Journal of Supercomputing

Papers
(The TQCC of Journal of Supercomputing is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Dung beetle optimizer: a new meta-heuristic algorithm for global optimization203
AI-based smart prediction of clinical disease using random forest classifier and Naive Bayes126
The DDoS attacks detection through machine learning and statistical methods in SDN102
A novel LSTM–CNN–grid search-based deep neural network for sentiment analysis96
Smart healthcare in smart cities: wireless patient monitoring system using IoT92
An AI-based intelligent system for healthcare analysis using Ridge-Adaline Stochastic Gradient Descent Classifier84
Smart home security: challenges, issues and solutions at different IoT layers84
Amended hybrid multi-verse optimizer with genetic algorithm for solving task scheduling problem in cloud computing84
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography83
DeepFakE: improving fake news detection using tensor decomposition-based deep neural network81
An optimized hybrid deep learning model using ensemble learning approach for human walking activities recognition80
A systematic literature review on hardware implementation of artificial intelligence algorithms79
Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology74
A survey on computation offloading and service placement in fog computing-based IoT72
Classification of brain tumors from MR images using deep transfer learning68
Construction and verification of retinal vessel segmentation algorithm for color fundus image under BP neural network model67
Suspicious activity detection using deep learning in secure assisted living IoT environments63
Using deep belief network to construct the agricultural information system based on Internet of Things63
Network intrusion detection using multi-architectural modular deep neural network61
A hybrid OBL-based firefly algorithm with symbiotic organisms search algorithm for solving continuous optimization problems60
Energy-efficient cluster head selection through relay approach for WSN59
Task scheduling, resource provisioning, and load balancing on scientific workflows using parallel SARSA reinforcement learning agents and genetic algorithm59
An improved anomaly detection model for IoT security using decision tree and gradient boosting55
KCSS: Kubernetes container scheduling strategy54
A systematic study of load balancing approaches in the fog computing environment52
Investigating the performance of Hadoop and Spark platforms on machine learning algorithms49
A multiple multilayer perceptron neural network with an adaptive learning algorithm for thyroid disease diagnosis in the internet of medical things47
Load balancing in cloud computing environment using the Grey wolf optimization algorithm based on the reliability: performance evaluation47
A new and fast rival genetic algorithm for feature selection46
An efficient binary chaotic symbiotic organisms search algorithm approaches for feature selection problems44
DNetUnet: a semi-supervised CNN of medical image segmentation for super-computing AI service43
A lightweight solution to epileptic seizure prediction based on EEG synchronization measurement43
A new deep convolutional neural network model for classifying breast cancer histopathological images and the hyperparameter optimisation of the proposed model43
Automatic detection of depression symptoms in twitter using multimodal analysis42
An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model41
Gait recognition for person re-identification40
DV-Hop-based range-free localization algorithm for wireless sensor network using runner-root optimization39
K-DBSCAN: An improved DBSCAN algorithm for big data39
A symbiosis of arithmetic optimizer with slime mould algorithm for improving global optimization and conventional design problem39
A secure blockchain-based group key agreement protocol for IoT38
A systematic survey of data mining and big data analysis in internet of things37
Elite learning Harris hawks optimizer for multi-objective task scheduling in cloud computing36
A bi-objective task scheduling approach in fog computing using hybrid fireworks algorithm35
cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking35
A new hybrid algorithm for path planning of mobile robot34
A dynamic VM consolidation approach based on load balancing using Pearson correlation in cloud computing34
Stock exchange trading optimization algorithm: a human-inspired method for global optimization33
Blockchain-based solutions for security, privacy, and trust management in vehicular networks: a survey33
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT33
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles33
Towards sustainable smart IoT applications architectural elements and design: opportunities, challenges, and open directions33
Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics33
Automated segmentation of leukocyte from hematological images—a study using various CNN schemes32
CMODLB: an efficient load balancing approach in cloud computing environment32
Bidirectional LSTM-RNN-based hybrid deep learning frameworks for univariate time series classification32
Load balancing of IoT tasks in the cloud computing by using sparrow search algorithm32
Containerization technologies: taxonomies, applications and challenges31
Comprehensive survey on energy-aware server consolidation techniques in cloud computing31
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection31
Efficient number theoretic transform implementation on GPU for homomorphic encryption30
A bio-inspired privacy-preserving framework for healthcare systems30
A blockchain-based intelligent anti-switch package in tracing logistics system30
