-
Semantically realizing discovery and composition for RESTful web services Computing (IF 3.7) Pub Date : 2024-04-23 Haijun Gu, Yingyu Ma, Siqi Wang, Xincheng Chen, Weihua Su
-
Generalizing truth discovery by incorporating multi-truth features Computing (IF 3.7) Pub Date : 2024-04-22 Xiu Susie Fang, Xianzhi Wang, Quan Z. Sheng, Lina Yao
-
Four vector intelligent metaheuristic for data optimization Computing (IF 3.7) Pub Date : 2024-04-18 Hussam N. Fakhouri, Feras M. Awaysheh, Sadi Alawadi, Mohannad Alkhalaileh, Faten Hamad
-
Improved optimal foraging algorithm for global optimization Computing (IF 3.7) Pub Date : 2024-04-17 Chen Ding, GuangYu Zhu
-
A two-phase method to optimize service composition in cloud manufacturing Computing (IF 3.7) Pub Date : 2024-04-15 Qiang Hu, Haoquan Qi, Yanzhe Jia, Lianen Qu
-
Identifying vital spreaders in complex networks based on the interpretative structure model and improved Kshell Computing (IF 3.7) Pub Date : 2024-04-14 Tianchi Tong, Qian Dong, Wenying Yuan, Jinsheng Sun
-
Online RSSI selection strategy for indoor positioning in low-effort training scenarios Computing (IF 3.7) Pub Date : 2024-04-12 Braulio Pinto, Horacio Oliveira
-
Qos-based web service selection using time-aware collaborative filtering: a literature review Computing (IF 3.7) Pub Date : 2024-04-09 Ezdehar Jawabreh, Adel Taweel
-
Optimization for energy-aware design of task scheduling in heterogeneous distributed systems: a meta-heuristic based approach Computing (IF 3.7) Pub Date : 2024-04-07 Cen Li, Liping Chen
-
Community anomaly detection in attribute networks based on refining context Computing (IF 3.7) Pub Date : 2024-04-04 Yonghui Lin, Li Xu, Wei Lin, Jiayin Li
With the widespread use of attribute networks, anomalous node detection on attribute networks has received increasing attention. By utilizing communities as reference contexts for local anomaly node detection, it is possible to uncover a multitude of significant anomalous nodes. However, most of the current methods that use communities as reference context of anomalous nodes usually do not consider
-
A hybrid energy-aware algorithm for virtual machine placement in cloud computing Computing (IF 3.7) Pub Date : 2024-04-03 Malek Yousefi, Seyed Morteza Babamir
Virtual Machine Placement (VMP) plays a significant role in improving efficiency of Cloud Data Center (CDC). With the dramatic increase in the use of cloud computing, it seems necessary to apply effective algorithms to reduce the power consumption of CDC. VMP is known as a NP-Hard problem that cannot be solved by deterministic algorithms in polynomial time. In this paper, an algorithm named Combinated
-
Cloud storage tier optimization through storage object classification Computing (IF 3.7) Pub Date : 2024-04-03
Abstract Cloud storage adoption has increased over the years given the high demand for fast processing, low access latency, and ever-increasing amount of data being generated by, e.g., Internet of Things applications. In order to meet the users’ demands and provide a cost-effective solution, cloud service providers offer tiered storage; however, keeping the data in one tier is not cost-effective. In
-
Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction Computing (IF 3.7) Pub Date : 2024-04-02 Xin Jiang, Hongbo Liu, Liping Yang, Bo Zhang, Tomas E. Ward, Václav Snášel
Link prediction aims to capture the evolution of network structure, especially in real social networks, which is conducive to friend recommendations, human contact trajectory simulation, and more. However, the challenge of the stochastic social behaviors and the unstable space-time distribution in such networks often leads to unexplainable and inaccurate link predictions. Therefore, taking inspiration
-
Person re-identification method based on fine-grained feature fusion and self-attention mechanism Computing (IF 3.7) Pub Date : 2024-03-25 Kangning Yin, Zhen Ding, Zhihua Dong, Xinhui Ji, Zhipei Wang, Dongsheng Chen, Ye Li, Guangqiang Yin, Zhiguo Wang
-
Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network Computing (IF 3.7) Pub Date : 2024-03-23 Rajesh Kumar Dhanaraj, Anamika Singh, Anand Nayyar
-
Categorical learning for automated network traffic categorization for future generation networks in SDN Computing (IF 3.7) Pub Date : 2024-03-23 Suguna Paramasivam, R. Leela Velusamy, J. V. Nishaanth
-
Influence maximization in mobile social networks based on RWP-CELF Computing (IF 3.7) Pub Date : 2024-03-21
Abstract Influence maximization (IM) problem for messages propagation is an important topic in mobile social networks. The success of the spreading process depends on the mechanism for selection of the influential user. Beside selection of influential users, the computation and running time should be considered in this mechanism to ensure the accurecy and efficient. In this paper, considering that
