


Остановите войну!
for scientists:


default search action
Cluster Computing, Volume 25
Volume 25, Number 1, February 2022
- N. Suganthi
, S. Meenakshi:
An efficient scheduling algorithm using queuing system to minimize starvation of non-real-time secondary users in Cognitive Radio Network. 1-11 - Pan Jun Sun
:
The optimal privacy strategy of cloud service based on evolutionary game. 13-31 - Enrique Tomás Martínez Beltrán
, Mario Quiles Pérez, Sergio López Bernal, Alberto Huertas Celdrán
, Gregorio Martínez Pérez:
Noise-based cyberattacks generating fake P300 waves in brain-computer interfaces. 33-48 - Aya M. Kishk
, Mahmoud Mohammed Badawy, Hesham A. Ali, Ahmed I. Saleh:
A new traffic congestion prediction strategy (TCPS) based on edge computing. 49-75 - Wenkai Ma, Jinchang Hu, Yanyan Wang, Yaohua Wu:
Simulation-based regression analysis for the replenishment strategy of the crane & shuttle-based storage and retrieval system. 77-89 - Masoumeh Hajvali, Sahar Adabi
, Ali Rezaee
, Mehdi Hosseinzadeh:
Software architecture for IoT-based health-care systems with cloud/fog service model. 91-118 - Ali Asghari
, Mohammad Karim Sohrabi
:
Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS technique. 119-140 - Abbas Najafizadeh, Afshin Salajegheh
, Amir Masoud Rahmani, Amir Sahafi
:
Multi-objective Task Scheduling in cloud-fog computing using goal programming approach. 141-165 - Ahmed Saidi
, Omar Nouali, Abdelouahab Amira
:
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing. 167-185 - Jaiprakash Nagar
, Sanjay Kumar Chaturvedi, Sieteng Soh
:
An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments. 187-202 - Hancui Zhang
, Weida Zhou:
A two-stage virtual machine abnormal behavior-based anomaly detection mechanism. 203-214 - Ali Asghar Safaei
:
Hybrid fragmentation of medical images' attributes for multidimensional indexing. 215-230 - Yousef O. Sharrab, Izzat Alsmadi
, Nabil J. Sarhan
:
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function. 231-247 - Gaofeng Zhang
, Benzhu Xu, Ensheng Liu, Liqiang Xu, Liping Zheng
:
Task placement for crowd recognition in edge-cloud based urban intelligent video systems. 249-262 - Saleh Darzi, Bahareh Akhbari
, Hassan Khodaiemehr
:
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. 263-278 - Fernando Loor
, Manuel Manriquez, Veronica Gil-Costa, Mauricio Marín
:
Feasibility of P2P-STB based crowdsourcing to speed-up photo classification for natural disasters. 279-302 - Farhad Tavousi, Sadoon Azizi, Abdulbaghi Ghaderzadeh
:
A fuzzy approach for optimal placement of IoT applications in fog-cloud computing. 303-320 - Ahmed Fathalla
, Kenli Li, Ahmad Salah
:
Best-KFF: a multi-objective preemptive resource allocation policy for cloud computing systems. 321-336 - Yanyan Ji
, Bilin Shao, Jinyong Chang, Genqing Bian:
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. 337-349 - Mahyar Sadrishojaei
, Nima Jafari Navimipour, Midia Reshadi, Mehdi Hosseinzadeh:
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm. 351-361 - Yuejing Yan, Yanyan Xu
, Yiran Zhang
, Zhiheng Wang, Zheheng Rao:
Privacy-preserving content-based image retrieval in edge environment. 363-381 - Jianhu Gong, Nima Jafari Navimipour
:
An in-depth and systematic literature review on the blockchain-based approaches for cloud computing. 383-400 - Ali Majed, Fatemeh Raji, Ali Miri:
Replication management in peer-to-peer cloud storage systems. 401-416 - Sumit Kumar
