Journal: Cluster Computing

Volume 27, Issue 1

1 -- 26Devon Myers, Rami Mohawesh, Venkata Ishwarya Chellaboina, Anantha Lakshmi Sathvik, Praveen Venkatesh, Yi-Hui Ho, Hanna Henshaw, Muna Al-Hawawreh, David Berdik, Yaser Jararweh. Foundation and large language models: fundamentals, challenges, opportunities, and social impacts
27 -- 52Kamta Nath Mishra, Vandana Bhattacharjee, Shashwat Saket, Shivam P. Mishra. Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach
53 -- 70Sanna Mehraj Kak, Parul Agarwal, M. Afshar Alam, Farheen Siddiqui. A hybridized approach for minimizing energy in cloud computing
71 -- 90Abdul Jabbar Saeed Tipu, Padraig Ó Conbhuí, Enda Howley. Artificial neural networks based predictions towards the auto-tuning and optimization of parallel IO bandwidth in HPC system
91 -- 107Peng Zhou, Longxin Lin, Zhen Zhang 0017, Yuhui Deng, Tengjiao He. GHB: a cost-effective and energy-efficient data center network structure with greater incremental scalability
109 -- 117Puneet Sharma, Manoj Kumar, Ashish Sharma 0003. Machine learning based file type classifier designing in IoT cloud
119 -- 135Yuan Zhao 0003, Kang Chen, Zhisheng Ye 0003, Zhiyu Xiang, Qi Lu. Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure
137 -- 157Yunwei Jia, Keke Lu, Xia Li, Chenxiang Hao. SRG: a clustering algorithm based on scale division and region growing
159 -- 175Maribell Sacanamboy. Heuristic algorithm for task mapping problem in a hierarchical wireless network-on-chip architecture
177 -- 197Chunlin Li 0001, Kun Jiang, Xinyong Li, Libin Zhang, Youlong Luo. Single-tag and multi-tag RFID data cleaning approach in edge computing
199 -- 217Maryam Mirzapour-Moshizi, Vahid Sattari Naeini, Amir Sabbagh Molahosseini. Application placement in fog-cum-cloud environment based on a low latency policy-making framework
219 -- 229Ankur Jain, Chandrashekar Jatoth, G. R. Gangadharan. Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework
231 -- 267Malik Braik. Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images
269 -- 284Prakhar Sharma, W. Wilfred Godfrey, Aditya Trivedi. When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain
285 -- 297Lacchita Soni, Harish Chandra, Daya Sagar Gupta, Ram Keval. Quantum-resistant public-key encryption and signature schemes with smaller key sizes
299 -- 311Ali Hamdan Alenezi, Mahmoud Nazzal, Ahmed Sawalmeh, Abdallah Khreishah, Sihua Shao, Muhannad Almutiry. Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning
313 -- 324Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, José Rafael Buendía Rubio, Gérôme Bovet, Gregorio Martínez Pérez. Robust Federated Learning for execution time-based device model identification under label-flipping attack
325 -- 339Ahmed Cherif Mazari, Nesrine Boudoukhani, Abdelhamid Djeffal. BERT-based ensemble learning for multi-aspect hate speech detection
341 -- 376Mahfooz Alam, Mohammad Shahid, Suhel Mustajab. Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment
377 -- 394Chao Jing, Jiaming Li. CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server
395 -- 409Ramraj Dangi, Praveen Lalwani. Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network
411 -- 441Xian Wu, Wenju Zhou, Minrui Fei, Yonglu Du, Huiyu Zhou 0001. Banyan tree growth optimization and application
443 -- 455Rahim Sadigov, Elif Yildirim, Büsra Kocaçinar, Fatma Patlar Akbulut, Cagatay Catal. Deep learning-based user experience evaluation in distance learning
457 -- 476Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang, Zhen Li, Zhimin Yu, Hao Feng. File block multi-replica management technology in cloud storage
477 -- 497Liang Yang, Rong Jiang, Xuetao Pu, Chenguang Wang, Yue Yang, Meng Wang, Lin Zhang, Feifei Tian. An access control model based on blockchain master-sidechain collaboration
499 -- 513Prashant G. Ahire, Pramod D. Patil. CAC-WOA: context aware clustering with whale optimization algorithm for knowledge discovery from multidimensional space in electricity application
515 -- 529Haiying Liu, Kun Wu, Kuihua Huang, Guangquan Cheng, Rui Wang, Guohua Liu. Optimization of large-scale UAV cluster confrontation game based on integrated evolution strategy
531 -- 546Nisha Pal, Mahendra Pratap Yadav, Dharmendra Kumar-Yadav. Appropriate number of analogues in analogy based software effort estimation using quality datasets
547 -- 562Zaid Albataineh, Fatima Aldrweesh, Mohammad A. Alzubaidi. COVID-19 CT-images diagnosis and severity assessment using machine learning algorithm
563 -- 573Lavanya Settipalli, G. R. Gangadharan, Sivaiah Bellamkonda. An extended lightweight blockchain based collaborative healthcare system for fraud prevention
