Concurrency and Computation-Practice & Experience

Papers
(The TQCC of Concurrency and Computation-Practice & Experience is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Sentiment analysis on product reviews based on weighted word embeddings and deep neural networks242
Detection algorithm of safety helmet wearing based on deep learning118
Deep and reinforcement learning for automated task scheduling in large‐scale cloud computing systems77
Gesture recognition based on surface electromyography‐feature image76
Chatbots: Security, privacy, data protection, and social aspects63
Ensuring transparency and traceability of food local products: A blockchain application to a Smart Tourism Region60
A review of research on co‐training60
Gesture recognition based on multi‐modal feature weight56
Improved single shot multibox detector target detection method based on deep feature fusion55
Multi‐view frontal face image generation: A survey54
Enhancement of real‐time grasp detection by cascaded deep convolutional neural networks52
Occlusion gesture recognition based on improved SSD48
An efficient cloud‐based healthcare services paradigm for chronic kidney disease prediction application using boosted support vector machine48
Botnet attack detection in Internet of Things devices over cloud environment via machine learning46
A modified farmland fertility algorithm for solving constrained engineering problems45
Supervised link prediction using structured‐based feature extraction in social network38
Blockchain and cryptocurrencies: A classification and comparison of architecture drivers38
3D reconstruction based on photoelastic fringes36
From distributed machine learning to federated learning: In the view of data privacy and security36
Numerical simulation of thermal insulation and longevity performance in new lightweight ladle36
A federated learning method for network intrusion detection35
Manipulator trajectory planning based on work subspace division33
Whale optimization algorithm based on nonlinear convergence factor and chaotic inertial weight32
Wrist angle prediction under different loads based on GA‐ELM neural network and surface electromyography32
Leveraging big data in smart cities: A systematic review31
A systematic review on task scheduling in Fog computing: Taxonomy, tools, challenges, and future directions31
A comparative study on geographic‐based routing algorithms for flying ad‐hoc networks30
Pattern2Vec: Representation of clickstream data sequences for learning user navigational behavior30
Target localization in local dense mapping using RGBD SLAM and object detection29
A survey on the techniques, applications, and performance of short text semantic similarity29
An integrated framework for COVID‐19 classification based on classical and quantum transfer learning from a chest radiograph28
Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks28
Principal component analysis, hidden Markov model, and artificial neural network inspired techniques to recognize faces28
Improving smart grid security through 5G enabled IoT and edge computing27
Multiscale generative adversarial network for real‐world super‐resolution27
TheKLestimator for the inverse Gaussian regression model27
Optimizing resource scheduling based on extended particle swarm optimization in fog computing environments27
An optimal self adaptive deep neural network and spine‐kernelled chirplet transform for image registration26
SEV‐Net: Residual network embedded with attention mechanism for plant disease severity detection26
Namib beetle optimization algorithm: A new meta‐heuristic method for feature selection and dimension reduction25
A new adjusted Liu estimator for the Poisson regression model25
Towards general Internet of Vehicles networking: Routing protocols survey24
A robust multiclass 3D object recognition based on modern YOLO deep learning algorithms24
Big data analytics for identifying electricity theft using machine learning approaches in microgrids for smart communities24
Stock movement prediction with sentiment analysis based on deep learning networks23
Characterization of abnormalities in breast cancer images using nature‐inspired metaheuristic optimized convolutional neural networks model23
Brain tumor segmentation and overall survival period prediction in glioblastoma multiforme using radiomic features22
Classification of breast cancer mammogram images using convolution neural network22
A survey on analysis and detection of Android ransomware22
An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing22
Using an optimized soil and water assessment tool by deep belief networks to evaluate the impact of land use and climate change on water resources22
Network intrusion detection based on ensemble classification and feature selection method for cloud computing22
Weight initialization based‐rectified linear unit activation function to improve the performance of a convolutional neural network model21