, Rajeev Tiwari
, Sergei A. Kozlov, Joel J. P. C. Rodrigues:
Minimizing delay in content-centric networks using heuristics-based in-network caching. 417-431 - Kyunghyun Han, Wai-Kong Lee, Seong Oun Hwang
:
cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications. 433-450 - Ashish Tomar
, Sachin Tripathi:
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid. 451-468 - Mouna Afif
, Riadh Ayachi, Mohamed Atri
:
Indoor objects detection system implementation using multi-graphic processing units. 469-483 - Mohammad Hossein Nejat, Homayun Motameni, Hamed Vahdat-Nejad, Behnam Barzegar:
Efficient cloud service ranking based on uncertain user requirements. 485-502 - S. Asha, P. Vinod:
Evaluation of adversarial machine learning tools for securing AI systems. 503-522 - Sami Alshmrany:
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model. 523-536 - Kashif Mehboob Khan, Junaid Arshad
, Waheed Iqbal, Sidrah Abdullah, Hassan Zaib:
Blockchain-enabled real-time SLA monitoring for cloud-hosted services. 537-559 - Wu Wang, Fouzi Harrou
, Benamar Bouyeddou, Sidi-Mohammed Senouci, Ying Sun:
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. 561-578 - Ali Belgacem
, Kadda Beghdad Bey:
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost. 579-595 - Sejin Kim, Yoonhee Kim
:
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs. 597-617 - Feng Cheng, Yifeng Huang, Bhavana Tanpure, Pawan Sawalani, Long Cheng
, Cong Liu:
Cost-aware job scheduling for cloud instances using deep reinforcement learning. 619-631 - Seongbong Choi, Hyung Tae Lee
:
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing. 633-646 - Shahid Md. Asif Iqbal
, Asaduzzaman
, Mohammed Moshiul Hoque:
A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN). 647-673 - Avita Katal
, Susheela Dahiya
, Tanupriya Choudhury
:
Energy efficiency in cloud computing data center: a survey on hardware technologies. 675-705 - Hang Gao, Tiegang Gao:
A secure lossless recovery for medical images based on image encoding and data self-embedding. 707-725 - Juan Dan, Yanjun Zheng, Jianping Hu:
Research on sports training model based on intelligent data aggregation processing in internet of things. 727-734
Volume 25, Number 2, April 2022
- Hamza Aldabbas
, Khalaf Khatatneh
:
Intelligent transmission control layer for efficient node management in SDN. 735-750 - Huifang Li
, Jianghang Huang, Binyang Wang, Yushun Fan:
Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud. 751-768 - Lin-Tao Duan
, Zhi-Guo Wang, Hai-Ying Wang:
Energy-efficient speed tuning for real-time applications. 769-779 - Hongjian Li
, Hai Fang, Hongxi Dai, Tao Zhou, Wenhu Shi, Jingjing Wang, Chen Xu:
A cost-efficient scheduling algorithm for streaming processing applications on cloud. 781-803 - Sumalatha Saleti
:
Incremental mining of high utility sequential patterns using MapReduce paradigm. 805-825 - Himanshu Purohit, Pawan K. Ajmera:
Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization. 827-846 - Peini Liu
, Jordi Guitart
:
Performance characterization of containerization for HPC workloads on InfiniBand clusters: an empirical study. 847-868 - Kamal Berahmand, Mehrnoush Mohammadi, Azadeh Faroughi, Rojiar Pir Mohammadiani
:
A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix. 869-888 - Krishan Kumar Sethi, Dharavath Ramesh
, Munesh Chandra Trivedi:
A Spark-based high utility itemset mining with multiple external utilities. 889-909 - Aryan Rahimikhanghah, Melika Tajkey, Bahareh Rezazadeh
