Optimization of Multicard GPU Machine Learning Jobs. - Eht E. Sham, Pratibha Yadav, Deo Prakash Vidyarthi:
Admission Control and Resource Provisioning in Fog-Integrated Cloud Using Modified Genetic Adaptive Neuro-Fuzzy Inference System. - Gadde Swetha, Kurilinga Sannalingappa Ananda Kumar, Hanumantharao Nadendla, Nageswararao Eluri, Gowrisankar Kalakoti, Venkata Srinivasu Veesam:
Quantum-Resilient Cloud Data Protection: A Novel Framework for Secure Encryption and Key Exchange. - Deyong Wu, Zhiming Luo, Jiezhou He, Shaozi Li:
Niching-Based Two-Stage Differential Evolution for Feature Selection. - Uma Meena, Promila Sharma:
Deep Learning Based Secure Routing in WSN Using Hyper Ledger Fabric Block Chain Model. - Ricky Mohanty, Subhendu Kumar Pani, Abdulaziz S. Almazyad, Ali Wagdy Mohamed, Mehdi Hosseinzadeh, Mohammad Shokouhifar:
LWC2S2C: An Efficient Light-Weight Consensus Model for Context-Sensitive Sidechains in Blockchain Networks. - Fatma Akalin, Dilara Top:
Proposed Image Processing Filters to Improve Digital Image Perception for Color Blindness Types. - Hadi Ghahremani, Masumeh Damrudi, Ali Ghaffari, Kamal Jadidy Aval:
Quality of Service Enhancement in Mobile Crowdsensing Through Metaheuristic Techniques: A Survey. - Xiaoming Han, Kangjian Yang, Yu Guo, Jin Xu:
Remaining Useful Life Prediction for Exciter Rolling Bearing Based on Self-Attentive CNN-GRU. - Hariprasath Manoharan, Gayathri Devi P:
Security Frame Towards 6G Networks for Isolating False Data Using Artificial Intelligence Algorithm. - Jintao Liu, Wenjin Xue, Wei Liu, Guowei Xu, Jian Liu:
Enhanced YOLOv7 for EMU Damage Detection: Overcoming False Detection and Data Scarcity by Network Optimization and AIGC. - Kofi Sarpong Adu-Manu, Charles Adjetey:
PoAD: A Scalable and Energy-Efficient Consensus Algorithm for Smart Contract Execution in Decentralized Systems. - Ahmed Saidi, A. Ouadoud Khouri:
Enhancing Data Privacy in Intrusion Detection: A Federated Learning Framework With Differential Privacy. - Mohsen Fallah, Meisam Yadollahzadeh Tabari, Mohammad Adabitabar Firozja, Homayun Motameni:
Intermodal Terminal Planning Using Timed Colored Petri Nets and Fuzzy Data Envelopment Analysis. - Jie Shen, Xinran Du, Houqun Yang:
Improved Semantic Segmentation of High-Resolution Remote Sensing Data: Utilizing a Novel Enhanced Boundary-Aware Network for Efficient Processing. - Qiangqiang Niu, Pengfei Wang:
Open-Pit Mine Autonomous Truck Dispatching: Many-Objective Joint Optimization Strategy Considering Uncertainties. - Jiahui Liu, Zhe Liu, Baiqiang Hu, Zeling Hou:
A Framework for Parallel Segmentation of Lung Nodule Images Based on Reinforcement Learning Enhancement With Multiple Agents. - Dinesh Dash, Rupayan Das, Chandra Bhushan Kumar Yadav:
Enhancing Wireless Sensor Durability via On-Demand Mobile Charging and Energy Estimation. - Jianwei Zhang, Qinglong Wang, Zengyu Cai, Kejun Wang, Liang Zhu:
Unknown Attack Detection Method Based on Deep Metric Learning. - Vidyullata Devmane, B. K. Lande:
Secure Data Authentication for Remotely Stored Data Using Bilinear Pairing on Elliptic Curves With Optimized Data Block Size. - Fujun Wang, Ziniu Shen, Yunfang Chen:
Automated Vulnerability Pre-Detection for Smart Contracts: A Blockchain-Based Data Sharing Platform With Incentivized Consensus. - Kavitapu Naga Siva Shankara Vara Prasad, Dasari Haritha:
Parallel Symmetric Appearance-Motion Framework With Diffusion and Refinement Blocks for Video Anomaly Detection System.