SI‐EDTL: Swarm intelligence ensemble deep transfer learning for multiple vehicle detection in UAV images21
Leveraging energy‐efficient load balancing algorithms in fog computing21
Rumor, misinformation among web: A contemporary review of rumor detection techniques during different web waves20
Toward data privacy preservation with ciphertext update and key rotation for IoT20
Feature extraction based on deep‐convolutional neural network for face recognition20
Computer vision‐based recognition of driver distraction: A review20
A self‐learning artificial bee colony algorithm based on reinforcement learning for a flexible job‐shop scheduling problem19
Support vector machine versus convolutional neural network for hyperspectral image classification: A systematic review19
Implementation and evaluation of the information flow control for the Internet of Things19
Single‐objective service composition methods in cloud manufacturing systems: Recent techniques, classification, and future trends19
A novel similarity measure of link prediction in multi‐layer social networks based on reliable paths19
A roadmap towards energy‐efficient data fusion methods in the Internet of Things19
Implementation and evaluation of smart contracts using a hybrid on‐ and off‐blockchain architecture19
A hybrid classification method for Twitter spam detection based on differential evolution and random forest19
Towards the steel plate defect detection: Multidimensional feature information extraction and fusion19
Vision‐based vehicle detection for road traffic congestion classification19
Developing a Liu‐type estimator in beta regression model19
Comparative parotid gland segmentation by using ResNet‐18 and MobileNetV2 based DeepLab v3+ architectures from magnetic resonance images18
Controlling energy aware clustering and multihop routing protocol for IoT assisted wireless sensor networks18
Fast and accurate computation of high‐order Tchebichef polynomials18
Survey on psychotherapy chatbots18
Price forecasting for real estate using machine learning: A case study on Riyadh city18
Voting‐based intrusion detection framework for securing software‐defined networks18
A robust interclass and intraclass loss function for deep learning based tongue segmentation18
On the ridge estimation of the Conway‐Maxwell Poisson regression model with multicollinearity: Methods and applications18
Solving the last mile problem in logistics: A mobile edge computing and blockchain‐based unmanned aerial vehicle delivery system18
5G NB‐IoT: Efficient network call admission control in cellular networks17
A hybrid approach for efficient multi‐classification of white blood cells based on transfer learning techniques and traditional machine learning methods17
Deep maxout network for lung cancer detection using optimization algorithm in smart Internet of Things17
DeePOF: A hybrid approach of deep convolutional neural network and friendship to Point‐of‐Interest (POI) recommendation system in location‐based social networks16
A clustering‐based anonymization approach for privacy‐preserving in the healthcare cloud16
Sampling business process event logs using graph‐based ranking model16
An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach16
A deep and handcrafted features‐based framework for diagnosis of COVID‐19 from chest x‐ray images16
Three‐class brain tumor classification from magnetic resonance images using separable convolution based neural network16
Improving word embedding quality with innovative automated approaches to hyperparameters16
A deep neural network learning‐based speckle noise removal technique for enhancing the quality of synthetic‐aperture radar images16
Forecasting hydropower generation byGFDL‐CM3climate model and hybrid hydrological‐Elman neural network model based on Improved Sparrow Search Algorithm (ISSA)16
Transfer learning and fine‐tuned transfer learning methods' effectiveness analyse in the CNN‐based deep learning models16
Evaluating and analyzing the energy efficiency of CNN inference on high‐performance GPU16
Text classification using improved bidirectional transformer16
Tatt‐BiLSTM: Web service classification with topical attention‐based BiLSTM16
Convolutional neural network and its pretrained models for image classification and object detection: A survey16
ML‐IDSDN: Machine learning based intrusion detection system for software‐defined network15
A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence15
Workflow scheduling using particle swarm optimization and gray wolf optimization algorithm in cloud computing15
An efficient list scheduling algorithm with task duplication for scientific big data workflow in heterogeneous computing environments15
Blockchain‐based framework for secured storage, sharing, and querying of electronic healthcare records15