, Amir Masoud Rahmani
:
Resource scheduling methods in cloud and fog computing environments: a systematic literature review. 911-945 - Guilherme R. Pretto, Bruno Lopes Dalmazo
, Jonatas Adilson Marques
, Zhongke Wu, Xingce Wang, Vladimir Korkhov, Philippe O. A. Navaux, Luciano Paschoal Gaspary:
Janus: a framework to boost HPC applications in the cloud based on SDN path provisioning. 947-964 - Theofanis Xifilidis, Kostas E. Psannis
:
Correlation-based wireless sensor networks performance: the compressed sensing paradigm. 965-981 - Ashish Mohan Yadav
, Kuldeep Narayan Tripathi, S. C. Sharma:
An enhanced multi-objective fireworks algorithm for task scheduling in fog computing environment. 983-998 - Mahmoud Ahmad Al-Khasawneh, Irfan Uddin, Syed Atif Ali Shah, Ahmad M. Khasawneh
, Laith Mohammad Abualigah, Marwan Mahmoud
:
An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications. 999-1013 - Ali Aghasi, Kamal Jamshidi, Ali Bohlooli
:
A thermal-aware energy-efficient virtual machine placement algorithm based on fuzzy controlled binary gravitational search algorithm (FC-BGSA). 1015-1033 - R. Ghafari, F. Hassani Kabutarkhani, N. Mansouri:
Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review. 1035-1093 - Xi Liu
, Jun Liu:
A truthful online mechanism for virtual machine provisioning and allocation in clouds. 1095-1109 - Siddhant Jain
, Shashank Gupta
, K. K. Sreelakshmi, Joel J. P. C. Rodrigues:
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. 1111-1154 - Naina Handa
, Anil Sharma, Amardeep Gupta:
Framework for prediction and classification of non functional requirements: a novel vision. 1155-1173 - Degan Zhang, Lixiang Cao, Haoli Zhu, Ting Zhang, Jinyu Du, Kaiwen Jiang
:
Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning. 1175-1187 - K. Kalyana Chakravarthi
, P. Neelakantan, L. Shyamala, Vaidehi Vaidehi:
Reliable budget aware workflow scheduling strategy on multi-cloud environment. 1189-1205 - Zhenxing Xu
, Jinzhao Wu:
Computing flow pipe of embedded hybrid systems using deep group preserving scheme. 1207-1220 - Xuewang Zhang
, Caijin Ye:
A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature. 1221-1235 - Marjan Mahmoudi, Avid Avokh, Behrang Barekatain
:
SDN-DVFS: an enhanced QoS-aware load-balancing method in software defined networks. 1237-1262 - Amrita Mangaonkar
, Rohit Pawar, Nahida Sultana Chowdhury, Rajeev R. Raje:
Enhancing collaborative detection of cyberbullying behavior in Twitter data. 1263-1277 - Marco Lattuada, Eugenio Gianniti, Danilo Ardagna
, Li Zhang:
Performance prediction of deep learning applications training in GPU as a service systems. 1279-1302 - Rashmi Sahay
, G. Geethakumari, Barsha Mitra:
Mitigating the worst parent attack in RPL based internet of things. 1303-1320 - Jingzhao Xie, Run Zhou, Gang Sun
, Jian Sun, Hongfang Yu:
Fast recovery for online service function chaining interruption using adaptive migration. 1321-1339 - Nitin Goyal
, Ashok Kumar, Renu Popli, Lalit Kumar Awasthi, Nonita Sharma, Gaurav Sharma:
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection. 1341-1354 - Nilesh Vishwasrao Patil
, C. Rama Krishna, Krishan Kumar:
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. 1355-1372 - Dan Tang, Yudong Yan
, Rui Dai, Zheng Qin, Jingwen Chen, Dongshuo Zhang:
A novel LDoS attack detection method based on reconstruction anomaly. 1373-1392 - Mohammad Hassan Khoobkar, Mehdi Dehghan Takht Fooladi, Mohammad Hossein Rezvani
