


default search action
International Journal of High Performance Systems Architecture, Volume 10
Volume 10, Number 1, 2021
- Asmae Berhich

, Fatima-Zahra Belouadha, Mohammed Issam Kabbaj:
LSTM-based earthquake prediction: enhanced time feature and data representation. 1-11 - Mohammed Bougrine, Salima Trichni, Fouzia Omary:

Improving performance of the symmetrical evolutionary ciphering system SEC. 12-19 - Shuai Xiao, Han Wang, Jindan Zhang:

New digital signature algorithm based on ECC and its application in bitcoin and IoT. 20-31 - Chuanwen Lin, Zhenhua Liu, Linghong Chi:

Research on frontiers of space-ground integration information network. 32-42 - Abdelkarim Ait Temghart

, Driss Ait Omar, Mohamed Baslam, Mbarek Marwan:
Game theoretical approach for a fair and effective pricing strategy in cloud computing. 43-55
Volume 10, Number 2, 2021
- Abderrahmane Ez-Zahout

:
A distributed big data analytics model for people re-identification based dimensionality reduction. 57-63 - Partha Mitra, Jaydeb Bhaumik, Angsuman Sarkar:

A CAD approach for power supply noise aware floorplan in SoC. 64-69 - Yubiao Pan, Mingwei Lin

:
ACS: an alternate coding scheme to improve degrade read performance for SSD-based RAID5 systems. 70-79 - Zeesha Mishra, Bibhudendra Acharya

:
Efficient hardware implementation of TEA, XTEA and XXTEA lightweight ciphers for low resource IoT applications. 80-88 - Piyush Modi, Pulkit Singh, Bibhudendra Acharya

:
Effective hardware architectures for LED and PRESENT ciphers for resource-constrained applications. 89-104 - George K. Adam:

Multithreading on reconfigurable hardware: a performance evaluation approach of a multicore FPGA architecture. 105-116
Volume 10, Numbers 3/4, 2021
- P. Sneha, K. Balamurugan, G. Kalusuraman:

Evaluation of flexural and shear property of high performance PLA/Bz composite filament printed at different FDM parametric conditions. 119-127 - Feilu Hang, Linjiang Xie, Wei Guo, Yao Lv, Wei Ou, A. Shanthini:

Pervasive hybrid two-stage fusion model of intelligent wireless network security threat perception. 128-139 - Linjiang Xie, Feilu Hang, Wei Guo, Yao Lv, Wei Ou, F. H. A. Shibly:

Network security defence system based on artificial intelligence and big data technology. 140-151 - Peng Li, Bo Mei, Yiran Wang:

Optimised embedded sensor network using multicore architecture for low power application. 152-161 - Xuefeng Xing, Jing Cao, Hongtao Zhou, Lei Song, Yanan Qiu:

Reconfigurable architecture for heterogeneous multi-core and many-core architecture with IoT assistance. 162-173 - Abhay Kumar Singh, Muhammad Rukunuddin Ghalib

:
Knowledge-based mining with the game-theoretic rough set approach to handling inconsistent healthcare data. 174-184 - Yang Li, Wei Li, Na Li, Xiaoli Qiu, Karthik Bala Manokaran:

Multimodal information interaction and fusion for the parallel computing system using AI techniques. 185-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