Extending collaborative filtering recommendation using word embedding: A hybrid approach15
Designing a multi‐layer full‐adder using a new three‐input majority gate based on quantum computing15
Pulmonary nodule detection based on 3D feature pyramid network with incorporated squeeze‐and‐excitation‐attention mechanism15
Cooperative and feedback based authentic routing protocol for energy efficient IoT systems14
Efficient and secure routing protocol based on Blockchain approach for wireless sensor networks14
An effective architecture of digital twin system to support human decision making and AI‐driven autonomy14
Developing robust ridge estimators for Poisson regression model14
Two‐dimensional optimal path planning for autonomous underwater vehicle using a whale optimization algorithm14
Blind image quality assessment based on the multiscale and dual‐domains features fusion14
Fusion of handcrafted and deep convolutional neural network features for effective identification of diabetic foot ulcer14
Metaheuristic task scheduling algorithms for cloud computing environments14
Time‐based legality of information flow in the capability‐based access control model for the Internet of Things14
Workflow provenance in the lifecycle of scientific machine learning14
Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions14
Oppositional tunicate fuzzy C‐means algorithm and logistic regression for intrusion detection on cloud13
An artificial intelligence approach for energy‐aware intrusion detection and secure routing in internet of things‐enabled wireless sensor networks13
Measuring success for a future vision: Defining impact in science gateways/virtual research environments13
Securing the access control policies to the Internet of Things resources through permissioned blockchain13
Dynamic load balancing assisted optimized access control mechanism for Edge‐Fog‐Cloud network in Internet of Things environment13
Forecasting hyponatremia in hospitalized patients using multilayer perceptron and multivariate linear regression techniques13
A social hybrid recommendation system using LSTM and CNN13
A deadline aware load balancing strategy for cloud computing13
An energy‐efficient auto clustering framework for enlarging quality of service in Internet of Things‐enabled wireless sensor networks using fuzzy logic system13
Development of robust Özkale–Kaçiranlar and Yang–Chang estimators for regression models in the presence of multicollinearity and outliers13
Self‐adaptation on parallel stream processing: A systematic review13
Differentially private locality sensitive hashing based federated recommender system12
Toward text psychology analysis using social spider optimization algorithm12
EduChain: A highly available education consortium blockchain platform based on Hyperledger Fabric12
FPGA‐based HPC accelerators: An evaluation on performance and energy efficiency12
An improved agglomerative hierarchical clustering anomaly detection method for scientific data12
Execution‐Cache‐Memory modeling and performance tuning of sparse matrix‐vector multiplication and Lattice quantum chromodynamics on A64FX12
Dynamic topology control algorithm for node deployment in mobile underwater wireless sensor networks12
A weakly supervised tooth‐mark and crack detection method in tongue image12
Named Data Networking‐based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode12
Unmanned surface vessel obstacle avoidance with prior knowledge‐based reward shaping12
Welding flame detection based on color recognition and progressive probabilistic Hough transform12
Linear time algorithm for computing min‐max movement of sink‐based mobile sensors for line barrier coverage12
Daily tourist flow forecasting using SPCA and CNN‐LSTM neural network12
A hybrid location‐dependent ultra convolutional neural network‐based vehicle number plate recognition approach for intelligent transportation systems12
An efficient framework for data aggregation in smart agriculture11
Short‐term traffic flow prediction based on whale optimization algorithm optimized BiLSTM_Attention11
Extended particle swarm optimization for feature selection of high‐dimensional biomedical data11
Intrusion detection systems in the cloud computing: A comprehensive and deep literature review11
A survey on smart parking systems in urban cities11
Proactive load balancing fault tolerance algorithm in cloud computing11
Analyzing the performance of long short‐term memory architectures for malware detection models11
COVID‐19 detection using hybrid deep learning model in chest x‐rays images11
Detection of global positioning system spoofing attack on unmanned aerial vehicle system11
Reinforcement learning using fully connected, attention, and transformer models in knapsack problem solving11
The forecasting of air transport passenger demands in Turkey by using novel meta‐heuristic algorithms11
Employing machine learning based malicious signal detection for cognitive radio networks11
