


default search action
The Journal of Supercomputing, Volume 76
Volume 76, Number 1, January 2020
- R. Dhilip Kumar, K. S. Vishvaksenan:

Interference cancellation in cognitive radio-based MC-CDMA system using pre-coding technique. 1-15 - (Withdrawn) Cognitive learning performance assessment and analysis with CSCL applied on the NetGuru platform and CSPL applied on the TAoD platform for the network experiment class. 16-46

- Eunju Yang, Dong-Ki Kang, Chan-Hyun Youn:

BOA: batch orchestration algorithm for straggler mitigation of distributed DL training in heterogeneous GPU cluster. 47-67 - Mohammad Nassiri

, Reza Mohammadi
:
A joint energy- and QoS-aware routing mechanism for WMNs using software-defined networking paradigm. 68-86 - Masoud Kargar

, Ayaz Isazadeh, Habib Izadkhah
:
Improving the modularization quality of heterogeneous multi-programming software systems by unifying structural and semantic concepts. 87-121 - Mina Naghshnejad

, Mukesh Singhal:
A hybrid scheduling platform: a runtime prediction reliability aware scheduling platform to improve HPC scheduling performance. 122-149 - S. Moloud Amini, A. Karimi, Mehdi Esnaashari:

Energy-efficient data dissemination algorithm based on virtual hexagonal cell-based infrastructure and multi-mobile sink for wireless sensor networks. 150-173 - Mohammad Maghsoudloo

, Navid Khoshavi:
Elastic HDFS: interconnected distributed architecture for availability-scalability enhancement of large-scale cloud storages. 174-203 - Juan Ruiz de Miras

:
Fast differential box-counting algorithm on GPU. 204-225 - Amhmed Bhih

, Princy Johnson, Martin Randles
:
An optimisation tool for robust community detection algorithms using content and topology information. 226-254 - Sergio Iserte

, Krzysztof Rojek
:
An study of the effect of process malleability in the energy efficiency on GPU-based clusters. 255-274 - Gulshan Kumar

:
An improved ensemble approach for effective intrusion detection. 275-291 - Misun Yu

, Yu-Seung Ma
, Doo-Hwan Bae:
Efficient noise injection for exposing hidden data races. 292-323 - Belén Bermejo

, Carlos Juiz:
Virtual machine consolidation: a systematic review of its overhead influencing factors. 324-361 - Somayeh Rahmani

, Vahid Khajehvand
, Mohsen Torabian
:
Burstiness-aware virtual machine placement in cloud computing systems. 362-387 - Peter Farhat, Hani Sami

, Azzam Mourad
:
Reinforcement R-learning model for time scheduling of on-demand fog placement. 388-410 - Yan Li, Chun-zi Wang, Ying-chao Li:

Multi-view analysis method for robust suppression of attack diffusion. 411-426 - Khaoula Braiki

, Habib Youssef:
Fuzzy-logic-based multi-objective best-fit-decreasing virtual machine reallocation. 427-454 - Yao Qin

, Hua Wang, Shanwen Yi, Xiaole Li, Linbo Zhai:
An energy-aware scheduling algorithm for budget-constrained scientific workflows based on multi-objective reinforcement learning. 455-480 - Hongjian Li

, Yuyan Zhao, Shuyong Fang:
CSL-driven and energy-efficient resource scheduling in cloud data center. 481-498 - Mohammad Masdari

, Mehran Zangakani:
Efficient task and workflow scheduling in inter-cloud environments: challenges and opportunities. 499-535 - Vladimir O. Rybintsev

:
Optimizing the parameters of the Lustre-file-system-based HPC system for reverse time migration. 536-548 - Jianqiang Huang, Wei Qin, Xiaoying Wang, Wenguang Chen:

Survey of external memory large-scale graph processing on a multi-core system. 549-579 - Jitae Yun, Su-Kyung Yoon, Jeong-Geun Kim, Shin-Dug Kim

:
Effective data prediction method for in-memory database applications. 580-601 - Mohammad Mahdi NezhadShokouhi, Mohammad Ali Majidi, Abbas Rasoolzadegan

:
Software defect prediction using over-sampling and feature extraction based on Mahalanobis distance. 602-635 - Jiagao Wu

, Lu Shen, Linfeng Liu:
LSH-based distributed similarity indexing with load balancing in high-dimensional space. 636-665 - Minhaj Ahmad Khan

:
Optimized hybrid service brokering for multi-cloud architectures. 666-687 - Hamid Fadishei

, Azadeh Soltani
:
The curse of indecomposable aggregates for big data exploratory analysis with a case for frequent pattern cubes. 688-707 - Saima Gulzar Ahmad, Hikmat Ullah Khan

, Samia Ijaz, Ehsan Ullah Munir:
Use case-based evaluation of workflow optimization strategy in real-time computation system. 708-725 - Seyed Mehdi Mohtavipour

, Hadi Shahriar Shahhoseini:
A link-elimination partitioning approach for application graph mapping in reconfigurable computing systems. 726-754
Volume 76, Number 2, February 2020
- Advanced parallel and distributed computing for big urban data. 755

- S. Venkatraman

, B. Surendiran
, P. Arun Raj Kumar
:
Spam e-mail classification for the Internet of Things environment using semantic similarity approach. 756-776 - Yaqin Ye

, Ying An, Bo Chen, JunJue Wang
, Yingqiang Zhong:
Land use classification from social media data and satellite imagery. 777-792 - Qiang Lu

, Wenqiang Xu, Haibo Zhang, Qingpeng Tang, Jie Li
, Rui Fang:
ElectricVIS: visual analysis system for power supply data of smart city. 793-813 - Xiaojun Liu, Ning Yang, Yu Jiang, Lichuan Gu, Xianzhang Shi:

A parallel computing-based Deep Attention model for named entity recognition. 814-830 - Zaijun Wang, Jinlin Zhu, XiaoPing Guo, YunTing Ma, Zifan Li:

Distributed task allocation method based on self-awareness of autonomous robots. 831-843 - Xiaokun Leng, Songhao Piao, Lin Chang, Zhicheng He, Zheng Zhu:

Dynamic running hexapod robot based on high-performance computing. 844-857 - Kiran Kumar Patro

, Surya Prakasa Rao Reddi
, S. K. Ebraheem Khalelulla, P. Rajesh Kumar
, K. Shankar
:
ECG data optimization for biometric human recognition using statistical distributed machine learning algorithm. 858-875 - Jinhong Feng, Jundong Zhang, Chuan Wang, Minyi Xu

:
Self-adaptive collective intelligence-based mutation operator for differential evolution algorithms. 876-896 - Weihuang Dai, Ping Hu:

Application of BP neural network in the analytic hierarchy process of person-post evaluation model. 897-914 - N. V. Chinnasamy, A. Senthilkumar:

Secured distributed routing technique using extended DART and table elimination (ET-DART) technique in wireless sensor networks environment. 915-931 - Aiping Guo, Ajuan Jiang, Jie Lin, Xiaoxiao Li:

Data mining algorithms for bridge health monitoring: Kohonen clustering and LSTM prediction approaches. 932-947 - Yingchun Xia, Xingyue Wang, Lichuan Gu, Qijuan Gao, Jun Jiao, Chao Wang:

A collective entity linking algorithm with parallel computing on large-scale knowledge base. 948-963 - Mohamed Abdel-Basset

, Mumtaz Ali
, Asmaa Atef:
Resource levelling problem in construction projects under neutrosophic environment. 964-988 - V. Vijayalakshmi, A. Senthilkumar:

USCDRP: unequal secure cluster-based distributed routing protocol for wireless sensor networks. 989-1004 - Yongjun Qi, Junhua Gu, Weixun Li, Zepei Tian, Yajuan Zhang, Juanping Geng:

Pulmonary nodule image super-resolution using multi-scale deep residual channel attention network with joint optimization. 1005-1019 - Tian Chen, Yongsheng Zuo, Xin An, Fuji Ren:

A variable-length compatible compression scheme based on tristate signals. 1020-1033 - Shengxiang Gao, Zhengtao Yu

, Yunlong Li, Yusen Wang, Yafei Zhang:
Chinese-Vietnamese bilingual news event summarization based on distributed graph ranking. 1034-1048 - Zne-Jung Lee

, Chou-Yuan Lee:
A parallel intelligent algorithm applied to predict students dropping out of university. 1049-1062 - Rong Zhao, Maozhu Jin, Peiyu Ren, Qian Zhang:

Stable two-sided satisfied matching for ridesharing system based on preference orders. 1063-1081
- Gustavo Ramírez-González

, Enas Adbulhay:
Preface on special section on cognitive computing for emerging internet of things. 1082-1085 - (Withdrawn) Decision support system for nasopharyngeal carcinoma discrimination from endoscopic images using artificial neural network. 1086-1104

- (Withdrawn) Multi-label algorithm based on rough set of fractal dimension attribute. 1105-1115

- Yifu Zeng, Yantao Zhou, Fei Zheng:

Data skyline query protocol based on parallel genetic improvement decision tree. 1116-1127 - (Withdrawn) Optimal feature-based multi-kernel SVM approach for thyroid disease classification. 1128-1143

- (Withdrawn) Mobile client data security storage protocol based on multifactor node evaluation. 1144-1158

- (Withdrawn) Sparse low-rank correction scalable video coding based on interactive region of interest viewpoint. 1159-1169

- (Withdrawn) Gauss interference ant colony algorithm-based optimization of UAV mission planning. 1170-1179

- (Withdrawn) An optimization algorithm-based resource allocation for cooperative cognitive radio networks. 1180-1200

- (Withdrawn) Encryption scheme with mixed homomorphic signature based on message authentication for digital image. 1201-1211

- Renato F. Pereira, Valberto E. R. da Silva Filho, Lorena B. Moura

, Arunkumar N.
, Auzuir Ripardo de Alexandria
, Victor Hugo C. de Albuquerque
:
Automatic quantification of spheroidal graphite nodules using computer vision techniques. 1212-1225 - (Withdrawn) The health of things for classification of protein structure using improved grey wolf optimization. 1226-1241

- D. Jude Hemanth, Utku Kose

, Omer Deperlioglu
, Victor Hugo C. de Albuquerque:
An augmented reality-supported mobile application for diagnosis of heart diseases. 1242-1267 - (Withdrawn) Dominator tree data flow cognitive analysis for green public building design. 1268-1276

- T. N. Sugumar

, N. Rajam Ramasamy:
mDesk: a scalable and reliable hypervisor framework for effective provisioning of resource and downtime reduction. 1277-1292 - (Withdrawn) Unsupervised video multi-target tracking based on fast resampling particle filter. 1293-1304

- João Alexandre Lôbo Marques, Paulo César Cortez, João P. V. Madeiro, Victor Hugo C. de Albuquerque

, Simon James Fong
, Fernando S. Schlindwein
:
Nonlinear characterization and complexity analysis of cardiotocographic examinations using entropy measures. 1305-1320 - (Withdrawn) Fuzzy clustering-based skyline query preprocessing algorithm for large-scale flow data analysis. 1321-1330

- (Withdrawn) Quality analysis of multi-sensor intrusion detection node deployment in homogeneous wireless sensor networks. 1331-1341

- (Withdrawn) Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction. 1342-1357

