Skip to main content

Cluster Computing OnlineFirst articles

25.05.2024

AAPF*: a safer autonomous vehicle path planning algorithm based on the improved A* algorithm and APF algorithm

In this paper, we introduce the AAPF* algorithm, an innovative approach that synergistically integrates the A-star search algorithm (A*) with the artificial potential field (APF) method. This algorithm is designed to enhance safety and ensure …

verfasst von:
Yalian Yang, Xinyu Luo, Wei Li, Changdong Liu, Qing Ye, Peng Liang

24.05.2024

A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms

Robotics is a vast and growing area in academia and industry, and it is used to solve human problems through artificial intelligent machines. To solve crucial issues or problems such as the survivability of humans in mining, living in Antarctica …

verfasst von:
Sanjeev Sharma, Mahendra Pratap Yadav

22.05.2024

Quantum-inspired multi-objective African vultures optimization algorithm with hierarchical structure for software requirement

The software requirement selection problem endeavors to ascertain the optimal set of software requirements with the dual objectives of minimizing software cost and maximizing customer satisfaction. The intricate nature of this problem stems from …

verfasst von:
Bo Liu, Guo Zhou, Yongquan Zhou, Qifang Luo, Yuanfei Wei

Open Access 22.05.2024

Chaotic marine predator optimization algorithm for feature selection in schizophrenia classification using EEG signals

Schizophrenia is a chronic mental illness that can negatively affect emotions, thoughts, social interaction, motor behavior, attention, and perception. Early diagnosis is still challenging and is based on the disease’s symptoms. However …

verfasst von:
Zeynep Garip, Ekin Ekinci, Kasım Serbest, Süleyman Eken

Open Access 22.05.2024

MADESANT: malware detection and severity analysis in industrial environments

Malware remains a persistent threat to industrial operations, causing disruptions and financial losses. Traditional malware detection approaches struggle with the increasing complexity of false positives and negatives. However, existing Intrusion …

verfasst von:
P. L. S. Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti

22.05.2024

Binary classification for imbalanced datasets using twin hyperspheres based on conformal method

Aiming at binary classification of highly imbalanced data, this paper proposes a novel twin-hypersphere method with conformal transformation. To provide favorable environments that the hyperspheres can search the region containing the majority …

verfasst von:
Jian Zheng, Lin Li, Shiyan Wang, Huyong Yan

21.05.2024

A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers

First-Person Shooter (FPS) games are among the most popular latency-sensitive multiplayer online games. A separate game server manages each multiplayer group hosted appropriately to meet the given Quality of Service (QoS) and Quality of Experience …

verfasst von:
Amira-Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta, Atidel B. Hadj-Alouane

20.05.2024

High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform

Authenticated encryption with associated data (AEAD) has become prominent over time because it offers authenticity and confidentiality simultaneously. In 2018, the National Institute of Standards and Technology (NIST) initiated a competition to …

verfasst von:
Jia-Lin Chan, Wai-Kong Lee, Denis C. -K. Wong, Wun-She Yap, Boon-Yaik Ooi, Bok-Min Goi

20.05.2024

Federated learning for efficient spectrum allocation in open RAN

In the evolving landscape of Open Radio Access Networks (Open RAN), the dynamic and unpredictable nature of network conditions presents significant challenges for traditional spectrum allocation strategies. This paper introduces an innovative …

verfasst von:
Muhammad Asad, Safa Otoum

Open Access 20.05.2024

Enhancing EfficientNetv2 with global and efficient channel attention mechanisms for accurate MRI-Based brain tumor classification

The early and accurate diagnosis of brain tumors is critical for effective treatment planning, with Magnetic Resonance Imaging (MRI) serving as a key tool in the non-invasive examination of such conditions. Despite the advancements in …

verfasst von:
Ishak Pacal, Omer Celik, Bilal Bayram, Antonio Cunha

19.05.2024

An intelligent offloading and resource allocation using Fuzzy-based HHGA algorithm for IoT applications

The need for intelligence in today’s era has tremendously increased the demand for Internet of Things (IoT) devices implanted to collect and process diverse data. Cloud computing offers a plethora of services to computationally constrained …

verfasst von:
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia

18.05.2024

An intelligent mechanism for energy consumption scheduling in smart buildings

In recent years, the incorporation of sensing technology into residential buildings has given rise to the concept of ”smart buildings”, aimed at enhancing resident comfort. These buildings are typically part of interconnected neighborhoods sharing …

verfasst von:
Hassan Harb, Mohamad Hijazi, Mohamed-El-Amine Brahmia, Ali Kadhum Idrees, Mouhammad AlAkkoumi, Ali Jaber, Abdelhafid Abouaissa

17.05.2024

Software defect prediction ensemble learning algorithm based on 2-step sparrow optimizing extreme learning machine

Software defect prediction is a crucial discipline within the software development life cycle. Accurate identification of defective modules in software can result in time and cost savings for developers. The ELM algorithm offers the benefits of …

verfasst von:
Yu Tang, Qi Dai, Mengyuan Yang, Lifang Chen, Ye Du

17.05.2024

Reinforcement learning based task offloading of IoT applications in fog computing: algorithms and optimization techniques

In recent years, fog computing has become a promising technology that supports computationally intensive and time-sensitive applications, especially when dealing with Internet of Things (IoT) devices with limited processing capability. In this …

verfasst von:
Takwa Allaoui, Kaouther Gasmi, Tahar Ezzedine

16.05.2024

Natural language why-question answering system in business intelligence context

Business Intelligence is the key technologies that ensures effective decision making through extracting relevant information and providing adapted systems as the Data Warehouses. To access decisional information, the decision maker should express …

verfasst von:
Rahma Djiroun, Meriem Amel Guessoum, Kamel Boukhalfa, El hadj Benkhelifa

16.05.2024

Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology

The Internet of Things (IoT), the convergence of blockchain and deep learning (DL) technologies presents exciting opportunities for innovation. The integration of a secured IoT architecture with a blockchain framework and DL technology offers a …

verfasst von:
Apurva Khandekar, Sheikh Fahad Ahmad

16.05.2024

Internet of things-based secure architecture to automate industry

The internet of things (IoT) represents a transformable breakthrough in the domain of intelligent devices, enabling essential functions such as data collection, management, and efficient storage. It has the potential to drive significant progress …

verfasst von:
Abdullah Aljumah, Tariq Ahamed Ahanger, Imdad Ullah

16.05.2024

An experimental and comparative study examining resource utilization in cloud data center

Virtual machine placement (VMP) has a significant importance with respect to resource utilization in cloud data centers. Indeed, the optimized management of machine placement usually results in a significant reduction in energy consumption. VMP is …

verfasst von:
Khaoula Braiki, Habib Youssef

15.05.2024

An improved density peaks clustering based on sparrow search algorithm

Density peaks clustering (DPC) algorithm has attracted the attention of scholars because of its simplicity and efficiency. However, it certainly has some disadvantages. On the one hand, the cut-off distance of DPC is artificially set, which …

verfasst von:
Yaru Chen, Jie Zhou, Xingshi He, Xinglong Luo

Open Access 15.05.2024

An autonomous blockchain-based workflow execution broker for e-science

Scientific workflows are essential for many applications, enabling the configuration and execution of complex tasks across distributed resources. In this paper, we contribute an Ethereum blockchain-based scientific workflow execution manager …

verfasst von:
Alper Alimoğlu, Can Özturan