Volume 37, Numbers 21-22, 2025
- Sara Hameed, Syed Hashim Raza Bukhari, Syeda Umm E. Abiha Rizvi, Meerab Tahir, Farhan Aadil:
A Comparative Analysis on the Services Offered by Amazon Web Services and Microsoft Azure. - Zehra Karapinar Senturk, Recep Guler, Yunus Özcan, Mehmet Gamsizkan:
Automated Classification of Skin Diseases Using Microscopic Images: A Machine Learning Approach. - Fatima Ziya, Sanjay Kumar:
MetaLP-DGI: Meta-Learning-Based Link Prediction With Centrality-Aware Deep Graph Infomax Embeddings. - Dan Xia, Enyu Xu, Yuan Tian, Qiusha Min:
Optimal Control of Information Dissemination Based on Model-Free Reinforcement Learning. - Qi Yue, He Huang, Yuan Tao:
Multi-Attribute Many-to-One Elderly Care Service Matching Group Decision-Making Considering Double Intermediaries. - Majd Alkorabi, Alireza Souri, Nihat Inanç:
Deep Learning Algorithms for Autonomous Vehicle Communications: Technical Insights and Open Challenges. - Biao Hu, Xincheng Yang:
Mixed-Criticality Scheduling Toward Real-Time Applications in a Vehicular Edge Computing System. - Sayed Zabihullah Musawi, Mohammad Farshi, Sepehr Ebrahimi Mood, Alireza Souri:
Enhancing the Harris Hawks Optimization Algorithm With Ambush-Based Operators for Feature Selection in UAV-Based Intrusion Detection Systems. - Pawel K. Radtke, Tobias Weinzierl:
Annotation-Guided AoS-to-SoA Conversions and GPU Offloading With Data Views in C++. - Jihua Ye, Wentao Geng, Tiantian Wang, Youcai Zou, Chao Wang, Zhan Xu, Aiwen Jiang:
Dual-Branch Cross-Scale Texture Feature Fusion for Low-Resolution Face Recognition. - Anand Polamarasetti:
Explainable Graph Neural Networks for Optimized Allocation in Spatio-Temporal Bike Sharing Demand Prediction. - Xu Yong, Sang Bicong, Zhang Yi:
Research on Optimization Algorithm and Application of Improved Northern Goshawk Based on Fusion Strategy. - Mohammad Ali Nezafat Tabalvandani, Mirsaeid Hosseini Shirvani:
A Survey Study on Meta-Heuristic-Based Web Service Composition Schemes in Cloud Computing Environments: Classification, Advantages, and Limitations. - Qizhao Zhou, Zhongyu Shi:
Predictive VNF Deployment With Virtual Network Mapping Using SDN/NFV-Enabled UAV Swarms. - Hugo Alcaraz-Herrera, Michail-Antisthenis I. Tsompanas, Igor Balaz, Andrew Adamatzky:
Optimizing the Substrate for Hypercube-Based Neuroevolution of Augmented Topologies to Design Soft Actuators. - Zhan Wen, Cheng Zhang, Wenzao Li, Yanhe Na, Dehao Ren:
C-CNPS: A Blockchain Sharding Network Model and Communication Strategy. - Vikas Kumar Jain, Meenakshi Tripathi:
SmartSecure: An Integrated Semantic Vulnerability Mining Framework for Ethereum Smart Contract. - Kaushik Dehingia, Nimisha Dutta:
Hybrid Quantum Key Distribution Framework: Integrating BB84, B92, E91, and GHZ Protocols for Enhanced Cryptographic Security. - Shahnawaz Ahmad, Mohd. Nazim, Mohd Arif, Javed Ahmad, Shabana Mehfuz, Mohd. Aquib Ansari:
Protecting Data in the Cloud: A Systematic Literature Review of Key Management. - Ibtihal Alablani, Mohammed J. F. Alenazi:
Robust Attack Detection Framework Using Pretrained CNN Model for the Edge Industrial IoT Networks. - Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem:
Toward a Reinforcement Learning Approach for Balancing Risk and Cost in Cloud-Based IoT-Driven Business Processes. - Faming Lu, Xiaoyu Wang, Qingtian Zeng, Guiyuan Yuan, Yunxia Bao:
Segment-Based May-Happen-in-Parallel Analysis for C Programs.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.