Cost‐aware cloud bursting in a fog‐cloud environment with real‐time workflow applications11
The role of data management in the Industrial Internet of Things11
A new image encryption algorithm based on optimized Lorenz chaotic system11
Energy‐aware intelligent hybrid routing protocol for wireless sensor networks11
An efficient early detection of diabetic retinopathy using dwarf mongoose optimization based deep belief network10
Gas consumption analysis of Ethereum blockchain transactions10
An efficient algorithm for link prediction based on local information: Considering the effect of node degree10
A electronic voting protocol based on blockchain and homomorphic signcryption10
Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier10
Improved spider monkey optimization‐based multi‐objective software‐defined networking routing with block chain technology for Internet of Things security10
A performance study of meta‐heuristic approaches for quadratic assignment problem10
A secure communication using multifactor authentication and key agreement techniques in internet of medical things for COVID‐19 patients10
Fuzzy artificial bee colony‐based CNN‐LSTM and semantic feature for fake product review classification10
Energy efficient and delay aware clustering in mobile adhoc network: A hybrid fruit fly optimization algorithm and whale optimization algorithm approach10
Literature review of vision‐based dynamic gesture recognition using deep learning techniques10
AMD‐CNN: Android malware detection via feature graph and convolutional neural networks10
Scheduling independent tasks in cloud environment based on modified differential evolution10
A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous dataset10
Web service selection and composition based on uncertain quality of service10
A many‐objective integrated evolutionary algorithm for feature selection in anomaly detection10
Minimize the delays in software defined network switch controller communication10
Cyber situation perception for Internet of Things systems based on zero‐day attack activities recognition within advanced persistent threat10
An energy‐aware method for task allocation in the Internet of things using a hybrid optimization algorithm10
Big data and machine learning framework for clouds and its usage for text classification10
Orchestrated sandboxed containers, unikernels, and virtual machines for isolation‐enhanced multitenant workloads and serverless computing in cloud10
Content‐based and knowledge graph‐based paper recommendation: Exploring user preferences with the knowledge graphs for scientific paper recommendation10
5G network slicing: Fundamental concepts, architectures, algorithmics, projects practices, and open issues10
Trustful data trading through monetizing IoT data using BlockChain based review system10
Hybrid convolutional neural network based classification of bacterial, viral, and fungal diseases on tomato leaf images10
Automatic classification and diagnosis of heart valve diseases using heart sounds with MFCC and proposed deep model10
Understanding the use of message passing interface in exascale proxy applications10
A proficient approach for face detection and recognition using machine learning and high‐performance computing10
House price prediction using hedonic pricing model and machine learning techniques10
Modeling, simulation, and case analysis of COVID‐19 over network public opinion formation with individual internal factors and external information characteristics9
AI advisor platform for disaster response based on big data9
Modified jackknife Kibria–Lukman estimator for the Poisson regression model9
Adapted smart home services based on smart contracts and service level agreements9
Design of recustomize finite impulse response filter using truncation based scalable rounding approximate multiplier and error reduced carry prediction approximate adder for image processing applicati9
Smart algorithm in wireless networks for video streaming based on adaptive quantization9
Scalable recommendation systems based on finding similar items and sequences9
A high‐performance FPGA‐based multicrossbar prioritized network‐on‐chip9
Web API recommendation via combining graph attention representation and deep factorization machines quality prediction9
Combined adaptive neuro‐fuzzy inference system and genetic algorithm for e‐learning resilience assessment during COVID‐19 pandemic9
Crime activities prediction system in video surveillance by an optimized deep learning framework9
Cloud apps to‐go: Cloud portability with TOSCA and MiCADO9
Hybrid approach using machine learning algorithms for customers' churn prediction in the telecommunications industry9
Classification of human's activities from gesture recognition in live videos using deep learning9
Optimizing bitmap index encoding for high performance queries9
