We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Parallel implementation of discrete cosine transform and its inverse for image compression applications

    This paper presents the graphics processing unit (GPU) implementation of two-dimensional discrete cosine transform (2D DCT) and inverse discrete...

    Debasish Mukherjee in The Journal of Supercomputing
    Article 15 July 2024
  2. Secure query processing for smart grid data using searchable symmetric encryption

    In the last decade, the smart grid has utilized many modern technologies and applications compared with the conventional grid. Cloud computing offers...

    Samia Souror, Mohammed Badawy, Nawal El-Fishawy in The Journal of Supercomputing
    Article Open access 15 July 2024
  3. Conscious points and patterns extraction: a high-performance computing model for knowledge discovery in cognitive IoT

    Incorporating cognition into the design and architecture of the Internet of Things (IoT) has recently been the subject of much research, giving rise...

    Vidyapati Jha, Priyanka Tripathi in The Journal of Supercomputing
    Article 15 July 2024
  4. An empirical study on cross-component dependent changes: A case study on the components of OpenStack

    Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...

    Ali Arabat, Mohammed Sayagh in Empirical Software Engineering
    Article 13 July 2024
  5. A network intrusion detection system based on deep learning in the IoT

    As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...

    **ao Wang, Lie Dai, Guang Yang in The Journal of Supercomputing
    Article 13 July 2024
  6. A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification

    IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so...

    Furkh Zeshan, Zaineb dar, ... Tariq Malik in The Journal of Supercomputing
    Article 13 July 2024
  7. Research on satellite link allocation algorithm for Earth-Moon space information network

    With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...

    Weiwu Ren, Yuan Gao, ... Hongbing Chen in The Journal of Supercomputing
    Article 12 July 2024
  8. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
  9. Systematizing modeler experience (MX) in model-driven engineering success stories

    Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...

    Reyhaneh Kalantari, Julian Oertel, ... Silvia Abrahão in Software and Systems Modeling
    Article Open access 11 July 2024
  10. Machine learning-driven performance assessment of network-on-chip architectures

    System-on-chip designs for high-performance computing systems widely use network-on-chip (NoC) technology. The critical metrics such as latency,...

    Ramapati Patra, Prasenjit Maji, ... Hemanta Kumar Mondal in The Journal of Supercomputing
    Article 11 July 2024
  11. A new integrated steganography scheme for quantum color images

    In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...

    Yumin Dong, Rui Yan in The Journal of Supercomputing
    Article 10 July 2024
  12. Exploring recent advances in random grid visual cryptography algorithms

    Visual cryptography scheme is initiated to securely encode a secret image into multiple shares. The secret can be reconstructed by overlaying the...

    Neetha Francis, A. Lisha, Thomas Monoth in The Journal of Supercomputing
    Article 10 July 2024
  13. Cost-aware workflow offloading in edge-cloud computing using a genetic algorithm

    The edge-cloud computing continuum effectively uses fog and cloud servers to meet the quality of service (QoS) requirements of tasks when edge...

    Somayeh Abdi, Mohammad Ashjaei, Saad Mubeen in The Journal of Supercomputing
    Article Open access 10 July 2024
  14. An adaptive service deployment algorithm for cloud-edge collaborative system based on speedup weights

    In the contemporary landscape of edge computing, the deployment of services with stringent real-time requirements on edge devices is increasingly...

    Zhichao Hu, Sheng Chen, ... Gangyong Jia in The Journal of Supercomputing
    Article 09 July 2024
  15. iDOCEM

    In the business process lifecycle, models can be approached from two perspectives: on the one hand, models are used to create systems in the design...

    Charlotte Verbruggen, Alexandre Goossens, ... Monique Snoeck in Software and Systems Modeling
    Article 09 July 2024
  16. Exploring the potential of Wav2vec 2.0 for speech emotion recognition using classifier combination and attention-based feature fusion

    Abstract

    Self-supervised learning models, such as Wav2vec 2.0, extract efficient features for speech processing applications including speech emotion...

    Babak Nasersharif, Mohammad Namvarpour in The Journal of Supercomputing
    Article 09 July 2024
  17. Cost-effective clonal selection and AIS-based load balancing in cloud computing environment

    Cloud computing faces challenges in increasing efficiency through task scheduling and load balancing. Various load-balancing methods, including the...

    Melika Mosayebi, Reza Azmi in The Journal of Supercomputing
    Article 09 July 2024
  18. Requirements for modelling tools for teaching

    Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...

    Jörg Kienzle, Steffen Zschaler, ... Sofia Meacham in Software and Systems Modeling
    Article Open access 09 July 2024
  19. Real-time scheduling of power grid digital twin tasks in cloud via deep reinforcement learning

    As energy demand continues to grow, it is crucial to integrate advanced technologies into power grids for better reliability and efficiency. Digital...

    Daokun Qi, **aojuan **, ... Zhengwei Guo in Journal of Cloud Computing
    Article Open access 08 July 2024
  20. ASDMG: business topic clustering-based architecture smell detection for microservice granularity

    Microservices architecture smells can significantly affect the quality of microservices due to poor design decisions, especially the granularity...

    Sixuan Wang, Baoqing **, ... Shuhan Cheng in Software Quality Journal
    Article 08 July 2024
Did you find what you were looking for? Share feedback.