Volume 76, Number 3, March 2020
- Bumsoo Park, Seung-Hee Kim

:
An effective digitized GPS signal transmission for high temporal precision IoT services. 1365-1382 - Kuei Min Wang, Lin Hui:

Effectiveness evaluation of Internet of Things-aided firefighting by simulation. 1383-1397 - Shih-Jung Wu, Rui-Dong Chiang, Terng-Fang Wu:

Direct mail promotion mechanisms and their application in supermarkets. 1398-1415 - Chao-Tung Yang

, Yu-Wei Chan, Jung-Chun Liu, Ben-Shen Lou:
An implementation of cloud-based platform with R packages for spatiotemporal analysis of air pollution. 1416-1437 - Chih-Hsien Hsia

, Jia-Hao Yang, Jen-Shiun Chiang:
Complexity reduction method for ultrasound imaging enhancement in tetrolet transform domain. 1438-1449 - Jianqiang Li, Shenhe Zhao, Ji-Jiang Yang, Zhisheng Huang, Bo Liu, Shi Chen, Hui Pan, Qing Wang:

WCP-RNN: a novel RNN-based approach for Bio-NER in Chinese EMRs. 1450-1467 - Yu-Chih Wei

, Wei-Chen Wu
, Gu-Hsin Lai, Ya-Chi Chu:
pISRA: privacy considered information security risk assessment model. 1468-1481 - Jun-Hong Shen

, Ching-Ta Lu, Mu-Yen Chen
, Neil Y. Yen:
Grid-based indexing with expansion of resident domains for monitoring moving objects. 1482-1501 - You-Shyang Chen, Jackson White:

Empirical decision analytics approach of advanced granularity-based models for identifying performance measures of ERPS application. 1502-1535 - Sahil Kansal

, Harish Kumar, Sakshi Kaushal, Arun Kumar Sangaiah
:
Genetic algorithm-based cost minimization pricing model for on-demand IaaS cloud service. 1536-1561 - Chien-Hung Liu, Woei-Kae Chen, Chi-Chia Sun:

GUIDE: an interactive and incremental approach for crawling Web applications. 1562-1584 - Xuhui Yang, Qingguo Zhou, Jinqiang Wang, Rui Zhou, Kuan-Ching Li

:
An energy-efficient dynamic decision model for wireless multi-sensor network. 1585-1603 - Jui-Hung Kao, Po-Huan Hsiao, Yen-Jen Oyang

, Wei-Zen Sun
, Chih-Hong Sun, Horng-Twu Liaw, Shin-Wen Chang:
The study for dispatch decision of medical emergency resources with real-time spatial analysis. 1604-1627 - Yuan-Tsung Chang

, Timothy K. Shih, Yung-Hui Li, W. G. C. W. Kumara
:
Effectiveness evaluation of iris segmentation by using geodesic active contour (GAC). 1628-1641 - Shuxin Wang:

Multisensor data fusion of motion monitoring system based on BP neural network. 1642-1656 - Tongrang Fan, Wanting Qin, Wenbin Zhao, Feng Wu, Jianmin Wang:

A two-layer SIR information propagation model with heterogeneity based on coupled network. 1657-1679 - Ching-Wei Cheng, Shan-Yu Jung, Chia-Chun Lai

, Sheng-Yu Tsai, Chien-Chung Jeng
:
Transmission spectral analysis models for the assessment of white-shell eggs and brown-shell eggs freshness. 1680-1694 - Abdul Shahid, Muhammad Tanvir Afzal

, Moloud Abdar
, Mohammad Ehsan Basiri, Xujuan Zhou, Neil Y. Yen, Jia-Wei Chang:
Insights into relevant knowledge extraction techniques: a comprehensive review. 1695-1733
- Mincheng Chen, Jingling Yuan, Dongling Liu, Tao Li:

An adaption scheduling based on dynamic weighted random forests for load demand forecasting. 1735-1753 - Ermeson Carneiro de Andrade

, Bruno Costa e Silva Nogueira:
Dependability evaluation of a disaster recovery solution for IoT infrastructures. 1828-1849 - Yue Zhao

, Kenji Yoshigoe, Mengjun Xie
, Jiang Bian, Ke Xiong:
L-PowerGraph: a lightweight distributed graph-parallel communication mechanism. 1850-1879 - Preeti Abrol, Savita Gupta

:
Social spider foraging-based optimal resource management approach for future cloud. 1880-1902 - Hossein Monshizadeh Naeen

, Esmaeil Zeinali Khosraghi
, Abolfazl Toroghi Haghighat:
A stochastic process-based server consolidation approach for dynamic workloads in cloud data centers. 1903-1930 - Mosong Zhou, Xiaoshe Dong

, Heng Chen, Xingjun Zhang:
Fine-grained scheduling in multi-resource clusters. 1931-1958
- Adrián Barredo

, Juan M. Cebrian
, Mateo Valero, Marc Casas
, Miquel Moretó
:
Efficiency analysis of modern vector architectures: vector ALU sizes, core counts and clock frequencies. 1960-1979 - Hocine Saadi

, Nadia Nouali-Taboudjemat, Abdellatif Rahmoun
, Baldomero Imbernon
, Horacio Emilio Pérez Sánchez, José M. Cecilia:
Efficient GPU-based parallelization of solvation calculation for the blind docking problem. 1980-1998 - Thomas Jakobs

, Billy Naumann
, Gudula Rünger
:
Performance and energy consumption of the SIMD Gram-Schmidt process for vector orthogonalization. 1999-2021 - Antonio V. Contreras, Antonio Llanes

, Francisco J. Herrera, Sergio Navarro, Jose-Juan López-Espín
, José M. Cecilia:
Enhancing the context-aware FOREX market simulation using a parallel elastic network model. 2022-2038 - Adrià Armejach

, Helena Caminal, Juan M. Cebrian
, Rubén Langarita
, Rekai González-Alberquilla, Chris Adeniyi-Jones, Mateo Valero, Marc Casas
, Miquel Moretó
:
Using Arm's scalable vector extension on stencil codes. 2039-2062 - Yishui Li, Peizhen Xie, Xinhai Chen

, Jie Liu, Bo Yang, Shengguo Li, Chunye Gong, Xinbiao Gan, Han Xu:
VBSF: a new storage format for SIMD sparse matrix-vector multiplication on modern processors. 2063-2081 - Juan M. Cebrian

, Lasse Natvig, Magnus Jahre
:
Scalability analysis of AVX-512 extensions. 2082-2097
- Xiong Wen Pang, Yanqiang Zhou, Pan Wang, Weiwei Lin, Victor Chang

:
An innovative neural network approach for stock market prediction. 2098-2118 - Türker Tuncer

, Fatih Ertam
, Sengül Dogan
, Emrah Aydemir, Pawel Plawiak
:
Ensemble residual network-based gender and activity recognition method with signals. 2119-2138 - Jianxin Li, Minjie Liu, Dongliang Ma, Jinyu Huang, Min Ke, Tao Zhang:

Learning shared subspace regularization with linear discriminant analysis for multi-label action recognition. 2139-2157 - S. Moloud Amini, A. Karimi:

Two-level distributed clustering routing algorithm based on unequal clusters for large-scale Internet of Things networks. 2158-2190 - Mostafa Sadeghi

, Keivan Navi
, Mehdi Dolatshahi
:
Novel efficient full adder and full subtractor designs in quantum cellular automata. 2191-2205 - Mojtaba Noorallahzadeh

, Mohammad Mosleh:
Parity-preserving reversible flip-flops with low quantum cost in nanoscale. 2206-2238 - Sarah Shafqat

, Saira Kishwer, Raihan Ur Rasool
, Junaid Qadir, Tehmina Amjad
, Hafiz Farooq Ahmad:
Big data analytics enhanced healthcare systems: a review. 1754-1799 - Sven Groppe

:
Emergent models, frameworks, and hardware technologies for Big data analytics. 1800-1827
Volume 76, Number 4, April 2020
- Editor's note. 2239

- (Withdrawn) Research on a distributed auto-negotiation model based on Stackelberg game theory. 2240-2251

- P. Govindasamy

, R. Dillibabu:
Development of software reliability models using a hybrid approach and validation of the proposed models using big data. 2252-2265 - S. Skylakha, P. Sakthivel, K. S. Arunselvan:

Empirical study on application of machine learning techniques for resource allocation in health care using KPI. 2266-2274 - Farooq Sunar Mahammad

, V. Madhu Viswanatham
:
Performance analysis of data compression algorithms for heterogeneous architecture through parallel approach. 2275-2288 - Karthikeyan Panjappagounder Rajamanickam, Sakthivel Periyasamy, T. S. Karthik:

Comparative study of illumination-invariant foreground detection. 2289-2301 - D. Amarnath, S. Sujatha:

Internet-of-Things-aided energy management in smart grid environment. 2302-2314 - Feng Wang, Yanjun Wu, Feiyue Huang:

Rio: a personal storage system in multi-device and cloud. 2315-2338 - Mona Gamal Gafar

, Mohamed Elhoseny
, Gunasekaran Manogaran:
Modeling neutrosophic variables based on particle swarm optimization and information theory measures for forest fires. 2339-2356 - Nan Li, Haibo Gao, Liang Ding, Fengtian Lv, Zhong-yan Bi, Yi-da Wang:

Research on feature extraction and segmentation of rover wheel imprint. 2357-2373
- Jinfei Yang, Jiajia Li, Shouqiang Liu:

A new algorithm of stock data mining in Internet of Multimedia Things. 2374-2389 - Shibo Jing, Liming Yang:

A robust extreme learning machine framework for uncertain data classification. 2390-2416 - Bin Guo, Jiamin Li:

Research on the evolution of participants collaboration mechanism in PPP model based on computer simulation: based on the old community renovation project. 2417-2434 - Yan Ma, Qinxue Xiong, Jianqiang Zhu, Shunyao Jiang:

Early warning indexes determination of the crop injuries caused by waterlogging based on DHSVM model. 2435-2448 - Damián Fernández-Cerero

, Ángel Jesús Varela-Vaca
, Alejandro Fernández-Montes
, María Teresa Gómez-López
, José Antonio Álvarez-Bermejo:
Measuring data-centre workflows complexity through process mining: the Google cluster case. 2449-2478 - Maninder Kaur

, Gurpreet Kaur, Pradip Kumar Sharma
, Alireza Jolfaei
, Dhananjay Singh
:
Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home. 2479-2502 - Chuen Horng Lin

, Chia Ching Yu, Ting You Wang, Tsung Yi Chen:
Classification of the tree for aerial image using a deep convolution neural network and visual feature clustering. 2503-2517 - Shaohua Wan

, Xiang Li, Yuan Xue, Wenmin Lin, Xiaolong Xu
:
Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks. 2518-2547 - Zaineb Dar, Adnan Ahmad

, Farrukh Aslam Khan
, Furkh Zeshan
, Razi Iqbal, Hafiz Husnain Raza Sherazi
, Ali Kashif Bashir
:
A context-aware encryption protocol suite for edge computing-based IoT devices. 2548-2567 - Akshi Kumar

, Anshika Arora
:
An ANFIS-based compatibility scorecard for IoT integration in websites. 2568-2596 - Ye-In Chang, Jun-Hong Shen