LibreSocial: A peer‐to‐peer framework for online social networks9
Optimizing execution for pipelined‐based distributed deep learning in a heterogeneously networked GPU cluster9
A study on path planning optimization of mobile robots based on hybrid algorithm9
Hybrid Whale Tabu algorithm optimized convolutional neural network architecture for intrusion detection in big data9
An energy‐efficient clustering algorithm with self‐diagnosis data fault detection and prediction for wireless sensor networks9
Deep learning enabled cross‐lingual search with metaheuristic web based query optimization model for multi‐document summarization9
A novel machine learning‐based framework for detecting fake Instagram profiles9
Wind driven dragonfly algorithm for global optimization9
Sentiment analysis of social media data based on chaotic coyote optimization algorithm based time weight‐AdaBoost support vector machine approach9
A variant of teaching‐learning‐based optimization and its application for minimizing the cost of Workflow Execution in the Cloud Computing9
A new exponential estimators for analysis of COVID‐19 risk9
Lightweight edge‐based kNN privacy‐preserving classification scheme in cloud computing circumstance9
Intelligent admission control manager for fog‐integrated cloud: A hybrid machine learning approach9
Provably secure signature‐based anonymous user authentication protocol in an Internet of Things‐enabled intelligent precision agricultural environment9
Polynomial analogy‐based software development effort estimation using combined particle swarm optimization and simulated annealing9
Substation instrumentation target detection based on multi‐scale feature fusion9
Pap smear based cervical cancer detection using residual neural networks deep learning architecture9
Towards a sustainable artificial intelligence: A case study of energy efficiency in decision tree algorithms9
Underwater image enhancement using improved generative adversarial network9
IoT‐TDMA: A performance evaluation of TDMA scheme for wireless sensor networks with Internet of Things9
Latency‐aware adaptive micro‐batching techniques for streamed data compression on graphics processing units9
A survey on effects of adding explanations to recommender systems9
Energy and cost aware workflow scheduling in clouds with deadline constraint9
A novel approach of intensified barnacles mating optimization for the mitigation of power system oscillations8
Improved single shot detection using DenseNet for tiny target detection8
Improved region convolutional neural network for ship detection in multiresolution synthetic aperture radar images8
A review on optimization techniques for medical image analysis8
Forest fire detection on LANDSAT images using support vector machine8
Face image de‐identification by feature space adversarial perturbation8
Correlated data in differential privacy: Definition and analysis8
Hybrid deep‐Q Elman neural network for crop prediction and recommendation based on environmental changes8
A systematic literature review of intrusion detection systems in the cloud‐based IoT environments8
Content‐based image retrieval for super‐resolutioned images using feature fusion: Deep learning and hand crafted8
Effective intrusion detection system for IoT using optimized capsule auto encoder model8
Feature extraction, recognition, and matching of damaged fingerprint: Application of deep learning network8
Autotuning PolyBench benchmarks with LLVM Clang/Polly loop optimization pragmas using Bayesian optimization8
Cluster formation techniques for hierarchical real time tasks allocation on multiprocessor system8
Class‐index corpus‐index measure: A novel feature selection method for imbalanced text data8
UNIConv: An enhanced U‐Net based InceptionV3 convolutional model for DR semantic segmentation in retinal fundus images8
Classification of EMG signals taken from arm with hybrid CNN‐SVM architecture8
Detection of malware applications from centrality measures of syscall graph8
Kullback chi square and Gustafson Kessel probabilistic neural network based soil fertility prediction8
Vessel to shore data movement through the Internet of Floating Things: A microservice platform at the edge8
Efficient deep learning models for brain tumor detection with segmentation and data augmentation techniques8
A two‐vector data‐prediction model for energy‐efficient data‐aggregation in wireless sensor network8
Task migration computation offloading with low delay for mobile edge computing in vehicular networks8
A Non‐Dominated Sorting Genetic Algorithm‐II‐based approach to optimize the spectral and spatial quality of component substitution‐based pansharpened images8
Survey on radio resource allocation in long‐term evolution‐vehicle8
SM‐Detector: A security model based on BERT to detect SMiShing messages in mobile environments8
Manipulator trajectory tracking based on adaptive sliding mode control8
0.032284021377563