default search action
The Journal of Supercomputing, Volume 80
Volume 80, Number 1, January 2024
- Zhiyong Zhou, Yuanning Liu, Xiaodong Zhu, Shuai Liu, Shaoqiang Zhang, Yuanfeng Li, Zhen Liu:
Lifelong iris presentation attack detection without forgetting. 1-19 - Dahai Xia, Xinyun Wu, Meng Yan, Caiquan Xiong:
An adaptive stochastic ranking-based tournament selection method for differential evolution. 20-49 - Khalid Javeed, Ali El-Moursy, David Gregg:
E2CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p). 50-74 - Chandan Kumar, Sudhanshu Kumar Jha, Dilip Kumar Yadav, Shiv Prakash, Mukesh Prasad:
A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic. 75-97 - Avita Katal, Tanupriya Choudhury, Susheela Dahiya:
Energy optimized container placement for cloud data centers: a meta-heuristic approach. 98-140 - Sally Mohamed Sameh, Hossam El-Din Moustafa, Ehab H. Abdelhay, Mohamed Maher Ata:
An effective chaotic maps image encryption based on metaheuristic optimizers. 141-201 - Huafeng Wu, Feng Wang, Xiaojun Mei, Linian Liang, Bing Han, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li:
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors. 202-225 - Omar Younis Abdulhammed:
A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach. 226-248 - Na Dong, Qingyue Feng, Jianfang Chang, Xiaoming Mai:
White blood cell classification based on a novel ensemble convolutional neural network framework. 249-270 - R. Rajalakshmi, P. Sivakumar, L. Krishna Kumari, M. Chengathir Selvi:
A novel deep learning model for diabetes melliuts prediction in IoT-based healthcare environment with effective feature selection mechanism. 271-291 - Rebecca H. K. Emanuel, Paul David Docherty, Helen Lunt, Knut Möller:
The effect of activation functions on accuracy, convergence speed, and misclassification confidence in CNN text classification: a comprehensive exploration. 292-312 - Yonghao Lai, Xiaohui Hua:
Component edge connectivity and extra edge connectivity of alternating group networks. 313-330 - Jin Yang, Wangdong Yang, Ruixuan Qi, Qinyun Tsai, Shengle Lin, Fengkun Dong, Kenli Li, Keqin Li:
Parallel algorithm design and optimization of geodynamic numerical simulation application on the Tianhe new-generation high-performance computer. 331-362 - Chih-Yung Chang, Syu-Jhih Jhang, Shih-Jung Wu, Diptendu Sinha Roy:
JCF: joint coarse- and fine-grained similarity comparison for plagiarism detection based on NLP. 363-394 - Ruisheng Ran, Ting Wang, Zheng Li, Bin Fang:
Polynomial linear discriminant analysis. 413-434 - Ju-Won Park, Xin Huang, Chul-Ho Lee:
Analyzing and predicting job failures from HPC system log. 435-462 - Emmanuel Ahishakiye, Waweru Mwangi, Petronilla Muriithi, Fredrick Kanobe, Godliver Owomugisha, Danison Taremwa, Lenard Nkalubo:
Deep Gaussian convolutional neural network model in classification of cassava diseases using spectral data. 463-485 - Beste Ustubioglu, Gul Tahaoglu, Güzin Ulutas, Arda Ustubioglu, Muhammed Kiliç:
Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach. 486-518 - Tian Tian, Anshi Wang, Xiuting Yang, Dunwei Gong, Tie Hou, Xiangjuan Yao:
Parallel program testing based on critical communication and branch transformation. 519-548 - Tobias Piontek, Kawsar Haghshenas, Marco Aiello:
Carbon emission-aware job scheduling for Kubernetes deployments. 549-569 - Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali:
SOS-FCI: a secure offloading scheme in fog-cloud-based IoT. 570-600 - Hamed Jalilian:
Total variation method based on modified Barzilai-Borwein algorithm to noise reduction in MRI images. 601-619 - Qun Li, Bei Tang, Jianxin Li, Siguang Chen:
User satisfaction-based energy-saving computation offloading in fog computing networks. 620-641 - Rong Gao, Wei He, Lingyu Yan, Donghua Liu, Yonghong Yu, Zhiwei Ye:
Hybrid graph transformer networks for multivariate time series anomaly detection. 642-669 - Fatemeh Vardi, Alireza Mahjoub:
A hot-module-aware mapping approach in network-on-chip. 670-702 - Sujit Sangram Sahoo, Vijay Kumar Chaurasiya:
Proof of location based delivery system using multi-party virtual state channel: a blockchain model. 703-733 - Mao-Lun Chiang, Hui-Ching Hsieh, Tzu-Ling Lin, Tsui-Ping Chang, Hong-Wei Chen:
Dynamic weight-based connectivity recovery in wireless sensor and actor networks. 734-760 - Elham Dalirinia, Mehrdad Jalali, Mahdi Yaghoobi, Hamid Tabatabaee:
Lotus effect optimization algorithm (LEA): a lotus nature-inspired algorithm for engineering design optimization. 761-799 - Payam Bahrani, Behrouz Minaei-Bidgoli, Hamid Parvin, Mitra Mirzarezaee, Ahmad Keshavarz:
A new improved KNN-based recommender system. 800-834 - Dikshit Chauhan, Anupam Yadav:
Stability and agent dynamics of artificial electric field algorithm. 835-864 - Namrata Singh, Ayan Kumar Das:
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor. 865-914 - Zahra Mahmoodabadi, Mostafa Nouri-Baygi:
An approximation algorithm for virtual machine placement in cloud data centers. 915-941 - Rakesh Kumar, Sunil K. Singh, D. K. Lobiyal:
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks. 942-969 - Sheng-Tzong Cheng, Gwo-Jiun Horng, Chih-Wei Hsu, Z.-Yu Su:
Per-user network access control kernel module with secure multifactor authentication. 970-1008 - Maedeh Khalifavi, Zahra Shirmohammadi, Sahar Kianian:
FASR-LED: reducing energy consumption in wireless body area networks by an efficient smart method. 1009-1036 - Tariq Shah, Tanveer ul Haq:
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. 1037-1058 - Mehmet Bozdal, Kadir Ileri, Ali Ozkahraman:
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset. 1059-1079 - Indushree M, Manish Raj:
A novel Blockchain-based authentication scheme for telecare medical information system. 1080-1108 - Sadoon Azizi, Pedram Farzin, Mohammad Shojafar, Omer F. Rana:
A scalable and flexible platform for service placement in multi-fog and multi-cloud environments. 1109-1136 - Tundong Liu, Fengqiang Gao, Xin Chen, Guifang Shao, Chenhan Wang:
Research on load-balancing scheduling optimization for wafer surface defect detection. 1137-1159 - Jihene Latrech, Zahra Kodia, Nadia Ben Azzouna:
CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning. 1160-1182 - Zuoyan Zhang, Jinchen Xu, Jiangwei Hao, Yang Qu, Haotian He, Bei Zhou:
Hierarchical search algorithm for error detection in floating-point arithmetic expressions. 1183-1205 - Abdelhakim Baouya, Salim Chehida, Saddek Bensalem, Levent Gürgen, Richard Nicholson, Miquel Cantero, Mario Diaz-Nava, Enrico Ferrera:
Deploying warehouse robots with confidence: the BRAIN-IoT framework's functional assurance. 1206-1237 - Sumit Sharma, Sarika Jain:
CovidO: an ontology for COVID-19 metadata. 1238-1267 - Sibo Qi, Juan Chen, Peng Chen, Peian Wen, Xianhua Niu, Lei Xu:
An efficient GAN-based predictive framework for multivariate time series anomaly prediction in cloud data centers. 1268-1293 - Xiaomei Li, Ye Lu, Xiaoyu Zhao, Xiong Deng, Zhijiang Xie:
Path planning for intelligent vehicles based on improved D* Lite. 1294-1330 - C. Pabitha, B. Vanathi:
Dense Mesh RCNN: assessment of human skin burn and burn depth severity. 1331-1362 - Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien-Hsiung Weng, Kuan-Ching Li:
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data. 1363-1364 - Minghua Tang, Enrico Russo, Maurizio Palesi:
Correction to: The position-based compression techniques for DNN model. 1365 - Yifei Wang, Mert Pilanci:
Correction to: Sketching the Krylov subspace: faster computation of the entire ridge regularization path. 1366
Volume 80, Number 2, January 2024
- Preetpal Kaur Buttar, Manoj Kumar Sachan:
Semantic segmentation of satellite images for crop type identification in smallholder farms. 1367-1395 - Zhonghua Chen, S. B. Goyal, Anand Singh Rajawat:
Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. 1396-1425 - Xiaoxin Gao, Fazhi He, Songwei Zhang, Jinkun Luo, Bo Fan:
A fast nondominated sorting-based MOEA with convergence and diversity adjusted adaptively. 1426-1463 - Bahram Rashidi:
Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection. 1464-1490 - Alavieh Sadat Alavizadeh, Seyed Hossein Erfani, Meghdad Mirabi, Amir Sahafi:
An efficient distributed and secure algorithm for transaction confirmation in IOTA using cloud computing. 1491-1521 - Santosh Kumar Uppada, B. S. Ashwin, B. Sivaselvan:
A novel evolutionary approach-based multimodal model to detect fake news in OSNs using text and metadata. 1522-1553 - Melika Amiri, Massoud Dousti, Majid Mohammadi:
Design and implementation of carry-save adder using quantum-dot cellular automata. 1554-1567 - Md Yeasin, Ranjit Kumar Paul:
OptiSembleForecasting: optimization-based ensemble forecasting using MCS algorithm and PCA-based error index. 1568-1597 - Carmen Carrión:
Research streams and open challenges in the metaverse. 1598-1639 - Zhaoxia Tian, Mingzu Zhang, Xing Feng:
Concentration phenomenon about h-extra edge-connectivity of the n-th cartesian product of complete graph K4 with large-scale faulty links. 1640-1667 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures. 1668-1693 - Yi Yang, Jiaxuan Wei, Zhixuan Yu, Ruisheng Zhang:
A trustworthy neural architecture search framework for pneumonia image classification utilizing blockchain technology. 1694-1727 - Amjad Qtaish, Malik Braik, Dheeb Albashish, Mohammad T. Alshammari, Abdulrahman Alreshidi, Eissa Jaber Alreshidi:
Optimization of K-means clustering method using hybrid capuchin search algorithm. 1728-1787 - Shaurya Sood, Neminath Hubballi:
SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters. 1788-1817 - Arvind Mewada, Rupesh Kumar Dewang:
NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media. 1818-1851 - Mirna Magdy, Mohamed O. Grida, Gawaher S. Hussein:
Disruption mitigation in the semiconductors supply chain by using public blockchains. 1852-1906 - Huanwen Zhang, Yan Wang, Jianxi Fan, Yuejuan Han, Baolei Cheng:
Constructing edge-disjoint spanning trees in several cube-based networks with applications to edge fault-tolerant communication. 1907-1934 - Nartay Aikyn, Ardan Zhanegizov, Temirlan Aidarov, Dinh-Mao Bui, Nguyen Anh Tu:
Efficient facial expression recognition framework based on edge computing. 1935-1972 - Divya Paikaray, Ashok Kumar Mehta, Danish Ali Khan:
Optimized convolutional neural network for the classification of lung cancer. 1973-1989 - Ramzi A. Haraty, Ali Assaf:
DG-means: a superior greedy algorithm for clustering distributed data. 1990-2024 - Yanjiang Han, Fengping Wang, Wei Wang, Xiangyu Li, Jianyang Zhang:
YOLO-SG: Small traffic signs detection method in complex scene. 2025-2046 - Yuju Wang, Liang-Hong Wu, Liang-Chuan Wu:
An integrative extraction approach for index-tracking portfolio construction and forecasting under a deep learning framework. 2047-2066 - Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi, Shahram Etemadi Borujeni:
Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems. 2067-2127 - Massoud Seifpour, Seyyed Amir Asghari, Mostafa Ghobaei-Arani:
A stochastic multi-objective optimization method for railways scheduling: a NSGA-II-based hybrid approach. 2128-2163 - P. Mathivanan, Maran Ponnambalam:
Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM). 2164-2195 - Xiaohong Li, Qixuan Peng, Ruihong Li, Huifang Ma:
Dual graph neural network for overlapping community detection. 2196-2222 - Pijush Kanti Dutta Pramanik, Saurabh Pal, Prasenjit Choudhury:
Mobile crowd computing: potential, architecture, requirements, challenges, and applications. 2223-2318 - Haiying Liu, Zhihao Li, Kuihua Huang, Rui Wang, Guangquan Cheng, Tiexiang Li:
Evolutionary reinforcement learning algorithm for large-scale multi-agent cooperation and confrontation applications. 2319-2346 - S. Saumiya, S. Wilfred Franklin:
Unified automated deep learning framework for segmentation and classification of liver tumors. 2347-2380 - Hengliang Guo, Long Zhang, Yi Zhang, Jianan Li, Xiaoyue Xu, Lu Liu, Kuangsheng Cai, Dan Wu, Shuxin Yang, Lingbo Kong, Xu Gao:
OpenMP offloading data transfer optimization for DCUs. 2381-2402 - Shaimaa E. Nassar, Ibrahim Yasser, Hanan M. Amer, Mohamed A. Mohamed:
A robust MRI-based brain tumor classification via a hybrid deep learning technique. 2403-2427 - Chakaravarthi Sivanandam, Vaishnnave Mala Perumal, Jagadeesh Mohan:
A novel light GBM-optimized long short-term memory for enhancing quality and security in web service recommendation system. 2428-2460 - Usha Patel, Vibha Patel:
Active learning-based hyperspectral image classification: a reinforcement learning approach. 2461-2486 - Chenxing Xia, Difeng Chen, Xiuju Gao, Bin Ge, Kuan-Ching Li, Xianjin Fang, Yan Zhang, Ke Yang:
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection. 2487-2513 - Chandrashekhar Meshram, Mohammad S. Obaidat, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Arpit Vijay Raikwar:
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments. 2514-2537 - Tinka Singh, Ramagopal V. S. Uppaluri:
Feed-forward ANN and traditional machine learning-based prediction of biogas generation rate from meteorological and organic waste parameters. 2538-2571 - Khalid A. Darabkh, Thara A. Alzboun, Marwa H. Al-Tahaineh:
A novel routing protocol for stable route selection in IoT networks. 2572-2600 - Bahar Ghasemi, Mahmood Ahmadi, Hamed Alimohammadi:
A neural gas network-based scheme for SDN many-field packet classification. 2601-2632 - Oussama Azzouzi, Mohamed Anane, Mouloud Koudil, Mohamed Issad, Yassine Himeur:
Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA. 2633-2659 - Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma:
Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks. 2660-2680 - Divya Rani, Sachin Tripathi:
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network. 2681-2717 - Peda Gopi Arepalli, K. Jairam Naik:
A deep learning-enabled IoT framework for early hypoxia detection in aqua water using light weight spatially shared attention-LSTM network. 2718-2747 - Bo Zhou, Hai Huang, Jun Xia, Donghai Tian:
A novel malware detection method based on API embedding and API parameters. 2748-2766 - Lijun Qi, Jincheng Zhuang:
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing. 2767-2798 - Youwei Wang, Lizhou Feng, Ao Liu, Weiqi Wang, Yudong Hou:
Dual BiGRU-CNN-based sentiment classification method combining global and local attention. 2799-2837 - Tengteng Cheng, Guosun Zeng, Zhipeng Sun:
A big graph clustering method to support parallel processing by perceiving graph's application algorithm semantics. 2838-2861 - G. Sivapriya, R. Manjula Devi, Keerthika Periasamy:
Computer-aided diagnostic model for retinal vascular diseases using graph-based attention mechanism. 2862-2888 - Yuxin Tang, Yudi Qiu, Yanwei Liu, Jie Jiao, Peng Zhang, Yibo Fan:
Scalable short-entry dual-grain coherence directories with flexible region granularity. 2889-2911 - Raushan Kumar Singh, Mukesh Kumar:
Correction to: Future trends of path planning framework considering accident attributes for smart cities. 2912 - Parisa Kavianpour, Mohammadreza Kavianpour, Ehsan Jahani, Amin Ramezani:
Correction to: A CNN-BiLSTM model with attention mechanism for earthquake prediction. 2913 - Samad Rostampour, Nasour Bagheri, Behnam Ghavami, Ygal Bendavid, Saru Kumari, Honorio Martín, Carmen Camara:
Correction to: Using a privacy‑enhanced authentication process to secure IoT‑based smart grid infrastructures. 2914-2915
Volume 80, Number 3, February 2024
- Ismail Biri, Ülkü Tuncer Küçüktas, Fatih Uysal, Firat Hardalaç:
Forecasting the future popularity of the anti-vax narrative on Twitter with machine learning. 2917-2947 - Jiaxin Chen, Xuguang Zhang, Yinggan Tang, Hui Yu:
ICE-YoloX: research on face mask detection algorithm based on improved YoloX network. 2948-2969 - Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava:
Internet of medical things-based authentication for an optimized watermarking of encrypted EEG. 2970-3004 - Luttfi A. Al-Haddad, Alaa Abdulhady Jaber, Sinan A. Al-Haddad, Yousif M. Al-Muslim:
Fault diagnosis of actuator damage in UAVs using embedded recorded data and stacked machine learning models. 3005-3024 - Guangjin Wang, Yuanying Wang, Fuyong Xu, Yongsheng Zhang, Peiyu Liu:
Syntactic and semantic dual-enhanced bidirectional network for aspect sentiment triplet extraction. 3025-3041 - Hongxia Zhang, Mengde Wu, Qiqi Feng, Hao Li:
AERQP: adaptive embedding representation-based QoS prediction for web service recommendation. 3042-3065 - Arash Ahmadi, Amanj Khorramian:
Efficient Brute-force state space search for Yin-Yang puzzle. 3066-3088 - K. Uma Maheswari, S. Mary Saira Bhanu, Nickolas Savarimuthu:
Clustering-based data integrity verification approach for multi-replica in a fog environment. 3089-3113 - Yilu Chen, Miaodi Su, Hongzhi Ding, Shaohong Weng, Zhifeng Lin, Xiqiong Bai:
High-correlation 3D routability estimation for congestion-guided global routing. 3114-3141 - Xuesong Wang, Zheng Zhang, Dongsheng Zhang, Limin Ding:
Pose visual detection method for cellphone dropping process incorporating prior information. 3142-3161 - Ruihang Xu, Peisen Wang, Xuanjing Li, Ruifeng Nie:
YOLO-ARGhost: a lightweight face mask detection model. 3162-3182 - Mei Bai, Qibo Wang, Shihan Chang, Xite Wang, Guanyu Li:
Location-based skyline query processing technology in road networks. 3183-3211 - Yanni Yang, Yiting Tan, Jintao Min, Zhengwei Huang:
Automatic text summarization for government news reports based on multiple features. 3212-3228