, Chia-En Li, Zih-Siang Chen, Ming-Hsuan Tu:
Mining image frequent patterns based on a frequent pattern list in image databases. 2597-2621 - Bo Wang, Hengrui Ma, Xunting Wang, Guiping Deng, Yan Yang, Shaohua Wan

:
Vulnerability assessment method for cyber-physical system considering node heterogeneity. 2622-2642 - Steven Walker-Roberts, Mohammad Hammoudeh

, Omer Aldabbas, Mehmet Aydin
, Ali Dehghantanha:
Threats on the horizon: understanding security threats in the era of cyber-physical systems. 2643-2664 - Usman Ahmad, Hong Song, Awais Bilal, Mamoun Alazab

, Alireza Jolfaei
:
Securing smart vehicles from relay attacks using machine learning. 2665-2682 - Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal

, Yu-Ju Tseng, Yu-Chi Kao:
A generalized pixel value ordering data hiding with adaptive embedding capability. 2683-2714 - Sheng Hao, Huyin Zhang:

Theoretical modeling for performance analysis of IEEE 1901 power-line communication networks in the multi-hop environment. 2715-2747 - Samad Najjar-Ghabel

, Leili Farzinvash
, Seyed Naser Razavi:
HPDMS: high-performance data harvesting in wireless sensor networks with mobile sinks. 2748-2776 - Gaurav Baranwal

, Manisha Singh, Deo Prakash Vidyarthi:
A framework for IoT service selection. 2777-2814 - Feng He, Xiaoshe Dong

, Nianjun Zou, Weiguo Wu, Xingjun Zhang
:
Structured mesh-oriented framework design and optimization for a coarse-grained parallel CFD solver based on hybrid MPI/OpenMP programming. 2815-2841 - Feifei Deng, Guangjun Xie, Renjun Zhu, Yongqiang Zhang:

A matrix representation method for decoders using majority gate characteristics in quantum-dot cellular automata. 2842-2859 - Rafael Rodríguez-Sánchez

, Francisco D. Igual
, Enrique S. Quintana-Ortí:
Integration and exploitation of intra-routine malleability in BLIS. 2860-2875 - Reza Mohamadi Bahram Abadi, Amir Masoud Rahmani, Sasan Hossein Alizadeh

:
Challenges of server consolidation in virtualized data centers and open research issues: a systematic literature review. 2876-2927 - Reza Mohamadi Bahram Abadi, Amir Masoud Rahmani, Sasan Hossein Alizadeh

:
Correction to: Challenges of server consolidation in virtualized data centers and open research issues: a systematic literature review. 2928 - Yizhang Jiang, Anqi Bi

, Kaijian Xia, Jing Xue, Pengjiang Qian
:
Exemplar-based data stream clustering toward Internet of Things. 2929-2957 - Qi Yu

, Bruce R. Childers, Libo Huang, Cheng Qian, Zhiying Wang:
A quantitative evaluation of unified memory in GPUs. 2958-2985 - Kaiyi Zhao, Li Li, Saihua Cai

, Ruizhi Sun
:
An optimized time series combined forecasting method based on neural networks. 2986-3012 - Umasankararao Varri

, Syamkumar Pasupuleti
, K. V. Kadambari:
A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments. 3013-3042 - Cong Thuan Do, Hong Jun Choi, Sung Woo Chung, Cheol Hong Kim

:
A novel warp scheduling scheme considering long-latency operations for high-performance GPUs. 3043-3062 - Mohammad Sayad Haghighi

, Faezeh Farivar
, Alireza Jolfaei
, Mohammad Hesam Tadayon:
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack. 3063-3085 - Mahdi Nikooghadam, Haleh Amintoosi

:
Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP. 3086-3104 - Mahdi Abbasi

, Saeideh Vesaghati Fazel, Milad Rafiee
:
MBitCuts: optimal bit-level cutting in geometric space packet classification. 3105-3128 - Juan Fang

, Mengxuan Wang, Zelin Wei:
A memory scheduling strategy for eliminating memory access interference in heterogeneous system. 3129-3154 - Misun Yu

, Yu-Seung Ma
, Doo-Hwan Bae:
Correction to: Efficient noise injection for exposing hidden data races. 3155
Volume 76, Number 5, May 2020
- Editor's note. 3157

- Yongxun Liu, Jingyun Zhao, Yonggang Yao, Qiuxia Cao, Jichao Cui:

High-speed parallel robot dynamic modelling based on PLC. 3158-3172 - Xudong Sun, Ke Zhu, Xiaogang Jiang, Yande Liu

:
Non-destructive detection of blackheart and soluble solids content of intact pear by online NIR spectroscopy. 3173-3187 - (Withdrawn) Agent-based supply chain allocation model and its application in smart manufacturing enterprises. 3188-3198

- Xiuzhen Hu, Haixia Long, Chang-jiang Ding, Su-juan Gao, Rui Hou:

Using random forest algorithm to predict super-secondary structure in proteins. 3199-3210 - Hao Wang, Senbing Wei, Baofu Fang:

Facial expression recognition using iterative fusion of MO-HOG and deep features. 3211-3221 - Shaoqun Qi, Luhe Wan

, Baoling Fu:
Multisource and multiuser water resources allocation based on genetic algorithm. 3222-3230 - Quan Shao, Meng Jia, Chenchen Xu

, Yan Zhu:
Multi-helicopter collaborative search and rescue operation research based on decision-making. 3231-3251 - Yuqing He, Pingjiang Lu, Lujiu Deng, Jianguo Yin, Yuanyuan He, Zhenghua Zhang, Hongbin He:

Fast distribution network reconfiguration algorithm based on minus feasibility analysis unit. 3252-3265 - Xiaojun Liu, Mengmeng Wang, Hanliang Fu

:
Visualized analysis of knowledge development in green building based on bibliographic data mining. 3266-3282 - Huimin Li, Qinpu Zhang, Zuolong Zheng:

Research on enterprise radical innovation based on machine learning in big data background. 3283-3297 - (Withdrawn) Research on data aggregation and transmission planning with Internet of Things technology in WSN multi-channel aware network. 3298-3307

- Quan Shao, Chenchen Xu

, Yu Zhou, Hongji Dong:
Cast shadow detection based on the YCbCr color space and topological cuts. 3308-3326 - Baofu Fang, Lu Fang:

Concise feature pyramid region proposal network for multi-scale object detection. 3327-3337 - Xin Jin, Kaixuan Zhao, Jiangtao Ji, Zhaomei Qiu, Zhitao He, Hao Ma:

Design and experiment of intelligent monitoring system for vegetable fertilizing and sowing. 3338-3354 - Jing Yang

, Na Li, Ning An
, Yu Chen, Gil Alterovitz:
An efficient causal structure learning algorithm for linear arbitrarily distributed continuous data. 3355-3363 - Anji Yu, Shimin Yang:

Research on web server cluster load balancing algorithm in web education system. 3364-3373 - (Withdrawn) Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC-BA). 3374-3390

- Xiaojuan Wang, Lanshan Gan, Songlin Liu:

Research on intelligence analysis technology of financial industry data based on genetic algorithm. 3391-3401 - Jiao Feng, Wen Liu, Peng Li, Johnson Zhang:

Network-enabled MIMO systems with distributed data processing. 3402-3415 - Muhammad Zuhair Qadir

, Songhao Piao
, Haiyang Jiang, Mohammed El Habib Souidi:
A novel approach for multi-agent cooperative pursuit to capture grouped evaders. 3416-3426 - Ke Duan:

Research on optimization and application of evaluation algorithm for intelligent city. 3427-3439 - Sultan Saeed Alzahrani

:
Investigation of teachers' perspective about Early Intervention services. 3440-3461 - Zuyi Yu, Weiwei Nie, Weidong Zhou, Fangzhou Xu, Shasha Yuan, Yan Leng

, Qi Yuan
:
Epileptic seizure prediction based on local mean decomposition and deep convolutional neural network. 3462-3476 - Qifeng Wei, Xin Gu, Yuan Yuan

:
On the structural evolution of the knowledge network and behaviors of the knowledge subjects. 3477-3493 - Yue-Feng Zheng, Ying Li, Gang Wang, Yupeng Chen, Qian Xu, Jia-Hao Fan, Xue-Ting Cui:

A hybrid feature selection algorithm for microarray data. 3494-3526 - Ruiying Wang, Guoping He, Xiaoming Wu, Fuqiang Wang, Yifan Hu

:
Research on suboptimal energy balance of non-uniform distributed nodes in WSN. 3527-3541 - Wei Liu, Quan Wang, Yunlong Zhu, Hanning Chen

:
GRU: optimization of NPI performance. 3542-3554 - Iftikhar Ahmad

, Gulzar Ahmed, Syed Adeel Ali Shah, Ejaz Ahmed:
A decade of big data literature: analysis of trends in light of bibliometrics. 3555-3571 - Yongqing Zhu

, Juniarto Samsudin
, Renuga Kanagavelu, Weiwen Zhang, Long Wang, Theint Theint Aye, Rick Siow Mong Goh:
Fast Recovery MapReduce (FAR-MR) to accelerate failure recovery in big data applications. 3572-3588
- Editor's note. 3589

- Shouqiang Chen, Yang Chen, Feng Yuan, Xiaowei Chang:

Establishment of herbal prescription vector space model based on word co-occurrence. 3590-3601 - Chundong Lv, Jia Wang

, Fanfei Zhang:
Forest fire spread model based on the grey system theory. 3602-3614 - Qun Gu, Xiaohong Hao:

Adaptive iterative learning control based on particle swarm optimization. 3615-3622 - Shurong Shi, Yi Li, Chuang Wang:

Robust continuous piecewise linear regression model with multiple change points. 3623-3645 - Haoli Xu, Daqing Wang, Zhengdong Deng, Zhibin Ding, Zhixin Liu, Guangyuan Wang, Borui Ni:

Application of remote sensing fuzzy assessment method in groundwater potential in Wailingding Island. 3646-3658 - Xinyu Pan, Jing-zhong Ma, Cheng-xia Wu:

Decision game of data sharing in supply chain enterprises considering data value over time. 3659-3672 - He Weijun, Wang Hui, Lin Ling, Thomas Stephen Ramsey, Zhengwei Huang:

Study of e-smile service influence on customers' satisfaction in social business context. 3673-3688 - Song Shijun:

Risk management and countering measurements by computer modeling and simulation technology in the approval and early preparation stages of a large international project. 3689-3701 - Meihong Wu:

Heuristic parallel selective ensemble algorithm based on clustering and improved simulated annealing. 3702-3712 - Ruishi Liang

, Mingzhi Mao, Hui Ma, Huan Wang:
A new goal ordering for incremental planning. 3713-3728 - Zhao Li, Jun Wu, Xiaofeng Zhang, Jingsha He, Peng Chen, Keqing He:

Using metadata for recommending business process. 3729-3748 - Jianjun Ye

, Xingyu Huang, Yanglin Cheng, Junda Shao, Yuan Zhang:
Air volume improvement in the duct system in frost-free refrigerators based on the CFD method. 3749-3764 - B. Arunsundar

, P. Sakthivel, E. Natarajan:
Analysis of energy consumption and latency in advanced wireless networks through DRX mechanism. 3765-3787 - T. J. Nikose, Ranjan S. Sonparote:

