Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of High Performance Systems Architecture, Volume 10
Volume 10, Number 1, 2021
- Asmae Berhich, Fatima-Zahra Belouadha, Mohammed Issam Kabbaj:
LSTM-based earthquake prediction: enhanced time feature and data representation. 1-11 - Mohammed Bougrine, Salima Trichni, Fouzia Omary:
Improving performance of the symmetrical evolutionary ciphering system SEC. 12-19 - Shuai Xiao, Han Wang, Jindan Zhang:
New digital signature algorithm based on ECC and its application in bitcoin and IoT. 20-31 - Chuanwen Lin, Zhenhua Liu, Linghong Chi:
Research on frontiers of space-ground integration information network. 32-42 - Abdelkarim Ait Temghart, Driss Ait Omar, Mohamed Baslam, Mbarek Marwan:
Game theoretical approach for a fair and effective pricing strategy in cloud computing. 43-55
Volume 10, Number 2, 2021
- Abderrahmane Ez-Zahout:
A distributed big data analytics model for people re-identification based dimensionality reduction. 57-63 - Partha Mitra, Jaydeb Bhaumik, Angsuman Sarkar:
A CAD approach for power supply noise aware floorplan in SoC. 64-69 - Yubiao Pan, Mingwei Lin:
ACS: an alternate coding scheme to improve degrade read performance for SSD-based RAID5 systems. 70-79 - Zeesha Mishra, Bibhudendra Acharya:
Efficient hardware implementation of TEA, XTEA and XXTEA lightweight ciphers for low resource IoT applications. 80-88 - Piyush Modi, Pulkit Singh, Bibhudendra Acharya:
Effective hardware architectures for LED and PRESENT ciphers for resource-constrained applications. 89-104 - George K. Adam:
Multithreading on reconfigurable hardware: a performance evaluation approach of a multicore FPGA architecture. 105-116
Volume 10, Numbers 3/4, 2021
- P. Sneha, K. Balamurugan, G. Kalusuraman:
Evaluation of flexural and shear property of high performance PLA/Bz composite filament printed at different FDM parametric conditions. 119-127 - Feilu Hang, Linjiang Xie, Wei Guo, Yao Lv, Wei Ou, A. Shanthini:
Pervasive hybrid two-stage fusion model of intelligent wireless network security threat perception. 128-139 - Linjiang Xie, Feilu Hang, Wei Guo, Yao Lv, Wei Ou, F. H. A. Shibly:
Network security defence system based on artificial intelligence and big data technology. 140-151 - Peng Li, Bo Mei, Yiran Wang:
Optimised embedded sensor network using multicore architecture for low power application. 152-161 - Xuefeng Xing, Jing Cao, Hongtao Zhou, Lei Song, Yanan Qiu:
Reconfigurable architecture for heterogeneous multi-core and many-core architecture with IoT assistance. 162-173 - Abhay Kumar Singh, Muhammad Rukunuddin Ghalib:
Knowledge-based mining with the game-theoretic rough set approach to handling inconsistent healthcare data. 174-184 - Yang Li, Wei Li, Na Li, Xiaoli Qiu, Karthik Bala Manokaran:
Multimodal information interaction and fusion for the parallel computing system using AI techniques. 185-196
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.