Stop the war!
Остановите войну!
for scientists:
default search action
The Journal of Supercomputing, Volume 79
Volume 79, Number 1, January 2023
- Zhao Jingzhuan, Xuan Zhang, Chen Gao, Zhudong Li, Bao-lei Wang:
KG2Lib: knowledge-graph-based convolutional network for third-party library recommendation. 1-26 - Md. Golam Rabiul Alam, Abde Musavvir Khan, Myesha Farid Shejuty, Syed Ibna Zubayear, Shariar Md Imtiaz, Meteb Altaf, Mohammad Mehedi Hassan, Salman A. AlQahtani, Ahmed Alsanad:
Ejection Fraction estimation using deep semantic segmentation neural network. 27-50 - Ivica Markovic, Suzana Stojkovic:
4-Valued spectral transforms implementation on GPU with Tensor Cores. 51-74 - Hanieh Malekijou, Vesal Hakami, Nastooh Taheri Javan, Amirhossein Malekijoo:
Q-learning-based algorithms for dynamic transmission control in IoT equipment. 75-108 - Dun Li, Dezhi Han, Noël Crespi, Roberto Minerva, Kuan-Ching Li:
A blockchain-based secure storage and access control scheme for supply chain finance. 109-138 - Supriya Gupta, Aakanksha Sharaff, Naresh Kumar Nagwani:
Frequent item-set mining and clustering based ranked biomedical text summarization. 139-159 - Liang Bao, Jin Yang, Zhengtong Zhang, Wenjing Liu, Junhao Chen, Chase Q. Wu:
On accurate prediction of cloud workloads with adaptive pattern mining. 160-187 - Hossein BiTalebi, Farshad Safaei:
Criticality-aware priority to accelerate GPU memory access. 188-213 - Yuerong Su, Weiwei Sun:
Classification and interaction of new media instant music video based on deep learning under the background of artificial intelligence. 214-242 - Célestin Tshimanga Kamanga, Emmanuel Bugingo, Simon Ntumba Badibanga, Eugene Mbuyi Mukendi:
A multi-criteria decision making heuristic for workflow scheduling in cloud computing environment. 243-264 - Kiranbir Kaur, Salil Bharany, Sumit Badotra, Karan Aggarwal, Anand Nayyar, Sandeep Sharma:
Energy-efficient polyglot persistence database live migration among heterogeneous clouds. 265-294 - Jasleen Kaur, Rajeev Kumar, Alka Agrawal, Raees Ahmad Khan:
A neutrosophic AHP-based computational technique for security management in a fog computing network. 295-320 - Qinglin Yang, Taiyu Wang, Kaiming Zhu, Junbo Wang, Yu Han, Chunhua Su:
Loss-based differentiation strategy for privacy preserving of social robots. 321-348 - Chunqiu Wang, Young Chun Ko:
Emotional representation of music in multi-source data by the Internet of Things and deep learning. 349-366 - Osman Ali Sadek Ibrahim, Belal A. Hamed, Tarek Abd El-Hafeez:
A new fast technique for pattern matching in biological sequences. 367-388 - Qing Zheng, Fang-Ming Shao:
Intelligent failure localization and maintenance of network based on reliability. 389-418 - Lingyun Xiang, Huiqing You, Guoqing Guo, Qian Li:
Deep feature fusion for cold-start spam review detection. 419-434 - Maryam Imani:
Fuzzy-based weighting long short-term memory network for demand forecasting. 435-460 - Hamid Hadian, Mohammadreza Farrokh, Mohsen Sharifi, Ali Jafari:
An elastic and traffic-aware scheduler for distributed data stream processing in heterogeneous clusters. 461-498 - Y. V. Ramanjaneyulu, Jitendra Kumar, Korra Sathya Babu, Bidyut Kumar Patra:
Enhancing the accuracy of group recommendation using slope one. 499-540 - Pintu Kumar Ram, Pratyay Kuila:
GAAE: a novel genetic algorithm based on autoencoder with ensemble classifiers for imbalanced healthcare data. 541-572 - Hamed Vahdat-Nejad:
CAMID: architectural support of middleware for multiple-domain ubiquitous computing and IoT. 573-590 - Wenfeng Shen, Zhengsen Liu, Yunjie Tan, Zhaokai Luo, Zhou Lei:
KubeGPU: efficient sharing and isolation mechanisms for GPU resource management in container cloud. 591-625 - Athena Abdi, Sina Shahoveisi:
FT-EALU: fault-tolerant arithmetic and logic unit for critical embedded and real-time systems. 626-649 - Soufia Bennai, Kamal Amroun, Samir Loudni, Abdelkader Ouali:
An efficient heuristic approach combining maximal itemsets and area measure for compressing voluminous table constraints. 650-676 - Weikang Zhao, KinTak U, Huibin Luo:
An image super-resolution method based on polynomial exponential function and non-uniform rectangular partition. 677-701 - Liwei Yang, Furong Zhu, Wencong Lai, Qiulian Zhang, Xinlai Liu, Wenjie Zhang:
Interference analysis for MIMO-OFDM based indoor visible light communication. 702-724 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Phuong-Nam Nguyen-Pham, Hoang-Anh Nguyen, Trong-Nguyen Nguyen:
Provable user authentication scheme on ECC in multi-server environment. 725-761 - Albert Segura, José-María Arnau, Antonio González:
Irregular accesses reorder unit: improving GPGPU memory coalescing for graph-based workloads. 762-787 - Youcef Imine, Hicham Lakhlef, Michel Raynal, François Taïani:
DMCSC: a fully distributed multi-coloring approach for scalable communication in synchronous broadcast networks. 788-813 - Francisco J. Andújar, Miguel Sánchez de la Rosa, Jesús Escudero-Sahuquillo, José L. Sánchez:
Extending the VEF traces framework to model data center network workloads. 814-831 - Manish Kumar Singh, Amit Choudhary, Sandeep Gulia, Anurag Verma:
Multi-objective NSGA-II optimization framework for UAV path planning in an UAV-assisted WSN. 832-866 - Rong Lu, Quanyu Song:
Research on the improved gesture tracking algorithm in sign language synthesis. 867-879 - Chuanhui Shan, Ao Li, Xiumei Chen:
Deep delay rectified neural networks. 880-896 - Qiuyu Zhang, Zhenyu Zhao:
Distributed storage scheme for encryption speech data based on blockchain and IPFS. 897-923 - D. Sirisha:
Complexity versus quality: a trade-off for scheduling workflows in heterogeneous computing environments. 924-946 - Bengong Yu, Shuwen Zhang:
A novel weight-oriented graph convolutional network for aspect-based sentiment analysis. 947-972 - Minju Kim, Yeonghun Shin, Wooyeon Jo, Taeshik Shon:
Digital forensic analysis of intelligent and smart IoT devices. 973-997 - Angela Mazzonetto, Rafael Z. Frantz, Sandro Sawicki, Fabricia Roos-Frantz, Gerson Battisti:
Towards a dynamic heuristic for task scheduling in application integration platforms to handle large volumes of data. 998-1031 - Jiwon Seo, Inyoung Bang, Yungi Cho, Jangseop Shin, Dongil Hwang, Donghyun Kwon, Yeongpil Cho, Yunheung Paek:
Exploring effective uses of the tagged memory for reducing bounds checking overheads. 1032-1064 - Raúl Nozal, José Luis Bosque:
Mashing load balancing algorithm to boost hybrid kernels in molecular dynamics simulations. 1065-1080 - Somaya A. El-Feshawy, Waleed Saad, Mona Shokair, Moawad I. Dessouky:
IoT framework for brain tumor detection based on optimized modified ResNet 18 (OMRES). 1081-1110 - Mufeed Ahmed Naji Saif, S. K. Niranjan, Belal Abdullah Hezam Murshed, Fahd A. Ghanem, Ammar Abdullah Qasem Ahmed:
CSO-ILB: chicken swarm optimized inter-cloud load balancer for elastic containerized multi-cloud environment. 1111-1155 - Priyanka Paliwal, Julian L. Webber, Abolfazl Mehbodniya, Mohd Anul Haq, Anil Kumar, Prem Kumar Chaurasiya:
Correction to: Multi-agent-based approach for generation expansion planning in isolated micro-grid with renewable energy sources and battery storage. 1156-1157 - Wen Qu, Ting Zhu, Jie Liu, Jianxin Li:
Correction to: A time sequence location method of long video violence based on improved C3D network. 1158 - Qinglin Yang, Taiyu Wang, Kaiming Zhu, Junbo Wang, Yu Han, Chunhua Su:
Correction to: Loss-based differentiation strategy for privacy preserving of social robots. 1159-1160
Volume 79, Number 2, February 2023
- Yiming Ouyang, Chenglong Sun, Ruifeng Li, Qi Wang, Jianhua Li:
Transit ring: bubble flow control for eliminating inter-ring communication congestion. 1161-1181 - Fujia Ren, Chenhui Yang, Yaser Ahangari Nanehkaran:
MRI-based model for MCI conversion using deep zero-shot transfer learning. 1182-1200 - Sergio H. Almanza-Ruiz, Arturo Chavoya, Hector A. Duran-Limon:
Parallel protein multiple sequence alignment approaches: a systematic literature review. 1201-1234 - Yu-Teng Chang, Neng-Hsun Fan:
A novel approach to market segmentation selection using artificial intelligence techniques. 1235-1262 - Jun Wang, Yadan Zhang, Xichao Wang, Pengjun Mao, Bo Liu:
A multi-objective parameter optimization approach to maximize lifetime of wireless sensor networks inspired by spider web. 1263-1288 - Chang-Hoo Jeong, Mun Yong Yi:
Correcting rainfall forecasts of a numerical weather prediction model using generative adversarial networks. 1289-1317 - Ziyu Zhang, Yuelin Gao, Eryang Guo:
A supercomputing method for large-scale optimization: a feedback biogeography-based optimization with steepest descent method. 1318-1373 - C. Narmatha, P. Manimegalai, Krishnadas J., Prajoona Valsalan, S. Manimurugan, Mohammed Mustafa:
Ovarian cysts classification using novel deep reinforcement learning with Harris Hawks Optimization method. 1374-1397 - Priyanka Nehra, Nishtha Kesswani:
Efficient resource allocation and management by using load balanced multi-dimensional bin packing heuristic in cloud data centers. 1398-1425 - Zohre Beiki, Ali Jahanian:
Generic and scalable DNA-based logic design methodology for massive parallel computation. 1426-1450 - Yeganeh Asghari Alaie, Mirsaeid Hosseini Shirvani, Amir Masoud Rahmani:
A hybrid bi-objective scheduling algorithm for execution of scientific workflows on cloud platforms with execution time and reliability approach. 1451-1503 - Yixin Song, Junyang Yu, Jinjiang Wang, Xin He:
Memory management optimization strategy in Spark framework based on less contention. 1504-1525 - Min Chen, Lili Zhang:
Application of edge computing combined with deep learning model in the dynamic evolution of network public opinion in emergencies. 1526-1543 - Yanhua Peng, Yipu Yan, Guoyu Chen, Biao Feng, Xingyu Gao:
An underwater attenuation image enhancement method with adaptive color compensation and detail optimization. 1544-1570 - Antonio Jesús Muñoz-Montoro, Pablo Revuelta Sanz, Damián Martínez-Muñoz, Juan De La Torre Cruz, José Ranilla:
An ambient denoising method based on multi-channel non-negative matrix factorization for wheezing detection. 1571-1591 - Amir Etefaghi, Saeed Sharifian:
AdaInNet: an adaptive inference engine for distributed deep neural networks offloading in IoT-FOG applications based on reinforcement learning. 1592-1621 - Xiaoyu Du, Cheng Cheng, Zhijie Han, Weibei Fan, Shuai Ding:
Hamiltonian properties of HCN and BCN networks. 1622-1653 - Niloofar Bozorgvar, Abbas Rasoolzadegan, Ahad Harati:
Probabilistic detection of GoF design patterns. 1654-1682 - Tugrul Çavdar, Nader Ebrahimpour, Muhammet Talha Kakiz, Faruk Baturalp Gunay:
Decision-making for the anomalies in IIoTs based on 1D convolutional neural networks and Dempster-Shafer theory (DS-1DCNN). 1683-1704 - Mohammad Mahdi Emadi Kouchak, Farshad Safaei, M. Reshadi:
Graph entropies-graph energies indices for quantifying network structural irregularity. 1705-1749 - Saeedeh Jahanshahi, Amir Sabbagh Molahosseini, Azadeh Alsadat Emrani Zarandi:
uLog: a software-based approximate logarithmic number system for computations on SIMD processors. 1750-1783 - Mohammad Nematpour, Habib Izadkhah, Farnaz Mahan:
Enhanced genetic algorithm with some heuristic principles for task graph scheduling. 1784-1813 - Yuanqing Xia, Yufeng Zhan, Li Dai, Yuehong Chen:
A cost and makespan aware scheduling algorithm for dynamic multi-workflow in cloud environment. 1814-1833 - Umair Khan, Muazzam Maqsood, Saira Andleeb Gillani, Mehr Yahya Durrani, Irfan Mehmood, Sanghyun Seo:
A deep learning-based framework for accurate identification and crop estimation of olive trees. 1834-1855 - Massimiliano Lupo Pasini, Junqi Yin:
Stable parallel training of Wasserstein conditional generative adversarial neural networks. 1856-1876 - Mehdi Rahmanian, Ramin Nassiri, Mehran Mohsenzadeh, Reza Ravanmehr:
Test case generation for enterprise business services based on enterprise architecture design. 1877-1907 - Rama Krishna Reddy Venna, G. Durga Jayakumar:
Design of novel area-efficient coplanar reversible arithmetic and logic unit with an energy estimation in quantum-dot cellular automata. 1908-1925 - Mina Malekzadeh:
Enabling efficient and reliable IoT deployment in 5G and LTE cellular areas for optimized service provisioning. 1926-1955 - Ranjit Rajak, Shrawan Kumar, Shiv Prakash, Nidhi Rajak, Pratibha Dixit:
A novel technique to optimize quality of service for directed acyclic graph (DAG) scheduling in cloud computing environment using heuristic approach. 1956-1979 - Pei-Chun Lin, Patrick C. K. Hung, Ying Jiang, Carolina Padilla Velasco, Marco Antonio Martínez Cano:
An experimental design for facial and color emotion expression of a social robot. 1980-2009 - Xinquan Wu, Xuefeng Yan, Xingchan Li, Yongzhen Wang:
Simulating hybrid SysML models: a model transformation approach under the DEVS framework. 2010-2030 - Abubakar Abdussalam Nuhu, Qasim Zeeshan, Babak Safaei, Muhammad Atif Shahzad:
Machine learning-based techniques for fault diagnosis in the semiconductor manufacturing process: a comparative study. 2031-2081 - G. Ramya, R. Manoharan:
Traffic-aware dynamic controller placement in SDN using NFV. 2082-2107 - Runwei Guan, Ka Lok Man, Haocheng Zhao, Ruixiao Zhang, Shanliang Yao, Jeremy S. Smith, Eng Gee Lim, Yutao Yue:
MAN and CAT: mix attention to nn and concatenate attention to YOLO. 2108-2136 - Yongliang Zhang, Yang Lu, Wuqiang Zhu, Xing Wei, Zhen Wei:
Traffic sign detection based on multi-scale feature extraction and cascade feature fusion. 2137-2152 - Otto Benjamin Piramuthu, Matthew Caesar:
VANET authentication protocols: security analysis and a proposal. 2153-2179 - Abdelhakim Baouya, Otmane Aït Mohamed, Samir Ouchani:
Toward a context-driven deployment optimization for embedded systems: a product line approach. 2180-2211 - Heena Wadhwa, Rajni Aron:
Optimized task scheduling and preemption for distributed resource management in fog-assisted IoT environment. 2212-2250 - Ram Kumar, S. C. Sharma:
Hybrid optimization and ontology-based semantic model for efficient text-based information retrieval. 2251-2280 - Sarah Bolton, Richard Dill, Michael R. Grimaila, Douglas D. Hodson:
ADS-B classification using multivariate long short-term memory-fully convolutional networks and data reduction techniques. 2281-2307 - Shalaw Faraj Salih, Alan Anwer Abdulla:
An effective bi-layer content-based image retrieval technique. 2308-2331 - Ziheng Wang, Xiaoshe Dong, Yan Kang, Heng Chen:
Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages. 2332-2355 - Mohammed Gharib, MohammadAmin Fazli:
Secure cloud storage with anonymous deduplication using ID-based key management. 2356-2382
Volume 79, Number 3, February 2023
- Ping Xie, Zhu Yuan, Yu Hu:
Nscale: an efficient RAID-6 online scaling via optimizing data migration. 2383-2403 - Arghavan Asad, Farah A. Mohammadi:
Godiva: green on-chip interconnection for DNNs. 2404-2430 - P. Thilakavathy, B. Diwan:
Intelligent quotient estimation from MRI images using optimal light gradient boosting machine. 2431-2450 - Yu Cui, Yang Zhang, Xia Li, Shunfu Jin:
A dynamic energy conservation scheme with dual-rate adjustment and semi-sleep mode in cloud system. 2451-2487 - V. Gowthami, K. Bhoopathy Bagan, Ewins Pon Pushpa:
A novel approach towards high-performance image compression using multilevel wavelet transformation for heterogeneous datasets. 2488-2518 - Saeed NasehiMoghaddam, Mohammad Fathian, Babak Amiri:
Risk-Averse Influence Maximization. 2519-2569 - Genqing Bian, Mingxuan Song, Bilin Shao:
Certificateless network coding scheme from certificateless public auditing protocol. 2570-2602 - Heyang Xu, Sen Xu, Wei Wei, Naixuan Guo:
Fault tolerance and quality of service aware virtual machine scheduling algorithm in cloud data centers. 2603-2625 - Mohammed Albishari, Mingchu Li, Runfa Zhang, Esmail Almosharea:
Deep learning-based early stage detection (DL-ESD) for routing attacks in Internet of Things networks. 2626-2653 - Yean-Fu Wen, Chen-Min Hsu:
A performance evaluation of modular functions and state databases for Hyperledger Fabric blockchain systems. 2654-2690 - Xianrui Yu, Qiuhong Zhao, Qi Lin, Tongyu Wang:
A grey wolf optimizer-based chaotic gravitational search algorithm for global optimization. 2691-2739 - Abdolah Sepahvand, Mohammadreza Razzazi:
Spanning simple path inside a simple polygon. 2740-2766 - Nghi C. Tran, Jian-Hong Wang, Toan H. Vu, Tzu-Chiang Tai, Jia-Ching Wang:
Anti-aliasing convolution neural network of finger vein recognition for virtual reality (VR) human-robot equipment of metaverse. 2767-2782 - Jung-Heum Park, Hyeong-Seok Lim:
Characterization of interval graphs that are paired 2-disjoint path coverable. 2783-2800 - Zahra Shirmohammadi, Yassin Allivand, Fereshte Mozafari, Ahmad Patooghy, Mona Jalal, Sanaz Kazemi Abharian:
ReNo: novel switch architecture for reliability improvement of NoCs. 2801-2818 - Zizhen Liu, Si Chen, Jing Ye, Junfeng Fan, Huawei Li, Xiaowei Li:
DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning. 2819-2849 - Sima Sarv Ahrabi, Alireza Momenzadeh, Enzo Baccarelli, Michele Scarpiniti, Lorenzo Piazzo:
How much BiGAN and CycleGAN-learned hidden features are effective for COVID-19 detection from CT images? A comparative study. 2850-2881 - G. K. Ragesh, Ajay Kumar:
Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications. 2882-2909 - Han Wu, Jiahao Nie, Ziming Zhu, Zhiwei He, Mingyu Gao:
Leveraging temporal-aware fine-grained features for robust multiple object tracking. 2910-2931 - Ling Xiao, Beiji Zou, Chengzhang Zhu, Fanbo Nie:
ESDedup: An efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storage systems. 2932-2960 - S. Haleh S. Dizaji, Saeid Pashazadeh, Javad Musevi Niya:
Wasserstein generative adversarial networks for modeling marked events. 2961-2983 - Vasudeva Bevara, Syed Alihussain, P. N. S. B. S. V. Prasad, Pradyut Kumar Sanki:
Design of an efficient QCA-based median filter with energy dissipation analysis. 2984-3004 - Zhenpeng Liu, Jingyi Wang, Zilin Gao, Jianhang Wei:
Privacy-preserving edge computing offloading scheme based on whale optimization algorithm. 3005-3023 - P. Rajasekar, H. Mangalam, C. S. Subash Kumar:
Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata. 3024-3054 - Bijan Pourghorbani Dinachali, Sam Jabbehdari, Hamid Haj Seyyed Javadi:
A pricing approach for optimal use of computing resources in cloud federation. 3055-3094 - Peng Li, Rui Hou:
Int-Monitor: a model triggered hardware trojan in deep learning accelerators. 3095-3111 - Merve Vildan Baysal, Özden Özcan-Top, Aysu Betin-Can:
Blockchain technology applications in the health domain: a multivocal literature review. 3112-3156 - Shanshan Xie, Yan Zhang, Danjv Lv, Xu Chen, Jing Lu, Jiang Liu:
A new improved maximal relevance and minimal redundancy method based on feature subset. 3157-3180 - P. Hari Kumar, G. S. Anandha Mala:
HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment. 3181-3209 - Junde Chen, Adnan Zeb, Yuandong Sun, Defu Zhang:
A power line loss analysis method based on boost clustering. 3210-3226