, Mohammad Mehdi Gilanian Sadeghi:
Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory. 1393-1420 - Chunlin Li, Qianqian Cai, Youlong Luo:
Dynamic data replacement and adaptive scheduling policies in spark. 1421-1439 - Sivadi Balakrishna:
Multi objective-based incremental clustering by fast search technique for dynamically creating and updating clusters in large data. 1441-1457 - Marc Jordà
, Pedro Valero-Lara, Antonio J. Peña
:
cuConv: CUDA implementation of convolution for CNN inference. 1459-1473 - Amrendra Singh Yadav, Nikita Singh, Dharmender Singh Kushwaha:
Sidechain: storage land registry data using blockchain improve performance of search records. 1475-1495 - Xingyu Wang
, Junzhao Du, Hui Liu:
Performance and isolation analysis of RunC, gVisor and Kata Containers runtimes. 1497-1513 - Nasim Naseri Seyedi Noudoust, Sahar Adabi
, Ali Rezaee
:
A quorum-based data consistency approach for non-relational database. 1515-1540 - Neha Goyal
, Kapil Gupta:
A hierarchical laplacian TWSVM using similarity clustering for leaf classification. 1541-1560 - Retraction Note to: A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem. 1561
Volume 25, Number 3, June 2022
- Izzat Alsmadi
, Zyad Dwekat, Ricardo Cantu, Bilal Al-Ahmad
:
Vulnerability assessment of industrial systems using Shodan. 1563-1573 - Simge Nur Aslan
, Recep Ozalp
, Aysegül Uçar
, Cüneyt Güzelis
:
New CNN and hybrid CNN-LSTM models for learning object manipulation of humanoid robots from demonstration. 1575-1590 - Faris A. Almalki
, Marios C. Angelides
:
An enhanced design of a 5G MIMO antenna for fixed wireless aerial access. 1591-1606 - Ala Abdulsalam Alarood
, Nedal K. Al-Ababneh
, Mahmoud Ahmad Al-Khasawneh, Majdi Rawashdeh, Mohammad Al-Omari
:
IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography. 1607-1618 - Mohammad Al Ja'afreh
, Hikmat Adhami, Alaa Eddin Alchalabi, Mohamad Hoda, Abdulmotaleb El-Saddik:
Toward integrating software defined networks with the Internet of Things: a review. 1619-1636 - Simona Nedelcheva, Sofiya Ivanovska
, Mariya K. Durchova, Petia D. Koprinkova-Hristova
:
HPC parallel implementation combining NEST Simulator and Python modules. 1637-1644 - Andrii Salnikov
, Balázs Kónya:
DNS-embedded service endpoint registry for distributed e-Infrastructures. 1645-1664 - Hasan Kivrak
, Furkan Cakmak, Hatice Kose
, Sirma Yavuz:
Waypoint based path planner for socially aware robot navigation. 1665-1675 - Lazar Mrkela
, Zorica Stanimirovic
:
A Multi-objective variable neighborhood search for the maximal covering location problem with customer preferences. 1677-1693 - Vahideh Hayyolalam, Safa Otoum
, Öznur Özkasap:
Dynamic QoS/QoE-aware reliable service composition framework for edge intelligence. 1695-1713 - Dinesh Kumar Sah, Tu N. Nguyen, Korhan Cengiz
, Braulio Dumba
, Vikas Kumar:
Load-balance scheduling for intelligent sensors deployment in industrial internet of things. 1715-1727 - Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek
, Korhan Cengiz
:
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. 1729-1748 - Saddam Hussain, Syed Sajid Ullah
, Ihsan Ali
:
An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things. 1749-1764 - Mamoun Alazab, Gunasekaran Manogaran, Carlos Enrique Montenegro Marín
:
Trust management for internet of things using cloud computing and security in smart cities. 1765-1777 - Sowmya Gali
