We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication

    The study of continuous natural or industrial phenomena in time and space requires the emergence of new wireless sensor networks. A virtual sensor...

    Adda Boualem, Marwane Ayaida, ... Hichem Sedjelmaci in Cluster Computing
    Article 04 July 2024
  2. Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing

    Self-adaptive deep learning techniques provide scalability and flexibility in deploying and administrating deep learning models in the cloud...

    Logesh Rajendran, Virendra Singh Shekhawat in Cluster Computing
    Article 04 July 2024
  3. Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting

    Real-time and accurate traffic flow forecasting plays a crucial role in transportation systems and holds great significance for urban traffic...

    **aohui Huang, Junyang Wang, ... Yuanchun Lan in Cluster Computing
    Article 04 July 2024
  4. VLSI implementation of an energy-efficient color image compressor using improved block truncation coding and enhanced Golomb-rice coding for wireless sensor networks

    The very large-scale integration implementation of a unique hardware-oriented image compression technique for wireless sensor networks (WSNs) is...

    R. Nirmala, S. Ariffa Begum, ... P. Ramya in The Journal of Supercomputing
    Article 04 July 2024
  5. PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model

    In the IIoT, billions of devices continually provide information that is extremely diverse, variable, and large-scale and presents significant...

    Sangeeta Sharma, Priyanka Verma, ... Rakesh Porika in Cluster Computing
    Article 04 July 2024
  6. A hybrid neural network for urban rail transit short-term flow prediction

    Accurate and rapid short-term passenger flow prediction is the foundation for safe and efficient operation of urban rail transit systems. The urban...

    Caihua Zhu, **aoli Sun, ... Yan Li in The Journal of Supercomputing
    Article 03 July 2024
  7. A robust two-step algorithm for community detection based on node similarity

    The rapid development of the internet and social network platforms has given rise to a new field of research, social network analysis. This field of...

    Bilal Lounnas, Makhlouf Benazi, Mohamed Kamel in The Journal of Supercomputing
    Article 03 July 2024
  8. LATA: learning automata-based task assignment on heterogeneous cloud computing platform

    A cloud computing environment is a distributed system where idle resources are accessible across a wide area network, such as the Internet. Due to...

    Soulmaz Gheisari, Hamid ShokrZadeh in The Journal of Supercomputing
    Article Open access 03 July 2024
  9. Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features

    Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to...

    Yahya Tashtoush, Moayyad Alajlouni, ... Omar Darwish in Cluster Computing
    Article 03 July 2024
  10. A cloud-fog distributed trust service for wireless sensor networks

    In wireless sensor networks (WSNs), data aggregation techniques are used to reduce energy consumption of the sensors and extend the network lifetime....

    Bader A. Ali, Hanady M. Abdulsalam, ... Eman Alroumi in The Journal of Supercomputing
    Article 03 July 2024
  11. Empowering e-learning approach by the use of federated edge computing

    Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires...

    Nouha Arfaoui, Amel Ksibi, ... Ridha Ejbali in Cluster Computing
    Article 03 July 2024
  12. IoV security and privacy survey: issues, countermeasures, and challenges

    As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...

    Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati in The Journal of Supercomputing
    Article 02 July 2024
  13. Hardware architecture and memristor-crossbar implementation of type-2 fuzzy system with type reduction and in-situ training

    The Type-2 fuzzy set is a fuzzy set with fuzzy membership degrees. This set is used when accurately determining the membership degree of a fuzzy set...

    Sajad Haghzad Klidbary, Mohammad Javadian in The Journal of Supercomputing
    Article 02 July 2024
  14. Proteo: a framework for the generation and evaluation of malleable MPI applications

    Applying malleability to HPC systems can increase their productivity without degrading or even improving the performance of running applications....

    Iker Martín-Álvarez, José I. Aliaga, ... Sergio Iserte in The Journal of Supercomputing
    Article Open access 02 July 2024
  15. Energy-Constrained DAG Scheduling on Edge and Cloud Servers with Overlapped Communication and Computation

    Mobile edge computing (MEC) has been widely applied to numerous areas and aspects of human life and modern society. Many such applications can be...

    Article 02 July 2024
  16. Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges

    Metaheuristic algorithms have wide applicability, particularly in wireless sensor networks (WSNs), due to their superior skill in solving and...

    Essam H. Houssein, Mohammed R. Saad, ... Hassan Shaban in Cluster Computing
    Article Open access 02 July 2024
  17. Service selection based on blockchain smart contracts in cloud-edge environment

    The rapid integration of cloud computing and edge computing has brought the cloud-edge environment into the spotlight in information technology....

    Yingying Ning, **g Li, ... Chuanxi Liu in Cluster Computing
    Article 02 July 2024
  18. Enhancing 3D localization in wireless sensor network: a differential evolution method for the DV-Hop algorithm

    Wireless sensor network is large-scale, self-organizing and reliable. It is widely used in the military, disaster management, environmental...

    Zhihua Liu, Ran Zhang, ... Jiaxing Chen in The Journal of Supercomputing
    Article 02 July 2024
  19. Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach

    The complex networks of manufacturers, suppliers, retailers, and customers that make up today’s pharmaceutical supply chain span worldwide. As it is,...

    Rahul Mishra, Dharavath Ramesh, ... Bhaskar Mondal in Cluster Computing
    Article 02 July 2024
  20. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

    Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in...

    Pranav Shrivastava, Bashir Alam, Mansaf Alam in Cluster Computing
    Article 02 July 2024
Did you find what you were looking for? Share feedback.