Computing dynamic across-wind response of tall buildings using artificial neural network. 3788-3813 - Fenil C. Panwala

, Rajagopal Kumar
:
Asymmetric sifter-shaped microchannel network in biological MEMS for size- and mass-based mammalian cell sorting and separation using hydrodynamic technique. 3814-3846 - Qiao Ming Peng, Lin Hui, Kuei Min Wang, Liang Cheng Chang:

Effectiveness analysis of an IoT mechanism in support of monitoring Chinese white dolphins by simulation model. 3847-3865 - Minchul Lee, Sieun Jeon, Min Song

:
Characterizing user interest in NoSQL databases of social question and answer data. 3866-3881 - Hyeonseo Lee

, Nakyeong Lee, Harim Seo, Min Song
:
Developing a supervised learning-based social media business sentiment index. 3882-3897 - Alfredo Cuzzocrea, Nickerson Ferreira

, Pedro Furtado
:
A rewrite/merge approach for supporting real-time data warehousing via lightweight data integration. 3898-3922
Volume 76, Number 6, June 2020
- Editor's note. 3923

- Adnan Amin

, Feras N. Al-Obeidat
, Babar Shah
, May Al Taei, Changez Khan, Hamood Ur Rehman Durrani, Sajid Anwar
:
Just-in-time customer churn prediction in the telecommunication sector. 3924-3948 - E. A. Neeba

, S. Koteeswaran
, Malarvizhi N
:
Swarm-based clustering algorithm for efficient web blog and data classification. 3949-3962 - Priyan Malarvizhi Kumar

, Usha Devi Gandhi
:
Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application. 3963-3983 - Ramachandran Alagarsamy

, S. A. Sahaaya Arul Mary
:
Intelligent rule-based approach for effective information retrieval and dynamic storage in local repositories. 3984-3998 - J. Midhunchakkaravarthy

, S. Selva Brunda:
Feature fatigue analysis of product usability using Hybrid ant colony optimization with artificial bee colony approach. 3999-4016 - Shobharani Pacha

, Suresh Ramalingam Murugan, R. Sethukarasi
:
Semantic annotation of summarized sensor data stream for effective query processing. 4017-4039 - Shobharani Pacha

, Suresh Ramalingam Murugan, R. Sethukarasi
:
Correction to: Semantic annotation of summarized sensor data stream for effective query processing. 4040 - Jianguo Sun, Wenshan Wang, Liang Kou, Yun Lin

, Liguo Zhang, Qingan Da, Lei Chen:
A data authentication scheme for UAV ad hoc network communication. 4041-4056 - Gourav Bathla

, Himanshu Aggarwal
, Rinkle Rani:
A graph-based model to improve social trust and influence for social recommendation. 4057-4075 - Weixin Hua, Dejun Mu, Zhigao Zheng, Dawei Guo:

Online multi-person tracking assist by high-performance detection. 4076-4094 - Guohui Di

, Fulin Su, Xinbo Xu:
Cross-range scaling of inverse synthetic aperture radar images with complex moving targets based on parameter estimation. 4095-4116 - Xiaoming Dong, Meng Qian, Rong Jiang:

Packet classification based on the decision tree with information entropy. 4117-4131 - Ying Sun, Jiabing Hu

, Gongfa Li, Guozhang Jiang, Hegen Xiong, Bo Tao, Zujia Zheng, Du Jiang:
Gear reducer optimal design based on computer multimedia simulation. 4132-4148 - Wenxu Zhang, Lei Ma

, Xiaonan Li
, W. Zhang:
Research and application of fuzzy decision based on multi-agent system. 4149-4168 - R. Kishorekumar

, P. Deepa:
A framework for semantic image annotation using LEGION algorithm. 4169-4183 - K. Paul Joshua

, J. Mohanalin, S. T. Jaya Christa
:
Adaptive neuro-fuzzy inference system based under-frequency load shedding for Tamil Nadu. 4184-4198 - Naveen Jegan

, P. J. A. Alphonse, Sivaraj Chinnasamy
:
3D grid clustering scheme for wireless sensor networks. 4199-4211 - Jiawei Han

, Yanheng Liu, Xin Sun
, Aiping Chen:
A self-adjusting quantum key renewal management scheme in classical network symmetric cryptography. 4212-4230 - Jiawei Han

, Yanheng Liu, Xin Sun
, Aiping Chen:
Correction to: A self-adjusting quantum key renewal management scheme in classical network symmetric cryptography. 4231 - S. Suresh

, N. Sankar Ram:
Feasible DDoS attack source traceback scheme by deterministic multiple packet marking mechanism. 4232-4246 - B. Reshmi

, P. Poongodi:
Profit and resource availability-constrained optimal handling of high-performance scientific computing tasks. 4247-4261 - Annamalai Suresh

, Rajagopal Kumar
, R. Varatharajan:
Health care data analysis using evolutionary algorithm. 4262-4271 - L. Sharmila

, U. Sakthi
:
An artificial immune system-based algorithm for abnormal pattern in medical domain. 4272-4286 - U. Vignesh

, R. Parvathi
:
3D visualization and cluster analysis of unstructured protein sequences using ARCSA with a file conversion approach. 4287-4301 - U. Nilabar Nisha, A. Mahabub Basha:

Triangular fuzzy-based spectral clustering for energy-efficient routing in wireless sensor network. 4302-4327 - (Withdrawn) Big data analytic diabetics using map reduce and classification techniques. 4328-4337

- Priti Subramanium

, Rajeshree D. Raut:
AI-enabled turbo-coded OFDM system for improved BER performance. 4338-4348 - S. Kavi Priya

, G. Shenbagalakshmi, T. Revathi:
Applied fuzzy heuristics for automation of hygienic drinking water supply system using wireless sensor networks. 4349-4375 - Shadi A. Aljawarneh

, Vangipuram Radhakrishna
:
GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. 4376-4413 - Abdulaziz Alarifi, Amr Tolba

, Zafer Al-Makhadmeh
, Wael Said
:
A big data approach to sentiment analysis using greedy feature selection with cat swarm optimization-based long short-term memory neural networks. 4414-4429 - V. Nandini

, P. Uma Maheswari
:
Automatic assessment of descriptive answers in online examination system using semantic relational features. 4430-4448 - S. Saravanan

, P. Sudhakar:
Analysis of mobile internet speed, signal strength and FMDH antenna design for improved internet speed. 4449-4475 - Rajarathinam Senthilkumar

, Ramasamy Kannan Gnanamurthy
:
A proposed method for the improvement in biometric facial image recognition using document-based classification. 4476-4494 - A. Arun

, M. Devaraju:
VLSI architecture of binary encoding technique for fast motion estimation based on Hamming distances. 4495-4507 - K. R. Prabha, M. Jagadeeswari:

A hybrid encoding method for reducing code stream in EICA-optimized SMVQ reversible data hiding. 4508-4524 - K. M. Baalamurugan

, S. Vijay Bhanu
:
A multi-objective krill herd algorithm for virtual machine placement in cloud computing. 4525-4542 - P. Jayarajan

, G. R. Kanagachidambaresan, T. V. P. Sundararajan
, K. Sakthipandi
, R. Maheswar
, A. Karthikeyan
:
An energy-aware buffer management (EABM) routing protocol for WSN. 4543-4555 - Natarajan Yuvaraj

, C. Suresh Ghana Dhas:
High-performance link-based cluster ensemble approach for categorical data clustering. 4556-4579
- Editor's note. 4580

- José M. Cecilia

, José M. García:
Re-engineering the ant colony optimization for CMP architectures. 4581-4602 - Dalvan Griebler

, Adriano Vogel
, Daniele De Sensi, Marco Danelutto
, Luiz Gustavo Fernandes
:
Simplifying and implementing service level objectives for stream parallelism. 4603-4628 - Juan A. Rico-Gallego

, Sergio Moreno-Álvarez
, Juan Carlos Díaz Martín, Alexey L. Lastovetsky
:
A tool to assess the communication cost of parallel kernels on heterogeneous platforms. 4629-4644 - Andrés Rodríguez

, Angeles G. Navarro
, Rafael Asenjo
, Francisco Corbera, Ruben Gran
, Darío Suárez Gracia
, José L. Núñez-Yáñez:
Parallel multiprocessing and scheduling on the heterogeneous Xeon+FPGA platform. 4645-4665 - Ksander Ejjaaouani

, Olivier Aumage, Julien Bigot
, Michel Mehrenberger, Hitoshi Murai, Masahiro Nakao, Mitsuhisa Sato:
InKS: a programming model to decouple algorithm from optimization in HPC codes. 4666-4681 - Antón Rey

, Francisco D. Igual
, Manuel Prieto-Matías
:
STEEL-RT: combining single task-single executor model and expanded scheduling to ease heterogeneity exploitation. 4682-4700 - Abolfazl Ghavidel, Yasser Sedaghat, Mahmoud Naghibzadeh:

Hybrid scheduling to enhance reliability of real-time tasks running on reconfigurable devices. 4701-4730 - Huihui Sun

, Sergei Gorlatch, Rongcai Zhao:
Vectorizing programs with IF-statements for processors with SIMD extensions. 4731-4746 - Mridul Haque, Dip Sankar Banerjee

:
Accelerating influence maximization using heterogeneous algorithms. 4747-4769
Volume 76, Number 7, July 2020
- Editor's note. 4771

- Jangirala Srinivas

, Ashok Kumar Das
, Joel J. P. C. Rodrigues:
2PBDC: privacy-preserving bigdata collection in cloud environment. 4772-4801 - Kayode Sakariyah Adewole

, Tao Han, Wanqing Wu, Houbing Song
, Arun Kumar Sangaiah
:
Twitter spam account detection based on clustering and classification methods. 4802-4837 - Li He, Zhicheng Qian

, Fengjun Shang:
A novel predicted replication strategy in cloud storage. 4838-4856 - Kuan Fan, Mingxi Liu, Guofang Dong, Wenbo Shi:

Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme. 4857-4883 - Rui Guo, Xiong Li

, Dong Zheng, Yinghui Zhang:
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud. 4884-4903 - Sein Myung, Jong-Hyouk Lee

:
Ethereum smart contract-based automated power trading algorithm in a microgrid environment. 4904-4914 - Ibrahim Abaker Targio Hashem

, Nor Badrul Anuar
, Mohsen Marjani
, Ejaz Ahmed, Haruna Chiroma, Ahmad Firdaus, Muhamad Taufik Abdullah
, Faiz Alotaibi
, Waleed Kamaleldin Mahmoud Ali, Ibrar Yaqoob
, Abdullah Gani
:
MapReduce scheduling algorithms: a review. 4915-4945 - Xingjun Zhang, Yi Cai, Yunfei Liu, Zhiwei Xu, Xiaoshe Dong

:
NADE: nodes performance awareness and accurate distance evaluation for degraded read in heterogeneous distributed erasure code-based storage. 4946-4975
- Editor's note. 4976

- Alexander Asp Bock

, Florian Biermann
:
Puncalc: task-based parallelism and speculative reevaluation in spreadsheets. 4977-4997 - Kento Emoto

, Fumihisa Sadahira:
A DSL for graph parallel programming with vertex subsets. 4998-5015 - Virginia Niculescu