, Venkatram Nidumolu
:
An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things. 1779-1789 - Xianhao Shen, Yufang Lu, Yi Zhang, Xiaoyong Liu, Lieping Zhang:
An Innovative Data Integrity Verification Scheme in the Internet of Things assisted information exchange in transportation systems. 1791-1803 - Roobaea Alroobaea
, Rajakumar Arul, Saeed Rubaiee, Fahd S. Alharithi, Usman Tariq
, Xincan Fan:
AI-assisted bio-inspired algorithm for secure IoT communication networks. 1805-1816 - Mark C. Ballandies
, Marcus M. Dapp, Evangelos Pournaras:
Decrypting distributed ledger design - taxonomy, classification and blockchain community evaluation. 1817-1838 - Muhammad Umar Javed, Nadeem Javaid
, Muhammad Waseem Malik, Mariam Akbar, Omaji Samuel, Adamu Sani Yahaya
, Jalel Ben-Othman:
Blockchain based secure, efficient and coordinated energy trading and data sharing between electric vehicles. 1839-1867 - Abel O. Gomez Rivera, Deepak K. Tosh
, Uttam Ghosh
:
Resilient sensor authentication in SCADA by integrating physical unclonable function and blockchain. 1869-1883 - Baran Kiliç
, Can C. Özturan
, Alper Sen:
Parallel analysis of Ethereum blockchain transaction data using cluster computing. 1885-1898 - Debashis Das
, Sourav Banerjee
, Pushpita Chatterjee
, Manju Biswas, Utpal Biswas, Waleed S. Alnumay
:
Design and development of an intelligent transportation management system using blockchain and smart contracts. 1899-1913 - Gökay Saldamli, Charit Upadhyay, Devika Jadhav, Rohit Shrishrimal, Bapugouda Patil, Lo'ai Tawalbeh
:
Improved gossip protocol for blockchain applications. 1915-1926 - Krushali Shah, Swapnil Chadotra, Sudeep Tanwar
, Rajesh Gupta
, Neeraj Kumar
:
Blockchain for IoV in 6G environment: review solutions and challenges. 1927-1955 - Suayb S. Arslan
, Turguy Goker:
Compress-store on blockchain: a decentralized data processing and immutable storage for multimedia streaming. 1957-1968 - Xiangyu Wang
, Wenyong Wang, Youlu Zeng, Ting Yang, Chengyu Zheng:
A state sharding model on the blockchain. 1969-1979 - Farhad Soleimanian Gharehchopogh
, Benyamin Abdollahzadeh
:
An efficient harris hawk optimization algorithm for solving the travelling salesman problem. 1981-2005 - Darah Aqel, Shadi AlZu'bi
, Ala Mughaid
, Yaser Jararweh:
Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. 2007-2020 - Elham Azhir, Nima Jafari Navimipour
, Mehdi Hosseinzadeh, Arash Sharifi, Mehmet Unal, Aso Mohammad Darwesh:
Join queries optimization in the distributed databases using a hybrid multi-objective algorithm. 2021-2036 - Chouaib Ben Djaballah
, Wahid Nouibat:
A new multi-population artificial bee algorithm based on global and local optima for numerical optimization. 2037-2059 - Abdullah Lakhan
, Muhammad Suleman Memon
, Qurat-Ul-Ain Mastoi, Mohamed Elhoseny
, Mazin Abed Mohammed
, Mumtaz Qabulio, Mohamed Abdel-Basset
:
Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network. 2061-2083 - Albert Rego
, Pedro Luis Gonzalez Ramirez, José Miguel Jiménez, Jaime Lloret Mauri
:
Artificial intelligent system for multimedia services in smart home environments. 2085-2105 - Xiaoming Cheng, Lei Wang
, Pengchao Zhang, Xinkuan Wang, Qunmin Yan:
Short-term fast forecasting based on family behavior pattern recognition for small-scale users load. 2107-2123 - Rasheed Ahmad
, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Towards building data analytics benchmarks for IoT intrusion detection. 2125-2141