Computing

Papers
(The TQCC of Computing is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Multi-input CNN-GRU based human activity recognition using wearable sensors208
Customer churn prediction system: a machine learning approach108
Future directions for chatbot research: an interdisciplinary research agenda82
A modified DeepWalk method for link prediction in attributed social network69
Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking63
Nature inspired meta heuristic algorithms for optimization problems52
Edge computing: current trends, research challenges and future directions51
An improved YOLO-based road traffic monitoring system50
Energy-makespan optimization of workflow scheduling in fog–cloud computing43
A hybrid machine learning model for intrusion detection in VANET41
A multi-objective load balancing algorithm for virtual machine placement in cloud data centers based on machine learning40
AI-enabled remote monitoring of vital signs for COVID-19: methods, prospects and challenges39
Enhanced Harris Hawks optimization as a feature selection for the prediction of student performance37
An optimization scheme for IoT based smart greenhouse climate control with efficient energy consumption35
An energy-aware clustering and two-level routing method in wireless sensor networks35
An optimized feature selection using bio-geography optimization technique for human walking activities recognition34
A novel blockchain based framework to secure IoT-LLNs against routing attacks34
EELRP: energy efficient layered routing protocol in wireless sensor networks32
A survey on meta-heuristic algorithms for the influence maximization problem in the social networks31
VLDNet: Vision-based lane region detection network for intelligent vehicle system using semantic segmentation28
Air pollution prediction based on factory-aware attentional LSTM neural network27
An improved list-based task scheduling algorithm for fog computing environment26
Ubiquitous Health Profile (UHPr): a big data curation platform for supporting health data interoperability25
A scheme for intelligent blockchain-based manufacturing industry supply chain management24
Combined oversampling and undersampling method based on slow-start algorithm for imbalanced network traffic24
K-predictions based data reduction approach in WSN for smart agriculture23
Feature selection and evaluation for software usability model using modified moth-flame optimization23
Efficient federated learning for fault diagnosis in industrial cloud-edge computing23
LSTM based link quality confidence interval boundary prediction for wireless communication in smart grid23
IoT-cloud based healthcare model for COVID-19 detection: an enhanced k-Nearest Neighbour classifier based approach23
Bearing fault diagnosis based on improved federated learning algorithm23
Trust-driven reinforcement selection strategy for federated learning on IoT devices23
Dynamic resource allocation in cloud computing: analysis and taxonomies22
An overview of queuing delay and various delay based algorithms in networks22
Quality of service provisioning in network function virtualization: a survey22
Optimal rendezvous points selection to reliably acquire data from wireless sensor networks using mobile sink22
Notions of architecture in fog computing21
VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning21
Strategy-proof mechanism for online resource allocation in cloud and edge collaboration21
The greedy coupled-seeds expansion method for the overlapping community detection in social networks20
On opportunistic software reuse20
Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection20
An IoT-enabled smart health care system for screening of COVID-19 with multi layers features fusion and selection19
Towards 5G-based IoT security analysis against Vo5G eavesdropping19
GPU-based matrix-free finite element solver exploiting symmetry of elemental matrices19
Optimized SAT encoding of conformance checking artefacts18
A framework for Model-Driven Engineering of resilient software-controlled systems18
Evaluation of fog application placement algorithms: a survey18
Anomaly detection in cloud environment using artificial intelligence techniques17
Energy-efficient approach to lower the carbon emissions of data centers17
Bio-signal data sharing security through watermarking: a technical survey16
Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining16
Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols16
Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm15
Prediction of link evolution using community detection in social network15
A Prior-mask-guided Few-shot Learning for Skin Lesion Segmentation15
Machine learning-based IoT system for COVID-19 epidemics15
Fuzzy logic-based VANET routing method to increase the QoS by considering the dynamic nature of vehicles15
MDER: modified degree with exclusion ratio algorithm for influence maximisation in social networks15
IoT streaming data integration from multiple sources15
Coupling multifunction drones with AI in the fight against the coronavirus pandemic15
Allocation of applications to Fog resources via semantic clustering techniques: with scenarios from intelligent transportation systems15
Trust on wheels: Towards secure and resource efficient IoV networks15
A multi-attribute decision making approach for on-demand charging scheduling in wireless rechargeable sensor networks15
The evolution of distributed computing systems: from fundamental to new frontiers14
An intelligent healthcare system for predicting and preventing dengue virus infection14
An interdisciplinary approach on efficient virtual microgrid to virtual microgrid energy balancing incorporating data preprocessing techniques14
