Concurrency and Computation-Practice & Experience

Papers
(The TQCC of Concurrency and Computation-Practice & Experience is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
A comprehensive modeling approach for the task mapping problem in heterogeneous systems with dataflow processing units137
A novel fuzzy based deep neural network for rain fall prediction using cloud images76
Causality‐based online streaming feature selection64
Development of robust Özkale–Kaçiranlar and Yang–Chang estimators for regression models in the presence of multicollinearity and outliers50
48
Reducing the burden of parallel loop schedulers for many‐core processors47
Issue Information46
Weighted Centroid Amorphous Algorithm for Position Error Minimization in WSN44
Toward a Dynamic Allocation Strategy for Deadline‐Oriented Resource and Job Management in HPC Systems43
From GPU to CPU (and Beyond): Extending Hardware Support in GPUSPH Through a SYCL‐Inspired Interface41
Real‐time XFEL data analysis at SLAC and NERSC: A trial run of nascent exascale experimental data analysis39
FogSec: A secure and effective mutual authentication scheme for fog computing39
FPHO: Fractional Pelican Hawks optimization based container consolidation in CaaS cloud39
F‐SWIR: Rumor Fick‐spreading model considering fusion information decay in social networks37
A novel compression based community detection approach using hybrid honey badger African vulture optimization for online social networks37
Parallel computational tree logic model‐checking on pushdown systems37
Microservices‐based databank for Turkish hazelnut cultivars using IoT and semantic web technologies37
Multi‐objective firefly algorithm with multi‐strategy integration36
A feed forward deep neural network model using feature selection for cloud intrusion detection system36
MobEdge: Mobile blockchain‐based privacy‐edge scheme for healthcare Internet of Things‐based ecosystems36
A decentralized and reliable trust measurement for edge computing enabled Internet of Things35
A modified graywolf‐basedchameleon swarm algorithm for minimizing energy consumption and enabling secure communication in wireless sensor network33
A hybrid intelligently initialized particle swarm optimizer with weight factored binary gray wolf optimizer for mitigation of security issues in Internet of Things and sensor nodes33
Solving tridiagonal Toeplitz systems of linear equations on GPU‐accelerated computers32
Metaheuristic task scheduling algorithms for cloud computing environments31
Indian classical musical instrument classification using Timbral features31
Compressive strength prediction of structural lightweight concrete by applying the recurrent neural network‐fractional order bat optimization algorithm30
Issue Information30
Model selection via conditional conceptual predictive statistic for mixed and stochastic restricted ridge estimators in linear mixed models29
Network intrusion detection based on ensemble classification and feature selection method for cloud computing29
Issue Information29
Effective neighbor node discovery using improved Bayesian clock synchronization‐gossip routing protocol in mobile low duty cycle wireless sensor network29
Adaptive leaf abnormality segmentation and improved plant disease classification by tuned long short‐term memory with recurrent neural network28
RideNN‐OptDRN: Heart disease detection using RideNN based feature fusion and optimized deep residual network28
28
Multilayer self‐attention residual network for code search28
FTPS: Efficient fault‐tolerant dynamic phrase search over outsourced encrypted data with forward and backward privacy27
Performance evaluation of accessibility checker tool for educational websites27
A Buffalo‐based bi‐directional recurrent paradigm for Indian stock market prediction27
An efficient enhanced prefix hash tree model for optimizing the storage and image deduplication in cloud26
26
Emotional state recognition from text data using machine learning and deep learning algorithm26
A secure protocol for patient monitoring in wireless body area networks26
Toward object alphabet augmentation for object detection in very high‐resolution satellite images26
Blockchain based integrity assurance framework for COVID‐19 information management & decision making at National Command Operation Center, Pakistan26
CCITL: A cloud‐based smart traffic management protocol using intelligent traffic light system in VANETs25
Blue Waters system and component reliability25
Dynamic distributed KCi‐slice data publishing model with multiple sensitive attributes25
A blockchain anonymity solution to prevent location homogeneity attacks25
Malware detection based on multi‐objective convolution restricted Boltzmann machine model and constraint‐dividing crossover strategy algorithm25
Configuration approach for personalized travel mashup24
Optimized deep neural network based DDoS attack detection and bait mitigation process in software defined network24
Image tampering detection in image forensics using earthworm‐rider optimization24
Continuous self‐adaptation of control policies in automatic cloud management23
A deep neural network based toddler tracking system23
A smart access control mechanism based on user preference in online social networks23
A recommendation approach based on correlation and co‐occurrence within social learning network22
22
A improved detection method for lung nodule based on multi‐scale 3Dconvolutional neural network22
A new parallel tabu search algorithm for the optimization of the maximum vertex weight clique problem22
Android malware detection based on sensitive features combination22