An intelligent fault detection approach based on reinforcement learning system in wireless sensor network30
Security explorations for routing attacks in low power networks on internet of things29
Intelligent malware detection based on graph convolutional network29
Research on navigation of bidirectional A* algorithm based on ant colony algorithm29
Development of a yoga posture coaching system using an interactive display based on transfer learning29
An end-to-end deep learning model for human activity recognition from highly sparse body sensor data in Internet of Medical Things environment28
TRAM: Technique for resource allocation and management in fog computing environment28
A novel transfer learning approach for the classification of histological images of colorectal cancer27
A convolutional autoencoder-based approach with batch normalization for energy disaggregation27
Deep learning and case-based reasoning for predictive and adaptive traffic emergency management27
Prediction of highway asphalt pavement performance based on Markov chain and artificial neural network approach27
A deep learning approach in predicting products’ sentiment ratings: a comparative analysis27
Mid-term electricity load prediction using CNN and Bi-LSTM27
A review on diagnostic autism spectrum disorder approaches based on the Internet of Things and Machine Learning26
Deep neural network-based fusion model for emotion recognition using visual data26
An improved DQN path planning algorithm26
Discrete hybrid cuckoo search and simulated annealing algorithm for solving the job shop scheduling problem26
Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining26
Designing nanotechnology QCA–multiplexer using majority function-based NAND for quantum computing26
Efficient designs of quantum-dot cellular automata multiplexer and RAM with physical proof along with power analysis25
E2LG: a multiscale ensemble of LSTM/GAN deep learning architecture for multistep-ahead cloud workload prediction25
FONS: a fog orchestrator node selection model to improve application placement in fog computing25
A hybrid CNN-LSTM model for predicting server load in cloud computing25
Intelligent monitor for typhoon in IoT system of smart city25
AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things25
Discrete Jaya with refraction learning and three mutation methods for the permutation flow shop scheduling problem25
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks25
Deep learning techniques for tumor segmentation: a review25
Analysis and comparison of machine learning classifiers and deep neural networks techniques for recognition of Farsi handwritten digits24
Considerations about learning Word2Vec24
Multi-objective optimal allocation of regional water resources based on slime mould algorithm24
RETRACTED ARTICLE: An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation24
Novel design and simulation of reversible ALU in quantum dot cellular automata24
FPGA acceleration on a multi-layer perceptron neural network for digit recognition24
Optimizing bag-of-tasks scheduling on cloud data centers using hybrid swarm-intelligence meta-heuristic24
Forecasting peak energy demand for smart buildings23
A latency-aware task scheduling algorithm for allocating virtual machines in a cost-effective and time-sensitive fog-cloud architecture23
A latency-aware and energy-efficient computation offloading in mobile fog computing: a hidden Markov model-based approach23
F-LEACH: a fuzzy-based data aggregation scheme for healthcare IoT systems23
Adoption value of deep learning and serological indicators in the screening of atrophic gastritis based on artificial intelligence23
PSO-RDAL: particle swarm optimization-based resource- and deadline-aware dynamic load balancer for deadline constrained cloud tasks23
A survey of energy-saving technologies in cloud data centers23
Tool wear prediction using convolutional bidirectional LSTM networks23
Dynamic scheduling of tasks in cloud computing applying dragonfly algorithm, biogeography-based optimization algorithm and Mexican hat wavelet23
An optimized image watermarking algorithm based on SVD and IWT23
Analytical models for availability evaluation of edge and fog computing nodes23
K-means tree: an optimal clustering tree for unsupervised learning23
Financial causal sentence recognition based on BERT-CNN text classification22
LBTM: A lightweight blockchain-based trust management system for social internet of things22
Sliding window-based LightGBM model for electric load forecasting using anomaly repair22
Kubernetes in IT administration and serverless computing: An empirical study and research challenges22
A multi-label ensemble predicting model to service recommendation from social media contents22
A new method of abnormal behavior detection using LSTM network with temporal attention mechanism22
Quasi oppositional Aquila optimizer-based task scheduling approach in an IoT enabled cloud environment22
CFIN: A community-based algorithm for finding influential nodes in complex social networks22
The improvement in obstacle detection in autonomous vehicles using YOLO non-maximum suppression fuzzy algorithm22
Consensus-based bundle algorithm with local replanning for heterogeneous multi-UAV system in the time-sensitive and dynamic environment22
Hybrid binary arithmetic optimization algorithm with simulated annealing for feature selection in high-dimensional biomedical data21
A new deep intuitionistic fuzzy time series forecasting method based on long short-term memory21
Deep learning-based algorithm for vehicle detection in intelligent transportation systems21
A hybrid machine learning approach for detecting unprecedented DDoS attacks21
Human pose, hand and mesh estimation using deep learning: a survey21