, Frédéric Loulergue
:
Transforming powerlist-based divide-and-conquer programs for an improved execution model. 5016-5037 - Tomas Öhberg, August Ernstsson

, Christoph W. Kessler
:
Hybrid CPU-GPU execution support in the skeleton programming framework SkePU. 5038-5056 - Javier López-Gómez, David del Rio Astorga

, Manuel F. Dolz
, Javier Fernández
, José Daniel García:
Detecting semantic violations of lock-free data structures through C++ contracts. 5057-5078 - Victor Allombert

, Frédéric Gava:
Programming bsp and multi-bsp algorithms in ml. 5079-5097 - Fabian Wrede

, Christoph Rieger, Herbert Kuchen:
Generation of high-performance code based on a domain-specific language for algorithmic skeletons. 5098-5116 - Ari Rasch

, Julian Bigge, Martin Wrodarczyk, Richard Schulze, Sergei Gorlatch:
dOCAL: high-level distributed programming with OpenCL and CUDA. 5117-5138 - José Daniel García

, David del Rio Astorga
, Marco Aldinucci
, Fabio Tordini
, Marco Danelutto
, Gabriele Mencagli, Massimo Torquati
:
Challenging the abstraction penalty in parallel patterns libraries. 5139-5159
- Editor's note. 5160

- Chunyong Yin

, Lingfeng Shi, Ruxia Sun, Jin Wang
:
Improved collaborative filtering recommendation algorithm based on differential privacy protection. 5161-5174 - Li Tu, Shuai Liu

, Yan Wang, Chi Zhang, Ping Li:
An optimized cluster storage method for real-time big data in Internet of Things. 5175-5191 - Srimoyee Bhattacherjee, Rituparna Das, Sunirmal Khatua, Sarbani Roy

:
Energy-efficient migration techniques for cloud environment: a step toward green computing. 5192-5220 - Jun-Ho Huh

:
Reefer container monitoring system using PLC-based communication technology for maritime edge computing. 5221-5243 - Daeyong Jung

, Daewon Lee, Myungil Kim
, Hoyoon Kim, Seung-Keun Park
:
Mesh convergence test system in integrated platform environment for finite element analysis. 5244-5258 - Yunsik Son

, Junho Jeong
, Yangsun Lee
:
Design and implementation of an IoT-cloud converged virtual machine system. 5259-5275 - Songyuan Li

, Hong Shen, Yingpeng Sang, Hui Tian:
An efficient method for privacy-preserving trajectory data publishing based on data partitioning. 5276-5300 - Yonggun Kim, Yoojae Won:

A new cost-saving and efficient method for patch management using blockchain. 5301-5319 - Mikail Mohammed Salim, Shailendra Rathore, Jong Hyuk Park

:
Distributed denial of service attacks and its defenses in IoT: a survey. 5320-5363 - Gun Ho Lee

, Hee Seon Han:
Clustering of tourist routes for individual tourists using sequential pattern mining. 5364-5381 - Sul-Ho Kim, Seok-Woo Jang

, Jin-Ho Park, Gye-Young Kim
:
Robust hand pose estimation using visual sensor in IoT environment. 5382-5401 - Amanpreet Singh, Maninder Kaur

:
Intelligent content-based cybercrime detection in online social networks using cuckoo search metaheuristic approach. 5402-5424 - Younggiu Jung, Changmin Jeong:

Deep neural network-based automatic unknown protocol classification system using histogram feature. 5425-5441 - Beibei Pang, Fei Hao

, Yixuan Yang, Doo-Soon Park:
An efficient approach for multi-user multi-cloud service composition in human-land sustainable computational systems. 5442-5459 - Seong-Soo Han

, Yoon-Ki Kim
, You-Boo Jeon, JinSoo Park, Doo-Soon Park, DuHyun Hwang, Chang-Sung Jeong:
Distributed deep learning platform for pedestrian detection on IT convergence environment. 5460-5485 - Fei Ren, Xiaoliang Chen

, Fei Hao
, Yajun Du, Jianzhong Zheng:
OFNE: a framework of opinion features regulated network embedding. 5486-5500
- Kun Li

, Shigang Li
, Shan Huang, Yifeng Chen, Yunquan Zhang:
FastNBL: fast neighbor lists establishment for molecular dynamics simulation based on bitwise operations. 5501-5520 - Xiaojun Zuo, Ze Chen, Limian Dong, Jie Chang, Botao Hou:

Power information network intrusion detection based on data mining algorithm. 5521-5539 - Hamid Beigy

, Mohammad Reza Meybodi:
An iterative stochastic algorithm based on distributed learning automata for finding the stochastic shortest path in stochastic graphs. 5540-5562 - Jianli Bai

, Rong Hao:
Comment on "Privacy-preserving public auditing for non-manager group shared data". 5563-5577 - Mina Emami Khansari, Saeed Sharifian

:
A modified water cycle evolutionary game theory algorithm to utilize QoS for IoT services in cloud-assisted fog computing environments. 5578-5608 - Xiaofeng Yue, Hongbo Zhang:

Grasshopper optimization algorithm with principal component analysis for global optimization. 5609-5635 - Fernando G. Tinetti

, Maximiliano J. Perez, Ariel Fraidenraich, Adolfo E. Altenberg:
Legacy code and parallel computing: updating and parallelizing a numerical model. 5636-5654 - Vuthea Chheang

, Sangkwon Jeong, Gookhwan Lee, Jong-Sung Ha, Kwan-Hee Yoo:
Natural embedding of live actors and entities into 360° virtual reality scenes. 5655-5677
Volume 76, Number 8, August 2020
- P. Edwin Dhas, B. Sankara Gomathi

:
A novel clustering algorithm by clubbing GHFCM and GWO for microarray gene data. 5679-5693 - R. Krishnamurthy, T. Srinivas, Iraj Sadegh Amiri:

Physical layer impairment-aware shared path protection in wavelength-routed optical networks. 5694-5714 - Nachimuthu Madhavi, Muthusamy Madheswaran:

Enhanced lifetime of heterogeneous wireless sensor network using stable election protocol with region-based energy-conscious sink movement. 5715-5731 - Abraham Sudharson Ponraj

, T. Vigneswaran:
Daily evapotranspiration prediction using gradient boost regression model for irrigation planning. 5732-5744 - Deepak Raj Munirathinam

, Mohanasundaram Ranganadhan
:
A new improved filter-based feature selection model for high-dimensional data. 5745-5762 - (Withdrawn) Design and implementation of CfoTS networks for industrial fault detection and correction mechanism. 5763-5779

- R. Sivakumar, H. Mangalam

:
Ensemble hill climbing optimization in adaptive cruise control for safe automated vehicle transportation. 5780-5800 - P. Deepa, M. Suganthi:

A fuzzy shape representation of a segmented vessel tree and kernel-induced random forest classifier for the efficient prediction of lung cancer. 5801-5824 - Lourdes Mary Amulu, Ravi Ramraj:

Combinatorial meta-heuristics approaches for DVFS-enabled green clouds. 5825-5834 - M. Rajeev Kumar

, K. Arthi:
An effective non-cooperative iris recognition system using hierarchical collaborative representation-based classification. 5835-5848 - Sambit Satpathy

, Prakash Mohan
, Sanchali Das
, Swapan Debbarma
:
A new healthcare diagnosis system using an IoT-based fuzzy classifier with FPGA. 5849-5861 - P. Thirumoorthy

, P. Kalyanasundaram
, R. Maheswar
, P. Jayarajan, G. R. Kanagachidambaresan, Iraj S. Amiri:
Time-critical energy minimization protocol using PQM (TCEM-PQM) for wireless body sensor network. 5862-5872 - Kishore Raju Kalidindi

, Pardha Saradhi Varma Gottumukkala, Rajyalakshmi Davuluri
:
Derivative-based band clustering and multi-agent PSO optimization for optimal band selection of hyper-spectral images. 5873-5898 - Mohammed Mustafa, G. M. T. Abdalla

, Manimurugan Shanmuganathan
, Adel R. Alharbi:
Detection of heartbeat sounds arrhythmia using automatic spectral methods and cardiac auscultatory. 5899-5922 - Trupthi Mandhula, Suresh Pabboju

, Narsimha Gugulothu:
Predicting the customer's opinion on amazon products using selective memory architecture-based convolutional neural network. 5923-5947 - Raenu Kolandaisamy, Rafidah Md. Noor

, Muhammad Reza Z'aba, Ismail Ahmedy, Indraah Kolandaisamy
:
Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks. 5948-5970 - K. Saranya

, K. Premalatha:
Privacy-preserving data publishing based on sanitized probability matrix using transactional graph for improving the security in medical environment. 5971-5980 - C. Amuthadevi

, Gayathri Monicka Subarnan:
Development of fuzzy approach to predict the fetus safety and growth using AFI. 5981-5995 - G. Prakash, Raja Krishnamoorthy, P. T. Kalaivaani

:
Resource key distribution and allocation based on sensor vehicle nodes for energy harvesting in vehicular ad hoc networks for transport application. 5996-6009 - S. Malathy, Ravi Rastogi

, R. Maheswar
, G. R. Kanagachidambaresan, T. V. P. Sundararajan, Dhasarathan Vigneswaran
:
A novel energy-efficient framework (NEEF) for the wireless body sensor network. 6010-6025 - J. Raja, M. Ramakrishnan:

Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location. 6026-6039 - R. Mythili

, Revathi Venkataraman
, T. Sai Raj:
An attribute-based lightweight cloud data access control using hypergraph structure. 6040-6064 - C. A. S. Deiva Preetha, Subburaj Ramasamy:

Nonparametric dynamically weighted combination model to determine when to stop testing. 6065-6082 - N. Mohan:

Multi-Bearer Coordinate Grouping-Based Code Division Multiple Access for data communication in wireless network. 6083-6093 - S. Kumaresan, Vijayaragavan Shanmugam

:
Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile. 6094-6112 - Wenwei Cai, Jiaxian Zhu, Weihua Bai, Weiwei Lin, Naqin Zhou, Keqin Li:

A cost saving and load balancing task scheduling model for computational biology in heterogeneous cloud datacenters. 6113-6139
- Editor's note. 6140

- Hwa-Young Jeong

:
ANP-based quantification method for the smart manufacturing system design decomposition. 6141-6157 - Shih-Nung Chen, Jason Chi-Shun Hung, Chun-Chia Wang:

Large dynamic tiled display system implementation and application. 6158-6176 - Jun-Hong Shen, Cheng-Jung Yu, Ching-Ta Lu, WenYen Lin, Neil Y. Yen, Tien-Chi Huang

, Hong-Ray Chu:
Spatial air index with neighbor information for processing k-nearest neighbor searches in IoT mobile computing. 6177-6194 - Min-Kuan Chang

, Yung-Jen Mei, Yu-Wei Chan
, Mei-Yu Wu, Wun-Ren Chen:
Matching game-based hierarchical spectrum sharing in cooperative cognitive radio networks. 6195-6218 - Faheem Akhtar

, Jianqiang Li
, Muhammad Azeem, Shi Chen, Hui Pan, Qing Wang, Ji-Jiang Yang:
Effective large for gestational age prediction using machine learning techniques with monitoring biochemical indicators. 6219-6237 - Xianchuan Wang, Sulan Zhang, Shan Gao, Mian Zhang, Jie Zhang, Xianchao Wang, Zheng Xu:

Response time of a ternary optical computer that is based on queuing systems. 6238-6257 - Rong-Chang Chen, Chen-Yi Lin

:
An efficient two-stage method for solving the order-picking problem. 6258-6279 - Chun-Tai Yen, ChenKun Tsung

, Wen-Fang Wu:
Detecting removed attributes in the cyber system for smart manufacturing. 6280-6301 - Seyedeh Monireh Ggasemnezhad Kashikolaei, Ali Asghar Rahmani Hosseinabadi

, Behzad Saemi
, Morteza Babazadeh Shareh, Arun Kumar Sangaiah
, Gui-Bin Bian:
An enhancement of task scheduling in cloud computing based on imperialist competitive algorithm and firefly algorithm. 6302-6329 - Binbin Yong, Liang Huang, Fucun Li, Jun Shen

, Xin Wang, Qingguo Zhou
:
A research of Monte Carlo optimized neural network for electricity load forecast. 6330-6343 - Chao-Tung Yang

, Endah Kristiani
, Yuan-Ting Wang, Geyong Min, Ching-Han Lai, Wei-Je Jiang:
On construction of a network log management system using ELK Stack with Ceph. 6344-6360 - Tsan-Ching Kang

, Chia-Hsien Wen, Shih-Wei Guo
, Wei-Yueh Chang, Chen-Lin Chang:
The implementation of an IoT-based exercise improvement system. 6361-6375 - Kyoungsoo Bok, Jieun Han, Jongtae Lim, Jaesoo Yoo

:
Provenance compression scheme based on graph patterns for large RDF documents. 6376-6398 - Qing Zhao, Dan Wang, Jianqiang Li, Faheem Akhtar

:
Exploiting the concept level feature for enhanced name entity recognition in Chinese EMRs. 6399-6420 - Seongchul Park

, Sanghyun Seo
, Changhoon Jeong, Juntae Kim:
The weights initialization methodology of unsupervised neural networks to improve clustering stability. 6421-6437 - Jun-Cheol Jeon

:
Low-complexity QCA universal shift register design using multiplexer and D flip-flop based on electronic correlations. 6438-6452 - Chih-Kun Ke

, Chiao-Min Chang:
Optimizing target selection complexity of a recommendation system by skyline query and multi-criteria decision analysis. 6453-6474 - Neil Y. Yen, Jia-Wei Chang

, Jia-Yi Liao, You-Ming Yong:
Analysis of interpolation algorithms for the missing values in IoT time series: a case of air quality in Taiwan. 6475-6500 - Hsiu-An Lee, Hsiao-Hsien Rau, Louis R. Chao, Chien-Yeh Hsu:

Establishing a survival probability prediction model for different lung cancer therapies. 6501-6514 - Zhong-xun Wang, Yan-fang Dong, Zhan-kai Bao

:
Optimal algorithm for Multi-hop relay selection based on cognitive radio. 6515-6531
Volume 76, Number 9, September 2020
- R. Lakshmi Devi

, V. Kalaivani
:
Machine learning and IoT-based cardiac arrhythmia diagnosis using statistical and dynamic features of ECG. 6533-6544 - Joshua Arul Kumar Ranjan

, Titus Sigamani
, Janet Barnabas
:
A novel and efficient classifier using spiking neural network. 6545-6560 - Lijuan Zhang:

Feature mining simulation of video image information in multimedia learning environment based on BOW algorithm. 6561-6578 - Shuo Zhang, Yaping Liu, Ning Hu, Ning Zhou:

A novel cost-aware algorithm for dynamic task placement problem in a heterogeneous Internet-scale data center. 6579-6598 - Vanaja Ramaswamy

, Saswati Mukherjee:
An effective clinical decision support system using swarm intelligence. 6599-6618 - Sayan Goswami

, Ayam Pokhrel, Kisung Lee, Ling Liu, Qi Zhang, Yang Zhou:
GraphMap: scalable iterative graph processing using NoSQL. 6619-6647 - Partha Pratim Ray

, Dinesh Dash, Debashis De:
Real-time event-driven sensor data analytics at the edge-Internet of Things for smart personal healthcare. 6648-6668 - Maria Barreda

, José Ignacio Aliaga
, Vicenç Beltran, Marc Casas
:
Iteration-fusing conjugate gradient for sparse linear systems with MPI + OmpSs. 6669-6689 - Chuanlong Yin

, Yuefei Zhu, Shengli Liu, Jinlong Fei, Hetong Zhang:
Enhancing network intrusion detection classifiers using supervised adversarial training. 6690-6719 - Somnath Mazumdar

, Alberto Scionti:
Ring-mesh: a scalable and high-performance approach for manycore accelerators. 6720-6752 - Hamid Arabnejad, João Bispo, João M. P. Cardoso

, Jorge G. Barbosa
:
Source-to-source compilation targeting OpenMP-based automatic parallelization of C applications. 6753-6785 - Elmira Hatami, Bahman Arasteh

:
An efficient and stable method to cluster software modules using ant colony optimization algorithm. 6786-6808 - Shuai Zhou, Xianfu Meng

:
A location and time-aware resource searching scheme in mobile P2P ad hoc networks. 6809-6833 - José A. Moríñigo

, Pablo García-Muller
, Antonio J. Rubio-Montero
, Antonio Gómez-Iglesias, Norbert Meyer, Rafael Mayo García:
Performance drop at executing communication-intensive parallel algorithms. 6834-6859 - Reza Fotohi

, Somayyeh Firoozi Bari:
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. 6860-6886 - Ling Li

, Sida Dai, Zhiwei Cao, Jinghui Hong, Shu Jiang, Kunmeng Yang:
Using improved gradient-boosted decision tree algorithm based on Kalman filter (GBDT-KF) in time series prediction. 6887-6900 - Rajesh Devaraj

:
A solution to drawbacks in capturing execution requirements on heterogeneous platforms. 6901-6916 - Behnam Seyedi, Reza Fotohi

:
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things. 6917-6940 - Chunlin Li, Chengyi Wang, Youlong Luo:

An efficient scheduling optimization strategy for improving consistency maintenance in edge cloud environment. 6941-6968 - (Withdrawn) Detecting straggler MapReduce tasks in big data processing infrastructure by neural network. 6969-6993

- Chunlin Li, Jingpan Bai, Youlong Luo:

Efficient resource scaling based on load fluctuation in edge-cloud computing environment. 6994-7025 - Tansel Dökeroglu, Selen Pehlivan, Bilgin Avenoglu

:
Robust parallel hybrid artificial bee colony algorithms for the multi-dimensional numerical optimization. 7026-7046 - Mario A. Gomez-Rodriguez

, Víctor Jesús Sosa Sosa
, Jesús Carretero
, José Luis González
:
CloudBench: an integrated evaluation of VM placement algorithms in clouds. 7047-7080 - Kobra Mabodi, Mehdi Yusefi, Shahram Zandiyan, Leili Irankhah, Reza Fotohi

:
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. 7081-7106 - Yung-Ting Chuang

, Feng-Wei Li:
TCR: a trustworthy and churn-resilient academic distribution and retrieval system in P2P networks. 7107-7139 - Reza Ramezani

:
A prefetch-aware scheduling for FPGA-based multi-task graph systems. 7140-7160 - Jung-hyun Seo

, Hyeong-Ok Lee:
Design and analysis of the rotational binary graph as an alternative to hypercube and Torus. 7161-7176 - Abolfazl Gandomi

, Ali Movaghar
, Midia Reshadi, Ahmad Khademzadeh:
Designing a MapReduce performance model in distributed heterogeneous platforms based on benchmarking approach. 7177-7203 - Minseo Kang, Jae-Gil Lee:

Effect of garbage collection in iterative algorithms on Spark: an experimental analysis. 7204-7218 - Heithem Abbes

, Thouraya Louati, Christophe Cérin:
Dynamic replication factor model for Linux containers-based cloud systems. 7219-7241 - Ali Javed

, Khalid Mahmood Malik, Aun Irtaza, Hafiz Malik
:
A decision tree framework for shot classification of field sports videos. 7242-7267 - Kamalesh Karmakar

, Rajib Kumar Das, Sunirmal Khatua
:
Bandwidth allocation for communicating virtual machines in cloud data centers. 7268-7289 - Bin Liang, Xiaoshe Dong

, Yufei Wang, Xingjun Zhang:
A low-power task scheduling algorithm for heterogeneous cloud computing. 7290-7314 - Yukihiro Nomura

, Issei Sato, Toshihiro Hanawa, Shouhei Hanaoka, Takahiro Nakao, Tomomi Takenaga, Tetsuya Hoshino, Yuji Sekiya
, Soichiro Miki
, Takeharu Yoshikawa, Naoto Hayashi, Osamu Abe
:
Development of training environment for deep learning with medical images on supercomputer system based on asynchronous parallel Bayesian optimization. 7315-7332 - Rahul Priyadarshi

, Bharat Gupta, Amulya Anurag:
Deployment techniques in wireless sensor networks: a survey, classification, challenges, and future research issues. 7333-7373 - Riman Mandal, Manash Kumar Mondal, Sourav Banerjee

, Utpal Biswas:
An approach toward design and development of an energy-aware VM selection policy with improved SLA violation in the domain of green cloud computing. 7374-7393 - Parth Bir

, Shylaja Vinaykumar Karatangi, Amrita Rai
:
Design and implementation of an elastic processor with hyperthreading technology and virtualization for elastic server models. 7394-7415 - Mahila Dadfarnia, Fazlollah Adibnia

, Mahdi Abadi
, Ali Dorri:
Incremental collusive fraud detection in large-scale online auction networks. 7416-7437 - Mehdi Rajabzadeh

, Abolfazl Toroghi Haghighat, Amir Masoud Rahmani:
New comprehensive model based on virtual clusters and absorbing Markov chains for energy-efficient virtual machine management in cloud computing. 7438-7457 - Gopinath Chennupati

, Raviteja Vangara
, Erik Skau, Hristo N. Djidjev
, Boian S. Alexandrov
:
Distributed non-negative matrix factorization with determination of the number of latent features. 7458-7488 - Liangchen Chen

, Shu Gao, Baoxu Liu, Zhigang Lu, Zhengwei Jiang:
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection. 7489-7518 - Feng Wang, Yanjun Wu, Feiyue Huang:

Correction to: Rio: a personal storage system in multi-device and cloud. 7519
Volume 76, Number 10, October 2020
- Han Jun Bae, Lynn Choi

:
Filter cache: filtering useless cache blocks for a small but efficient shared last-level cache. 7521-7544 - Alireza Shirmarz

, Ali Ghaffari
:
Performance issues and solutions in SDN-based data center: a survey. 7545-7593 - Chunlin Li, Jing Zhang:

Dynamic cooperative caching strategy for delay-sensitive applications in edge computing environment. 7594-7618 - Wen Xiao

, Juan Hu:
SWEclat: a frequent itemset mining algorithm over streaming data using Spark Streaming. 7619-7634 - Fatemeh Ebadifard, Seyed Morteza Babamir

:
Scheduling scientific workflows on virtual machines using a Pareto and hypervolume based black hole optimization algorithm. 7635-7688 - You Fu, Wei Zhou