A mat‐heuristics approach for electric vehicle route optimization under multiple recharging options and time‐of‐use energy prices22
Differential privacy protection method for trip‐oriented shared data21
Uncertainty‐aware scheduling of real‐time workflows under deadline constraints on multi‐cloud systems21
Performance evaluation of Java/PCJ implementation of parallel algorithms on the cloud (extended version)21
Issue Information21
Issue Information21
Unauthorized and privacy‐intrusive human activity watching through Wi‐Fi signals: An emerging cybersecurity threat20
Graphics processing unit‐accelerated high‐quality watercolor painting image generation20
Online data caching in edge computing19
Parallel tensor decomposition with distributed memory based on hierarchical singular value decomposition19
Issue Information19
User defined weight based budget and deadline constrained workflow scheduling in cloud18
Adaptive group‐aware topic model for venue recommendation18
Network bandwidth variation‐adapted state transfer for geo‐replicated state machines and its application to dynamic replica replacement18
18
Optimum scheduling of machines, automated guided vehicles and tools without tool delay in a multi‐machine flexible manufacturing system using symbiotic organisms search algorithm17
Artificial intelligence empowered threat detection in the Internet of Things: A systematic review17
Research of 6‐DOF pose estimation in stacked scenes17
Multilevel authentication protocol for enabling secure communication in Internet of Things17
An efficient framework for the similarity prediction with query recommendation in E‐learning system17
Multi‐perspective business process discovery from messaging systems: State‐of‐the art17
Hierarchical community‐discovery algorithm combining core nodes and three‐order structure model17
Fine‐grain task‐parallel algorithms for matrix factorizations and inversion on many‐threaded CPUs17
q‐frame hash comparison based exact string matching algorithms for DNA sequences17
17
Verifying multiple replica possession with public key segment under public cloud storage environment17
Speedup of discrete Fourier transform by efficient modular arithmetic16
Parallel compression for large collections of genomes16
Issue Information16
A method of core concept extraction based on semantic‐weight ranking16
A variable neighborhood search algorithm for energy conscious task scheduling in heterogeneous computing systems16
Fast gathering despite a linear number of weakly Byzantine agents16
Issue Information16
A fast sequential algorithm for the matrix chain ordering problem16
Performance predictors for graphics processing units applied to dark‐silicon‐aware design space exploration16
Special issue on High Performance Computing Conference (BASARIM‐2020)15
Issue Information15
Research on PSO‐SVM base wine grade recognition based on Max‐Relevance and Min‐Redundancy feature selection15
Issue Information15
Novel approaches on bulk‐loading of large scale spatial datasets15
Investigations on the performance of distributed Raman amplifier in dense wavelength division multiplexed communication system using different modulation formats15
Towards a robust scale‐free network in internet of health things against multiple attacks using an inter‐core based reconnection strategy15
Joint optimal beam forming and resource allocation in intelligent reflecting surface aided wireless power transfer rate splitting multiple access system15
A framework for investigating search engines' stemming mechanisms: A case study on Bing15
Optimal knee osteoarthritis diagnosis using hybrid deep belief network based on Salp swarm optimization method15
Detection of algal tiny objects based on morphological features15
Automatic liver tumor segmentation and identification using fully connected convolutional neural network from CT images15
Enhancing CNN‐LSTM neural networks using jellyfish search algorithm for pandemic modeling14
Machine learning‐based anti‐jamming technique at the physical layer14
A fuzzy model for generalized transportation problems in China14
Authentication of fog‐assisted IoT networks using Advanced Encryption credibility approach with modified Diffie–Hellman encryption14
Evolution and innovations in animation: A comprehensive review and future directions14
14
Issue Information14
Precise event sampling‐based data locality tools for AMD multicore architectures14
Algorithmic and software development advances for next‐generation heterogeneous platforms13
A dynamic population reduction differential evolution algorithm combining linear and nonlinear strategy piecewise functions13
A robust multiclass 3D object recognition based on modern YOLO deep learning algorithms13
Special issue on applied computational intelligence13
Load‐based node ranked low‐energy adaptive clustering hierarchy: An enhanced energy‐efficient algorithm for cluster head selection in wireless sensor networks13
QoE‐aware traffic monitoring based on user behavior in video streaming services13
Issue Information13
13
Parallel distributed productivity‐aware tree‐search using Chapel13
Application of deep learning and classical machine learning methods in the diagnosis of attention deficit hyperactivity disorder according to temperament features13
13
13
Reinforcement learning using fully connected, attention, and transformer models in knapsack problem solving13
Transfer learning based attack detection for wireless communication networks12
Supporting dynamic allocation of heterogeneous storage resources on HPC systems12