-
Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline Computing (IF 3.7) Pub Date : 2024-03-19 Tamer E. Fahim, Sherif I. Rabia, Ahmed H. Abd El-Malek, Waheed K. Zahra
-
An improved indicator-based two-archive algorithm for many-objective optimization problems Computing (IF 3.7) Pub Date : 2024-03-15 Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang
-
Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems Computing (IF 3.7) Pub Date : 2024-03-15 Jian Wan, Luc Jaulin
-
Employing topology modification strategies in scale-free IoT networks for robustness optimization Computing (IF 3.7) Pub Date : 2024-03-12 Zahoor Ali Khan, Muhammad Awais, Turki Ali Alghamdi, Nadeem Javaid
-
Preference based multi-issue negotiation algorithm (PMINA) for fog resource allocation Computing (IF 3.7) Pub Date : 2024-03-09 Shaifali Malukani, C. K. Bhensdadia
-
Time-sensitive propagation values discount centrality measure Computing (IF 3.7) Pub Date : 2024-03-04
Abstract The detection of influential individuals in social networks is called influence maximization which has many applications in advertising and marketing. Several factors including propagation delay affect the degree to which an individual influences the network. Many different methods, including centrality measures, identify high-influence individuals in social networks. The time-sensitive harmonic
-
Cloud data center cost management using virtual machine consolidation with an improved artificial feeding birds algorithm Computing (IF 3.7) Pub Date : 2024-03-02 Mohammad Ali Monshizadeh Naeen, Hamid Reza Ghaffari, Hossein Monshizadeh Naeen
-
Many-BSP: an analytical performance model for CUDA kernels Computing (IF 3.7) Pub Date : 2024-02-26 Ali Riahi, Abdorreza Savadi, Mahmoud Naghibzadeh
-
Electricity-cost-aware multi-workflow scheduling in heterogeneous cloud Computing (IF 3.7) Pub Date : 2024-02-24 Shuang Wang, Yibing Duan, Yamin Lei, Peng Du, Yamin Wang
-
Enhancing sine cosine algorithm based on social learning and elite opposition-based learning Computing (IF 3.7) Pub Date : 2024-02-24 Lei Chen, Linyun Ma, Lvjie Li
-
A multi-objective crow search algorithm for optimizing makespan and costs in scientific cloud workflows (CSAMOMC) Computing (IF 3.7) Pub Date : 2024-02-24 Reza Akraminejad, Navid Khaledian, Amin Nazari, Marcus Voelp
-
SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning Computing (IF 3.7) Pub Date : 2024-02-21 Jiuyun Xu, Yinyue Jiang, Hanfei Fan, Qiqi Wang
-
A comparative study of LSTM-ED architectures in forecasting day-ahead solar photovoltaic energy using Weather Data Computing (IF 3.7) Pub Date : 2024-02-20 Ekin Ekinci
-
Efficient processing of all neighboring object group queries with budget range constraint in road networks Computing (IF 3.7) Pub Date : 2024-02-16 Yuan-Ko Huang, Chien-Pang Lee
-
LGAT: a light graph attention network focusing on message passing for semi-supervised node classification Computing (IF 3.7) Pub Date : 2024-02-16
Abstract Deep learning has shown superior performance in various applications. The emergence of graph convolution neural networks (GCNs) enables deep learning to learn the latent representation from graph-structured data with rich attributes. To be specific, the message passing mechanism of GCNs can aggregate and update messages through the topological relationship between nodes in a graph. The graph
-
Edge data distribution as a network Steiner tree estimation in edge computing Computing (IF 3.7) Pub Date : 2024-02-08 Chinmaya Kumar Swain, Ravi Shankar, Aryabartta Sahu
-
Solving the SAT problem with the string multiset rewriting calculus Computing (IF 3.7) Pub Date : 2024-02-06
Abstract In this paper, we develop computing machinery within the framework of the String Multiset Rewriting calculus (SMSR), as defined by Barbuti et al. [4], to solve the SAT problem in linear time regarding the number of variables of a given conjunctive normal form. This shows that SMSR can be considered a computational model capable of significantly reducing the time requirement of classical decision
-
Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV) Computing (IF 3.7) Pub Date : 2024-02-05
Abstract Internet of Vehicles (IoV) aka V2X is a growing area of research that aims at information exchange between vehicles and all other related objects to develop intelligent transportation systems. IoVs are characterized by high mobility, high-speed internet, varying node density, and dynamic topology and aim to minimize and communicate situations like traffic congestion, accidents, etc. Discovering
-
A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization Computing (IF 3.7) Pub Date : 2024-02-03 Ehsan Heidari
-
Exact and sampling methods for mining higher-order motifs in large hypergraphs Computing (IF 3.7) Pub Date : 2024-02-01 Quintino Francesco Lotito, Federico Musciotto, Federico Battiston, Alberto Montresor