The performances of iterative type-2 fuzzy C-mean on GPU for image segmentation21
Design and implementation of a cloud-based event-driven architecture for real-time data processing in wireless sensor networks21
Structure-preserving NPR framework for image abstraction and stylization21
Auditable attribute-based data access control using blockchain in cloud storage20
Implementation of real estate contract system using zero knowledge proof algorithm based blockchain20
Efficient design and implementation of a robust coplanar crossover and multilayer hybrid full adder–subtractor using QCA technology20
A novel state transition simulated annealing algorithm for the multiple traveling salesmen problem20
Mapping techniques in multicore processors: current and future trends20
Hierarchical clustering and routing protocol to ensure scalability and reliability in large-scale wireless sensor networks20
Energy-efficient polyglot persistence database live migration among heterogeneous clouds20
A blockchain-based secure storage and access control scheme for supply chain finance20
Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography20
Optimal demultiplexer unit design and energy estimation using quantum dot cellular automata20
An ACO-based multi-objective optimization for cooperating VM placement in cloud data center20
Trend analysis using agglomerative hierarchical clustering approach for time series big data20
Corona virus optimization (CVO): a novel optimization algorithm inspired from the Corona virus pandemic20
Recognition of food type and calorie estimation using neural network19
RETRACTED ARTICLE: FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks19
A firefly algorithm for power management in wireless sensor networks (WSNs)19
Searchable encryption on the cloud: a survey19
An efficient DBSCAN optimized by arithmetic optimization algorithm with opposition-based learning19
A novel IoT–fog–cloud-based healthcare system for monitoring and predicting COVID-19 outspread19
Optimal fault-tolerant quantum comparators for image binarization19
Energy-saving distributed monitoring-based firefly algorithm in wireless sensors networks19
Investigating multiple defects on a new fault-tolerant three-input QCA majority gate19
A cluster-tree-based energy-efficient routing protocol for wireless sensor networks with a mobile sink19
Token-based approach in distributed mutual exclusion algorithms: a review and direction to future research19
A transfer learning-based efficient spatiotemporal human action recognition framework for long and overlapping action classes19
FAGWO-H: A hybrid method towards fault-tolerant cluster-based routing in wireless sensor network for IoT applications19
GSAGA: A hybrid algorithm for task scheduling in cloud infrastructure19
An enhanced AHP-TOPSIS-based clustering algorithm for high-quality live video streaming in flying ad hoc networks18
The implementation of data storage and analytics platform for big data lake of electricity usage with spark18
Multilevel thresholding using an improved cuckoo search algorithm for image segmentation18
Deep knowledge-aware framework for web service recommendation18
A dual-stage attention-based Bi-LSTM network for multivariate time series prediction18
OKCM: improving parallel task scheduling in high-performance computing systems using online learning18
Stochastic models for performance and cost analysis of a hybrid cloud and fog architecture18
A secure three-factor-based authentication with key agreement protocol for e-Health clouds18
Attention-based Conv-LSTM and Bi-LSTM networks for large-scale traffic speed prediction18
Improved salp swarm algorithm based on the levy flight for feature selection18
A queuing theory model for fog computing18
RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures18
ETA-HP: an energy and temperature-aware real-time scheduler for heterogeneous platforms18
Automated detection of age-related macular degeneration using a pre-trained deep-learning scheme18
Traffic sign detection based on improved faster R-CNN for autonomous driving18
Quantum-inspired binary chaotic salp swarm algorithm (QBCSSA)-based dynamic task scheduling for multiprocessor cloud computing systems18
A hybrid bi-objective scheduling algorithm for execution of scientific workflows on cloud platforms with execution time and reliability approach18
Replication and data management-based workflow scheduling algorithm for multi-cloud data centre platform18
Cyber-physical systems for structural health monitoring: sensing technologies and intelligent computing18
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection17
A binary PSO-based ensemble under-sampling model for rebalancing imbalanced training data17
Multi-objective NSGA-II optimization framework for UAV path planning in an UAV-assisted WSN17
A deep learning-based CEP rule extraction framework for IoT data17
Algorithms and software for data mining and machine learning: a critical comparative view from a systematic review of the literature17
Multi-spectral remote sensing land-cover classification based on deep learning methods17
Dynamic and scalable multi-level trust management model for Social Internet of Things17
Accelerating number theoretic transform in GPU platform for fully homomorphic encryption17
Availability model for edge-fog-cloud continuum: an evaluation of an end-to-end infrastructure of intelligent traffic management service17
A comparative analysis of prominently used MCDM methods in cloud environment17
Optimal circulant graphs as low-latency network topologies17
An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things17
A hybrid list-based task scheduling scheme for heterogeneous computing17
An investigation and comparison of machine learning approaches for intrusion detection in IoMT network17