Architecture and performance of Perlmutter's 35 PB ClusterStor E1000 all‐flash file system12
Performance and power modeling and prediction using MuMMI and 10 machine learning methods12
Efficient Throttled load balancing algorithm to improve the response time and processing time in data center12
KubeSC‐RTP: Smart scheduler for Kubernetes platform on CPU‐GPU heterogeneous systems12
Fractional Artificial Bee Chicken Swarm Optimization technique for QoS aware virtual machine placement in cloud12
Mitigation of stretch type vampire attack using probabilistic variable fuzzy rough set in wireless sensor networks12
Federated malware detection based on many‐objective optimization in cross‐architectural IoT12
A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier12
Named Data Networking‐based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode12
Sentiment analysis on twitter data based on spider monkey optimization and deep learning for future prediction of the brands12
Updated delegated proof of stake and Nash equilibrium: A mining pool game model for blockchain network12
An interval type‐2 fuzzy ontological model: Predicting water quality from sensory data12
Secure identity key and blockchain‐based authentication approach for secure data communication in multi‐WSN12
The quality evaluation system of ideological and political classroom teaching in universities based on GABP algorithm12
Energy aware optimal routing model for wireless multimedia sensor networks using modified Voronoi assisted prioritized double deep Q‐learning12
Doughnutie: An efficient and low‐latency cloud data center network architecture12
Scalable multi‐node multi‐GPU Louvain community detection algorithm for heterogeneous architectures12
A systematic overview of live virtual machine migration methods12
BAC: A block alliance consensus mechanism for the mine consortium blockchain11
Multiscale generative adversarial network for real‐world super‐resolution11
Robust features fusion utilization for supervised palmprint recognition11
An autonomic parallel strategy for exhaustive search tree algorithms on shared or heterogeneous systems11
An innovative malware detection methodology employing the amalgamation of stacked BiLSTM and CNN+LSTM‐based classification networks with the assistance of Mayfly metah11
A new hierarchy framework for feature engineering through multi‐objective evolutionary algorithm in text classification11
Self‐adaptation and distributed knowledge‐based service ecosystem evolution11
Performance analysis of regression‐based machine learning models towards intelligent selection of MIMO configurations11
Issue Information11
Quantum computing: A measurement and analysis review11
Issue Information11
11
An automated brain tumor segmentation framework using a novel fruit fly UNet11
Dynamic cognitive maps for robot route planning in complex workplaces represented by abstract mazes11
An identity privacy scheme for blockchain‐based on edge computing10
Deep learning: A taxonomy of modern weapons to combat Covid‐19 similar pandemics in smart cities10
Multi‐objective hybrid capuchin search with genetic algorithm based hierarchical resource allocation scheme with clustering model in cloud computing environment10
Evacuation from various types of finite two‐dimensional square grid fields by a metamorphic robotic system10
Fuzzy artificial bee colony‐based CNN‐LSTM and semantic feature for fake product review classification10
Hybrid energy‐Efficient distributed aided frog leaping dynamic A* with reinforcement learning for enhanced trajectory planning in UAV swarms large‐scale networks10
Temporal intensity modeling of sub‐events in microblogs10
Optimizing minimum spanning tree using stochastic–Variable neighborhood search for efficient clustering of cancer gene data10
A deep neural network and random forests driven computer vision framework for identification and prediction of metanil yellow adulteration in turmeric powder10
Taylor ant lion optimization‐based generative adversarial networks for forecasting electricity consumption10
Comparative evaluation of deep dense sequential and deep dense transfer learning models for suicidal emotion prediction10
Automatic performance tuning using the ATMathCoreLib tool: Two experimental studies related to dense symmetric eigensolvers10
Single node deep learning frameworks: Comparative study and CPU/GPU performance analysis10
Internet of Things‐based root disease classification in alfalfa plants using hybrid optimization‐enabled deep convolutional neural network10
Opportunistic coding across on‐route dominating nodes in a flow‐orientedSDNenabledWSN10
Advances in parallel and distributed computing and its applications10
Shuffled shepherd political optimization‐based deep learning method for credit card fraud detection10
10
Cloud forensics: A centralized cloud provenance investigation system usingMECC10
Proactive self‐healing techniques for cloud computing: A systematic review10
Alzheimer's disease classification using competitive swarm multi‐verse optimizer‐based deep neuro‐fuzzy network10
Differential privacy: Review of improving utility through cryptography‐based technologies10
Online streaming feature selection based on hierarchical structure information9
Accelerating communication with multi‐HCA aware collectives in MPI9
Improved hard fusion methods for enhancing detection and energy efficiency in cognitive radio networks9
Issue Information9
A hybrid location‐dependent ultra convolutional neural network‐based vehicle number plate recognition approach for intelligent transportation systems9