575 -- 587Abdelhak Goudjil, Mathieu Pouliquen, Eric Pigeon, Olivier Gehan. On-line outer bounding ellipsoid algorithm for clustering of hyperplanes in the presence of bounded noise
589 -- 605Chengfeng Jian, Zhuoyang Pan, Lukun Bao, Meiyu Zhang. Online-learning task scheduling with GNN-RL scheduler in collaborative edge computing
607 -- 627Paluck Arora, Rajesh Mehta, Rohit Ahuja. An adaptive medical image registration using hybridization of teaching learning-based optimization with affine and speeded up robust features with projective transformation
629 -- 654Zakaria Alomari, Mohammad Al-Oudat, Suboh Alkhushayni. Pricing the cloud based on multi-attribute auction mechanism
655 -- 671Ramesh Vatambeti, Srihari Varma Mantena, K. V. D. Kiran, M. Manohar, Chinthakunta Manjunath. Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique
673 -- 687Rashmi Kushwah. A novel traffic aware reliable gateway selection in wireless mesh network
689 -- 705Bhushan Inje, Kapil Kumar Nagwanshi, Radha Krishna Rambola. An efficient document information retrieval using hybrid global search optimization algorithm with density based clustering technique
707 -- 720Rima Grati, Faiza Loukil, Khouloud Boukadi, Mourad Abed. A blockchain-based framework for circular end-of-life vehicle processing
721 -- 735Shamsher Ullah, Jiangbin Zheng, Muhammad Tanveer Hussain, Muhammad Wasif Sardar, Muhammad Umar Farooq 0002, Salabat Khan. An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing
737 -- 760Sofian Kassaymeh, Mohammed Alweshah, Mohammed Azmi Al-Betar, Abdelaziz I. Hammouri, Mohammad Atwah Al-Ma'aitah. Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques
761 -- 785Rayees Ahamad, Kamta Nath Mishra. Hybrid approach for suspicious object surveillance using video clips and UAV images in cloud-IoT-based computing environment
787 -- 825Nazli Gulum Mutlu, Serkan Altuntas. Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms
827 -- 843Mahshid Rezakhani, Nazanin Sarrafzadeh-Ghadimi, Reza Entezari-Maleki, Leonel Sousa, Ali Movaghar 0001. Energy-aware QoS-based dynamic virtual machine consolidation approach based on RL and ANN
845 -- 858Mansoureh Zare, Yasser Elmi Sola, Hesam Hasanpour. Imperialist competitive based approach for efficient deployment of IoT services in fog computing
859 -- 873Mingliang Gao 0001, Alireza Souri, Mayram Zaker, Wenzhe Zhai, Xiangyu Guo, Qilei Li. A comprehensive analysis for crowd counting methodologies and algorithms in Internet of Things
875 -- 891Assia Brighen, Hachem Slimani, Abdelmounaam Rezgui, Hamamache Kheddouci. A new distributed graph coloring algorithm for large graphs
893 -- 912Muhammad Faraz Hyder, Tasbiha Fatima, Saadia Arshad. Towards adding digital forensics capabilities in software defined networking based moving target defense
913 -- 930Jiahui Ma, Jinxiang Chen, Ligang Dong, Xian Jiang. Research on placement of distributed SDN multiple controllers based on IAVOA
931 -- 944Gunaganti Sravanthi, Nageswara Rao Moparthi. Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT
945 -- 958Sarah Alhozaimy, Daniel A. Menascé, Massimiliano Albanese. Design and modeling of moving target defense in workflow-based applications
959 -- 976Poly Sil Sen, Nandini Mukherjee. An ontology-based approach to designing a NoSQL database for semi-structured and unstructured health data
977 -- 996Hela Taktak, Khouloud Boukadi, Firas Zouari, Chirine Ghedira Guégan, Michael Mrissa, Faïez Gargouri. A knowledge-driven service composition framework for wildfire prediction
997 -- 1015Debadatta Naik, Ramesh Dharavath, Lianyong Qi. Quantum-PSO based unsupervised clustering of users in social networks using attributes
1017 -- 1046Tianqi Bu, Zanyu Huang, Kairui Zhang, Yang Wang, Haobin Song, Jietong Zhou, Zhangjun Ren, Sen Liu. Task scheduling in the internet of things: challenges, solutions, and future trends
1047 -- 1061Jasleen Kaur, Rinkle Rani, Nidhi Kalra. Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS
1063 -- 1087Ridhima Rani, Neeraj Kumar 0001, Meenu Khurana. Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications
1089 -- 1108Alper Ozcan, Ahmet Kasif, Ismail Veli Sezgin, Cagatay Catal, Muhammad Sanwal, Hasan Merdun. Deep learning-based modelling of pyrolysis
1109 -- 1123Rong Gong, Delun Li, Lila Hong, Ningxin Xie. Task scheduling in cloud computing environment based on enhanced marine predator algorithm
1125 -- 1136Lei Zeng, Shadi G. Alawneh, Seyed Ali Arefifar. Parallel multi-GPU implementation of fast decoupled power flow solver with hybrid architecture
1137 -- 1158Huifang Li 0002, Bing Chen, Jingwei Huang, Julio Ruben Cañizares Abreu, Senchun Chai, Yuanqing Xia. Mutation-driven and population grouping PRO algorithm for scheduling budget-constrained workflows in the cloud