:
A novel parallel Markov clustering method in biological interaction network analysis under multi-GPU computing environment. 7689-7706 - Chunlin Li, Jianhang Tang, Youlong Luo:

Elastic edge cloud resource management based on horizontal and vertical scaling. 7707-7732 - Editor's note. 7733

- Justin JongSu Song

, Wookey Lee:
Relevance maximization for high-recall retrieval problem: finding all needles in a haystack. 7734-7757 - PhalPheaktra Chhaya

, Chi-Hwan Choi, Kyung-Hee Lee, Wan-Sup Cho, Young-Sung Lee:
KMLOD: linked open data service for Korean medical database. 7758-7776 - Jingwen Shang, Chaokun Wang, Changping Wang, Gaoyang Guo, Jun Qian:

An attribute-based community search method with graph refining. 7777-7804 - Jongtae Lim, Kyoungsoo Bok, Jaesoo Yoo

:
An efficient continuous range query processing scheme in mobile P2P networks. 7805-7819 - KyungSeok Ryu, Jooseok Park, JaeHong Park:

The influence of IT investment and IT governance on corporate performance of multibusiness firms. 7820-7846 - Svetlana Kim

, Suan Lee
, Jinho Kim, Yongik Yoon:
MRTensorCube: tensor factorization with data reduction for context-aware recommendations. 7847-7857 - Young-Seob Jeong, Sang-Hun Lee, Gahgene Gweon, Ho-Jin Choi

:
Discovery of topic flows of authors. 7858-7882 - Wenhao Gao, Wenjian Luo, Chenyang Bu

:
Adapting the TopLeaders algorithm for dynamic social networks. 7883-7905 - Hojin Seo, Kisung Park, Yongkoo Han, Hyunwook Kim, Muhammad Umair

, Kifayat-Ullah Khan, Young-Koo Lee
:
An effective graph summarization and compression technique for a large-scaled graph. 7906-7920 - Jihee Jung, Jang Hyun Baek

:
Reducing paging cost of tracking area list-based mobility management in LTE network. 7921-7935 - Ho-Jun Kim, Eun-Jeong Ko, Young-Ho Jeon, Ki-Hoon Lee

:
Techniques and guidelines for effective migration from RDBMS to NoSQL. 7936-7950 - Nakhoon Baek

:
An emulation scheme for OpenGL SC 2.0 over OpenGL. 7951-7960 - Dennis Heinrich

, Stefan Werner, Christopher Blochwitz, Thilo Pionteck
, Sven Groppe
:
Hardware-aided update acceleration in a hybrid Semantic Web database system. 7961-7984 - Yong-Yeon Jo, Myung-Hwan Jang, Sang-Wook Kim, Kyungsik Han

:
Efficient processing of recommendation algorithms on a single-machine-based graph engine. 7985-8002 - Jaewoong Kang

, Jongmo Kim, Seongil Lee, Mye M. Sohn
:
Transition activity recognition using fuzzy logic and overlapped sliding window-based convolutional neural networks. 8003-8020 - Linjing Zhao

, Xiaonan Zhang, Ying Han, Kang G. Shin:
Power saving with CoMP transmission for densely deployed small cell networks. 8021-8039 - Sang Il Lee

, Seong Joon Yoo:
Threshold-based portfolio: the role of the threshold and its applications. 8040-8057 - Sejin Chun, Jooik Jung, Xiongnan Jin

, Seungmin Seo
, Kyong-Ho Lee:
Designing an integrated knowledge graph for smart energy services. 8058-8085 - Mohammad Azam Khan

, Yong-Hwa Kim, Jaegul Choo
:
Intelligent fault detection using raw vibration signals via dilated convolutional neural networks. 8086-8100 - Hyeok-June Jeong, Suh-Yong Choi, Sung-Su Jang

, Young-Guk Ha:
Probability machine-learning-based communication and operation optimization for cloud-based UAVs. 8101-8117 - Seok Kang, Suan Lee

, Jinho Kim:
Distributed graph cube generation using Spark framework. 8118-8139 - Yangjun Chen, Bin Guo, Xingyue Huang:

δ-Transitive closures and triangle consistency checking: a new way to evaluate graph pattern queries in large graph databases. 8140-8174 - Jae-Gil Lee, Donghwan Bae, Sansung Kim, Jungeun Kim, Mun Yong Yi:

An effective approach to enhancing a focused crawler using Google. 8175-8192 - Han-Gyu Kim, Gil-Jin Jang, Yung-Hwan Oh, Ho-Jin Choi

:
Speech and music pitch trajectory classification using recurrent neural networks for monaural speech segregation. 8193-8213 - Jihee Jung, Azizbek Marakhimov, Jang Hyun Baek

:
Improvement and performance analysis of a power-saving mechanism considering traffic patterns. 8214-8224 - Jinwoo Kim

, Yonggeon Choi, MyungWook Park, Sangwoo Lee, Sunghoon Kim
:
Multi-sensor-based detection and tracking of moving objects for relative position estimation in autonomous driving conditions. 8225-8247 - Lkhagvadorj Battulga, Sang-Hyun Lee, Aziz Nasridinov, Kwan-Hee Yoo:

Hash-tree PCA: accelerating PCA with hash-based grouping. 8248-8264 - Sicong Kuang

, Brian D. Davison:
Learning class-specific word embeddings. 8265-8292 - Sicong Kuang

, Brian D. Davison:
Correction to: Learning class-specific word embeddings. 8293 - Sang Il Lee, Seong Joon Yoo:

Multimodal deep learning for finance: integrating and forecasting international stock markets. 8294-8312 - Nakhoon Baek, Kwan-Hee Yoo:

An accelerated rendering scheme for massively large point cloud data. 8313-8323 - Young-Seob Jeong, Kyo-Joong Oh, Chung-Ki Cho, Ho-Jin Choi:

Pseudo-random number generation using LSTMs. 8324-8342 - Yaming Zhang, Yaya Hamadou Koura

, Yanyuan Su:
Predator-prey approach in modeling users' data packets forwarding. 8343-8356 - Seokhyun Byun, Seunghyun Yoon, Kyomin Jung:

Comparative studies on machine learning for paralinguistic signal compression and classification. 8357-8371
Volume 76, Number 11, November 2020
- Zhi-Hao Wang, Gwo-Jiun Horng

, Tz-Heng Hsu, Aripriharta
, Gwo-Jia Jong:
Heart sound signal recovery based on time series signal prediction using a recurrent neural network in the long short-term memory model. 8373-8390 - Ping Zhao, Guanglin Zhang, Shaohua Wan

, Gaoyang Liu, Tariq Umer
:
A survey of local differential privacy for securing internet of vehicles. 8391-8412 - Fatih Özyurt

:
Efficient deep feature selection for remote sensing image recognition with fused deep learning architectures. 8413-8431 - Lingjun Zhao

, Chunhua Su, Zeyang Dai, Huakun Huang
, Shuxue Ding, Xinyi Huang, Zhaoyang Han:
Indoor device-free passive localization with DCNN for location-based services. 8432-8449 - Jun Hou

, Qianmu Li
, Shicheng Cui, Shunmei Meng, Sainan Zhang, Zhen Ni, Ye Tian:
Low-cohesion differential privacy protection for industrial Internet. 8450-8472 - Feng-Cheng Lin, Ngo Huu Huy

, Chyi-Ren Dow:
A cloud-based face video retrieval system with deep learning. 8473-8493 - Francisco José Orts Gómez

, Gloria Ortega
, Antonio Manuel Puertas
, Inmaculada García, Ester M. Garzón:
On solving the unrelated parallel machine scheduling problem: active microrheology as a case study. 8494-8509 - Reza Shahbazian

, Francesca Guerriero:
Optimized distributed large-scale analytics over decentralized data sources with imperfect communication. 8510-8528 - Yuntao Duan, Jiangdai Li, Gautam Srivastava

, Jyh-Haw Yeh:
Data storage security for the Internet of Things. 8529-8547 - Smarika Acharya, Abeer Alsadoon

, P. W. C. Prasad
, Salma Abdullah, Anand Deva
:
Deep convolutional network for breast cancer classification: enhanced loss function (ELF). 8548-8565 - Omar A. Alzubi

, Jafar Ahmad Abed Alzubi
, Osama M. Dorgham
, Mohammad M. Alsayyed
:
Cryptosystem design based on Hermitian curves for IoT security. 8566-8589 - Aditya Khamparia

, Deepak Gupta
, Victor Hugo C. de Albuquerque, Arun Kumar Sangaiah
, Rutvij H. Jhaveri
:
Internet of health things-driven deep learning system for detection and classification of cervical cells using transfer learning. 8590-8608 - Fatemeh Safara, Alireza Souri

, Thar Baker
, Ismaeel Al Ridhawi, Moayad Aloqaily
:
PriNergy: a priority-based energy-efficient routing method for IoT systems. 8609-8626 - Xingquan Li

, Cong Cao
, Tao Zhang:
Block diagonal dominance-based dynamic programming for detecting community. 8627-8640 - Ray-I Chang

, Yu-Hsuan Chiu, Jeng-Wei Lin
:
Two-stage classification of tuberculosis culture diagnosis using convolutional neural network with transfer learning. 8641-8656 - K. Vidhya

, R. Shanmugalakshmi:
Modified adaptive neuro-fuzzy inference system (M-ANFIS) based multi-disease analysis of healthcare Big Data. 8657-8678 - Maria Pantoja

, Maxence Weyrich, Gerardo Fernández-Escribano
:
Acceleration of MRI analysis using multicore and manycore paradigms. 8679-8690 - Shubhra Dwivedi, Manu Vardhan

, Sarsij Tripathi
:
Incorporating evolutionary computation for securing wireless network against cyberthreats. 8691-8728 - Meysam Ghahramani

, Reza Javidan, Mohammad Shojafar
:
A secure biometric-based authentication protocol for global mobility networks in smart cities. 8729-8755 - Lu Xiong, Guanrong Tang, Yeh-Cheng Chen, Yu-Xi Hu, Ruey-Shun Chen:

Color disease spot image segmentation algorithm based on chaotic particle swarm optimization and FCM. 8756-8770 - Andrés E. Tomás

, Enrique S. Quintana-Ortí:
Tall-and-skinny QR factorization with approximate Householder reflectors on graphics processors. 8771-8786 - Esteban Stafford

, José Luis Bosque
:
Improving utilization of heterogeneous clusters. 8787-8800 - Xiaoyi Deng

, Yenchun Jim Wu
, Fuzhen Zhuang:
Trust-embedded collaborative deep generative model for social recommendation. 8801-8829 - Antonio Jesús Muñoz-Montoro

, Raquel Cortina
, Sebastián García Galán
, Elías F. Combarro, José Ranilla
:
A score identification parallel system based on audio-to-score alignment. 8830-8844 - Bassam Shaer

, Lesley Ray, Jacob McBee, Anthony Graham, Connor Watkins
, Danita Lee Marcum:
Interactive capacitive touch music table with embedded microcontrollers. 8845-8865 - Mercedes Eugenia Paoletti

, Juan Mario Haut
, Javier Plaza
, Antonio Plaza
:
Scalable recurrent neural network for hyperspectral image classification. 8866-8882 - Maria Barreda, Manuel F. Dolz