-
RUCIB: a novel rule-based classifier based on BRADO algorithm Computing (IF 3.7) Pub Date : 2024-02-01 Iman Morovatian, Alireza Basiri, Samira Rezaei
-
A priority aware local mutual exclusion algorithm for flying ad hoc networks Computing (IF 3.7) Pub Date : 2024-01-30 Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam
-
Community detection of weighted complex networks via transitive closure Computing (IF 3.7) Pub Date : 2024-01-29 Ahmadi Hasan, Ahmad Kamal
-
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things Computing (IF 3.7) Pub Date : 2024-01-26
Abstract With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture
-
Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion Computing (IF 3.7) Pub Date : 2024-01-25 Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun
-
Distributed mobile CEP for collaborative social computing Computing (IF 3.7) Pub Date : 2024-01-24 Alejandro Pérez-Vereda, Carlos Canal, Ramón Hervás
-
HHSE: heterogeneous graph neural network via higher-order semantic enhancement Computing (IF 3.7) Pub Date : 2024-01-22 Hui Du, Cuntao Ma, Depeng Lu, Jingrui Liu
-
Quantifying influential nodes in complex networks using optimization and particle dynamics: a comparative study Computing (IF 3.7) Pub Date : 2024-01-19
Abstract In this study, we propose a novel methodology called Particle Dynamics Method (PDM) for identifying and quantifying influential nodes in complex networks. Inspired by Newton’s three laws of motion and the universal gravitation law, PDM is based on a mathematical programming method that leverages node degrees and shortest path lengths. Unlike traditional centrality measures, PDM is easily adaptable
-
UAV-assisted wireless charging and data processing of power IoT devices Computing (IF 3.7) Pub Date : 2024-01-18
Abstract To ensure the reliability and operational efficiency of the grid system, this paper proposes an unmanned aerial vehicle (UAV)-assisted Power Internet of Things (PIoT), which obtains real-time grid data through PIoT devices to support the management optimization of the grid system. Compared with traditional UAV-assisted communication networks, this paper enables data collection and energy transmission
-
Nature-inspired donkey and smuggler algorithm for optimal data gathering in partitioned wireless sensor networks for restoring network connectivity Computing (IF 3.7) Pub Date : 2024-01-16 G. Rajeswari, R. Arthi, K. Murugan
-
High-performance microservice differentiated domain communication technology Computing (IF 3.7) Pub Date : 2024-01-13 Lei Zhang, Ke Pang, Jiangtao Xu
-
Automatic ECG classification using discrete wavelet transform and one-dimensional convolutional neural network Computing (IF 3.7) Pub Date : 2023-12-23 Armin Shoughi, Mohammad Bagher Dowlatshahi, Arefeh Amiri, Marjan Kuchaki Rafsanjani, Ranbir Singh Batth
-
On the average time complexity of computation with random partition Computing (IF 3.7) Pub Date : 2023-12-20 Mingxue Liao, Pin Lv
-
A novel optimization approach to topology checking of pipeline vector data in browser side Computing (IF 3.7) Pub Date : 2023-12-12 Weidong Li, Chunbo Shi, Yongbo Yu, Zhe Wang
-
1-D CNNs with lock-free asynchronous adaptive stochastic gradient descent algorithm for classification of astronomical spectra Computing (IF 3.7) Pub Date : 2023-12-11 Chuandong Qin, Yu Cao
-
Scheduling analysis and correction for dependent real-time tasks upon heterogeneous multiprocessor architectures Computing (IF 3.7) Pub Date : 2023-12-06 Faten Mrabet, Walid Karamti, Adel Mahfoudhi
-
Corporate social responsibility disclosure prediction using LSTM neural network Computing (IF 3.7) Pub Date : 2023-11-30 Abdulqader M. Almars, Khalid M. Alharbi
-
An effective representation learning model for link prediction in heterogeneous information networks Computing (IF 3.7) Pub Date : 2023-11-28 Vishnu Kumar, P. Radha Krishna
-
Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing Computing (IF 3.7) Pub Date : 2023-11-28 Haoyu Wang, Jianwei An
-
Can we quantify trust? Towards a trust-based resilient SIoT network Computing (IF 3.7) Pub Date : 2023-11-18 Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, Munazza Zaib, Farhan Sufyan
-
Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations Computing (IF 3.7) Pub Date : 2023-11-14 Zhuo Zeng, Chengliang Wang, Fei Ma, Xusheng Li, Xinrun Chen
-
Link prediction in food heterogeneous graphs for personalised recipe recommendation based on user interactions and dietary restrictions Computing (IF 3.7) Pub Date : 2023-11-15 Andrea Morales-Garzón, Karel Gutiérrez-Batista, Maria J. Martin-Bautista
-
Missing link prediction using path and community information Computing (IF 3.7) Pub Date : 2023-11-03 Min Li, Shuming Zhou, Dajin Wang, Gaolin Chen