An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature14
An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing13
Scalable blockchain storage systems: research progress and models13
Task scheduling in edge-fog-cloud architecture: a multi-objective load balancing approach using reinforcement learning algorithm13
Jointly Optimizing Offloading Decision and Bandwidth Allocation with Energy Constraint in Mobile Edge Computing Environment13
Time series-based workload prediction using the statistical hybrid model for the cloud environment13
Blockchain-based secure multi-resource trading model for smart marketplace12
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing12
Lightweight edge authentication for software defined networks12
A systematic mapping study on automated analysis of privacy policies12
Road surface type classification based on inertial sensors and machine learning12
Combined use of coral reefs optimization and reinforcement learning for improving resource utilization and load balancing in cloud environments12
A weighted K-member clustering algorithm for K-anonymization12
Machine learning approaches to network intrusion detection for contemporary internet traffic12
Edge computing12
QoS evaluation model based on intelligent fuzzy system for vehicular ad hoc networks11
An approach to dynamically assigning cloud resource considering user demand and benefit of cloud platform11
Heterogeneous self-tracked health and fitness data integration and sharing according to a linked open data approach11
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing11
Secure FaaS orchestration in the fog: how far are we?11
Efficient offloading schemes using Markovian models: a literature review11
A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services10
A hierarchical formal method for performance evaluation of WSNs protocol10
IoT-enabled stacked ensemble of deep neural networks for the diagnosis of COVID-19 using chest CT scans10
Multi-objective optimization for VM placement in homogeneous and heterogeneous cloud service provider data centers10
Improved label propagation algorithm for overlapping community detection10
Performance and availability evaluation of an smart hospital architecture10
Detector-based component model abstraction for microservice-based systems10
The impact of biased sampling of event logs on the performance of process discovery10
An approach to evaluate trust and reputation of things in a Multi-IoTs scenario9
Novel self-adjusted particle swarm optimization algorithm for feature selection9
A job scheduling algorithm based on rock hyrax optimization in cloud computing9
Fog-based architecture for scheduling multiple workflows with high availability requirement9
Special issue on intelligent Edge, Fog, Cloud and Internet of Things (IoT)-based services9
Context-aware recommender system using trust network9
Improved approaches for density-based outlier detection in wireless sensor networks9
A prediction-based model for virtual machine live migration monitoring in a cloud datacenter9
Morse glasses: an IoT communication system based on Morse code for users with speech impairments9
Energy generation forecasting: elevating performance with machine and deep learning9
Prediction based task scheduling approach for floodplain application in cloud environment8
Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net8
Internet network location privacy protection with multi-access edge computing8
A conceptual framework for resilience: fundamental definitions, strategies and metrics8
Sensor network sensing coverage optimization with improved artificial bee colony algorithm using teaching strategy8
RNe2Vec: information diffusion popularity prediction based on repost network embedding8
Users opinion and emotion understanding in social media regarding COVID-19 vaccine8
An improved firefly algorithm based on personalized step strategy8
Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration8
Enhanced hybrid multi-objective workflow scheduling approach based artificial bee colony in cloud computing8
HATMOG: an enhanced hybrid task assignment algorithm based on AHP-TOPSIS and multi-objective genetic in cloud computing7
HPMaX: heterogeneous parallel matrix multiplication using CPUs and GPUs7
SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification7
A scalable blockchain network model with transmission paths and neighbor node subareas7
Dynamic workload-aware DVFS for multicore systems using machine learning7
Machine learning driven intelligent and self adaptive system for traffic management in smart cities7
Exploring and optimizing partitioning of large designs for multi-FPGA based prototyping platforms7
A BBR-based congestion control for delay-sensitive real-time applications7
AwARE: a framework for adaptive recommendation of educational resources7
A novel indoor localization system using machine learning based on bluetooth low energy with cloud computing7
The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things7
Seamless computation offloading for mobile applications using an online learning algorithm7
IEEE 802.15.4 historical revolution versions: A survey7
Passive social sensing with smartphones: a systematic review7
An IoT-based contribution to improve mobility of the visually impaired in Smart Cities7
Artificial intelligence to automate the systematic review of scientific literature7
A data fusion based data aggregation and sensing technique for fault detection in wireless sensor networks7
Towards big services: a synergy between service computing and parallel programming7
Interference Aware Workload Scheduling for Latency Sensitive Tasks in Cloud Environment7
0.031066179275513