Smart city information processing under internet of things and cloud computing16
A novel method to improve computational and classification performance of rice plant disease identification16
Driver attention prediction based on convolution and transformers16
Building a model to exploit association rules and analyze purchasing behavior based on rough set theory16
Construction and verification of color fundus image retinal vessels segmentation algorithm under BP neural network16
Sampling-based visual assessment computing techniques for an efficient social data clustering16
Hybrid-based framework for COVID-19 prediction via federated machine learning models16
An optimized FP-growth algorithm for discovery of association rules16
An application of MOGW optimization for feature selection in text classification16
A novel weight-oriented graph convolutional network for aspect-based sentiment analysis16
A deep learning based approach for predicting the demand of electric vehicle charge16
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function16
Kubernetes distributions for the edge: serverless performance evaluation16
FPGA-based accelerator for object detection: a comprehensive survey16
Knowledge-based virtual outdoor weather event simulator using unity 3D16
Accelerating Louvain community detection algorithm on graphic processing unit16
EIDM: deep learning model for IoT intrusion detection systems16
Improving the learning of self-driving vehicles based on real driving behavior using deep neural network techniques15
Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier15
Reliability-aware task scheduling for energy efficiency on heterogeneous multiprocessor systems15
A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case15
A formally verified blockchain-based decentralised authentication scheme for the internet of things15
Colony search optimization algorithm using global optimization15
PyDTNN: A user-friendly and extensible framework for distributed deep learning15
Collaborative detection and mitigation of DDoS in software-defined networks15
An evolutionary game approach to IoT task offloading in fog-cloud computing15
The predicting public sentiment evolution on public emergencies under deep learning and internet of things15
Multivariate workload and resource prediction in cloud computing using CNN and GRU by attention mechanism15
Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes15
OG-RADL: overall performance-based resource-aware dynamic load-balancer for deadline constrained Cloud tasks15
Performance evaluation and optimization of a task offloading strategy on the mobile edge computing with edge heterogeneity15
A novel approach for multilevel multi-secret image sharing scheme15
Classification of resource management approaches in fog/edge paradigm and future research prospects: a systematic review15
Hybrid deep transfer learning architecture for industrial fault diagnosis using Hilbert transform and DCNN–LSTM15
Realization of ultrafast all-optical NAND and XNOR logic functions using carrier reservoir semiconductor optical amplifiers15
A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-1915
A novel multiclass priority algorithm for task scheduling in cloud computing15
OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments15
Using a task dependency job-scheduling method to make energy savings in a cloud computing environment15
Dynamic opposite learning enhanced artificial ecosystem optimizer for IIR system identification15
Design of an IoT DDoS attack prediction system based on data mining technology15
An energy-efficient cuckoo search algorithm for virtual machine placement in cloud computing data centers14
SA-ASBA: a hybrid model for aspect-based sentiment analysis using synthetic attention in pre-trained language BERT model with extreme gradient boosting14
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems14
An efficient U-Net framework for lung nodule detection using densely connected dilated convolutions14
A lightweight neural network framework using linear grouped convolution for human activity recognition on mobile devices14
Stock price prediction based on LSTM and LightGBM hybrid model14
People-centric collective intelligence: decentralized and enhanced privacy mobile crowd sensing based on blockchain14
Blockchain-based federation of wireless sensor nodes14
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA14
A privacy-preserving multidimensional data aggregation scheme with secure query processing for smart grid14
Chaotic-based divide-and-conquer feature selection method and its application in cardiac arrhythmia classification14
Construction and implementation of a college talent cultivation system under deep learning and data mining algorithms14
A genetic-based approach for service placement in fog computing14
HybriDroid: an empirical analysis on effective malware detection model developed using ensemble methods14
Efficient resource utilization using multi-step-ahead workload prediction technique in cloud14
The use of remote sensing satellite using deep learning in emergency monitoring of high-level landslides disaster in Jinsha River14
DDBWS: a dynamic deadline and budget-aware workflow scheduling algorithm in workflow-as-a-service environments14
Optimized task scheduling and preemption for distributed resource management in fog-assisted IoT environment14
A CSO-based approach for secure data replication in cloud computing environment14
Accurate computing of facial expression recognition using a hybrid feature extraction technique14
A semi-supervised approach in detecting sentiment and emotion based on digital payment reviews13
First experiences of teaching quantum computing13
0.064045906066895