Support vector machine classifier optimized with seagull optimization algorithm for brain tumor classification9
Development of argument based opinion mining model with sentimental data analysis from twitter content9
A novel self‐adaptive hybrid slime mould naked mole‐rat algorithm for numerical optimization and energy‐efficient wireless sensor network9
Smart algorithm in wireless networks for video streaming based on adaptive quantization9
A cyber‐physical management system for medium‐scale solar‐powered data centers9
Weather parameters forecasting with time series using deep hybrid neural networks9
AGFT: Adaptive entries aggregation scheme to prevent overflow in multiple flow table environment9
h5bench: A unified benchmark suite for evaluating HDF5 I/O performance on pre‐exascale platforms9
9
Three‐stage auction scheme for computation offloading on mobile blockchain with edge computing9
Determining approximate solution of partial differential equations using radial basis function model trained with parallel symbiotic organisms search algorithm9
ECG compression technique using fast fractals in the Internet of medical things9
9
Adaptive QoE‐based video delivery by optimizing the bitrate of the video course using network bandwidth and user bandwidth9
Quantum optimization algorithms: Energetic implications9
On the provenance extraction techniques from large scale log files9
A smartphone authentication system based on touch gesture dynamics9
Shorting attack: Predatory, destructive short selling on Proof‐of‐Stake cryptocurrencies9
Exploring human behavior patterns and socio‐demographic factors based on American Time Use Survey9
QoS‐aware trust establishment for cloud federation9
Energy‐efficient animal tracking with multi‐unmanned aerial vehicle path planning using reinforcement learning and wireless sensor networks9
Enhanced Elman spike neural network based intrusion attack detection in software defined Internet of Things network9
Deep learning enabled cross‐lingual search with metaheuristic web based query optimization model for multi‐document summarization8
Gene selection and classification using correlation feature selection based binary bat algorithm with greedy crossover8
New exponentiated generalized censored regression models: Monte Carlo simulation and application8
On enhanced estimation and monitoring of population variance using robust auxiliary parameters based estimators8
Abstractive text summarization using deep learning with a new Turkish summarization benchmark dataset8
An optimized crypto‐based routing protocol for secure routing in wireless sensor networks8
A massively parallel speciation‐based differential evolution algorithm applied to the 3D‐AB protein structure prediction8
A cloud service recommendation method based on extended multi‐source information fusion8
Feature extraction and enhancement for real‐time semantic segmentation8
A novel member enhancement‐based clustering ensemble algorithm8
A personalized self‐learning system based on knowledge graph and differential evolution algorithm8
Prediction of software defects using deep learning with improved cuckoo search algorithm8
Blood vessel detection using enhanced DeepJoint fuzzy clustering algorithm with deep Maxout network for glaucoma detection8
Towards a sustainable artificial intelligence: A case study of energy efficiency in decision tree algorithms8
A novel fuzzy and reverse auction‐based algorithm for task allocation with optimal path cost in multi‐robot systems8
Forest fire detection on LANDSAT images using support vector machine8
Data characteristics aware prediction model for power consumption of data center servers8
Fault‐tolerance approaches for distributed and cloud computing environments: A systematic review, taxonomy and future directions8
Distributed low‐latency broadcast scheduling for multi‐channel duty‐cycled wireless IoT networks8
Optimal seed node selection method for LTIS model8
Efficient task scheduling on the cloud using artificial neural network and particle swarm optimization8
Advances into exascale computing8
Editorial for special issue on “Edge computing accelerated deep learning: Technologies and applications”8
Improved beetle swarm optimization algorithm for energy efficient virtual machine consolidation on cloud environment8
Edge intelligence‐enabled supply chain financial model based on Business‐to‐Business e‐business platforms8
New Continual Federated Learning System for Intrusion Detection in SDN‐Based Edge Computing8
A hybrid approach for efficient multi‐classification of white blood cells based on transfer learning techniques and traditional machine learning methods8
Hybrid Whale Tabu algorithm optimized convolutional neural network architecture for intrusion detection in big data8
Novel segmentation and classification algorithm for detection of tomato leaf disease8
An efficient machine learning based ventricular late potential detection and classification technique for cardiac healthcare8
Stacked ensemble modeling for improved tuberculosis treatment outcome prediction in pediatric cases8
Issue Information8
Traffic sign recognition on Indian database using wavelet descriptors and convolutional neural network ensemble8
Scalability analysis of a two level domain decomposition approach in space and time solving data assimilation models8
Elderly Hajj pilgrims activity recognition based on candidate classification technique8
SPoFC: A framework for stream data aggregation with local differential privacy8
Sampling business process event logs with guarantees8
Software code refactoring based on deep neural network‐based fitness function8
0.25699996948242