, M. Asunción Castaño
, Pedro Alonso-Jordá
, Enrique S. Quintana-Ortí:
Performance modeling of the sparse matrix-vector product via convolutional neural networks. 8883-8900 - Ramin Gholami Taghizadeh, Reza Gholami Taghizadeh, Fahimeh Khakpash, Mohammadreza Binesh Marvasti

, Seyyed Amir Asghari
:
CA-Dedupe: content-aware deduplication in SSDs. 8901-8921 - Yong Zhang, Shao Yong Ma, Xi Zhang, Li Li

, Wai-Hung Ip
, Kai-Leung Yung
:
EDGAN: motion deblurring algorithm based on enhanced generative adversarial networks. 8922-8937 - Gulshan Kumar

, Kutub Thakur, Maruthi Rohit Ayyagari:
MLEsIDSs: machine learning-based ensembles for intrusion detection systems - a review. 8938-8971 - Krishnendu Guha

, Atanu Majumder, Debasri Saha, Amlan Chakrabarti:
Dynamic power-aware scheduling of real-time tasks for FPGA-based cyber physical systems against power draining hardware trojan attacks. 8972-9009 - Shengzan Yan, Lijun Xu, Shushan Wang:

Three-dimensional rapid registration and reconstruction of multi-view rigid objects based on end-to-end deep surface model. 9010-9030 - Emad Roshandel

, Faraj-Allah Dolatkhahi, Ali Hosseinzadeh, Hamid Davazdah-Emami:
Cyber-physical energy system toward safety in smart grids. 9031-9062 - Byron E. Moutafis, George A. Gravvanis, C. K. Filelis-Papadopoulos:

On the design of two-stage multiprojection methods for distributed memory systems. 9063-9094 - Anurina Tarafdar

, Mukta Debnath, Sunirmal Khatua
, Rajib Kumar Das:
Energy and quality of service-aware virtual machine consolidation in a cloud data center. 9095-9126 - Yi-Jen Su

, Wu-Chih Hu, Ji-Han Jiang, Ruei-Ye Su:
A novel LMAEB-CNN model for Chinese microblog sentiment analysis. 9127-9141 - Qi Tang

, Li-Hua Zhu, Jin Lian, Li Zhou, Ji-Bo Wei:
An efficient multi-functional duplication-based scheduling framework for multiprocessor systems. 9142-9167 - Mohammed Kayed

, Ahmed A. Elngar
:
NestMSA: a new multiple sequence alignment algorithm. 9168-9188 - Jose Carlos Romero

, Antonio Vilches, Andrés Rodríguez, Angeles G. Navarro
, Rafael Asenjo
:
ScrimpCo: scalable matrix profile on commodity heterogeneous processors. 9189-9210 - Stefan Kehrer, Wolfgang Blochinger:

Equilibrium: an elasticity controller for parallel tree search in the cloud. 9211-9245 - Mostafa Raeisi-Varzaneh

, Hossein Sabaghian Bidgoli
:
A Petri-net-based communication-aware modeling for performance evaluation of NOC application mapping. 9246-9269 - Mohamad Beheshti Roui

, S. Kazem Shekofteh
, Hamid Noori
, Ahad Harati:
Efficient scheduling of streams on GPGPUs. 9270-9302
Volume 76, Number 12, December 2020
- Chao-Tung Yang, Yuan-An Chen, Yu-Wei Chan, Chia-Lin Lee, Yu-Tse Tsan

, Wei-Cheng Chan, Po-Yu Liu:
Influenza-like illness prediction using a long short-term memory deep learning model with multiple open data sources. 9303-9329 - Muath Ibrahim Jarrah

, A. S. M. Jaya, Zakaria N. M. Alqattan, Mohd Asyadi Azam
, Rosni Abdullah, Hazim Jarrah
, Ahmed Ismail Abu-Khadrah:
A novel explanatory hybrid artificial bee colony algorithm for numerical function optimization. 9330-9354 - (Withdrawn) Multimodal transport path optimization model and algorithm considering carbon emission multitask. 9355-9373

- Pengxin Ding, Jianping Zhang, Huan Zhou, Xiang Zou, Minghui Wang

:
Pyramid context learning for object detection. 9374-9387 - Luis Costero

, Francisco D. Igual, Katzalin Olcoz, Francisco Tirado:
Leveraging knowledge-as-a-service (KaaS) for QoS-aware resource management in multi-user video transcoding. 9388-9403 - Xiaoxia Han

, Lin Yue, Yingchao Dong, Quanxi Xu, Gang Xie, Xinying Xu:
Efficient hybrid algorithm based on moth search and fireworks algorithm for solving numerical and constrained engineering optimization problems. 9404-9429 - János Végh

:
Finally, how many efficiencies the supercomputers have? 9430-9455 - Nuttapol Pakkaranang

, Poom Kumam
, Vasile Berinde
, Yusuf I. Suleiman
:
Superiorization methodology and perturbation resilience of inertial proximal gradient algorithm with application to signal recovery. 9456-9477 - Álvaro Ordóñez

, Francisco Argüello
, Dora B. Heras
, Begüm Demir
:
GPU-accelerated registration of hyperspectral images using KAZE features. 9478-9492 - Hamed Tabrizchi

, Marjan Kuchaki Rafsanjani
:
A survey on security challenges in cloud computing: issues, threats, and solutions. 9493-9532 - Paulo Pereira

, Jean Araujo
, Matheus Torquato
, Jamilson Dantas, Carlos Melo, Paulo R. M. Maciel:
Stochastic performance model for web server capacity planning in fog computing. 9533-9557 - Yuefan Deng

, Meng Guo
, Alexandre F. Ramos
, Xiaolong Huang
, Zhipeng Xu
, Weifeng Liu
:
Optimal low-latency network topologies for cluster performance enhancement. 9558-9584 - Ruitian Li, Liang Gong, Ming-hai Xu

:
A heterogeneous parallel Red-Black SOR technique and the numerical study on SIMPLE. 9585-9608 - Ali Al-Sinayyid

, Michelle Zhu:
Job scheduler for streaming applications in heterogeneous distributed processing systems. 9609-9628 - Raúl Moreno

, Enrique Arias
, Diego Cazorla
, Juan José Pardo
, Francisco J. Tapiador
:
Seeking the best Weather Research and Forecasting model performance: an empirical score approach. 9629-9653 - Jiawei Lu, Yain-Whar Si

:
Clustering-based force-directed algorithms for 3D graph visualization. 9654-9715 - Xiaoheng Deng

, Yuebin Xu, Lingchi Chen, Weijian Zhong, Alireza Jolfaei
, Xi Zheng
:
Dynamic clustering method for imbalanced learning based on AdaBoost. 9716-9738 - Sergio Moreno-Álvarez

, Juan Mario Haut
, Mercedes Eugenia Paoletti
, Juan A. Rico-Gallego
, Juan Carlos Díaz Martín, Javier Plaza
:
Training deep neural networks: a static load balancing approach. 9739-9754 - Anqing Zhu

:
Spatiotemporal feature mining algorithm based on multiple minimum supports of pattern growth in Internet of Things. 9755-9771 - Mohammed Kaity, Vimala Balakrishnan

:
An integrated semi-automated framework for domain-based polarity words extraction from an unannotated non-English corpus. 9772-9799 - Jincheng Jiang, Jinsong Chen, Chisheng Wang

:
Multi-granularity hybrid parallel network simplex algorithm for minimum-cost flow problems. 9800-9826 - Sergio Santander-Jiménez

, Miguel A. Vega-Rodríguez
, Antonio Zahinos-Márquez, Leonel Sousa
:
GPU acceleration of Fitch's parsimony on protein data: from Kepler to Turing. 9827-9853 - Mahdi Moodi, Mahdieh Ghazvini

, Hossein Moodi, Behnam Ghavami:
A smart adaptive particle swarm optimization-support vector machine: android botnet detection application. 9854-9881 - Subhayan Bhattacharya, Sankhamita Sinha, Sarbani Roy, Amarnath Gupta:

Towards finding the best-fit distribution for OSN data. 9882-9900 - Kapil Sharma

, Vivek Kumar Sehgal
:
Modern architecture for photonic networks-on-chip. 9901-9921 - Jesús Cámara

, Javier Cuenca
, Domingo Giménez:
Integrating software and hardware hierarchies in an autotuning method for parallel routines in heterogeneous clusters. 9922-9941 - Tarek Menouer

, Christophe Cérin, Ching-Hsien Hsu:
Opportunistic scheduling and resources consolidation system based on a new economic model. 9942-9975 - Valon Raca

, Eduard Mehofer:
clusterCL: comprehensive support for multi-kernel data-parallel applications in heterogeneous asymmetric clusters. 9976-10008 - Ihsan Ullah, Hee Yong Youn:

Efficient data aggregation with node clustering and extreme learning machine for WSN. 10009-10035 - Yunseok Chang

:
An enhanced rerouting cost estimation algorithm towards internet of drone. 10036-10049 - Sukhpal Singh Gill

, Xue Ouyang
, Peter Garraghan
:
Tails in the cloud: a survey and taxonomy of straggler management within large-scale cloud data centres. 10050-10089 - Yung-Kuan Chan

, Chun-Fu Hong, Meng-Hsiun Tsai, Ya-Lan Chang, Ping-Hsuan Sun:
Image-based stroke rat brain atrophy volume and infarct volume computation. 10090-10121 - Cristian Andy Tanase:

Dynamic scheduler implementation used for load distribution between hardware accelerators (RTL) and software tasks (CPU) in heterogeneous systems. 10122-10139 - SungJin Kim, Jaeik Cho, Changhoon Lee

, Taeshik Shon:
Smart seed selection-based effective black box fuzzing for IIoT protocol. 10140-10154 - Seyed-Sajad Ahmadpour

, Mohammad Mosleh
, Saeed Rasouli Heikalabad
:
The design and implementation of a robust single-layer QCA ALU using a novel fault-tolerant three-input majority gate. 10155-10185 - Asal Khanbadr, Mohammadreza Binesh Marvasti, Seyyed Amir Asghari

, Sohrab Khanbadr, Amir M. Rahmani
:
A novel method for victim block selection for NAND flash-based solid state drives based on scoring. 10186-10211 - Ying-Jhih Wu, Shuo-Ting Yu, Kuan-Chou Lai, Amit Chhabra

, Hsi-Ya Chang, Kuo-Chan Huang:
Two-level utilization-based processor allocation for scheduling moldable jobs. 10212-10239 - Kawsar Haghshenas, Siamak Mohammadi:

Prediction-based underutilized and destination host selection approaches for energy-efficient dynamic VM consolidation in data centers. 10240-10257 - Atanu Majumder, Sangeet Saha, Amlan Chakrabarti:

EAAM: Energy-aware application management strategy for FPGA-based IoT-Cloud environments. 10258-10287 - Krishan Kumar Sethi

, Dharavath Ramesh
:
A fast high average-utility itemset mining with efficient tighter upper bounds and novel list structure. 10288-10318 - Roshanak Abedini, Reza Ravanmehr

:
Parallel SEN: a new approach to improve the reliability of shuffle-exchange network. 10319-10353 - Amin Fadaeddini, Babak Majidi

, Mohammad Eshghi:
Secure decentralized peer-to-peer training of deep neural networks based on distributed ledger technology. 10354-10368

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














